Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary"

Transcription

1 Is cyber security now too hard for enterprises? Executive Summary

2 Sponsors The creation and distribution of this study was supported by CGI, cybx and Fujitsu/Symantec. Premium sponsors: Gold sponsor: 2

3 Core statements I. Cyber security is now too hard for enterprises The threat is increasing Board level concern is increasing Yet budget are static II. Enterprises would prefer to: Hire more staff and retrain existing internal staff Use external resources on a project basis only And yet, 70% of enterprises outsource at least some of their security III. Enterprises are more willing to consider outsourced security There s an inherent reluctance to outsource But it fixes some immediate issues, such as skills and compliance IV. BDMs are: Less likely to support Cloud-based security More concerned at the prospect of outsourcing Governance and Security Management 3

4 Introduction Enterprises today are faced with three key challenges: Implementing new SMAC technologies to support the business, as part of their digital transformation programs, but while keeping it secure; Responding to the increasing and changing threat landscape of targeted attacks; Achieving and retaining compliance with an increasing number of rules and regulations. Our hypothesis for this study was that enterprises are struggling to cope with the increase in workload, and are increasingly offloading (some of) their security provision to outsourcing providers as Managed Security Services (MSS). We surveyed 230 decision makers in large companies in the UK, to understand their motivations and drivers with regard to cyber security provision. Sample IT Decision Makers This study deals with the following questions: What do companies understand about the growing cyber threat landscape? How are companies meeting their resource challenges in cyber security? How are they using external providers to meet resource challenges? What are the drivers and inhibitors for using external cyber security providers? What alternative approaches to external cyber security provision being considered? Which services do companies expect from a cyber security provider? What are the capabilities and attributes of a credible cyber security provider? 16% Critical National Infrastructure 53% Business Decision Makers 15% Manufacturing 47% 21% CxO 16% Financial Services 4

5 Executive summary I Cyber security is increasing in importance as the threat landscape worsens. But budgets are not rising in line. The overall picture of cyber security provision in large organisations is that the threat landscape is getting worse, board attention and focus is increasing, but there is a funding shortfall in many organisations. An overwhelming majority of enterprises see the cyber threat getting worse. This is not a surprise, but it does enable us to quantify the scale and extent of enterprises perception regarding the cyber landscape. As our figure shows, 70% of respondents believe that the situation is getting worse. We believe that this is caused in part by respondents own experience within their firms and partly by the greater exposure to cyber security breaches in the national and trade press. Firms preferred approach to this is to increase the amount of security automation, followed by training of internal staff. There is a clear reluctance (or inability) to hire external staff and a tangible antipathy towards outsourcing. However, organisational reluctance to outsourcing does not necessarily translate into practice, with more organisations admitting to using external resources than would prefer to do so. 70% There has been no increase in cyber security budget The cyber threat landscape is getting worse, in terms of the number and type of threats and threat sources 53% 5

6 Executive summary II Firms are suspicious of outsourcing as they dislike loss of visibility & control. But they do use 3 rd parties selectively. 6 Our research shows that organisations have an innate reluctance to outsource, and this even extends to admitting that outsourcing goes on. But by drilling down into actual practice we discover that there is a high degree of use of external provision, including outsourcing. The prevalent method of using external provision is by buying in expertise on a project-by-project basis. The overall motivation for using external provision, including outsourcing, is a combination of a lack of funds and expertise, echoing our earlier findings which identified a funding gap. The double whammy of insufficient funds and a scarcity of skills appears to be driving organisations towards external resources, including outsourcing, even though there is a clear reluctance to do this. This represents an entirely pragmatic approach, according to PAC. Organisations dislike losing visibility and control of processes, especially those that have a high risk profile such as cyber security. But the pressures on budgets and expertise are such that companies have little option but to use external providers. Preferred approach to increased security workload Outsourcing part or all of security provision Other approaches 74% 26% Possible parts of security you could outsource in the future 26% A broad range of outsourcing targets 74% Would not consider outsourcing

7 Executive summary III The importance of cyber security to enterprises drives a detailed examination of suppliers credentials & experience Cyber security is critical to organisations. And although they currently use external providers, they are clear that when they do such providers must come with robust credentials. Of those organisations that currently outsource or use external support for security provision, a majority target risk management (combined 75%) and audit & penetration tests (76%). 68% of firms that use some external provision do so in the management of security solutions, a oft-reported headache for CISOs. Enterprises are clear when asked to report the key attributes of a potential cyber security services provider. They value evidence, in the form of a strong track record and security expertise and skills. Industry knowledge is also important, as is a trusted and well-known brand. Cyber security is too important to businesses for them to adopt additional risks with their suppliers. It is important then for suppliers to communicate their track records, and strong industry knowledge is also extremely useful. 73% Security expertise and skills Strong track record in cyber security 71% 7

8 Premium Sponsors Profiles PAC

9 Company profile: cybx About cybx cybx is a cutting edge cyber training and exercising capability that builds your organisation s confidence in exploiting the growth opportunities of digital innovation in the global economy and to develop resilience against the ever-evolving threat of cyber attacks. cybx is delivered by Serco Ltd from the Cabinet Office s Emergency Planning College (EPC). Using simulated corporate networks, cybx can apply a range of real world cyber attacks to an organisation s current or future operating model. This enables organisations to manage the sophisticated challenge of cyber-attacks by placing people at the heart of the solution and taking a business driven, cross-functional approach to cyber resilience, cybx aims to integrate your cyber security team with your crisis management, communications, business continuity and risk management functions. By taking a board room to server room approach, we help organisations to: Integrate cyber-resilience into wider enterprise risk management and governance. Have objective assessment of business risks resulting from different cyber attacks Develop and deliver a road map for a business driven cyber resilience capability The cybx training and exercising ethos is to establish long-term relationships, and work in partnership with our clients and supporting partners. We believe cybx offers the potential for a step change in training, testing and developing cyber resilience and ensuring it s coherent with wider resilience best practice. To find out more please visit 9

10 Company profile Fujitsu Technology Solutions GmbH About Fujitsu Fujitsu is a Japanese IT company offering a complete range of products, services and solutions. From looking after applications and protecting data, to managing supercomputers around the world, Fujitsu helps businesses everywhere to become more innovative and efficient. Fujitsu employs 162,000 people worldwide with 14,000 people based in the UK and Ireland. For the fiscal year ending March 31, 2014, Fujitsu reported revenues of US$46 billion globally, with the UK & Ireland s annual revenue reaching 1.8 billion. Fujitsu is committed to being a responsible business and recently achieved a 4 star rating in Business in the Community s 2014 Corporate Responsibility Index, as well as being ranked number 17 in the in Newsweek s Global Top 500 Green companies. Over the last five decades Fujitsu has played a vital role in building and maintaining many of the services that keep the UK and Ireland working. Today, Fujitsu ICT solutions are behind many of the daily services that touch the lives of millions of people every single day. Every day, Fujitsu technology is touching lives: Enabling the processing of 2.8 million UK passports every year Helping hospitality companies serve over 570 million drinks and over 130 million meals every year Helping to supply energy to 12 million homes and 1 million businesses Providing the infrastructure for over 40% of the UK s broadband network Helping financial services providers to serve over 40 million customers and operate over 20,000 local branches Connecting 300,000 defence users in over 2,000 locations worldwide Helping businesses everywhere to become safer (more secure), more innovative and more efficient. Fujitsu see s information technology as part of the bigger picture and as one of the world s largest ICT providers, it works towards bringing a prosperous future that fulfils the dreams of people throughout the world. 10

11 Company profile: Symantec About Fujitsu Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses and governments seeking the freedom to unlock the opportunities technology brings -- anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company, operating one of the largest global data-intelligence networks, has provided leading security, backup and availability solutions for where vital information is stored, accessed and shared. The company's more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2014, it recorded revenues of $6.7 billion. To learn more go to or connect with Symantec at: go.symantec.com/socialmedia. 11

