34,779 Results found   |   Page 1 of 1,739

Gartner client? Log in for personalized search results.

Blog Post July 07 2023
... 30107. As with all other aspects of fraud and security, deepfake creation and deepfake detection has become an arms race that we will need to watch closely, with implications beyond identity verification and into bigger societal and philosophical areas of trust and integrity. ...

Analyst(s):   Akif Khan
Blog Post May 10 2023
... fingerprinting, and that's where 1+1=3 as based on the vendor data that has been shared with me it's the combination of behavioral and device data together that seems to give the most reliable insight.   What's the catch? Well, it's another service you need to pay for and integrate and orchestrate (security vs cost ...

Analyst(s):   Akif Khan
Blog Post June 02 2023
... user. In our latest research, How to Mitigate Account Takeover Risks, we expand on the definition above, and describe the 'ATO prevention stack' that you need to try and stop the attackers.  If you're a Gartner client, take a look and schedule an inquiry call with me to discuss further. ...

Analyst(s):   Akif Khan
Research September 20 2023
... Generative AI Will Impact CISOs and Their Teams ChatGPT and large language models are the early signs of how generative AI will shape many business processes. By 2027, generative AI will contribute to a 30% reduction in false positive rates for application security testing and threat detection by refining ...
Blog Post July 18 2023
... fractal and irreducible. This is why security people often say things like “bad guys only have to get it right once, security has to get it right 100% of the time.” Higher risk = higher reward. This interpretation comes from the arena of financial risk management. To make higher risk financial products enticing ...

Analyst(s):   Andrew Walls
Blog Post May 22 2023
... investments for it to scale and evolve for the long term. Gartner Will Release Early Benchmark Data at the 2023 Gartner Security and Risk Management Summit in National Harbor, MD. At my June 5, 2023 2:30 PM ET session “Drive Cybersecurity Investments With the Gartner Cybersecurity Value Benchmark” I will ...

Analyst(s):   Paul Proctor
Blog Post May 22 2023
... protection levels, and they act as value levers. Collectively these properties change how we measure, report, and invest in security. ODMs are Easily Explainable to Executives Incident remediation measures the amount of time it takes our organization to stop hacking incidents and return the organization ...

Analyst(s):   Paul Proctor
Blog Post January 25 2023
... these criteria are about the security of that app. When FUD is promulgated by people in authority, security leaders need to provide clarity to senior management of the real and substantive issues driving the latest round of security theater. Ultimately, invoking security theater to obfuscate or sugar ...

Analyst(s):   Andrew Walls
Blog Post October 12 2022
... awareness of the embedded risks of Digital Business a part of every business decision, and then applying appropriate controls. We need to focus on our adversaries, understand their intentions and aims, and develop strategies that directly confront those rather than simply try and manage vulnerabilities ...

Analyst(s):   leigh mcmullen
Research September 08 2023
... dissonance. Behavioral economics illuminates causes of insecure behavior, especially the limits of rationality and the power of social norms. CISOs and security and risk management leaders should: Learn to deal with challenges of choice overload. Utilize the nudge technique. Leverage the social environment ...
Blog Post November 07 2022
... ’t Cover Cyber-insurance, and I’m not really supposed to talk about it, because we don’t give financial or legal advice. This post offers no opinion about cyber insurance, it’s about what we can learn about cyber risk based on how cyber-insurers view their own financial risk. Take the following real( ...

Analyst(s):   leigh mcmullen
... Gartner Keynote: The Top Security Predictions for 2022-2023 Every year, Gartner produces impactful predictions across all practices. This keynote presentation compiles the top predictions prepared by our cybersecurity experts for the year 2022-2023. Security and risk management leaders should monitor these ...
Blog Post March 07 2023
... Information Security and Privacy Management Requirements(December 6, 2021) M-22-01 Improving Detection of Cybersecurity Vulnerabilities and Incidents on Federal Government Systems through Endpoint Detection and Response(October 8, 2021) M-21-31 Improving the Federal Government’s Investigative and Remediation ...

Analyst(s):   Katell Thielemann
Blog Post February 15 2023
... about where you're going to go to get the information and insights you need for this and next years challenges. Gartner's Infrastructure, Operations and Cloud Strategies (IOCS) conferences are being developed right now, bringing the insights and opportunities that you need. We're working hard to build ...

Analyst(s):   Chris Saunderson
Blog Post May 06 2023
... of the scale, innovation and efficiency that will meet the demands of world-class organizations of tomorrow. Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2023 brings the world’s technology leaders together to hear top trends, find objective answers and explore topic coverage in ...

Analyst(s):   Daniel Betts
Blog Post February 07 2023
... 2022 the Securities and Exchange Commission (SEC) proposed amendments to its rules to enhance and standardize disclosures regarding cybersecurity risk management, strategy, governance, and incident reporting by registrants. As always with such proposals, the SEC solicited public commentary and even extended ...

Analyst(s):   Andrew Walls
Research January 12 2023
... Security Program Management 101 — How to Select Your Security Frameworks, Controls and Processes The issue isn’t so much which one you pick but how effectively you implement it. Security and risk management leaders are faced with an array of information security frameworks, control catalogs and processes ...
... Overview 3 Ways to Apply a Risk-Based Approach to Threat Detection, Investigation and Response Security and risk management leaders responsible for implementing threat detection, investigation and response capabilities as part of security operations should: Break through the silos and open dialogue by establishing ...
Conference January 03 2023
... adoption. Security and risk management leaders must adopt a continuous life cycle approach to remote-access management in order to achieve success. and this approach can be broken down into seven steps that are crucial to a successful deployment. Define Objective and Scope With Business Leaders Align Business ...
Research September 08 2023
... employees on making risk-informed decisions autonomously would benefit in: Reduced risk exposure. Employees demonstrating high cyber judgment are 100% more likely to display a better understanding of cybersecurity policies and their application in daily work, and avoid introducing additional risk. Maximized growth ...
of 1739
Security Information and Event Management (SIEM)

... Security information and event management (SIEM) technology supports threat detection, compliance and security incident management through the collection and analysis (both near real time and historical) of security events, as well as a wide variety of other event and contextual data sources. The core ... Gartner Glossary

Access More

Speak with a Gartner specialist to learn how you can access peer and practitioner research backed by proprietary data, insights, advice and tools to help you achieve stronger performance.