Survey Finds Insider Threats are Most Difficult Attack to Detect and Behavioral Analytics Technology is a Top Priority in the SOC

Survey of Black Hat USA attendees focuses on what security professionals working in the Security Operations Center (SOC) need to be successful, and their plans for the coming year

Gurucul, the leader in Next-Gen SIEM, XDR, UEBA and Identity Access Analytics, announced the results of a Black Hat USA 2022 security professionals survey. Respondents indicated that Insider Threats were the most difficult type of attack for SOC analysts to detect, and that Behavioral Analytics was the most common piece of technology they felt was missing and that they planned to add to the SOC in the near future. The survey also found that a strong majority of respondents feel their SOC programs are improving, but that they needed more training, high-level talent in the SOC, better compensation, and more time off.

“Taken as a whole, these survey results suggest that organizations and security professionals understand that Insider Threats are a serious security risk and are working to improve their defenses by adding technologies like Behavioral Analytics and Network Traffic Analysis,” said Saryu Nayyar, Gurucul’s CEO. “But they’re not there yet. Gurucul’s approach to these issues, which we think will help many of these organizations improve their defenses against Insider Threats, pairs machine learning behavior profiling with predictive risk-scoring algorithms to predict, prevent and detect breaches.”

Marketing Technology News: MetaWeb Ventures Raises $30 Million For Builder Focused Blockchain Fund

Other key findings from the survey include:

  • 27% of respondents identified Insider Threats as the most difficult attack to detect – the highest percentage across types.
  • More than 36% of respondents chose Behavioral Analytics as the technology they are currently missing that would most improve their SOC and more than 24% plan to invest budget into Behavioral Analytics solutions in the next year.
  • More than 17% of respondents plan to invest in Network Traffic Analysis technology in the next year.
  • 82% of security professionals feel their SOC program is improving. Less than 5% said it was actively getting worse.
  • Tier 3 SOC Analysts / Threat Hunters are the most in-demand role in the SOC (chosen by 31% of respondents), followed by Tier 2 Analysts (20%) and Threat Content Creators (16%).
  • 39% of respondents feel that their organization is investing in enough training for the SOC, but 31% said they are not and 30% were undecided.
  • 35% of analysts need more than two weeks of time off to feel rejuvenated and 28% feel like they deserved a 20% raise.

As organizations are transforming their SOC in the ways revealed by this survey (as well as to support multi-cloud deployments and zero trust programs), they are also looking for end-to-end solutions to help them improve security analyst effectiveness for rapidly identifying and confirming, not just threats and alerts, but entire attack campaigns. Gurucul’s Security Analytics and Operations Platform is purpose-built to automate and accelerate data collection, event and alert correlation, detection triage, investigation, and response to targeted attacks. It combines threat intelligence with an enterprise-class risk engine, delivering precise contextual detections, prioritized investigation, and risk-driven response actions that drastically reduce mean-time-to-detection (MTTD) and mean-time-to-response (MTTR). Gurucul’s platform can also support the most complex deployments including on-premises, hybrid, and cloud (SaaS, private, GovCloud, and multi-cloud including multi-tenancy), addressing the needs of today’s modern enterprise and managed detection and response (MDR) providers.

Marketing Technology News: MarTech Interview With Lauren Vaccarello, CMO at Salesloft

Brought to you by
For Sales, write to: contact@martechseries.com
Copyright © 2024 MarTech Series. All Rights Reserved.Privacy Policy
To repurpose or use any of the content or material on this and our sister sites, explicit written permission needs to be sought.