Defending yesterday. Retail & Consumer. Key findings from The Global State of Information Security Survey 2014
|
|
|
- Britney Felicity Davidson
- 10 years ago
- Views:
Transcription
1 Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday s security practices to combat today s threats. Retail & Consumer Key findings from The Global State of Information Security Survey 2014
2 Threats advance faster than security While information security risks have dramatically evolved, security strategies typically compliance-based and perimeter-oriented have not kept pace. In other words, most organizations are now defending yesterday, even as their adversaries look to exploit the vulnerabilities of tomorrow. Consequently, sophisticated intruders are bypassing perimeter defenses to perpetrate dynamic attacks that are highly targeted and difficult to detect. Many use well-researched phishing exploits that target top executives. Similarly, the attack surface partners, suppliers, customers, and others has expanded as an ever-greater volume of data flows through multiple channels. The result? Safeguarding all data at an equally high level is no longer practical. 2
3 Incidents increase in a new world of risk The results of The Global State of Information Security Survey 2014 show that executives in the global retail and consumer (R&C) industry are heeding the need to fund enhanced security activities and have substantially improved technology safeguards, processes, and strategies. Budgets are rising and confidence is high. But while many R&C companies have raised the bar on security, their adversaries have done better. This year s survey shows that detected security incidents have increased, as has the cost of breaches. And hot-button technologies like cloud computing, mobility, and BYOD are implemented before they are secured. Many executives are hesitant to share security intelligence with others, forgoing a powerful offensive tool against targeted, dynamic attacks. 3
4 Gain advantages with an evolved approach to security If few R&C companies have kept pace with today s escalating risks, fewer still are prepared to manage future threats. You can t fight today s threats with yesterday s strategies, says Gary Loveland, a principal in s security practice. What s needed is a new model of information security, one that is driven by knowledge of threats, assets, and the motives and targets of potential adversaries. This evolved approach requires that companies identify their most valuable assets and prioritize protection. Security incidents should be seen as a critical business risk that may not always be preventable, but can be managed to acceptable levels. And it is essential that security is a foundational component of the business strategy, one that is championed by the CEO and board, and adequately funded. In this new model of information security, knowledge is power. Seize it. 4
5 Agenda Section 1 Section 2 Section 3 Section 4 Section 5 Section 6 Methodology Confidence in an era of advancing risks Today s incidents, yesterday s strategies A weak defense against adversaries Preparing for the threats of tomorrow The future of security: Awareness to Action 5
6 Section 1 Methodology 6
7 A global, cross-industry survey of business and IT executives The Global State of Information Security Survey 2014, a worldwide study by, CIO magazine, and CSO magazine, was conducted online from February 1, 2013 to April 1, s 16th year conducting the online survey, 11th with CIO and CSO magazines Readers of CIO and CSO magazines and clients of from 115 countries More than 9,600 responses from executives including CEOs, CFOs, CIOs, CISOs, CSOs, VPs, and directors of IT and security More than 40 questions on topics related to privacy and information security safeguards and their alignment with the business Thirty-nine percent (39%) of respondents from companies with revenue of $500 million+ Thirty-six percent (36%) of respondents from North America, 26% from Europe, 21% from Asia Pacific, 16% from South America, and 2% from the Middle East and Africa The survey included 820 respondents from the retail and consumer industry Margin of error less than 1%; numbers may not add to 100% due to rounding 7
8 Demographics R&C respondents by region of employment R&C respondents by company revenue size R&C respondents by title Middle East & Africa 2% Asia Pacific 16% Europe 24% North America 39% South America 19% Nonprofit/Gov /Edu 1% Medium ($100M - $1B US) 24% Large (> $1B US) 32% Do not know 13% Small (< $100M US) 30% IT & Security (Other) Compliance, Risk, Privacy IT & Security (Mgmt) CEO, CFO, COO CISO, CSO, CIO, CTO 14% 20% 18% 13% 35% (Numbers reported may not reconcile exactly with raw data due to rounding) 8
9 Section 2 Confidence in an era of increasing risks 9
10 Confidence is high: 74% of R&C respondents say their security activities are effective, with top execs even more optimistic. In the C-suite,* 82% of CEOs say they are confident in their security program. Among all executives, CISOs and CIOs report the highest confidence. Executive confidence in effectiveness of security activities (somewhat or very confident) 69% 74% 78% 84% 84% 79% 82% 74% 65% 78% 77% 71% All respondents CISOs CIOs CEOs CFOs COOs * CEOs, CFOs, and COOs Question 39: How confident are you that your organization s information security activities are effective? (Respondents who answered Somewhat confident or Very confident. ) Question 1: My job title most closely resembles
