Symantec 2004 Pulse of IT Security in Canada Volume II Survey shows Increases in Concern and Spending for IT Security Andrew Bisson Director, Planning.

Slides:



Advertisements
Similar presentations
Jack Jedwab Association for Canadian Studies September 27 th, 2008 Canadian Post Olympic Survey.
Advertisements

Symantec 2010 Windows 7 Migration Global Results.
AGVISE Laboratories %Zone or Grid Samples – Northwood laboratory
Trend for Precision Soil Testing % Zone or Grid Samples Tested compared to Total Samples.
1 Nia Sutton Becta Total Cost of Ownership of ICT in schools.
1 UNIVERSITIES of AUSTRALASIA BENCHMARKING RISK MANAGEMENT BILL DUNNE DIRECTOR RISK MANAGEMENT UNSW. PROUDLY SPONSORED BY UNIMUTUAL.
EuroCondens SGB E.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Addition and Subtraction Equations
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
OPTN Modifications to Heart Allocation Policy Implemented July 12, 2006 Changed the allocation order for medically urgent (Status 1A and 1B) patients Policy.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Create an Application Title 1Y - Youth Chapter 5.
Add Governors Discretionary (1G) Grants Chapter 6.
CALENDAR.
Frequency Tables, Stem-and-Leaf Plots, and Line Plots 7-1
Welcome Youth Conference – Monday 19 th March 2007.
Micro Focus Research 1 As far as youre aware, how does your organization plan to drive business growth over the next three years? (Respondents' first choices)
The 5S numbers game..
1 Richard V. Tucker, CIC Applied Systems Users Group of Central New Jersey Cyberslacking Cyberslacking Introduction.
Richmond House, Liverpool (1) 26 th January 2004.
A Fractional Order (Proportional and Derivative) Motion Controller Design for A Class of Second-order Systems Center for Self-Organizing Intelligent.
Eat. Play. Live... Better Montclair Baseline Evaluation & Needs Assessment Preliminary Community Survey Findings Partnership Meeting February 8, 2012.
Trade Promotion Management Study Summary Charts
Welcome. © 2008 ADP, Inc. 2 Overview A Look at the Web Site Question and Answer Session Agenda.
Cybersecurity Update December 5, Agenda Cybersecurity – A growing problem Cybersecurity in other states (NASCIO/Deloitte Study) Structure Challenges.
The basics for simulations
EMS Checklist (ISO model)
Copyright Critical Software S.A All Rights Reserved. COTS based approach for the Multilevel Security Problem Bernardo Patrão.
Finish Test 15 minutes Wednesday February 8, 2012
Frequency Tables and Stem-and-Leaf Plots 1-3
MCQ Chapter 07.
TCCI Barometer March “Establishing a reliable tool for monitoring the financial, business and social activity in the Prefecture of Thessaloniki”
Determining the Significant Aspects
TCCI Barometer March “Establishing a reliable tool for monitoring the financial, business and social activity in the Prefecture of Thessaloniki”
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
Progressive Aerobic Cardiovascular Endurance Run
1..
The Canadian Flag as a Symbol of National Pride: A question of Shared Values Jack Jedwab Association for Canadian Studies November 28 th, 2012.
Name of presenter(s) or subtitle Canadian Netizens February 2004.
Adding Up In Chunks.
SHIFTING INFORMATION SECURITY LANDSCAPE FROM C&AS TO CONTINUOUS MONITORING ANDREW PATCHAN JD, CISA ASSOCIATE IG FOR IT, FRB LOUIS C. KING, CPA, CISA, CMA,
MaK_Full ahead loaded 1 Alarm Page Directory (F11)
Facebook Pages 101: Your Organization’s Foothold on the Social Web A Volunteer Leader Webinar Sponsored by CACO December 1, 2010 Andrew Gossen, Senior.
LO: Count up to 100 objects by grouping them and counting in 5s 10s and 2s. Mrs Criddle: Westfield Middle School.
TCCI Barometer September “Establishing a reliable tool for monitoring the financial, business and social activity in the Prefecture of Thessaloniki”
When you see… Find the zeros You think….
Strategy Review Meeting Strategy Review Meeting
DURHAM DAY-TRIP REPORT Prepared For: Durham Convention & Visitor’s Bureau Prepared By: D.K. Shifflet & Associates Ltd. April 2003.
2011 WINNISQUAM COMMUNITY SURVEY YOUTH RISK BEHAVIOR GRADES 9-12 STUDENTS=1021.
Before Between After.
2011 FRANKLIN COMMUNITY SURVEY YOUTH RISK BEHAVIOR GRADES 9-12 STUDENTS=332.
Model and Relationships 6 M 1 M M M M M M M M M M M M M M M M
25 seconds left…...
Subtraction: Adding UP
1 Atlantic Annual Viewing Trends Adults 35-54, Total TV, By Daypart Average Minute Audience (000) Average Weekly Reach (%) Average Weekly Hours Viewed.
1 Non Deterministic Automata. 2 Alphabet = Nondeterministic Finite Accepter (NFA)
Media Channel Study Media Channel Study - 1 Contents Main Objectives2 Survey Method3 Media Channels Studied4 Executive Summary5 Detailed Findings6.
Static Equilibrium; Elasticity and Fracture
Resistência dos Materiais, 5ª ed.
Online  Trade shows  Magazines  Research (NASDAQ-GS: GSOL) Global Sources’ 2009Importer Survey.
UNDERSTANDING THE ISSUES. 22 HILLSBOROUGH IS A REALLY BIG COUNTY.
1 Non Deterministic Automata. 2 Alphabet = Nondeterministic Finite Accepter (NFA)
Schutzvermerk nach DIN 34 beachten 05/04/15 Seite 1 Training EPAM and CANopen Basic Solution: Password * * Level 1 Level 2 * Level 3 Password2 IP-Adr.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Information Security in Laurier Grant Li Wilfrid Laurier University.
CSI Survey 2007 Tiffany Gorman
Presentation transcript:

