Exposing the Cybersecurity Cracks: A Global Perspective

Size: px
Start display at page:

Download "Exposing the Cybersecurity Cracks: A Global Perspective"

Transcription

1 Exposing the Cybersecurity Cracks: A Global Perspective Part I: Deficient, Disconnected & in the Dark Sponsored by Websense, Inc. Independently conducted by Ponemon Institute LLC Publication Date: April 2014

2 2 Exposing the Cybersecurity Cracks: A Global Perspective Part I: Deficient, Disconnected & in the Dark Ponemon Institute, April 2014 Ponemon Institute is pleased to present the findings of its two-part study, Exposing the Cybersecurity Cracks: A Global Perspective sponsored by Websense, Inc. This first report uncovers the deficient, disconnected and in-the-dark conditions that challenge IT security professionals. Areas of focus include a deficit in security solution effectiveness; a disconnect regarding the perceived value of confidential data; and limited visibility into cybercriminal activity. The study surveyed 4,881 IT and IT security practitioners in 15 countries Australia, Brazil, Canada, China, France, Germany, Hong Kong, India, Italy, Mexico, the Netherlands, Singapore, Sweden, United Kingdom and the United States with an average of 10 years experience in the field. This report covers the consolidated global findings. DEFICIENT Findings reveal that security professionals have systems that fall short in terms of protection from cyber attacks and data leakage. They need access to heightened threat intelligence and defenses. Because the security threat landscape is more challenging and dynamic than ever, having the intelligence to anticipate, identify and reduce the threats is critical. Fifty-seven percent of respondents do not think their organization is protected from advanced cyber attacks and 63 percent doubt they can stop the exfiltration of confidential information. Most respondents (69 percent) believe cybersecurity threats sometimes fall through the cracks of their companies existing security systems. Forty-four percent of companies represented in this research experienced one or more substantial cyber attacks in the past year. (We define a substantial attack as one that infiltrated networks or enterprise systems.) Fifty-nine percent of companies do not have adequate intelligence or are unsure about attempted attacks and their impact. Further, 51 percent say their security solutions do not inform them or they are unsure if their solution can inform them about the root causes of an attack. DISCONNECTED There is a disconnect regarding the perceived value of confidential data. Eighty percent of respondents say their company s leaders do not equate losing confidential data with a potential loss of revenue, despite Ponemon Institute research indicating the average cost of an organizational data breach is $5.4 million. Forty-eight percent say their board-level executives have a sub-par understanding of security issues. This figure has not been measured in previous surveys, but it is presumed that cybersecurity awareness has most likely increased over the last few years. IN THE DARK Many security professionals find it hard to keep track of the threat landscape and are not sure if they had been a victim of an attack. 2

3 3 Less than half of the respondents (41 percent) believe they have a good understanding about the threat landscape facing their company. Only 37 percent of respondents could say with certainty that their organization lost sensitive or confidential information as a result of a cyber attack. Thirty-five percent of those who had lost sensitive or confidential information did not know exactly what data had been stolen. Key Findings: Deficient, Disconnected & in the Dark The following is an analysis of key findings and global differences based on the consolidated responses from the 15 countries represented in this research. The audited global results are presented in the appendix of the report. DEFICIENT There is a deficiency in an organization s ability to protect against cyber attacks and have the right technology to stop data loss and theft. Results show a worrisome cybersecurity trend. When asked about the state of cybersecurity today, 57 percent of respondents do not think (100 percent 43 percent) that their organization is protected from advanced cyber attacks, as shown in Figure 1. Sixty-three percent (100 percent 37 percent) do not have security that can stop cybercriminals from stealing corporate information. Only 26 percent agree that it is possible to create a security program that can withstand all targeted attacks. It is not surprising, therefore, that most respondents (69 percent) believe that cybersecurity threats sometimes fall through the cracks of their companies existing security systems. Figure 1: Perceptions About the State of Cyberdefense in Organizations Cybersecurity threats sometimes fall through the cracks of existing security systems. 36% 33% 11% My company is protected from advanced cyber attacks. 23% 19% 12% 26% My company s security can stop cybercriminals from stealing corporate information. 15% 22% 12% 18% 33% It is possible to create a security program that can withstand all targeted attacks. 12% 14% 29% 15% Strongly agree Agree Unsure Disagree Strongly disagree 3

4 4 While there are differences among the countries, the majority of respondents in all countries believe this to be the case. As shown in Figure 2, respondents in France (82 percent), Italy (82 percent), Singapore (79 percent) and Germany (78 percent) are most likely to agree that there is a deficit in security effectiveness and visibility. Least likely to believe this is the case, and more optimistic that they can catch threats, are respondents from Canada (56 percent), Sweden (57 percent) and Australia (58 percent). Figure 2: Cybersecurity Threats Sometimes Fall Through the Cracks of Existing Security Systems (Strongly agree and agree response combined.) % 77% 78% 82% 82% 69% 67% 63% 66% 69% 64% 56% 58% 57% 59% US CA AU CH HK SG ID UK DE FR NL SW IT MX BZ Strongly agree and agree Many security professionals struggle to keep pace. With high-profile attacks hitting the headlines week in and week out, cybersecurity professionals struggle to keep pace with the threat landscape. According to Figure 3, 44 percent of companies represented in this study experienced one or more substantial cyber attacks during the previous 12 months. (A substantial attack is defined as one that infiltrated networks of enterprise systems.) Figure 3: Has your company experienced one or more substantial cyber attacks during the past 12 months? % 48% 7% Yes No Unsure Attack intelligence needs improvement. According to Figure 4, 44 percent of respondents say their company s security solutions do not provide adequate intelligence to inform them about an attempted cyber attack and the potential consequences. Further, 15 percent admit to not knowing 4

