DATA LOSS BAROMETER. A global insight into lost and stolen information
|
|
- Sabrina McDonald
- 8 years ago
- Views:
Transcription
1 DT LOSS BROMETER global insight into lost and stolen information Netherlands 0.5% KPMG s Data Loss Barometer exposes the latest trends and statistics for globally lost and stolen information in Over 82 countries are represented in 2012, with over 96 countries represented over the last five years. Canada 3.25% Japan 1.2% ustralia 1.2% Ireland 0. India 0. Germany 0.5% China 0.5% Great Britain 8.4% kpmg.com U.S. 75% China 1.5% Italy 1. Spain 1.9% la 2% 1
2 CONTENTS KEY FINDINGS SECTION ONE OVERVIEW 2012 DT LOSS TRENDS 2012 SECTOR TRENDS FIVE YER VIEW SECTION TWO CHRTS 2012 DT LOSS TRENDS FIVE YER VIEW GLOBL CHRTS THE METHODOLOGY The Data Loss Barometer analyzes data loss incidents reported around the world since This data is sourced from Risk Based Security September
3 KEY FINDINGS Hacking number one data loss threat Over the past five years, more than one billion people globally have been affected by data loss incidents. In the last two years, there has been a jump of 40% in the number of publicly disclosed data loss incidents. Over the last five years, 60% of all incidents reported were due to Hacking. Insurance sector number one at risk from Social Engineering and System/Human Error In the first half of 2012, the Insurance sector appears to be at greatest risk from Social Engineering attacks and System/ Human Error incidents. Healthcare sector shows significant improvement The Healthcare sector, which previously struggled between 2010 and 2011 with the highest number of data loss incidents has shown dramatic improvement in The percentage of data loss incidents that affected the Healthcare sector has fallen from a high of 25% in 2010, to just in Technology sector number one worst performing sector by number of people affected Over the last five years, the Technology sector, had fewer incidents than the Top Five worst performing sectors (Government, Healthcare, Education, Financial Services, and Retail) however, the percentage of people affected by incidents in that industry remains the highest; accounting for 26% of the total number of people affected. First time in five years that insider threat has decreased and is at an all-time low Surprisingly, for the first time over the last five years, the threat from malicious insiders has dropped from an average from previous years of 25% of total number of incidents, to an all-time low of 6.5% in Conversely, we see a dramatic rise of double the number of incidents from external sources in 2012 from 2010, accounting for 81% of total number of incidents. This could be because the rise in hacking has taken people s eyes off the insider threat KPMG has not seen an improvement in controls to prevent or detect insiders in the period. Overall data loss incidents return to similar levels as 2008 Following a fall in reported incidents in when compared to 2008, the trend has reversed with a higher number of incidents reported in 2011, and total incident numbers in 2012 almost returning to 2008 levels. This could be accounted for by a maturing regulatory environment where incidents are being identified and monitored more thoroughly, but is also likely to be a result of the dramatic increase in the sophistication and variety of attacks we have seen in the last 18 months. 4 5
4 SECTION ONE: OVERVIEW 6 7
5 2012 DT LOSS TRENDS * January June 2012 External data losses RISE 40% vs. previous year, FFECTING 160 MILLION PEOPLE Hackinga continued threat, 6 of total incidents Insurance sector number 1 T RISK from Social Engineering and System/Human Error 3 Data loss incidents involving third parties are more commonplace in the Technology sector Government, Education, Technology & WORST affected sectors for data loss Personally identifiable information remains 1 the number data loss type 8 9
6 2012 SECTOR TRENDS 1 Over 96% of data loss incidents in Media were attributed to Hacking in the first half of Government has maintained relatively flat rates of data loss incident numbers since 2008, ranking either number one or number two as overall worst performing sector by total number of incidents over the last five years. 2 Insurance sector number one at risk from Social Engineering and System/Human error in the first half of % of data loss incidents in Retail were attributed to Hacking in the first half of Financial services have seen an 80% reduction in data loss by number of incidents in the last five years, but is still the fifth worst performing sector in the first half of million people have been affected by 6 PC theft. It represents around 1/3 of all data loss incidents in the Healthcare and Professional Services sectors in the first half of
7 YER VIEW J F M M S O J J N D J F M M S O J J N D J F M M S O J J N D J F M M S O J J N D J F M M S O J J N D Total number of incidents show Technology, Financial services, Retail and Media as the worst performing sectors Hard Drive number one portable media incident, but a growth in DVD/CD incidents 681 million records/people affected by Hacking as number one cause of data loss Healthcare sector shows a sharp drop in the number of breaches in
