Research Library

The top resource for free research, white papers, reports, case studies, magazines, and eBooks.

Share Your Content with Us
on TradePub.com for readers like you. LEARN MORE
The State of Incident Response

Request Your Free Report Now:

"The State of Incident Response"

IT and cybersecurity teams are confident about their incident response practices as they evolve into a collaborative effort integrating cross-functional teams and external partners. Learn more about

Incident response has evolved into a collaborative effort integrating cross-functional teams and external partners at many organizations. IT and security decision makers under pressure to contain breach damage have deployed a range of technologies and formal protocols for detecting and responding to security incidents swiftly and effectively. Download Dark Reading’s Incident Response report to learn more about how cybersecurity teams contend with multiple security incidents each month. Despite the volume of cyberattacks, most cybersecurity professionals surveyed for Dark Reading’s report appear confident about the incident response practices and controls they have deployed. Read more about how they are working with managed services providers and establishing points of contact at their upstream providers, suppliers, and partners with whom they can coordinate when responding to an incident.

Here are some key takeaways from the survey: 

  • 91% of IT and security professionals believe their security team can effectively respond to a security incident in a timely manner. 
  • 22% of enterprise security teams spend 50% or more of their resources on incident response compared with 16% the prior year. 
  • 34% of IT and security managers claim their security team is able to detect a security incident in less than four hours after compromise; 22% require between one and six days to fully remediate an incident. 
  • 32% (compared with 42% a year ago) identify patching as the most time-consuming incident response-related task


Offered Free by: Fortinet
See All Resources from: Fortinet

Recommended for Professionals Like You: