www.loopsec.com.au
Open in
urlscan Pro
199.60.103.226
Public Scan
URL:
https://www.loopsec.com.au/blog-events/blog/5-reasons-why-cyber-security-projects-fail
Submission: On February 19 via manual from US — Scanned from AU
Submission: On February 19 via manual from US — Scanned from AU
Form analysis
3 forms found in the DOMPOST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/4108305/16ff6489-d62f-448d-8a70-f57b9239cf02
<form id="hsForm_16ff6489-d62f-448d-8a70-f57b9239cf02_5359" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/4108305/16ff6489-d62f-448d-8a70-f57b9239cf02"
class="hs-form-private hsForm_16ff6489-d62f-448d-8a70-f57b9239cf02 hs-form-16ff6489-d62f-448d-8a70-f57b9239cf02 hs-form-16ff6489-d62f-448d-8a70-f57b9239cf02_de9f70cc-83f4-4756-aaa7-3adc2ea1041f hs-form stacked hs-custom-form"
target="target_iframe_16ff6489-d62f-448d-8a70-f57b9239cf02_5359" data-instance-id="de9f70cc-83f4-4756-aaa7-3adc2ea1041f" data-form-id="16ff6489-d62f-448d-8a70-f57b9239cf02" data-portal-id="4108305" data-hs-cf-bound="true">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-16ff6489-d62f-448d-8a70-f57b9239cf02_5359" class="" placeholder="Enter your " for="email-16ff6489-d62f-448d-8a70-f57b9239cf02_5359"><span></span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-16ff6489-d62f-448d-8a70-f57b9239cf02_5359" name="email" required="" placeholder="Enter email*" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="BOOK OVERVIEW"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1676836664127","formDefinitionUpdatedAt":"1659956019989","lang":"en","embedType":"REGULAR","userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.5481.100 Safari/537.36","pageTitle":"5 Common Reasons Why Cyber Security Projects Fail | Loop Secure","pageUrl":"https://www.loopsec.com.au/blog-events/blog/5-reasons-why-cyber-security-projects-fail","pageId":"5731098882","isHubSpotCmsGeneratedPage":true,"canonicalUrl":"https://www.loopsec.com.au/blog-events/blog/5-reasons-why-cyber-security-projects-fail","contentType":"blog-post","hutk":"6f7f4ee5d4bdd36b42f1380628ae1fe0","__hsfp":1878800189,"__hssc":"237830431.1.1676836667253","__hstc":"237830431.6f7f4ee5d4bdd36b42f1380628ae1fe0.1676836667252.1676836667252.1676836667252.1","formTarget":"#hs_form_target_form_730395925","formInstanceId":"5359","pageName":"5 Common Reasons Why Cyber Security Projects Fail | Loop Secure","locale":"en","timestamp":1676836667271,"originalEmbedContext":{"portalId":"4108305","formId":"16ff6489-d62f-448d-8a70-f57b9239cf02","region":"na1","target":"#hs_form_target_form_730395925","isBuilder":false,"isTestPage":false,"formInstanceId":"5359","formsBaseUrl":"/_hcms/forms","css":"","redirectUrl":"https://www.loopsec.com.au/meetings/gsole/m-book-a-time-with-georgia","pageName":"5 Common Reasons Why Cyber Security Projects Fail | Loop Secure","pageId":"5731098882","contentType":"blog-post","formData":{"cssClass":"hs-form stacked hs-custom-form"},"isCMSModuleEmbed":true},"correlationId":"de9f70cc-83f4-4756-aaa7-3adc2ea1041f","renderedFieldsIds":["email"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.2715","sourceName":"forms-embed","sourceVersion":"1.2715","sourceVersionMajor":"1","sourceVersionMinor":"2715","_debug_allPageIds":{"embedContextPageId":"5731098882","analyticsPageId":"5731098882","pageContextPageId":"5731098882"},"_debug_embedLogLines":[{"clientTimestamp":1676836664298,"level":"INFO","message":"Retrieved customer callbacks used on embed context: [\"getExtraMetaDataBeforeSubmit\"]"},{"clientTimestamp":1676836664299,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"AU\""},{"clientTimestamp":1676836667266,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"6f7f4ee5d4bdd36b42f1380628ae1fe0\",\"canonicalUrl\":\"https://www.loopsec.com.au/blog-events/blog/5-reasons-why-cyber-security-projects-fail\",\"contentType\":\"blog-post\",\"pageId\":\"5731098882\"}"}]}"><iframe
name="target_iframe_16ff6489-d62f-448d-8a70-f57b9239cf02_5359" style="display: none;"></iframe>
</form>
/search
<form action="/search" data-hs-cf-bound="true">
<input type="text" class="hs-search-field__input" name="term" autocomplete="off" placeholder="Search">
<input type="hidden" name="type" value="SITE_PAGE">
<input type="hidden" name="type" value="LANDING_PAGE">
<input type="hidden" name="type" value="BLOG_POST">
<input type="hidden" name="type" value="LISTING_PAGE">
<button aria-label="Search"><span id="hs_cos_wrapper_module_16631365669532_" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_icon" style="" data-hs-cos-general-type="widget" data-hs-cos-type="icon"><svg version="1.0"
xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512" aria-hidden="true">
<g id="search1_layer">
<path
d="M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z">