5 5 if they are getting such information. Only 42 percent say their solutions do provide actionable information. Fifty-one percent of respondents say their current security solutions do not provide information about the sources and/or root causes of cyber attacks or respondents are unsure. Figure 4: Security Solutions Ability to Provide Attack Intelligence % 49% 44% 44% 15% Yes No Unsure 7% We have adequate intelligence to know about an attempted attack and its impact. Our security solutions inform us about the root causes of a cyber attack. As shown in Figure 5, there are significant differences among countries regarding the availability of intelligence to inform them about an attempted cyber attack and the consequences of such an attack. The highest level of confidence is among respondents in Germany (65 percent) and Netherlands (61 percent). The lowest confidence is in Brazil (25 percent), Mexico (28 percent) and India (29 percent). Figure 5: We have adequate intelligence to know about an attempted attack and its impact % 61% 57% 53% 54% 43% 42% 42% 35% 36% 31% 29% 32% 28% 25% US CA AU CH HK SG ID UK DE FR NL SW IT MX BZ Yes DISCONNECTED There is a disconnect in perception about the perceived value of confidential data. According to respondents, there is a gap between data breach perception and reality specifically regarding the potential revenue loss to their business. Eighty percent of respondents say their executives do not believe that the loss of their organization s confidential data could result in a potential loss of revenue. This is in contrast to recent Ponemon Institute research, which indicates that data breaches have serious financial consequences for organizations. The 5

6 6 average cost per lost or stolen record due to a data breach is $188 and the average organizational data breach cost is $5.4 million. As shown in Figure 6, forty-eight percent of respondents say their board members and executives have a sub-par understanding of security issues. However, cyber security awareness is growing among this group and should continue into the future. Figure 6: How knowledgeable are non-it executives and board members about cybersecurity? 35% 25% 15% 5% 34% 35% 31% 29% 19% 16% 13% 11% 5% 5% Substantial Good Some Poor None Knowledge about cyber security among non-it executives. Knowledge about cyber security among the board members. IN THE DARK Many security professionals are in the dark. Research reveals that respondents find it difficult to keep track of the threat landscape and even know if their organization has been attacked. Further, only less than half (41 percent) have a good understanding of the threat landscape facing their company today, as shown in Figure 7. Figure 7: Do you have a good understanding about the threat landscape facing your company today? 6 53% 5 41% 6% Yes No Unsure 6

7 7 Figure 8 shows the differences among countries and reveals that respondents in Italy (52 percent) believe they have a good understanding about threats. They are followed by Netherlands (47 percent) and France (46 percent). Those less certain are Hong Kong (33 percent), Germany (34 percent), Singapore (35 percent), United Kingdom (35 percent) and India (39 percent). Figure 8: Do you have a good understanding about the threat landscape facing your company today? % 43% 43% 33% 35% 39% 35% 34% 46% 47% 41% 52% 43% 41% US CA AU CH HK SG ID UK DE FR NL SW IT MX BZ Yes The biggest targets of cyber attacks are intellectual property and customer data. Many security professionals have sleepless nights due to the sophistication of today s threats. Respondents were asked if their organization had indeed lost data as the result of a cyber attack and, if yes, what types of data were lost or stolen. While 37 percent of respondents say with certainty that their companies lost sensitive or confidential information as a result of a cyber attack, 15 percent are uncertain. As shown in Figure 9, data most often targeted is customer data followed by intellectual property. However, 35 percent of those who had lost sensitive or confidential information did not know what exactly had been stolen. Figure 9: Types of Confidential Data Targeted (More than one response permitted.) 5 47% 45% 35% 25% 15% 5% Customer data 39% Intellectual property 35% 19% 1% Don t know Financial records Other 7

8 8 Conclusion This research report exposes the cracks in cybersecurity defenses for organizations. How can companies better manage the cyber attacks targeting their sensitive and confidential information? The following are some recommendations: Eliminate the uncertainty of cyber risks by investing in technologies that provide visibility and details about attempted attacks and how successful attacks would affect your company. Look for access to better threat intelligence and real-time defenses. Deploy an all-encompassing defense strategy that incorporates web, and mobile channels. Avoid hyper-focusing on one channel and examine all the channels your users and network use to interact with information. Assess security solution capabilities and deployments against a comprehensive kill-chain model to eliminate gaps and minimize excessive overlap. Find effective employee security education methods to promote cooperation and communicate the seriousness of cyber attacks and reduce high risk behavior. 8

