Market Research Logo

IT Security Foundation: Assessing IT Adversarial Risk for Digital Transformation

IDC Opinion
In This Study
Situation Overview
Step 1: Identifying Unwanted Outcomes
Step 2: Estimating the Risk
Estimating Probability
Estimating Impact
Step 3: Determining Protection Options
Step 4: Conducting Economic Analysis
Step 5: Implementing Controls and Monitoring the Environment
Future Outlook
Essential Guidance
Learn More
Related Research
Synopsis

IT Security Foundation: Assessing IT Adversarial Risk for Digital Transformation

This IDC study describes a formal risk assessment process that can be used by CISOs to evaluate the nature and extent of IT adversarial risk associated with a digital transformation initiative. It can be applied at a high level by CIOs — associated with a broad organizationwide security program — or in a more in-depth way by program managers as the scope of a project becomes more defined. This study focuses on enterprise security, enterprise architecture, and IT services management."Organizations often make 'seat of the pants' determinations about the need for security," said Pete Lindstrom, vice president of Security Strategies, "But the only way to truly understand the effectiveness of a program is to implement a risk assessment program complete with a feedback loop."


Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook

Share this report

;