Remove eBook Remove Metrics Remove Security Remove Survey
article thumbnail

5 Steps for Becoming a Business-Aligned Cybersecurity Leader

Tenable

Independent business risk study shows when security and the business are aligned around agreed-upon contextual data, they deliver demonstrable results. Folks, cybersecurity is broken. Security leaders are drowning in data. Because we're missing one key piece of information: business context. Here's how to get there.

Security 101
article thumbnail

What COVID-19 Response Strategies Tell Us About the Business-Cybersecurity Disconnect

Tenable

As organizations around the world raced to develop strategies to respond to the COVID-19 pandemic, an independent business risk study shows cybersecurity leaders were largely left out. Yet, many cybersecurity leaders are still struggling to get a seat at the table. . COVID-related scams were the No.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Upskilling And Reskilling: Ready To Future-Proof Your Workforce?

Hacker Earth Developers Blog

One example of reskilling in the tech world is when a software developer decides to transition to a career in cybersecurity. To overcome this challenge, IBM decided to launch a program called the Skills Initiative that aimed to train and retrain IBM employees in high-demand skills, such as cloud computing, data analytics, and cybersecurity.

article thumbnail

Communicating Business Risk: Why Existing Cybersecurity Metrics Fall Short

Tenable

How do you communicate the business risk context of your cybersecurity program to your organization’s C-level executives? This is a question I grapple with every day in my role as a cybersecurity leader. This is not to suggest that security leaders are doing something wrong. How do we calculate cyber risk?

Metrics 108
article thumbnail

What You Need to Understand About SaaS Buyer Expectations

IDC

IDC recently completed its world-wide survey of 3000 SaaS buyers , spanning 14 countries and several dozen industries. The survey product, known as IDC’s SaaSPath , is designed to capture three main objectives: Understand the Mind of the SaaS Buyer , including their wants, needs, fears, and priorities. trusted brand. ease of use.

Survey 40
article thumbnail

Technology Trends for 2023

O'Reilly Media - Ideas

It’s gratifying when we see an important topic come alive: zero trust, which reflects an important rethinking of how security works, showed tremendous growth. But it’s important to recognize the metric’s shortcomings; as George Box (almost) 1 said, “All metrics are wrong, but some are useful.” Total platform usage grew by 14.1%

Trends 136
article thumbnail

Tenable Lumin: Translating Vulnerability Management Into the Language of Business

Tenable

Indeed, a survey of more than 2,400 cybersecurity and IT leaders conducted by Ponemon Institute reveals that 58 percent of respondents say traditional KPIs or metrics for evaluating business risks cannot be used to understand cyber risks. Lumin uses a variety of metrics to help users understand the following: .