theDocumentId => 1140009 Ponemon Survey: Majority Of Organizations Committed ...

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

6/25/2013
02:56 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Ponemon Survey: Majority Of Organizations Committed To Risk-Based Security Management

Protection of intellectual property a key business objectives for 88 percent of respondents

PORTLAND, OREGON -- June 25, 2013 -- Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced the first installment of an extensive survey on the state of risk-based security management with the Ponemon Institute©. The survey covers risk-based security management program governance and maturity and includes 749 U.S. and 571 U.K. respondents from the following areas: IT security, IT operations, IT risk management, business operations, compliance/internal audit and enterprise risk management.

"The findings from this report strongly indicate that risk-based security management is still viewed as an IT or security task instead of a business task," noted Dr. Larry Ponemon, chairman and founder of the Ponemon Institute. "Unfortunately, the full value of a risk-based approach to security can only be realized when senior business leaders fully participate in the process."

Key findings from the survey include:

81% rated their organization's commitment to risk-based security management as 'significant' or 'very significant'

88% identified the protection of intellectual property and 78% identified the minimization of non-compliance as a key business objectives for risk-based security programs

60% say that risk-based security management helps align security programs with business objectives

However:

46% say their organization's approach or strategy for risk-based security management is non-existent or 'ad-hoc'

62% say that the business has little or no input involvement in providing risk-based analysis

47% don't have a risk-based security management program or most program activities have not been deployed

Only 29% have a security risk management strategy that is applied consistently across the enterprise

"There's a big gap between risk-based security program commitment and how organizations are actually operating," noted Elizabeth Ireland, vice president of product marketing for Tripwire. "This could be because many organizations haven't fully connected the importance of their cyber security program to their top-level business risks despite the rapid increase in cyber security threats."

The complete survey results will be released in five parts over the next two months and will cover the following topics:

Risk-based security management maturity and governance

The value of risk-based security metrics

Key metrics for risk-based security

Risk-based security controls and spending

Risk-based security collaboration, communication and culture

For more information about the survey please visit: http://www.tripwire.com/ponemon/2013/#maturity.

About the Ponemon Institute

The Ponemon Institute© is dedicated to advancing responsible information and privacy management practices in business and government. To achieve this objective, the Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in a variety of industries.

About Tripwire

Tripwire is a leading global provider of risk-based security and compliance management solutions, enabling enterprises, government agencies and service providers to effectively connect security to their business. Tripwire provides the broadest set of foundational security controls including security configuration management, vulnerability management, file integrity monitoring, log and event management. Tripwire solutions deliver unprecedented visibility, business context and security business intelligence allowing extended enterprises to protect sensitive data from breaches, vulnerabilities, and threats. Learn more at www.tripwire.com or follow us @TripwireInc on Twitter.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32686
PUBLISHED: 2021-07-23
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP before version 2.11.1, there are a couple of issues found in the SSL socket. First, a race condition between callback and ...
CVE-2021-32783
PUBLISHED: 2021-07-23
Contour is a Kubernetes ingress controller using Envoy proxy. In Contour before version 1.17.1 a specially crafted ExternalName type Service may be used to access Envoy's admin interface, which Contour normally prevents from access outside the Envoy container. This can be used to shut down Envoy rem...
CVE-2021-3169
PUBLISHED: 2021-07-23
An issue in Jumpserver 2.6.2 and below allows attackers to create a connection token through an API which does not have access control and use it to access sensitive assets.
CVE-2020-20741
PUBLISHED: 2021-07-23
Incorrect Access Control in Beckhoff Automation GmbH & Co. KG CX9020 with firmware version CX9020_CB3011_WEC7_HPS_v602_TC31_B4016.6 allows remote attackers to bypass authentication via the "CE Remote Display Tool" as it does not close the incoming connection on the Windows CE side if t...
CVE-2021-25808
PUBLISHED: 2021-07-23
A code injection vulnerability in backup/plugin.php of Bludit 3.13.1 allows attackers to execute arbitrary code via a crafted ZIP file.