11 48% of R&C respondents consider themselves front-runners, ahead of the pack in strategy and security practices. Almost half say they have an effective strategy in place and are proactive in executing the plan, a 24% increase over last year. More than one in four (27%) say that they are better at getting the strategy right than executing the plan. Front-runners 48% Strategists 27% Tacticians 13% Firefighters 12% We have an effective strategy in place and are proactive in executing the plan We are better at "getting the strategy right" than we are at executing the plan We are better at "getting things done" than we are at defining an effective strategy We do not have an effective strategy in place and are typically in a reactive mode Question 27: Which statement best characterizes your organization s approach to protecting information security? 11
12 But closer scrutiny reveals far fewer real leaders than front-runners. We measured R&C respondents self-appraisal against four key criteria to filter for leadership. To qualify, organizations must: Have an overall information security strategy Employ a CISO or equivalent who reports to the CEO, CFO, COO, CRO, or legal counsel Have measured and reviewed the effectiveness of security within the past year Understand exactly what type of security events have occurred in the past year Our analysis shows there are significantly fewer real leaders than self-identified front-runners. 48% R&C front-runners 18% R&C leaders Leaders are identified by responses to Question 13A: Where / to whom does your CISO, CSO, or equivalent senior information security executive report? Question 14: What process information security safeguards does your organization currently have in place? Question 19: What types of security incident(s) occurred? Question 31: Over the past year, has your company measured and reviewed the effectiveness of its information security policies and procedures? 12
13 R&C information security budgets increase significantly. Security budgets average $3.6 million this year, an increase of 61% over last year. R&C companies appear to understand that today s elevated threat landscape demands a substantial boost in security investment. Average information security budget $3.6 million $2.4 million $2.1 million $2.2 million $1.4 million Question 8: What is your organization s total information security budget for 2013? 13
14 Section 3 Today s incidents, yesterday s strategies 14
15 R&C companies detect more security incidents.* The average number of incidents detected by R&C respondents in the past 12 months increased 30% over last year, perhaps an indication of today s elevated threat environment. Average financial losses as a result of security incidents are up 46%, which is not surprising given the cost and complexity of responding to incidents. Average number of security incidents in past 12 months 2,702 1,801 2,085 Do not know 9% Do not know 17% Do not know 19% * A security incident is defined as any adverse incident that threatens some aspect of computer security. Question 18: What is the number of security incidents detected in the past 12 months? Question 22A: Estimated total financial losses as a result of all security incidents. 15
16 R&C respondents report increases in data loss as a result of security incidents. Compromise of employee and customer records is up sharply this year, potentially jeopardizing an organization s most valuable relationships. Also significant: Loss or damage of internal records more than doubled over Impact of security incidents 35% 32% 29% 19% 21% 20% 13% 13% Employee records compromised Customer records compromised or unavailable Loss or damage of internal records Identity theft (client or employee data stolen) Question 22: How was your organization impacted by the security incidents? (Not all factors shown.) 16
17 Most respondents have deployed traditional security tools, yet they may not be effective in stopping today s threats. Deployment of block and tackle security programs is at an all-time high. But they may not comprehensively block today s incidents, suggesting these products and services are ineffective because they are built on outdated security models. Information security safeguards and processes currently in place Application firewalls 79% Malware or virus-protection software Web content filters Secure remote access (VPN) Secure browsers Network access control software Encryption of desktop PCs Identity management technology Compliance testing 73% 72% 69% 68% 67% 66% 62% 61% Question 14: What process information security safeguards does your organization currently have in place? Question 15: What technology information security safeguards does your organization currently have in place? (Not all factors shown.) 17
