<$BlogRSDUrl$>
 

This page is powered by Blogger. Isn't yours?

 Feedblitz email:
 RSS: http://linkingintegrity.blogspot.com/atom.xml

 

linking INTEGRITY

Integrity - use of values or principles to guide action in the situation at hand.

Below are links and discussion related to the values of freedom, hope, trust, privacy, responsibility, safety, and well-being, within business and government situations arising in the areas of security, privacy, technology, corporate governance, sustainability, and CSR.

Insider Threats Tied to Lack of Executive Awareness: Ponemon Institute Study, 16.9.06

Wire services: Ponemon Institute Study


New Study Links Inadequate Resources and Leadership to Increased Insider Threats

ArcSight Privacy and information management research firm the Ponemon Institute andArcSight, Inc., a global leader in Enterprise Security Management (ESM) software, today released a new study showing that IT security professionals believe poor leadership at the executive level, coupled with a lack of accountability, is a major contributor to the breakdown in corporate data integrity. The study, National Survey on Managing the Insider Threats, is drawn from the responses of more than 450 U.S.-based IT security professionals, and points to resource and leadership failures as a primary cause of employee complacency, negligence and malicious behaviour resulting in both intentional and inadvertent compromise of business and personal information.

Ponemon Institute The study, sponsored by ArcSight, examines experienced IT security professionals' opinions related to the causes, responses and solutions to the insider threat to data integrity. For the purposes of the study, "insider threat" is defined as the misuse or destruction of sensitive or confidential information, as well as IT infrastructure that houses this data, by employees, contractors and others with access to sensitive or confidential information. The National Survey on Managing the Insider Threats found that:

  • More than 78% of respondents reported one or more unreported insider-related security breaches within their company.
  • 93% of respondents attributed lack of resources and 81% of respondents cited lack of accountability as two primary contributing factors to poor data security.
  • Respondents ranked the top three threats to data integrity as:
    • Missed or failed security patches on critical applications
    • Accidental or malicious insider misuse of sensitive or confidential data
    • Virus, malware, and spyware infections
  • 89% view insider threats as serious, yet only 49% think CEOs have the same perception.

Copies of Survey on Managing the Insider Threat are available through the Ponemon Institute and through ArcSight.


Comments

Post a Comment

 

Google

Integrity Incorporated

Site Feed

 Feedblitz email:


 RSS: http://linkingintegrity.blogspot.com/atom.xml


"We shall need compromises in the days ahead, to be sure. But these will be, or should be, compromises of issues, not principles. We can compromise our political positions, but not ourselves. We can resolve the clash of interests without conceding our ideals. And even the necessity for the right kind of compromise does not eliminate the need for those idealists and reformers who keep our compromises moving ahead, who prevent all political situations from meeting the description supplied by Shaw: "smirched with compromise, rotted with opportunism, mildewed by expedience, stretched out of shape with wirepulling and putrefied with permeation.
Compromise need not mean cowardice. .."

John Fitzgerald Kennedy, "Profiles in Courage"

Archives

07.03   08.03   09.03   10.03   11.03   12.03   01.04   02.04   03.04   04.04   05.04   06.04   07.04   08.04   09.04   10.04   11.04   12.04   01.05   02.05   03.05   04.05   05.05   06.05   07.05   08.05   09.05   10.05   11.05   12.05   01.06   02.06   03.06   04.06   05.06   06.06   08.06   09.06   10.06   11.06   01.07   02.07   03.07   04.07   07.07   08.07   09.07   10.07   05.08   06.08