12 Gold Sponsor Profile PAC

13 Company profile: CGI About CGI Founded in 1976, CGI Group Inc. is the fifth largest independent information technology and business process services firm in the world. Approximately 68,000 professionals serve thousands of global clients from offices and delivery centres across the Americas, Europe and Asia Pacific, leveraging a comprehensive portfolio of services including high-end business and IT consulting, systems integration, application development and maintenance, infrastructure management as well as a wide range of proprietary solutions. Cyber security is part of everything we do and for over 35 years, our government and commercial clients have regarded us as their cyber security expert of choice. Cyber-attacks are becoming more sophisticated and can cause financial loss, reputational damage, theft of business critical information or regulatory fines. We have helped our clients build cyber security into their corporate strategy so they can conduct business in a digital age with confidence, openly and globally, driving competitive advantage, efficiency and growth. We have invested heavily in establishing our credentials by working closely with international security associations and standards bodies and we have built a CGI UK Cyber Centre. Many of our experts are recognised as leaders in the industry, contributing to the development of standards such as ISO/IEC They are part of CGI s 1,400 strong global cyber security team and they bring this shared expertise, research, knowledge and solutions to our client projects. We have received many accolades for our work and have supported our clients to achieve a 100% success rate when undertaking ISO accreditation. We provide the deep sector and cyber expertise needed to keep ahead of the attackers and protect an organisation. 13

14 Company profile: CGI About CGI (continued) Our cyber security technical experts have helped our clients design, develop and deliver some of the world s most complex, secure technology projects and services. We have also been trusted by hundreds of government and commercial clients to help them operate securely. CGI has ten Security Operating Centres (including one in the UK) providing Protective Monitoring and Advanced Threat Investigation services - handling more than 74 million cyber events every day. For 27 years we have operated a commercial evaluation facility and regularly test the products and services of over 25 global technology suppliers. We offer the full range of cyber security services needed by clients to: assess their cyber security risk including risk and vulnerability assessments, governance, awareness, supply chain review and compliance protect their business including new technologies such as mobile and cloud, secure systems engineering, identity and access management, testing, certification operate with confidence including protective monitoring, advanced threat investigation, penetration testing and incident response Our deep and broad experience helps our clients be agile, adopt new technologies and ways of working, develop a global supply chain and open new channels to their customers whilst remaining confident that they are secure. We believe that if you want your organisation to be considered as a top employer, one that customers love, that suppliers want to be working with and which takes advantage of the latest technologies - cyber security should be part of that vision. Find our more at cgi-group.co.uk/cybersecurity or contact us on 14

15 Disclaimer, usage rights, independence and data protection This study was compiled in multi-client mode under the sponsorship of CGI, cybx and Fujitsu/Symantec. For further information, please visit Disclaimer The contents of this study were compiled with the greatest possible care. However, no liability for their accuracy can be assumed. Analyses and evaluations reflect the state of our knowledge in January 2015 and may change at any time. This applies in particular, but not exclusively, to statements made about the future. Names and designations that appear in this study may be registered trademarks. Usage rights This study is protected by copyright. Any reproduction or dissemination to third parties, including in part, requires the prior explicit authorization of the sponsors. The publication or dissemination of tables, graphics etc. in other publications also requires prior authorization. Independence and data protection This study was produced solely by Pierre Audoin Consultants (PAC). The sponsors had no influence over the analysis of the data and the production of the study. The participants in the study were assured that the information they provided would be treated confidentially. No statement enables conclusions to be drawn about individual companies, and no individual survey data was passed to the sponsors or other third parties. All participants in the study were selected at random. There is no connection between the production of the study and any commercial relationship between the respondents and the sponsors of this study. 15

16 About us" From strategy to execution, PAC delivers focused and objective responses to the growth challenges of Information and Communication Technology (ICT) players. Duncan Brown Research Director, Cyber Security +44 (0) PAC helps ICT vendors to optimize their strategies by providing quantitative and qualitative market analysis as well as operational and strategic consulting. We advise CIOs and financial investors in evaluating ICT vendors and solutions and support their investment decisions. Public institutions and organizations also rely on our key analyses to develop and shape their ICT policies. Founded in 1976 and headquartered in Paris, France, PAC is part of the CXP Group, the leading European research & advisory firm in the field of software and IT services. For more information, please visit: PAC s latest news:

Gold study sponsor: Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary

Gold study sponsor: Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary Gold study sponsor: Is cyber security now too hard for enterprises? Cyber security trends in the UK Executive Summary Core statements I. Cyber security is now too hard for enterprises The threat is increasing

More information

Premium study sponsors: Is cyber security now too hard for enterprises?

