Skip to main content

Gartner Identifies How Security Leaders Can Be Empowered to Drive Results

NATIONAL HARBOR, Md.--( BUSINESS WIRE )--The overwhelming demands on security leaders today can have a paralyzing effect. During the opening keynote address today at the Gartner Security and Risk Management Summit , Gartner analysts provided insight to empower these security leaders to take action. Tweet this Gartner analysts provided guidance to an audience of more than 3,400 security and risk leaders and practitioners on how to be empowered to adapt their people, processes and technologies to address the old and the new; empowered to transform their approach to risk governance to be more continuous and inclusive; and empowered to scale their security capabilities in other ways than by hiring more people. Much of this empowerment can come from addressing three simple questions: What’s important? What’s dangerous? What’s real? Gartner analysts took the attendees through a series of scenarios to show how these questions can provide clarity, and in each scenario, the intersection of the questions changed a perception and led to action (see Table 1). Table 1 What’s Important What’s Dangerous What’s Real Innovating for Value Start from an Enterprise-Wide Risk perspective Adopt Integrated Risk Management (IRM) Practices Build a strong foundation of communication Urgent Crisis and Threat Create visibility into assets and ecosystems Design for resilience at Multiple Levels Use analytics and automation as a force multiplier Technology Transformation Empower others to be part of risk management Challenge conventional wisdom on risks and controls Select adaptable and adaptive risk controls Source: Gartner (June 2018) Take an Enterprise-Wide Risk Perspective Gartner analysts recommended that security leaders start any initiative from an enterprise-wide risk perspective. Historically, risks have been viewed through a narrow lens, typically that of the risk owner. “A few key practices will greatly help you overcome this obstacle,” said Katell Thielmann , research vice president at Gartner. “First, create and support a culture of accountability with well-established risk ownership and responsibilities. “Next, build an enterprise-wide risk register that accounts for the top risks across all risk domains. Finally, map risk directly, clearly, and defensibly to business goals and objectives.” The danger can come from cyber risk, which represents an increasingly critical part of the risk puzzle. This is where integrated risk management (IRM) becomes so important. “IRM allows for easy and simple risk prioritization and linkages to risk treatment plans. We recommend you integrate cybersecurity and technology risks with broader operational risk to ensure that risk oversight is forward thinking,” Ms. Thielmann said. “Define and measure risk indicators and identify those that serve as early warnings.” Creating Visibility into Assets and Ecosystems As an enterprise ecosystem grows, it becomes nearly impossible to understand the interconnectedness of it all. When a problem ripples through an ecosystem, unexpected consequences are likely, but Gartner analysts said overreactions can do more harm than good. “Last year, more than 15,000 vulnerabilities were disclosed publicly. A small portion of those were rated as a critical severity and posed an urgent threat,” said Craig Lawson , research vice president at Gartner. “Often there is still some time to assess the situation and respond with care. But sometimes these threats are immediately elevated to critical importance because of the hype they receive in the mainstream media.” For example, while there are security risks constantly gaining attention, Mr. Lawson said that the data clearly shows now that over the last decade only a small number of vulnerabilities actually go on to be exploited, in fact, he said it’s only about one-eighth. When responding to security threats, often the focus is on fixing a trust-related issue. However, in doing so, security leaders must make sure they do not violate their resilience goals. They have to design for resilience at multiple levels, from organizational to technical. “Take an enterprise-wide view of resilience, and work with business and IT partners to set resilience goals,” Mr. Lawson said. “Second, create crisis management and communication plans to reduce the risk of conditioned or habitual responses. Third, design technologies and processes that don’t just plan for high availability, but also for recovery and continuity. Lastly, ensure that these recovery and continuity plans are tested often enough to prove that they work.” Empower others to be part of risk management Security leaders need controls that are appropriate for the environment and risk. They need controls that are applicable to more than just a single vendor or technology, and can change as risk and compliance landscapes evolve. “Adaptable controls are what turn security into a technology enabler,” said Ramon Krikken , research vice president at Gartner. Mr. Krikken said it’s important to empower others in the organization to greatly increase the chances of success. “Business process owners and IT teams must provide domain knowledge for effective risk management,” Mr. Krikken said. “This is to ensure that risk professionals understand the changing technology and business realities. In return, we should encourage other roles to take guidance and advice from risk professionals, so that they can incorporate risk-based thinking into their responsibilities. Transforming and scaling security this way is a win-win for everyone involved.” More information on security & risk management is available in the Gartner Special Report “The Resilience Premium of Digital Business: A Gartner Trend Insight Report.” This collection of research focuses on how committing to resilience will equip a digital business with the mindset, resources and planning to recover from inevitable disruptions. About Gartner Security & Risk Management Summit The Gartner Security & Risk Management Summit offers the latest research and to help organizations transform their security strategy and build resilience across the enterprise. This year’s event delivers leading-edge thinking on emerging technologies such as AI, machine learning, analytics, IoT and blockchain, evolving security technologies and the ever-changing threat landscape. Upcoming dates and locations for the Gartner Security & Risk Management Summit include: July 24-26, 2018, Tokyo August 14-15, Sao Paulo August 20-21, Sydney August 30-31, Mumbai September 10-11, London October 22-23, Dubai Follow news and updates from the events on Twitter at #GartnerSEC . About Gartner Gartner, Inc. (NYSE:IT), is the world's leading research and advisory company and a member of the S&P 500. We equip business leaders with indispensable insights, advice and tools to achieve their mission-critical priorities and build the successful organizations of tomorrow. Our unmatched combination of expert-led, practitioner-sourced and data-driven research steers clients toward the right decisions on the issues that matter most. We're trusted as an objective resource and critical partner by more than 15,000 organizations in more than 100 countries — across all major functions, in every industry and enterprise size. To learn more about how we help decision makers fuel the future of business, visit www.gartner.com .

