Risk-Based Security Management Still Has a Ways to Go - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Risk-Based Security Management Still Has a Ways to Go-4 Next

Most organizations implement the appropriate preventative controls, but neglect to implement sufficient detective controls.

According to survey results, allocated spending is not aligned to perceived risk. In the U.K. organizations are making excellent progress with preventive controls, yet they are lacking when it comes to implementing detective controls resulting in an inability to identify, implement and continuously monitor controls.

In the U.S., between 80 to 90 percent of organizations have partially or fully deployed preventative controls, but only about 50 percent have deployed the majority of detective controls. For best results organizations need to ensure the appropriate balance of preventive and detective controls.

Tripwire, a leading global provider of IT security solutions, and the Ponemon Institute recently announced the results of “The State of Risk-Based Security Management (RBSM) Study.” This international study included data from 2,145 individuals from organizations of different sizes and types in the United States, United Kingdom, Germany and the Netherlands.

This study evaluates how organizations view their risk-based security management (RBSM) and how they address their RBSM through formal programs, deployment of specific controls and how they measure program effectiveness.

The report details the current state of risk management and perceptions about the benefits to organizations as well as provides guidance on how to strengthen an organization’s security practices and add value to the business through a risk-based approach. The report also provides recommendations for mitigating risks, protecting data and detecting cyber attacks and data breaches accurately and efficiently.


Related Topics : Network Security, Unified Threat Management

More Slideshows

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Security118-190x128 5 Essential Incident Response Checklists

When a security breach occurs, IT teams that are armed with incident response checklists will be better prepared to execute a fast and effective response. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.