9 9 Methods Table 1 reports the sample response for 15 countries. A total of 160,534 IT and IT security practitioners in 15 countries were invited to participate in this global study. A total of 5,244 respondents returned the survey. Tests for reliability and screening removed 363 surveys. The final combined sample was 4,881 surveys, yielding a 3.0 percent response rate. Countries Abbreviations Sampling frame Table 1. Survey Response Total survey returns Screened or rejected Final sample Response rate Australia AU 5, % Brazil BZ 15, % Canada CA 7, % China CH 11, % France FR 11, % Germany DE 12, % Hong Kong HK 4, % India ID 23, % Italy IT 6, % Mexico MX 12, % Netherlands NL 8, % Singapore SG 3, % Sweden SW 2, % United Kingdom UK 11, % United States US 21, % ,534 5, , Pie Chart 1 reports the respondent s organizational level within participating organizations. By design, 59 percent of respondents are at or above the supervisory levels. Pie Chart 1: What organizational level best describes your current position? ( results for 15 countries.) 4% 2% 3% 2% 16% Vice President Director Manager 33% 22% Supervisor Technician Staff Contractor Other 19% 9

10 10 According to Pie Chart 2, 66 percent of respondents report directly to the chief information officer and 18 percent report to the chief information security officer. Pie Chart 2: Primary person you or your IT security leader reports to ( results for 15 countries.) 6% 3% 3% 4% Chief Information Officer Chief Information Security Officer 18% Chief Risk Officer Compliance Officer Chief Security Officer Other 66% Pie Chart 3 reports the industry segments of respondents organizations. This chart identifies financial services (18 percent) as the largest segment, followed by public sector (15 percent) and industrial (11 percent). Pie Chart 3: What industry best describes your organization s industry focus? ( results for 15 countries.) 3% 2% 2% 5% 4% 5% 5% 6% 7% 8% 9% 18% 11% 15% Financial services Public sector Industrial Retailing Services Health & pharmaceutical Technology & software Consumer products Hospitality Energy Education & research Communications Transportation Other 10

11 11 Pie Chart 4 reveals the worldwide headcount of the respondent s organization. Sixty-four percent of respondents are from organizations with a global headcount greater than 1,000. Pie Chart 4: Organization s worldwide headcount. ( results for 15 countries.) 7% 3% 15% 17% Less than to 1,000 1,001 to 5,000 5,001 to 25,000 25,001 to 75,000 More than 75,000 37% Caveats There are inherent limitations to survey-based research that need to be carefully considered before drawing inferences from findings. The following items are specific limitations that are germane to most web-based surveys. Non-response bias: The findings are based on a sample of survey returns. Surveys were sent to a representative sample of individuals in 15 countries, resulting in a large number of usable returned responses. Despite non-response tests, it is always possible that individuals who did not participate are substantially different in terms of their underlying beliefs from those who responded to our survey request. Sampling-frame bias: The accuracy is based on contact information and the degree to which the list is representative of individuals who are IT or IT security practitioners. We also acknowledge that the results may be biased by external events such as media coverage. We also acknowledge bias caused by compensating subjects to complete this research within a holdout period. Self-reported results: The quality of survey research is based on the integrity of confidential responses received from subjects. While certain checks and balances can be incorporated into the survey process, there is always the possibility that a subject did not provide a truthful response. 11

12 12 Appendix: Detailed Survey Results The following tables provide the frequency or percentage frequency of responses to all survey questions contained in this study. All survey responses were captured in November (Individual country samples are weighted by size.) 15 countries Survey Response Sampling frame Total survey returns 5244 Screened and rejected surveys 363 Final sample 4881 Response rate 3. Part 1. Screening S1. How familiar are you with the cyber threats facing your company? Very familiar 48% Familiar 52% Not familiar (stop) S2. How are you involved in your company s cyber threat intelligence activities? Please select all that apply. User of cyber threat intelligence 73% Gatherer of cyber threat intelligence 49% Analyzer of cyber threat intelligence 45% Executive or manager in-charge of threat intelligence activities 35% None of these roles (stop) Total 202% Part 2: Attack Intelligence Attributions: Strongly agree and agree response combined. Q1. My company is protected from advanced cyber attacks. 43% Q2. Cybersecurity threats sometimes fall through the cracks of my company s existing security systems. 69% Q3. My company s security can stop cybercriminals from stealing corporate information. 37% Q4. It is possible to create a security program that can withstand all targeted attacks. 26% Q5. My company s leaders equate losing confidential data with a potential loss of revenue. Q6. Do your company s security solutions provide adequate intelligence to inform you about an attempted cyber attack and what would have happened if the attack succeeded? Yes 42% No 44% Unsure 15% Q7. Has your company experienced one or more substantial cyber attacks during the past 12 months? Yes 44% No 48% Unsure 7% 12

