• Skip to main content
  • Skip to secondary menu
  • Skip to footer

Cybersecurity Market

Cybersecurity Technologies & Markets

  • Cybersecurity Events 2026-2027
  • Sponsored Post
  • Market Reports
  • About
    • GDPR
  • Contact

Cybersecurity resilience emerges as top priority as 62 percent of companies say security incidents impacted business operations

December 6, 2022 By admin Leave a Comment

Security resilience is a high priority for 96 percent of executives, and rightfully so, as 62 percent of respondents say their organization experienced a recent security incident

Executive support and cultivating a security culture were two of the top three success factors for achieving resilience

Adoption of zero trust, secure access service edge, and extended detection and response technologies resulted in significant increases in resilient outcomes

MELBOURNE, Australia, Dec. 7, 2022 – CISCO LIVE – Cybersecurity resilience is a top priority for companies as they look to defend against a rapidly evolving threat landscape, according to the latest edition of Cisco’s annual Security Outcomes Report launched today.

Titled, Security Outcomes Report, Volume 3: Achieving Security Resilience, the study identifies the top seven success factors that boost enterprise security resilience, with a particular focus on cultural, environmental, and solution-based factors that businesses leverage to achieve security. The findings are based on survey responses from over 4,700 participants across 26 countries.

Resilience has emerged as a top priority as a staggering 62 percent of organizations surveyed said they had experienced a security event that impacted business in the past two years. The leading types of incidents were network or data breaches (51.5 percent), network or system outages (51.1 percent), ransomware events (46.7 percent) and distributed denial of service attacks (46.4 percent).

These incidents resulted in severe repercussions for the companies that experienced them, along with the ecosystem of organizations they do business with. The leading impacts cited include IT and communications interruption (62.6 percent), supply chain disruption (43 percent), impaired internal operations (41.4 percent) and lasting brand damage (39.7 percent).

With stakes this high, it is no surprise that 96 percent of executives surveyed for the report said that security resilience is high priority for them. The findings further highlight that the main objectives of security resilience for security leaders and their teams are to prevent incidents, and mitigate losses when they occur.

“Technology is transforming businesses at a scale and speed never seen before. While this is creating new opportunities, it also brings with it challenges, especially on the security front. To be able to tackle these effectively, companies need the ability to anticipate, identify, and withstand cyber threats, and if breached be able to rapidly recover from one. That is what building resilience is all about,” said Helen Patton, CISO, Cisco Security Business Group.

“Security, after all, is a risk business. As companies don’t secure everything, everywhere, security resilience allows them to focus their security resources on the pieces of the business that add the most value to an organization, and ensure that value is protected,” she added.

Seven Success Factors of Security Resilience

This year’s report has developed a methodology to generate a security resilience score for the organizations surveyed, and identified seven data-backed success factors. Organizations that had these factors present were among the top 90th percentile of resilient businesses. Conversely, those lacking them placed in the bottom 10th percentile of performers.

The findings of the study underline the fact that security is a human endeavor as leadership, company culture and resourcing have an oversized impact on resilience:

Organizations that report poor security support from the C-suite scored 39 percent lower than those with strong executive support.
Businesses that report an excellent security culture scored 46 percent higher on average than those without.
Companies that maintain extra internal staffing and resources to respond to incidents resulted in a 15 percent boost in resilient outcomes.
In addition, businesses need to take care to reduce complexity when transitioning from on-premise to fully cloud-based environments:

Companies whose technology infrastructures are either mostly on-premise or mostly cloud-based had the highest, and nearly identical, security resilience scores. However, businesses that are in the initial stages of transitioning from an on-premise to a hybrid cloud environment saw scores drop between 8.5 and 14 percent depending on how difficult the hybrid environments were to manage.
Finally, adopting and maturing advanced security solutions has significant impacts to resilient outcomes:

Companies that reported implementing a mature Zero Trust model saw a 30 percent increase in resilience score compared to those that had none.
Advanced extended detection and response capabilities correlated to an incredible 45 percent increase for organizations over those that report having no detection and response solutions.
Converging networking and security into a mature, cloud-delivered secure access services edge boosted security resilience scores by 27 percent.
“The Security Outcomes Reports are a study into what works and what doesn’t in cybersecurity. The ultimate goal is to cut through the noise in the market by identifying practices that lead to more secure outcomes for defenders,” said Jeetu Patel, executive vice president and general manager of security and collaboration at Cisco. “This year we focused on identifying the key factors that elevate the security resilience of a business to among the very best in the industry.”

Additional Resources:

Report: Security Outcomes Report, Volume 3: Achieving Security Resilience
Blog: Cracking the Code to Security Resilience: Lessons from the Latest Cisco Security Outcomes Report
About Cisco

Cisco (NASDAQ: CSCO) is the worldwide leader in technology that powers the Internet. Cisco inspires new possibilities by reimagining your applications, securing your data, transforming your infrastructure, and empowering your teams for a global and inclusive future. Discover more on The Newsroom and follow us on Twitter at @Cisco.

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. A listing of Cisco’s trademarks can be found at www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company.

SOURCE Cisco Systems, Inc.

