Security leaders are left with point-in-time
assessments that require them to cobble
together data from disparate systems to truly
understand the organisation’s security posture.
• Controlling coverage gaps
across security functions (56%)
• Viewing a comprehensive
list of assets across the
organisation (43%)
• Collecting, normalising,
aggregating, deduplicating
and correlating disparate
data (39%)
• Tracking which assets and
controls do not meet regulatory
and compliance policies (39%)
• Determining the effectiveness
of security controls (38%)
• Getting a real-time view of
corporate risks (37%)
• Tracking performance of
security controls over time (37%)
As threat levels increase, 64% of
security leaders surveyed said
that they are making it a high or
critical priority to implement a risk
framework aligning cybersecurity
risk and enterprise risk. However,
the study identifies that one in
five do not have a centralised
approach for risk management.
The upshot is that we have so
many security tools, we don’t know
what they’re doing. Even worse,
we’re burning cycles trying to work
it out manually, increasingly driven
by regulators. The answer is simple
– automate the job.
The changing cyber market
dynamics have created a clear
market requirement for automated
continuous controls monitoring,
a new category of solution
that provides real-time visibility
of assets.
The ability to make informed
operational security decisions
based on trusted security data
and metrics will enable security
leaders to have real and validated
confidence that the company and
customer data is protected. u
76
Issue 21
|
www.intelligentciso.com