Story image

New online tool helps organisations evaluate security maturity

17 Sep 2018

Security solutions provider Secureworks has released its Security Maturity Model, a pragmatic methodology that organisations of all sizes can use to evaluate their level of cybersecurity maturity relative to inherent risk.  

Secureworks is releasing the model in response to its research which shows that more than one-third of US organisations (37%) face security risks that exceed their overall security maturity.

Within that group, 10% face a significant deficiency when it comes to protecting themselves from the threats in their environment.

To increase global awareness of the gaps between cybersecurity maturity and risk, Secureworks is offering a complimentary evaluation that organisations can take to benchmark their maturity using the Secureworks methodology. 

Cybersecurity leaders who complete an online tool with the support of a Secureworks security expert will receive a report that scores the organisation’s capabilities and behaviours across five essential cybersecurity domains.

The report also assigns a current security maturity tier and compares the organisation’s results to peer benchmarks.

Intuitive charts and graphs throughout the report can be used to identify a desired future state of maturity, prioritise next steps in the journey and support more confident discussions about cybersecurity risk management with the board.

Secureworks consulting practice leader Hadi Hosn says, “Business executives tell us they’re looking for ways to determine whether their cybersecurity capabilities and investment are in line with their business risk profile.”

“Our recent study suggests that misalignment between security activities and actual risk is common enough to warrant a more pragmatic model that can help organisations both identify those gaps and adjust their security maturity goals accordingly.”

Secureworks’ Security Maturity Model is a holistic, risk-driven approach that incorporates elements of frameworks like National Institute of Standards and Technology (NIST) and ISO 27001/02 with insight from Secureworks’ global threat intelligence, analysis of more than 1,000 incident response engagements annually and observed best practices across 4,300 clients.

Organisations who evaluate their maturity against this methodology are scored in the cybersecurity domains of security organisation and governance, security operations, cloud security, incident management and threat intelligence.

“Most frameworks come up short in helping you define the right journey to cybersecurity maturity because they don’t account for inherent risk to begin with,” says Hosn.

“Instead of relying on checklists, the Secureworks Security Maturity Model blends industry best practice frameworks with our knowledge and experience to help organisations invest resources more wisely.”

Key Findings: Secureworks Security Leadership Study

In Secureworks’ 2018 Security Leadership study, guarded companies, the least mature, were lacking the same processes that are commonly shared by resilient organisations, the most secure 7% of the respondents.

The most divergent practices between resilient and guarded organisations include:

  • Aligning and prioritising vulnerability assessments based on business goals (56% for resilient organisations vs. 2% for guarded, the least mature group)  
  • Conducting real-time automated security analysis of business partners (36% vs. 2%)  
  • Employing customised endpoint protection based on user profiles (84% vs. 3%)  
  • Including both technical and business teams in Incidence Response tabletop sessions (92% vs. 45%)  
  • Working with IR partners under retainer agreements (56% vs. 18%)  
  • Integrating threat indicators, with enhancements, into security and workflow controls (80% vs. 6%)
Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.
Forrester names Trend Micro Leader in email security
TrendMicro earned the highest score for technology leadership, deployment options and cloud integration.
LogRhythm releases cloud-based SIEM solution
LogRhythm Cloud provides the same feature set and user experience as its on-prem experience.
One Identity named Leader in PAM and IAM by KuppingerCole
KuppingerCole lead analyst Anmol Singh evaluated the strengths and weaknesses of 20 solution providers in the PAM market for the report.
Healthcare environments difficult to secure - Forescout
The convergence of IT, Internet of Things (IoT) and operational technology (OT) makes it more difficult for the healthcare industry to manage a wide array of hard-to-control network security risks.