Data Security Heads List of C-level Executives' Concerns - Slide 13

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16
Next Enterprise Data Protection Earmarked for Enabling Technology-13 Next

Enterprise Data Protection Earmarked for Enabling Technology

Most of the security budget goes to paying for existing solutions that deal with known threats.

A new study from the United Kingdom that was conducted by the Ponemon Institute on behalf of IBM is illustrative of a worldwide challenge when it comes to enforcing IT security. The study of 115 C-level executives finds that while CEOs are increasingly placing more importance on data security, there is a significant gap between their perception of how good their organizations are at securing information and the perceptions of the rest of the executive management team.

The core issue, says Dr. Larry Ponemon, is that CEOs are still pretty divorced from the processes associated with managing security, which tends to give them a slightly distorted view of their company’s capabilities and what it takes to secure the organization.

The good news is that everybody seems to agree that spending money on security is a valuable and necessary endeavor, but not everybody seems to be on the same page concerning what the proper amount should be.

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.