TelecomTV TelecomTV
  • News
  • Videos
  • Channels
  • Events
  • Network Partners
  • Industry Insights
  • Directory
  • Newsletters
  • Digital Platforms and Services
  • Open RAN
  • Cloud Native Telco
  • Telcos and Public Cloud
  • The Green Network
  • Private Networks
  • Open Telco Infra
  • 5G Evolution
  • Access Evolution
  • Edgenomics
  • Network Automation
  • 6G Research and Innovation
  • Security
  • More Topics
  • Network Partners
  • Industry Insights
  • Directory
  • Newsletters
  • |
  • About
  • Contact
  • |
  • Connect with us
  • Digital Platforms and Services
  • Open RAN
  • Cloud Native Telco
  • Telcos and Public Cloud
  • The Green Network
  • Private Networks
  • Open Telco Infra
  • 5G Evolution
  • Access Evolution
  • Edgenomics
  • Network Automation
  • 6G Research & Innovation
  • Security
  • Connect with TelecomTV
  • About
  • Privacy
  • Help
  • Contact
  • Sign In Register Subscribe
    • Subscribe
    • Sign In
    • Register
  • Search

Industry Announcements

Tracker

Gartner Survey Shows Information Security Governance Practices Are Maturing

Via Gartner Newsroom

Jul 21, 2015

STAMFORD, Conn., July 21, 2015 View All Press Releases

Growing Trend for Establishing Primary Security Function Outside of IT Reflects Need for Effective Security Governance

Information security governance practices are maturing according to Gartner, Inc.'s annual end-user survey for privacy, IT risk management, information security, business continuity or regulatory compliance. Gartner surveyed 964 respondents in large organizations — with at least $50 million equivalent in total annual revenue for fiscal year 2014, and with a minimum of 100 employees — in seven countries between February and April 2015.

"Increasing awareness of the impact of digital business risks, coupled with high levels of publicity regarding cybersecurity incidents, are making IT risk a board-level issue," said Tom Scholtz, vice president and Gartner Fellow. "Seventy-one percent of respondents indicated that IT risk management data influences decisions at a board level. This also reflects an increasing focus on dealing with IT risk as a part of corporate governance."

The nature of the reporting lines of the information security team is one of the key attributes of effective governance. Thirty-eight percent of the survey respondents indicated explicitly that the most senior person responsible for information security reports outside of the IT organization.

"The primary reasons for establishing this reporting line outside of IT are to improve separation between execution and oversight, to increase the corporate profile of the information security function and to break the mindset among employees and stakeholders that "security is an IT problem," said Mr. Scholtz. Organizations increasingly recognize that security must be managed as a business risk issue, and not just as an operational IT issue. There is an increasing understanding that cybersecurity challenges go beyond the traditional realm of IT into areas such as operational technology (OT) and Internet of Things (IoT) security."

The seniority level from which security programs are sponsored is also improving. Sixty-three percent of the respondents indicated that they receive sponsorship and support for their information security programs from leadership outside of the IT organization. This is a significant increase from 54 percent in 2014. CEO and/or board-level sponsorship has remained constant at 30 percent (29 percent in 2014) while sponsorship from a steering committee increased from seven to 12 percent. There are interesting regional differences, with 57 percent of respondents in North America indicating sponsorship from outside IT, considerably lower than 63 percent in Western Europe and 67 percent in Asia/Pacific.

"A senior executive mandate for the security program is fundamental. Without it, the security program has little chance of getting the requisite support from the rest of the organization," said Mr. Scholtz. "Because a corporate information security steering committee (CISSC) should consist primarily of business representatives, we expect that the level of sponsorship from such bodies will continue to increase as governance functions continue to mature. Indeed, an effective governance forum, such as the CISSC, becomes the authoritative representative of the CEO, the board and the senior business unit managers."

On the effectiveness of security policies, although half of the respondents indicate the governance body is involved in assessing and approving the policies, only 30 percent of respondents indicated that the business units (BUs) are actively involved in developing the policies that will affect their businesses. While this is a considerable improvement from previous years (16 percent in 2014), it still indicates a lack of active engagement with the business. This lack of engagement is a major cause of different risk views between the security team and the business, which can result in redundant and mismanaged controls, which in turn result in unnecessary audit findings and ultimately in reduced productivity.

More detailed analysis is available in the report "Survey Analysis: Information Security Governance, 2015-16."

Additional details on the security market will be discussed at the Gartner Security & Risk Management Summits August 10-11 in Sao Paulo, Brazil; August 24-25 in Sydney, Australia, September 1-2 in Mumbai, India and September 14-15 in London, U.K. Information from the Gartner Security & Risk Management Summits 2015 will be shared on Twitter at http://twitter.com/Gartner_inc using #GartnerSEC.

Related Topics
  • Gartner,
  • News,
  • North America,
  • Privacy,
  • Research and Trials,
  • Security,
  • Tracker

More Like This

Security

Cisco showcases vision to simplify networking and securely connect the world

Jun 7, 2023

Access Evolution

Nokia and Du deliver residential broadband services over fixed-wireless access

Jun 7, 2023

Security

Nokia Threat Intelligence Report finds malicious IoT botnet activity has sharply increased

Jun 7, 2023

Access Evolution

OneWeb launches connectivity for maritime sector

Jun 6, 2023

Access Evolution

NEC to supply East Micronesia Cable System (EMCS)

Jun 6, 2023

This content extract was originally sourced from an external website (Gartner Newsroom) and is the copyright of the external website owner. TelecomTV is not responsible for the content of external websites. Legal Notices

Email Newsletters

Sign up to receive TelecomTV's top news and videos, plus exclusive subscriber-only content direct to your inbox.

Subscribe

Top Picks

Highlights of our content from across TelecomTV today

1:17:33

From telco to techco: The impact of next-gen operations on skills, talent acquisition and retention

1:14:31

Achieving maximum operational efficiency: How service providers can best operate at speed and scale

1:14:20

Why data and APIs are key to implementing the vision of the digital services provider

TelecomTV
Company
  • About Us
  • Media Kit
  • Contact Us
Our Brands
  • DSP Leaders World Forum
  • Great Telco Debate
  • TelecomTV Events
Get In Touch
[email protected]
+44 (0) 207 448 1070
Connect With Us

  • Privacy
  • Cookies
  • Terms of Use
  • Legal Notices
  • Help

TelecomTV is produced by the team at Decisive Media.

© Decisive Media Limited 2023. All rights reserved. All brands and products are the trademarks of their respective holder(s).