Chasing The Cyber 1%: How To Beat The Cybersecurity Poverty Line – Security Intelligence

Chasing the Cyber 1%: How to Beat the Cybersecurity Poverty Line – Security Intelligence

Chasing the Cyber 1%: How to Beat the Cybersecurity Poverty Line
In cybersecurity, there are the haves and have-nots. For the latter, improving their security posture to defend against threats is rarely straightforward. While attackers become more high-tech, the gap between ‘the cyber 1%’ and those companies below the ‘cybersecurity poverty line’ grows wider. That poses a threat to all companies. 
What is the cyber poverty line? Why does it matter to your business, and what can you do to protect yourself? 
The cyber poverty line (CPL) is a threshold that divides all organizations into two distinct categories: those that are able to implement essential measures well and those that are unable. 
Wendy Nather, head of advisory CISOs at Cisco, first coined the concept in 2011. Since then, Nather’s theory has been widely adopted as the benchmark for acceptable cybersecurity posture. Chris Krebs added the concept of a ‘cyber 1%’ in a talk at a Gartner conference in 2020. 
The cyber 1% are the most capable and actively able to defend against threats, regardless of their industry. These companies possess the resources, culture and structure to maintain an elite security posture well-matched with attackers. 
For other companies, getting above the cybersecurity poverty line should be the minimum standard. If they don’t, they remain exposed to a breach and the damaging impact of such an attack on their data security, budget and company reputation.  
To understand what separates those on either side of the line, let’s consider six key factors:
Thriving enterprises are attractive targets for attackers, even more so those in the financial sector (for obvious reasons). However, there is no hard and fast rule here. Attackers also target smaller businesses with more modest revenues. 
The cyber 1%: Tend to have larger revenues, enabling greater investment.
Those below the CPL: More modest revenue, with smaller profits.
Without a sufficient IT budget, you will run into problems. Regardless of your revenue and profit, it’s essential to invest enough to build robust security programs and train teams to manage them. 
The cyber 1%: Spend heavily on recruitment, training and employee training, as well as investing in the latest tech and infrastructure. 
Those below the CPL: Tend to make do with aging software and hardware, often run by overstretched teams that don’t have enough time or resources.
“It really takes a village to make progress,” explains John Hammond, a senior security researcher at Huntress. “We know that attackers are collaborating and sharing threat intel, so the industry should, too.”
The cyber 1%: Aims to increase diversity in the company skillset so they can leverage the threat intelligence of multiple seasoned workers.
Those below the CPL: Face regular challenges due to knowledge gaps or skills shortages. 
A security operations center (SOC) assures your company round-the-clock protection. However, not every organization has the resources to build its own or even manage a credible freelance SOC. 
The cyber 1%: Develop an in-house SOC that is customized to their needs — including seasoned SOC analysts and powerful tools like SIEM.
Those below the CPL: Lack the resources and structure for an in-house SOC. Even if they outsource it, some may struggle to stay one step ahead of attackers.
The chief information security officer (CISO) is the executive leader who oversees information and data security. 
The cyber 1%: Has a CISO to manage the IT budget, oversee security training and awareness programs and ensure the company can safeguard against known attacks.
Those below the CPL: Lack a CISO or experienced security professional to drive IT investment or correctly prioritize the allocation of cybersecurity resources. 
If employees are more aware of the threat landscape, they will be less likely to fall prey to attacks. 
The cyber 1%: Nurtures a company-wide culture of security by training employees on best practices. 
Those below the CPL: Don’t openly share and talk about cybersecurity, which means employees have less power to contribute.
While budget and investment are huge factors in whether a company can reach the cyber 1%, those with limited capital can still develop a healthy posture that puts them above the CPL. 
Here are five steps to improve your standing.
As your revenue grows, try to allocate more of your budget to safeguard your data, infrastructure and financial accounts. Small steps can have a big impact, like these:
When attackers look for entry points, they can exploit any credential or device. Every single endpoint is a potential chink in a company’s armor. To combat this threat, every employee must become their own line of defense. 
Some ways you can help your team:
The challenge for many companies is the lack of time or resources to educate employees. Trying to upskill teams while running a business can lead to burnout. 
Here’s a flexible solution that you can use if you can’t afford to hire security workers with specific skill sets:
The mission becomes easier when you have the right tools: 
The zero trust framework assumes your business is always at risk. With this approach, companies implement strict rules for authentication, authorization and validation for all network traffic. In turn, this model offers greater protection for corporate data.
Jeetu Patel, Cisco EVP for security and collaboration, says cybersecurity measures will soon reach human-rights issue status. For now, organizations must focus on what they can do internally to get above the security poverty line.
The critical thing to realize is that cybersecurity poverty doesn’t just impact organizations with low cash flow. Simply providing money will not address other underlying factors, like a disconnected tech stack or siloed company structure that doesn’t openly discuss security issues.
In the end, a strong culture of security education and teamwork underpins the success of a company’s approach. Even if you lack the financial resources of the cyber 1%, astute investment in uniting people, processes and technology can help you establish a clear framework for cyber resilience.
With a passion for creative writing and an unquenchable thirst to learn about futuristic tech, Christopher John Haughey segued from a journalism degree into …
4 min readThis is a time of major changes for businesses and agencies. That includes the move to the cloud and the shift to being digital-first. So, cybersecurity has moved to a front-and-center position in many companies and industries. When talking about…
3 min readCorporate clients and cloud service providers (CSPs) are both responsible for cloud security. Clients remain accountable for governance and compliance. However, their other duties will vary depending upon the type of cloud deployment. What can cloud-native security controls do for…
4 min readWill people ever live in a digital world 24/7? Nobody knows for sure, but the metaverse is certainly expanding rapidly. As the world dives deeper into the digital realm, companies need guidance on how to protect their assets and intellectual…
The role of a data security analyst isn’t an easy one. It has always been hard to address data security because of the volume, speed and variety of data in the IT landscape. However, over the last few years, the job of a data security analyst, focused on protecting sensitive or regulated data, has become harder than ever. Why? Changes…
The skills gap in cybersecurity isn’t a new concern. But, new research revealed in Fortinet’s 2022 Cybersecurity Skills Gap report confirmed what many experts have assumed. The skills gap increased risk and was likely the direct cause of at least some breaches. Data for the survey was collected from 1,223 IT decision-makers in countries across the globe. The majority of…
In cybersecurity, there are the haves and have-nots. For the latter, improving their security posture to defend against threats is rarely straightforward. While attackers become more high-tech, the gap between ‘the cyber 1%’ and those companies below the ‘cybersecurity poverty line’ grows wider. That poses a threat to all companies.  What is the cyber poverty line? Why does it matter…
If there is one type of cyberattack that can drain the color from any security leader’s face, it’s ransomware. A crippling, disruptive, and expensive attack to recover from, with final costs rarely being easy to foretell. Already a prevalent threat, the number of ransomware attacks rose during the pandemic and nearly doubled in the year between 2020 and 2021, continuing…
Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.


Leave a Comment

Leave a Reply

Your email address will not be published.

Belden and Cylus partner to enhance cyber-security in rail – Global Railway Review

Cybersecurity firm Fortanix secures capital to provide confidential computing services – TechCrunch

Why anomalies in network traffic are key to cybersecurity [Q&A] – BetaNews

Highly ranked cybersecurity master's program teaches in-demand skills for growing field: News at IU: Indiana University – IU Newsroom