The Economic Value of Prevention in The Report
The Economic Value of Prevention in The Report
Cybersecurity Lifecycle
Part 3. Methods 26 – 28
Part 4. Caveats 28
Ponemon Institute is pleased to present the findings of The Economic Value of Prevention in the
Cybersecurity Lifecycle, sponsored by Deep Instinct. The cybersecurity lifecycle is the sequence
of activities an organization experiences when responding to an attack. The five high-level
phases are prevention, detection, containment, recovery and remediation.
We surveyed 634 IT and IT security practitioners who are knowledgeable about their
organizations’ cybersecurity technologies and processes. Within their organizations, most of
these respondents are responsible for maintaining and implementing security technologies,
conducting assessments, leading security teams and testing controls.
The key takeaway from this research is that when attacks are prevented from entering and
causing any damage, organizations can save resources, costs, damages, time and
reputation.
To determine the economic value of prevention, respondents were first asked to estimate the
cost of one of the following five types of attacks: phishing, zero-day, spyware, nation-state and
ransomware. They were then asked to estimate what percentage of the cost is spent on each
phase of the cybersecurity lifecycle, including prevention. Because there are fixed costs
associated with the prevention phase of the cybersecurity lifecycle, such as in-house expertise
and investments in technologies, there will be a cost even if the attack is stopped before doing
damage. For example, the average total cost of a phishing attack is $832,500 and of that 82
percent is spent on detection, containment, recovery and remediation. Respondents estimate 18
percent is spent on prevention. Thus, if the attack is prevented the total cost saved would be
$682,650 (82 percent of $832,500).
Figure 1 illustrates the dilemma organizations face with respect to prevention in the cybersecurity
lifecycle. Seventy percent of respondents (34 percent + 36 percent) believe the ability to prevent
cyberattacks would strengthen their organization’s cybersecurity posture. However, 76 percent of
respondents (40 percent + 36 percent) say they have given up on improving their ability to
prevent an attack because it is too difficult to achieve.
§ Deep learning is a form of AI and is inspired by the brain’s ability to learn. In the context
of this research, deep learning is defined as follows: once a human brain learns to identify an
object, its identification becomes second nature. Deep learning’s artificial brains consist of
complex neural networks and can process high amounts of data to get a profound and highly
accurate understanding of the data analyzed. The top three reasons to incorporate a deep-
learning-based-solution are to lower false positive rates, increase detection rates and prevent
unknown first-seen cyberattacks.
§ Perceptions that AI could be a gimmick and lack of in-house expertise are the two
challenges to deployment of AI-based technologies. Fifty percent of respondents say
when trying to gain support for the adoption of AI there is internal resistance because it is
considered a gimmick. This is followed by the inability to recruit personnel with the necessary
expertise (49 percent of respondents).
§ IT security budgets are considered inadequate. Only 40 percent of respondents say their
budgets are sufficient to achieve a strong cybersecurity posture. The average total IT budget
is $94.3 million and of this 14 percent or approximately $13 million is allocated to IT security.
Nineteen percent or approximately $2.5 million will be allocated to investments in enabling
security technologies such as AI, machine learning, orchestration, automation, blockchain
and more.
In this section, we provide an analysis of the research. The complete audited findings are
presented in the Appendix of this report. We organized the report according to the following
topics.
Figure 2 presents a list of security threats affecting organizations represented in this study. As
shown, phishing attacks, DNS-based attacks and electronic agents top the list.
“Ready or not we have to be prepared for the security risks of IoT and digital transformation.
The ability to prevent attacks will be critical to prevent security exploits related to unsecured IoT
devices and the digital transformation process.”
Figure 2. What are the top security threats affecting your organization?
Three responses permitted
Ransomware 32%
Other 3%
Figure 2. What are the top security vulnerabilities affecting your organization?
Two responses permitted
Other 3%
Figure 4. How does your organization secure mobile devices used by employees?
More than one response permitted
Other 2%
In the context of this research, we define each phase of the lifecycle as follows:
Prevention is the effort to stop malicious threats from running and to classify in real time what
type of attacks are targeting the organization. It is the ability to stop files or fileless attacks pre-
executive before any process is running.
Detection is the effort to identify cyber threats through heightened visibility of the IT security
infrastructure. It is the ability to identify the malicious process while already running on the
machine or network.
Containment occurs once a cyber threat is identified and includes efforts to stop it spread.
