syslog
Along with this February Security issue, Sys Admin is providing
a special supplement focused on training and certification. The
supplement includes an overview of training and certification vendors
and a sample test, which were compiled by Emmett Dulaney, certification
columnist for UnixReview.com along with results from the SANS 2005
Salary and Information Security Career Advancement Survey, compiled
by Alan Paller.
Secure Enterprise magazine recently conducted their own
security-related survey; see:
http://www.secureenterprisemag.com/showArticle.jhtml?articleID=172302360
According to the article by Ted Kemp, the Third Annual Strategic Deployment
Survey, which polled more than 1500 readers, showed that "Resourceful
information security professionals are still getting the job done....
But their efforts have been hampered by undersized staffs and underfunded
budgets that limit many choices, from what products they buy to what
vendors they work with."
To complement the results from the SANS Survey included in our
supplement, I'm including some highlights from the Strategic Deployment
Survey taken from the Web site. To start, the survey showed "IT
security staffing almost unchanged from last year -- and, in a word,
deficient. Forty-four percent of this year's respondents described
their security groups as moderately understaffed, with 21% saying
they're severely understaffed. Last year, those numbers were 45%
and 20%, respectively."
When questioned about IT spending, 16% of respondents indicated
that less than 1% of their organization's IT budget was allocated
for information security, 38% reported 1-5%, 18% reported 6-10%,
7% reported 11-15%, 4% reported 16-20%, 3% reported more than 20%,
and 14% were unsure.
Security spending is driven by a variety of factors, with the
top five being improved business practices, auditing regulations,
industry standards, security breaches from external sources, and
legislative regulations.
Methods used to assess risk before making an information security
purchase include: assessment of regulatory compliance/noncompliance
(61%), input from peers (58%), informal risk analysis (57%), internal
audit (49%), penetration testing (44%), input from vendors (40%),
and external audit (35%).
Twenty-nine percent of the survey's respondents described their
organization's information security structure as a formal dedicated
team, and the number of organizations using individuals within IT
to carry out security as only a secondary part of their jobs decreased
from 40% last year to 35% this year. Also, the number of survey
respondents who reported having a formal security policy increased
from 57% in 2004 to 67% this year.
When asked to rate the importance of various qualities when choosing
a security product, respondents said the leading trait was integration
with existing networks. The second and third ranked qualities were
performance and high availability. When choosing a vendor, the most
highly desired quality was responsiveness to product security problems,
followed by vendor reputation. More details from the survey can
be found on the Secure Enterprise Web site.
I hope you find this month's articles useful and informative,
and if you have suggestions for future coverage, please let me know.
Sincerely yours,
Amber Ankerholz
Editor in Chief |