13 13 Q8. Do your security solutions provide information about the sources and/or root causes of cyber attacks experienced by your company? Yes 49% No 44% Unsure 7% Q9a. Has your company lost sensitive or confidential data as a result of a cyber attack (i.e., exfiltration)? Total Yes 37% No 48% Unsure 15% Q9b. If yes, what confidential data was targeted? Financial records 19% Customer data 47% Intellectual property 39% Don t know 35% Other (please list) 1% Total 142% Q16. Do you have a good understanding about the threat landscape facing your company today? Total Yes 41% No 53% Unsure 6% Q17. What best describes the level of knowledge among non-it executives about your company s cyber security defenses? Total Substantial 5% Good 16% Some 34% Poor 35% None (no understanding whatsoever) 11% Q18. What best describes the level of knowledge and concern about cyber security among the board members of your company? Total Substantial 5% Good 13% Some 31% Poor 29% None (no knowledge or concern whatsoever) 19% 13

14 14 Part 4. Organizational Characteristics and Respondent Demographics D1. What organizational level best describes your current position? Senior Executive 1% Vice President 2% Director 16% Manager 22% Supervisor 19% Technician 33% Staff 4% Contractor 2% Other 3% D2. Total years of relevant experience Average Total years of IT or security experience 9.66 Total years in current position 4.85 D3. Check the Primary Person you or your IT security leader reports to within the organization. CEO/Executive Committee Chief Financial Officer 1% General Counsel Chief Information Officer 66% Chief Information Security Officer 18% Compliance Officer 3% Human Resources VP Chief Security Officer 3% Chief Risk Officer 6% Other 3% D4. What industry best describes your organization s industry focus? Agriculture & food services 1% Communications 2% Consumer products 5% Defense & aerospace 1% Education & research 3% Energy 4% Entertainment & media 1% Financial services 18% Health & pharmaceutical 7% Hospitality 5% Industrial 11% Public sector 15% Retailing 9% Services 8% Technology & software 6% Transportation 2% Other 2% 14

15 15 D5. What is the worldwide headcount of your organization? Less than % 500 to 1,000 1,001 to 5,000 37% 5,001 to 25,000 17% 25,001 to 75,000 7% More than 75,000 3% Headcount 10,087 Ponemon Institute Advancing Responsible Information Management Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations. As a member of the Council of American Survey Research Organizations (CASRO), we uphold strict data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or organization identifiable information in our business research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions. 15

Exposing the Cybersecurity Cracks: A Global Perspective

Exposing the Cybersecurity Cracks: A Global Perspective Exposing the Cybersecurity Cracks: A Global Perspective Part 2: Roadblocks, Refresh and Raising the Human Security IQ Sponsored by Websense Independently conducted by Ponemon Institute LLC Publication

More information

Global Insights on Document Security

Global Insights on Document Security Global Insights on Document Security Sponsored by Adobe Independently conducted by Ponemon Institute LLC Publication Date: June 2014 Ponemon Institute Research Report Global Insights on Document Security

More information

Is Your Company Ready for a Big Data Breach?

Is Your Company Ready for a Big Data Breach? Is Your Company Ready for a Big Data Breach? The Second Annual Study on Data Breach Preparedness Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication

More information

Understanding Security Complexity in 21 st Century IT Environments:

Understanding Security Complexity in 21 st Century IT Environments: Understanding Security Complexity in 21 st Century IT Environments: A study of IT practitioners in the US, UK, France, Japan & Germany Sponsored by Check Point Software Technologies Independently conducted

More information

Global Survey on Social Media Risks Survey of IT & IT Security Practitioners

Global Survey on Social Media Risks Survey of IT & IT Security Practitioners 0 Global Survey on Social Media Risks Survey of IT & IT Security Practitioners Sponsored by Websense Independently conducted by Ponemon Institute LLC Publication Date: September 2011 1 Global Survey on

More information

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: April 2013 Ponemon Institute Research Report

More information

The State of Data Centric Security

The State of Data Centric Security The State of Data Centric Security Sponsored by Informatica Independently conducted by Ponemon Institute LLC Publication Date: June 2014 Ponemon Institute Research Report State of Data Centric Security

More information

The Impact of Cybercrime on Business

The Impact of Cybercrime on Business The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted

More information

Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age

Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: August 2013

More information

The State of Data Security Intelligence. Sponsored by Informatica. Independently conducted by Ponemon Institute LLC Publication Date: April 2015

The State of Data Security Intelligence. Sponsored by Informatica. Independently conducted by Ponemon Institute LLC Publication Date: April 2015 The State of Data Security Intelligence Sponsored by Informatica Independently conducted by Ponemon Institute LLC Publication Date: April 2015 Ponemon Institute Research Report The State of Data Security

More information

The Importance of Cyber Threat Intelligence to a Strong Security Posture

The Importance of Cyber Threat Intelligence to a Strong Security Posture The Importance of Cyber Threat Intelligence to a Strong Security Posture Sponsored by Webroot Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute Research Report

More information

Understaffed and at Risk: Today s IT Security Department. Sponsored by HP Enterprise Security

