Loading...

05 May 2026 12:36

Advertising & Marketing

Gartner Identifies Five Steps Security Leaders Can Implement to Create A Better Customer Experience for Their Business Executives

While IT, and most businesses, have been focused on operational excellence for the past 20-30 years, Gartner, Inc. analysts said it’s time security leaders put the focus on customer experience. 

“Today, the battle ground for the digital industrial revolution is the customer experience,” said Leigh McMullen, research vice president at Gartner. “It’s not about cost; it’s not about efficiency; it’s not even about product. It’s about experience.”

Everyone is a big digital consumer, and in this digital world, users expect customization to all their preferences. For security leaders, this means giving up some control, and it is resulting in the nexus of the cultural clash. This clash is taking place when risk issues are passed from the business department to the security department, with the expectation that the security team will deal with the problem. Gartner analysts said the key to changing this relationship is engagement.

“We as security people want things to be controlled,” said Mr. McMullen. “We want them stable, but people’s expectations are being set by forces outside our control. Which means we (security leaders) need to change how we engage if we want to be successful. We have to give up control to gain influence.”

Create an Effortless Experience

The experience that customers are looking for is an effortless experience. The analysts pointed out that effort, not satisfaction or net promoter score, is the best predictor of future buying behavior. 

“Security should not wreck the customer experience, but it often does,” Mr. McMullen said. “Customers, and that is everyone in your enterprise, want the effort they put in to match the value they expect to get. If you deliver the wrong experience, they’ll just tune you out.”

Gartner has identified five things security and risk leaders can work on now to create a better experience for their executives. They include:

Actually Speak to Executives About Things That Matter to Them. Gartner analysts said studies have shown that fear of risk and security is materially impacting innovation.

“Organizations are slowing down because they fear this issue,” said Paul Proctor, vice president and distinguished analyst at Gartner. “If you can improve their comfort and understanding of risk and security, you can help your company move faster. That is truly a business value of security.”

Mr. Proctor said it’s important for security leaders to talk to business leaders about what matter to them. Show them how their business outcomes are directly dependent on technology. He said security leaders need to engage with business executives over things those executives think are important. 

Help Executives With Their Decisions Through Operationally Focused Risk Assessments. To help business executives, Gartner recommends that security leaders start with a business process and conduct interviews with the people who execute that process. 

Gartner analysts shared an example of a police department that has created an operationally-focused risk assessment process that takes two weeks, delivers summary recommendations in a business-focused context, and requires a non-IT executive decision maker to act on the results. 

“Offering executives decision-making in the context of operational outcomes makes these engagements more than interesting to them. It directly impacts the decisions they make,” Mr. Proctor said. “You are now helping them do their job.”

Create Defensibility for Your Executives. Executives do not directly control technology risk and security. However, when an organization gets hacked, the public wants executives to face consequences for the security breach. 

“We have treated security like a dark art for so long that when an organization gets hacked, people don’t understand,” Mr. McMullen said. “So, the primary question is, ‘Who screwed up?’ You can’t guarantee the organization won’t get hacked, so stop selling your executives protection, and start selling something they truly need, defensibility.”

Take Tech Out of Your Conversations. The ability of security leaders to abstract out technology and put decisions in terms of business outcomes is critical to their success in a modern risk-based world. Gartner analysts said security leaders need to understand their company’s business model.

“When we talk about technology risk and security, primarily in technology terms, stakeholders treat us like wizards who cast spells and protect the organization,” Mr. Proctor said. “Making risk and security more transparent and business-aligned is an absolute requirement to get you out of the wizarding world.”

Move From Project to Product Management. Project management is something security leaders have always done. They prioritize and fund activities. For example, there are start times, execution gates, implementation, acceptance testing, integration, and deployments included in project management. There is a beginning and an end.

In product management, everything is continuous. Typically, it’s organized around a business process, and the IT requirements to support that business process. For example, in an insurance company, a product line could be underwriting, and in a risk and security context, underwriting needs access to control, perimeter protection, threat and vulnerability management, handling and treatment of sensitive data continuously. There is no end date.

“Doing these five things will improve executive experience, their perceived value, and result in a better, more appropriately protected organization,” Mr. Proctor said.

Gartner analysts will provide additional analysis on IT security trends at the Gartner Security & Risk Management Summits 2018.

