1 Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security RETAIL EDITION #2015InsiderThreat RESEARCH BRIEF
2 RETAIL CUSTOMERS AT RISK ABOUT THIS RESEARCH BRIEF This Research Brief highlights the results collected online by Harris Poll from 102 IT decision makers in U.S. retail enterprises in the Fall of U.S. results are compared, where applicable, to findings among IT decision makers in other U.S. enterprises, as well as those in other countries. INSIDER THREATS NO LONGER JUST TYPICAL EMPLOYEES In the past, insider threats resulted mainly from employees with access to financial data or other secret and sensitive information. That s no longer the case today. Today, employees with legitimate access, service providers or contractors that maintain infrastructure and privileged users are all possible actors, and potential attack vectors when their credentials are compromised. THE SPECTRUM OF INSIDER THREATS TRADITIONAL INSIDERS PRIVILEGED USERS HACKERS ACTIVELY TARGETING INSIDER ACCOUNTS CRIMINAL HACKERS CLOUD/SAAS NATION STATES BIG DATA POROUS PERIMETERS 2
3 2015 Vormetric Insider Threat Report / retail edition RESEARCH BRIEF Criminal hackers continue to be retailers greatest worry, and nearly every retail data breach has included a compromise of a privileged user account or a privileged account at a partner with access to the retailers network. In the U.S., where less vulnerable pin and chip technology for credit card transactions is rarely deployed today, retailers Achilles Heel has been conventional magnetic stripe credit card data. Since retailers have used magnetic stripe credit card data to help keep track of customer profiles and preferences, the result has been a proliferation of sensitive data sites across retail networks beyond the server environments needed simply for transaction processing and increased exposure for retailers. RETAIL CUSTOMERS FEEL THE PAIN The last two years have seen a continuous stream of U.S. and international retailers that have publicly admitted to significant losses of their customers personal data. Although the highest profile has been losses of credit card data, thieves often moved on to steal logins and passwords, IDs and physical addresses. They also target customer profile information about what, where and how people are buying from these retailers. It s a different level of information loss from those in the past, and the results have also been different. Not so long ago, data breach remediation for end users, and shake ups within IT organizations were typically the only results of a retail data breach. But some recent breaches have resulted in bottom line quarterly profit problems and replacements all the way to top executive staff. Home Depot, Target, Nieman Marcus, ebay, Staples and a host of others have been seriously affected. RETAILERS ARE FAILING TO SECURE THEIR DATA 48% DATA BREACH 48% Indicated that their organization had experienced a DATA BREACH or FAILED A COMPLIANCE AUDIT in the last year 38% Of respondents were securing sensitive data because of a breach at a partner or competitor 20% Were securing sensitive data because of a previous data breach at their organization 3
4 3x INCREASE IT SECURITY SPENDING PRIORITY FOR DATA BREACH PREVENTION U.S. RETAILERS VERY OR EXTREMELY VULNERABLE Although the overall rate of U.S. retailers who responded as being Somewhat or more vulnerable was the same as the overall U.S. number of 93%, the big differences were in the rate at which respondents at retailers reported being Very or Extremely vulnerable (51%). The rate was more than twice that of enterprise respondents outside of the U.S. (24%). U.S. RETAILERS HIGHEST RATES OF VERY OR EXTREMELY VULNERABLE 30% 16% 51% 33% 17% 24% 2X UK GERMANY U.S. RETAILERS ASEAN JAPAN OUTSIDE U.S. IT Decision Makers at U.S. Retail Enterprises feel very or extremely vulnerable at 2X the rate of non-u.s. enterprises polled ATTITUDES TO IT SECURITY INVESTMENTS ARE CHANGING With this level of concern, and with the constantly repeated news of data breaches, U.S. retail organizations appear to be responding with a change in their IT Security spending priorities. Looking back to the results returned from our 2013 Vormetric Insider Threat Report, compliance was by far the biggest driver for IT Security spending