SlideShare uma empresa Scribd logo
1 de 31
Baixar para ler offline
2009 Security Mega Trends Survey

                                   Independently conducted by Ponemon Institute LLC
                                                   November 2008




Sponsored by :                                                                        Page 1

Ponemon Institute© Private & Confidential Document
About the study

         • The 2009 Security Mega Trends Survey was conducted by
           Ponemon Institute and sponsored by Lumension to better
           understand if certain publicized IT risks to personal and confidential
           data are or should be more or less of a concern for organizations.
         • We asked respondents in IT operations and IT security to consider
           how eight Security Mega Trends affect organizations today and
           during the next 12 to 24 months.
         • Based on interviews with IT experts in operations and information
           security, we selected the following eight Mega Trends for this study:
           cloud computing, virtualization, mobility and mobile devices, cyber
           crime, outsourcing to third parties, data breaches and the risk of
           identity theft, peer-to-peer file sharing and Web 2.0



Sponsored by :                                                                Page 2

Ponemon Institute© Private & Confidential Document
Security Mega Trends
         Mega Trend 1: Cloud computing
         • Cloud computing refers to distributed computing solutions owned by third-parties on
           data center locations outside the end-user company’s IT infrastructure. The demand
           for cloud computing is expanding quickly, especially as the cost of remote
           connectivity decreases.
         Mega Trend 2: Virtualization
         • Virtualization technology allows end-users to access multiple secure networks from a
           single computer, wherein the PC or laptop essentially acts as a hardware
           authentication token. With one computer, the end-user is able to gain access to
           separate virtual devices or machines. Virtualization makes server and operating
           system deployments more flexible and improves the use of storage and systems
           resources.
         Mega Trend 3: Mobility
         • Organizations are dependent upon a mobile workforce with access to information no
           matter where they work or travel. Employees can use the following mobile devices
           when they travel or work at home: laptops, VPNs, PDAs, cell phones and memory
           sticks. The opportunity to work from home or other locations is a benefit to many
           employees. In addition, mobility can increase employees’ productivity and as a result
           improve the organization’s bottom line.


Sponsored by :                                                                              Page 3

Ponemon Institute© Private & Confidential Document
Security Mega Trends

         Mega Trend 4: The external threat of organized cyber criminal syndicates
         • The black market for personal records makes data theft an attractive crime for thieves
           around the world. Cyber crime usually describes criminal activity in which the
           computer or network is an essential part of the illegal criminal activity. This term also
           is used to include traditional crimes in which computers or networks are used to
           enable the illicit activity.
         Mega Trend 5: Outsourcing to third parties
         • Organizations outsource sensitive and confidential customer and employee data to
           vendors and other third parties to reduce processing costs and improve operating
           efficiencies. These purposes can include (but are not limited to): marketing and sales
           campaigns, software application development, call center operations, and mortgage
           and other credit application processing.
         Mega Trend 6: Data breaches involving personal information are increasing
         • The Federal Trade Commission reports that the number one consumer complaint it
           receives concerns the theft of identity. It addition to potential fines, organizations risk
           the loss of customer confidence and trust. Some experts believe that identity theft
           crimes will increase substantially over the next several years.

Sponsored by :                                                                                   Page 4

Ponemon Institute© Private & Confidential Document
Security Mega Trends

         Mega Trend 7: Peer-to-peer file sharing
         • P2P file sharing networks allow a group of computers to connect with each other and
           directly access files from one another's hard drives. P2P file sharing networks started
           with Napster by enabling Internet users to share music files. P2P file-sharing
           networks can cause inadvertent transfers and disclosures of documents that reside
           on an organization’s computers and laptops. File sharing networks where inadvertent
           file sharing typically occurs include networks. For example, a sales representative
           downloads a peer-to-peer music sharing application onto his company assigned
           notebook computer. This P2P file sharing network exposes confidential business
           documents contained on his computer.
         Mega Trend 8: Web 2.0
         • Web 2.0 refers to a plethora of Internet tools that enhance information sharing and
           collaboration among users. These concepts have led to the evolution of web-based
           communities and hosted services, such as social networking sites, wikis and blogs.
           This term does not refer to an update to any technical. Unsupervised monitoring of
           employees’ use of Web 2.0 applications can result in the loss of critical confidential
           business data on the Internet. The other risk is that damaging information can be
           posted about an organization that can negatively affect its reputation.


