Managing RisksRespondents indicate a widespread lack of sophistication in addressing security at the level of risk management. Any organization that regularly reviews processes for vulnerability assessments and threat assessments is well ahead of the pack.Process in place Process owner identified Process repeatable Process documented Process regularly updatedDo regular vulnerability assessments 60% 49% 42% 30% 22% Act on assessment results in a timely way 55% 39% 32% 22% 16%Identify critical information assets 61% 35% 34% 26% 18% Identify threats to critical information assets 56% 31% 27% 18% 16%Determine potential impacts of attack on critical information assets 30% 19% 16% 12% 9%Manage risks to information assets similarly to other key business risks 41% 29% 23% 17% 13%Setting PoliciesIn the absence of a true risk management approach, the next best step is to at least address security on a policy level. Respondents show decent involvement by senior management in setting security policies. However, few succeed in making security a regular part of staff or management meetings.Process in place Process owner identified Process repeatable Process documented Process regularly updated Have senior managers establish security policy (both IT and physical) 73% 52% 45% 48% 36%Link policies to specific business objectives and risk areas 37% 26% 22% 18% 14%Inform all managers of responsibilities regarding security 47% 29% 26% 23% 18%Make security a regular agenda topic at management and staff meetings 34% 22% 19% 13% 12% Train end users on security policy prior to receiving system accounts 49% 33% 30% 28% 20%Conduct periodic independent audit of compliance with company policies 43% 28% 27% 20% 17%Securing Systems and NetworksSurvey results show that most organizations approach information security at a technical level. While some technology-oriented processes are more prevalent than others, CERT notes that without attention to risk management and security policies, money spent on technical solutions may be misdirected.Process in place Process owner identified Process repeatable Process documented Process regularly updatedAssign, manage and update user identities and access permissions 80% 57% 57% 44% 33%Manage system/network changes and configuration, including patches 76% 53% 50% 36% 29%Regularly scan for viruses and other malware on all systems 82% 58% 60% 40% 35%Monitor for, detect, report and act on suspicious files/behaviors/events 81% 53% 51% 31% 25%Actively work to contain the damage caused by viruses and malware 57% 40% 37% 22% 19%Recover/restore compromised files, systems, networks in a timely manner 74% 48% 46% 30% 23%Handling Corporate SecurityRespondents display a variety of capability levels with regard to basic physical and corporate security processes. Access control is widespread; employee training is not.Process in place Process owner identified Process repeatable Process documented Process regularly updatedRequire identification and authentication for accessing work facilities 72% 48% 50% 40% 30%Put business continuity/disaster recovery plans in place 59% 39% 36% 37% 30%Train employees to identify suspicious packages, behaviors, persons, events 40% 21% 21% 17% 13%Require human resources to conduct background checks on all new hires 55% 39% 38% 34% 28% Related content news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Android Security Mobile Security news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management news Cybersecurity experts raise concerns over EU Cyber Resilience Act’s vulnerability disclosure requirements Open letter claims current provisions will create new threats that undermine the security of digital products and individuals. By Michael Hill Oct 03, 2023 4 mins Regulation Compliance Vulnerabilities feature The value of threat intelligence — and challenges CISOs face in using it effectively Knowing the who, what, when, and how of bad actors and their methods is a boon to security, but experts say many teams are not always using such intel to their best advantage. By Mary K. Pratt Oct 03, 2023 10 mins CSO and CISO Advanced Persistent Threats Threat and Vulnerability Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe