EVENT FILMING | FEATURES | RESEARCH | HEAD TO HEAD | CASE STUDIES | ROUNDTABLE | BOOKSTORE
ONLINE BOOKSTORE
CUSTOMER FEEDBACK
TECHNOLOGY NEWS
ITSM
 IPTV
 Publications

Ken Turbitt Blog
Aidan Lawes Blog
Paul Gostick Blog
Dr Jenny Dugmore Blog
Shirley Lacy Blog
Alim Ozcan Blog
Juan Jimenez Blog
Ian Clayton Blog
Nas Ozcan Blog
Aidan Mills Blog



ITSM
Digital Health Technology Vision 2018
Health organizations are embracing intelligent technologies but must do more to prepare for societal impact...
ITSM

Ten Strategic Technology Trends for Government
Technologies that enable new service models for digital government must be at the top of the list for government organizations as they prioritize technology investments...

ITSM

The Robots are Coming: Are CEOs Ready for the Era of Automation?
CEOs agree that robotics is going to make their companies more efficient, with 94% of those who've already adopted robotics saying that it's increased productivity in their business...

ITSM

The 2015 Chief Digital Officer Study
More companies are appointing a Chief Digital Officer to join their C-suite - but are they doing it quickly enough?...

ITSM

18th Annual Global CEO Survey
The United States has overtaken China as top target for growth for the first time in five years...




 News
11 June 2018 | ITSM
Send to a colleague | Add to MY ITP

How Security Leaders Can Be Empowered to Drive Results
Committing to resilience will equip your digital business with the mindset, resources and planning to recover from inevitable disruptions...

The overwhelming demands on security leaders today can have a paralyzing effect. Gartner analysts provide insight to empower these security leaders to take action.

Gartner analysts provide guidance to security and risk leaders and practitioners on how to be empowered to adapt their people, processes and technologies to address the old and the new; empowered to transform their approach to risk governance to be more continuous and inclusive; and empowered to scale their security capabilities in other ways than by hiring more people.

Much of this empowerment can come from addressing three simple questions: What’s important? What’s dangerous? What’s real? Gartner analysts took the attendees through a series of scenarios to show how these questions can provide clarity, and in each scenario, the intersection of the questions changed a perception and led to action (see Table 1).

Table 1

 

What’s Important

What’s Dangerous

What’s Real

Innovating for Value

Start from an Enterprise-Wide Risk perspective

Adopt Integrated Risk Management (IRM) Practices

Build a strong foundation of communication

Urgent Crisis and Threat

Create visibility into assets and ecosystems

Design for resilience at Multiple Levels

Use analytics and automation as a force multiplier

Technology Transformation

Empower others to be part of risk management

Challenge conventional wisdom on risks and controls

Select adaptable and adaptive risk controls

 Source: Gartner (June 2018)

Take an Enterprise-Wide Risk Perspective

Gartner analysts recommended that security leaders start any initiative from an enterprise-wide risk perspective. Historically, risks have been viewed through a narrow lens, typically that of the risk owner.

"A few key practices will greatly help you overcome this obstacle," said Katell Thielmann, research vice president at Gartner. "First, create and support a culture of accountability with well-established risk ownership and responsibilities. "Next, build an enterprise-wide risk register that accounts for the top risks across all risk domains. Finally, map risk directly, clearly, and defensibly to business goals and objectives."

The danger can come from cyber risk, which represents an increasingly critical part of the risk puzzle. This is where integrated risk management (IRM) become so important.

"IRM allows for easy and simple risk prioritization and linkages to risk treatment plans. We recommend you integrate cybersecurity and technology risks with broader operational risk to ensure that risk oversight is forward thinking," Ms. Thielmann said. "Define and measure risk indicators and identify those that serve as early warnings."

Creating Visibility into Assets and Ecosystems

As an enterprise ecosystem grows, it becomes nearly impossible to understand the interconnectedness of it all. When a problem ripples through an ecosystem, unexpected consequences are likely, but Gartner analysts said overreactions can do more harm than good.

"Last year, more than 15,000 vulnerabilities were disclosed publicly. A small portion of those were rated as a critical severity and posed an urgent threat," said Craig Lawson, research vice president at Gartner. "Often there is still some time to assess the situation and respond with care. But sometimes these threats are immediately elevated to critical importance because of the hype they receive in the mainstream media."

For example, while there are security risks constantly gaining attention, Mr. Lawson said that the data clearly shows now that over the last decade only a small number of vulnerabilities actually go on to be exploited, in fact, he said it’s only about one-eighth.

When responding to security threats, often the focus is on fixing a trust-related issue. However, in doing so, security leaders must make sure they do not violate their resilience goals. They have to design for resilience at multiple levels, from organizational to technical.

"Take an enterprise-wide view of resilience, and work with business and IT partners to set resilience goals," Mr. Lawson said. "Second, create crisis management and communication plans to reduce the risk of conditioned or habitual responses. Third, design technologies and processes that don’t just plan for high availability, but also for recovery and continuity. Lastly, ensure that these recovery and continuity plans are tested often enough to prove that they work."

Empower others to be part of risk management

Security leaders need controls that are appropriate for the environment and risk. They need controls that are applicable to more than just a single vendor or technology, and can change as risk and compliance landscapes evolve.

"Adaptable controls are what turn security into a technology enabler," said Ramon Krikken, research vice president at Gartner.

Mr. Krikken said it’s important to empower others in the organization to greatly increase the chances of success.

"Business process owners and IT teams must provide domain knowledge for effective risk management," Mr. Krikken said. "This is to ensure that risk professionals understand the changing technology and business realities. In return, we should encourage other roles to take guidance and advice from risk professionals, so that they can incorporate risk-based thinking into their responsibilities. Transforming and scaling security this way is a win-win for everyone involved."

For additional information on the Gartner Special Report "The Resilience Premium of Digital Business: A Gartner Trend Insight Report" click on the link https://gtnr.it/2Jt0wq1.


Gartner Email to a colleague | Add to MY ITP

LOG IN
terms & conditions





MICROSOFT SEARCH ENGINES