</path>
</g>
</svg></span></button>
</form>
POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/4108305/311e028b-dd71-415b-8a82-babb9e13f207
<form id="hsForm_311e028b-dd71-415b-8a82-babb9e13f207_700" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/4108305/311e028b-dd71-415b-8a82-babb9e13f207"
class="hs-form-private hsForm_311e028b-dd71-415b-8a82-babb9e13f207 hs-form-311e028b-dd71-415b-8a82-babb9e13f207 hs-form-311e028b-dd71-415b-8a82-babb9e13f207_1cbb1bbe-7089-4532-9f64-b5abcb0dcd0b hs-form stacked hs-custom-form"
target="target_iframe_311e028b-dd71-415b-8a82-babb9e13f207_700" data-instance-id="1cbb1bbe-7089-4532-9f64-b5abcb0dcd0b" data-form-id="311e028b-dd71-415b-8a82-babb9e13f207" data-portal-id="4108305" data-hs-cf-bound="true">
<div>
<div class="hs-richtext hs-main-font-element">
<p>Receive the latest industry info and Loop news.</p>
</div>
<div class="hs_firstname hs-firstname hs-fieldtype-text field hs-form-field"><label id="label-firstname-311e028b-dd71-415b-8a82-babb9e13f207_700" class="" placeholder="Enter your Name"
for="firstname-311e028b-dd71-415b-8a82-babb9e13f207_700"><span>Name</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="firstname-311e028b-dd71-415b-8a82-babb9e13f207_700" name="firstname" required="" placeholder="Name" type="text" class="hs-input" inputmode="text" autocomplete="given-name" value=""></div>
</div>
</div>
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-311e028b-dd71-415b-8a82-babb9e13f207_700" class="" placeholder="Enter your " for="email-311e028b-dd71-415b-8a82-babb9e13f207_700"><span></span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-311e028b-dd71-415b-8a82-babb9e13f207_700" name="email" required="" placeholder="Email*" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="Submit"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1676836664135","formDefinitionUpdatedAt":"1515810153655","userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.5481.100 Safari/537.36","pageTitle":"5 Common Reasons Why Cyber Security Projects Fail | Loop Secure","pageUrl":"https://www.loopsec.com.au/blog-events/blog/5-reasons-why-cyber-security-projects-fail","pageId":"5731098882","isHubSpotCmsGeneratedPage":true,"canonicalUrl":"https://www.loopsec.com.au/blog-events/blog/5-reasons-why-cyber-security-projects-fail","contentType":"blog-post","hutk":"6f7f4ee5d4bdd36b42f1380628ae1fe0","__hsfp":1878800189,"__hssc":"237830431.1.1676836667253","__hstc":"237830431.6f7f4ee5d4bdd36b42f1380628ae1fe0.1676836667252.1676836667252.1676836667252.1","formTarget":"#hs_form_target_module_163341240822234","formInstanceId":"700","rawInlineMessage":"Thanks for submitting the form.","hsFormKey":"d133bbd94190784cf5eb36ca3ddc9974","pageName":"5 Common Reasons Why Cyber Security Projects Fail | Loop Secure","locale":"en","timestamp":1676836667276,"originalEmbedContext":{"portalId":"4108305","formId":"311e028b-dd71-415b-8a82-babb9e13f207","region":"na1","target":"#hs_form_target_module_163341240822234","isBuilder":false,"isTestPage":false,"formInstanceId":"700","formsBaseUrl":"/_hcms/forms","css":"","inlineMessage":"Thanks for submitting the form.","rawInlineMessage":"Thanks for submitting the form.","hsFormKey":"d133bbd94190784cf5eb36ca3ddc9974","pageName":"5 Common Reasons Why Cyber Security Projects Fail | Loop Secure","pageId":"5731098882","contentType":"blog-post","formData":{"cssClass":"hs-form stacked hs-custom-form"},"isCMSModuleEmbed":true},"correlationId":"1cbb1bbe-7089-4532-9f64-b5abcb0dcd0b","renderedFieldsIds":["firstname","email"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.2715","sourceName":"forms-embed","sourceVersion":"1.2715","sourceVersionMajor":"1","sourceVersionMinor":"2715","_debug_allPageIds":{"embedContextPageId":"5731098882","analyticsPageId":"5731098882","pageContextPageId":"5731098882"},"_debug_embedLogLines":[{"clientTimestamp":1676836664327,"level":"INFO","message":"Retrieved customer callbacks used on embed context: [\"getExtraMetaDataBeforeSubmit\"]"},{"clientTimestamp":1676836664328,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"AU\""},{"clientTimestamp":1676836667272,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"6f7f4ee5d4bdd36b42f1380628ae1fe0\",\"canonicalUrl\":\"https://www.loopsec.com.au/blog-events/blog/5-reasons-why-cyber-security-projects-fail\",\"contentType\":\"blog-post\",\"pageId\":\"5731098882\"}"}]}"><iframe
name="target_iframe_311e028b-dd71-415b-8a82-babb9e13f207_700" style="display: none;"></iframe>
</form>
Text Content
