Security: Easy answers. Pesky details. And 7 ways we can help you.

Security: Easy answers. Pesky details. And 7 ways we can help you.

May 3, 2017

by Stacy Leidwinger

With cyber and insider threats growing, organizations are forced to spend more on protecting their digital assets and information. When Gartner asked senior IT leaders about their plans to invest in security in 2017, they found that spend on information security is expected to reach $90 billion in 2017.

I speak to senior IT and security leaders, too. Maybe not as many as Gartner, and maybe my business card isn’t as impressive. But I talk to them often. And when I ask them about whether to invest more in security, the answer is a collective “Duh!” But there’s much less clarity when I ask them what solutions their specific investments require to meet their security goals. 

And along the way, I consistently hear that regardless of where they invest, they need to ensure that their new security project does not fall victim to: 

  1. Increasing the overall costs of delivering IT services
  2. Adding complexity to managing and delivering IT services
  3. Hampering productivity by hindering the overall user experience

Truly, the devil is in the details. Here’s the bottom line as my security colleagues see it. How do we choose the next, most impactful security initiatives to focus on – without raising cost and complexity, and while preserving the user experience?

Let’s Talk about 7 Easy Questions

We at RES have put together a seven-question checklist of essential security questions. Compiled from countless dialogues with security experts, IT professionals, leading solution partners and software experts, these seven questions can help you identify your most important investment areas – based on where you are today with your security-related systems. They will guide you towards greater security without sacrificing cost, simplicity or user experience.

It’s no surprise - given RES leadership in making technology and security practices easier to deploy and manage through our understanding of worker context, identity and behavior - we’ve found that many of the same behaviors that drive operational excellence can also put your organization at high risk of security breaches.

Think about how you offboard workers today, how you respond to access requests for new apps, and approve elevated admin rights for critical systems. Then evaluate our seven questions and ask yourself: what more can I do to meet the needs of my workforce – while reducing our risks of cyber threats?

Yes… No… Err, let me think about that one

Like many surveys, the RES seven-question security checklist will not always be a simple “yes” or “no.” Sometimes “kinda" and “not completely” are your best answers. Just go through the questions and answer with honesty – and ideally, do so while having an open discussion with those in your team. As you do so, if you find a gap, then check out www.res.com/security. Here you can learn more how context-aware access controls and automation may just help change “kinda” to “yes” – without too much overhead on your organization and workforce.

But whatever you do, take a look at our seven questions. And give them some deep thought, together with your trusted colleagues. It just might spark the conversation you need to shine a bright light on your best path forward. I look forward to hearing your feedback on our 7 Essential Security Question Checklist.