Cloud 101CircleEventsBlog

Download Publication

Measuring Risk and Risk Governance
Measuring Risk and Risk Governance
Who it's for:
  • C-Suite
  • Decision-makers
  • Risk managers
  • Security professionals

Measuring Risk and Risk Governance

Release Date: 06/21/2022

Adapting to the cloud presents a new challenge to enterprises. The shared responsibility model, used to distinguish responsibilities between cloud providers and end users, adds multiple layers of ownership in the supply chain. The COVID-19 pandemic has added another element, accelerating the use of virtual tools and cloud services, causing risk management practices to also need to adapt quickly. However, as enterprises shift toward a heavier reliance on cloud services, it’s clear that the enterprise risk management process doesn’t always shift with them.

Google commissioned CSA to develop a survey to add to the industry’s knowledge about enterprise cloud computing risk and to prepare this report of the survey’s findings. The survey’s key areas of interest included:
  • Assessing the maturity of public cloud consumption and risk management in enterprises
  • Understanding current challenges and perceived effectiveness of risk management in public cloud
  • Analyzing the challenges of measuring risk in the cloud
  • Identifying best practices to reduce risk and address risk tolerance in the cloud
Respondents were asked questions about public cloud usage, cloud inventory management, risk management, and their methods and satisfaction with quantifying risk. Read this report for the full rundown of respondent demographics, their responses, and what it all means.

Key Takeaways:
  • 70% of organizations reported not effective or somewhat effective processes for assigning risk to cloud assets
  • The majority of respondents use 2 or more IaaS platforms (59%)
  • The top security concern when running applications in the public cloud was loss of sensitive data
  • When asked about the vendors or tools used to quantify risk, the most common response was “None” (51%)

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
The State of Security Remediation 2024
The State of Security Remediation 2024
Data Loss Prevention and Data Security Survey Report
Data Loss Prevention and Data Security Survey R...
2024 State of SaaS Security Report Shows A Gap Between Security Team Confidence And Complexity of SaaS Risks
2024 State of SaaS Security Report Shows A Gap Between Security Tea...
Published: 05/16/2024
Navigating Cloud Security Best Practices: A Strategic Guide
Navigating Cloud Security Best Practices: A Strategic Guide
Published: 05/15/2024
Building Trust Through Vendor Risk Management
Building Trust Through Vendor Risk Management
Published: 05/15/2024
The Importance of Securing Your Organization Against Insider and Offboarding Risks
The Importance of Securing Your Organization Against Insider and Of...
Published: 05/14/2024

Acknowledgements

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

Nick Godfrey Headshot Missing
Nick Godfrey

Nick Godfrey

MK Palmore Headshot Missing
MK Palmore

MK Palmore

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

Chris Rezek
Chris Rezek
Product Manager for Security and Privacy at Google

Chris Rezek

Product Manager for Security and Privacy at Google

Phil Venables Headshot Missing
Phil Venables
Google Cloud

Phil Venables

Google Cloud

Catherine Nelson Headshot Missing
Catherine Nelson

Catherine Nelson

Josh Buker
Josh Buker
Research Analyst, CSA

Josh Buker

Research Analyst, CSA

Etienne De Burgh Headshot Missing
Etienne De Burgh

Etienne De Burgh

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Taylor Lehmann Headshot Missing
Taylor Lehmann

Taylor Lehmann

Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training