2012 ibm chief information security officer assessment - executive summary

10
© 2012 IBM Corporation IBM Client IBM Center for Applied Insights May 2012 Finding a strategic voice Insights from the 2012 IBM Chief Information Security Officer Assessment

Upload: david-jarvis

Post on 16-May-2015

1.082 views

Category:

Business


2 download

DESCRIPTION

2011 was the year of the security breach. And while many security organizations remain in crisis response mode, some security leaders have moved to take a more proactive position, taking steps to reduce future risk. These leaders see their organizations as more mature in their security-related capabilities and better prepared to meet new threats. What have they done to create greater confidence? More importantly, can their actions show the way forward for others?

TRANSCRIPT

Page 1: 2012 IBM Chief Information Security Officer Assessment - Executive Summary

© 2012 IBM Corporation

IBM Client

IBM Center for Applied Insights

May 2012

Finding a strategic voiceInsights from the 2012 IBM Chief Information Security Officer Assessment

Page 2: 2012 IBM Chief Information Security Officer Assessment - Executive Summary

© 2012 IBM Corporation

IBM Center for Applied Insights

2

With explosive growth in connectivity and collaboration, information security is becoming increasingly complex and difficult to manage

In 2011, the corporate world experienced the second highest data loss total since 2004

Sources: Verizon 2012 Data Breach Investigations Report; IDC

The number of mobile workers is expected to reach 1.3 billion by 2015

At the same time, mobile security threats are increasing – up almost 20 percent in 2011

Page 3: 2012 IBM Chief Information Security Officer Assessment - Executive Summary

© 2012 IBM Corporation

IBM Center for Applied Insights

3

To obtain a global snapshot of security leaders’ strategies and approaches, we asked 138 security leaders in…

• Seven countries• A wide range of industries• ~20% from enterprises with

10,000+ employees• ~55% from enterprises with

1,000-9,999 employees

Page 4: 2012 IBM Chief Information Security Officer Assessment - Executive Summary

© 2012 IBM Corporation

IBM Center for Applied Insights

4

Security leaders shared their views on how the security landscape is changing

Source: IBM Center for Applied Insights

Page 5: 2012 IBM Chief Information Security Officer Assessment - Executive Summary

© 2012 IBM Corporation

IBM Center for Applied Insights

5

Based on a self-assessment of their security capabilities, three groups emerged

Self-assessed maturity and preparedness

Source: IBM Center for Applied Insights

One-quarter of security leaders are “Influencers”

Page 6: 2012 IBM Chief Information Security Officer Assessment - Executive Summary

© 2012 IBM Corporation

IBM Center for Applied Insights

6

Influencers are much more likely to have elevated information security to a strategic priority

Security Profiles

Source: IBM Center for Applied Insights

Page 7: 2012 IBM Chief Information Security Officer Assessment - Executive Summary

© 2012 IBM Corporation

IBM Center for Applied Insights

7

Influencers are turning their attention to people and building a risk-aware culture

Source: IBM Center for Applied Insights

Page 8: 2012 IBM Chief Information Security Officer Assessment - Executive Summary

© 2012 IBM Corporation

IBM Center for Applied Insights

8

Influencers are more likely to measure progress through a wider variety of metrics and devote more attention to systemic change

Importance of Metrics

Source: IBM Center for Applied Insights

Page 9: 2012 IBM Chief Information Security Officer Assessment - Executive Summary

© 2012 IBM Corporation

IBM Center for Applied Insights

9

Security leaders must assume a business leadership position and dispel the idea that information security is a technology support function

Responders can move beyond their tactical focus by: Establishing a dedicated security leadership role (like a CISO), assembling a

security and risk committee, and measuring progress

Automating routine security processes to devote more time and resources to security innovation

Protectors can make security more of a strategic priority by: Investing more of their budgets on reducing future risks

Aligning information security initiatives to broader enterprise priorities

Learning from and collaborating with a network of security peers

Influencers can continue to innovate and advance their security approaches by: Strengthening communication, education and business leadership skills to cultivate

a more risk-aware culture

Using insights from metrics and data analysis to identify high-value improvement areas

Page 10: 2012 IBM Chief Information Security Officer Assessment - Executive Summary

© 2012 IBM Corporation

IBM Center for Applied Insights

10

For more information

ContactDavid Jarvis/Providence

Client Insights, Senior Consultant, IBM Center for Applied Insights

IBM.comhttp://www.ibm.com/smarter/cai/security