Premium study sponsors: Is cyber security now too hard for enterprises? Premium study sponsors: Is cyber security now too hard for enterprises? Company profile Fujitsu Technology Solutions GmbH About Fujitsu Fujitsu is a Japanese IT company offering a complete range of products,

More information

Gold Sponsor of the study: Incident Response Management

Gold Sponsor of the study: Incident Response Management Gold Sponsor of the study: Incident Response Management How European Enterprises are Planning to Prepare for a Cyber Security Breach Y R A M SUM IVE T U C E PAC 2015 X E Telefonica company profile About

More information

Digital Transformation in Germany

Digital Transformation in Germany Silver sponsor of the study: Changing marketing and IT strategies Executive Summary Background The way enterprises interact with their customers is currently undergoing a massive change: Digital technologies,

More information

Cyber Security Services: Data Loss Prevention Monitoring Overview

Cyber Security Services: Data Loss Prevention Monitoring Overview WHITE PAPER: DLP MONITORING OVERVIEW........................................ Cyber Security Services: Data Loss Prevention Monitoring Overview Who should read this paper Customers who are interested in

More information

Symantec Cyber Security Services: DeepSight Intelligence

Symantec Cyber Security Services: DeepSight Intelligence Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with

More information

REPORT. Next steps in cyber security

REPORT. Next steps in cyber security REPORT March 2015 Contents Executive summary...3 The Deloitte and Efma questionnaire...5 Level of awareness...5 Level of significance...8 Level of implementation...11 Gap identification and concerns...15

More information

PAC Multi-Client Study 2014. Applications Modernization: The path to Omni-channel retail

PAC Multi-Client Study 2014. Applications Modernization: The path to Omni-channel retail PAC Multi-Client Study 2014 Applications Modernization: The path to Omni-channel retail What is Applications Modernization? Old World Fragmented application estates, sprawl caused by M&A activity, globalization

More information

Omnichannel Retail in 2015 in Europe How are European retailers modernising their application landscapes to unlock the full potential of omnichannel?

Omnichannel Retail in 2015 in Europe How are European retailers modernising their application landscapes to unlock the full potential of omnichannel? How are European retailers modernising their application landscapes to unlock the full potential of omnichannel? PAC Multi-Client Study 2015 Omni-Channel Presents a Huge Applications Challenge for Retailers

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

security changes with Orange focus on your business, we focus on your security

security changes with Orange focus on your business, we focus on your security security changes with Orange focus on your business, we focus on your security the only constant in security is change New uses and new technologies, proliferation of platforms and new workspaces in a

More information

Host-based Protection for ATM's

Host-based Protection for ATM's SOLUTION BRIEF:........................................ Host-based Protection for ATM's Who should read this paper ATM manufacturers, system integrators and operators. Content Introduction...........................................................................................................

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

Premium Sponsor of the study: Incident Response Management

Premium Sponsor of the study: Incident Response Management Premium Sponsor of the study: Incident Response Management How European Enterprises are Planning to Prepare for a Cyber Security Breach PAC 2015 Preface Arthur Wong, Senior Vice President of Enterprise

More information

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built

More information

CYBER SECURITY Audit, Test & Compliance

CYBER SECURITY Audit, Test & Compliance www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance 02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit

More information

DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1

DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1 DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1 Continuously Assess, Monitor, & Secure Your Information Supply Chain and Data Center Data Sheet: Security Management Is your organization able

More information

How to Unlock Agility by Backing up to, from, and in the Cloud

How to Unlock Agility by Backing up to, from, and in the Cloud WHITE PAPER: HOW TO UNLOCK AGILITY BY BACKING UP TO, FROM,....... AND.... IN.. THE.... CLOUD....................... How to Unlock Agility by Backing up to, from, and in the Cloud Who should read this paper

More information

Achieving Business Agility Through An Agile Data Center

Achieving Business Agility Through An Agile Data Center Achieving Business Agility Through An Agile Data Center Overview: Enable the Agile Data Center Business Agility Is Your End Goal In today s world, customers expect or even demand instant gratification

More information

Can security conscious businesses really adopt the Cloud safely?