18 Insiders, particularly current or former employees, are cited as a source of security incidents by most R&C respondents. While 57% of R&C respondents say they monitor user compliance with security policies, the high turnover rate in the industry may be attributed to elevated employee security incidents. Estimated likely source of insider incidents Employees Current employees 29% Former employees 29% Trusted advisors Current service providers/consultants/contractors 15% Former service providers/consultants/contractors 11% Suppliers/business partners 11% Information brokers 10% Question 21: Estimated likely source of incidents Question 14: What process information security safeguards does your organization currently have in place? (Not all factors shown.) 18
19 While attacks backed by nation-states make headlines, R&C companies are more likely to be hit by other outsiders. Only 3% of respondents report security incidents perpetrated by foreign nation-states. Hackers represent a much more likely danger. Estimated likely source of outsider incidents Outsiders Hackers 30% Competitors 16% Organized crime 11% Activists/ activist groups/ hacktivists 9% Terrorists 8% Foreign entities/organizations 5% Foreign nation-states 3% Question 21: Estimated likely source of incidents (Not all factors shown.) 19
20 Section 4 A weak defense against adversaries 20
21 Many R&C companies have not implemented technologies that can provide better insight into today s risks. Security safeguards that monitor data, assets, and events are less likely to be in place than traditional safeguards. These tools can provide ongoing intelligence into ecosystem vulnerabilities and dynamic threats. Respondents who answered security safeguards ARE NOT currently in place 50% 47% 45% 45% 41% 37% 36% 32% Behavioral profiling and monitoring Protection/ detection for advanced persistent threats (APTs) Security information and event management technologies Use of virtualized desktop Data loss prevention tools Centralized user data store Assetmanagement tools Active monitoring/ analysis of security intelligence Question 14: What process information security safeguards does your organization currently have in place? Question 15: What technology information security safeguards does your organization currently have in place? (Not all factors shown.) 21
22 Despite the potential consequences, most R&C companies do not adequately define and inventory high-value data. It is imperative that organizations identify, prioritize, and protect their crown jewels. Most R&C respondents, however, have not inventoried their data assets or classified the business value of data. Have policies to help safeguard IP and trade secrets 38% 28% 32% 27% 22% 26% 20% 21% 18% 19% 12% 16% Regular review of users and access Inventory of assets/ asset management Procedures dedicated to protecting IP Classifying business value of data Question 32: Which of the following elements, if any, are included in your organization s security policy? (Not all factors shown.) 22
23 44% of R&C companies use cloud computing, but they often do not include cloud in their security policies. Among those that do use cloud services, 54% report improved information security but only 14% include provisions for cloud in their security policy. Top challenges to cloud use include compliance, enforcement of data protection, and governance. Potential issues regarding use of third-party cloud environments 41% 30% 29% 27% 17% Difficulty with datasecurity compliance Reduced ability to negotiate and enforce data protection Difficulty with governance, oversight, and monitoring Limitation of liability Difficulty/challenge building internal skills and knowledge Question 32: Which of the following elements, if any, are included in your organization s security policy? Question 42: Does your organization currently use cloud services such as Infrastructure-as-a-Service (IaaS), Software-as-a-Service (SaaS), or Platform-as-a-Service (PaaS)? Question 42C: What impact has cloud computing had on your company s information security? (Not all factors shown.) (Asked only of retail and consumer respondents) Question 2: What potential issues does your organization face regarding third-party cloud environments? (Not all factors shown.) 23
24 29% of R&C respondents do not collaborate with others to improve security, forgoing a powerful offensive tool. And that can impede security in today s interconnected world. In s 5 th Annual Digital IQ Survey, we found that firms with collaborative C-suites intertwine business strategy and IT and that often improves performance and enables quick adaption to market changes. 1 Reasons for not collaborating on information security Are concerned that a competitor would use such information to market against us 31% Do not want to draw attention to potential weaknesses 31% No one competitor is considerably more advanced than others 27% Distrust our competitors 24% Larger organizations with more financial resources would use collaboration to their advantage 19% 1, s 5 th Annual Digital IQ Survey, 2013 Question 41: Does your organization formally collaborate with others in your industry, including competitors, to improve security and reduce the potential for future risks? Question 41A: Why doesn t your organization collaborate with others in the industry to improve security and reduce the potential for future risks? (Not all factors shown.) 24
