Is Your Company a Security Leader or Laggard?

 
 
By Samuel Greengard  |  Posted 03-11-2015 Email
 
 
 
 
 
 
 
 
 
  • Previous
    Governance Matters
    Next

    Governance Matters

    About 56% of cyber-security leaders surveyed have a sanctioned strategy in place and outsource core security operations. By contrast, 68% of laggards only use one or neither approach.
  • Previous
    Metrics Count
    Next

    Metrics Count

    Leaders are 18% more likely to have CISOs deploy metrics for evaluating security operations than laggards. They also are 23% more likely to deploy enterprise risk management procedures.
  • Previous
    Focus on Compliance
    Next

    Focus on Compliance

    Laggards are 50% more likely to have CISOs and security efforts focus on compliance with regulation and policies.
  • Previous
    Alignment Is Critical
    Next

    Alignment Is Critical

    The study found that half of the leaders make information security a priority and align security and business objectives, while nearly 40% of static companies do neither.
  • Previous
    Innovation Is Important
    Next

    Innovation Is Important

    Leaders rated security innovation as vital to achieve strong security at 8.1 on a scale of 10. On the other hand, laggards rated it at 6.1.
  • Previous
    Attitudes About Encryption
    Next

    Attitudes About Encryption

    Leaders rated encryption in the cloud a 7.18 on a scale of 10 in terms of importance, while laggards rated it a 6.0.
  • Previous
    Big Data at Risk
    Next

    Big Data at Risk

    Leaders rated security protocols over big data a 6.33 on a scale of 10 in terms of importance, while laggards rated it a 4.94.
  • Previous
    An Eye on Network Activity
    Next

    An Eye on Network Activity

    Leaders rated the need to pinpoint anomalies in network traffic an 8.55 on a scale of 10 in terms of importance, while laggards rated it a 7.45.
  • Previous
    Organizations Dial Into BYOD
    Next

    Organizations Dial Into BYOD

    Both leaders and laggards have an eye on BYOD. Leaders rated it 7.16 on a scale of 10, while laggards rated it a 7.76.
  • Previous
    Left to Their Devices
    Next

    Left to Their Devices

    Leaders rated the importance of limiting insecure devices a 6.03 on a scale of 10, while laggards weighed in with a 7.18.
  • Previous
    Final Thoughts
    Next

    Final Thoughts

    "Three key areas are critical for security effectiveness: the existence of a defined strategy, effective use of technology and solid governance practices."–Ryan LaSalle, Accenture Global Managing Director–Growth & Strategy, Security Services
  • Previous
    Final Thought on Security
    Next

    Final Thought on Security

    "CIOs should seek out security capabilities that enhance the user experience and productivity and improve their ability to counter advanced threats."–Ryan LaSalle, Accenture
 

Over the last few years, cyber-security has emerged as a central challenge for organizations large and small. And while there's no shortage of news stories and analyst reports chronicling the severity of the risk and the complexities of addressing it, there has generally been little attention devoted to how to effectively execute on the task. A new report from Accenture in conjunction with Ponemon Institute takes direct aim at the issue. The “Cyber Security Leap: From Laggard to Leader,” examines a number of critical issues and offers insights into the practices that leaders and laggards adopt. The study found that best practice companies typically leap ahead of the competition and the marketplace by focusing on three crucial areas: governance, innovation and technology. However, there are additional nuances and complexities to cyber-security. Here are some of the key findings from the survey, which includes responses from business and IT leaders at 247 companies across 10 major industries.

 
 
 
 
 

 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login Register