{"id":351186,"date":"2025-02-11T14:02:58","date_gmt":"2025-02-11T08:32:58","guid":{"rendered":"https:\/\/www.technologyforyou.org\/?p=351186"},"modified":"2025-02-11T14:03:16","modified_gmt":"2025-02-11T08:33:16","slug":"gartner-survey-reveals-only-14-of-security-leaders-successfully-balance-data-security-and-business-objectives","status":"publish","type":"post","link":"https:\/\/www.technologyforyou.org\/gartner-survey-reveals-only-14-of-security-leaders-successfully-balance-data-security-and-business-objectives\/","title":{"rendered":"Gartner Survey Reveals Only 14% of Security Leaders Successfully Balance Data Security and Business Objectives"},"content":{"rendered":"<div class=\"globalsite cmp-globalsite-columncontrol aem-GridColumn aem-GridColumn--default--12\">\n<section class=\"column-control grid-norm no-top-bottom \">\n<div class=\"row xs-flex-direction-column sm-flex-direction-column\">\n<div class=\"col-lg-9 col-md-8 col-sm-12 col-xs-12 \">\n<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12 \">\n<div class=\"globalsite cmp-globalsite-heading aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"grid-norm rmg-t32 mg-b16 margin-top-bottom\"><span style=\"color: var(--td_text_color, #111111); font-family: verdana, geneva, sans-serif; font-size: 14pt;\">Leaders Can Take Five Actions to Protect Data Assets While Also Effectively Enabling the Business<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<div class=\"globalsite cmp-globalsite-columncontrol aem-GridColumn aem-GridColumn--default--12\">\n<section class=\"column-control grid-norm no-top-bottom \">\n<div class=\"row xs-flex-direction-column sm-flex-direction-column\">\n<div class=\"col-lg-9 col-md-8 col-sm-12 col-xs-12 \">\n<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12 \">\n<div class=\"globalsite cmp-globalsite-articletext aem-GridColumn aem-GridColumn--default--12\">\n<article class=\"article-text grid-norm margin-top-bottom mg-t16 rmg-b32\">Only 14% of\u00a0security\u00a0&amp; risk management (SRM) leaders can effectively secure organizational data assets while also enabling the use of data to achieve business objectives, according to a survey by Gartner, Inc. While 35% of survey respondents secure data assets and 21% use data to achieve business goals, only one in seven can effectively do both.<\/p>\n<p>The survey was conducted from June through August 2024 among 318 senior security leaders across organizations of different industries and sizes worldwide.<\/p>\n<p>\u201cWith only 14% of SRM leaders able to secure their data while supporting business goals, many organizations can face increased vulnerability to cyber threats, regulatory penalties, and operational inefficiencies, ultimately risking their competitive edge and stakeholder trust,\u201d said\u00a0<strong>Nathan Parks, Sr Specialist, Research at Gartner.<\/strong><\/p>\n<p>Gartner recommends that SRM leaders take five actions to align business needs to data security and successfully achieve both data protection and business enablement goals.<\/p>\n<ol>\n<li><strong>Reduce governance-related friction for the business\u00a0<\/strong>by<strong>\u00a0<\/strong>using a well-established process to co-create data security polices and standards with end users and by inviting their feedback.<\/li>\n<li><strong>Align data-security-related governance efforts<\/strong>\u00a0by partnering with other internal functions to identify overlaps and synergies.<\/li>\n<li><strong>Delineate non-negotiable security requirements<\/strong>\u00a0that must be met by the business when handling previously unknown data security risks.<\/li>\n<li><strong>Define high-level guardrails around GenAI-related decisions<\/strong>\u00a0(e.g., when to pause or stop a\u00a0GenAI\u00a0tool or feature) that allow for business experimentation within set parameters.<\/li>\n<li><strong>Work jointly with data and analytics (D&amp;A) teams<\/strong>\u00a0to secure top-down buy-in on data security initiatives.<\/li>\n<\/ol>\n<\/article>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Leaders Can Take Five Actions to Protect Data Assets While Also Effectively Enabling the Business Only 14% of\u00a0security\u00a0&amp; risk management (SRM) leaders can effectively secure organizational data assets while also enabling the use of data to achieve business objectives, according to a survey by Gartner, Inc. While 35% of survey respondents secure data assets and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14083],"tags":[],"class_list":{"0":"post-351186","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-technology-industry-news"},"_links":{"self":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/351186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/comments?post=351186"}],"version-history":[{"count":0,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/351186\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media?parent=351186"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/categories?post=351186"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/tags?post=351186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}