Ponemon Institute Research Report
Making Security Possible and Achieving a Risk-oriented Security Posture
Enterprises are prioritizing strategic cybersecurity initiatives but are dragged down by lack of fundamentals.
Learn More About The Report
The survey of over 1,000 security leaders reveals that organizations are committed to a stronger risk-based security posture but ineffective security metrics, operational inefficiencies, and the lack of full visibility are major roadblocks. Among the findings:
- Priorities: Secure cloud migration (57%), Implement Zero Trust principles (48%)
- Metrics: Unable to measure meaningful progress against risk-oriented programs (64%)
- Visibility: Lack thereof across cloud and on-premises sources is making threat detection ineffective (60%)
- Inefficiencies: Too much time spent on manual data collection activities (52%)
Download the Report
How does your security operations program stack up?
Download the report and survey results to learn more about the current state of security and what security leaders had to say and gauge where you stand!
Executive Summary
Don’t have time to read the full report? Check out the 7-page summary to get the top findings from the full study.
-
Best-in-Class Security Operations and What It Takes to Get There
U.S. businesses lost $4.1 billion in 2020 to phishing, spoofing, and other scams, in spite of huge investments in security processes and technologies that many organizations have made over the years. IT leaders and Security Operations Center (SOC) teams at these businesses tried to maintain security and visibility by deploying best-of-breed security tools, but the […]
-
Automation Across the Security Lifecycle Solution Brief
Fifty percent of the investigative process is done before you even click a button. Read the solution guide on how ReliaQuest GreyMatter automates data collection through remediation and proactive threat hunting or attack simulations. View Now
-
The CISO’s Guide to Security Metrics That Matter
There is a world of security metrics out there, but which ones really matter? And how can a CISO accurately and effectively present them to a board in a way they’ll understand and care about? In our free whitepaper, you’ll learn: The top 3 security metrics that boards are interested in How to present them […]