The State of Risk-Based Security Management The State of Risk-Based Security Management

The State of Risk-Based Security Management

United States

    • 5.0 • 3 Ratings

Publisher Description

Risk-based security management (RBSM) is rapidly gaining acceptance as an essential security practice. But how far along are organizations with it? Ponemon Institute and Tripwire teamed up to explore the state of RBSM in the US. Discover the study’s key findings:


- Although organizations profess a strong commitment to RBSM, they’re taking little action


- Those organizations with a formal approach to RBSM tend to walk the talk


- Most organizations implement the appropriate preventive controls, but neglect to implement sufficient detective controls


- Position level of the respondent in the organization affects how threats rank on their "Security Fright Index"


- How perceptions of RBSM differ in the US, the UK, Germany and the Netherlands

GENRE
Computers & Internet
RELEASED
2012
December 4
LANGUAGE
EN
English
LENGTH
28
Pages
PUBLISHER
Tripwire Inc.
SELLER
Tripwire Inc.
SIZE
5.4
MB
CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition
2022
CISO Desk Reference Guide CISO Desk Reference Guide
2019
Rational Cybersecurity for Business Rational Cybersecurity for Business
2020
The Secure Board The Secure Board
2021
Managing Risk and Information Security Managing Risk and Information Security
2013
ITIL® 4 Essentials ITIL® 4 Essentials
2020
Security Vs. Convenience Security Vs. Convenience
2012
Information Security Management - ITP 370 Information Security Management - ITP 370
2014
The Myth of the Secure OS The Myth of the Secure OS
2012
The Path of Least Resistance: Computer Security Is Common Sense The Path of Least Resistance: Computer Security Is Common Sense
2012
Administration: Configuration and Security Administration: Configuration and Security
2013
Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force
2012