• All
  • Cloud
    • Solutions
    • Virtualization
  • Data
    • Analytics
    • Big Data
    • Customer Data Platform
  • Digital
    • Digital Marketing
    • Social Media Marketing
  • Finance
    • Cost Management
    • Risk & Compliance
  • Human Resources
    • HR Solutions
    • Talent Management
  • IT Infra
    • App Management Solutions
    • Best Practices
    • Datacenter Solutions
    • Infra Solutions
    • Networking
    • Storage
    • Unified Communication
  • Mobility
  • Sales & Marketing
    • Customer Relationship Management
    • Sales Enablement
  • Security
  • Tech
    • Artificial Intelligence
    • Augmented Reality
    • Blockchain
    • Chatbots
    • Internet of Things
    • Machine Learning
    • Virtual Reality
Osterman Research: Imperfect People, Vulnerable Applications Today’s Threat Landscape?

Osterman Research: Imperfect People, Vulnerable Applications Today’s Threat Landscape?

Immersive
Published by: Research Desk Released: Jul 19, 2021

In a business environment increasingly dictated by software, building secure applications is critical. The release of compromised applications has hit the headlines in recent months with attacks such as Sunburst. However, organizations have yet to understand how to solve the underlying people issues allowing this to happen.

In our latest study with Osterman Research, we dive into the human elements contributing to cyber risk in the Software Development Lifecycle (SDLC). This study researched both development and security teams at large organizations to outline the scale of the problem on both sides and highlight the specific issues causing it.

organizations to face cyber crises, they’re now rapidly falling into obsolescence.

So what’s the alternative? How many organizations still rely on PowerPoint-driven table top exercises to bolster their incident response plans? Is this legacy method of defining cyber crisis response widening the gap between attackers and defenders?

In collaboration with Osterman Research, we at Immersive Labs tapped into the collective consciousness of over 400 CISOS and senior security leaders. We sought to discover how influential security professionals prepare for the worst – and just how far behind legacy training techniques have fallen.

Explore the definitive report into cyber crisis preparedness to discover:

  • The pros and cons of tabletop exercises
  • Most common cyber crisis preparedness exercise scenarios Team gaps in tabletop exercises

And more