8 SECTION TWO: CHRTS 14 15
9 2012 DT LOSS TRENDS * January June 2012 By sector: number of incidents as a percentage of total for 2012 Other business sectors 21. Law 2.5% Data services 0.4% Insurance 1.2% Financial services 3.2% Not for profit 3. Professional services 5.2% Healthcare 7.9% Media 8.3% By cause: number of incidents as a percentage of total for 2012 By sector: number of incidents as a percentage where a third-party was involved for 2012 Retail 8.3% Technology 8.6% Improper disposal 2% Portable media theft/loss 1% Human/system error 4% Web/network exposure 4.6% Media 2% Not for profit 3% Law 2% Organization 1% Insurance 3% Organization 1% Ind. Markets 2% Data Services 2% Other business sectors 12% Education 12.6% Government 16.4% Unknown 3% PC theft 4. Hard copy theft/loss Hacking 67.2% Malware 1.4% Fraud/social engineering Financial services 9% % 17 Healthcare 13% Education 12% Professional services 14% Government 6% Retail 3% Technology 1
10 Cause of data loss vs. Industry: number of incidents as a percentage of total for 2012 (January June) Government Healthcare Education Financial services Retail 14% 62% 10% 2 1 6% 6% 69% 35% 12% 76% 14% 30% Professional services Technology Insurance Media 9% 32% 33% 11% 11% 13% 13% 74% 1 25% 9 Organization Not for profit Law firms Industrial markets Other business sectors 3 6% 11% 9% 75% 63% 63% 64% 94% Hacking Human/system error Malware Hard copy loss/theft PC theft Web/network exposure PC loss Unknown Portable media Fraud/social engineering Improper disposal 18 19
11 FIVE YER VIEW By sector: number of records/people affected as a percentage of total since 2008 (to June 2012) By cause of data loss: number of records/ people affected since 2008 (to June 2012) 100% 90% 80% By cause: number of external incidents as a percentage of total five year trend 70% 60% 50% Insider malicious 40% 30% External 20% 10% 0% Insider accidental Insider unknown Data services 14.2% Other business sectors 1.1% Fraud/social engineering 16% Unknown 3. By sector (Worst five): number of incidents as a percentage of total five year trend 30% 25% Not for Profit 0. Media 12.5% Industrial markets 1.5% Organization 2% Web/network exposure 10.4% Human/system error 0. Government Financial services Education Healthcare Retail 20% 15% 10% 5% 0% Technology 23.6% Insurance 1.3% Hacking 65% Professional services 0. 50% 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% By portable media: number of portable media incidents as a percentage of total five year trend Hard drive USB memory Tape Other Healthcare 3.2% Retail 13. Financial services 14. Education 5.4% Government 5.2% PC Loss 0. Improper disposal 0.1% PC Theft 1% Portable media theft/loss Hard copy theft or loss 0. DVD/CD Mobile device 20 21
12 GLOBL CHRTS By country: number of incidents as a percentage of total - five year trend 12 6 Other 24.5% Other 8.1% 100% Netherlands 0.5% Germany 0.5% China 0.5% Canada 3.25% India 0. Ireland 0. ustralia 1.2% Japan 1.2% 2 By country: number of incidents as a percentage of total for 2012 (January - June) 80% Great Britain 8.4% 1 By country: number of incidents as a percentage of total since 2008 (to June 2012) 60% 40% 80.3% 81.5% 83.4% % 20% 0% U.S. 75% China 1.5% Italy 1. Spain 1.9% Venezuela 2% ustralia 2% India 2.1% Netherlands 2.2% Canada 4.2% U.K. 10.1% U.S % U.S.. Great Britain Canada China Germany ustralia Ireland India Japan Netherlands Other 22 23
13 KPMG Contacts and cknowledgements Contact Us Malcom Marshall Global Partner, Information Protection and Business Resilience Stephen Bonner Partner, Financial Services, Information Protection and Business Resilience Charlie Hosner Partner, Corporates, Information Protection and Business Resilience We would like to thank all of our contributors to the survey, in particular members of the project and editorial team: Bona Boraliu Lisa Mitchell Charmaine Servado Martin Tyley This will be the final edition of KPMG s Data Loss Barometer. In future we will be publishing KPMG s Cyber Vulnerability Index bi-annually; the first edition was published in July For more information visit The information contained herein is of a general nature and is not intended to address the circumstances of any particular individual or entity. lthough we endeavour to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination of the particular situation KPMG International Cooperative ( KPMG International ), a Swiss entity. Member firms of the KPMG network of independent firms are affiliated with KPMG International. KPMG International provides no client services. No member firm has any authority to obligate or bind KPMG International or any other member firm vis-à-vis third parties, nor does KPMG International have any such authority to obligate or bind any member firm. ll rights reserved. Printed in U.K. The KPMG name, logo and cutting through complexity are registered trademarks or trademarks of KPMG International. RR Donnelley I RRD I November 2012 I Printed on recycled material.
