Data Access Governance Still Has a Long Way to Go - Slide 20

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20
The State of Access Governance-20

The State of Access Governance

Next

Cloud computing will present some real challenges.

Next
VizardData governance is one of those things that everybody wants to complain about, but nobody wants to actually be in charge of. And yet, more often than not, when there is a security breach, it’s directly related to the lack of a coherent data governance policy.

A new survey from The Ponemon Institute that was funded by Aveksa, a provider of data governance tools, clearly highlights this issue in a survey of 728 IT executives that finds that a huge percentage of employees have access to information they don’t need for their roles in the company, thus introducing unnecessary risks in terms of how that data can either be accidentally or purposely compromised. (Be sure to check out our Mike Vizard's deeper look at the survey.)

In general, the survey also finds that the majority of IT organizations are understaffed in the number of people they have on hand to manage data governance, while the number of sensitive documents and the requests to access that information appear to be increasing exponentially.

The good news is that progress is being made in some quarters concerning the adoption of more sophisticated tools for managing data governance, but Larry Ponemon, chairman of the The Ponemon Institute, warns that without a holistic approach to data governance that encompasses both the business side and the IT department, it’s only a matter of time before most companies experience a major security breach.
 

Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

 
More Slideshows

gig economy How the Gig Economy Is Changing the Tech Industry

The gig economy is clearly disrupting the tech industry, both in positive and negative ways. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.