Data Security Index
Data Security Index
Foreword
Yet, with this increased reliance on data comes the stark reality that
vulnerabilities in the digital shadows are real and quickly expanding.
Cyber threats, data breaches, and insider risk incidents are no longer
rare occurrences; they are pervasive and escalating, posing risks to
organizations that depend on data. Of the decision makers we
surveyed recently, 89% said they view their data security posture as
critical to their overall success.
We welcome you to read and share this latest report and treat it as the
beginning of new conversations with our teams on how we can best
help secure our collective future.
Rudra Mitra
Corporate Vice President
Microsoft Data Security and Compliance
October Data Security 3
2023 Index
Introduction
1 2 3
Decision makers think
they’re protected,
Having more
tools does not mean
Organizations continue
to be plagued by the
but reality doesn’t greater data security stress of external and
match perceptions. or efficiency – it’s internal data security
the opposite. incidents, especially in
While most decision makers
say they are satisfied and business data.
80% of decision makers
confident with their data agree that comprehensive, 50% of organizations
security solutions, they’re integrated solutions are surveyed have experienced a
still experiencing an average superior to manual, best-of- ransomware or malware attack
of 59 data security incidents breed solutions – and yet in the past year – and many
a year, with costly impacts. organizations’ approach to decision makers don’t believe
tools continues to be their organization is fully
fragmented, using an prepared to prevent and
average of 10+ data security address future ones. Internally,
tools. But those with the malicious insiders are a top
most tools also experience concern. Additionally,
more data security incidents, organizations are highly
suggesting that the greater concerned about the
the tool proliferation, the vulnerability of their business
weaker the security. data. This again underscores
the need for a security platform
that addresses risks
comprehensively.
Key Findings
October Data Security 5
2023 Index
4 5
Organizations need
Cloud and AI to drive
Automation and AI
are promising avenues
digital transformation of greater protection.
– but they’re also
Organizations want their teams
the most vulnerable to spend less time on
data locations. detection and more time on
prevention. Automation can
Cloud applications and AI allow teams to focus more on
technology have become proactive measures, while
essential for organizations’ using AI for data security helps
collaboration and productivity organizations be more
– however, this evolution has strategic and get smarter
also created more dynamic and about future threats.
multifaceted risks. As
organizations embrace AI,
enhancing data security to
enable responsible and safe
use becomes critical.
1
October Data Security 6
2023 Index
Decision makers
think they’re protected,
but reality doesn’t
match perceptions.
October Data Security 7
Decision makers think 2023 Index
On the surface, decision makers project high In addition, 92% face challenges, primarily in
levels of confidence and satisfaction with their the areas of cost, integration, and time to
data security solutions, The majority of implement, which inhibit their ability to further
organizations agree their data security invest in data security, underscoring the need
controls are sufficient in preventing data from for more budget-friendly and labor-efficient
being breached, they feel they know where solutions.
most of their data resides, and that they can
detect a majority of risks around data. The perception of confidence in data security
readiness differs from the reality of incidents
At the same time, organizations continue to organizations are experiencing. Even though it
experience a substantial volume of data is important for organizations to know where
security incidents – an average of 59 in the data is located and detect risks, these
past 12 months, with a fifth of those being measures individually, or separately, are not
considered ‘severe’. The impact of these enough to help organizations prevent the
incidents is widespread as on average, incidents that keep data security and risk
organizations estimate that the total financial decision makers up at night.
cost of their most severe data security incident
is around $244K – meaning annual incidents As one CISO (Chief Information Security
can cost up to $15 million. On top of these Officer) in financial services puts it, “I can’t go
costs, four in 10 decision makers also say tell my board of directors ‘I secured the data, I
the operational cost to recover for a data just didn’t protect it’… the last thing we want to
security incident and loss of business from see is our bank failing to deliver on the front
reputational damage is of high concern. page of the Wall Street Journal.”
