Companies Could Try Harder at Incident Response, Survey Finds
Companies got a failing grade for their incident response plans according to a study from the Ponemon Institute and IBM recently.
The Cyber Resilient Organization report, published on April 11, surveyed over 3600 global security and IT pros, and found that 77% of them lacked a consistent incident response plan.
A robust incident response plan can help manage data breach costs, according to last year’s Cost of a Data Breach report from BM and Ponemon. It found that the average cost per lost or stolen record was $148, representing a 5% rise from $141 in 2017.
Companies with an incident response team saved $14 per record on average in costs. This was the single biggest way to reduce the cost of a breach, according to the Cost of a Data Breach report. The next most effective was encryption, which reduced the cost by $13 on average.
Insufficient staff resources could factor into companies’ lack of preparation. The Cyber Resilient Organization study revealed that companies were suffering from insufficient staffing to cope with their cybersecurity challenges. Only 30% of them said that they have enough people to achieve a high level of cyber-resilience.
IBM is pushing automation tools as a way to bridge the skills gap and introduce better cybersecurity preparation and response. Automation technologies cover tasks such as identity management and authentication, incident response platforms and security information and event management (SIEM), it said. Fewer than a quarter of all respondents had embraced these technologies in their organization, it added.
In spite of this, just over three-quarters of respondents valued automation as a way of improving cyber-resilience, rating it seven or higher on a scale of 10.
While only 23% of companies overall had an incident response plan across the entire enterprise, that figure soared to 55% among what the survey termed high performers.
These companies, representing 26% of the sample base, self-reported nine or above on a scale of 10 when rating their cyber-resilience. They typically communicated more with senior leaders about the issue, who were more educated about it and tended to provide more cybersecurity funding and staffing. These organizations also valued automation more, it found.
source infosecuritymagazine
Industry: Cyber Security News
Latest Jobs
-
- PCI QSA needed. Discreet Opportunity | London | Client facing
- London
- N/A
-
CH08421 PCI QSA needed. Discreet Opportunity | London | Client facing. Payment Card Industry - Qualified Security Assessor - London Seeking someone looking to accelerate their career, into a variety of interesting clients / projects. Must be happy to be onsite with clients- this is not a fully remote role. You must currently hold a valid CISSP or CISM or ISO27001 lead implementer certification AND one of the following; CISA, GSNA, iso27001 lead Auditor, CIA or IRCA ISMS auditor+ Visa sponsorship not available. Apply today for more information chris.holt@dclsearch.com Use this whatapp link to reach out https://wa.me/message/6USF5RAQBOZIP1
-
- Network / Security Infrastructure Engineer | West London | Permanent
- London
- N/A
-
Network / Security Infrastructure Engineer | West London | Current Config, Install, upgrade experience On prem / Datacetner experience essential. Hands on experience MUST include: Routing, Switching, Network Security (firewall, IDS etc), Microsoft exchange / Exchange 365. Scripting / automation experience wanted. Python, Powershell etc Regular travel to West London is required. Visa sponsorship not available. Apply today for more information chris.holt@dclsearch.com Use this whatapp link to reach out https://wa.me/message/6USF5RAQBOZIP1
-
- Security Operations / information Security Analyst / Engineer. London
- London
- N/A
-
Security Operations / information Security Analyst / Engineer needed for a London opportunity. A technical hands on role to investigate, escalate and proactively work to protect a globally recognised brand. Someone with SOC Analyst / security engineering background would be well suited. This position will join a small team and would suit someone that has broad experience across the security threat landscape. Experience / knowledge across industry GRC standards such NIST, ISO27001 etc very advantageous and a priority. You will work across multiple teams proactively working to secure the business. Must be able to commute to Central London 3 days a week. Visa sponsorship not available Apply today to find out more.
-
- Security Cleared Penetration Tester: United Kindom
- N/A
- N/A
-
Security Cleared Penetration Tester Deliver technical Penetration tests to the NCSC CHECK standard. Active CHECK Member or Leader status desirable either in Web Application or Infrastructure. Reach out to find out more. Whatsapp directly here https://wa.me/message/6USF5RAQBOZIP1 Or apply today