Through a cyber security lens
Through a cyber security lens 2015 Global Audit Survey kpmg.com What the 2015 survey tells us Short of a crisis, the issues on the audit committee s radar don t change dramatically from year to year (and
More informationCyber Security for audit committees
AUDIT COMMITTEE INSTITUTE Cyber Security for audit committees An introduction kpmg.com/globalaci 2 Audit Committee Institute An introduction to cyber security for audit committees Audit committees have
More informationCyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au
Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber attack is one of the biggest threats to Australian businesses, however many Chief Executive Officers (CEOs) admit a lack
More informationCyber Security Risks for Banking Institutions.
Cyber Security Risks for Banking Institutions. September 8, 2014 1 Administrative CPE regulations require that online participants take part in online questions Must respond to a minimum of four questions
More informationA NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
More informationThe UK as a holding company location
The UK as a holding company location Tax May 2013 kpmg.com A key ambition is to create the most competitive tax system in the G20. As well as lowering tax rates, the Government wants to make the UK the
More informationPrivacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014
Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Nikos Georgopoulos Privacy Liability & Data Breach Management wwww.privacyrisksadvisors.com October 2014
More informationCyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity
Cyber threat intelligence and the lessons from law enforcement kpmg.com/cybersecurity Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many
More informationUnited Kingdom Internet Security Threat Profile
Internet Security Threat Profile Worldwide Ranking.%.%.%.%.%.%.%.%.%.%.%.% Overall Average Spam Zombies Malicious Code Phishing Hosts Bots Network Copyright Symantec Corporation. All rights reserved. Symantec,
More informationFirst Half Review BREACH LEVEL INDEX. Findings from the POWERED BY
2015 First Half Review Findings from the BREACH LEVEL INDEX POWERED BY BREACH LEVEL INDEX THE NUMBERS More and more organizations are accepting the fact that, despite their best efforts, security breaches
More information2015 Travelers Business Risk Index. Findings from a survey of U.S. business risk decision makers May 2015
2015 Travelers Business Risk Index Findings from a survey of U.S. business risk decision makers May 2015 Contents executive summary 2 Rising medical and benefit costs 3 Cyber risks 3 Legal liability 4
More informationHEALTH CARE AND CYBER SECURITY:
HEALTH CARE AND CYBER SECURITY: Increasing Threats Require Increased Capabilities kpmg.com 1 HEALTH CARE AND CYBER SECURITY EXECUTIVE SUMMARY Four-fifths of executives at healthcare providers and payers
More informationCyber security: Are consumer companies up to the challenge?