Sponsored by :                                                                               Page 5

Ponemon Institute© Private & Confidential Document
Two Samples

      •      Our study utilized two separate sampling
             frames (panels) built from
             conference, association and professional
             certification lists.                          Sample
                                                           description        IT Operations   IT Security
      •      Web-based survey responses were
             captured on a secure extranet platform.       Total sampling
                                                           frames                   14,518        11,506
      •      We utilized two separate samples of U.S.
             participants:
                                                           Bounce-back               3,957         2,109
               – IT operations: 825 (5.7% response)
               – IT security: 577 (5.0% response)
                                                           Total returns               915           658
      •      Less than 1% rejection rate because of
             reliability failures.
                                                           Rejected surveys             90             81
      •      Respondents in both groups were asked
             to complete the same survey instrument.
                                                           Final sample                825           577
      •      Margin of error is ≤ 3% on all adjective or
             yes/no responses for both samples
                                                           Response rate              5.7%         5.0%

Sponsored by :                                                                                      Page 6

Ponemon Institute© Private & Confidential Document
The Survey
         Example: Cloud Computing
         Mega Trend 1: Cloud computing

         Cloud computing refers to distributed computing solutions owned by third-parties on data center
         locations outside the end-user company’s IT infrastructure. Consumers of cloud computing services
         purchase capacity on-demand and are not concerned with the underlying technologies used
         to increase computing capacity.

         The demand for cloud computing is expanding quickly, especially as the cost of remote connectivity
         decreases. The services that can be delivered from the cloud have expanded Web applications to
         include storage, raw computing capability, and access to any number of specialized applications or
         services.

         Q1a. How familiar are you with cloud computing?
            Very familiar
            Familiar
            Not familiar

         Q1b. Does your organization access cloud computing resources or applications?
            Yes
            No
            Unsure

Sponsored by :                                                                                           Page 7

Ponemon Institute© Private & Confidential Document
The Survey – Continued
         Example: Cloud Computing
         What are the security implications?

         Experts say the use of cloud computing increases information security risks because the end-user’s
         organization is unable to control the data management environment.
         •
         Q1c. Do you believe that cloud computing increases the information security risks within your
         company?

                Yes
                No (Go to Q2a)

         Q1d. If yes, what is the most significant security risk associated with cloud computing? Please check
         only one choice:

                Inability to assess or verify the security of data centers in the cloud
                Inability to protect sensitive or confidential information
                Inability to restrict or limit use of cloud computing resources or applications
                Third parties might be able to access private files without authorization
                Information may not be properly backed up
                Downtime as a result of cloud computing failure
                Other (please specify)

Sponsored by :                                                                                             Page 8

Ponemon Institute© Private & Confidential Document
The Survey – Continued
         Example: Cloud Computing
         Mega Trend 1: Cloud computing

         Q1e. If yes, please rate the security risk presented by cloud computing within
         your organization today.

                Very low
                Low
                Moderate
                High
                Very high

         Q1e. If yes, please rate the security risk presented by cloud computing in your
         organization within the next 12 to 24 months.

                Very low
                Low
                Moderate
                High
                Very high



Sponsored by :                                                                             Page 9

Ponemon Institute© Private & Confidential Document
Mega Trends
         Comparison of IT Operations and IT Security
         Samples – Current Outlook

                                                                        Line Graph 1a
                                                   Security mega trends as perceived today for both samples
                                       Each point reflects the percentage responses for very high or high security risks at presentt


            70%

            60%

            50%

            40%

            30%

            20%

            10%

              0%
                          Cloud       Virt ualization   M obility   M obile devices   Cyber crime   Outsourcing   Data breach   P2P file sharing   Web 2.0   M alware
                        computing


                                                                                 IT Operations             IT Security


Sponsored by :                                                                                                                                                  Page 10

Ponemon Institute© Private & Confidential Document
Mega Trends
         Comparison of IT Operations and IT Security
         Samples – Future Outlook

                                                                   Line Graph 1b
                                         Security mega trends as perceived 12 to 24 months for both samples
                                       Each point reflects the percentage responses for very high or high security risks at presentt


            90%
            80%
            70%
            60%
            50%
            40%
            30%
            20%
            10%
              0%
                          Cloud       Virt ualization   M obility   M obile devices   Cyber crime   Outsourcing   Data breach   P2P file sharing   Web 2.0   M alware
                        computing


                                                                                 IT Operations             IT Security


Sponsored by :                                                                                                                                                  Page 11

Ponemon Institute© Private & Confidential Document
IT Operations
         Mega trend risk rating today and 12 to 24
         months in the future
                                                                            Bar Chart 1a
                                          Mega trends today and in the next 12 to 24 months by respondents in IT operations
                                         Each bar summarizes the combined percentage response for quot;Very Highquot; and quot;Highquot; security risks.



                         Outsourcing                                                                                                    50%
                                                                                                                                        50%

                      Mobile devices                                                                                          45%
                                                                                                                                    48%

                         Cyber crime                                                                                                49%
                                                                                                                                 47%

                              Mobility                                                                                            47%
                                                                                                                                 47%

                         Data breach                                                                                40%
                                                                                                                           44%

                   Cloud computing                                                                                      42%
                                                                                                                  39%

                     P2P file sharing                                                                       36%
                                                                                                           35%

                              Web 2.0                                                                      35%
                                                                                                     31%

                         Virtualization                                      18%
                                                                                         25%

                              Malware                                                  24%
                                                                                    22%

                                          0%               10%               20%               30%                40%               50%       60%

                                                Risk as perceived today              Risk as perceived in the next 12 to 24 months



Sponsored by :                                                                                                                                      Page 12

Ponemon Institute© Private & Confidential Document
IT Security
         Mega trend risk rating today and 12 to 24
         months in the future
                                                                            Bar Chart 1b
                                           Mega trends today and in the next 12 to 24 months by respondents in IT security
                                         Each bar summarizes the combined percentage response for quot;Very Highquot; and quot;Highquot; security risks.



