According to ThreatQuotient’s latest industry research named “The 2022 State of IT Security Automation Adoption”, there are strong signs that cybersecurity automation adoption is advancing. However, an impressive 97% of all respondents share they have experienced problems during implementation. The reasons vary, the most common problems being technology issues, lack of budget, skills shortage and gaining management understanding.

However, where last year (and I realize that we only did this in the UK) the main problem was a lack of trust in outcomes for 41% of respondents, now only 17% collectively say this is an issue. This indicates that organizations have become more confident in automation itself, despite struggling with the more practical aspects of its implementation and ongoing maintenance. 

This also correlates with last year’s figures showing that while 37% had already automated key cybersecurity processes, 45% were planning to do so. Now that far more organizations have implemented automation it is likely that challenges have moved from theoretical trust-based concerns to practical issues like the complexity of the technology and staffing people with the skills to address it.

Worker well-being forms part of ROI for automation 

As the skills shortage and employee churn continue to bite, our research shows that businesses are now seeking ROI of cybersecurity automation in terms of both hard metrics and soft metrics around employee well-being.

A recent SANS CTI survey found that assessing ROI was one of the chief challenges when building the case for automation. We asked our survey cohort of 750 senior cybersecurity professionals what primary methods they used to monitor ROI.

42% of respondents said they analyze how well they are managing resources such as staff, efficiency, and budget, while 39% said they look at how well they are managing the team in terms of employee satisfaction and retention. Interestingly, hard metrics on how well the job is actually being done, in terms of mean time to detection and mean time to resolution, were only the third most important factor (chosen by 37%).

Using automation to do the heavy lifting and cut through the noise is vital to helping cybersecurity teams thrive under pressure. Retaining employees by making their work more rewarding avoids excessive recruitment costs and the issues that arise when corporate knowledge walks out of the door with dissatisfied or distressed employees.

Key drivers for cybersecurity automation 

As we continue through uncertain economic waters, the three main reasons for organizations to adopt more cybersecurity automation are to improve efficiency (29%); to protect themselves against ever-growing cyberattacks (29%) and to comply with escalating compliance and regulation requirements (29%).  That said, automation is also seen as an important tool for addressing the skills shortage and making teams more efficient. These issues will become increasingly important in an uncertain business environment, meaning automation providers must make sure their products deliver genuine benefits. The advantages of utilizing tools such as no-code and solutions that simplify the complexity introduced by traditional automation tools while allowing teams to focus on higher-value cybersecurity activities will be important messages to communicate to customers. 

 Other key findings in ThreatQuotient’s research include:

  • Cybersecurity automation budgets are increasing for 98% of businesses
  • 68% say cybersecurity automation is important
  • The top cybersecurity processes/use cases automated by organizations overall are threat intelligence management and incident response with 27% of each.


If this information is helpful to you read our blog for more interesting and useful content, tips, and guidelines on similar topics. Contact the team of COMPUTER 2000 Bulgaria now if you have a specific question. Our specialists will be assisting you with your query. 

Content curated by the team of COMPUTER 2000 on the basis of marketing materials provided by our partners/vendors.

Follow us to learn more


Let’s walk through the journey of digital transformation together.

By clicking on the SEND button you agree to the processing of personal data. In accordance with our Privacy Policy

4 + 8 =