BECOME ISO27001 CERTIFIED IN A FIXED PERIOD OF TIME. FIND OUT MORE HERE. Call: 1300 884 218 EMERGENCY INCIDENT RESPONSE * My Requirements WHY HAVE INCIDENT RESPONSE IN PLACE? Read why it matters * Legislative & Compliance * SOCI ACT 2022 (Critical Infrastructure Bill) Understand how organisations under the bill will be affected * ISO27001 Fast track your certification * PCI DSS COMPLIANCE Protect your customer data * APRA, HIPAA, NIST Be in compliance with global standards * Industry * Healthcare Protect patient data * Solutions * Incident Response * Managed Detection and Response Proactive security monitoring and threat hunting * Digital Forensics and Incident Response Retainer Australian based 24/7 incident response team * Zero Trust Service Eliminate unauthorised access * Vulnerability Management Service Conduct regular scans to identify vulnerabilities * Governance, Risk & Compliance * ISO27001 Continual Compliance Fast track your certification * Continual Compliance Drive your security program forward * PCI DSS Compliance Protect your customer data * Security Awareness Training Improve your employees security posture * View All GRC Services Risk Assessments, Gap Assessments, view all * Offensive Security Services * Penetration Testing Test defences and eliminate gaps * Objective-Based Penetration Testing Apply Red-Team methodology * Continual Assurance Strategic and annual testing program * Red Teaming as a Service Simulate real-world attacks * View All OSS Services Social Engineering, Phishing, view all services * Hardware & Software For IT * Security Licensing and Maintenance Keep up to date with your security * Endpoint Detection and Scanning Scan, detect and secure endpoints * Identity & Access Management Validate users who access your environment * Governance Products Gain visibility of your security * View All Products View other security technologies * LoopTV UNPACKING A SUCCESSFUL SECURITY AWARENESS PROGRAM Watch Now * Watch Now * SOC Response to Company Takeover Be aware of risks within your environment * Ransomware: Prevent Now or Pay The Price Future of Ransomware: Preparing your organisation * Common Mistakes Organisations Take Avoiding common missteps for incident response * * Achieving ISO27001 Certification How to gain ISO27001 Certification * SOCI Act 2022 Understand how the bill will test your current cybersecurity strategy * Unpacking A successful Security Awareness program Unpack how to implement a successful security awareness program * Blog * * Blog Releasing the latest security information in Australia * Infinite Security Get technical with our consultants * Redteam.net Powered by Loop Secure * Resources * * LoopTV Watch our sessions on demand * Guides Get the most out of our services * Whitepapers Get the right solution to improve your security * About us * * About Loop Get to know your security partner of choice * Join Us Work with one of Australia’s most innovative and dynamic organisation * Partners Meet our partners * Privacy Policy Read our privacy policy * Contact us exit search * * Product Overview Reveal reality to propel revenue growth AddThis Sharing Buttons Share to TwitterTwitterTwitterShare to FacebookFacebookFacebookShare to EmailEmailEmailShare to LinkedInLinkedInLinkedInShare to MessengerMessengerMessengerShare to SlackSlackSlack 5 COMMON REASONS WHY CYBER SECURITY PROJECTS FAIL | LOOP SECURE David Morrison Apr 26, 2018 7:16:01 AM IT business leaders in Australia are responsible for ensuring success across a wide project and BAU landscape. Globally, cyber security projects are on the rise with businesses scrambling to secure their technical environments from a growing number of cyber threats. There are a number of common mistakes that can cause cyber security projects to fail. The team at Loop Secure have documented some common reasons for cyber security project failure and how to remediate these: 1. Lack of Executive Buy-in and Awareness A common mistake when initially preparing a security project or program is failing to raise the idea internally and communicate expectations. Security professionals will not be successful if they operate in a bubble. If the security program is not aligned to business objectives and expectations are not clearly set, it can be troublesome to achieve the desired budget, resources and timeframes. In order to obtain executive buy-in and company adoption, technical business leaders and security staff need to work with both the business and technical teams to understand business critical goals and communicate how their security initiatives both fit within and support them. 2. Project Organisation and Resource Planning After the business has agreed to the security program, the next common area of failure is in the organisation and resource planning stage. In a busy project environment, resources across the business are pulled in multiple directions. It is critical for technical business leaders and information security leaders to communicate