increases at 45%. Those citing a data breach at their organization as a driver were only 7% of respondents at the time, and 21% of respondents noted that they were setting increased spending priorities because of a data breach at another organization. Fast forward to today, and the scene has dramatically changed. Preventing a data breach incident is now the top driver for setting IT Security spending priorities at 63%, 3x from 2013, while fulfilling compliance requirements and passing audits has fallen to the bottom of the list at 27%. In addition, 62% of respondents are planning to increase spending to offset the threats, versus 51% for enterprises outside of the U.S. 4
5 2015 Vormetric Insider Threat Report / retail edition RESEARCH BRIEF DRAMATIC CHANGES IN IT SECURITY SPENDING PRIORITIES DATA BREACH 2013 SPENDING PRIORITIES 45% Compliance Requirements 21% Preventing a Data Breach 3X INCREASE 2015 SPENDING PRIORITIES 63% Preventing a Data Breach 27% Compliance Requirements TOP IT SECURITY SPENDING PRIORITIES AMONG IT DECISION MAKERS AT U.S. RETAILERS DATA BREACH IP 63% 37% 36% 36% 27% PREVENTING A DATA BREACH INCIDENT PROTECTION OF CRITICAL IP DATA BREACH PROTECTION OF FINANCES AND OTHER ASSETS FULFILLING REQUIREMENTS FROM CUSTOMERS, PARTNERS AND PROSPECTS FULFILLING COMPLIANCE REQUIREMENTS AND PASSING AUDITS 59% PRIVILEGED USERS THE MOST DANGEROUS INSIDER With the combination of their often unfettered access to data on systems that they maintain, and the risks from compromise of their credentials, it s no wonder that respondents identified Privileged Users as the insiders that pose the largest risk to their organizations. CLOUD, BIG DATA AND DATABASES ARE TOP DATA LOSS RISKS Continued growth in cloud and big data deployments has introduced new security concerns due to increased volumes of sensitive data, the distributed nature of that data, a lack of control over the data, and the growing number of users who need to access it. This is a new extension of the ongoing balancing act between business efficiency and security. The result? Both traditional databases and newer cloud and big data environments are top worries for retailers. With cloud environments both holding the greatest amount of sensitive data (49%), and having a corresponding concern for the risks of loss that this entails (51%), retailers have a clear view of where they are vulnerable. Databases are the traditional location for credit card information and for customer profiles, while big data environments are frequently used to perform deep analysis of customer buying patterns and behavior. As a result, respondents showed great concern for the risks that these environments entail for their organizations. CLOUD, BIG DATA AND DATABASES ARE HIGH RISKS FOR DATA LOSS AT GREATEST RISK FOR DATA LOSS HOLDS THE GREATEST AMOUNT OF SENSITIVE DATA 51% Cloud 37% Big Data 37% Databases 49% Cloud 42% Databases 34% Big Data 5
6 THE MOST SURPRISING FINDING FOR IT DECISION MAKERS AT U.S. RETAILERS THEY AREN T SURE HOW TO SOLVE THE PROBLEM When asked what IT Security solutions organizations were planning to increase spending on, the results show that the respondents reported about the same level of investments in all categories, and also rated all categories of defenses as almost equally effective in defending against the threat. What s more, 77% of retail organizations also responded that compliance requirements were Very or Extremely effective at offsetting insider threats. We believe that this represents a problem organizations are not identifying and investing in the solutions that are most effective at solving the problem. The emphasis on compliance is surprising given that many of the retail data breaches in the last year happened to retailers who were compliant with standards such as PCI DSS. The facts are that compliance requirements evolve slowly, and can t keep up with fast changing threats. They are a good baseline to build a security strategy from, but do not represent a full solution. In the past when threats changed more slowly, compliance requirements were considerably stricter than organizations needed for day-to-day operations, and looked on as a gold standard. This can no longer be considered to be true. The lack of focus about which IT Security investments to make, and