O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.

Windstream Cloud Security Checklist

178 visualizações

Publicada em

Checklist created for Windstream around Cloud Security and keeping your data protected.

Publicada em: Marketing
  • Seja o primeiro a comentar

  • Seja a primeira pessoa a gostar disto

Windstream Cloud Security Checklist

  1. 1. SECURITY CONCERNS AND PREPAREDNESS More than half indicated insufficient preparation to manage cyber threats is a risk that will "significantly impact" their organizations this year.” 1 think their organization may not be sufficiently prepared to manage cyber threats that have the potential to significantly disrupt core operations and/or damage their brand.1 53% "Our survey findings indicate that operational risk issues are keeping many senior executives up at night.” Mark Beasley, Deloitte Professor of Enterprise Risk Management and NC State ERM Initiative director. What are the top executives' security concerns? How do you plan to address them? 1 Protivity, “Cybersecurity Concerns Rise as a Risk Factor for Board Members and Senior Executives in 2015” http://www.prnewswire.com/news-releases/cybersecurity-concerns-rise-as-a-risk-factor-for-board-members-and-senior-executives-in-2015-300032571.html SECURING YOUR FUTURE
  2. 2. COMPLIANCE—LIMITING RISKS #1 risk identified by Proclivity Survey respondents: 67% think regulatory changes and heightened regulatory scrutiny may affect the manner in which their products or services will be produced or delivered.1 “Compliance is about more than prevention. It’s also about navigating opportunities.”2 Are you confident you’re compliant? Are you certain of all of your compliance obligations? Top compliance issues of 2014: 28%35% 90% 1 Protivity, “Cybersecurity Concerns Rise as a Risk Factor for Board Members and Senior Executives in 2015” http://www.prnewswire.com/news-releases/cybersecurity-concerns-rise-as-a-risk-factor-for-board-members-and-senior-executives-in-2015-300032571.html 2 PWC, Regulatory and Compliance Reporting, http://www.pwc.com/gx/en/audit-services/regulatory-compliance/index.jhtml 3 Bureau Van Dijk, “Spread of regulatory action outside US 'the top compliance issue of 2014” http://www.bvdinfo.com/industrynews/compliance-and-due-diligence/spread-of-regulatory-action-outside-us-the-top-compliance-issue-of-2014-/801768161#sthash.XyASNoN0.dpuf 4 Michael Weiss, “Finance Executives Don’t Expect Regulatory Compliance Demands to Ease,” Robert Half Management Resources http://blog.roberthalfmr.com/finance-executives-do-not-expect-regulatory-compliance-demands-to-let-up MANAGING YOUR SECURE FUTURE spread of regulatory action outside of the US.3 anti-money laundering rules.3 Executives that expect their compliance costs to rise or stay the same over time.4
  3. 3. EMPLOYEES CAN MAKE OR BREAK SECURITY “Spend any time talking with IT security experts and you’re likely to hear a common refrain: employees are the weakest link in any organization’s defenses.” Daniel Humphries, “Survey: What Employ- ees (Don’t) Know about IT Security Policies,” Intelligent Defense 5 Do you have the talent you need? Do your employees know the risks and how to minimize them? “There is an IT security skills shortage that’s occurring right as the volume and sophistication of cyber and physical attacks continues to rise.”6 - Diane Ritchey, “Why the Security Talent Gap is the Next Big Crisis,” Security Magazine 5 Danial Humphries, “Survey: What Employees (Don’t) Know about IT Security Policies,” Intelligent Defensehttp://intelligent-defense.softwareadvice.com/what-employees-dont-know-security-policies-0714/ 6 Diane Ritchey, “Why the Security Talent Gap is the Next Big Crisis,” Security Magazinehttp://www.securitymagazine.com/articles/85451-why-the-security-talent-gap-is-the-next-big-crisis MANAGING YOUR SECURE FUTURE slightly less than 50% 26% only 43%were confident they remembered the contents of their company’s security policy.5 of respondents received training more than once to reinforce policy awareness.5 could remember seeing password security rules in their company’s security policy.5
  4. 4. PROTECTING CUSTOMER DATA But… “... [Home Depot] announced last week that more than 53 million customer email addresses in addition to payment card information had been compromised in a hack attack. The attack will cost Home Depot more than $62 million and is likely to cost much more…” Bianca Wright, Customer Experience Report7 How safe is your customer data? What attacks are you, and are you not armed against? up 25% from 20138 up 34% from 20139 Global information security budgets actually decreased four percent compared with 2013. Security spending as a percentage of IT budget has remained stalled at 4 percent or less for the past five years.9 7 Bianca Wright, Customer Experience Report. http://www.customerexperiencereport.com/nearshore/latest-home-depot-data-theft-shows-importance-protecting-customer-security/ 8 Lauren Abdel-Razzaq, Detroit News. http://www.detroitnews.com/story/business/retail/2014/11/23/retailers-focus-protecting-customers-data-breaches/19466287/ 9 “Cybersecurity Incidents More Frequent and Costly, but Budgets Decline says PwC, CIO and CSO Global State of Information Security® Survey 2015” http://press.pwc.com/Global/cybersecurity-incidents-more-frequent-and-costly-but-budgets-decline-says-pwc-cio-and-cso-global-sta/s/59769a8f-b9f7-43e1-8b54-2628b18ef586 MANAGING YOUR SECURE FUTURE

×