target audience: TECH BUYER  Publication date: Mar 2020 - Document type: IDC PlanScape - Doc  Document number: # US46120920

IDC PlanScape: Security Resource Optimization

By:  Pete Lindstrom

Content



Related Links

Table of Contents


  • IDC PlanScape Figure

    • Figure: IDC PlanScape: Executive Summary of Security Resource Optimization

  • Executive Summary

  • Why Is Security Resource Optimization Important?

    • Improve Security Resource Allocation Methods to Focus on High-Priority Risks

    • Enable Improved Cost Optimization Analyses, Metric Calculations, and Benchmark Standards of IT Security Costs

    • Better Communicate the Cost of IT Security Services by Aligning Costs to Their Business Purpose

    • Properly Evaluate and Optimize the Security Portfolio of Products and Services

  • What Is Security Resource Optimization?

    • Cybersecurity Functions Described: The Four Disciplines of Security Management

    • Identity Management Services

    • Identity Management Subservices

    • Identity Management Assets

    • Vulnerability Management Services

    • Vulnerability Management Subservices

    • Vulnerability Management Assets

    • Trust Management Services

    • Trust Management Subservices

    • Trust Management Assets

    • Threat Management Services

    • Threat Management Subservices

    • Trust Management Solutions

  • Who Are the Key Stakeholders?

    • CIO and IT Management Team

    • Business Management Teams

    • IT Security Management-CISO

    • IT Department Heads

  • How Can My Organization Take Advantage of Security Resource Optimization?

    • Create a RACI Matrix

    • Table: IDC's Cybersecurity RACI Matrix

    • Collect All Costs for Security Functions

    • Optimize Using Risk Reduced per Unit Cost

    • Estimating Risk Reduction

  • Advice for Technology Buyers

    • Immediately: Prior to Budget Completion

    • Next 6 Months: Include in Budget

    • Over 12-24 Months

  • Related Research