Building Trust

    Date22 Dec 2006
    CategoryForums
    2237
    Posted ByBrittany Day
    Can security pros become champions for trust in their organizations? A recent study conducted by Ponemon Institute and sponsored by Unisys revealed that IT security professionals -- unlike their colleagues in non-IT business functions -- believe that strengthening the security of sensitive data is critical to building trusted relationships with customers, employees, investors, and other constituents. The Trusted Enterprise Survey was conducted to understand what business leaders and IT security professionals believe are essential elements of a trusted enterprise. The survey provides an objective measure, called the Trusted Enterprise Index, on how these opinion leaders and the public view an organization Among IT security pros and business leaders, the top five attributes for building trust are customer satisfaction, leadership, fiscal management, quality, and respect for customers. Both groups believe unethical business practices, customer dissatisfaction, a lack of respect for employees and customers, and poor leadership erode trust in an organization. However, business leaders place a higher value on risk management and good corporate governance practices to build trust. IT leaders, on the other hand, believe that inadequate intellectual property protection, weak privacy, and undependable IT will erode trust. About 20 percent of IT executives believe there is no visible support from senior executives for IT security and privacy issues.

    LinuxSecurity Poll

    What is your favorite LinuxSecurity.com feature?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    17
    radio
    [{"id":"65","title":"Feature articles","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"66","title":"News","votes":"1","type":"x","order":"2","pct":33.33,"resources":[]},{"id":"67","title":"HOWTOs","votes":"2","type":"x","order":"3","pct":66.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.