当前位置:网站首页>Data security is a competitive advantage. How can companies give priority to information security and compliance
Data security is a competitive advantage. How can companies give priority to information security and compliance
2022-07-29 01:45:00 【Super technology】
Business Management Association (EMA) New research conducted examines the impact of compliance budgeting on security policies and priorities . It describes the areas where the company prioritizes information security and compliance , Which leaders control information security spending , How compliance has changed the overall security strategy of the organization , And the solutions and tools that the organization focuses its technology spending on .

Compliance priorities
The survey results cover three key areas of the organization's security and compliance status : Information security and IT Audit and compliance , Data security and data privacy as well as security and compliance expenditures .
A key point is , Merging security and compliance priorities can address regulatory control gaps , At the same time, improve the safety of the organization . Interviewees revealed about how they deal with compliance , Views on who is responsible for compliance and safety responsibilities and the safety challenges related to compliance faced by the organization .
“ This study confirms our long-standing theory , That is, when security and compliance have a unified strategy and vision , Every department and employee in the organization will benefit , The same is true of business customers ,”EMA The managing director Christopher M. Steffen say ,“ Most organizations regard compliance and compliance related activities as “ Business costs ”, This is what they must do when doing business in some markets . More and more organizations with forward-looking thinking are looking for ways to maximize their market competitive advantage , And having a first-class data privacy plan or compliance plan is of interest to smarter customers , Especially in organizations with global influence . Compliance is no longer a “ bet ” The idea of : In a very tight market , A comprehensive compliance plan focused on data security and privacy may be different , And it is usually the decisive factor for an organization to choose one supplier rather than another .”
Other findings :
Companies find that they need to change their information security policies to address compliance priorities (93%).
Information security and IT Compliance priorities are usually consistent (89%).
The existing security tools must solve the problem of data privacy in the future (76%).
Manage multiple of the organization IT The environment and the control measures to control these environments are IT The biggest challenge in the area of audit and compliance (39%).
Data security and privacy
Data security and privacy are at the core of information security and compliance . According to this study , Data privacy regulations , As in the European Union 《 General data protection regulations 》 or 《 California consumer privacy act 》, Is a major consideration for business and technology leaders . In the absence of a national privacy referendum , Five states have enacted personal privacy laws . Other results include :
The organization believes that , Implementing important data privacy programs is a competitive advantage (75%).
Organizations use or are seeking to use compliance programs as a competitive advantage (68%).
Respondents are looking for tools to address data privacy controls (75%).
Companies are changing their organization's approach to information security , To address data privacy regulations (59%).
Companies use data classification or security centric methods to protect data privacy (54%).
Data security, tools and data encryption are the biggest security challenges they face (38%).
Safety and compliance expenditure
Given the growing concern about maintaining compliance , The study found that , The company has invested heavily in data security and privacy tools , And it's not surprising to spend the least on single point solutions . Besides , CIO (CIO) Probably responsible for security and IT Compliance investment budget .CISO( Security ) And the chief compliance officer ( compliance ) Have a significant impact on their respective budgets . Further insights include :
At present, the company may make significant investments in data privacy and data loss protection (98%).
The number of respondents increased IT, Information security and IT Compliance investment (75%).
Most information security budgets fall between 5 Ten thousand dollars sum 500 Between ten thousand dollars (61%), stay IT Auditing and compliance are roughly the same (58.8%).
Future information security and security consulting (74%) as well as IT Audit and compliance (66%) Our budget will increase moderately or slightly .
“ Data responsibility is a competitive advantage . just as EMA As this study reveals , The company realizes that it is important to adjust security and compliance resources ,“Baffle CEO Ameesh Divatia say .“ The good news is that ,IT Practitioners attach great importance to compliance , This mindset is shaping their security strategies and investments . This environment is very suitable for innovation , Because these practitioners have evaluated tools to improve their security to comply with data privacy regulations . As data privacy regulations synchronize compliance with security , The work done now to manage the complexity of compliance will only benefit the organization and its business customers in the long run .
The original is translated from helpnetsecurity, Super technology translation , Please indicate the source and original text of the reprint of the cooperation site. The translator is super technology !
Hi, I'm super technology
Super technology is an information security expert , Can defend without upper limit DDos Attack and CC attack , Alibaba cloud strategic partner !
边栏推荐
- About df['a column name'] [serial number]
- Docuware mobile labor solution can help you build a new productivity model: anytime, anywhere, any device
- 明日无限计划,2022某公司元宇宙产品发布会活动概念策划方案
- HCIA配置实例(eNSP)
- How to choose professional, safe and high-performance remote control software
- Super technology network security risk assessment service, comprehensively understand the security risks faced by the network system
- Basic label in body
- 地下水、土壤、地质、环境人看过来
- Reinforcement learning (III): dqn, nature dqn, double dqn, with source code interpretation
- 10 major network security incidents in the past 10 years
猜你喜欢

T-sne降维

了解网址url的组成后 运用url模块、querystring模块和mime模块完善静态网站

body中基本标签

如何选择专业、安全、高性能的远程控制软件

golang run时报undefined错误【已解决】
![[hcip] two mGRE networks are interconnected through OSPF (ENSP)](/img/fe/8bb51ac48f52d61e8d31af490300bb.png)
[hcip] two mGRE networks are interconnected through OSPF (ENSP)

规划数学期末考试模拟二

J9 number theory: what factors determine the value of NFT?

Nacos installation guide on win system

Six noteworthy cloud security trends in 2022
随机推荐
科研环境对人的影响是很大的
Openpyxl library fill color
Docker compose install MySQL
我们总结了 3 大Nacos使用建议,并首次公开 Nacos 3.0 规划图 Nacos 开源 4 周年
Lombook User Guide
About df['a column name'] [serial number]
BOM系列之window对象
Django reports an error using pymsql module django.db.utils.operationalerror
【观察】三年跃居纯公有云SaaS第一,用友YonSuite的“飞轮效应”
What is the ISO assessment? How to do the waiting insurance scheme
golang run时报undefined错误【已解决】
[hcip] MPLS Foundation
Embedded sharing collection 23
第二轮Okaleido Tiger热卖的背后,是背后生态机构战略支持
Focus on differentiated product design, intelligent technology efficiency improvement and literacy education around new citizen Finance
Understand all the basic grammar of ES6 in one article
Redis installation, cluster deployment and common tuning
Analyze OP based on autoware_ global_ Planner global path planning module re planning
Behind the second round of okaleido tiger sales is the strategic support of ecological institutions
围绕新市民金融聚焦差异化产品设计、智能技术提效及素养教育