Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Privacy & Compliance

Organizations Struggle to Identify Security Threats and Deploy Countermeasures

Global Survey Shows Organizations Struggle to Identify Security Threats and Pass Regulatory Audits

Global Survey Shows Organizations Struggle to Identify Security Threats and Pass Regulatory Audits

A recent survey revealed that the biggest challenge companies face is identifying security threats, with 41 percent of respondents saying their organization is not well aware of or protected against IT security risks. Additionally, 40 percent of the 353 IT decision makers surveyed said that they are not completely confident they can accurately deploy countermeasure products. These findings come from “Risk and Compliance Outlook: 2011”, a report released today, commissioned by McAfee and conducted by market research firm EvalueServe.

Additionally, respondents appeared to have some insecurities (pardon the pun) with regards to regulatory compliance, with 75 percent admitting they aren’t confident they they will pass a regulatory audit. Audit failure wouldn’t be new to these folks, as more than half said that they have already failed an audit, with nine percent saying that audit failures resulted fines. These results seem to line up well with another recent report, which surveyed Oracle Applications Users Group members and revealed that forty-three percent of respondents were most-concerned with passing compliance audits, however, only fifty-six percent have successfully passed audits most or all of the time, while thirty-six percent are unsure on their standing.

The biggest challenge to comply with these mandates? Databases. Risk and Compliance Outlook survey respondents ranked databases as the biggest infrastructure challenge in terms of complying with regulatory mandates.

Biggest Challenges in Risk Management

But there is good news! The report found that to address these concerns, nearly half of all companies plan to spend an average of 21 percent more in 2011 on Risk and Compliance solutions, indicating strong growth for risk and compliance products in 2011 with the majority of CSO’s and other decision-making executives demanding integrated and automated solutions rather than point products.

Additional Key Discoveries:

• 45% of companies are patching systems weekly

• 25% of the time, compliance is the main driver for initiating an information security project

Advertisement. Scroll to continue reading.

• 41% of companies indicating they will be investing in Database Activity Monitoring

• 49% of companies stated that they try to ‘over protect’ by patching everything

• 84% of the respondents feel that their business and security operations are impacted due to out-of-cycle patches

• 37% are not confident in knowing which assets need to be patched when a new threat materializes

• 24% of organizations are spending more than $250,000 annually on auditors

• More than 40 percent of organizations get into “fire-fight mode” when a regulatory audit approaches, diverting critical resources away from strategic priorities

• 39% are not confident of being able to translate IT risks into business risks

• 56% of organizations indicated adding “Countermeasure-Awareness” to their risk analysis would provide the biggest benefit

• 60% of the respondents believe that up to 10% of downtime is attributable to unauthorized changes that take place over the entire year

“Organizations are under increasing pressure to protect customer information and privacy, as well as their own sensitive business information, driving the need for a strong focus on risk and compliance management,” said Stuart McClure, senior vice president and general manager of risk and compliance for McAfee. “As the results of this study show, companies recognize the need to improve risk management through better identification of threats, vulnerabilities and countermeasures, as well as the need to improve policy compliance through more automation of IT controls.”

Gary Davis, who manages the Risk and Compliance portfolio for McAfee and is a regular SecurityWeek contributor, suggests that meeting compliance is overrated and that companies should manage risk. “Efficient, effective risk management is the key to ensuring the possible security posture and, by extension, meeting compliance. Too many companies are caught up in a “checkbox compliance” mentality or just “spraying and praying” that they get the threats before the threats get them. As we’ve seen, that approach simply isn’t sustainable,” Davis states in a recent column. “Start a program in your company to gain visibility of threats and vulnerabilities, and put controls in place to mitigate your risks. With the right controls in place—integrated, automated controls that take the guesswork out of when and where to focus security efforts—you’ll be able to boost security and ensure regulatory compliance, while saving time and money,” he added.

Overall, the Risk and Compliance Outlook report suggests that forward-thinking companies are avoiding check-box compliance and fire drill responses to security incidents in favor of sustained, continuous, and auditable risk management and compliance initiatives that address IT security as a business risk.

Responses used to compile the Risk and Compliance Outlook report came from 353 IT decision makers, consultants and security analysts from companies with more than 500 employees who are involved in evaluation, selection, day-to-day management and maintenance of security products. Geographical location of the respondents was fairly even, coming from in Australia, Canada, France, Germany, New Zealand, Singapore, United Kingdom and United States.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...