Gartner

Newsroom

Sydney, September 23, 2008 View All Press Releases

Gartner Dispels Common Myths, Misconceptions and Paranoias about Information Security

Analysts Explain How to Qualify Threats at Gartner IT Security Summit, 23-24 September in Sydney

As organizations embark on an information security management program, they encounter a threat landscape that contains both real and perceived obstacles which distract them from business priorities, according to Gartner, Inc. It is the perceived obstacles which cause organisations to direct their security investments to the wrong places, thereby lowering the value of their overall information security programs.

In the keynote presentation at the Gartner IT Security Summit this morning, Gartner security, privacy and risk analysts Andrew Walls and Eric Ouellet said security professionals need to qualify threats that are reasonably anticipated, and dispel those which are pure myths, misconceptions, or based on paranoia of the unknown.

“While change remains constant and threats continue to grow and evolve, we can take stock of the situation and establish an understanding of the threat landscape,” said Andrew Walls, research director at Gartner. “What we do know is that we cannot address all possible threats, but we can qualify the threats that are real and identify those that are not. This is an important step towards containing security costs.”

Myths, misconceptions and paranoias

According to Gartner, some of the most common myths about security include:

  • The hackers are winning, security is a retreating action
  • Data breaches are increasing in frequency
  • Application and operating system security is the responsibility of the vendors – and they are working hard to protect us
  • Regulatory compliance covers 100 percent of the security needs for most organizations
  • Hackers actually help the industry by finding problems and publicising them
  • Security is there to stop business from doing anything
  • Quality of security equals money invested in security infrastructure and personnel

“Increasing business demand for flexible security services, coupled with an already limited security budget, means that organizations can only afford to focus their resources on real issues,” said Eric Ouellet, research vice president at Gartner. “This means the security department must become adept at identifying the real threats to ensure that security becomes an enabler for business innovation, rather than an inhibitor.”

Approaching security as a reactionary control will not resolve or minimise the risks, Mr Ouellet said.

“In fact, tactical responses to changes in threats and business processes can consume the entire security budget but will not enable the business to move ahead in a safe and flexible manner,” he said.

Demonstrating security as the business enabler

According to Gartner, security must be viewed as the ‘environmental or hazmat suit’ for the business. Security should be seen as a tool that can be used to accept risks so that the business can take advantage of market opportunities it was never able to before.

For example, it was previously believed that that the Internet was not a safe environment for conducting business and that wireless networking technologies were not secure. In both instances, the security department created a framework for operating within an understood, managed and accepted risk profile. Today, organizations worldwide depend on the internet and wireless technologies as primary channels for conducting business.

“Security has been beaten into submission over the last few years by being accused of always saying ‘no’ and preventing the business from aggressive change and innovation. It is time to regain the trust of the organization and build understanding of the true role of security within business,” said Mr Walls.

According to Gartner, if security is to uphold its position as the business enabler rather than an impediment, its interactions with business stakeholders must:

  • Focus on business issues, not security technology and processes
  • Develop realistic security performance expectations with defined metrics
  • Build stakeholder confidence in security management frameworks and practices
  • Promote the redesign of business processes into more secure models
  • Realise that, at the end of the day, security is a costly, but necessary, evil

Recommendations

While business innovation races ahead, security managers must grapple with expanding regulatory requirements, tight labour markets and shrinking or static security budgets. These pressures are forcing security managers to communicate the truth about the threat landscape, dispel myths and misconceptions, and enable the business to invest in the right security program.

Contacts
About Gartner

Gartner, Inc. (NYSE: IT) is the world's leading information technology research and advisory company. We deliver the technology-related insight necessary for our clients to make the right decisions, every day. From CIOs and senior IT leaders in corporations and government agencies, to business leaders in high-tech and telecom enterprises and professional services firms, to technology investors, we are the valuable partner to clients in over 9,000 distinct enterprises worldwide. Through the resources of Gartner Research, Gartner Executive Programs, Gartner Consulting and Gartner Events, Gartner works with every client to research, analyze and interpret the business of IT within the context of their individual role. Founded in 1979, Gartner is headquartered in Stamford, Connecticut, USA, and has 6,400 associates, including more than 1,480 research analysts and consultants, and clients in 85 countries. For more information, visit www.gartner.com.

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.

Gartner Insight
Gartner Webinars