Data Security Heads List of C-level Executives' Concerns - Slide 11

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16
Next Measure that Should Be Used to Evaluate the Effectiveness of Data Protection Initiatives-11 Next

Measure that Should Be Used to Evaluate the Effectiveness of Data Protection Initiatives

Asset performance and protection are metrics used to measure security ROI most.

A new study from the United Kingdom that was conducted by the Ponemon Institute on behalf of IBM is illustrative of a worldwide challenge when it comes to enforcing IT security. The study of 115 C-level executives finds that while CEOs are increasingly placing more importance on data security, there is a significant gap between their perception of how good their organizations are at securing information and the perceptions of the rest of the executive management team.

The core issue, says Dr. Larry Ponemon, is that CEOs are still pretty divorced from the processes associated with managing security, which tends to give them a slightly distorted view of their company’s capabilities and what it takes to secure the organization.

The good news is that everybody seems to agree that spending money on security is a valuable and necessary endeavor, but not everybody seems to be on the same page concerning what the proper amount should be.
 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.