Laptop Lost or Stolen? 5 Questions to Ask and Answer

Presented by

Derek E. Brink, Vice President & Research Fellow for IT Security, Aberdeen Group

About this talk

In Aberdeen's study of over 150 organizations, for every 100 enterprise endpoints that went out to end-users only 85 came back – 5 were lost or stolen, 1 of these was successfully recovered, and 11 are missing and unaccounted for. When the lost or stolen laptop happens to you – and the chances are extremely good that it will – there are five key questions to ask and answer: What happened? What assets are at risk? What protections were in place? Where is it now? Can we prevent future occurrences? Compared to all others in the study, the top performers realize $44 per endpoint in cost savings from reducing the net number of lost, stolen and missing endpoints, and tens of millions of dollars in costs avoided by averting more than 2-times the number of data loss or data exposure incidents.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (38)
Subscribers (1208)
What separates "Best-in-Class" (top 20%) organizations from their "Industry Average" (middle 50%) and "Laggard" (bottom 30%) counterparts when it comes to various topics in IT Security? Aberdeen's unique, fact-based approach to market research provides a framework for end-user organizations to benchmark their own strategies, capabilities and use of enabling technologies against companies with top performance. Areas of coverage in Aberdeen's IT Security practice include topics in Identities and Access, Data Protection, IT Infrastructure Security (including Endpoints, Delivery Platforms, Applications and Databases, Networks, and Storage), Physical Infrastructure Security, Policies, and Security GRC (Governance, Risk Management, and Compliance). Complimentary access is provided to the full benchmark research reports, for a limited time after initial publication.