Understaffed and at Risk: Today s IT Security Department. Sponsored by HP Enterprise Security Understaffed and at Risk: Today s IT Security Department Sponsored by HP Enterprise Security Independently conducted by Ponemon Institute LLC Publication Date: February 2014 Ponemon Institute Research

More information

The Unintentional Insider Risk in United States and German Organizations

The Unintentional Insider Risk in United States and German Organizations The Unintentional Insider Risk in United States and German Organizations Sponsored by Raytheon Websense Independently conducted by Ponemon Institute LLC Publication Date: July 2015 2 Part 1. Introduction

More information

Data Breach: The Cloud Multiplier Effect

Data Breach: The Cloud Multiplier Effect Data Breach: The Cloud Multiplier Effect Sponsored by Netskope Independently conducted by Ponemon Institute LLC Publication Date: June 2014 Ponemon Institute Research Report Part 1. Introduction Data Breach:

More information

A Study of Retail Banks & DDoS Attacks

A Study of Retail Banks & DDoS Attacks A Study of Retail Banks & DDoS Attacks Sponsored by Corero Network Security Independently conducted by Ponemon Institute LLC Publication Date: December 2012 Ponemon Institute Research Report A Study of

More information

The SQL Injection Threat Study

The SQL Injection Threat Study The SQL Injection Threat Study Sponsored by DB Networks Independently conducted by Ponemon Institute LLC Publication Date: April 2014 1 The SQL Injection Threat Study Presented by Ponemon Institute, April

More information

Reputation Impact of a Data Breach U.S. Study of Executives & Managers

Reputation Impact of a Data Breach U.S. Study of Executives & Managers Reputation Impact of a Data Breach U.S. Study of Executives & Managers Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: November 2011 Ponemon

More information

Security of Paper Records & Document Shredding. Sponsored by Cintas. Independently conducted by Ponemon Institute LLC Publication Date: January 2014

Security of Paper Records & Document Shredding. Sponsored by Cintas. Independently conducted by Ponemon Institute LLC Publication Date: January 2014 Security of Paper Records & Document Shredding Sponsored by Cintas Independently conducted by Ponemon Institute LLC Publication Date: January 2014 Ponemon Institute Research Report Part 1. Introduction

More information

Achieving Security in Workplace File Sharing. Sponsored by Axway Independently conducted by Ponemon Institute LLC Publication Date: January 2014

Achieving Security in Workplace File Sharing. Sponsored by Axway Independently conducted by Ponemon Institute LLC Publication Date: January 2014 Achieving Security in Workplace File Sharing Sponsored by Axway Independently conducted by Ponemon Institute LLC Publication Date: January 2014 Ponemon Institute Research Report Part 1. Introduction Achieving

More information

Data Security in Development & Testing

Data Security in Development & Testing Data Security in Development & Testing Sponsored by Micro Focus Independently conducted by Ponemon Institute LLC Publication Date: July 31, 2009 Ponemon Institute Research Report Data Security in Development

More information

Risk & Innovation in Cybersecurity Investments. Sponsored by Lockheed Martin

Risk & Innovation in Cybersecurity Investments. Sponsored by Lockheed Martin Risk & Innovation in Cybersecurity Investments Sponsored by Lockheed Martin Independently conducted by Ponemon Institute LLC Publication Date: April 2015 Ponemon Institute Research Report Part 1. Introduction

More information

Efficacy of Emerging Network Security Technologies

Efficacy of Emerging Network Security Technologies Efficacy of Emerging Network Security Technologies Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: February 2013 Ponemon Institute Research Report Part

More information

Third Annual Study: Is Your Company Ready for a Big Data Breach?

Third Annual Study: Is Your Company Ready for a Big Data Breach? Third Annual Study: Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: October 2015 Ponemon Institute

More information

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S.

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: June 2011 Ponemon

More information

The Cost of Web Application Attacks

The Cost of Web Application Attacks The Cost of Web Application Attacks Sponsored by Akamai Technologies Independently conducted by Ponemon Institute LLC Publication Date: May 2015 Ponemon Institute Research Report Part 1. Introduction The

More information

Challenges of Cloud Information

Challenges of Cloud Information The Challenges of Cloud Information Governance: A Global Data Security Study Sponsored by SafeNet Independently conducted by Ponemon Institute LLC Publication Date: October 2014 Ponemon Institute Research

More information

National Survey on Data Center Outages

National Survey on Data Center Outages National Survey on Data Center Outages Independently conducted by Ponemon Institute LLC Publication Date: 30 September 2010 Part 1. Executive Summary National Survey on Data Center Outages Ponemon Institute,

More information

Aftermath of a Data Breach Study

Aftermath of a Data Breach Study Aftermath of a Data Breach Study Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012 Ponemon Institute Research Report Aftermath

More information

The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T

The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T The Cost of Insecure Mobile Devices in the Workplace! Sponsored by AT&T Independently conducted by Ponemon Institute LLC Publication Date: March 2014 Part 1. Introduction The Cost of Insecure Mobile Devices

More information

Defining the Gap: The Cybersecurity Governance Study

Defining the Gap: The Cybersecurity Governance Study Defining the Gap: The Cybersecurity Governance Study Sponsored by Fidelis Cybersecurity Independently conducted by Ponemon Institute LLC Publication Date: June 2015 Ponemon Institute Research Report Defining

More information

2012 Application Security Gap Study: A Survey of IT Security & Developers

2012 Application Security Gap Study: A Survey of IT Security & Developers 2012 Application Gap Study: A Survey of IT & s Research sponsored by Innovation Independently Conducted by Ponemon Institute LLC March 2012 1 2012 Application Gap Study: A Survey of IT & s March 2012 Part

More information

The Security Impact of Mobile Device Use by Employees

The Security Impact of Mobile Device Use by Employees The Security Impact of Mobile Device Use by Employees Sponsored by Accellion Independently conducted by Ponemon Institute LLC Publication Date: December 2014 Ponemon Institute Research Report The Security

More information

Security of Cloud Computing Users Study

Security of Cloud Computing Users Study Security of Cloud Computing Users Study Sponsored by CA Technologies Independently conducted by Ponemon Institute, LLC Publication Date: March 2013 Security of Cloud Computing Users Study March 2013 Part

More information

The Security of Cloud Infrastructure Survey of U.S. IT and Compliance Practitioners

The Security of Cloud Infrastructure Survey of U.S. IT and Compliance Practitioners The Security of Cloud Infrastructure Survey of U.S. IT and Compliance Practitioners Sponsored by Vormetric Independently conducted by Ponemon Institute LLC Publication Date: November 2011 Ponemon Institute

More information

Corporate Data: A Protected Asset or a Ticking Time Bomb?

Corporate Data: A Protected Asset or a Ticking Time Bomb? Corporate Data: A Protected Asset or a Ticking Time Bomb? Sponsored by Varonis Independently conducted by Ponemon Institute LLC Publication Date: December 2014 Ponemon Institute Research Report Corporate

More information

Privileged User Abuse & The Insider Threat

Privileged User Abuse & The Insider Threat Privileged User Abuse & The Insider Threat Commissioned by Raytheon Company Independently conducted by Ponemon Institute LLC Publication Date: May 2014 1 Privileged User Abuse & The Insider Threat Ponemon

More information

Threat Intelligence & Incident Response: A Study of U.S. & EMEA Organizations

Threat Intelligence & Incident Response: A Study of U.S. & EMEA Organizations Threat Intelligence & Incident Response: A Study of U.S. & EMEA Organizations Sponsored by AccessData Independently conducted by Ponemon Institute LLC Publication Date: February 2014 Ponemon Institute

More information

Cloud Security: Getting It Right

Cloud Security: Getting It Right Cloud Security: Getting It Right Sponsored by Armor Independently conducted by Ponemon Institute LLC Publication Date: October 2015 Ponemon Institute Research Report Cloud Security: Getting It Right Ponemon

More information

The State of Mobile Application Insecurity

The State of Mobile Application Insecurity The State of Mobile Application Insecurity Sponsored by IBM Independently conducted by Ponemon Institute LLC Publication Date: February 2015 Ponemon Institute Research Report Part 1. Introduction The State

More information

The 2013 ecommerce Cyber Crime Report: Safeguarding Brand And Revenue This Holiday Season

The 2013 ecommerce Cyber Crime Report: Safeguarding Brand And Revenue This Holiday Season The 2013 ecommerce Cyber Crime Report: Safeguarding Brand And Revenue This Holiday Season Sponsored by RSA Security Independently conducted by Ponemon Institute, LLC Publication Date: October 2013 Ponemon

More information

Privacy and Security in a Connected Life: A Study of European Consumers

Privacy and Security in a Connected Life: A Study of European Consumers Privacy and Security in a Connected Life: A Study of European Consumers Sponsored by Trend Micro Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute Research

More information

Breaking Bad: The Risk of Insecure File Sharing

Breaking Bad: The Risk of Insecure File Sharing Breaking Bad: The Risk of Insecure File Sharing Sponsored by Intralinks Independently conducted by Ponemon Institute LLC Publication Date: October 2014 Ponemon Institute Research Report Breaking Bad: The

More information

The Importance of Senior Executive Involvement in Breach Response

The Importance of Senior Executive Involvement in Breach Response The Importance of Senior Executive Involvement in Breach Response Sponsored by HP Enterprise Security Services Independently conducted by Ponemon Institute LLC Publication Date: October 2014 The Importance

More information

Security of Cloud Computing Providers Study

Security of Cloud Computing Providers Study Security of Cloud Computing Providers Study Sponsored by CA Technologies Independently conducted by Ponemon Institute LLC Publication Date: April 2011 Ponemon Institute Research Report I. Executive Summary

More information

The State of USB Drive Security

The State of USB Drive Security The State of USB Drive Security U.S. survey of IT and IT security practitioners Sponsored by Kingston Independently conducted by Ponemon Institute LLC Publication Date: July 2011 Ponemon Institute Research