Symantec 2004 Pulse of IT Security in Canada Volume II Survey shows Increases in Concern and Spending for IT Security Andrew Bisson Director, Planning and Market Analysis Branham Group May 11, 2004

Survey Objective/Scope Survey Results Importance of IT Security Risk of Attack Disclosing a Security Breach Resolving a Security Breach IT Virus Infections Managing IT Security Monitoring for IT Security Breaches Investment in IT Security Summary Agenda

Survey Objective/Scope Objective: Gauge the awareness, priority and understanding of IT Security in Canada Target Audience: Senior IT Executives from Canadian Financial Post 800 Companies and Leading Canadian Universities & Colleges Timeframe: February - March 2004 Total Respondents: 150 VP IT/IS: 99 CIO: 27 CTO: 3 CFO: 13 CSO: 8

Concern for IT Security is on the Rise! Survey Results ALL respondents identified IT Security as an area of importance 65.5% ranked security amongst top 5 corporate priorities 55.4% of respondents from FP800 Companies are more concerned about IT Security then they were 12 months ago (3.57% Less, 41.1% Unchanged) Importance of IT Security

2004 Top 3 IT Security Concerns: Unauthorized Access by Insiders Viruses Identity Theft Importance of IT Security Survey Results 2003 Top 3 IT Security Concerns: Hackers Unauthorized Access Viruses

Survey Results Risk of Attack Risk of Attack was rated low Today: weighted average of 4.10 (10 being the highest risk and 1 being the lowest) Consistent with 2003 result of 4.12 In 12 Months: weighted average of 4.18 Top 3 Drivers for attention to IT Security: Data/Information Protection Lost Revenue Negative Publicity

Survey Results Disclosing a Security Breach 39.3% claimed they would admit to a security breach while 35.7% would not Consistent with 2003 results: 41.3% would admit to a breach vs. 37.3% who would not 79.5% of those that would admit to a breach have been a target (unauthorized access, viruses, etc.). Only 19.4% admitted to being a target in 2003!

Survey Results Disclosing a Security Breach Top 3 Security Breaches: SPAM, Unauthorized Access by Insiders, Denial of Service Attacks

Survey Results Resolving a Security Breach Top 3 Departments Involved in Resolving a Breach: Information Technology (IT); Human Resources; Legal Top 3 Costs of Resolving a Security Breach: 67%: $0-$10K; 17%: $10K-$50K; 11%: $50K-$100K

Survey Results IT Virus Infections Top 3 Categories for Frequency of Virus Infections: Quarterly: 24.5% Never: 23.5% Yearly: 19.6% Perceived Threats Lost Revenue Lost Employee Productivity

Survey Results Managing IT Security 86.5% of FP800 respondents have implemented an IT Security Policy The majority of IT Security Issues are dealt with internally

Survey Results Monitoring for IT Security Breaches 64.5% of respondents claim that 100% of their network is being monitored for intrusions (11.8% dont monitor at all) 62.8% of respondents claim to review their Firewall logs for inappropriate activity Daily (22.5% weekly) 89.8% of respondents claim to monitor their critical application servers for non-authorized access/use 27.3% of respondents claim to run vulnerability assessment scans of their networks and critical services annually (19.3% quarterly, 18.2% monthly, 15.9% weekly, 11.3% daily) 37.4% of respondents claim to run penetration testing on their infrastructure annually (23.1% quarterly, 13.2% never) 80.6% of respondents claim to have a formal procedure to manage vulnerabilities and implement patches 69.4% of respondents claim to have developed an incident response plan that would be initiated should a security breach occur.

Survey Results Investment in IT Security IT Security Spend rose in 2004 and is expected to continue to rise going into 2005 On average 7.6% of the IT Budget for FP800 Companies is dedicated to IT Security

Survey Results Investment in IT Security

Summary Canadas leading IT executives are more concerned about IT Security then they were a year ago, however few see their organizations as being a significant risk of attack IT attacks are on the rise, however IT executives continue to be reluctant in disclosing breaches Concerns for Identity Theft are on the rise Denial of Service Attacks are on the rise Investment in IT Security Training is on the rise A majority of FP800 respondents have implemented an IT Security Policy IT Security Investments continue to rise, albeit at a slower pace…

Contact Andrew Bisson Director, Planning and Market Analysis Tel: (613) ext