InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

2014 IT Salary Survey: BI/Analytics Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
2014 IT Salary Survey: Government Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
InformationWeek 2014 State of the Data Center Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
InformationWeek Next-Generation IT Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
2013 InformationWeek 500 Executive Survey Research Findings Innovation That Gets Results September 2013 © 2013 Property of UBM Tech; All Rights Reserved.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
InformationWeek 2014 Mobile Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
David A. Brown Chief Information Security Officer State of Ohio
1 Getting Beyond Standalone Antivirus to Advanced Threat Protection Eric Schwake Sr. Product Marketing
Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
2014 State of Storage Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
InformationWeek 2014 Hybrid Cloud Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
2014 Analytics, BI, and Information Management Research Findings © 2013 Property of UBM Tech; All Rights Reserved.
2014 IT Salary Survey: Application Development Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
2014 IT Salary Survey: Healthcare Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
2014 State of Unified Communications Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
InformationWeek 2014 Backup Technologies Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
InformationWeek 2014 Enterprise Project Management Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Third Annual Shopping on the Job: ISACA’s Online Holiday Shopping and Workplace Internet Safety Survey Commissioned by ISACA ( November 2010.
2014 IT Salary Survey: Banking Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
2014 US IT Salary Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
SiteLock Internet Security: Big Threats for Small Business.
InformationWeek 2014 State of Database Technology Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
2014 IT Salary Survey: Networking Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
2014 IT Salary Survey: Insurance Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
2014 IT Salary Survey: Security Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
2014 IT Salary Survey: Executives Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Agenda Do You Need to Be Concerned? Information Risk at Nationwide
(ISC) Global Workforce Study U.S. Government Results May 7, 2013.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
InformationWeek 2014 Strategic CIO Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Dell Connected Security Solutions Simplify & unify.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
© 2012 Robert Half Management Resources. An Equal Opportunity Employer. Benchmarking the Finance Function 2012: How Does Your Company Measure Up?
The Changing World of Endpoint Protection
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
2015 Security Conference Dave Gill Intel Security.
Cyber Security Management Lesson Introduction ●Understand organizational context for cyber security ●Understand the people, process and technology dimensions.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
How Mobile Transforms the Enterprise
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
2014 IT Budget Outlook Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
1 Current Trends in Enterprise IT Network Security Key Takeaways Based on 100 Survey Responses © 2016 Lumeta Corporation.
Moving to BYOD Gary Audin 1.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Voice of the Enterprise Internet of Things: Understanding IoT Customer Adoption Trends & Issues This is what we’ve found by snooping through the competition’s.
Information Security Program
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
THR2099 What to do BEFORE all hell breaks loose: Building a modern cybersecurity strategy.
Forensics Week 11.
Jon Peppler, Menlo Security Channels
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Strong Security for Your Weak Link:
MISSION STRATEGIC DIRECTION
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
In the attack index…what number is your Company?
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Presentation transcript:

InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

Enterprises outsource everything from server hosting to application development. Why not security? Look for this year to mark the start of a new era in information security, where organizations that can afford to build sophisticated analysis teams -- able to incorporate device context into security events data in a high-volume information steam -- do so, and those that can't hire specialized providers. "Managing the complexity of security" reclaimed the No. 1 spot among 10 challenges facing the 536 respondents to our InformationWeek 2014 Strategic Security Survey, all from organizations with 100 or more employees. More stats: >> 58% see an infected personal device connecting to the corporate network as a top endpoint security concern, making it the No. 1 response, ahead of phishing and lost devices. >> 56% say cyber-criminals pose the greatest threat to their organizations this year, the top answer, ahead of authorized users and employees at 49%. >> 31% conduct their own audits of cloud providers. >> 23% have experienced a security breach or espionage in the past year. Respondent breakdown: 41% have 5,000 or more employees; 30% are over 10,000. Government, financial services, and education are well-represented. Want more? Visit InformationWeek ReportsInformationWeek Reports Executive Summary v © 2014 Property of UBM Tech; All Rights Reserved

Biggest challenges: managing complexity, enforcing policies © 2014 Property of UBM Tech; All Rights Reserved

Vulnerability is largely unchanged © 2014 Property of UBM Tech; All Rights Reserved

Most feel threats are getting more sophisticated © 2014 Property of UBM Tech; All Rights Reserved

Most have not experienced security breach © 2014 Property of UBM Tech; All Rights Reserved

Most common breach: Malware © 2014 Property of UBM Tech; All Rights Reserved

Network/business apps most common victims © 2014 Property of UBM Tech; All Rights Reserved

Top breach/espionage threats: Cyber-criminals, employees © 2014 Property of UBM Tech; All Rights Reserved

Most use firewalls, security tools © 2014 Property of UBM Tech; All Rights Reserved

Firewalls considered most valuable © 2014 Property of UBM Tech; All Rights Reserved

Most require strong passwords

Strong passwords, training valued most © 2014 Property of UBM Tech; All Rights Reserved

Best way to manage vulnerabilities © 2014 Property of UBM Tech; All Rights Reserved

Best way to achieve regulatory compliance © 2014 Property of UBM Tech; All Rights Reserved

Who sets security policy? © 2014 Property of UBM Tech; All Rights Reserved

Security budget © 2014 Property of UBM Tech; All Rights Reserved

Security spending relatively consistent © 2014 Property of UBM Tech; All Rights Reserved

How valuable are security investments? © 2014 Property of UBM Tech; All Rights Reserved

Half consider mobile a minor security threat © 2014 Property of UBM Tech; All Rights Reserved

MDM software used? © 2014 Property of UBM Tech; All Rights Reserved

Top endpoint security concern: personal devices © 2014 Property of UBM Tech; All Rights Reserved

Top cloud concerns: leaks, defects © 2014 Property of UBM Tech; All Rights Reserved

Who does cloud risk assessments? © 2014 Property of UBM Tech; All Rights Reserved

Who has SIEM systems? © 2014 Property of UBM Tech; All Rights Reserved

Who has big data security analytics system? © 2014 Property of UBM Tech; All Rights Reserved

Top security analytics: Hadoop © 2014 Property of UBM Tech; All Rights Reserved

Big data analytics focus on endpoint, web activity © 2014 Property of UBM Tech; All Rights Reserved

Who gets big data security info? © 2014 Property of UBM Tech; All Rights Reserved

Most have security operations team © 2014 Property of UBM Tech; All Rights Reserved

Who has insurance policy? © 2014 Property of UBM Tech; All Rights Reserved

How is insurance need determined? © 2014 Property of UBM Tech; All Rights Reserved

Most have not been directly targeted © 2014 Property of UBM Tech; All Rights Reserved

Subscribe to threat service? © 2014 Property of UBM Tech; All Rights Reserved

Security staffing © 2014 Property of UBM Tech; All Rights Reserved

Security skills shortage: little change expected © 2014 Property of UBM Tech; All Rights Reserved

Respondents’ job titles © 2014 Property of UBM Tech; All Rights Reserved

Industries represented © 2014 Property of UBM Tech; All Rights Reserved

Respondents’ company revenues © 2014 Property of UBM Tech; All Rights Reserved

Respondents’ company sizes © 2014 Property of UBM Tech; All Rights Reserved

Survey Name InformationWeek 2014 Strategic Security Survey Survey Date April 2014 Region North America Number of Respondents 536 at organizations with 100 or more employees Purpose To comprehensively assess the current state of security programs, where organizations are focusing their security efforts, and how IT is adapting to current threats and trends. Methodology InformationWeek surveyed business technology decision-makers at North American organizations with 100 or more employees. The survey was conducted online, and respondents were recruited via an invitation containing an embedded link to the survey. The invitation was sent to qualified InformationWeek and Dark Reading subscribers. Want more? Visit InformationWeek ReportsInformationWeek Reports Research Synopsis © 2014 Property of UBM Tech; All Rights Reserved