Story image

New online tool helps organisations evaluate security maturity

17 Sep 2018

Security solutions provider Secureworks has released its Security Maturity Model, a pragmatic methodology that organisations of all sizes can use to evaluate their level of cybersecurity maturity relative to inherent risk.  

Secureworks is releasing the model in response to its research which shows that more than one-third of US organisations (37%) face security risks that exceed their overall security maturity.

Within that group, 10% face a significant deficiency when it comes to protecting themselves from the threats in their environment.

To increase global awareness of the gaps between cybersecurity maturity and risk, Secureworks is offering a complimentary evaluation that organisations can take to benchmark their maturity using the Secureworks methodology. 

Cybersecurity leaders who complete an online tool with the support of a Secureworks security expert will receive a report that scores the organisation’s capabilities and behaviours across five essential cybersecurity domains.

The report also assigns a current security maturity tier and compares the organisation’s results to peer benchmarks.

Intuitive charts and graphs throughout the report can be used to identify a desired future state of maturity, prioritise next steps in the journey and support more confident discussions about cybersecurity risk management with the board.

Secureworks consulting practice leader Hadi Hosn says, “Business executives tell us they’re looking for ways to determine whether their cybersecurity capabilities and investment are in line with their business risk profile.”

“Our recent study suggests that misalignment between security activities and actual risk is common enough to warrant a more pragmatic model that can help organisations both identify those gaps and adjust their security maturity goals accordingly.”

Secureworks’ Security Maturity Model is a holistic, risk-driven approach that incorporates elements of frameworks like National Institute of Standards and Technology (NIST) and ISO 27001/02 with insight from Secureworks’ global threat intelligence, analysis of more than 1,000 incident response engagements annually and observed best practices across 4,300 clients.

Organisations who evaluate their maturity against this methodology are scored in the cybersecurity domains of security organisation and governance, security operations, cloud security, incident management and threat intelligence.

“Most frameworks come up short in helping you define the right journey to cybersecurity maturity because they don’t account for inherent risk to begin with,” says Hosn.

“Instead of relying on checklists, the Secureworks Security Maturity Model blends industry best practice frameworks with our knowledge and experience to help organisations invest resources more wisely.”

Key Findings: Secureworks Security Leadership Study

In Secureworks’ 2018 Security Leadership study, guarded companies, the least mature, were lacking the same processes that are commonly shared by resilient organisations, the most secure 7% of the respondents.

The most divergent practices between resilient and guarded organisations include:

  • Aligning and prioritising vulnerability assessments based on business goals (56% for resilient organisations vs. 2% for guarded, the least mature group)  
  • Conducting real-time automated security analysis of business partners (36% vs. 2%)  
  • Employing customised endpoint protection based on user profiles (84% vs. 3%)  
  • Including both technical and business teams in Incidence Response tabletop sessions (92% vs. 45%)  
  • Working with IR partners under retainer agreements (56% vs. 18%)  
  • Integrating threat indicators, with enhancements, into security and workflow controls (80% vs. 6%)
Ping Identity offerings accelerates cloud MFA and SSO adoption
90% of respondents trust MFA as an effective security control to protect identity data in public clouds, yet only 60% of organisations have formally adopted it.
Trend Micro introduces cloud and container workload security offering
Container security capabilities added to Trend Micro Deep Security have elevated protection across the DevOps lifecycle and runtime stack.
Veeam joins the ranks of $1bil-revenue software companies
It’s also marked a milestone of 350,000 customers and outlined how it will begin the next stage of its growth.
Veeam enables secondary storage solutions with technology partner program
Veeam has worked with its strategic technology alliance partners to provide flexible deployment options for customers that have continually led to tighter levels of integration.
Veeam Availability Orchestrator update aims to democratise DR
The ability to automatically test, document and reliably recover entire sites, as well as individual workloads from backups in a completely orchestrated way lowers the total cost of ownership (TCO) of DR.
Nuix eyes legal sector as eDiscovery demand skyrockets
eDiscovery must encompass so much more than email and documents. If you haven’t looked at text messages and online chats, digital images, mobile devices, data in the cloud and social media, you’re not getting the whole story.
EXCLUSIVE: Forcepoint global channel chief talks strategy
As a solution sold 100% via the channel, cybersecurity solutions company Forcepoint places a strong emphasis on its partner relationships.
Salesforce continues to stumble after critical outage
“To all of our Salesforce customers, please be aware that we are experiencing a major issue with our service and apologise for the impact it is having on you."