![The Edge Logo The Edge Logo](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt530eb1f4e672eb44/653a71690e92cc040a3e9d6d/Dark_Reading_Logo_TheEdge_0.png?width=700&auto=webp&quality=80&disable=upscale)
Cybersecurity In-Depth: Digging into data about the latest attacks, threats, and trends using charts and tables.
Gartner: Most Security Leaders Cannot Balance Data Security, Business GoalsGartner: Most Security Leaders Cannot Balance Data Security, Business Goals
The analyst firm recommends defining security and governance processes while reducing friction for business stakeholders.
![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt9d095681f2da9562/6722e11f21f0d3a9721b17bb/data-points-cybersecurity_YAY_Media_AS_via_Alamy_Stock_Photo.jpg?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
NEWS BRIEF
Only 14% of security and risk management leaders can effectively secure organizational data assets while also enabling the data to achieve business objectives, according to Gartner. In a recent survey, Gartner found that 35% of respondents secure data assets and 21% use data to achieve business goals, but only one in seven (14%) could do both effectively.
This gap exposes organizations to threats, regulatory penalties, and operational inefficiencies, Gartner said. The analyst firm outlined five recommendations for organizations to address the gap:
Reduce governance-related friction for the business. Use a well-established process to co-create data security polices and standards.
Align data-security-related governance efforts. Partner with other internal functions to identify overlaps.
Delineate non-negotiable security requirements that business groups must meet when handling data security risks.
Define high-level guardrails around GenAI-related decisions. Allow business groups to experiment within clearly set parameters.
Work jointly with data and analytics teams. Secure top-down buy-in on data security initiatives.
Read more about:
News BriefsAbout the Author
You May Also Like
Uncovering Threats to Your Mainframe & How to Keep Host Access Secure
Feb 13, 2025Securing the Remote Workforce
Feb 20, 2025Emerging Technologies and Their Impact on CISO Strategies
Feb 25, 2025How CISOs Navigate the Regulatory and Compliance Maze
Feb 26, 2025Where Does Outsourcing Make Sense for Your Organization?
Feb 27, 2025