Processes and Tools
To what extent would you agree or disagree with the following statements on cyber security?
+ More Info
Results for: Worldwide, all industries, all sizes
n= 0
To what extent would you agree or disagree with the following statements on cyber security?
+ More Info
Results for: Worldwide, all industries, all sizes
- A
- B
- C
- D
- E
- F
- G
- A = We know who is accessing our data, who is looking after the data, where data is stored, level of protection and the value of our data at any given time
- B = We have strong systems which verify an incident has occurred and is helping to reduce our dwell times dramatically
- C = We have well documented processes and defined escalation procedures for any incident response
- D = We have effective tools that allow us to prioritize and interpret incoming threats, and robust systems which help us to eliminate false positives
- E = We have strong data loss prevention capabilities across the organisation
- F = We generally follow the major standard processes such as RFC2350; ISO/IEC 27035:2011; US CERT for Incident Response
- G = Our security capabilities are fully automated, roles-based, policy enforced and location aware
Performance KPIs
Which of the following KPIs are you using to measure performance?
+ More Info
Results for: Worldwide, all industries, all sizes
n= 0
Which of the following KPIs are you using to measure performance?
+ More Info
Results for: Worldwide, all industries, all sizes
Biggest Security Concerns
What are the biggest source of concern related to security attacks?
+ More Info
Results for: Worldwide, all industries, all sizes
n= 0
What are the biggest source of concern related to security attacks?
+ More Info
Results for: Worldwide, all industries, all sizes
Business Technology Concerns
In cases where applications / data are stored and accessed from the cloud, what are some of the top security considerations?
+ More Info
Results for: Worldwide, all industries, all sizes
n= 0
In cases where applications / data are stored and accessed from the cloud, what are some of the top security considerations?
+ More Info
Results for:





