Study introduces a "security responsible" approach to technology innovation

Apr 30, 2014 by Ken Mcguffin

ELUS and the Rotman School of Management at The University of Toronto today released the 2014 TELUS-Rotman Security Study. Now in its sixth year, the annual survey tracks industry trends and documents the state of IT security in Canada. The 2014 report focuses on how enterprises can stay secure while making progressive innovation decisions by taking a "security responsible" approach.

Returning to a quantitative approach for this year's study, the research team surveyed more than 400 Canadian security professionals to get the pulse on trends it has been following since 2008. This year's study also includes global perspectives on the data, trends and analysis from key security thought leaders from companies including Salesforce.com, British Telecom and Cylance Inc.

"As we examined and analyzed the data, four key security best practices came into view: a strong focus on risk management, retaining the right skills and expertise within an organization, effective policies and governance, and employee education," said Dr. Walid Hejazi, professor of Business Economics, Rotman School of Management. "As our thinking crystalized, the concept of 'security responsible' emerged as the central theme of the research."

To quantify the concept of security responsible, the research team assigned a proprietary rating scale of zero to seven (with zero being the least and seven being the most responsible). Regardless of whether enterprises say 'yes' or 'no' to innovation, those that rate higher on the security responsible scale experience more security success in terms of:

  • Greater satisfaction with their security postures (mean rating of 3.8 vs. 3.2 out of 5)
  • Fewer breaches (9.5 vs. 14.9 breaches, averaged during previous 12 months)
  • Better risk management capability (mean rating of 3.6 vs. 1.5 out of 5)

However, the greatest business benefits are realized by organizations that say 'yes' to innovation in a security responsible manner; creating an environment where security and innovation both thrive.

"Canadian companies that embrace business-enabling innovations and are 'security responsible' enjoy the best of both worlds," said Hernan Barros, Director, Security Services, TELUS Security Solutions. "By taking a security responsible approach, an organization can realize productivity gains and cost savings through innovations like 'bring your own device,' social networking and cloud computing while maintaining a high level of security success."

Additionally, the report explores how security responsible organizations are more successful in the areas of employee retention, and dealing with advanced threats. The findings include:

  • Employee retention: organizations that adopt business-enabling innovations with a security responsible approach are more than three times more likely to have no difficulty retaining security staff;
  • Mobile security: while only 37 per cent of Canadian organizations take a security responsible approach to mobile security, those that do report higher satisfaction with their security postures.
  • Advanced threats: a security responsible approach to advanced threats (rigorous threat monitoring procedures) drives down breach numbers and improves satisfaction (70 per cent for those with rigorous monitoring versus 39.5 per cent for those who don't actively monitor).

"The focus on 'security responsible' is really a call to action for Canadian enterprises," continued Mr. Barros. "The data shows us that executing on security in a responsible way delivers tangible benefits in terms of security satisfaction, lower breach numbers and improved risk management – all of which are key measures of security success. It is possible for every organization to take action on these findings by evaluating how security responsible they are and identifying where they can improve."

The report includes four key recommendations to help Canadian enterprises become more security responsible:

  • Focus on risk: compliance is essential but is also the bare minimum; being risk-focused means continuously assessing the environment and understanding how a security breach could impact brand and revenue.
  • Retain the right skills: the best and brightest security professionals have high standards when it comes to what constitutes good security practices and will move on quickly from organizations that aren't security responsible enough.
  • Focus on policy diligence: proven standards and procedures offer the governance needed for technology decisions, including the adoption of business-enabling innovations.
  • Educate employees: employees play a crucial role in , so it's important that they understand policies, the rationale behind them and the pros/cons of compliance.

Explore further: Target says it ignored early signs of data breach

More information: The detailed breakdown and analysis of the data and recommendations are available online: www.telus.com/securitystudy.

add to favorites email to friend print save as pdf

Related Stories

FTC settles complaint over hacked security cameras

Sep 04, 2013

The government is settling with the marketer of Internet-connected home security cameras after feeds from consumers' homes—video from baby monitors and home security systems—were posted online for public view.

Recommended for you

What's causing the recent string of data breaches?

2 hours ago

It's Cyber Security Awareness month, which has me wondering: are we doing all we can to protect our data? To help answer this question, I sat down with Girish Bhat of Wave Systems—an important collaborator of Micron's—to ...

Court: UK spies get bulk access to NSA data

20 hours ago

The British government's insistence that its spies don't use the vast espionage powers of the U.S. National Security Agency to sidestep U.K. restrictions on domestic eavesdropping was called into question by a court document ...

Georgia Tech releases 2015 Emerging Cyber Threats Report

Oct 29, 2014

In its latest Emerging Cyber Threats Report, Georgia Tech warns about loss of privacy; abuse of trust between users and machines; attacks against the mobile ecosystem; rogue insiders; and the increasing involvement of cyberspac ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.