which defenses are most effective in offsetting insider threats is also disturbing. The data shows that retailers are still planning their spending, and rating as effective, IT security tools that haven t fixed the problem. Both IT analysts and industry experts can frequently be heard to say that it is no longer if organizations external defenses will be penetrated, it is only a question of when. Endpoint and network defenses are the usual entry points, as the nature of attacks has evolved to bypass these traditional defenses. What is needed is a data first security strategy to offset these threats. U.S. RETAILERS ARE NOT SURE HOW TO SOLVE THE PROBLEM 78% 84% 81% 78% 87% INCREASING SPENDING 56% 56% 56% 55% 54% RATED VERY OR EXTREMELY EFFECTIVE AS A DEFENSE ANALYSIS & CORRELATION TOOLS DATA-AT-REST DEFENSES DATA-IN-MOTION DEFENSES END POINT & MOBILE DEFENSES NETWORK DEFENSES Organizations both plan to invest in, and also rate as effective end p - oint and network defenses that are consistently penetrated in insider attacks. 6
7 2015 Vormetric Insider Threat Report / retail edition RESEARCH BRIEF IMPLEMENT A DATA FIRST SECURITY STRATEGY TO OFFSET THESE THREATS: Because point-based security solutions are already failing to detect advanced attacks using employee credentials and data theft by legitimate users, a layered defense combining traditional as well as advanced data protection techniques is the path forward. Data protection initiatives need to concentrate on protecting data at the source. For most organizations, this will involve protecting a mix of on-premise databases and servers, and remote cloud and big data applications. Companies should integrate new encryption technology that minimizes operational impact and works with strong access controls and key management for all important data sources. Implementing integrated data monitoring and technologies such as security information and event management (SIEM) systems to identify data usage and unusual and malicious access patterns is critical to maximizing security. To keep the whole organization safe, companies must develop an integrated data security strategy that includes monitoring, relevant access control, and levels of data protection, and leaves security to the CISO, not the boardroom. RETAILERS EXISTING PROTECTIONS FOR DATA-AT-REST 54% Database/File Encryption 48% Data Access Monitoring 42% Application Layer encryption 31% Data Masking 28% Tokenization HARRIS POLL SOURCE AND METHODOLOGY Vormetric s 2015 Insider Threat Report was conducted online by Harris Poll on behalf of Vormetric from September 22 October 16, 2014, among 818 adults ages 18 and older, who work full-time as an IT professional in a company and have at least a major influence in decision making for IT. In the U.S., 408 ITDMs were surveyed among companies with at least $200 million in revenue with 102 from the health care industries, 102 from financial industries, 102 from retail industries and 102 from other industries. Roughly 100 ITDMs were interviewed in the UK (103), Germany (102), Japan (102), and ASEAN (103) from companies that have at least $100 million in revenue. ASEAN countries were defined as Singapore, Malaysia, Indonesia, Thailand, and the Philippines. This online survey is not based on a probability sample and therefore no estimate of theoretical sampling error can be calculated. THE 2013 VORMETRIC INSIDER THREAT REPORT On the behalf of Vormetric, Enterprise Strategy Group conducted research around insider threats, privileged users, and advanced persistent threats (APTs). The survey targeted primarily Fortune 1,000 industries and was responded to by 707 IT executives and managers with knowledge of IT security and insider threats. With insider threats to data security on the rise, organizations that focus their security spending on protecting data at the source, implementing data access monitoring technologies, and developing an integrated security strategy that includes the latest encryption technologies will have greater success protecting their most valuable asset. To read the full 2015 Vormetric Insider Threat Report Global Edition, please visit 7
8 2015 VORMETRIC INSIDER THREAT REPORT RETAIL EDITION RESEARCH BRIEF Vormetric.com/InsiderThreat/ Vormetric, Inc. All rights reserved.