59
Average number of data
$15M
UP TO
Organizations are coming to realize that years As a result, organizations report using 10 data
of a point solution approach has created gaps security tools on average to address data
in visibility and efficiency due to siloed data security risks, including Data Loss Prevention,
security tools. That trend is now giving way to Information Protection, Insider Risk
a desire to have an integrated solution for data Management, Security Information & Event
security with 80% agreeing that a Management (SIEM), Cloud Access Security
comprehensive data security platform with Broker, and more. For organizations with over
integrated solutions is superior to using 5,000 employees, the average number of tools
multiple best-of-breed solutions that have to is even greater.
be manually integrated and managed.
Having more tools may be creating a false
Yet even though the vast majority consider sense of security, as those who use more tools
integrated solutions superior, data security tool (16+) are more confident in their data security
usage is prolific and fragmented. posture compared to those who use fewer
tools (61% vs. 56%).
The case for greater data security through more First, multiple disparate data security tools can
integrated solutions and fewer tools becomes lead to gaps in visibility and more shadow
even stronger when looking at the sentiments and data. In fact, those who are concerned about
practices of those who prefer best-of-breed shadow data are more likely to prefer best-of-
solutions or more tools. breed solutions. This is most likely because
organizations with a best-of-breed approach
need to take more effort to gain a
comprehensive visibility into their data security
posture.
“How is data going to be
Second, managing siloed solutions brings more
gathered, aggregated, and used complexity to data security teams, as each
from quite a few systems? A lot disparate solution requires dedicated staff,
of different data points need to endpoint agent installation and maintenance,
and various new processes. Take alerts review
be put together in one ecosystem and triage, one of the tasks that need staff and
for it to really work. Or else resources, as an example. An increasing
you really have a Swiss cheese number of alerts means extra efforts required
of data security teams when managing isolated
version of data security.” solutions. Organizations with more tools
receive an average of 96 data security alerts
VP of IT
per day, while teams with fewer tools receive
Manufacturing/Production
less than half that amount, with 44. In addition,
they aren’t able to review as many of these
alerts as teams with fewer tools can (61%,
compared with 68%). This often also results in
organizations with more tools being more
reactive compared to organizations who use a
lower volume of tools.
October Data Security 11
2023 Index
Lastly, more tools also indicate that “Right now, we're crawling. Every one of the
organizations must exert extensive effort to systems that we have, they all have their own
integrate insights and remediation plans, and portals, their own tools, their own ways of dealing
information can become lost in translation. with things. Each person goes their own way,
When asked about the top data security where they're the expert. Then they all get back
challenges, the cost of implementing or together and decide what is going on, and we
maintaining data security solutions and address it from there. So, it's a bit of manual work
challenges integrating data security solutions at this point,” stated a Director of Infrastructure
are ranked as the top two. & Operations in manufacturing and production.
This translates to longer, slower processes, with Ultimately, by choosing to continue with multiple
37% of those who use 16 or more tools solutions, organizations are ignoring their own
reporting needing one month or longer to talk of understanding that integrated solutions
complete a data security investigation are superior and walking in the opposite
compared to only 21% of those with fewer tools. direction – costing them time and money.
Organizations
continue to be plagued
by the stress of external
and internal data security
incidents, especially
in business data.
October Data Security 13
2023 Index
Organizations continue to be
plagued by the stress of external and
50%
internal data security incidents,
especially on business data.
Had data security incident
caused by malware
As factors around data – including the people
or ransomware in
who interact with data, activities around data,
the past year
and devices and apps used to process data – are
constantly evolving, data security incidents and
data breaches can happen anytime and
anywhere. And, these threats come from both
external attackers as well as trusted personnel,
including employees, contractors, and partners.
Whether maliciously or inadvertently, all players In addition, these attacks are where
can cause data security incidents – which means organizations feel the most vulnerable, with
there’s a constant need to protect across a 41% saying they feel least prepared to handle
multitude of areas. future malware or ransomware attacks in the
next year. This sense of vulnerability is even
A VP of IT in financial services said, “What you higher among those that prefer a best-of-
are trying to protect against is always changing. breed approach – 44% feel unprepared for an
It’s a moving target. It’s always going to be attack of this nature, compared to only 36% of
evolving, changing, and flexible. What you are those who prefer an integrated solution.
protecting and where it lives is only going to
get more varied.” Securing against and preventing insider risk is
also top of mind for decision makers. 35% say
While data security incidents can come from they need to shore up defenses against
various sources, the external threat of malicious insiders and compromised accounts,
malware or ransomware incidents - instances and a third are concerned with inadvertent
where malicious software infiltrates a system, insider incidents. Although malicious insider
providing attackers with unauthorized access to incidents may not be the leading cause of
systems or networks - are far and away the most data security breaches, they are the second
common, with 50% of organizations surveyed most common type of incident decision
having experienced at least one in the past year. makers feel least prepared to prevent.