25 Section 5 Preparing for the threats of tomorrow 25
26 R&C leaders are enhancing capabilities in ways that show security is a business imperative not just an IT challenge. R&C leaders show higher levels of support from senior executives to drive business alignment and integration. Security policies and safeguards currently in place: All respondents vs. leaders 65% 79% 84% 60% 63% 62% 58% 56% 56% 72% Security strategy aligned with business needs Standards for external partners, customers, suppliers, vendors A centralized security information management process A senior executive who communicates the importance of security Cross-functional team coordinates/communicates security issues All R&C respondents R&C leaders Question 14: What process information security safeguards does your organization currently have in place? (Not all factors shown.) Question 29: Does your organization have a senior executive (CEO, CFO, COO, etc.) who proactively communicates the importance of information security to the entire organization? 26
27 Many R&C companies have invested in technology to secure their ecosystems against today s evolving threats. Leaders are more likely to have implemented these technologies. But given today s elevated threat landscape, all organizations should strongly consider implementation of these safeguards. Technology safeguards currently in place All R&C respondents R&C leaders Malicious code detection tools 74% 89% Privileged user access 67% 77% Intrusion prevention tools 66% 82% Vulnerability scanning tools 64% 77% User-activity monitoring tools 62% 73% Security event correlation tools 58% 72% Mobile device management 56% 65% Encryption of smartphones 56% 69% Federated identity management 51% 64% Secure supply chain management solution 31% 36% Question 15: What technology information security safeguards does your organization currently have in place? (Not all factors shown.) (Asked only of retail and consumer respondents.) Question 4: Do you plan to implement a secure supply chain management solution? (Respondents who answered "Already in place"). 27
28 What business imperatives and processes will R&C respondents prioritize this year? Some of the highest priorities cited by R&C respondents include technologies that can help the company protect its most valuable assets and set security standards for third parties. Safeguards not in place but a top priority over the next 12 months Protection of critical assets Program to identify sensitive assets 26% Identity management technology 21% Asset-management tools 16% Infrastructure security Security baselines/standards for external partners/customers/suppliers/vendors 25% Standards/procedures for infrastructure deployment 22% Employee security awareness training program 21% Question 14: What process information security safeguards does your organization not have in place, but is a priority over the next 12 months? Question 15: What technology information security safeguards does your organization not have in place, but is a top priority over the next 12 months? (Not all factors shown.) 28
29 Other priorities focus on detecting and responding to threats. Knowledge is power, and R&C organizations are prioritizing technologies that can help gain a better understanding of threats as well as improve security for mobile devices. Safeguards not in place but a top priority over the next 12 months Threats Threat-intelligence subscription services Protection/detection management solution for APTs Intrusion-detection tools 20% 24% 26% Analytics Third-party Internet monitoring and anlysis Security event correlation tools Active monitoring/analysis of information security intelligence 17% 21% 20% Mobile Mobile device management Strategy for employee use of personal devices on the enterprise Encryption of smart phones 25% 24% 24% Question 14: What process information security safeguards does your organization not have in place, but is a priority over the next 12 months? Question 15: What technology information security safeguards does your organization not have in place, but is a top priority over the next 12 months? (Not all factors shown.) 29
30 Effective security demands that organizations align policies and spending with business objectives. This year, more R&C respondents say security policies and spending are aligned with business objectives. This suggests they understand that security is an integral part of the business agenda and can contribute to bottom-line benefits. Level of alignment with organization s business objectives (somewhat or completely aligned) Security policies 75% 84% Security spending 72% 82% Question 33: In your opinion, how well are your company s security policies aligned with your company s business objectives? Question 34: In your opinion, how well is your company s spending aligned with your company s business objectives? 30
