Cybersecurity in an All-IP World Are You Prepared? Executive Summary Get started Produced by: In partnership with:
Introduction: The distinctions between today s data, voice, wireless and video networks will blur as government agencies move to an all-ip infrastructure. And as IP applications replace separate networks, the focus on cybersecurity becomes even greater. Delivering citizen services securely while also protecting data continues to be a priority for government. In a recent survey conducted by Public CIO, over 125 respondents shared how they protect their environments from cyber threats and the challenges they see in an all-ip world. Keep reading to learn more about how your cybersecurity strategies and attitudes compare with your peers. Respondents: This survey was completed by a random sampling of Public CIO s subscriber base including IT management and administrators. Respondents were solicited via email invitations directing them to the online questionnaire. All aspects of this survey, including questionnaire review, promotional outreach, response capture and report preparation, have been completed by Public CIO.
Respondents host and manage the following on their networks: 88% 4% Applications Other 83% 56% Outbound Internet Access VoIP 82% 58% Email Voice 82% Web Applications 79% Remote VPN Access 79% File Share
Fifty-two percent of respondents host or plan to host applications in the cloud. Other features hosted in the cloud include: 47% 41% 27% 27% 20% Web Applications Email File Share Other Outbound Internet Access 16% 13% Remote VPN Access Voice
96% Firewall A firewall is the most common type of security technology deployed by respondents. Other security technologies include: 101010101111010010 0110010100000101 010101010011101001 01001011110000101 00010101010001110 00110001110101001 010010100101001 00110001110101001 89% 85% 79% 75% 73% 72% Email Filtering Web Filtering Endpoint Security Encryption Application Firewall Intrusion Detection/ Intrusion Protection 63% 60% 29% 3% Data Loss Protection Mobile Event Device Correlation Management Other
When asked to describe their use of log data from deployed security devices, respondents answered 7% Collect discreetly from each device that they: 10% Consolidate and use for reporting 29% Have no strategy for log use 12% Consolidate and maintain for later analysis 20% Collect from each device and maintain for later analysis 22% Consolidate, correlate and use for real-time alerting
Forty-six percent of respondents have a Security Operations Center. 100 80 56% 60 of those with an SOC staff it 24/7/365. 40 20 0
Respondents spend the following percent on security in relation to 100 overall IT budgets: 60 40 % of Respondents 80 20 26 % of respondents 22 % of respondents 26 % of respondents 26 % of respondents 0 1-3% 3-5% More than 5% Not Applicable % of Overall IT Budget
Respondents employ the following numbers of 21-50 4% More than 50 4% cybersecurity experts at their agencies: 6-20 19% 1-5 46% Not Applicable 27%
When it comes to hiring and retaining cybersecurity personnel, respondents are: 44% Not Challenged 28% Somewhat Challenged 28% Very Challenged
Forty percent of respondents feel prepared and vigilant regarding their agency s cybersecurity strategies. 100 80 60 Zzz 40 20 40% Feel prepared and vigilant 31% Sleep peacefully at night 20% Know it s a matter of when not if 9% 0 Are concerned about making the headlines
2014 e.republic. All rights reserved. For more information, visit www.att.com/govsecurity.