The State of Security Threat Management in 2016

January 17, 2016 • Published by

Today's IT professional is faced with managing a traditional network infrastructure while executing strategies to take advantage of emerging technologies like cloud services, mobile applications and Internet of Things (IoT) components. This evolving, complex, connected environment creates new points of vulnerability, challenging IT leaders to invest in human and technological resources at a level that will effectively detect and prevent security threats.

ControlScan has conducted all-new market study on the state of security threat management within small and medium-sized enterprises. We'll be releasing a study report in the coming weeks, but here are some preliminary findings:

  • 52 percent of in-house IT teams do not include an information security professional;
  • One-third will have the same security budget in 2016 that they had in 2014;
  • 62 percent feel their organization's security-related investments are not sufficient for their business's level of risk; and
  • Of these respondents, only 10 percent are fully confident that an intruder or malware isn’t already operating undetected within their network.

Cory Miller (CISSP, CISM), Director of ControlScan's Security Operations, and I presented a webinar highlighting these and other findings. We discussed the important security activities your IT team needs to address in 2016 and beyond.

Download our webinar Managing Security Threats as Mobile, Cloud Supplant Traditional Infrastructure replay recording and learn:

  • How to evaluate and align threat management efforts to meet the challenges of an evolving threat landscape;
  • Which best practices allow you to secure your business while simplifying compliance; and
  • How to leverage security-as-a-service to cost-effectively close any gaps.