31 Committed leadership, vision, and more money are needed to advance security. Effective security requires the support of top executives particularly the CEO and an informed security vision that is aligned with future business needs. Greatest obstacles to improving the strategic effectiveness of the company s IS function Leadership: CEO, President, Board, or equivalent Lack of an actionable vision or understanding of how future business needs impact information security Insufficient capital expenditures Lack of an effective information security strategy Insufficient operating expenditures Absence or shortage of in-house technical expertise 25% 24% 22% 22% 20% 19% Leadership: CISO, CSO, or equivalent Leadership: CIO or equivalent Poorly integrated or overly complex information and IT systems 16% 15% 15% Question 28: What are the greatest obstacles to improving the overall strategic effectiveness of your organization s information security function? 31
32 Section 6 The future of security: Awareness to Action 32
33 The fundamental safeguards you ll need for an effective security program. Effective security requires implementation of numerous technical, policy, and people safeguards. Based on a regression analysis of survey responses and s experience in global security practices, the following are ten key strategies. Essential safeguards for effective security 1 A written security policy 2 Back-up and recovery/business continuity plans 3 Minimum collection and retention of personal information, with physical access restrictions to records containing personal data 4 Strong technology safeguards for prevention, detection, and encryption 5 6 Accurate inventory of where personal data of employees and customers is collected, transmitted, and stored, including third parties that handle that data Internal and external risk assessments of privacy, security, confidentiality, and integrity of electronic and paper records 7 Ongoing monitoring of the data-privacy program 8 Personnel background checks 9 An employee security awareness training program 10 Require employees and third parties to comply with privacy policies 33
34 Beyond the fundamentals: A new approach to security for a new world. Traditional security safeguards will only take you so far. Today s elevated risk landscape demands a new approach to security, one that is driven by knowledge of threats, assets, and adversaries. We call this model Awareness to Action. Security is a business imperative You should understand the exposure and potential business impact associated with operating in an interconnected global business ecosystem. An integrated security strategy should be a pivotal part of your business model; security is no longer simply an IT challenge. Security threats are business risks CEOs, board members, and business executives should understand that security risks are organizational threats. You should anticipate these threats, know your vulnerabilities, and be able to identify and manage the associated risks. Ensure that suppliers, partners, and other third parties know and agree to adhere to your security practices. 34
35 Beyond the fundamentals: A new approach to security for a new world (cont d). Protect the information that really matters Understand and adapt to changes in the threat environment by identifying your most valuable information. Know where these crown jewels are located and who has access to them. Allocate and prioritize resources to protect your valuable information. Gain advantage from Awareness to Action All activities and investments should be driven by the best-available knowledge about information assets, ecosystem threats and vulnerabilities, and business-activity monitoring. Create a culture of security that starts with commitment of top executives and cascades to all employees. Engage in public-private collaboration with others for enhanced threat intelligence. 35
36 For more information, please contact: US IT Security, Privacy & Risk Contacts Gary Loveland Principal Mark Lobel Principal US Retail & Consumer Contacts Lisa Dugal Principal Pieter Penning Principal Paul Ritters Director Or visit to explore the data and benchmark your organization. The Global State of Information Security is a registered trademark of International Data Group, Inc PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved. refers to the United States member firm, and may sometimes refer to the network. Each member firm is a separate legal entity. Please see for further details. This content is for general information purposes only, and should not be used as a substitute for consultation with professional advisors. PricewaterhouseCoopers has exercised reasonable care in the collecting, processing, and reporting of this information but has not independently verified, validated, or audited the data to verify the accuracy or completeness of the information. PricewaterhouseCoopers gives no express or implied warranties, including but not limited to any warranties of merchantability or fitness for a particular purpose or use and shall not be liable to any entity or person using this document, or have any liability with respect to this document.
Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014
www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday
January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director
January IIA / ISACA Joint Meeting Pre-meeting Cybersecurity Update for Internal Auditors Matt Wilson, Risk Assurance Director Introduction and agenda Themes from The Global State of Information Security
20+ At risk and unready in an interconnected world
At risk and unready in an interconnected world Key findings from The Global State of Information Security Survey 2015 Cyber attacks against power and utilities organizations have transitioned from theoretical
Defending yesterday Key findings from The Global State of Information Security Survey 2014
www.pwc.com/security Advisory Services Security While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday
www.pwc.com Cybersecurity and Privacy Hot Topics 2015
www.pwc.com Cybersecurity and Privacy Hot Topics 2015 Table of Contents Cybersecurity and Privacy Incidents are on the rise Executives and Boards are focused on Emerging Risks Banking & Capital Markets
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
PwC Cybersecurity Briefing
www.pwc.com/cybersecurity Cybersecurity Briefing June 25, 2014 The views expressed in these slides are solely the views of the presenters and do not necessarily reflect the views of the PCAOB, the members
Assessing the strength of your security operating model
www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems
Managing cyber risks with insurance
www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
Developing National Frameworks & Engaging the Private Sector
www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Security and Privacy
Security and Privacy Matthew McCormack, CISSP, CSSLP CTO, Global Public Sector, RSA The Security Division of EMC 1 BILLIONS OF USERS MILLIONS/BILLIONS OF APPS 2010 Cloud Big Data Social Mobile Devices
Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape
January 2013 Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape At a glance Threats to data security both
Security risks and responses in an evolving telecommunications industry
Security risks and responses in an evolving telecommunications industry Telecommunications reach deep into the daily circumstances of individuals, businesses, and governments. Telecoms, in fact, touches
Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3
GLOBAL ADVANCED THREAT LANDSCAPE SURVEY 2014 TABLE OF CONTENTS Executive Summary 3 Snowden and Retail Breaches Influencing Security Strategies 3 Attackers are on the Inside Protect Your Privileges 3 Third-Party
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future
www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future 2015 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Answering your cybersecurity questions The need for continued action
www.pwc.com/cybersecurity Answering your cybersecurity questions The need for continued action January 2014 Boards and executives keeping a sustained focus on cybersecurity do more than protect the business:
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to
www.pwc.com Developing a robust cyber security governance framework 16 April 2015
www.pwc.com Developing a robust cyber security governance framework 16 April 2015 Cyber attacks are ubiquitous Anonymous hacker group declares cyber war on Hong Kong government, police - SCMP, 2 October
10 Smart Ideas for. Keeping Data Safe. From Hackers
0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000
State of Security Survey GLOBAL FINDINGS
2011 State of Security Survey GLOBAL FINDINGS CONTENTS Introduction... 4 Methodology... 6 Finding 1: Cybersecurity is important to business... 8 Finding 2: The drivers of security are changing... 10 Finding
2015 Global Study on IT Security Spending & Investments
2015 Study on IT Security Spending & Investments Independently conducted by Ponemon Institute LLC Publication Date: May 2015 Sponsored by Part 1. Introduction Security risks are pervasive and becoming
Changing the Enterprise Security Landscape
Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein
Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA
www.pwc.com Vulnerability Management (TVM) Protecting IT assets through a comprehensive program Chicago IIA/ISACA 2 nd Annual Hacking Conference Introductions Paul Hinds Managing Director Cybersecurity
Data Security: Fight Insider Threats & Protect Your Sensitive Data
Data Security: Fight Insider Threats & Protect Your Sensitive Data Marco Ercolani Agenda Data is challenging to secure A look at security incidents Cost of a Data Breach Data Governance and Security Understand
Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security
Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions
Changing the game Key findings from The Global State of Information Security Survey 2013
www.pwc.com/security Advisory Services Security While tight budgets have forestalled updates to security programs, many businesses are confident they re winning the game. But the rules and the players
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Visualize current and potential network traffic patterns
Cyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
How To Protect Your Credit Card Information From Being Stolen