Cyber security: Are consumer companies up to the challenge? 1 Cyber security: Are consumer companies up to the challenge? A survey of webcast participants kpmg.com 1 Cyber security: Are consumer companies
More information7 VITAL FACTS ABOUT HEALTHCARE BREACHES. www.eset.com
7 VITAL FACTS ABOUT HEALTHCARE BREACHES www.eset.com 7 vital facts about healthcare breaches Essential information for protecting your business and your patients Large breaches of Personal Health Information
More informationSymantec Managed Security Services The Power To Protect
Symantec Managed Security Services The Power To Protect Peter Sparkes Senior Director, Cyber Security Services Asia Pacific & Japan Symantec Managed Security Services Cyber Security Services 1 Expanding
More informationES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS
ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISS The Internet Threat Landscape Symantec TM Dean Turner Director Global Intelligence Network Symantec Security
More informationNine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity
Nine recommendations for alternative funds battling cyber crime kpmg.ca/cybersecurity Cyber criminals steal user names and passwords and use it to conduct financial trading activity illicitly. Hackers
More informationUK Payments & the Payments Systems Regulator
UK Payments & the Payments Systems Regulator 4 th December 2014 Sydney UK Payments is a game of two sectors APACS UK Payments Council Schemes & Operations Separation Payment float elimination Cheques elimination
More informationLondon Business Interruption Association Technology new risks and opportunities for the Insurance industry
London Business Interruption Association Technology new risks and opportunities for the Insurance industry Kiran Nagaraj Senior Manager, KPMG LLP February 2014 Agenda Introduction The world we live in
More informationBuilding National and Regional Cybersecurity Competences through the UbuntuNet Alliance NRENS
Building National and Regional Cybersecurity Competences through the UbuntuNet Alliance NRENS UbuntuNet Connect 2015 F.F. Tusubira & A. Ndiwalana Knowledge Consulting Ltd Outline Background Current reality
More informationWebsense Web Security Solutions
Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Web 2.0 Challenge The Internet is rapidly evolving. Web 2.0 technologies are dramatically changing the way people
More information2012 Bit9 Cyber Security Research Report
2012 Bit9 Cyber Security Research Report Table of Contents Executive Summary Survey Participants Conclusion Appendix 3 4 10 11 Executive Summary According to the results of a recent survey conducted by
More informationManaging supplier failure risk. kpmg.com
Managing supplier failure risk kpmg.com 1 Supplier Failure Risk Management Supplier failure can destroy value in your business The failure of a critical supplier or of a supplier s critical supplier can
More informationHow To Insure Against Cyber Crime
Financial Lines CyberEdge CyberEdge Cyber Risk Protection for Commercial Entities With recent data breaches hitting the headlines across the Asia Pacific/Oceania region, loss of personal and corporate
More informationCyber Risk Management
Cyber Risk Management A short guide to best practice Insight October 2014 So what exactly is 'cyber risk'? In essence, cyber risk means the risk connected to online activity and internet trading but also
More informationHow To Protect Your Endpoints From Attack
2012 Endpoint Security Best Practices Survey GLOBAL RESULTS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Top tier organizations fare better against attacks... 8 Finding 2: Top tier organizations
More informationCollateral Effects of Cyberwar
Your texte here. Collateral Effects of Cyberwar by Ilia Kolochenko for Geneva Information Security Day 9 th of October 2015 Quick Facts and Numbers About Cybersecurity In 2014 the annual cost of global
More informationProtecting What Matters Most. Terry Ray Chief Product Strategist Trending Technologies Session 11
Protecting What Matters Most Terry Ray Chief Product Strategist Trending Technologies Session 11 Cyber attacks are bad and getting Significant economic Stock price fell by 14% Impacted profits by 46% Total
More informationCybercrime Security Risks and Challenges Facing Business
Cybercrime Security Risks and Challenges Facing Business Sven Hansen Technical Manager South Africa East Africa Security Conference August 2013 1 Agenda 1 What is Cyber Crime? 2 Cyber Crime Trends 3 Impact
More informationTop 5 reasons incident response is failing. kpmg.com
Top 5 reasons incident response is failing kpmg.com b Top 5 reasons incident response is failing Introduction The Incident Response function within an organization is responsible for assessing the integrity
More informationGlobal Cyber and Privacy Risks A growing insurance solution marketplace
Global Cyber and Privacy Risks A growing insurance solution marketplace Presented by: Eduard F. Goodman, J.D., LL.M., CIPP-US/C/E Chief Privacy Officer Identity Theft 911 Exponential Nature of Digital
More informationExposing the Cybersecurity Cracks: A Global Perspective
Exposing the Cybersecurity Cracks: A Global Perspective Part 2: Roadblocks, Refresh and Raising the Human Security IQ Sponsored by Websense Independently conducted by Ponemon Institute LLC Publication
More informationINDUSTRY OVERVIEW: HEALTHCARE
ii IBM MSS INDUSTRY OVERVIEW: HEALTHCARE RESEARCH AND INTELLIGENCE REPORT RELEASE DATE: OCTOBER 7, 2014 BY: JOHN KUHN, SENIOR THREAT RESEARCHER iii TABLE OF CONTENTS EXECUTIVE OVERVIEW/KEY FINDINGS...
