What terrifies you the most as an IT leader when an employee isn't properly deprovisioned systems access after offboarding?
The risk of leakage of sensitive data30%
The risk of a cybersecurity attack through an unmanaged account.56%
The risk of malicious data detection/theft11%
Other (comment below)1%
565 PARTICIPANTS
Director of Information Security in Energy and Utilities, 5,001 - 10,000 employees
Most terrifying is having to spend countless time explaining to auditors what has happened, how it happened, and what you are doing about it to make sure it doesn't happen again. That is by far the biggest pain that you come across most frequently you fail to off-board folks properly. All others happen sometimes but not nearly frequently enough as being grilled by some audit folks who are happy to pick up on this easy find and grill you on it.Director of IT in Healthcare and Biotech, 10,001+ employees
In addition to the security threat, the cost of unused licenses and unused resources like allocated storage, virtual machines, etc. is something that also needs to be considered with off-boarding. While the impact on a smaller organization may not be significant, for larger organization it does make an impact. Also the fact that while there is a small probability value associated with security breeches due to unused accounts, the probability of the resource leakage is 1.
CIO in Education, 1,001 - 5,000 employees
Good question. They all worry me.Content you might like
CTO in Software, 201 - 500 employees
Without a doubt - Technical Debt! It's a ball and chain that creates an ever increasing drag on any organization, stifles innovation, and prevents transformation.Attack Detection & Analysis22%
Vulnerability assessment and patching54%
Security Awareness Training15%
Incident Response8%
Other (comment below)0%
505 PARTICIPANTS
ISSO and Director of the IRU in Healthcare and Biotech, 10,001+ employees
I would definitely suggest this based of how you categorize your types of data/systems and information being stored in certain parts of your data center. I think it’s really dependent on the size of your organization and ...read more0-1 minutes5%
2-4 minutes29%
5-8 minutes23%
9-15 minutes10%
15-30 minutes5%
31+minutes3%
We haven't experienced a DDoS attack this year.22%
541 PARTICIPANTS