their vision to the project team, ensure resources are allocated across sprints or backlogs and watch that project scope is managed tightly by project managers. As a technical business leader or security specialist, you will need to review the key deliverables and project milestones to ensure scope is controlled and the project does not blow out. 3. Tight Cyber Security Project Budgets Security projects will frequently compete with other IT projects that are designed to increase revenue or performance. Therefore, it is always challenging to secure the right amount of budget for a service that protects the business and may not be seen as a direct contributor to increased revenue or performance. Without proper financial support, security projects frequently fall just short of implementation. Often they are put on hold until more funding can be found from other capex budgets. To gain the right budget, the team at Loop recommend calculating your security project Return on Investment and present these findings to the Leadership Team during funding rounds. To calculate your ROI, we have developed a whitepaper to help you manage your budgets and ROI. 4. Lack of Skilled Human Capital With a growing landscape of digital, application, infrastructure and enterprise wide cyber threats emerging, there is a shortage of skilled cyber security staff to execute technical components of projects. Frequently, an internal security team or team member may lack the knowledge or are untrained in the scope of the project, or the technology being implemented. Knowledge gaps need to be addressed prior to project commencement to assess whether external support, training and experience needs to be brought in. If your project has reached this point, you may need to assess a large list of external vendors who may be able to help with specific governance, implementation or risk management tasks. We recommend reading our “Choosing the Right Cyber Security Vendor” whitepaper. 5. Overlapping or Inadequate Cyber Security Technology With thousands of different cyber security technologies in the market, it is difficult to choose which technology best suits your needs, what fits into your current environment and what is going to fix your business security problem. Another facet is that many technologies overlap with features, and frequently cyber security project budgets blow out when many expensive technologies can be accommodated by one platform only. A thorough analysis of technologies and solutions needs to be conducted before choosing the right technology. Some example questions to ask your vendor include; * How do you implement the technology? * What sort of support do you offer? * Do you have case studies or reference clients? * Do you offer certifications, onboarding and training? * How does your product differentiate from competitors? * Which operating systems and platforms does it run on? * Does your product run on physical or virtual systems? * Does it run on premise or in the cloud? If in the cloud, what security certification does your platform have? * What SLA agreements do you have for troubleshooting support? Remembering that many cyber security projects fail due to lack of planning and training, asking these important questions of your vendor prior to purchase can help with future problems. For an in-depth guide on how to choose the right vendor, download our whitepaper. To learn how to manage, prioritise and calculate the ROI on your cyber security budget and projects, download our whitepaper here Return on Investment, Cyber Security Budgets, cyber security vendors READ ON KEY SECURITY CONCERNS EXPERIENCED BY ORGANISATIONS | LOOP SECURE INTEL SECURITY/ LOOP NEXT GEN SECURITY MELBOURNE EVENT Loop partnered with Intel Security to offer our customers a delicious high class breakfast at the... CYBER SECURITY BUDGETS SET TO RISE IN AUSTRALIA IN 2021 | LOOP SECURE Globally, cyber security budgets are predicted to rise and are estimated to be more than $6... EMERGENCY INCIDENT RESPONSE CALL US: 1300 884 218 * ABOUT LOOP * ABOUT US * JOIN US * PARTNERS * PRIVACY STATEMENT * SERVICES * MANAGED DETECTION AND RESPONSE * ISO27001 CONTINUAL COMPLIANCE * PENETRATION TESTING * OTHER SERVICES * CONTACT US * 1300 884 218 FOLLOW US Want to hear the latest cybersecurity news and trends in the industry? LoopTV is your exclusive go to media in all things cybersecurity. Subscribe today! SUBSCRIBE STAY UP TO DATE Receive the latest industry info and Loop news. Name* * ABOUT LOOP * ABOUT US * JOIN US * PARTNERS * PRIVACY STATEMENT * SERVICES * MANAGED DETECTION AND RESPONSE * ISO27001 CONTINUAL COMPLIANCE * PENETRATION TESTING * OTHER SERVICES * CONTACT US * 1300 884 218 © 2022 All rights reserved. Sitemap.