Intelligence and insight that transforms capabilities into results
Is your organization underspending on information security? If you’re like most, spending on information security lags far behind other priorities. Only during the past few years has spend on information security started to increase, but it still lags behind. In this Research Report, Wellington summarizes findings from research conducted with thousands of organizations to highlight
Wish you had a magic wand that could just make things right? We all have this fantasy at some time or another. But, work and life are about determination, persistence, teamwork and smart decisions, and not just the magic wand theory of life. It requires some level of effort and head scratching, and like an oyster just enough of the right scratching of that speck of sand might just result in a pearl.
Fortunately, things are not as complicated as scratching out pearls when it comes to IT security, although some make it so. Over the course of more than 7 years, we had the opportunity to conduct primary research with more than 8,000 organization to find out what differentiated outcomes experienced by these organizations as it's applicable to the IT security function. Some of the outcomes measured by the research include known instances of data theft and loss, after-the-fact later discoveries of compromise, business downtime related to integrity/attack causes, and a wide range of compliance audit deficiencies that required some form of remediation. We also tracked such things as severity level-1 vulnerabilities and results from pen-tests, and the frequency of scans and such testing.