October Data Security 14
2023 Index
The data security solutions that organizations Looking ahead, 77% of organizations perceive
choose must also work for a variety of sensitive business data, such as intellectual property
data, including high-value business data, and source code, as the most vulnerable. This
operational data, and personal data. During is primarily because business data plays a
data security incidents in the past 12 months, crucial role in establishing competitive
74% of organizations have had business data advantages and revenue generation. However,
exposed, 65% saw operational data identifying and classifying such data can be
compromised and 58% experienced personal challenging, as traditional pattern recognition,
data being made vulnerable. Among the regular expression, or function match
various types of data, intellectual property, IT technology may not effectively identify
and network design, and PII has been content that lacks specific string formats or
compromised or exposed most often. keywords. In turn, organizations need more
advanced technologies to help discover and
protect those vulnerable sensitive data.
Personal Identifiable
Intellectual property 30% IT and network design 29% 31%
Information (PII)
Human resources
Source code 28% Financial statements 18% information 21%
(payroll, resume, etc.)
Protected Health
Trade secrets 24% Procurement & invoice 12% 18%
Information (PHI)
Legal documents/
Merger & acquisition files 20% 12% Credentials 17%
agreements
Manufacturing
Construction specifications 18% 11%
processes/batch files
4
October Data Security 16
2023 Index
Organizations need
Cloud and AI to drive
digital transformation
– but they’re also
the most vulnerable
data locations.
October Data Security 17
Organizations need Cloud and 2023 Index
With over a third of organizations “AI is good for productivity and efficiency, but it
implementing AI strategy, and more on the has potential security and data risks.” An
way, AI is being adopted at an unprecedented enterprise a Security Decision Maker stated.
rate, much speedier than cloud and email
adoption in the past. As organizations embrace While concerns around AI exist, decision makers
AI, enhancing data security to enable can also see the potential, especially as vendors
responsible use and prevent risk becomes in the market are developing innovations to help
essential. AI is considered a top at-risk location empower businesses through responsible AI use.
for data security incidents, compared to other To further utilize AI, however, organizations
locations, and 27% of organizations have report top controls they need are to detect
experienced an AI data security breach. malicious or risky content in AI, encrypt, mask, or
Organization’s concerns around the risks of anonymize data before it can be uploaded to AI,
using AI center around a lack of control over and identify sensitive data generated by AI.
data shared with AI, lack of controls to detect
and mitigate risky use of AI, lack of
transparency around how generative AI models TOP 5 DATA SECURITY CONTROLS
are trained, and leak of confidential NEEDED FOR AI
information through AI.
Detect malicious or
1
risky content in AI
Detect model or
5
data manipulation in AI
5
October Data Security 19
2023 Index
Automation and AI
are promising avenues
of greater protection.
October Data Security 20
2023 Index
Automation and AI
are promising avenues
The benefit of adopting a more proactive
of greater protection. strategy is evident, as the organizations
surveyed that are more proactive already
experience less costly data security incidents,
In an ideal world, without constraints based on are more likely to be able to investigate those
organizational priorities or budget, half of incidents in less than a month, and are more
organizations would like to be more proactive likely to believe their defense controls are
around data security management, spending sufficient in preventing data breaches.
more time on things like discovery of sensitive
data and associated risks around it and While organizations are aware that proactive
prevention of data security incidents. Currently data security measures can help reduce data
though, more than half of organizations spend security risks, they are not making progress in
the most time focusing on reactive measures implementing those measures. For example,
like detection of incidents, response, and those seeking to be more proactive by
investigations. And this detection and response allocating more time to prevention are more
to data security incidents is time-intensive – it likely to choose best-of-breed solutions, which
takes most organizations about a month to actually demand greater efforts in handling
resolve a data security incident and for some, reactive measures when bringing in detection
resolution can take up to six months. signals and response controls together.