Visa Account Information Security Tool Kit Welcome to the Visa Account Information Security Program 2 Contents 1. Securing cardholder data is everyone s concern 4 2. Visa Account Information Security (AIS)
Teradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs
1 Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs NEW YORK Byungkwon Lim [email protected] Gary E. Murphy [email protected] Michael J. Decker [email protected]
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
Stay ahead of insiderthreats with predictive,intelligent security
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz [email protected] IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
Internet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY
2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY 1 EXECUTIVE SUMMARY INTRODUCING THE 2015 GLOBAL THREAT INTELLIGENCE REPORT Over the last several years, there has been significant security industry
Escalating concern over cyber threats has CEOs warming to government collaboration
Escalating concern over cyber threats has CEOs warming to government collaboration 2015 US CEO Survey Leading in extraordinary times With cyber attacks the new normal in business, CEOs from the biggest
Security Intelligence
IBM Security Security Intelligence Security for a New Era of Computing Erno Doorenspleet Consulting Security Executive 1 PARADIGM SHIFT in crime Sophistication is INCREASING Attacks are More Targeted Attackers
Click to edit Master title style
EVOLUTION OF CYBERSECURITY Click to edit Master title style IDENTIFYING BEST PRACTICES PHILIP DIEKHOFF, IT RISK SERVICES TECHNOLOGY THE DARK SIDE AGENDA Defining cybersecurity Assessing your cybersecurity
Is it Time to Trust the Cloud? Unpacking the Notorious Nine
Is it Time to Trust the Cloud? Unpacking the Notorious Nine Jonathan C. Trull, CISO, Qualys Cloud Security Alliance Agenda Cloud Security Model Background on the Notorious Nine Unpacking the Notorious
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
Outbound Email Security and Content Compliance in Today s Enterprise, 2005
Outbound Email Security and Content Compliance in Today s Enterprise, 2005 Results from a survey by Proofpoint, Inc. fielded by Forrester Consulting on outbound email content issues, May 2005 Proofpoint,
The Oracle Mobile Security Suite: Secure Adoption of BYOD
An Oracle White Paper April 2014 The Oracle Mobile Security Suite: Secure Adoption of BYOD Executive Overview BYOD (Bring Your Own Device) is the new mobile security imperative and every organization will
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY
CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
How to Turn the Promise of the Cloud into an Operational Reality
TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
overview Enterprise Security Solutions
Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world
El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada
El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada The Traditional Approach is Changing. Security is no longer controlled and enforced through the
Protecting against cyber threats and security breaches
Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez [email protected] IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So
Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation
Combatting the Biggest Cyber Threats to the Financial Services Industry A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry Combatting
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT How advancements in automated security testing software empower organizations to continuously measure information
Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks
White Paper Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks A Guide for CIOs, CFOs, and CISOs White Paper Contents The Problem 3 Why You Should Care 4 What You Can Do About It
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
What Data? I m A Trucking Company!
What Data? I m A Trucking Company! Presented by: Marc C. Tucker 434 Fayetteville Street, Suite 2800 Raleigh, NC, 27601 919.755.8713 [email protected] Presented by: Rob D. Moseley, Jr. 2 West
Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products
Threat Intelligence: The More You Know the Less Damage They Can Do Charles Kolodgy Research VP, Security Products IDC Visit us at IDC.com and follow us on Twitter: @IDC 2 Agenda Evolving Threat Environment
10Minutes. on the stark realities of cybersecurity. The Cyber Savvy CEO. A changed business environment demands a new approach:
10Minutes on the stark realities of cybersecurity The Cyber Savvy CEO Highlights Business leaders must recognise the exposure and business impact that comes from operating within an interconnected global
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
A strategic approach to fraud
A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for
The Impact of Cybercrime on Business
The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted
Mobile, Cloud, Advanced Threats: A Unified Approach to Security
Mobile, Cloud, Advanced Threats: A Unified Approach to Security David Druker, Ph.D. Senior Security Solution Architect IBM 1 Business Security for Business 2 Common Business Functions Manufacturing or
