Intelligent CISO Issue 21 | Page 76

Security leaders are left with point-in-time assessments that require them to cobble together data from disparate systems to truly understand the organisation’s security posture. • Controlling coverage gaps across security functions (56%) • Viewing a comprehensive list of assets across the organisation (43%) • Collecting, normalising, aggregating, deduplicating and correlating disparate data (39%) • Tracking which assets and controls do not meet regulatory and compliance policies (39%) • Determining the effectiveness of security controls (38%) • Getting a real-time view of corporate risks (37%) • Tracking performance of security controls over time (37%) As threat levels increase, 64% of security leaders surveyed said that they are making it a high or critical priority to implement a risk framework aligning cybersecurity risk and enterprise risk. However, the study identifies that one in five do not have a centralised approach for risk management. The upshot is that we have so many security tools, we don’t know what they’re doing. Even worse, we’re burning cycles trying to work it out manually, increasingly driven by regulators. The answer is simple – automate the job. The changing cyber market dynamics have created a clear market requirement for automated continuous controls monitoring, a new category of solution that provides real-time visibility of assets. The ability to make informed operational security decisions based on trusted security data and metrics will enable security leaders to have real and validated confidence that the company and customer data is protected. u 76 Issue 21 | www.intelligentciso.com