2015 VORMETRIC INSIDER THREAT REPORT / CLOUD AND BIG DATA EDITION Research Conducted by Research Analyzed by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security CLOUD AND
Unlocking the business value of social, mobile, cloud and big data How businesses are turning to Managed Service Providers to optimize transformative technologies June 2013 Contents Scope of research/methodology
A SANS Analyst Survey Written by Joshua Wright Advisor: Chris Crowley December 2013 Sponsored by Trusted Computing Group 2013 SANS Institute Introduction It s not shocking to see media reports depicting
A REPORT BY HARVARD BUSINESS REVIEW ANALYTIC SERVICES Meeting the Cyber Risk Challenge Sponsored by ABOUT ZURICH INSURANCE GROUP Zurich Insurance Group (Zurich) is a leading multi-line insurance provider
TELSTRA CYBER SECURITY REPORT 2014 Security insights, trends and impact to Australian organisations EXECUTIVE SUMMARY The internet presents a world of social connectivity, economic growth and endless opportunities
2014 DATA BREACH INVESTIGATIONS REPORT Executive Summary INSIDER MISUSE DOS ATTACKS MISCELLANEOUS ERRORS PHYSICAL THEFT AND LOSS CYBER-ESPIONAGE CRIMEWARE PAYMENT CARD SKIMMERS WEB APP ATTACKS 92 % THE
Network Barometer Report 2015 A gauge of global networks readiness to accelerate business The Network Barometer Report 2015 can be downloaded at: dimensiondata.com/networkbarometer About Dimension Data
2014 Year of Mega Breaches & Identity Theft Findings from the 2014 BREACH LEVEL INDEX POWERED BY BREACH LEVEL INDEX THE NUMBERS RECORDS BREACHED IN 2014 1,023,108,267 NUMBER OF BREACH INCIDENTS 1,541 BREACHED
STATE OF DNS AVAILABILITY REPORT VOLUME 1 ISSUE 1 APRIL 2011 WEB SITES AND OTHER ONLINE SERVICES ARE AMONG THE MOST IMPORTANT OPERATIONAL AND REVENUE GENERATING TOOLS FOR BUSINESSES OF ALL SIZES AND INDUSTRIES.
ICC CYBER SECURITY GUIDE FOR BUSINESS ICC CYBER SECURITY GUIDE FOR BUSINESS Acknowledgements The ICC Cyber security guide for business was inspired by the Belgian Cyber security guide, an initiative of
Cyber-Security Essentials for State and Local Government Best Practices in Policy and Governance Operational Best Practices Planning for the Worst Case Produced by with content expertise provided by For
Cyber Security Planning Guide The below entities collaborated in the creation of this guide. This does not constitute or imply an endorsement by the FCC of any commercial product, service or enterprise
Identity and access management as a driver for business growth February 2013 Identity and access management (IAM) systems are today used by the majority of European enterprises. Many of these are still
A Websense White Paper ADVANCED PERSISTENT THREATS AND OTHER ADVANCED ATTACKS: THREAT ANALYSIS AND DEFENSE STRATEGIES FOR SMB, MID-SIZE, AND ENTERPRISE ORGANIZATIONS REV 2 ADVANCED PERSISTENT THREATS AND
Unisys Security Insights: Germany A Consumer Viewpoint - 2015 How consumers in Germany feel about: Personal data security, ranked by industry Experiences concerning security of personal data Research by
www.pwc.co.uk Beyond cyber threats: Europe s First Information Risk Maturity Index A PwC report in conjunction with Iron Mountain March 2012 Contents Foreword 1 Executive summary 2 Information: a priceless
Introduction.... 1 Emerging Trends and Technologies... 3 The Changing Landscape... 4 The Impact of New Technologies... 8 Cloud... 9 Mobile... 10 Social Media... 13 Big Data... 16 Technology Challenges...
WE SECURE THE FUTURE THE PLASTIC BREACH PROTECTING THE RETAIL SECTOR TABLE OF CONTENTS 03 THE PLASTIC BREACH PROTECTING THE RETAIL SECTOR 04 THE RISING COST OF FRAUD 06 WHY PROTECT THE PoS 08 HOW TO SPOT
The Custom Defense Against Targeted Attacks A Trend Micro White Paper Contents Executive Summary...3 The Anatomy of a Targeted Attack...4 The Reality and Costs of Targeted Attacks...5 Strategic Choices
Cisco 2014 Annual Security Report 2 Cisco 2014 Annual Security Report Executive Summary The Trust Problem The exploitation of trust is a common mode of operation for online attackers and other malicious
npower Business energy index 2013 2 npower Business Energy Index 2013 3 npower Business Energy Index 2011 Contents 3 CONTENTS INTRODUCTION... 04 RESEARCH METHODOLOGY AND SAMPLE... 05 ENERGY MANAGEMENT...
Ovum Decision Matrix: Selecting an Endpoint/Mobile Security Solution, 2014 2015 Publication Date: 14 Aug 2014 Andrew Kellett Product code: IT0022-000145 Summary Catalyst Organizations are being targeted