Can security conscious businesses really adopt the Cloud safely? Can security conscious businesses really adopt the Cloud safely? January 2014 1 Phone: 01304 814800 Fax: 01304 814899 info@ Contents Executive overview The varied Cloud security landscape How risk assessment

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

Companies need integrated mobility management solutions

Companies need integrated mobility management solutions Spotlight analysis Companies need integrated mobility management solutions January 2014 f This spotlight analysis is based on the PAC trend study Mobile Device & Application Management in Germany, France,

More information

TCS as a Digital Transformation Partner for European Customers

TCS as a Digital Transformation Partner for European Customers TCS as a Digital Transformation Partner for European Customers December 2014 By Nicole Dufft, Independent Vice President - Digital Enterprise, PAC Germany TCS as a Digital Transformation Partner 2 1. INTRODUCTION

More information

Partner Technical Support Benefits Quick Guide

Partner Technical Support Benefits Quick Guide PARTNER BRIEF: TECHNICAL SUPPORT BENEFITS........................................ Symantec Secure One Partner Technical Support Benefits Who should read this paper Symantec Partners supporting end user

More information

Is a cyber breach inevitable? Cyber Security Challenges in the Netherlands

Is a cyber breach inevitable? Cyber Security Challenges in the Netherlands Cyber Security Challenges in the Netherlands June 2015 Comissioned by: 2 Published by CGI George Hintzenweg 89, 3068 AX Rotterdam, The Netherlands Pierre Audoin Consultants (PAC) Ltd 15 Bowling Green Lane,

More information

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions Managed Security Managed Security MANAGED SECURITY SOLUTIONS I would highly recommend for your company s network review... were by far the best company IT Manager, Credit Management Agency Presenting IT

More information

Symantec Control Compliance Suite Standards Manager

Symantec Control Compliance Suite Standards Manager Symantec Control Compliance Suite Standards Manager Automate Security Configuration Assessments. Discover Rogue Networks & Assets. Harden the Data Center. Data Sheet: Security Management Control Compliance

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

Risk Management for Industrial Control Systems (ICS) And Supervisory Control Systems (SCADA) Information For Senior Executives

Risk Management for Industrial Control Systems (ICS) And Supervisory Control Systems (SCADA) Information For Senior Executives Risk Management for Industrial Control Systems (ICS) And Supervisory Control Systems (SCADA) Information For Senior Executives (Revised March 2012) Disclaimer: To the extent permitted by law, this document

More information

The Symantec Approach to Defeating Advanced Threats

The Symantec Approach to Defeating Advanced Threats WHITE PAPER: THE SYMANTEC APPROACH TO DEFEATING ADVANCED........... THREATS............................. The Symantec Approach to Defeating Advanced Threats Who should read this paper For security practioners

More information

A strategic approach to fraud

A strategic approach to fraud A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for

More information

Sponsor of the study: Holistic Customer Experience in the Digital Age

Sponsor of the study: Holistic Customer Experience in the Digital Age Sponsor of the study: Holistic Customer Experience in the Digital Age A Trend Study for Germany, France and the UK PAC 2015 Core findings 1 Everybody talks about digitization but few companies have a profound

More information

SOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT)

SOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT) INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT THE FIFTH ANNUAL SURVEY ON THE CURRENT STATE OF AND TRENDS IN INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT Sponsored by October 2015

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

Top 5 Reasons to Choose User-Friendly Strong Authentication

Top 5 Reasons to Choose User-Friendly Strong Authentication SOLUTION BRIEF: USER-FRIENDLY STRONG AUTHENTICATION........................................ Top 5 Reasons to Choose User-Friendly Strong Authentication Who should read this paper This executive brief asserts

More information

Symantec Messaging Gateway 10.6

Symantec Messaging Gateway 10.6 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Don't Wait Until It's Too Late: Choose Next-Generation Backup to Protect Your Business from Disaster

Don't Wait Until It's Too Late: Choose Next-Generation Backup to Protect Your Business from Disaster WHITE PAPER: DON'T WAIT UNTIL IT'S TOO LATE: CHOOSE NEXT-GENERATION................. BACKUP........ TO... PROTECT............ Don't Wait Until It's Too Late: Choose Next-Generation Backup to Protect Your

More information

CGI Cyber Risk Advisory and Management Services for Insurers

CGI Cyber Risk Advisory and Management Services for Insurers CGI Cyber Risk Advisory and Management Services for Insurers Minimizing Cyber Risks cgi.com 3 As organizations seek to create value in today s highly interconnected world, they inherently increase their

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

Protecting Malaysia in the Connected world

Protecting Malaysia in the Connected world Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE

More information

Requirements of the German Mittelstand in outsourcing provider selection

Requirements of the German Mittelstand in outsourcing provider selection Thesis paper Requirements of the German Mittelstand in outsourcing provider selection An analysis by Pierre Audoin Consultants (PAC) on the German mid-market and Wipro s role in this market January 2013

More information

Are European companies equipped to fight off cyber security attacks?

