Presenting the Safety Outcomes Research, Quantity 2
6 mins read

Presenting the Safety Outcomes Research, Quantity 2

What should you might construct a profitable, world-class safety program with simply 5 practices?

And what if shifting focus to those areas might put your safety program forward of 79% of different organizations? Our newest cybersecurity analysis examine means that this isn’t solely true however can be a tangible actuality for organizations that select to observe some sensible steps.

Over the previous 9 months, we’ve orchestrated in-depth knowledge evaluation in opposition to our very personal prior analysis—the primary annual Safety Outcomes Research. Now, we’re excited to deliver you these findings within the report’s second version: Safety Outcomes Research,Quantity 2: Maximizing the High 5 Safety Practices.

5,100+ IT and cybersecurity professionals chart the best way ahead 

Cybersecurity groups should at all times up-level their very own know-how and methods however, with restricted time and assets, might discover themselves asking questions like: Ought to I request funds for this initiative? Ought to I dedicate time and vitality to this undertaking? There are such a lot of issues to do—what’s crucial precedence? The place do I begin?

These questions are vital to cybersecurity success, however the place do IT and safety professionals go to reply these questions? Business friends? Information shops? There’s worth in gathering opinions from these areas, however the scope is proscribed. Answering excessive stakes questions like these requires one thing else. One thing greater.

Enter the Safety Outcomes Research, Quantity 2. This vendor-agnostic cybersecurity analysis report presents a data-driven understanding of how one can obtain success in your personal safety applications. Plus, get some perception into how cybersecurity professionals are performing throughout industries.

And it’s a giant examine — the biggest we’ve got ever completed, in truth. We analyzed survey responses from 5,100+ respondents in 27 international locations, throughout dozens of industries and lots of of organizations of all sizes. We researched alongside well-respected companions, together with the Cyentia Institute, to investigate knowledge from a double-blind survey and create this unbiased, pragmatic examine.

Markets by which taking part organizations are headquartered

Suffice it to say, the conclusions drawn on this report are well-supported. It needs to be a trusted buddy of any IT and safety skilled that may reply a few of their most important questions.

What’s new with Quantity 2

In the unique Safety Outcomes Research, we examined 25 basic safety practices and examined how every observe correlates with the achievement of 12 program-level outcomes. These surveyed self-reported the areas that they felt they had been seeing success in, in addition to areas the place they struggled.

Within the first quantity of this examine, we discovered that, throughout the 25 safety practices we requested about, 5 of them stood out from the remaining: proactive tech refresh, well-integrated know-how, well timed incident response, immediate catastrophe restoration, and correct risk detection.  

So, what makes these practices vital to the success of safety applications? Within the Safety Outcomes Research, Quantity 2, we had been in a position to totally reply this query by placing these 5 key areas below the microscope. For instance, Correct Menace Detection was one in all our high drivers, however what applied sciences, processes, and staffing fashions assist obtain success on this area? Does automation and orchestration make a distinction? What about insourcing or outsourcing risk administration?

Impact of staffing fashions on perceived risk detection and incident response capabilities

Over the subsequent few months, we’ll be publishing a supporting weblog sequence, listening to from a number of of our advisory CISO workforce members, offering their commentary and proposals round every of those 5 most-effective practices. And as these blogs grow to be accessible, they’ll be linked beneath.

Right here’s what you’ll be able to count on:

1) Driving a Proactive Tech Refresh Technique
Throughout the board, organizations that observe a proactive tech refresh technique report increased charges of profitable safety outcomes. With 39% of at this time’s safety tech being thought-about outdated, refreshes and upgrades are vital to heading off threats.

2) Reaching Effectively-Built-in Tech
When safety applied sciences work collectively, organizations report a transparent enhance in safety program success. And it looks like integration is the best way of the long run, with 77% of organizations opting to purchase built-in options over constructing them in-house.

3) Getting ready for Well timed Incident Response
Sturdy incident response capabilities are a mixture of individuals, processes, and know-how. Safety applications that assemble a powerful workforce and automate main risk detection and response processes report the very best ranges of safety operations success.

4) Creating Correct Menace Detection
Sturdy risk detection capabilities may give consciousness of potential safety occasions with out main blind spots. Organizations reporting highly-integrated capabilities for figuring out property and dangers to these property boasted a lot stronger (+36%) detection and response capabilities and extra safety outcomes.

5) Making certain Immediate Catastrophe Restoration
Decrease influence of cybersecurity incidents and preserve the enterprise rolling by means of high quality restoration practices. Being proactive is essential to attaining and sustaining success. Organizations that make chaos engineering customary observe are twice as more likely to obtain excessive ranges of success for this final result.

Turning Your Cybersecurity As much as 11

Cisco Safe desires to accomplice with organizations in constructing the strongest cybersecurity practices on the planet. And our hope is that, by means of this report, organizations can decide which subsequent steps should be taken to get from level A to level B.

The info doesn’t lie. By this rigorous cybersecurity analysis, we will particularly level to how these 5 data-backed practices can bolster your cybersecurity applications and allow you to obtain higher outcomes.

Begin your journey at this time by studying the complete


We’d love to listen to what you suppose. Ask a Query, Remark Under, and Keep Related with Cisco Safe on social!

Cisco Safe Social Channels



Leave a Reply

Your email address will not be published. Required fields are marked *