Financial and Operational Challenges of Establishing Digital Security Frameworks Examined in New Report

In unpredicted environments where cyber threats and related cyberattacks loom larger than ever, organizations worldwide are ramping up efforts to fortify their defenses by building Security Operations Centers (SOCs). A recent global study by cybersecurity firm Kaspersky sheds light on the practical realities of this endeavor, drawing from surveys of senior IT security professionals in companies with over 500 employees across 16 countries.

The research reveals that while the drive to create SOCs is strong, the path is fraught with financial, temporal, and operational hurdles.

One of the standout aspects is the budgeting landscape.

Globally, the typical planned investment hovers around $2 million.

However, a majority—55%—of organizations aim to keep costs under $1 million, reflecting cautious approaches among smaller entities.

In contrast, about 24% are gearing up for expenditures exceeding $2.5 million, often tied to the scale of their operations and the extent of outsourcing.

Company size plays a pivotal role here: larger firms, with their expansive infrastructures, anticipate heftier outlays to meet demanding security needs.

Regional variations add another layer of intrigue.

Entities in nations such as Vietnam and China demonstrate a greater willingness to surpass the worldwide average, pouring resources into SOCs as part of broader strategies emphasizing digital independence and domestically developed security frameworks.

Conversely, many other regions show restraint, capping budgets at $1 million or less.

This disparity underscores how national priorities, like bolstering local infrastructure, influence cybersecurity spending.

Initial costs largely encompass software licenses and hardware, but ongoing operational expenses, especially staff salaries, significantly inflate the total ownership cost.

When it comes to rollout timelines, expectations cluster around efficiency. A substantial 66% of respondents foresee completing their SOC setups in 6 to 12 months, signaling optimism for relatively swift implementations.

Yet, 26% brace for extended timelines stretching up to two years, accounting for complexities in integration.

Interestingly, despite managing intricate systems, bigger companies push for quicker deployments compared to mid-sized ones.

Their strategy often involves phased rollouts: starting with safeguarding vital assets before gradually extending protection network-wide.

The study emphasizes that no single barrier dominates the SOC-building process; instead, a spectrum of issues emerges.

Topping the list is steep upfront capital requirements, flagged by 33% of participants.

Close behind, 28% struggle with assessing SOC performance, which demands juggling diverse key performance indicators (KPIs).

These range from financial gauges like return on investment (ROI) to efficiency metrics such as mean time to detect (MTTD) and mean time to respond (MTTR), alongside compliance with regulatory norms.

Other prevalent challenges include navigating sophisticated security tools (27%) and merging disparate technologies (26%).

Human factors are equally pressing: 25% cite insufficient skills within their current teams, matched by the same percentage pointing to talent shortages in the job market.

These talent gaps highlight that expertise remains as crucial as funding and tech in this equation.

Kaspersky’s findings underscore that for most firms, establishing an SOC is no longer optional but a matter of execution tailored to unique contexts.

The company advocates for strategic planning, leveraging tools like SIEM for data analysis, EDR/XDR for threat response, and threat intelligence services to streamline the process.

By addressing these multifaceted elements early, organizations can build resilient cybersecurity ecosystems that evolve with emerging risks.

In summary, Kaspersky‘s research paints somewhat of a nuanced picture of SOC development, blending strategic objectives with pragmatism. As cyber landscapes grow more volatile, understanding these key dynamics will be instrument to effective implementation, ensuring investments yield tangible security gains.



Sponsored Links by DQ Promote

 

 

 
Send this to a friend