Do You Have Difficulty in Receiving Funding for Security Initiatives? If So, You’re in Good Company
Pathlock
December 9, 2016
Do You Have Difficulty In Receiving Funding For Security Initiatives? If So, You’re In Good Company
According to a recent Kensington report, respondents ranked the following threats as their organization’s biggest
risks to IT security:
External threats – 36%
Compliance breaches – 16%
Data leakage/loss – 16%
40% of these respondents said that it was a challenge to address these threats due to insufficient budgets.
LTM Research recently conducted a cybersecurity survey that targeted 2,000 CISOs responsible for the security and management of large enterprise networks at companies headquartered in the U.S. or U.K. with more than $1 billion in annual revenue. The results showed that 59% of respondents reported that it’s difficult to receive funding for their security initiatives despite their deep concerns about internal and external threats, as well as the impact a breach can have on an organization.
Despite the difficulty in receiving funding, 83% of respondents stated that they will focus on cyber governance in 2017. This is because even the most rigorous cybersecurity program is ineffective without constant monitoring and updating using a cyber governance solution. It helps highlight missing or incomplete requirements across your cybersecurity framework, and enables you to conduct an impact analysis to identify gaps in policies and controls by framework, regulation, or line of business.
A cyber governance solution simplifies the communication of your cybersecurity plans, the performance of your program, and the consequences of breaches to business users, other executives, and your board of directors.
CISOs are also focused on cyber governance because it delivers centralized and standardized security policies that correlate technical data from disparate systems to enterprise-wide cybersecurity controls. It integrates new processes with existing perimeter security, vulnerability management, and event management processes to leverage previous investments. And it helps you demonstrate how tightened cybersecurity can smooth operations, lower costs, and increase revenues.
For more information on the LTM Research report and to view the survey results, click here. To learn more about cyber governance, click here.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.