{"id":1781,"date":"2005-01-05T00:00:00","date_gmt":"2005-01-05T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/01\/05\/a-long-way-to-grow\/"},"modified":"2021-12-30T11:39:59","modified_gmt":"2021-12-30T11:39:59","slug":"a-long-way-to-grow","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/01\/05\/a-long-way-to-grow\/","title":{"rendered":"A Long Way to Grow"},"content":{"rendered":"<p>First results from a new security management survey indicate that many companies have only rudimentary practices in place<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The charts on the following pages reflect first results from the Security Capability Model, a survey tool codeveloped by CSO and Carnegie Mellon University&#8217;s CERT Coordination Center (CERT\/CC) to help respondents compare their security processes&#8212;particularly pertaining to information security&#8212;with those of other organizations.<\/p>\n<p>The Security Capability Model obviously draws some inspiration from the Capability Maturity Model (CMM), a rigorous tool for process management in software application development created by CMU&#8217;s well-known Software Engineering Institute (SEI).<\/p>\n<p>They don&#8217;t yet feel there&#8217;s a long enough history&#8221; to clearly state what constitutes &#8220;mature&#8221; information security practices.<\/p>\n<p>Methodology The Security Capability Model survey was posted online at CSO&#8217;s website and at the CERT website.<\/p>\n<p>The industries most heavily represented in the response base were finance\/banking\/accounting (14%), health care\/pharmaceutical (12%), manufacturing (11%) and government (10%).<\/p>\n<p>In lieu of attempting an absolute standard for correct or mature practices (though a variety of those already exist elsewhere, ranging from ISO standards to SEI&#8217;s own Octave risk management methodology), the model provides the opportunity to benchmark against others in 22 specific practices.<\/p>\n<p>One chart presents the full survey results, grouping the practices under four headings: managing risks, setting policies, securing systems and networks, and handling corporate security.<\/p>\n<p>Looking at the first practice area on the chart, 60 percent of the total response base said they have a process in place for conducting regular vulnerability assessments.<\/p>\n<p>For comparison, the model also measures corporate security capability in a few areas outside of infosec: facility access, business continuity plans, employee awareness training and background checks.<\/p>\n<p>Allen says more capable&#8212;and successful&#8212;organizations are those treating security as a business objective; these companies achieve regulatory compliance by documenting existing processes, rather than by scrambling to jury-rig new processes to meet the letter of the law.<\/p>\n<p>http:\/\/www.csoonline.com\/read\/010105\/survey.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1781","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1781","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1781"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1781\/revisions"}],"predecessor-version":[{"id":4268,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1781\/revisions\/4268"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1781"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1781"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1781"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}