Recovery occurs once the cyber threat is contained and efforts are made to restore the IT
security infrastructure to its previous state.
Remediation is the effort to ensure that for the present and future there are the people,
processes and technologies in place to prevent future cyber threats.
54%
52%
50% 49%
48%
46% 46% 46%
46%
44%
42%
40%
Prevent a Detect a Contain a Recover from a Remediate after a
cyberattack cyberattack cyberattack cyberattack cyberattack
“We believe the prevention of attacks is ideal and I think achievable but senior leadership
accepts the fact that attacks cannot be prevented. ”
Figure 6. How difficult is it to prevent, detect, contain, recover from and remediate a
cyberattack?
78%
77%
76% 76%
76%
75%
75%
74%
73%
72%
Prevent a Detect a Contain a Recover from a Remediate after a
cyberattack cyberattack cyberattack cyberattack cyberattack
Prevention is difficult because it takes too long to identify an attack. As shown above, 80
percent of respondents say prevention is the most difficult to achieve. According to Figure 7, 63
percent of respondents say difficulty can be attributed to the length of time it takes to identify an
attack and outdated or insufficient technologies (59 percent of respondents).
Other 4%
Respondents were asked to rate the impact of different technologies on the ability to prevent a
cyberattack on a 5-point scale of 5 = very high impact to 1 = low impact. The technologies that
are considered to have the greatest impact on an organization’s ability to prevent cyberattacks
are presented in Figure 8. Intrusion detection/prevention, SIEM, network traffic intelligence, user
behavior activity monitoring and access governance systems are considered to have a high
impact on improving the ability to prevent cyberattacks.
“Once attacks are on the inside, we cannot accurately determine the financial and reputational
consequences to our company.”
Encryption 37%
Isolation 31%
Hardening 20%
Other 3%
Figure 10. What technology features are important in the prevention of cyberattacks?
More than one response permitted
Other 5%
In this section, we discuss in what phase of the cybersecurity lifecycle organizations are able to
deal with an attack. The five attacks featured in this section are: phishing, zero-day, spyware,
nation-state and ransomware. According to the findings, very few respondents are able to prevent
and detect these attacks. Respondents were also asked what the one attack cost their
organizations and estimate the cost savings if their organization were able to prevent the attack.
Most organizations are only able to deal with the phishing attack in the later phases of the
cybersecurity lifecycle. Seventy-nine percent of respondents say their organization had a
phishing attack in the past year. Of these respondents, only 18 percent were able to prevent this
attack, as shown in Figure 11.
Figure 11. In what phase of the cybersecurity lifecycle were you able to deal with the
phishing attack?
35%
30%
30%
25%
20% 20%
20% 18%
15%
12%
10%
5%
0%
Prevention Detection Containment Recovery Remediation
Figure 12. In what phase of the cybersecurity lifecycle were you able to deal with the zero-
day attack?
45% 42%
40%
35%
30%
25%
21%
20%
15%
15% 12%
10%
10%
5%
0%
Prevention Detection Containment Recovery Remediation
Figure 13. In what phase of the cybersecurity lifecycle were you able to deal with the
spyware attack?
35%
30% 29%
26%
25%
20%
20%
15% 13%
12%
10%
5%
0%
Prevention Detection Containment Recovery Remediation
Figure 14. In what phase of the cybersecurity lifecycle were you able to deal with the
ransomware attack?
40%
35%
35%
30%
25% 23%
20% 17%
15%
15%
10%
10%
5%
0%
Prevention Detection Containment Recovery Remediation
Nation-state attacks are few but difficult to prevent. Eighteen percent of respondents say their
organization had a nation-state attack in the past year. As shown in Figure 15, only 9 percent of
respondents say they were able to prevent a nation-state attack.
Figure 15. In what phase of the cybersecurity lifecycle were you able to deal with the
nation-state attack?
35%
30% 29%
25% 23%
20%
20% 19%
15%
10% 9%
5%
0%
Prevention Detection Containment Recovery Remediation
Because there are fixed costs associated with the prevention phase of the cybersecurity lifecycle,
such as in-house expertise and investments in technologies, there will be a cost even if the attack
is stopped before doing damage. For example, as shown in the Table below, the average total
cost of a phishing attack is $832,500 and of that 82 percent is spent on detection, containment,
recovery and remediation. Respondents estimate 18 percent is spent on prevention. Thus, if the
attack is prevented the total cost saved would be $682,650 (82 percent of $832,500). If
organizations experienced all attacks the average total cost is $4.7 million and if prevented could
save the organization an average of $4 million.
“If we could quantify the cost savings of the prevention of attacks, we would be able to
increase our IT security budget and debunk the C-suite’s myth that AI is a gimmick.
I believe AI is critical to preventing attacks ”
Nation-state attacks are the costliest attacks to respond to in the cybersecurity lifecycle ($1.5
million). If organizations are able to prevent these attacks, the cost savings could be an average
of approximately $1.4 million per attack. A zero-day attack can cost an average of $1.2 million
and if prevented could save $1.1 million if it was prevented
1
The average percent of costs related to the four phases of the cybersecurity lifecycle (detection,
containment, recovery and remediation) are as follows: phishing (82 percent of the total cost), zero-day (88
percent of total cost), spyware (74 percent of total cost), nation-state (91 percent of the total cost),
ransomware (90 percent of total cost).
1. Reconnaissance: the intruder picks a target, researches it and looks for vulnerabilities
2. Weaponization: the intruder develops malware designed to exploit the vulnerability
3. Delivery: the intruder transmits the malware via a phishing email or another medium
4. Exploitation: the malware begins executing on the target system
5. Installation: the malware installs a backdoor or other ingress accessible to the attacker
6. Command and Control (C2): the intruder gains persistent access to the organization’s
systems/network
7. Actions on Objective: the Intruder initiates end goal actions, such as data theft, data
corruption or data destruction
Respondents were asked to rate the difficulty in preventing a zero-day attack in every phase of
the cyber kill chain on a scale of 1 = not difficult to 10 = very difficult. Figure 16 presents the very
difficult responses (7+ on the 10-point scale). The most difficult phase to prevent the zero-day
attack is the command and control phase (80 percent) in which the intruder gains persistent
access to the organization’s systems/network followed by the delivery phase of the kill chain (78
percent).
“We are optimistic that AI when properly deployed will make a huge difference in our ability to
prevent attacks. The problem is finding the right people who can make AI work.”
Figure 16. How difficult is it to prevent a zero-day attack during each phase of cyber kill
chain?
On a scale of 1 = not difficult to 10 = very difficult, 7+ responses presented
In the context of this research, automation refers to enabling security technologies that augment
or replace human intervention in the identification and containment of cyber exploits or breaches.
Such technologies depend upon artificial intelligence (AI), machine learning and orchestration. AI
refers to the development of computer systems that are able to perform tasks normally requiring
human intelligence.
As shown in Figure 17, 60 percent of respondents say their organizations either currently deploy
AI (37 percent of respondents) or plan to deploy AI for cybersecurity within the next 12 months
(23 percent of respondents).
Figure 17. Does your organization presently or plan to deploy AI-based security
technologies?
Figure 18. What are the challenges to successfully deploying AI-based technologies?
Three responses permitted
Other 2%
Features that make automation desirable are the simplification of the process that detects and
responds to application security threats and vulnerabilities (65 percent of respondents) and
effectiveness in reducing false positives and alerts (61 percent of respondents). The challenges
with artificial intelligence are the difficulty in integrating AI-based security technologies with legacy
systems (53 percent of respondents) and the need to simplify and streamline their organizations
security architecture to obtain maximum value from AI-based security technologies (51 percent of
respondents).
When asked what is the number one reason to adopt deep learning, respondents say it is to
lower false positive rates (26 percent), increase detection rates (24 percent) and prevent
unknown firs-seen cyberattack (21 percent), as shown in Figure 20.
Figure 20. What would be your organization’s number one reason for incorporating a
deep-learning-based solution?
Only one response permitted
Other 1%
Only 40 percent of respondents have sufficient budget to achieve a strong cybersecurity posture.
Thus, 60 percent are unsure or disagree that their organizations have enough resources to
achieve a strong cybersecurity budget. As a consequence, an inadequate budget is preventing
organizations from having the in-house expertise to achieve a strong cybersecurity posture.
The average total IT budget is $94.3 million and of this 14 percent or approximately $13 million is
allocated to IT security. Nineteen percent or approximately $2.5 million will be allocated to
investments in enabling security technologies such as AI, machine learning, orchestration,
automation, blockchain and more.
Figure 22. How has your cybersecurity budget or spending levels changed in the past two
years and over the next two years?
