Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Enterprises Struggle to Identify Sources of Risk

Security remains top priority, but businesses wrestle with business case, BT study says

Enterprises are putting a good deal of emphasis on risk management these days, but they don't all agree on how to measure risk, according to a new industry study.

The annual security study, which will be published Friday by service provider BT, offers a look at enterprise security priorities and perceived threats. The upshot: Although managing risk has become an important thread in IT security, making a business case for security technology is still a challenge.

In the survey, 83 percent of enterprises placed "improving security" among their top priorities for the next 12 months. Twenty-two percent said it is their first priority. More than a third of respondents plan to implement risk management tools across all of their business units in the next 12 months; another 26 percent will implement such tools with some business units.

But identifying the source of the risk -- and making a business case for investing in the technology required to reduce it -- remain elusive targets for many enterprises, the study says.

For one thing, the fear of internal attacks seems to have diminished over the past two years. In 2006, about 40 percent of respondents said internal attacks were their top concern; that figure has dropped to 33 percent. In 2006, some 37 percent of executives felt that internal attacks were the most potentially damaging or costly; that figure has dropped to 35 percent.

"It seems that the pendulum, which had swung toward internal concerns, is now swinging the other way," says Dustin Owens, one of the leaders of the security research project.

At the same time, however, executives who responded to the survey indicated that end users remain the weakest link in the security chain. Thirty percent of respondents indicated that "inadequately trained/unconcerned users" are their biggest concern when evaluating potential security breaches.

"Given all the attention that's been paid to user awareness in the past few years, it's sort of surprising that the user issue continues to be such a big part of the problem," says Rick Blum, director of strategic marketing at BT. "It's proof that security awareness training can only get you so far."

And despite heavy emphasis on security issues, many organizations still don't review their environments for potential vulnerabilities as often as they should, according to the study. Only about 48 percent of enterprises said they evaluate their security postures as often as four times a year.

Part of the problem is that security pros need to do a better job of making a business case, the study says. "This will require quantifying the potential cost of data loss as well as downtime caused by a virus or other attack," the report states. "These costs should take into account financial damages (outright theft), recovery costs (notification of affected parties, etc.), and loss of reputation (leading to loss of business)."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • BT Global Services

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    When It Comes To Security Tools, More Isn't More
    Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
    US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
    Seth Rosenblatt, Contributing Writer,  1/11/2021
    IoT Vendor Ubiquiti Suffers Data Breach
    Dark Reading Staff 1/11/2021
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    2020: The Year in Security
    Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
    Flash Poll
    Assessing Cybersecurity Risk in Today's Enterprises
    Assessing Cybersecurity Risk in Today's Enterprises
    COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2021-25173
    PUBLISHED: 2021-01-18
    An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which allows attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart).
    CVE-2021-25174
    PUBLISHED: 2021-01-18
    An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart).
    CVE-2021-25175
    PUBLISHED: 2021-01-18
    An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A NULL pointer dereference exists when rendering malformed .DXF and .DWG files. This can allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart). This is issue 1 of 3.
    CVE-2021-25176
    PUBLISHED: 2021-01-18
    An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A NULL pointer dereference exists when rendering malformed .DXF and .DWG files. This can allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart). This is issue 2 of 3.
    CVE-2021-25177
    PUBLISHED: 2021-01-18
    An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A NULL pointer dereference exists when rendering malformed .DXF and .DWG files. This can allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart). This is issue 3 of 3.