Are European companies equipped to fight off cyber security attacks? A Steria Report Are European companies equipped to fight off cyber security attacks? Executive summary In collaboration with PAC è www.steria.com è www.steria.com Are European companies equipped to fight

More information

Procuring Penetration Testing Services

Procuring Penetration Testing Services Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat

More information

Securing Your Enterprise in the Cloud. IT executives must be ready to move to the cloud safely

Securing Your Enterprise in the Cloud. IT executives must be ready to move to the cloud safely Securing Your Enterprise in the Cloud IT executives must be ready to move to the cloud safely The technology pendulum is always swinging. And chief information security officers must be prepared to swing

More information

Asset Discovery with Symantec Control Compliance Suite

Asset Discovery with Symantec Control Compliance Suite WHITE PAPER: ASSET DISCOVERY WITH SYMANTEC CONTROL COMPLIANCE............. SUITE........................... Asset Discovery with Symantec Control Compliance Suite Who should read this paper IT Operations

More information

Smart Security. Smart Compliance.

Smart Security. Smart Compliance. Smart Security. Smart Compliance. SRM are dedicated to helping our clients stay safe in the information environment. With a wide range of knowledge and practical experience, our consultants are ready to

More information

BT Global Services. September 2010. Security. How security and the cloud can work together to deliver results

BT Global Services. September 2010. Security. How security and the cloud can work together to deliver results BT Global Services September 2010 Security How security and the cloud can work together to deliver results 1 Organisations across the world are seeking the best ways to do the same or more with less. To

More information

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION In the ever-evolving technological landscape which we all inhabit, our lives are dominated by

More information

Securing Critical Information Assets: A Business Case for Managed Security Services

Securing Critical Information Assets: A Business Case for Managed Security Services White Paper Securing Critical Information Assets: A Business Case for Managed Security Services Business solutions through information technology Entire contents 2004 by CGI Group Inc. All rights reserved.

More information

Cyber Security Evolved

Cyber Security Evolved Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are

More information

Symantec Endpoint Protection 12.1.6

Symantec Endpoint Protection 12.1.6 Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly

More information

CYBER SECURITY, A GROWING CIO PRIORITY

CYBER SECURITY, A GROWING CIO PRIORITY www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

Whitepaper : Cloud Based Backup for Mobile Users and Remote Sites

Whitepaper : Cloud Based Backup for Mobile Users and Remote Sites Whitepaper : Cloud Based Backup for Mobile Users and Remote Sites The Organisational Challenges We propose three key organizational principles for assessing backup Security Control Performance Functional

More information

TechNavio Infiniti Research

TechNavio Infiniti Research TechNavio Infiniti Research http://www.marketresearch.com/infiniti Research Limited v2680/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday:

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO

More information

Hosting and cloud services both provide incremental and complementary benefits to the organization

Hosting and cloud services both provide incremental and complementary benefits to the organization 33 Yonge St., Suite 420, Toronto, Ontario Canada, M5E 1G4 W H I T E P A P E R I D C a n d T E L U S E n t e r p r i s e C l o u d S t u d y, 2 0 1 3 : C a p i t a l i z i n g on C l o u d ' s W i n d o

More information

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: A SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN THE ASIA-PACIFIC REGION

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: A SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN THE ASIA-PACIFIC REGION 2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: A SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN THE ASIA-PACIFIC REGION April 2014 Sponsored by: 2014 Network Security & Cyber Risk Management:

More information

Finding Email Security in the Cloud

Finding Email Security in the Cloud WHITE PAPER: FINDING EMAIL SECURITY IN THE CLOUD Finding Email Security in the Cloud CONTENTS Introduction 3 I. Why Good Enough Security is Never Good Enough 3 Mind your security gaps 4 II. Symantec Email

