Percentage of data assets and services monitored for suspicious activity

This measure calculates the percentage of data assets and services monitored for suspicious activity, today. This Supplemental Information measure is intended to help companies evaluate additional variables related to the process "develop and manage IT security, privacy, and data protection".

Benchmark Data

Lock

Sorry! Not all users have access to all of our resources.

Want to unlock access to all of our resources?

Learn about Membership Arrow with stem

Measure Category:
Supplemental Information
Measure ID:
110854
Total Sample Size:
740 All Companies
Performers:
25th Median 75th
- - -
Key Performance Indicator:
No

Sample image showing interactive filters for more detailed measure peer group data and an interactive graph.

Compute this Measure

Units for this measure are percent.

Back to Top

Percentage of data assets and services monitored for suspicious activity

Key Terms

There are no key terms associated with this measure.
Back to Top

Measure Scope

Back to Top

Cross Industry (7.4)

  • 8.3.5.1 - Assess IT regulatory and confidentiality requirements and policies (20736)
  • 8.3.5.2 - Create IT security, privacy, and data protection risk governance (20737)
  • 8.3.5.3 - Define IT data security and privacy policies, standards, and procedures (20738)
  • 8.3.5.4 - Review and monitor physical and logical IT data security measures (20739)
  • 8.3.5.5 - Review and monitor application security controls (20740)
  • 8.3.5.6 - Review and monitor IT physical environment security controls (20741)
  • 8.3.5.7 - Monitor/analyze network intrusion detection data and resolve threats (20742)