SHARE
Facebook X Pinterest WhatsApp

Is Your Company a Security Leader or Laggard?

Mar 11, 2015

Is Your Company a Security Leader or Laggard?

Governance MattersGovernance Matters

About 56% of cyber-security leaders surveyed have a sanctioned strategy in place and outsource core security operations. By contrast, 68% of laggards only use one or neither approach.

Metrics CountMetrics Count

Leaders are 18% more likely to have CISOs deploy metrics for evaluating security operations than laggards. They also are 23% more likely to deploy enterprise risk management procedures.

Focus on ComplianceFocus on Compliance

Laggards are 50% more likely to have CISOs and security efforts focus on compliance with regulation and policies.

Alignment Is CriticalAlignment Is Critical

The study found that half of the leaders make information security a priority and align security and business objectives, while nearly 40% of static companies do neither.

Innovation Is ImportantInnovation Is Important

Leaders rated security innovation as vital to achieve strong security at 8.1 on a scale of 10. On the other hand, laggards rated it at 6.1.

Attitudes About EncryptionAttitudes About Encryption

Leaders rated encryption in the cloud a 7.18 on a scale of 10 in terms of importance, while laggards rated it a 6.0.

Big Data at RiskBig Data at Risk

Leaders rated security protocols over big data a 6.33 on a scale of 10 in terms of importance, while laggards rated it a 4.94.

An Eye on Network ActivityAn Eye on Network Activity

Leaders rated the need to pinpoint anomalies in network traffic an 8.55 on a scale of 10 in terms of importance, while laggards rated it a 7.45.

Organizations Dial Into BYODOrganizations Dial Into BYOD

Both leaders and laggards have an eye on BYOD. Leaders rated it 7.16 on a scale of 10, while laggards rated it a 7.76.

Left to Their DevicesLeft to Their Devices

Leaders rated the importance of limiting insecure devices a 6.03 on a scale of 10, while laggards weighed in with a 7.18.

Final ThoughtsFinal Thoughts

“Three key areas are critical for security effectiveness: the existence of a defined strategy, effective use of technology and solid governance practices.”–Ryan LaSalle, Accenture Global Managing Director–Growth & Strategy, Security Services

Final Thought on SecurityFinal Thought on Security

“CIOs should seek out security capabilities that enhance the user experience and productivity and improve their ability to counter advanced threats.”–Ryan LaSalle, Accenture

Recommended for you...

Storage Vulnerabilities: The Neglected Cybersecurity Frontier
Drew Robb
Sep 7, 2022
NGFW vs UTM: Differences & Use Cases
Don Hall
Aug 12, 2022
Top Next-Generation Firewall (NGFW) Software
Jenna Phipps
Jul 19, 2022
Perimeter 81 vs NordLayer: Network Security Comparison
Devin Partida
Jun 24, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.