Security Framework
Security Framework

Processes and Tools

To what extent would you agree or disagree with the following statements on cyber security?

Clear filter
Results for: Worldwide, all industries, all sizes
n= 0

Processes and Tools

n= 0

To what extent would you agree or disagree with the following statements on cyber security?

Results for: Worldwide, all industries, all sizes
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • A = We know who is accessing our data, who is looking after the data, where data is stored, level of protection and the value of our data at any given time
  • B = We have strong systems which verify an incident has occurred and is helping to reduce our dwell times dramatically
  • C = We have well documented processes and defined escalation procedures for any incident response
  • D = We have effective tools that allow us to prioritize and interpret incoming threats, and robust systems which help us to eliminate false positives
  • E = We have strong data loss prevention capabilities across the organisation
  • F = We generally follow the major standard processes such as RFC2350; ISO/IEC 27035:2011; US CERT for Incident Response
  • G = Our security capabilities are fully automated, roles-based, policy enforced and location aware
Download
Security Framework

Performance KPIs

Which of the following KPIs are you using to measure performance?

Clear filter
Results for: Worldwide, all industries, all sizes
n= 0

Performance KPIs

n= 0

Which of the following KPIs are you using to measure performance?

Results for: Worldwide, all industries, all sizes
Time to Quarantine / Contain Threat
Time to Detect from point threat entered environment
Time to Remediate
Time to Patch Release Vulnerability
Time to Analyse post event
None of the above
Download
Security Framework

Biggest Security Concerns

What are the biggest source of concern related to security attacks?

Clear filter
Results for: Worldwide, all industries, all sizes
n= 0

Biggest Security Concerns

n= 0

What are the biggest source of concern related to security attacks?

Results for: Worldwide, all industries, all sizes
Cloud Services
0%
Database
0%
Web Application Attacks
0%
Operating Systems
0%
Data Centers
0%
Mobile devices
0%
Physical and Virtual Servers
0%
WLAN Access Point
0%
Electronic security devices
0%
LAN/WAN
0%
IoT Devices
0%
Download
Security Framework

Business Technology Concerns

In cases where applications / data are stored and accessed from the cloud, what are some of the top security considerations?

Clear filter
Results for: Worldwide, all industries, all sizes
n= 0

Business Technology Concerns

n= 0

In cases where applications / data are stored and accessed from the cloud, what are some of the top security considerations?

Results for:
Data encryption
0%
Protection of data in transit
0%
Data security between cloud and end user
0%
User identity and access management
0%
Protection of data at rest
0%
Data security between cloud providers
0%
Detection and prevention of shadow IT
0%
File Integrity Monitoring
0%
Data Classification
0%
Mapping the correct workload to respective cloud environment
0%
Download