Nuix (security intelligence and Information management) release the findings from a study conducted with Ari Kaplan Associates of select Fortune 500 corporate security officials that looks to gain insight on current and future plans to reshape & reprioritize information security practices.
The survey, which features of interesting slices of data, looks at topics such as data security policies, insider threat program practices, budgeting, employee training, data breach/potential response concerns and the outlook for 2016.
- In addition to increased regulatory oversight, % of the respondents attributed some of their spending increases to additional protections against internal hazards.
- This year, % of survey participants reported allotting % or more of their budget to insider threats.
- % reported being able to identify their critical value data and % said they were capable of detecting who retrieved that data.
- On organizations incident response testing; % reported engagement in this process multiple times per year, % tested twice annually, and % did so at least quarterly.
- % engaged in tabletop exercises and % provided actual responses to simulated threats.
- % use fear to cut down human mistakes that can lead to threats
- % of respondents said they interacted with colleagues in eDiscovery, legal, records management, and information governance daily, and % did so at least monthly.
- % advised spending more on protecting the perimeter; % allocated % or more. About a fifth of respondents earmarked % or more to perimeter protection.
[su_box title=”About Keith Lowry” style=”noise” box_color=”#336588″]Keith Lowry, is Senior Vice President of Business Threat Intelligence and Analysis at Nuix. Keith has more than 25 years of experience implementing, managing, and directing insider threat, counterintelligence, and intelligence collection programs. He is a former law enforcement officer and High-Technology Crime Unit detective with the City of San Jose California and a United States Navy Mobilized Reservist. He also served as Chief of Staff to the Deputy Under Secretary of Defense for Human intelligence, Counterintelligence and Security at the Pentagon, and as an information security consultant in the private sector.[/su_box]
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.