Figures
Showing 14 matching figures from this report. See all 37 figures.
Figure 8. Audits of Strategic Suppliers
Figure 8. Audits of Strategic Suppliers
Figure 12. Measurement of IT Vendor Security Audits
Figure 12. Measurement of IT Vendor Security Audits
Figure 13. Respondents Rate IT Vendors’ Commitment to/Communications about Internal Security Processes and Procedures
Figure 13. Respondents Rate IT Vendors’ Commitment to/Communications about Internal Security Processes and Procedures
Figure 14. Confidence Level in Organization’s Knowledge of the Purchasing Origin of Hardware and Software
Figure 14. Confidence Level in Organization’s Knowledge of the Purchasing Origin of Hardware and Software
Figure 16. Internal Software Development
Figure 16. Internal Software Development
Figure 17. Confidence Level in Security of Internally Developed Software
Figure 17. Confidence Level in Security of Internally Developed Software
Figure 18. Security Incidents Related to the Compromise of Internally Developed Software
Figure 18. Security Incidents Related to the Compromise of Internally Developed Software
Figure 19. Security Activities Included as Part of the Software Development Process
Figure 19. Security Activities Included as Part of the Software Development Process
Figure 20. Secure Software Development Initiatives
Figure 20. Secure Software Development Initiatives
Figure 21. Why Organizations Chose to Establish a Secure Software Development Program
Figure 21. Why Organizations Chose to Establish a Secure Software Development Program
Figure 22. Plans to Include Security Activities as Part of the Software Development Process
Figure 22. Plans to Include Security Activities as Part of the Software Development Process
Figure 23. Outsourcing of Software Maintenance or Development Activities
Figure 23. Outsourcing of Software Maintenance or Development Activities
Figure 24. Security Safeguards Mandated of Service Providers
Figure 24. Security Safeguards Mandated of Service Providers
Figure 27. Security Controls Partners Require When Receiving IT Services or Business Applications from Critical Infrastructure Organizations
Figure 27. Security Controls Partners Require When Receiving IT Services or Business Applications from Critical Infrastructure Organizations