-
Report details
-
30
Figures
-
0
Tables
-
Executive Summary
-
Introduction
-
Research Findings
-
Organizations Understand the Value of Risk Management
-
Multiple Risk Management Technologies in Place Require Centralization and Coordi…
-
Security Teams Face Challenges Addressing Attack Surface and Asset Management
-
Organizations Need to Adapt Vulnerability Management for Efficient Remediation
-
Adopting Penetration Testing and Red Teaming Activities Can Help Teams Get Ahead…
-
Most Will Increase Investments in Cyber-risk Management Solutions
-
Conclusion
-
Research Methodology
-
Respondent Demographics
|
Research Report: Cyber-risk Management Best Practices
Research Report
Nov 27, 2024
by
Tyler Shields, Emily Marsh, Bill Lundell, Enterprise Strategy Group Research
Cyber-risk management is critical for any modern business operation or initiative, with adherence to security standards and best practices, continuous risk assessments and vulnerability scanning, and better understanding of asset state driving practices maturity. But addressing cyber-risk is becoming more complex with expanding attack surfaces, evolving cybersecurity threats, novel forms of data breaches, new attack vectors, and previously unknown vulnerabilities.
Further, organizations are increasingly managing workloads in cloud environments for the benefits of scale and productivity in addition to on-premises data centers. So, today’s modern ecosystems consist of hybrid or multi-cloud environments, ephemeral assets, expanding attack surfaces, external SaaS and third-party connections, and dynamic cloud-native applications. These infrastructure complexities present new challenges for asset visibility, understanding attack surfaces, securing business-critical assets, and managing their associated risk.
To gain further insights into these trends, TechTarget’s Enterprise Strategy Group surveyed 375 IT and cybersecurity professionals in North America (US and Canada) involved with cybersecurity risk management technology and processes at their organization.
Page Count: 28
Table of Contents
-
Executive Summary
-
Introduction
-
Research Findings
-
Organizations Understand the Value of Risk Management
-
Multiple Risk Management Technologies in Place Require Centralization and Coordination
-
Security Teams Face Challenges Addressing Attack Surface and Asset Management
-
Organizations Need to Adapt Vulnerability Management for Efficient Remediation
-
Adopting Penetration Testing and Red Teaming Activities Can Help Teams Get Ahead of Attacks
-
Most Will Increase Investments in Cyber-risk Management Solutions
-
Conclusion
-
Research Methodology
-
Respondent Demographics
|
Other Users Also Viewed
Complete Survey Results
Oct 30, 2024
This Complete Survey Results presentation focuses on current approaches to and tools used for cyber-risk management, including gaps, challenges, and their effectiveness in mitigating risk, as well as the personas and teams involved in evaluating,…
|