35% 33%
31%
30%
24% 23% 23%
25%
21%
20% 17%
15%
15%
10% 7% 6%
5%
0%
Significant Increase No change Decrease Significant
increase (> 20%) decrease (< 20%)
Budget changes over the past two years Budget changes over the next two years
Organizations are relying upon return on investment (ROI) to justify investments followed by a
decrease in false positive rates. Only 26 percent of respondents use the increased prevention
rate.
Figure 23. What metrics are most important to the cybersecurity technology investment?
Two responses permitted
CIO/CTO 59%
IT security leader (CISO) 45%
Business unit leader 41%
SOC leader 37%
No one role has overall responsibility 34%
Incident response leader 26%
Security leader (CSO) 19%
Compliance 12%
Procurement 12%
Facilities or data center management 5%
Law department 5%
COO/CFO 2%
Other 3%
0% 10% 20% 30% 40% 50% 60% 70%
According to Figure 25, 27 percent of respondents say the budget is a set percentage of the total
IT budget and 26 percent of respondents say it is based on an assessment of their organizations’
security risks.
Figure 25. How does your organization determine its cybersecurity budget?
Figure 26. How does your organization allocate its budget for the five phases of the
cybersecurity lifecycle?
35%
30% 29%
26%
25%
21%
20%
15% 14%
10%
10%
5%
0%
Containment Detection Prevention Recovery Remediation
Other 2%
All investments met our organization’s
28%
expectations
0% 10% 20% 30% 40% 50% 60%
A sampling frame of 16,771 IT and IT security professionals who are knowledgeable about their
organizations’ cybersecurity technologies and processes were selected as participants in this
survey. Table 2 shows 701 total returns. Screening and reliability checks required the removal of
67 surveys. Our final sample consisted of 634 surveys, or a 3.8 percent response rate.
The following pie chart summarizes the position level of qualified respondents. At 33 percent, the
largest segment contains those who are rank-and-file level employees (e.g., technicians or
analysts). The smallest segment (1 percent) includes contractors. More than half (61 percent) of
respondents are at or above the supervisory level.
5% 1%3% 5%
Senior Executive
17% Vice President
Director
33% Manager
Supervisor
Technician
Staff / Analyst
21%
Contractor
15%
6% 2%
6% 24% IT management
SOC management
8% Security engineering
Application security
Security architecture
8%
Risk management
Quality assurance
21% Compliance/audit
12%
Other
13%
Pie Chart 3 shows the percentage distribution of respondents’ companies across 14 industries.
Financial services represents the largest industry sector (at 18 percent of respondents), which
includes banking, insurance, brokerage, investment management and payment processing. Other
large verticals include public services, health and pharma, industrial and manufacturing, and
services.
2% 3%
2%2% 18%
Financial services
3% Public sector
6% Health & pharmaceuticals
Industrial & manufacturing
Services
7% Retail
11% Technology & software
Energy & utilities
8% Consumer goods
Communications
10% Entertainment & media
8% Hospitality
Transportation
10% 10% Other
11% 8%
More than 75,000 employees
There are inherent limitations to survey research that need to be carefully considered before
drawing inferences from findings. The following items are specific limitations that are germane to
most Web-based surveys.
< Non-response bias: The current findings are based on a sample of survey returns. We sent
surveys to a representative sample of individuals, resulting in a large number of usable
returned responses. Despite non-response tests, it is always possible that individuals who did
not participate are substantially different in terms of underlying beliefs from those who
completed the instrument.
< Sampling-frame bias: The accuracy is based on contact information and the degree to which
the list is representative of individuals who are knowledgeable about their organizations’
cybersecurity technologies and processes. Because we used a Web-based collection
method, it is possible that non-Web responses by mailed survey or telephone call would
result in a different pattern of findings.
< Self-reported results: The quality of survey research is based on the integrity of confidential
responses received from subjects. While certain checks and balances can be incorporated
into the survey process, the possibility remains that a subject did not provide accurate
responses.
The following tables provide the frequency or percentage frequency of responses to all survey
questions contained in this study. All survey responses were captured between December 11,
2019 to December 23, 2019.
Part 2. Background
Q1a. How effective is your organization’s ability to prevent a
cyberattack on a scale of 1 = not effective to 10 = highly effective? Pct%
1 or 2 8%
3 or 4 19%
5 or 6 27%
7 or 8 26%
9 or 10 20%
Total 100%
Extrapolated value 6.12
Q8. What are the top security threats affecting your organization?