More information

The Post Breach Boom. Sponsored by Solera Networks. Independently conducted by Ponemon Institute LLC Publication Date: February 2013

The Post Breach Boom. Sponsored by Solera Networks. Independently conducted by Ponemon Institute LLC Publication Date: February 2013 The Post Breach Boom Sponsored by Solera Networks Independently conducted by Ponemon Institute LLC Publication Date: February 2013 Ponemon Institute Research Report Part 1. Introduction The Post Breach

More information

Cyber Threat Intelligence: Has to Be a Better Way

Cyber Threat Intelligence: Has to Be a Better Way Exchanging Cyber Threat Intelligence: There Has to Be a Better Way Sponsored by IID Independently conducted by Ponemon Institute LLC Publication Date: April 2014 Ponemon Institute Research Report Exchanging

More information

How Single Sign-On Is Changing Healthcare A Study of IT Practitioners in Acute Care Hospitals in the United States

How Single Sign-On Is Changing Healthcare A Study of IT Practitioners in Acute Care Hospitals in the United States How Single Sign-On Is Changing Healthcare A Study of IT Practitioners in Acute Care Hospitals in the United States Sponsored by Imprivata Independently conducted by Ponemon Institute LLC Publication Date:

More information

Data Loss Risks During Downsizing As Employees Exit, so does Corporate Data

Data Loss Risks During Downsizing As Employees Exit, so does Corporate Data Data Loss Risks During Downsizing As Employees Exit, so does Corporate Data Independently conducted by Ponemon Institute LLC Publication Date: February 23, 2009 Sponsored by Symantec Corporation Ponemon

More information

2015 Global Megatrends in Cybersecurity

2015 Global Megatrends in Cybersecurity 2015 Global Megatrends in Cybersecurity Sponsored by Raytheon Independently conducted by Ponemon Institute LLC Publication Date: February 2015 Ponemon Institute Research Report 2015 Global Megatrends in

More information

The Role of Governance, Risk Management & Compliance in Organizations

The Role of Governance, Risk Management & Compliance in Organizations The Role of Governance, Risk Management & Compliance in Organizations Study of GRC practitioners Sponsored by RSA, The Security Division of EMC Independently conducted by Ponemon Institute LLC Publication

More information

2015 Global Study on IT Security Spending & Investments

2015 Global Study on IT Security Spending & Investments 2015 Study on IT Security Spending & Investments Independently conducted by Ponemon Institute LLC Publication Date: May 2015 Sponsored by Part 1. Introduction Security risks are pervasive and becoming

More information

Cyber Security on the Offense: A Study of IT Security Experts

Cyber Security on the Offense: A Study of IT Security Experts Cyber Security on the Offense: A Study of IT Security Experts Co-authored with Radware Independently conducted by Ponemon Institute LLC Publication Date: November 2012 Ponemon Institute Research Report

More information

State of Web Application Security U.S. Survey of IT & IT security practitioners

State of Web Application Security U.S. Survey of IT & IT security practitioners State of Web Application Security U.S. Survey of IT & IT security practitioners Sponsored by Cenzic & Barracuda Networks Independently conducted by Ponemon Institute LLC Publication Date: March 2011 Ponemon

More information

Sponsored by Zimbra. The Open Source Collaboration Study: Viewpoints on Security & Privacy in the US & EMEA

Sponsored by Zimbra. The Open Source Collaboration Study: Viewpoints on Security & Privacy in the US & EMEA The Open Source Collaboration Study: Viewpoints on Security & Privacy in the US & EMEA Sponsored by Zimbra Independently conducted by Ponemon Institute LLC Publication Date: November 2014 Ponemon Institute

More information

The Billion Dollar Lost Laptop Problem Benchmark study of U.S. organizations

The Billion Dollar Lost Laptop Problem Benchmark study of U.S. organizations The Billion Dollar Lost Laptop Problem Benchmark study of U.S. organizations Independently conducted by Ponemon Institute LLC Publication Date: 30 September 2010 Ponemon Institute Research Report Part

More information

Enhancing Cybersecurity with Big Data: Challenges & Opportunities

Enhancing Cybersecurity with Big Data: Challenges & Opportunities Enhancing Cybersecurity with Big Data: Challenges & Opportunities Independently Conducted by Ponemon Institute LLC Sponsored by Microsoft Corporation November 2014 CONTENTS 2 3 6 9 10 Introduction The

More information

Leading Practices in Behavioral Advertising & Consumer Privacy Study of Internet Marketers and Advertisers

Leading Practices in Behavioral Advertising & Consumer Privacy Study of Internet Marketers and Advertisers Leading Practices in Behavioral Advertising & Consumer Privacy Study of Internet Marketers and Advertisers Independently Conducted by Ponemon Institute LLC February 2012 Leading Practices in Behavioral

More information

2014 State of Endpoint Risk. Sponsored by Lumension. Independently conducted by Ponemon Institute LLC Publication Date: December 2013

