Story image

New online tool helps organisations evaluate security maturity

17 Sep 18

Security solutions provider Secureworks has released its Security Maturity Model, a pragmatic methodology that organisations of all sizes can use to evaluate their level of cybersecurity maturity relative to inherent risk.  

Secureworks is releasing the model in response to its research which shows that more than one-third of US organisations (37%) face security risks that exceed their overall security maturity.

Within that group, 10% face a significant deficiency when it comes to protecting themselves from the threats in their environment.

To increase global awareness of the gaps between cybersecurity maturity and risk, Secureworks is offering a complimentary evaluation that organisations can take to benchmark their maturity using the Secureworks methodology. 

Cybersecurity leaders who complete an online tool with the support of a Secureworks security expert will receive a report that scores the organisation’s capabilities and behaviours across five essential cybersecurity domains.

The report also assigns a current security maturity tier and compares the organisation’s results to peer benchmarks.

Intuitive charts and graphs throughout the report can be used to identify a desired future state of maturity, prioritise next steps in the journey and support more confident discussions about cybersecurity risk management with the board.

Secureworks consulting practice leader Hadi Hosn says, “Business executives tell us they’re looking for ways to determine whether their cybersecurity capabilities and investment are in line with their business risk profile.”

“Our recent study suggests that misalignment between security activities and actual risk is common enough to warrant a more pragmatic model that can help organisations both identify those gaps and adjust their security maturity goals accordingly.”

Secureworks’ Security Maturity Model is a holistic, risk-driven approach that incorporates elements of frameworks like National Institute of Standards and Technology (NIST) and ISO 27001/02 with insight from Secureworks’ global threat intelligence, analysis of more than 1,000 incident response engagements annually and observed best practices across 4,300 clients.

Organisations who evaluate their maturity against this methodology are scored in the cybersecurity domains of security organisation and governance, security operations, cloud security, incident management and threat intelligence.

“Most frameworks come up short in helping you define the right journey to cybersecurity maturity because they don’t account for inherent risk to begin with,” says Hosn.

“Instead of relying on checklists, the Secureworks Security Maturity Model blends industry best practice frameworks with our knowledge and experience to help organisations invest resources more wisely.”

Key Findings: Secureworks Security Leadership Study

In Secureworks’ 2018 Security Leadership study, guarded companies, the least mature, were lacking the same processes that are commonly shared by resilient organisations, the most secure 7% of the respondents.

The most divergent practices between resilient and guarded organisations include:

  • Aligning and prioritising vulnerability assessments based on business goals (56% for resilient organisations vs. 2% for guarded, the least mature group)
     
  • Conducting real-time automated security analysis of business partners (36% vs. 2%)
     
  • Employing customised endpoint protection based on user profiles (84% vs. 3%)
     
  • Including both technical and business teams in Incidence Response tabletop sessions (92% vs. 45%)
     
  • Working with IR partners under retainer agreements (56% vs. 18%)
     
  • Integrating threat indicators, with enhancements, into security and workflow controls (80% vs. 6%)
Stepping up to sell security services in A/NZ
WatchGuard Technologies A/NZ regional director gives his top tips on how to make a move into the increasingly lucrative cybersecurity services market.
Huawei founder publically denies spying allegations
“After all the evidence is made public, we will rely on the justice system.”
Chch crypto-exchange Cryptopia suffers breach
Cryptopia has reportedly experienced a security breach that has taken the entire platform offline – and resulted in ‘significant losses’.
IoT breaches: Nearly half of businesses still can’t detect them
The Internet of Thing’s (IoT’s) rapid rise to prominence may have compromised its security, if a new report from Gemalto is anything to go by.
Carbon Black: What does cybersecurity have in store for 2019?
Tom Kellerman has shared five insights for the year ahead, including a particularly bold one.
Hands-on review: The Ekster Wallet protects your cards against RFID attacks
For some time now, I’ve been protecting my credit cards with tinfoil. The tinfoil hat does attract a lot of comments, but thanks to Ekster, those days are now happily behind me.
Report on SingHealth breach condemns poor security practices
The 2018 Singapore SingHealth data breach was poorly managed and riddled with vulnerabilities from the start.
Tesla wants people to hack its Model 3
Tesla is offering white hat hackers what could be the chance of a lifetime – the opportunity to hack one of its Model 3 vehicles.