Comments

Popular posts from this blog

Bureze Security News for 07-04-2018

Security Systems, Surveillance Cameras, Cellular Communications A professionally installed security system will help protect your business, employees, and property. With affordable add-on options, you can remotely control your system, as well as lights, door locks, thermostats, and more. You can even add video cameras, and view or record them on your smart phone. One system provides protection and remote control for your business. Sterling Security Systems, a locally owned company founded in 1993, offers far more than parts.  Sterling Security is an authorized Bosch & DMP dealer. Our technicians are factory trained and certified in the installation and service of Bosch & DMP equipment. Sterling Security Systems alarm monitoring centers provide protection around the clock, every day of the year. Our state-of-the-art alarm monitoring centers are so sophisticated they automatically back each other up in Fast Alarm Response Times Always On-Ca...

Bureze Security News for 04-29-2018

[embed]http://www.youtube.com/watch?v=9XLLo0025Jc[/embed]Security...or Surveillance? The Edward Snowden Interview Closed-circuit television In recent years, the use of body worn video cameras has been introduced as a new form of surveillance, often used in law enforcement, with cameras located on a police officer's chest or head. Video surveillance has generated significant debate about balancing its use with individuals' right to privacy even when in public. Special cameras for some of these purposes include line-scan cameras and thermographic cameras which allow operators to measure the temperature of the processes. With the addition of fixed cameras for the active traffic management system, the number of cameras on the Highways Agency's CCTV network is likely to increase significantly over the next few years. The cameras send the feed to a central control center where a producer selects feeds to send to the television monitors that fans can view.  New York C...

Security company in Bellevue vandalized

BELLEVUE, Neb. (KMTV) - An Omaha home security company based out of Bellevue is using its own camera to help track down a thief who stole items from outside their building. Chris Malmberg, the owner of Omaha Security Systems Inc. says an unidentified man stole nearly $300 worth of landscaping Sunday night. "The motion sensors went off and I got a notification on my phone that he was there. We saw him take the plants, we watched him drive away and then immediately contacted police," said Malmberg. "He was real nervous, but he ended up stealing shrubbery, Hosta plants, I mean - never in my life have I ever known somebody to steal landscaping." Malmberg said the plants could be replaced, but what's frustrating is that this is one of several vandalism incidents his business has experienced since OSSI moved into the building near Jefferson and Mission Ave. "We've had vandalism, we've had items stolen, or attempted to be stolen, with the security that we...