Gartner Survey Shows Information Security Governance Practices Are Maturing

STAMFORD, Conn., July 21, 2015 View All Press Releases

Growing Trend for Establishing Primary Security Function Outside of IT Reflects Need for Effective Security Governance

Information security governance practices are maturing according to Gartner, Inc.'s annual end-user survey for privacy, IT risk management, information security, business continuity or regulatory compliance. Gartner surveyed 964 respondents in large organizations — with at least $50 million equivalent in total annual revenue for fiscal year 2014, and with a minimum of 100 employees — in seven countries between February and April 2015.

"Increasing awareness of the impact of digital business risks, coupled with high levels of publicity regarding cybersecurity incidents, are making IT risk a board-level issue," said Tom Scholtz, vice president and Gartner Fellow. "Seventy-one percent of respondents indicated that IT risk management data influences decisions at a board level. This also reflects an increasing focus on dealing with IT risk as a part of corporate governance."

The nature of the reporting lines of the information security team is one of the key attributes of effective governance. Thirty-eight percent of the survey respondents indicated explicitly that the most senior person responsible for information security reports outside of the IT organization.

"The primary reasons for establishing this reporting line outside of IT are to improve separation between execution and oversight, to increase the corporate profile of the information security function and to break the mindset among employees and stakeholders that "security is an IT problem," said Mr. Scholtz. Organizations increasingly recognize that security must be managed as a business risk issue, and not just as an operational IT issue. There is an increasing understanding that cybersecurity challenges go beyond the traditional realm of IT into areas such as operational technology (OT) and Internet of Things (IoT) security."

The seniority level from which security programs are sponsored is also improving. Sixty-three percent of the respondents indicated that they receive sponsorship and support for their information security programs from leadership outside of the IT organization. This is a significant increase from 54 percent in 2014. CEO and/or board-level sponsorship has remained constant at 30 percent (29 percent in 2014) while sponsorship from a steering committee increased from seven to 12 percent. There are interesting regional differences, with 57 percent of respondents in North America indicating sponsorship from outside IT, considerably lower than 63 percent in Western Europe and 67 percent in Asia/Pacific.

"A senior executive mandate for the security program is fundamental. Without it, the security program has little chance of getting the requisite support from the rest of the organization," said Mr. Scholtz. "Because a corporate information security steering committee (CISSC) should consist primarily of business representatives, we expect that the level of sponsorship from such bodies will continue to increase as governance functions continue to mature. Indeed, an effective governance forum, such as the CISSC, becomes the authoritative representative of the CEO, the board and the senior business unit managers."

On the effectiveness of security policies, although half of the respondents indicate the governance body is involved in assessing and approving the policies, only 30 percent of respondents indicated that the business units (BUs) are actively involved in developing the policies that will affect their businesses. While this is a considerable improvement from previous years (16 percent in 2014), it still indicates a lack of active engagement with the business. This lack of engagement is a major cause of different risk views between the security team and the business, which can result in redundant and mismanaged controls, which in turn result in unnecessary audit findings and ultimately in reduced productivity.

More detailed analysis is available in the report "Survey Analysis: Information Security Governance, 2015-16."

Additional details on the security market will be discussed at the Gartner Security & Risk Management Summits August 10-11 in Sao Paulo, Brazil; August 24-25 in Sydney, Australia, September 1-2 in Mumbai, India and September 14-15 in London, U.K. Information from the Gartner Security & Risk Management Summits 2015 will be shared on Twitter at using #GartnerSEC.

This content extract was originally sourced from an external website (Gartner Newsroom) and is the copyright of the external website owner. TelecomTV is not responsible for the content of external websites. Legal Notices

Email Newsletters

Sign up to receive TelecomTV's top news and videos, plus exclusive subscriber-only content direct to your inbox.