Please select your top three choices. Pct%
Phishing attacks 47%
System failures 15%
Active adversaries 25%
Web-based attacks 26%
Ransomware 32%
Fileless attacks 22%
DNS-based attacks 40%
Denial of service attacks 34%
Electronic agents (viruses, bots and more) 35%
Nation-state, terrorist or criminal syndicate sponsored attacks 21%
Other (please specify) 3%
Total 300%
Q19. The following table lists the five phases of the cybersecurity life
cycle. Please allocate all 100 points to describe how your organization
currently spends budgeted resources for the five phases. Points
Prevention 21
Detection 26
Containment 29
Recovery 14
Remediation 10
Total (sum to 100 points) 100
Q23b. If yes, what type of mobile device is allowed? Please select only
one. Pct%
Personal mobile device (e.g. BYOD) 44%
Corporate office sanctioned device 35%
A combination of both 21%
Total 100%
Q25b. If yes, how does your organization secure mobile devices used
by employees in the workplace? Please select all that apply. Pct%
Active sync only 37%
Encryption of stored or transmitted data 41%
Mobile hypervisors 25%
Secure containers 32%
Mobile device management 37%
Enterprise mobility management platform 40%
Other (please specify) 2%
Total 214%
Q29. What is the average Mean Time to Contain (MTTC) a cyberattack Pct%
Less than 1 week 2%
1 to 2 weeks 6%
3 to 4 weeks 8%
5 to 6 weeks 12%
7 to 8 weeks 20%
9 to 10 weeks 27%
More than 10 weeks 25%
Total 100%
Extrapolated value (weeks) 8.11
Q32a. Did your organization have a phishing attack in the past year? Pct%
Yes 79%
No (Skip to 33a) 21%
Total 100%
Q32b. If yes, in what stage of the cybersecurity lifecycle were you able
to deal with the attack? Pct%
Prevention 18%
Detection 20%
Containment 30%
Recovery 20%
Remediation 12%
Total 100%
Q33a. Did your organization have a zero-day attack in the past year? Pct%
Yes 52%
No (skip to Q34a) 48%
Total 100%
Q33b. If yes, in what stage of the cybersecurity lifecycle were you able
to deal with the zero-day attack? Pct%
Prevention 12%
Detection 15%
Containment 42%
Recovery 21%
Remediation 10%
Total 100%
Q34b. If yes, in what stage of the cybersecurity lifecycle were you able
to deal with the spyware attack? Pct%
Prevention 26%
Detection 29%
Containment 20%
Recovery 13%
Remediation 12%
Total 100%
Q36b. If yes, in what stage of the cybersecurity lifecycle were you able
to deal with the nation-state attack? Pct%
Prevention 9%
Detection 19%
Containment 29%
Recovery 23%
Remediation 20%
Total 100%
Q38a. How important is the Cyber Kill Chain framework for preventing a
zero-day attack? 1 = not important to 10 = very important. Pct%
1 or 2 5%
3 or 4 9%
5 or 6 18%
7 or 8 33%
9 or 10 35%
Total 100%
Extrapolated value 7.18
Part 6. Demographics
D1. What organizational level best describes your current position? Pct%
Senior Executive 3%
Vice President 5%
Director 17%
Manager 21%
Supervisor 15%
Technician 33%
Staff / Analyst 5%
Contractor 1%
Other 0%
Total 100%
D3. What industry best describes your organization’s industry focus? Pct%
Agriculture & food services 1%
Communications 3%
Consumer goods 6%
Defense & aerospace 1%
Energy & utilities 7%
Entertainment & media 2%
Financial services 18%
Health & pharmaceuticals 10%
Hospitality 2%
Industrial & manufacturing 10%
Public sector 11%
Retail 8%
Services 10%
Technology & software 8%
Transportation 2%
Other 1%
Total 100%
Ponemon Institute
Advancing Responsible Information Management
Ponemon Institute is dedicated to independent research and education that advances responsible
information and privacy management practices within business and government. Our mission is to conduct
high quality, empirical studies on critical issues affecting the management and security of sensitive
information about people and organizations.
We uphold strict data confidentiality, privacy and ethical research standards. We do not collect any
personally identifiable information from individuals (or company identifiable information in our business
research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous,
irrelevant or improper questions.