当前位置:网站首页>Data security is a competitive advantage. How can companies give priority to information security and compliance
Data security is a competitive advantage. How can companies give priority to information security and compliance
2022-07-29 01:45:00 【Super technology】
Business Management Association (EMA) New research conducted examines the impact of compliance budgeting on security policies and priorities . It describes the areas where the company prioritizes information security and compliance , Which leaders control information security spending , How compliance has changed the overall security strategy of the organization , And the solutions and tools that the organization focuses its technology spending on .

Compliance priorities
The survey results cover three key areas of the organization's security and compliance status : Information security and IT Audit and compliance , Data security and data privacy as well as security and compliance expenditures .
A key point is , Merging security and compliance priorities can address regulatory control gaps , At the same time, improve the safety of the organization . Interviewees revealed about how they deal with compliance , Views on who is responsible for compliance and safety responsibilities and the safety challenges related to compliance faced by the organization .
“ This study confirms our long-standing theory , That is, when security and compliance have a unified strategy and vision , Every department and employee in the organization will benefit , The same is true of business customers ,”EMA The managing director Christopher M. Steffen say ,“ Most organizations regard compliance and compliance related activities as “ Business costs ”, This is what they must do when doing business in some markets . More and more organizations with forward-looking thinking are looking for ways to maximize their market competitive advantage , And having a first-class data privacy plan or compliance plan is of interest to smarter customers , Especially in organizations with global influence . Compliance is no longer a “ bet ” The idea of : In a very tight market , A comprehensive compliance plan focused on data security and privacy may be different , And it is usually the decisive factor for an organization to choose one supplier rather than another .”
Other findings :
Companies find that they need to change their information security policies to address compliance priorities (93%).
Information security and IT Compliance priorities are usually consistent (89%).
The existing security tools must solve the problem of data privacy in the future (76%).
Manage multiple of the organization IT The environment and the control measures to control these environments are IT The biggest challenge in the area of audit and compliance (39%).
Data security and privacy
Data security and privacy are at the core of information security and compliance . According to this study , Data privacy regulations , As in the European Union 《 General data protection regulations 》 or 《 California consumer privacy act 》, Is a major consideration for business and technology leaders . In the absence of a national privacy referendum , Five states have enacted personal privacy laws . Other results include :
The organization believes that , Implementing important data privacy programs is a competitive advantage (75%).
Organizations use or are seeking to use compliance programs as a competitive advantage (68%).
Respondents are looking for tools to address data privacy controls (75%).
Companies are changing their organization's approach to information security , To address data privacy regulations (59%).
Companies use data classification or security centric methods to protect data privacy (54%).
Data security, tools and data encryption are the biggest security challenges they face (38%).
Safety and compliance expenditure
Given the growing concern about maintaining compliance , The study found that , The company has invested heavily in data security and privacy tools , And it's not surprising to spend the least on single point solutions . Besides , CIO (CIO) Probably responsible for security and IT Compliance investment budget .CISO( Security ) And the chief compliance officer ( compliance ) Have a significant impact on their respective budgets . Further insights include :
At present, the company may make significant investments in data privacy and data loss protection (98%).
The number of respondents increased IT, Information security and IT Compliance investment (75%).
Most information security budgets fall between 5 Ten thousand dollars sum 500 Between ten thousand dollars (61%), stay IT Auditing and compliance are roughly the same (58.8%).
Future information security and security consulting (74%) as well as IT Audit and compliance (66%) Our budget will increase moderately or slightly .
“ Data responsibility is a competitive advantage . just as EMA As this study reveals , The company realizes that it is important to adjust security and compliance resources ,“Baffle CEO Ameesh Divatia say .“ The good news is that ,IT Practitioners attach great importance to compliance , This mindset is shaping their security strategies and investments . This environment is very suitable for innovation , Because these practitioners have evaluated tools to improve their security to comply with data privacy regulations . As data privacy regulations synchronize compliance with security , The work done now to manage the complexity of compliance will only benefit the organization and its business customers in the long run .
The original is translated from helpnetsecurity, Super technology translation , Please indicate the source and original text of the reprint of the cooperation site. The translator is super technology !
Hi, I'm super technology
Super technology is an information security expert , Can defend without upper limit DDos Attack and CC attack , Alibaba cloud strategic partner !
边栏推荐
- Openpyxl border
- Analysys analysis: focus on users, improve the user experience of mobile banking, and help the growth of user value
- 围绕新市民金融聚焦差异化产品设计、智能技术提效及素养教育
- 新1688 API 接入说明
- 拼多多众多 API 接口皆可使用
- 一文读懂Okaleido Tiger近期动态,挖掘背后价值与潜力
- What are source code, inverse code and complement code
- 【Web技术】1395- Esbuild Bundler HMR
- Six simple techniques to improve the value of penetration testing and save tens of thousands of yuan
- [search] - iteration deepening / bidirectional dfs/ida*
猜你喜欢

【搜索】—— DFS之剪枝与优化

Reinforcement learning (I): Q-learning, with source code interpretation

我们总结了 3 大Nacos使用建议,并首次公开 Nacos 3.0 规划图 Nacos 开源 4 周年

C language 300 lines of code to achieve mine sweeping (deployable + markable + changeable difficulty level)

After understanding the composition of the URL of the website, we use the URL module, querystring module and mime module to improve the static website

SQL question brushing: find the employee number EMP with more than 15 salary records_ No and its corresponding recording times t

TypeError: can only concatenate str (not “int“) to str

Cross modal alignment 20220728

DSP震动座椅

【HCIP】MGRE环境下OSPF实验,含多进程双向重发布及OSPF特殊区域
随机推荐
规划数学期末考试模拟二
C language 300 lines of code to achieve mine sweeping (deployable + markable + changeable difficulty level)
梅克尔工作室——HarmonyOS实现列表待办
【GoLang】同步锁 Mutex
Analyze OP based on autoware_ global_ Planner global path planning module re planning
Cloud native application comprehensive exercise
[hcip] OSPF experiment under mGRE environment, including multi process bidirectional republication and OSPF special area
Canal real-time parsing MySQL binlog data practice
We summarized the three recommendations for the use of Nacos and first published the Nacos 3.0 plan for the 4th anniversary of the open source of Nacos
mysql的执行顺序
Super technology network security risk assessment service, comprehensively understand the security risks faced by the network system
Sigma-DSP-OUTPUT
Analysys analysis: focus on users, improve the user experience of mobile banking, and help the growth of user value
Introduction to Elmo, Bert and GPT
PLATO上线LAAS协议Elephant Swap,用户可借此获得溢价收益
Plato launched the LAAS protocol elephant swap, which allows users to earn premium income
Basic label in body
[机缘参悟-54]:《素书》-1-事物缘起[原始章第一]:大道至简。
Analysis of Multi Chain use cases on moonbeam -- review of Derek's speech in Polkadot decoded 2022
Reinforcement learning (II): SARS, with code rewriting