-

93% of Security Leaders Do Not Report to the CEO, According to New Research From LogRhythm

Global Research Finds IT Security Leaders Should Be Held Accountable for the Consequences of Cyberattacks, Yet Lack the Influence Required to Shore Up Security Strategies

BOULDER, Colo.--(BUSINESS WIRE)--LogRhythm, the company powering today’s security operations centers (SOCs), announced the release of its report, “Security and the C-Suite: Making Security Priorities Business Priorities,” based on research conducted by the Ponemon Institute. The research found that, while most organizations have experienced a cyberattack in the last two years (60%) and spend approximately $38 million on security activities, only 7% of security leaders are reporting to the CEO. Yet, 42% of respondents say the IT security leader should be the person most accountable for preventing or mitigating the consequences of a cyberattack.

Ponemon conducted a global survey of 1,426 chief information, technology and security executives. LogRhythm sought to learn about the role and responsibilities of today’s cybersecurity leaders and the challenges they face in creating a strong security posture. Respondents were located in the United States, EMEA and Asia-Pacific.

Security Leaders Shoulder More Responsibility and Risk

Cybersecurity leaders shared they have assumed more accountability and risk, but struggle to achieve the desired security posture, because they are not seen as influential or valued members of their peer group. Sixty percent of respondents say the cybersecurity leader should report directly to the CEO because it would create greater awareness of security issues throughout the organization. However, because the majority of security leaders are three steps away from the CEO, only 37% of respondents say their organization values and effectively leverages the expertise of the cybersecurity leader.

“While security leaders are assuming more responsibility than ever before, they lack the necessary organizational visibility and influence to effectively build and mature their security programs,” said James Carder, chief security officer of LogRhythm. “Comprehensive cybersecurity programs are integral to the success of an organization. This research should spur CEOs to take accountability for safeguarding their organization’s sensitive information, prioritize the security program by elevating the security leader and ensure inroads between security decision-makers, the C-suite and the board.”

New Security Pitfalls Stem from the COVID-19 Pandemic

The significant increase in employees working remotely due to COVID-19 has created the biggest security challenge for IT security leaders, according to the research. These challenges are here to stay as enterprises adopt a hybrid work strategy to accommodate a distributed workforce, creating increased risk to sensitive and confidential information. Below are noteworthy findings about survey respondents’ newfound security issues resulting from remote work practices.

  • 73% of respondents say less secure home networks are used by employees in their organization.
  • 68% of respondents say employees and contractors believe the organization is not monitoring their activities.
  • 67% say a family member uses a work device.

Amid these challenges, 54% of respondents are worried about their job security, with 63% citing insufficient budget to invest in the right technologies as a main culprit. Further, more than half (53%) of respondents claim senior leadership does not understand their role, and another 51% of respondents believe that they lack executive support.

Download the full report, Security and the C-Suite: Making Security Priorities Business Priorities, here.

About LogRhythm

LogRhythm’s award-winning NextGen SIEM Platform makes the world safer by protecting organizations, employees, and customers from the latest cyberthreats. It does this by providing a comprehensive platform with the latest security functionality, including security analytics; network detection and response (NDR); user and entity behavior analytics (UEBA); and security orchestration, automation, and response (SOAR). Learn how LogRhythm empowers companies to be security first at logrhythm.com.

Contacts

Mariah Simank
LogRhythm/10Fold
logrhythm@10fold.com
512-971-3702

LogRhythm


Release Versions

Contacts

Mariah Simank
LogRhythm/10Fold
logrhythm@10fold.com
512-971-3702

More News From LogRhythm

Exabeam Extends Agent Behavior Analytics to the Google Cloud Agent Ecosystem

BROOMFIELD, Colo.--(BUSINESS WIRE)--Exabeam, the leader in behavior intelligence for the agentic enterprise, today announced new Exabeam Agent Behavior Analytics (ABA) capabilities for agents built with Google Cloud’s Agent Development Kit (ADK) and an integration framework with Google Agent Gateway, establishing Exabeam at the forefront of securing enterprises as they adopt agentic workflows. This update extends Exabeam ABA across the Google agent ecosystem, including Gemini Enterprise, custom...

Exabeam Wins 2026 Google Cloud Partner of the Year Award for Security: Analytics & Operations

BROOMFIELD, Colo.--(BUSINESS WIRE)--Exabeam, the leader in behavior intelligence for the agentic enterprise, today announced that it has received the 2026 Google Cloud Partner of the Year Award for Security: Analytics & Operations. Exabeam is being recognized for its achievements in the Google Cloud ecosystem, helping joint customers accelerate security operations with behavior intelligence, AI-powered analytics, and agent-driven workflows that improve detection, investigation, and response...

Exabeam Confronts AI Insider Threats Extending Behavior Detection and Response to OpenAI ChatGPT and Microsoft Copilot

BROOMFIELD, Colo.--(BUSINESS WIRE)--Exabeam, the leader in behavior intelligence for the agentic enterprise, today announced a major expansion of Exabeam Agent Behavior Analytics (ABA). Without direct visibility into how employees are using AI assistants — what they query, what data they share, how frequently they interact, and from where — organizations cannot baseline normal AI behavior, investigate possible misuse, or detect emerging agentic insider threats. New support to detect agent behav...
Back to Newsroom