2014 State of Endpoint Risk. Sponsored by Lumension. Independently conducted by Ponemon Institute LLC Publication Date: December 2013 2014 State of Endpoint Risk Sponsored by Lumension Independently conducted by Ponemon Institute LLC Publication Date: December 2013 Ponemon Institute Research Report 2014 State of Endpoint Risk Ponemon

More information

The TCO of Software vs. Hardware-based Full Disk Encryption Summary

The TCO of Software vs. Hardware-based Full Disk Encryption Summary The TCO of vs. -based Full Disk Encryption Summary Sponsored by WinMagic Independently conducted by Ponemon Institute LLC Publication Date: April 2013 Industry Co-Sponsors Ponemon Institute Research Report

More information

LiveThreat Intelligence Impact Report 2013

LiveThreat Intelligence Impact Report 2013 LiveThreat Intelligence Impact Report 2013 Sponsored by Independently conducted by Ponemon Institute LLC Publication Date: July 2013 Ponemon Institute Research Report Contents Part 1. Introduction 3 Executive

More information

How Much Is the Data on Your Mobile Device Worth?

How Much Is the Data on Your Mobile Device Worth? How Much Is the Data on Your Mobile Device Worth? Sponsored by Lookout Independently conducted by Ponemon Institute LLC Publication Date: January 2016 Ponemon Institute Research Report Part 1. Introduction

More information

Privacy and Security in a Connected Life: A Study of US, European and Japanese Consumers

Privacy and Security in a Connected Life: A Study of US, European and Japanese Consumers Privacy and Security in a Connected Life: A Study of US, European and Japanese Consumers Sponsored by Trend Micro Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute

More information

2015 Global Encryption & Key Management Trends Study. Sponsored by Thales e-security

2015 Global Encryption & Key Management Trends Study. Sponsored by Thales e-security 2015 Global Encryption & Key Management Trends Study Sponsored by Thales e-security Independently conducted by Ponemon Institute LLC Publication Date: April 2015 Ponemon Institute Research Report 2015

More information

2014 Cost of Data Breach Study: Global Analysis

2014 Cost of Data Breach Study: Global Analysis 2014 Cost of Data Breach Study: Global Analysis Benchmark research sponsored by IBM Independently conducted by Ponemon Institute LLC May 2014 Ponemon Institute Research Report Part 1. Introduction 2014

More information

State of SMB Cyber Security Readiness: UK Study

State of SMB Cyber Security Readiness: UK Study State of SMB Cyber Security Readiness: UK Study Sponsored by Faronics Independently conducted by Ponemon Institute LLC Publication Date: November 2012 Ponemon Institute Research Report Part 1. Introduction

More information

The End Endorsed Devices pose a Large Security Risk to Your Organization

The End Endorsed Devices pose a Large Security Risk to Your Organization 2013 State of the Endpoint Sponsored by Lumension Independently conducted by Ponemon Institute LLC Publication Date: December 2012 Ponemon Institute Research Report 2013 State of the Endpoint Ponemon Institute:

More information

The economics of IT risk and reputation

The economics of IT risk and reputation Global Technology Services Research Report Risk Management The economics of IT risk and reputation What business continuity and IT security really mean to your organization Findings from the IBM Global

More information

Reputation Impact of a Data Breach Executive Summary

Reputation Impact of a Data Breach Executive Summary Reputation Impact of a Data Breach Executive Summary Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: October 2011 Ponemon Institute Research

More information

Big Data Analytics in Cyber Defense

Big Data Analytics in Cyber Defense Big Data Analytics in Cyber Defense Sponsored by Teradata Independently conducted by Ponemon Institute LLC Publication Date: February 2013 Ponemon Institute Research Report Big Data Analytics in Cyber

More information

Survey on the Governance of Unstructured Data. Independently Conducted and Published by Ponemon Institute LLC. Sponsored by Varonis Systems, Inc.

Survey on the Governance of Unstructured Data. Independently Conducted and Published by Ponemon Institute LLC. Sponsored by Varonis Systems, Inc. Survey on the Governance of Unstructured Data Independently Conducted and Published by Ponemon Institute LLC Sponsored by Varonis Systems, Inc. June 30, 2008 Please Do Not Quote Without Express Permission.

More information

2013 Cost of Data Center Outages

2013 Cost of Data Center Outages 2013 Cost of Data Center Outages Independently conducted by Ponemon Institute LLC Publication Date: December 2013 Part 1. Executive Summary 2013 Cost of Data Center Outages Ponemon Institute, December

More information

2015 State of the Endpoint Report: User-Centric Risk

2015 State of the Endpoint Report: User-Centric Risk 2015 State of the Endpoint Report: User-Centric Risk Sponsored by Lumension Independently conducted by Ponemon Institute LLC Publication Date: January 2015 Ponemon Institute Research Report 2015 State

More information

IBM QRadar Security Intelligence: Evidence of Value

IBM QRadar Security Intelligence: Evidence of Value IBM QRadar Security Intelligence: Evidence of Value Independently conducted by Ponemon Institute LLC February 2014 Ponemon Institute Research Report Background IBM QRadar: Evidence of Value Ponemon Institute:

More information