This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Risk management capabilities rated highly, but businesses do not deploy programs

Share this article:

More than three-quarters of security professionals rate their organiations' commitment to risk-based security management as ‘significant' or ‘very significant'.

According to research of 571 UK and 749 US respondents by Tripwire and the Ponemon Institute, 77 per cent rated their organisations' commitment to risk-based security management so highly and 59 per cent cited risk-based security management as helping align security programs with business objectives.

However, 48 per cent said that their organisations' approach or strategy for risk-based security management was non-existent, while 51 per cent said that they do not have a risk-based security management program or most program activities have not been deployed.

Only 27 per cent have a security risk management strategy that is applied consistently across the enterprise.

Elizabeth Ireland, vice president of product marketing for Tripwire, said: “There's a big gap between risk-based security program commitment and how organisations are actually operating. This could be because many organisations haven't fully connected the importance of their cyber security program to their top-level business risks in spite of the rapid increase in cyber security threats.”

Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, said: “The findings from this report strongly indicate that risk-based security management is still viewed as an IT or security task instead of a business task. Unfortunately, the full value of a risk-based approach to security can only be realised when senior business leaders fully participate in the process.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Password recovery made too easy

Password recovery made too easy

A senior malware analyst has slammed the availability of a `password recovery' utility from Freehostia, noting that the software actually uses network admin utilities to take credentials from the users' ...

Belgacom says alleged GCHQ APT attack cost firm £12 million

Belgacom says alleged GCHQ APT attack cost firm ...

One year on from a nation-state APT which 124 systems at telecom operator Belgacom and the firm has detailed the cost and manpower involved in the clean-up operation.

CryptoWall compromises 40,000 UK citizens

CryptoWall compromises 40,000 UK citizens

Research just published claims to show that ransomware - in the shape of CryptoWall - is still generating healthy volumes of income for the cyber-criminals behind the code.