Filed Under: News

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

Recent Posts

  • The Security Blind Spot Inside the Arduino-Powered IoT Boom
  • Altum Strategy Group: Cybersecurity in 2026 Is No Longer a Technology Problem
  • Trent AI and the Security Layer the Agentic Stack Has Been Missing
  • Gartner Security & Risk Management Summit, June 1–3, 2026, National Harbor, MD
  • Ashdod Port Has Blocked 134,000 Cyberattacks—and Kept Israel’s Trade Moving
  • Black Hat Asia 2026, April 23–24, Singapore
  • World Backup Day 2026: Why Recovery Has Become the Real Test of Cyber Resilience
  • Cyberhaven Launches Agentic AI Security as Shadow Agents Move Onto the Enterprise Endpoint
  • Palo Alto Networks Rewrites Security for the Agentic AI Era
  • RSAC Conference 2026, March 23–26, San Francisco

Media Partners

  • Defense Market
  • Technologies.org
  • Technology Conferences
ATARS Meets the M-346: Why Leonardo and Red 6 May Be Rewriting the Logic of Fighter Training
Dark Eagle: The U.S. Army’s Long-Range Hypersonic Weapon, Brief Overview
The Army Just Launched a Solicitation for a Heavier ISV — Here’s What We Know
The ISV’s $308 Million Budget Request — and Why Congress Is Pushing Back
From Prototype to Full-Rate Production: The ISV’s Development Timeline
ISV Specs and Deployment: How the Army Gets This Vehicle Into a Fight
Meet the ISV: The Army’s Lightweight Vehicle Built for Speed Over Armor
Affordable Mass: DARPA’s Push for Cheap Missiles Signals a Doctrinal Reset in Modern Warfare
Cheap Wins Wars: America’s Late Turn Toward Cost-Asymmetric Weapons
From Scrap to Supremacy: 6K Additive’s $1.95M Bet on Rebuilding the U.S. Defense Material Base
How to Actually Use a Raspberry Pi Without Overthinking It
Chapter’s $100 Million Bet on AI for Retirement
Galaxy A57 5G vs A37 5G Review: Samsung Pushes “Everyday AI” Further Down the Stack
Samsung Galaxy A37 5G Review: The Sensible Choice
Samsung Galaxy A57 5G Review: The Mid-Range Bar Gets Higher
AfterQuery Raises $30M at $300M Valuation as the AI Race Collides with Its Real Constraint
Xoople Raises $130M to Build the “System of Record” for the Physical World
AI Looms and the Return of American Apparel Manufacturing
Manna’s Second Act: From Drone Novelty to Logistics Infrastructure
Britain Advances SMR Deployment with £300M Owner’s Engineer Contract
Accelerate 2026, May 21–22, 2026, Salt Palace Convention Center
JSNation 2026, June 11 & June 15, Amsterdam and Remote
ICMC 2026, July 30–31, Long Beach
Elevate 2026, April 22–24, 2026, Atlanta
WWDC 2026, June 8–12, Cupertino & Online
Zip Forward Europe 2026, April 16, 2026, London
AI Summit: Operationalizing Intelligence and Driving Innovation, April 16, 2026, Woburn, Massachusetts
GTC 2026, March 16–19, San Jose
Taiwan’s AI Ecosystem Steps Into the Spotlight at NVIDIA GTC, March 16–19, 2026
COMPUTEX 2026, June 2–5, Taipei

Media Partners

  • Market Analysis
  • Market Research Media
  • Analysis.org
The End of Manual Audits: Why AI-Native Accounting Is Not Optional Anymore
Raspberry Pi’s Earnings Beat Signals a Shift From Hobbyist Hardware to Embedded Infrastructure
Betting the Backbone: A Multi-Year Positioning on AMD, Broadcom, and Nvidia
Nvidia’s Groq 3 LPX: The $20B Bet That Could Define the Inference Era
Why Arm’s New AI Chip Changes the Rules of the Game
A Map Without Hormuz: Rewiring Global Oil Flows Through Fragmented Corridors
RoboForce’s $52 Million Raise Signals That Physical AI Is Moving From Demo Stage to Industrial Scale
The Hormuz Crisis: Winners and Losers in the Global Energy Shock
Zohran Mamdani’s Politics of Confiscation
Beyond Shipyards: Stephen Carmel’s Maritime Warning and the Hard Reality of Rebuilding an Oceanic System
Canva Acquires Simtheory and Ortto to Build End-to-End Work Platform
Netflix Price Hikes, The Economics of Dominance in a Saturated Streaming Market
America’s Brands Keep Winning Even as America Itself Slips
Kioxia’s Storage Gambit: Flash Steps Into the AI Memory Hierarchy
Mamdani Strangling New York
The Rise of Faceless Creators: Picsart Launches Persona and Storyline for AI Character-Driven Content
Apple TV Arrives on The Roku Channel, Expanding the Streaming Platform Wars
Why Attraction-Grabbing Stations Win at Tech Events
Why Nvidia Let Go of Arm, and Why It Matters Now
When the Market Wants a Story, Not Numbers: Rethinking AMD’s Q4 Selloff
Why ServiceNow, Salesforce, and Atlassian Fell on the Anthropic Mythos Announcement
Broadcom’s Quiet Power Play: Strong AI Tailwinds, Yet a Stock Caught Between Cycles
Nvidia’s AI Dominance Is Real—So Why Doesn’t the Stock Feel Untouchable?
The Cost of Winning AI: Why Microsoft’s Stock Is Stuck Between Growth and Doubt
Memory Market Reality Check: Micron’s Drop Ripples Across the Sector
The Rise of China’s Hottest New Commodity: AI Tokens
The $1.6 Trillion Infrastructure Rebound That’s Quietly Rewiring Power, Data, and Control
The Day Geopolitics Repriced Everything
FedEx Signals a Logistics Cycle Turn — Growth Returns, but the Real Story Is Structural Reinvention
Iran’s Strategy in the Strait of Hormuz

Copyright © 2022 CybersecurityMarket.com

Technologies, Market Analysis & Market Research, Photography