Companies Could Try Harder at Incident Response, Survey Finds
Companies got a failing grade for their incident response plans according to a study from the Ponemon Institute and IBM recently.
The Cyber Resilient Organization report, published on April 11, surveyed over 3600 global security and IT pros, and found that 77% of them lacked a consistent incident response plan.
A robust incident response plan can help manage data breach costs, according to last year’s Cost of a Data Breach report from BM and Ponemon. It found that the average cost per lost or stolen record was $148, representing a 5% rise from $141 in 2017.
Companies with an incident response team saved $14 per record on average in costs. This was the single biggest way to reduce the cost of a breach, according to the Cost of a Data Breach report. The next most effective was encryption, which reduced the cost by $13 on average.
Insufficient staff resources could factor into companies’ lack of preparation. The Cyber Resilient Organization study revealed that companies were suffering from insufficient staffing to cope with their cybersecurity challenges. Only 30% of them said that they have enough people to achieve a high level of cyber-resilience.
IBM is pushing automation tools as a way to bridge the skills gap and introduce better cybersecurity preparation and response. Automation technologies cover tasks such as identity management and authentication, incident response platforms and security information and event management (SIEM), it said. Fewer than a quarter of all respondents had embraced these technologies in their organization, it added.
In spite of this, just over three-quarters of respondents valued automation as a way of improving cyber-resilience, rating it seven or higher on a scale of 10.
While only 23% of companies overall had an incident response plan across the entire enterprise, that figure soared to 55% among what the survey termed high performers.
These companies, representing 26% of the sample base, self-reported nine or above on a scale of 10 when rating their cyber-resilience. They typically communicated more with senior leaders about the issue, who were more educated about it and tended to provide more cybersecurity funding and staffing. These organizations also valued automation more, it found.
source infosecuritymagazine
Industry: Cyber Security News
Latest Jobs
-
- London Sales Manager, Key Clients. Security. Immediate
- London
- N/A
-
London Sales Manager, Key Clients A senior sales leadership role within the cyber security services and technology market, focused on account development and revenue growth across key clients. You will lead a sales team with responsibility for customer retention, increasing share of wallet and maintaining a strong commercial pipeline. The role works closely with technical, delivery and marketing teams, as well as technology partners. Key focus Lead and coach a field based sales team Own forecasting, pipeline quality and revenue delivery Drive renewals and account development Expand customer investment across services and solutions Build relationships with vendors and partners Background Proven experience managing enterprise sales teams Consistent performance against revenue targets Cyber or IT security sales leadership experience Exposure to Palo Alto, Check Point, Microsoft, etc Commercially focused with a structured sales approach A role for a sales leader focused on long term client value and sustainable growth.
-
- Outside IR35 Functional tester - London - Security Cleared
- London
- Outside IR35
-
Outside IR35 Functional tester - London - Security Cleared Willing to undergo DV Clearance 3 days a week onsite. (London) We are looking for a Functional Test Specialist to support a complex technology programme where accuracy and delivery assurance matter. Key Focus Validate application behaviour and run functional test scenarios Identify risk, defects, and delivery issues early Define practical test approaches and environment needs Produce automated checks where appropriate Work closely with technical teams to agree acceptance criteria Report clearly on outcomes, defects, and risks Experience Needed Strong Microsoft stack exposure Experience supporting server or infrastructure migrations Solid functional testing background Comfortable working remotely onsite (London 3 days a week) Linux or container exposure Jira / Wiki Restricted or isolated environments A hands on role for someone who values clarity, ownership, and quality.
-
- GRC Security Consultant - Energy. Security Clearable. Scotland
- Glasgow
- N/A
-
GRC Security Consultant - Utilities. OT. Security Clearable. Scotland Hybrid (UK | Remote) We need a We need a Senior GRC consultant with experience in the utilities sector. Previous experience working within Critical National Infrastructure (CNI) industries, specifically within Operational Technology is essential. Security clearance / (clearable) required. Current external consultancy experience preferred but not essential. You will be leading lead audits and advisory services (risk assessment / strategic) against CAF, ISO 27001, and IEC 62443 standards to uplift security. This is a permanent position, looking for someone who wants to make a difference away from a firm with progression and no politics. Apply today to find out more.