NULL
(Visited 8 times, 1 visits today)
peri hokiperihokiduta76duta 76ABC1131 - MPO SLOTABC1131 Bandar Slot Togelmix parlay agen slot qrisMPOGALAXYslot thailandAWSBEThttps://premium-soft.com/Consulta-Licencias/https://sintnicolaasschool.com/https://abc1131aa.com/kincir88cakar76Slot mahjongABC1131ABC1131 LOGINhttps://abc1131.hartanzah.com/https://www.abc1131.it.com/stc76006 sinkronisasi momentum strategi hibrida pola scatter mahjong wild deluxe gates of olympus manajemen risiko dadu sicbo007 rekayasa taktik hibrida pola transformasi gold simbol mahjong ways 2 pgsoft baccarat prediksi starlight princess008 arsitektur kemenangan terpadu navigasi strategi blackjack optimasi peluang sweet bonanza mahjong wins 3 pragmatic009 dekonstruksi momentum strategi eksploitasi pola scatter mahjong ways 2 pgsoft teknik unit roulette wild west gold010 manifesto ekspertis navigasi rtp live sugar rush pola statis sv388 taktik kalkulasi blackjack mahjong wins 3 pragmatic011 rekayasa taktik lintas platform optimasi teknik analisa statistik mahjong wild deluxe gates of olympus dadu sicbo012 sinkronisasi data teknik rtp live mahjong ways 2 pgoft strategi baccarat statis dan dinamis starlight princess013 sinergi operasional integrasi teknik analisa statis blackjack dinamika sweet bonanza mahjong wins 3 pragmatic014 manifesto ekspertis rekayasa peluang algoritma pgsoft mahjong ways 2 pgsoft dinamika roulette wild west gold015 protokol strategis optimasi teknik analisa mahjong wins 3 pragmatic sugar rush sv388 blackjack proeksekusi taktik analisa pola gates of olympus dadu sicbo mahjong wild deluxetaktik peluang baccarat teknik analisa pola rtp live starlight princess mahjong ways 2 pgsoftsinergi strategi analisa peluang blackjack taktik teknik pola rtp live mahjong wins 3 pragmatic sweet bonanzaanalisa teknik peluang roulette taktik pola strategi rtp live mahjong ways 2 pgsoft wild west goldstrategi peluang blackjack analisa sv388 teknik taktik pola rtp live mahjong wins 3 pragmatic sugar rushanalisa lintas algoritma sinkronisasi pola jitu mahjong wild deluxe gates of olympus probabilitas dadu sicboarsitektur strategi hybrid integrasi taktik paten baccarat pola presisi mahjong ways 2 pgsoft starlight princessprotokol rtp live yang terintegrasi strategi blackjack volatilitas mahjong wins 3 pragmatic sweet bonanzadialektika probabilitas analisa presisi pola mahjong ways 2 pgsoft integrasi strategi roulette wild west goldrekayasa peluang cara membedah strategi mahjong wins 3 pragmatic sugar rush kalkulasi taktis sv388analisis lonjakan scatter mahjong wayspsikologi kontrol blackjack digitallogika sinkronisasi simbol high payfenomena latency period kasino onlinestudi komparatif probabilitas pg softnavigasi sesi stabil mahjong waysevolusi retensi pemain mahjong ways 2mekanisme fluktuasi intensitas tumblekorelasi ritme putaran respons scattermetrik performa mahjong wins digitalanatomi titik balik kemenangan aimekanisme kombinasi langka mahjong waysarsitektur game digital teori probabilitasrasionalisasi rtp 99 persen simulasi datastruktur aktivasi tumble berantaitransisi algoritma mahjong ways malammatematika multiplier pragmatic playmekanik tumble engine pg softanalisis volatilitas saldo terbatasalasan teknis simbol kosong scatterperbandingan auto spin vs quick spinpsikologi pemain game scatter klasikstrategi buy spin data probabilitastanda algoritma game sedang dinginobservasi taktik dan gaya permainan terbaru yang dimiliki lucky nekorasio peningkatan taktik mahjong ways semakin terlihat di pg softstrategi mahjong ways untuk terjun di permainan online semakin meningkatkan di tahun 2026struktur permainan mahjong ways dengan penilaian casino onlinestudi banding teknik wild bounty showdown pastikan roulette alami peningkatane5 strategi cerdas memanfaatkan data dan algoritma untuk momentume5 strategi konsisten lahir dari pemahaman rtp hariane5 strategi membaca formasi scatter di mahjong wins 3 yang sedang virale5 strategi modern berbasis algoritma untuk mengukur momentume5 strategi modern tumbuh dari analisis data rtp harian Top