More information2012 NORTON CYBERCRIME REPORT
2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND,
More informationI ve been breached! Now what?
I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have
More informationAD Management Survey: Reveals Security as Key Challenge
Contents How This Paper Is Organized... 1 Survey Respondent Demographics... 2 AD Management Survey: Reveals Security as Key Challenge White Paper August 2009 Survey Results and Observations... 3 Active
More informationDriving Company Security is Challenging. Centralized Management Makes it Simple.
Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary
More informationAccess is power. Access management may be an untapped element in a hospital s cybersecurity plan. January 2016. kpmg.com
Access is power Access management may be an untapped element in a hospital s cybersecurity plan January 2016 kpmg.com Introduction Patient data is a valuable asset. Having timely access is critical for
More informationCYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY
CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY INTRODUCTION Information security has evolved. As the landscape of threats increases and cyber security 1 management becomes
More informationWhat s Holding Back the Cloud?
MAY 2012 Peer Research What s Holding Back the Cloud? Intel Survey on Increasing IT Professionals Confidence in Cloud Security Why You Should Read This Document This report captures key findings from a
More informationInformation Risk Management
Information Risk Management Prepare, Partner, Evolve EMC Conference 10 February 2016 Dennis van Ham The information contained herein is of a general nature and is not intended to address the circumstances
More informationTen Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
More informationCybersecurity Workshop
Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153
More informationPrivacy Liability & Data Breach Management Nikos Georgopoulos 1 st Athens Privacy & Data Breach Management Conference
Privacy Liability & Data Breach Management Nikos Georgopoulos 1 st Athens Privacy & Data Breach Management Conference N.G. Privacy Liability Insurance Presentation to Athens 1 st Privacy & Data Breach
More informationWebsense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content even
More informationData Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked
Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Linda Vincent, R.N., P.I., CITRMS Vincent & Associates Founder The Identity Advocate San Pedro, California The opinions expressed
More informationDeliverability Benchmark Report
Deliverability Benchmark Report Deliverability Benchmark Report Analysis of Placement Rates in 1 Deliverability Benchmark Report Introduction Marketers have spent years honing their email expertise, refining
More informationData Breaches in the Government Sector. A Rapid7 Research Report
Data Breaches in the Government Sector A Rapid7 Research Report Summary of Report Across all industries, data breaches and the protection of business-critical data remain a top concern. While the government
More informationWORLDWIDE RETAIL ECOMMERCE SALES: EMARKETER S UPDATED ESTIMATES AND FORECAST THROUGH 2019
WORLDWIDE RETAIL ECOMMERCE SALES: EMARKETER S UPDATED ESTIMATES AND FORECAST THROUGH 2019 Worldwide retail sales including in-store and internet purchases will surpass $22 trillion in 2015, up 5.6% from
More informationYear of Mega Breaches & Identity Theft
2014 Year of Mega Breaches & Identity Theft Findings from the 2014 BREACH LEVEL INDEX POWERED BY BREACH LEVEL INDEX THE NUMBERS RECORDS BREACHED IN 2014 1,023,108,267 NUMBER OF BREACH INCIDENTS 1,541 BREACHED
More informationThe New Normal Healthcare s New Threat Profile. Matthew Sadler National Director, Healthcare Cyber Security KPMG November 2015
The New Normal Healthcare s New Threat Profile Matthew Sadler National Director, Healthcare Cyber Security KPMG November 2015 Recent Events Cybercriminals Today Cyber Threats Why Are We Such a Big Target?
