Create a Solid Cybersecurity Plan

Create a Solid Cybersecurity Plan

Should you measure the maturity and performance of your security program? How often? A survey suggests 60% of CISOs (chief information security officers) measure their security programs at least once a month and 89% measure the maturity and performance of their full security program at least once each quarter. Let’s take a closer look at how they are measuring and evaluating potential threats.

The report from Onyxia Cyber surveyed more than 200 CISOs across a wide range of industries in the United States and Canada. Aspects in the survey include evaluating what metrics CISOs are measuring and how they are assessing cyber risk across multiple areas, such as incident response, vulnerability patching, and phishing simulations, as well as the overall impact of various cyber risk-management strategies.

The results from the survey are very enlightening. We see 33% of CISOs are not working toward a same-day MTTD (mean time to detect), and do not have an SLA to start working on mitigating risk within 8 hours of a breach.

What about the time to respond? MTTR (mean time to respond) is an important KPI (key performance indicator) for all security teams, as the longer the dwell time of an attack, the more catastrophic its impact. The average MTTR CISOs report is 9 hours, with the IT industry being the fastest to respond to threats, in under 7.4 hours. The financial services industry, which many expect to be ahead of the curve in security, is actually at just over 9.3 hours.

https://connectedworld.com/create-a-solid-cybersecurity-plan/

要查看或添加评论,请登录

Peggy Smedley的更多文章

  • IMTS Highlights Big Need for Collaboration in Manufacturing

    IMTS Highlights Big Need for Collaboration in Manufacturing

    At IMTS last week, in Chicago, Ill., Sharon Cobb, associate program manager, NASA, shared in her ELEVATE breakfast…

    4 条评论
  • Metaverse Teaches Our Students

    Metaverse Teaches Our Students

    For many, it is time to go back to school. Students are returning to academic life in droves.

    1 条评论
  • Are You a Deepfake Victim?

    Are You a Deepfake Victim?

    Can you trust what you are seeing online? We are headed into an election season, and I want to caution all my readers…

  • The Olympics: Drill for Data

    The Olympics: Drill for Data

    Data is the new oil, but how do we drill for it? This is the question that must be answered today, and it is something…

    1 条评论
  • Who’s Driving EVs?

    Who’s Driving EVs?

    EVs (electric vehicles) offer huge opportunities—at least that’s the hope—not just for consumers, but also for…

    2 条评论
  • When Industries Shut Down

    When Industries Shut Down

    For years, I have been sounding the horn about good cybersecurity practices because a breach can cause businesses to…

    4 条评论
  • Labor Leads Tech Revolution

    Labor Leads Tech Revolution

    If we want digital transformation to take hold in the manufacturing industry, we must consider how people, process, and…

  • When Connected Devices Stall, Ask Why

    When Connected Devices Stall, Ask Why

    Perhaps one of the best ways to improve a connected device or service would be through customer feedback. But what if…

    2 条评论
  • Gen AI Saves Our Supply Chains?

    Gen AI Saves Our Supply Chains?

    The supply chain is only becoming more complex—and every disruption creates a ripple effect that impacts other players.…

    1 条评论
  • Digital Twin Drives Data

    Digital Twin Drives Data

    Construction projects—specifically infrastructure projects—are becoming more complex than ever before. As Julien…

    2 条评论

社区洞察

其他会员也浏览了