Whenever you visit our websites, information may be collected using cookies and similar tools to improve your user experience and to enhance the performance of the website.
Closing this message means you accept the use of cookies.
Organizations Understand the Value of Risk Management
Multiple Risk Management Technologies in Place Require Centralization and Coordi…
Security Teams Face Challenges Addressing Attack Surface and Asset Management
Organizations Need to Adapt Vulnerability Management for Efficient Remediation
Adopting Penetration Testing and Red Teaming Activities Can Help Teams Get Ahead…
Most Will Increase Investments in Cyber-risk Management Solutions
Conclusion
Research Methodology
Respondent Demographics
Research Report: Cyber-risk Management Best Practices
Research Report
Nov 27, 2024
by
Tyler Shields, Emily Marsh, Bill Lundell, Enterprise Strategy Group Research
Cyber-risk management is critical for any modern business operation or initiative, with adherence to security standards and best practices, continuous risk assessments and vulnerability scanning, and better understanding of asset state driving practices maturity. But addressing cyber-risk is becoming more complex with expanding attack surfaces, evolving cybersecurity threats, novel forms of data breaches, new attack vectors, and previously unknown vulnerabilities.
Further, organizations are increasingly managing workloads in cloud environments for the benefits of scale and productivity in addition to on-premises data centers. So, today’s modern ecosystems consist of hybrid or multi-cloud environments, ephemeral assets, expanding attack surfaces, external SaaS and third-party connections, and dynamic cloud-native applications. These infrastructure complexities present new challenges for asset visibility, understanding attack surfaces, securing business-critical assets, and managing their associated risk.
To gain further insights into these trends, TechTarget’s Enterprise Strategy Group surveyed 375 IT and cybersecurity professionals in North America (US and Canada) involved with cybersecurity risk management technology and processes at their organization.
Page Count: 28
Table of Contents
Executive Summary
Report Conclusions
Introduction
Research Objectives
Research Findings
Organizations Understand the Value of Risk Management
Multiple Risk Management Technologies in Place Require Centralization and Coordination
Security Teams Face Challenges Addressing Attack Surface and Asset Management
Organizations Need to Adapt Vulnerability Management for Efficient Remediation
Adopting Penetration Testing and Red Teaming Activities Can Help Teams Get Ahead of Attacks
Most Will Increase Investments in Cyber-risk Management Solutions