More information2015 VORMETRIC INSIDER THREAT REPORT
Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security HEALTHCARE EDITION #2015InsiderThreat RESEARCH BRIEF U.S. HEALTHCARE SPOTLIGHT ABOUT THIS RESEARCH
More informationMitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
More informationUK exports of insurance and financial services are crucially important, but EU share is falling as growth disappoints
UK exports of insurance and financial services are crucially important, but EU share is falling as growth disappoints Ruth Lea, Chairman of Economists for Britain, February 2015 Main points: The UK trade
More informationACE European Risk Briefing 2012
#5 ACE European Risk Briefing 2012 IT and cyber risk respondent profiles The research was carried out between 13 April and 3 May 2012. The sample comprised 606 European risk managers, CROs, CFOs, COOs
More informationProtecting against cyber threats and security breaches
Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez abenaventem@es.ibm.com IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So
More informationAuditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25
More informationFIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
More informationCybersecurity report 2015. As technology evolves, new risks drive innovation in cybersecurity
Cybersecurity report 2015 As technology evolves, new risks drive innovation in cybersecurity 2 As the digital industry scrambles to keep up with the pace of innovation, we re seeing dramatic new opportunities
More informationCyber threat intelligence and the lessons from law enforcement. kpmg.com.au
Cyber threat intelligence and the lessons from law enforcement kpmg.com.au Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many organisations
More informationCyber Liability & Data Breach Insurance Claims
Cyber Liability & Data Breach Insurance Claims A Study of Actual Payouts for Covered Data Breaches Mark Greisiger President NetDiligence June 2011 Last year, privacy breaches ran about 1-2 per week. This
More information2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: A SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN THE ASIA-PACIFIC REGION
2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: A SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN THE ASIA-PACIFIC REGION April 2014 Sponsored by: 2014 Network Security & Cyber Risk Management:
More informationUnderstanding Security Complexity in 21 st Century IT Environments:
Understanding Security Complexity in 21 st Century IT Environments: A study of IT practitioners in the US, UK, France, Japan & Germany Sponsored by Check Point Software Technologies Independently conducted
More informationCybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
More informationUK 2015 Cyber Risk Survey Report
INSIGHTS UK 2015 Cyber Risk Survey Report June 2015 CONTENTS 1 Introduction 2 Work still to be done in terms of awareness/ ownership of cyber risk 5 Lack of data continues to prevent companies from adequately
More information2012 Endpoint Security Best Practices Survey
WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners
More informationCyber Security For not-for-profit organizations. Kevvie Fowler, GCFA, CISSP February, 2015
Cyber Security For not-for-profit organizations Kevvie Fowler, GCFA, CISSP February, 2015 About me Kevvie Fowler, CISSP, GCFA Partner, Advisory Services KPMG LLP Toronto, ON Industry contributions SANS
More information5th Annual State of Application Security Report Perception vs. Reality
Healthcare Edition 5th Annual State of Application Security Report Perception vs. Reality L January 2016 2 Table of Contents Executive Summary... 2 Methodology... 3 Research Findings... 4 Recommendations...
More information2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE
2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE February 2014 Sponsored by: 2014 Network Security & Cyber Risk Management:
More informationReducing the cost and complexity of endpoint management
IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and
More informationAnalyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
More information2010 Data Breach Investigations Report
2010 Data Breach Investigations Report Matthijs van de Wel Managing Principal Forensics EMEA 2010 Verizon. All Rights Reserved. PTE14626 07/10 PROPRIETARY STATEMENT This document and any attached materials
More informationThe Year Data Breaches Got Personal
2015 The Year Data Breaches Got Personal Findings from the 2015 BREACH LEVEL INDEX POWERED BY BREACH LEVEL INDEX THE NUMBERS More and more organizations are accepting the fact that, despite their best
More informationBiocryptology is an encryption-based. entry to a network or the Internet that. are vulnerable to third parties through
Biocryptology is an encryption-based authentication technology that represents a generational step forward in online security and a transformative approach to combating cybercrime. entry to a network or
More informationCYBER RISK INSURANCE. Presented By: Jonathan Healy
CYBER RISK INSURANCE Presented By: Jonathan Healy Contents Cyber Risk Threat Sources Cyber events worldwide What is covered by a Cyber Liability policy Risk Identification The gaps in traditional policies
More informationWhite Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES By James Christiansen, VP, Information Risk Management Executive Summary Security breaches in the retail sector are becoming more
More informationDon t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks
Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks Thank you for joining us. We have a great many participants in today s call. Your phone is currently
More informationFranchise Data Compromise Trends and Cardholder. December, 2010
Franchise Data Compromise Trends and Cardholder Security Best Practices December, 2010 Franchise Data Security Agenda Cardholder Data Compromise Overview Breach Commonalities Hacking Techniques Franchisee
More informationISEC Seminar : Protecting Personal Data in the Electronic Media Personal Data Security @ JPMorgan Micky Lo March 2007 1 Agenda Data Theft Incidence & Industry Figures Threats and Vulnerabilities Data Protection
More informationUnisys Security Insights: Global Summary A Consumer Viewpoint - 2015
Unisys Security Insights: Global Summary A Consumer Viewpoint - 2015 How consumers in 12 countries feel about: Personal data security, ranked by industry Region-specific security perceptions Research by
More informationYear of Mega Breaches & Identity Theft
2014 Year of Mega Breaches & Identity Theft Findings from the 2014 BREACH LEVEL INDEX POWERED BY BREACH LEVEL INDEX THE NUMBERS RECORDS BREACHED IN 2014 1,023,108,267 NUMBER OF BREACH INCIDENTS 1,541 BREACHED
More informationCombating a new generation of cybercriminal with in-depth security monitoring
Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.
