What keeps security professionals up at night?

What do information security professionals consider the biggest threat to their systems and businesses? According to interviews conducted as part of a recent study commissioned by Unisys Corp., the security issue most responsible for disrupting the sleep of top security executives is employee negligence or abuse of data warehouses or systems (97 per cent). Insufficient resources to get the job done right (90 per cent) is a close second.

About 80 per cent of respondents felt that outsourcing IT and data management activities in order to reduce costs created additional information security risks that were not being managed adequately.

Surprisingly, fewer (70 per cent of respondents) indicated that a catastrophic attack on IT infrastructure, including sophisticated viruses and expert hacker penetration was of most concern.

Table 1

Security Issues of Most Concern – per cent

Employee negligence or abuse – 97 per cent

Insufficient resources to get job done right – 90 per cent

Proliferation of outsourced IT and data management – 80 per cent

Open patches and holes in application software – 73 per cent

Catastrophic attack on IT infrastructure – 70 per cent

Due to the lack of corporate resources, about 73 per cent of participants in the study felt that they did not have the staff to administer known security holes or patches to existing software systems. Table 1 provides a ranking of the top five concerns of today’s security professionals.

“One of the most salient findings is that IT professionals must manage complex privacy and data protection issues with tighter budgets and fewer resources,” says Janice Burg-Levi, Global Strategic Marketing VP for Unisys.

Unisys conducted in-depth interviews with 34 information security professionals who have the most direct responsibility for information technology security services and planning in their organizations. The largest companies in financial, public, transportation and general commercial industries are represented in the study. Interviews were conducted between December 2002 and February 2003.

Measures to Manage Risk

Table 2 summarizes the five most frequently cited measures taken over the past 12 months to improve the information security function or to reduce data protection risk. Because employee negligence or abuse was by far the greatest concern, the vast majority of experts have implemented or revised security policies and standard operating procedures. In fact, a large group of respondents have implemented information security training programs for key personnel – i.e., those who handle, use or secure confidential, sensitive or private information. Along these lines, some companies viewed certification programs such as the CISSP, as a major goal for providing education for security professionals.

Many of the information security professionals interviewed (67 per cent) have conducted company-wide vulnerability assessments to identify gap areas and, possibly, to set priorities for managing risk. Such tests often included deliberate penetration tests to determine efficiency and effectiveness of perimeter controls such as firewalls, intrusion detection systems and VPN secure channels.

Table 2

How Companies Are Managing Risk – per cent

Revised security policies and procedures (SOPs) – 93 per cent

Training program for key personnel – 83 per cent

Conducted vulnerability and penetration assessments – 67 per cent

Improved access and authentication controls – 57 per cent

Appointment of high level information security officer – 53 per cent

More than 57 per cent of respondents indicated that identity management activities, including access controls and authentication, as a major area of improvement over the past year. Another 53 per cent of individuals viewed the appointment of a high level officer, often called the chief information security officer or CISO, as a major improvement in the company’s security infrastructure.

Greater Risks but Tighter Budgets

The interviews revealed frustration with the lack of funds for preventative security measures. In fact, some commented that the lack of resources is causing them to make tough allocation decisions that may leave the company’s critical infrastructure vulnerable.

While budgets reported for security and privacy vary widely (from US$500,000 to $25,000,000), the largest budgets are granted to those security professionals in such regulated industries as banking and pharma/healthcare.

Some of the greatest strains to the budget include hiring and keeping the most talented staff, conducting training and awareness programs for key personnel, keeping up with the plethora of new tools that might enhance security controls, and implementing systems that help manage customer or employee preferences for privacy.

Best Practices Based on Real World Experience

During the interviews, the security professionals shared what they believed to be good information security practices that complex business organizations should implement or maintain. These best practices include the following:

– Integrate information security management with other corporate compliance initiatives. It is important to combine key functions or activities with the company’s privacy, corporate compliance and internal audit initiatives.

– The CISO should report directly to senior management with periodic update reports to the CEO or Board. Information security must be owned by a member of senior management (such as the CIO or CFO) in order to get enough budget authority to get their job done “right”.

– Introduce enabling technologies that help prevent common threats to data security and privacy. While new technologies in perimeter control, connectivity and authentication could be of enormous value in mitigating security risks, many of these products are not being used due to limited time and budgets.

– Empower local information security managers. Because the IT infrastructure in many companies is decentralized, it is important to have employees in various autonomous IT units own responsibility for information security management. Obviously, this will require a dotted line to the company’s CISO in order to ensure accountability and control resources.

– Create the best possible training program. As previously noted, internal employee negligence is a major cause for serious security breaches. There is a real need for teaching employees the “dos and don’ts” of information security. Good training also can infuse the company with a culture that promotes personal accountability for safeguarding confidential or sensitive information (including paper files) and IT equipment.

– Conduct vigorous internal monitoring of information security process and controls. Many of the IS professionals interviewed acknowledged the importance of keeping a vigilant eye on the IT and data management infrastructure. They shared very positive experiences that resulted from third-party audits – including the early identification of serious security holes and potential regulatory compliance breaches.

Looking Ahead

While participants in the study listed numerous challenges to maintaining the security of their systems and complying with new privacy regulations, they also noted that these challenges offered new opportunities for their profession.

They believe senior management is becoming more sensitive to security risks. Further, there is the growing realization that superior privacy practices can build trust and enhance the organization’s reputation in the marketplace. As a result, security professionals are hopeful that they can turn today’s security and privacy threats into tomorrow’s business opportunities.

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

Related Tech News

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Featured Reads