More information

HOW TO SELL CLOUD SERVICES. A channel guide

HOW TO SELL CLOUD SERVICES. A channel guide HOW TO SELL CLOUD SERVICES A channel guide CONTENTS Step One: Dispelling Misconceptions Around Public Cloud 3 Step Two: Explaining the Benefits of Public Cloud 5 What Makes a Great Cloud Service Provider

More information

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber attack is one of the biggest threats to Australian businesses, however many Chief Executive Officers (CEOs) admit a lack

More information

5 Must-Haves for an Enterprise Mobility Management (EMM) Solution

5 Must-Haves for an Enterprise Mobility Management (EMM) Solution SOLUTION BRIEF: 5 MUST-HAVES FOR AN ENTERPRISE MOBILITY......... MANAGEMENT.............. (EMM)...... SOLUTION........... 5 Must-Haves for an Enterprise Mobility Management (EMM) Solution Who should read

More information

Unisys Security Insights: Global Summary A Consumer Viewpoint - 2015

Unisys Security Insights: Global Summary A Consumer Viewpoint - 2015 Unisys Security Insights: Global Summary A Consumer Viewpoint - 2015 How consumers in 12 countries feel about: Personal data security, ranked by industry Region-specific security perceptions Research by

More information

The State of Big Data Infrastructure: Benchmarking global Big Data users to drive future performance

The State of Big Data Infrastructure: Benchmarking global Big Data users to drive future performance The State of Big Data Infrastructure: Benchmarking global Big Data users to drive future performance April 2015 Contents Key findings 3 Big Data projects have arrived 4 Level of adoption 4 Complexity of

More information

Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement.

Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement. Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement June 2011 DISCLAIMER: This document is intended as a general guide only.

More information

CYBER RISK SECURITY, NETWORK & PRIVACY

CYBER RISK SECURITY, NETWORK & PRIVACY CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread

More information

Security & Privacy Current cover and Risk Management Services

Security & Privacy Current cover and Risk Management Services Security & Privacy Current cover and Risk Management Services Introduction Technological advancement has enabled greater working flexibility and increased methods of communications. However, new technology

More information

Issues Derailing IT Team Innovation. Key Challenges Facing IT Teams in 2016

Issues Derailing IT Team Innovation. Key Challenges Facing IT Teams in 2016 Issues Derailing IT Team Innovation Key Challenges Facing IT Teams in 2016 Introduction What are the key challenges facing IT teams that can keep mission critical applications and infrastructure from running

More information

Protecting against cyber threats and security breaches

Protecting against cyber threats and security breaches Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez abenaventem@es.ibm.com IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So

More information

Microsoft Office 365 Migrations with Symantec Enterprise Vault.cloud

Microsoft Office 365 Migrations with Symantec Enterprise Vault.cloud WHITE PAPER: MICROSOFT OFFICE 365 MIGRATIONS WITH SYMANTEC........... ENTERPRISE........... VAULT.CLOUD.................. Microsoft Office 365 Migrations with Symantec Enterprise Vault.cloud Who should

More information

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web

More information

Managing Security Risks in Modern IT Networks

Managing Security Risks in Modern IT Networks Managing Security Risks in Modern IT Networks White Paper Table of Contents Executive summary... 3 Introduction: networks under siege... 3 How great is the problem?... 3 Spyware: a growing issue... 3 Feeling

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

CYBERSECURITY IN HEALTHCARE: A TIME TO ACT

CYBERSECURITY IN HEALTHCARE: A TIME TO ACT share: TM CYBERSECURITY IN HEALTHCARE: A TIME TO ACT Why healthcare is especially vulnerable to cyberattacks, and how it can protect data and mitigate risk At a time of well-publicized incidents of cybersecurity

More information

Effective Communications in Business Continuity Planning

Effective Communications in Business Continuity Planning WHITE PAPER Effective Communications in Business Continuity Planning Leveraging global conferencing to minimize and manage disruptive events By Debra Chin Senior Vice President Palmer Research May 2011

More information

State of Security Survey GLOBAL FINDINGS

State of Security Survey GLOBAL FINDINGS 2011 State of Security Survey GLOBAL FINDINGS CONTENTS Introduction... 4 Methodology... 6 Finding 1: Cybersecurity is important to business... 8 Finding 2: The drivers of security are changing... 10 Finding

