Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Download Publication

Measuring Risk and Risk Governance
Measuring Risk and Risk Governance
Who it's for:
  • C-Suite
  • Decision-makers
  • Risk managers
  • Security professionals

Measuring Risk and Risk Governance

Release Date: 06/21/2022

Adapting to the cloud presents a new challenge to enterprises. The shared responsibility model, used to distinguish responsibilities between cloud providers and end users, adds multiple layers of ownership in the supply chain. The COVID-19 pandemic has added another element, accelerating the use of virtual tools and cloud services, causing risk management practices to also need to adapt quickly. However, as enterprises shift toward a heavier reliance on cloud services, it’s clear that the enterprise risk management process doesn’t always shift with them.

Google commissioned CSA to develop a survey to add to the industry’s knowledge about enterprise cloud computing risk and to prepare this report of the survey’s findings. The survey’s key areas of interest included:
  • Assessing the maturity of public cloud consumption and risk management in enterprises
  • Understanding current challenges and perceived effectiveness of risk management in public cloud
  • Analyzing the challenges of measuring risk in the cloud
  • Identifying best practices to reduce risk and address risk tolerance in the cloud
Respondents were asked questions about public cloud usage, cloud inventory management, risk management, and their methods and satisfaction with quantifying risk. Read this report for the full rundown of respondent demographics, their responses, and what it all means.

Key Takeaways:
  • 70% of organizations reported not effective or somewhat effective processes for assigning risk to cloud assets
  • The majority of respondents use 2 or more IaaS platforms (59%)
  • The top security concern when running applications in the public cloud was loss of sensitive data
  • When asked about the vendors or tools used to quantify risk, the most common response was “None” (51%)

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
The State of Security Remediation 2024
The State of Security Remediation 2024
Data Loss Prevention and Data Security Survey Report
Data Loss Prevention and Data Security Survey R...
Sensitive Data in the Cloud
Sensitive Data in the Cloud
How to Set Your Small Privacy Team Up for Success
How to Set Your Small Privacy Team Up for Success
Published: 04/17/2024
How to Audit Your Outdated Security Processes
How to Audit Your Outdated Security Processes
Published: 04/16/2024
Cloud Relationships: Getting to Grips With the ‘Vendor of My Vendor’
Cloud Relationships: Getting to Grips With the ‘Vendor of My Vendor’
Published: 04/15/2024
Evaluate the Security of Your Cloud Service Provider with the CSA STAR Registry
Evaluate the Security of Your Cloud Service Provider with the CSA S...
Published: 04/13/2024

Acknowledgements

MK Palmore Headshot Missing
MK Palmore

MK Palmore

This person does not have a biography listed with CSA.

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

This person does not have a biography listed with CSA.

Chris Rezek
Chris Rezek
Product Manager for Security and Privacy at Google

Chris Rezek

Product Manager for Security and Privacy at Google

This person does not have a biography listed with CSA.

Phil Venables Headshot Missing
Phil Venables

Phil Venables

This person does not have a biography listed with CSA.

Catherine Nelson Headshot Missing
Catherine Nelson

Catherine Nelson

This person does not have a biography listed with CSA.

Josh Buker
Josh Buker
Research Analyst, CSA

Josh Buker

Research Analyst, CSA

This person does not have a biography listed with CSA.

Etienne De Burgh Headshot Missing
Etienne De Burgh

Etienne De Burgh

This person does not have a biography listed with CSA.

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Taylor Lehmann Headshot Missing
Taylor Lehmann

Taylor Lehmann

This person does not have a biography listed with CSA.

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

This person does not have a biography listed with CSA.

Nick Godfrey Headshot Missing
Nick Godfrey

Nick Godfrey

This person does not have a biography listed with CSA.

Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training