We listened to customers, CISOs, innovators, startup founders, and other cybersecurity experts to gain a comprehensive understanding of their challenges and priorities. View the 2023 CISO Survival Guide.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

​Cisco Newsroom: Security  We listened to customers, CISOs, innovators, startup founders, and other cybersecurity experts to gain a comprehensive understanding of their challenges and priorities. View the 2023 CISO Survival Guide.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html Read More 

Cybersecurity sits at the crossroads of a worldwide digital reassessment. The tools that got us through pre-pandemic times will not sustain security going forward.

CISOs face tough decisions as they are challenged with securing sensitive enterprise applications and provisioning dynamic user access in the backdrop of myriad enterprise collaboration tools, remote/hybrid work, and lengthening supply chains.

Motivated by the question of “what’s next?” this year’s CISO Survival Guide was authored by Cisco Investments in conjunction with cybersecurity-focused venture capitalists within the startup landscape: Forgepoint Capital, NightDragon, and Team8. We set out to address the heart of that very question:

What’s next?

To do this, we listened to customers, CISOs, innovators, startup founders, and other cybersecurity experts to gain a comprehensive understanding of their challenges and priorities. While each VC tackled the problem from a different angle, unification was the one theme that cut through it all. They need more interoperability and less friction. And they demand more decipherable data when making the decisions that count.

Cisco Investments, in our research, found that an overwhelming majority, 85%, of IT decision-makers are prioritizing Identity and Access Management investments more highly than other security solutions. But – related to this – CISOs clearly voiced their critical pain point: The lack of a singular platform across Identity Management (IAM), Identity Governance and Administration (IGA), and Privileged Access Management (PAM). Enterprise and workforce identity is a singular problem that should eventually be solved on a single, unifying platform. Another key takeaway is the strong emergence of Cloud Infrastructure Entitlements Management (CIEM) to simplify and secure operations in the cloud.

In addition, Cloud Security sits at the top of CISOs’ priority list. However, Team8 investigations revealed that current Cloud Security tools are primarily preventative in nature, addressing the ‘left of boom.’ Team8 postures that the Cloud Native Application Protection Platform will bridge left of boom and right of boom, post breach, providing an all-inclusive platform that prevents, detects and remediates.