More information

eeye Digital Security and ECSC Ltd Whitepaper

eeye Digital Security and ECSC Ltd Whitepaper Attaining BS7799 Compliance with Retina Vulnerability Assessment Technology Information Security Risk Assessments For more information about eeye s Enterprise Vulnerability Assessment and Remediation Management

More information

White Paper. The benefits of basing email and web security in the cloud. including cost, speed, agility and better protection

White Paper. The benefits of basing email and web security in the cloud. including cost, speed, agility and better protection White Paper The benefits of basing email and web security in the cloud A White Paper by Bloor Research Author : Fran Howarth Publish date : July 2010 the outsourcing of email and web security defences

More information

Disaster Recovery for Business-Critical Applications. Your business. Back in business. Real-time DR solutions you can rely upon when all else fails

Disaster Recovery for Business-Critical Applications. Your business. Back in business. Real-time DR solutions you can rely upon when all else fails Disaster Recovery for Business-Critical Applications Your business. Back in business. Real-time DR solutions you can rely upon when all else fails Disaster Recovery for Business-Critical Applications Your

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat

More information

Cloud Computing. What does it really mean for your business?

Cloud Computing. What does it really mean for your business? Cloud Computing What does it really mean for your business? Technology transforming business The IDC survey, conducted with 696 IT executives and CIOs said that 41 percent are either evaluating cloud solutions

More information

I D C S P O T L I G H T. Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s

I D C S P O T L I G H T. Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s I D C S P O T L I G H T Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s March 2012 Adapted from Worldwide Cloud Security 2011 2015 Forecast: A Comprehensive

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

Logicalis delivers low-risk, cost-effective cloud computing services with CA Technologies

Logicalis delivers low-risk, cost-effective cloud computing services with CA Technologies CUSTOMER SUCCESS STORY Logicalis delivers low-risk, cost-effective cloud computing services with CA Technologies CUSTOMER PROFILE Industry: IT services Organisation: Logicalis Employees: 1,900 Revenue:

More information

Why companies in the EU are adopting more and more cloud-based security solutions?

Why companies in the EU are adopting more and more cloud-based security solutions? Transforming IT Security & Compliance Why companies in the EU are adopting more and more cloud-based security solutions? Jörg Vollmer, Qualys GmbH jvollmer@qualys.com Itsa Nürnberg, Forum Rot 09. November

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5

SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5 SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5 Simplify continuous security monitoring for physical and virtual servers as well as private and public clouds. Data Sheet: Security Management Symantec

More information

A GOOD PRACTICE GUIDE FOR EMPLOYERS

A GOOD PRACTICE GUIDE FOR EMPLOYERS MITIGATING SECURITY RISK IN THE NATIONAL INFRASTRUCTURE SUPPLY CHAIN A GOOD PRACTICE GUIDE FOR EMPLOYERS April 2015 Disclaimer: Reference to any specific commercial product, process or service by trade

More information

How to ensure control and security when moving to SaaS/cloud applications

How to ensure control and security when moving to SaaS/cloud applications How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk

More information

Business Opportunity Enablement through Information Security Compliance

Business Opportunity Enablement through Information Security Compliance Level 3, 66 King Street Sydney NSW 2000 Australia Telephone +61 2 9290 4444 or 1300 922 923 Business Opportunity Enablement through Information Security Compliance Page No.1 Business Opportunity Enablement

More information

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary

More information

White Paper. Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today s Enterprise

White Paper. Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today s Enterprise WHITE PAPER: BUSINESS CONTINUITY AND BREACH PROTECTION White Paper Business Continuity and Breach Protection: Why SSL Certificate Management is Critical to Today s Enterprise Business Continuity and Breach

More information

Guide Antivirus. You wouldn t leave the door to your premises open at night. So why risk doing the same with your network?

Guide Antivirus. You wouldn t leave the door to your premises open at night. So why risk doing the same with your network? You wouldn t leave the door to your premises open at night. So why risk doing the same with your network? Most businesses know the importance of installing antivirus products on their PCs to securely protect

More information

Business continuity management

Business continuity management Business continuity management The world is a riskier place. Emerging threats such as product recalls with the increasing vulnerability of sophisticated global supply chains and unpredictable natural

More information