Final Recommendations
According to the findings in this research, fewer solutions can bring more security. It may
seem counterintuitive, but organizations must combat the false sense of confidence that
arises from a multitude of isolated solutions. Vendor consolidation offers a strategic
approach that not only reduces costs but also enhances security.
Data security decision makers can initiate this transformation by empowering their teams
to dedicate more time to strategic work like researching and planning for new security
controls and optimizing security policies – something 84% of decision makers agree they
want to be doing. This process involves replacing legacy siloed solutions, which are often
considered 'best-of-breed' but fail to integrate effectively with other tools.
Decision makers can foster close collaboration with their teams to establish data security
program goals and key performance indicators (KPIs). They can then progress by defining
solution requirements and identifying non-negotiable features. This approach empowers
them to pinpoint vendors capable of providing tools that align with their overarching
objectives. Crucially, it promotes a forward-thinking mindset and helps teams avoid
becoming overly fixated on existing practices or isolated use cases, allowing them to
implement necessary changes towards a more integrated approach.
An integrated data security platform should empower security teams to do all these
critical tasks seamlessly:
Data security incidents commonly result from external attackers, malicious insiders, or
inadvertent insiders. Organizations must take measures to safeguard their data, both by
preventing unauthorized access from external threats and by mitigating the risk of
insider theft or accidental data exposure.
Combating evolving data security risks requires a concerted effort across the
organization to implement this defense-in-depth strategy. Data security team’s
collaboration with other departments, such as Security Operations Center (SOC), can
optimize data security investment. Notably, 66% of organizations that consider
themselves proactive interact with their SOC team, compared to 54% who do not.
Like teamwork across security teams, data security solutions should also seamlessly
integrate with other systems, such as Extended Detection and Response (XDR) or Identity
and Access Management (IAM) solutions, to effectively prevent data security incidents
from both external and internal sources. These integrations enable organizations to
conduct comprehensive investigations and responses to security incidents, gaining a
thorough understanding of the affected data, actors, and activities, and responding with
multiple mitigation controls. Consequently, this empowers them to make informed,
precise, and prompt responses to minimize the impact of potential security incidents.
Final Recommendations
October Data Security 26
2023 Index
• Discover sensitive data: Utilize AI to assist in identifying sensitive data and applying
protection policies, including encryption and rights management. This is particularly
valuable for business data that may pose challenges for detection through traditional
pattern recognition technologies. Organizations can leverage classification technology,
such as machine learning or AI-powered classifiers, known for their intelligence and
ability to swiftly locate sensitive content based on data context or business category.
Alternatively, organizations can employ exact data matching technology to
discover operational or personal data.
Furthermore, as industry regulations evolve (e.g., GDPR, HIPAA, or PCI DSS) and data land-
scape become more dynamic, it is crucial to possess advanced classification technology
that is customizable and easily adaptable to identify new categories of sensitive data.
• Detect critical data security risks: Harness the power of AI to pinpoint critical risks
associated with your sensitive data and allocate resources strategically to address
potential high-risk incidents. AI technologies can generate high-fidelity alerts, allowing
security teams to save valuable time that would otherwise be spent sifting through an
abundance of false-positive alerts. Moreover, AI can assist organizations in identifying
elusive risks, particularly when malicious actors attempt to evade detection. It is
imperative to utilize machine speed to outpace these threat actors.
• Prevent data security incidents dynamically: Use AI and automation to tailor your
prevention and mitigation controls automatically based on assessed risks, enabling a
more adaptable and proactive data security strategy. When AI-powered solutions detect
and evaluate risks, automated prevention controls can swiftly engage to safeguard the
data, applying mitigation controls precisely to the high-risk areas. For instance, in cases
where early indicators of data exfiltration intent are detected by high-risk users,
organizations can apply more stringent Data Loss Prevention (DLP) policies, proactively
staying ahead of potential data security incidents.
Objectives, Methodology,
and Audience Recruit
US 329