Menu

Cybersecurity is Everyone’s Job

Cybersecurity is Everyone’s Job

The most effective factor in combatting cybercrime is an informed and alert employee. And that includes every employee in the company.

I learned that by talking to CISOs while conducting a research study to determine the tools and processes they use to thwart ransomware and other cyber-attacks.

On behalf of a tech company, Futurum Research conducted this study to understand:

  • How CISOs from large organizations (more than 1,000 employees) are approaching the issue of protecting their companies’ data from cyber criminals and enabling sufficient recovery after an attack
  • How the ransomware threat has changed security and data protection practices
  • What tools and processes CISOs are using now, which areas need improvement, and what they feel they are not getting from their current products
  • How budgets and security teams are growing to meet the increase in cyber threats

We surveyed 163 security executives and conducted a dozen in-depth interviews with CISOs. We promised the interview subjects anonymity to ensure they could speak freely.

The CISOs we talked to emphasized they need help – both externally and internally – to secure their organizations. That includes getting IT teams to work closely with security teams, and outsourcing processes to large providers with expertise that could not be found in-house. But it also means getting every employee in their company involved and educated on all potential threats.

“The easiest way for a hacker to get in is to exploit a human vulnerability,” said a senior information security executive at a pet supplies company. “Most attacks come through phishing. It’s the human factor that we have to worry about. Someone has to click on the phishing link [for an attack to be successful]. If you can prevent that, then most likely you’re going to prevent someone from getting inside and causing havoc in your network.”

A bank Information Security Officer said he holds security awareness training sessions with all non-security staff.

“As I train staff, I tell them ‘You are the first line of defense,’” he said. “We train users to report suspicious events. If something weird is going on, we ask them to report it. So, it’s a combination of detection, monitor controls and ongoing user awareness.”

An oil company CIO with CISO responsibilities said he makes security training an ongoing process throughout the company. He circulates weekly security videos created by an outside firm to the entire organization. He also distributes quizzes every week, and gives an award to the employee who gets the highest score.

“Employees have become a lot more aware of how to spot an issue, which is important because most attacks start with some kind of access to an account,” he said. “We brought the same rigors we have for physical security to the cybersecurity side. The KPI on the physical side is Lost Time to Injury (LTI). I created a zero Cyber Incident as a KPI. And we track how many months we have zero cyber-incident. And lots of people are now spotting these kinds of issues and sending emails [to the security team].”

A former CISO for a Fortune 500 company and current cybersecurity consultant said cybersecurity awareness should be mandatory for all employees.
“You’ve got to hold them accountable upfront where they understand that there are certain policies that they have to follow,” he said. “Otherwise, we cannot protect the company. That’s a real conversation that continues to happen.”

Budget, Staffing Can Limit Security Efforts

Our survey identified the two main obstacles for managing cyber recovery as financial-related: the high cost of solutions (37%) and limited budget (36%). The former CISO-turned-consultant said another limiting factor for security professionals is, there are too few of them.

“There may be an expectation that every company has a good security incident response team and plan, and that’s the fallacy,” he said. “I know CISOs who are the only security practitioner in the company.”

We found in interviews that it is common for large organizations to outsource security expertise, particularly through Security Operations Centers including monitoring for Security Information and Event Management (SIEM) systems, and Managed Detection Response (MDR) services. Several executives said they also use services for scanning and monitoring data and other functions instead of trying to find in-house expertise.

CISOs also see the public clouds as offering complementary services to a wide range of on-premises tools. When asked which vendors’ products/services they use to address cybersecurity needs, the three major hyperscalers ranked in the top five. Microsoft Azure (39%) and AWS (30%) were the top two, followed by IBM, Cisco, and Google. Others mentioned by at least 10% of respondents were VMware, Dell, Palo Alto Networks, and CrowdStrike. Interviews revealed that executives see the public clouds as complementary services to a wide range of on-premises tools.

Disclosure: The Futurum Group is a research and advisory firm that engages or has engaged in research, analysis, and advisory services with many technology companies, including those mentioned in this article. The author does not hold any equity positions with any company mentioned in this article.

Analysis and opinions expressed herein are specific to the analyst individually and data and other information that might have been provided for validation, not those of The Futurum Group as a whole.

Other insights from The Futurum Group:

NetApp BlueXP Boosts Cyber-Resiliency Capabilities

Cyber Detection and recover Drive Commvault’s Portfolio Strategy

Decentralized Storage in the Battle Against Ransomware

Author Information

Dave focuses on the rapidly evolving integrated infrastructure and cloud storage markets.

Related Insights
CIO Take Smartsheet's Intelligent Work Management as a Strategic Execution Platform
December 22, 2025

CIO Take: Smartsheet’s Intelligent Work Management as a Strategic Execution Platform

Dion Hinchcliffe analyzes Smartsheet’s Intelligent Work Management announcements from a CIO lens—what’s real about agentic AI for execution at scale, what’s risky, and what to validate before standardizing....
AWS re:Invent 2025: Wrestling Back AI Leadership
December 5, 2025

AWS re:Invent 2025: Wrestling Back AI Leadership

Futurum analysts share their insights on how AWS re:Invent 2025 redefines the cloud giant as an AI manufacturer. We analyze Nova models, Trainium silicon, and AI Factories as AWS moves...
Pure Storage Q3 FY 2026 Results Revenue Up 16% YoY, Guidance Raised
December 4, 2025

Pure Storage Q3 FY 2026 Results: Revenue Up 16% YoY, Guidance Raised

Futurum Research analyzes Pure Storage’s Q3 FY 2026 results, highlighting enterprise platform adoption, hyperscaler momentum, and Portworx-led modernization....
NetApp Q2 FY 2026 Earnings Mix Shift Lifts Margins, AI Momentum Builds
November 26, 2025

NetApp Q2 FY 2026 Earnings: Mix Shift Lifts Margins, AI Momentum Builds

Futurum Research analyzes NetApp’s Q2 FY 2026 results, highlighting AI data platform traction, first-party cloud storage growth, and all-flash mix that lifted margins, alongside raised FY EPS and margin guidance....
Commvault’s Strategic Shift Redefining Resilience as a Strategic Imperative
November 25, 2025

Commvault’s Strategic Shift: Redefining Resilience as a Strategic Imperative

Fernando Montenegro, VP and Practice Lead at Futurum, shares insights on Commvault Shift 2025, highlighting the new Cloud Unity platform and the strategic shift to ResOps to unify IT, security,...
Microsoft Ignite 2025 AI, Agent 365, Anthropic on Azure & Security Advances
November 21, 2025

Microsoft Ignite 2025: AI, Agent 365, Anthropic on Azure & Security Advances

Analysts Nick Patience, Mitch Ashley, Fernando Montenegro, and Keith Kirkpatrick share insights on Microsoft's shift to agent-centric architecture, cementing the role of Agent 365 as the operational control plane and...

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.