More informationHow To Prevent Cybercrime
2013 NORTON REPORT 2013 NORTON REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND, RUSSIA, SAUDI ARABIA,
More informationHow To Improve Security In An Organization
Protecting the organization against the unknown A new generation of threats February 2014 Contents Scope of the research 3 Research methodology 3 Aims of the research 3 Summary of key findings 4 IT security
More informationInformation Protection Removing Fear, Uncertainty and Doubt. September 2015
Information Protection Removing Fear, Uncertainty and Doubt September 2015 Agenda 1 State of the Nation for cybersecurity Dynamic world of change Key Cyber trends New vectors of threats Potential impacts
More informationGreece Country Profile
Greece Country Profile EU Tax Centre March 2013 Key factors for efficient cross-border tax planning involving Greece EU Member State Double Tax Treaties With: Albania Estonia Lithuania Serbia Armenia Finland
More informationThe Oracle Mobile Security Suite: Secure Adoption of BYOD
An Oracle White Paper April 2014 The Oracle Mobile Security Suite: Secure Adoption of BYOD Executive Overview BYOD (Bring Your Own Device) is the new mobile security imperative and every organization will
More informationIBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
More informationExploring the Landscape of Philippine Cybersecurity
Exploring the Landscape of Philippine Cybersecurity Understanding the Risk and Taking Appropriate Steps to Mitigate Cybersecurity Threats Freddy Tan, CISSP Chairperson, (ISC)² Board of Directors Copyright
More informationSecurity for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape
White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions
More informationLeveraging a Maturity Model to Achieve Proactive Compliance
Leveraging a Maturity Model to Achieve Proactive Compliance White Paper: Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance Contents Introduction............................................................................................
More informationHow-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
More informationBest Practices for a BYOD World
Face Today s Threats Head-On: Best Practices for a BYOD World Chris Vernon CISSP, VTSP Security Specialist Agenda Mobile Threats Overview 2013 State of Mobility Survey Canada BYOD Best Practices 2 Mobile
More informationIT Transformation. Moving Beyond Service Management to a Strategic Business Role. August 2013. kpmg.com
IT Transformation Moving Beyond Service Management to a Strategic Business Role August 2013 kpmg.com KPMG surveyed over 275 attendees at ServiceNow s Knowledge13 conference, here is what we learned. Key
More informationCommonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012
Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives Initiation date: January 2012 Completion date: June 2012 Nomination submitted by: Samuel A. Nixon
More informationSecurity & Privacy Current cover and Risk Management Services
Security & Privacy Current cover and Risk Management Services Introduction Technological advancement has enabled greater working flexibility and increased methods of communications. However, new technology
More informationStaying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities.
Managing business infrastructure White paper Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities. September 2008 2 Contents 2 Overview 5 Understanding
More informationWebsense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content
More informationIS YOUR CUSTOMERS PAYMENT DATA REALLY THAT SAFE? A Chase Paymentech Paper
IS YOUR CUSTOMERS PAYMENT DATA REALLY THAT SAFE? A Chase Paymentech Paper A data breach has the potential to cost retailers millions in lost customers and sales. In this paper we discuss a number of possible
More informationCyber Security - What Would a Breach Really Mean for your Business?
Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber
More information