                         Data breach                                                                                       65%
                                                                                                                            66%

                         Cyber crime                                                                                                       77%
                                                                                                                           65%

                              Mobility                                                               48%
                                                                                                                    60%

                         Outsourcing                                                                               59%
                                                                                                                   59%

                   Cloud computing                                                                                   61%
                                                                                                                  58%

                      Mobile devices                                                                   50%
                                                                                                      48%

                     P2P file sharing                                                            44%
                                                                                                   46%

                              Web 2.0                                                        41%
                                                                                           39%

                              Malware                                                        41%
                                                                                           39%

                         Virtualization                                   25%
                                                                                29%

                                          0%         10%         20%         30%          40%        50%         60%         70%           80%   90%

                                                Risk as perceived today               Risk as perceived in the next 12 to 24 months



Sponsored by :                                                                                                                                         Page 13

Ponemon Institute© Private & Confidential Document
Mega Trend: Outsourcing
         Causes Data Breach
                                                                          Bar Chart 2
                                                              Security risks due to outsourcing
                                    Each bar is the percentage of respondents who selected the noted information security risk


                  Sensitive or confidential information may not be properly                                                         60%
                                          protected                                                                               56%

                Unauthorized parties might be able to access private files                                    32%
                                  without authorization                                               23%

                                                                                     4%
                  Increased threat of social engineering and cyber crimes
                                                                                          10%
                                                                                                            IT Operations    IT Security
                                                                                    2%
                                   Information may not be properly backed up
                                                                                     3%

                                                                                    1%
                Inability to properly identify and authenticate remote users
                                                                                     3%

                                                                               0%     10%       20%     30%      40%        50%    60%     70%




Sponsored by :                                                                                                                              Page 14

Ponemon Institute© Private & Confidential Document
Cyber Crime Experience

                                                                          Bar Chart 3
                                                           Did your organization have a cyber attack?



            100%                                     92%
             90%                                                                 IT Operations   IT Security
             80%

             70%

             60%                   55%

             50%

             40%                                                                                               32%
             30%

             20%                                                           13%
             10%                                                                       5%                                     3%
               0%
                                            Yes                                   No                             Don't know




Sponsored by :                                                                                                                     Page 15

Ponemon Institute© Private & Confidential Document
Mega Trend: Cyber Crime
         Will Increase
                                                                          Bar Chart 4
                                                              Security risks due to cyber crime
                                    Each bar is the percentage of respondents who selected the noted information security risk




                    Attack will cause business
                                                                                                      40%
                            interruption
                                                                                                                                 61%


                Attack will result in the loss of
                   sensitive or confidential
                                                                                        29%
                     business information
                                                                                  24%
                    including trade secrets
                                                                                                 IT Operations    IT Security

                 Attack will cause the loss of
                information about employees                                             29%
                 or customers, thus requiring
                                                                     14%
                    data breach notification


                                                     0%      10%           20%        30%          40%           50%        60%        70%



Sponsored by :                                                                                                                          Page 16

Ponemon Institute© Private & Confidential Document
Most Risky Mobile Devices

                                                                            Bar Chart 5
                                                                    Most risky mobile devices
                                      Each bar is the percentage of respondents who selected the device as their highest risk


                                                                                                           38%
                            Laptop computers
                                                                                                                          48%

                   PDAs and other handheld                                      18%
                          devices                                                19%

                                                                                       24%
                Insecure wireless networks
                                                                        14%                        IT Operations   IT Security

                                                                          15%
                          USB memory sticks
                                                                    11%


                                                          5%
                               Cellular phones
                                                               8%


                                                     0%        10%              20%          30%           40%            50%    60%



Sponsored by :                                                                                                                    Page 17

Ponemon Institute© Private & Confidential Document
Mega Trend: Mobile Workforce
         Increases Security Risk

                                                                         Bar Chart 6
                                                         Security risks due to a mobile workforce
                                    Each bar is the percentage of respondents who selected the noted information security risk




                                                                                                                                      62%
                 Inability to properly identify and authenticate remote users
                                                                                                                                    59%

                                                                                                 16%
                                    Information may not be properly backed up
                                                                                                   19%

                  Third parties might be able to access private files without                  11%
                                        authorization                                          10%

                   Sensitive or confidential information may not be properly         2%
                                           protected                                      6%
                                                                                                     IT Operations   IT Security
                                                                                           9%
                   Increased threat of social engineering and cyber crimes
                                                                                     3%


                                                                                0%        10%    20%       30%       40%   50%     60%   70%



Sponsored by :                                                                                                                              Page 18

Ponemon Institute© Private & Confidential Document
Confidence in the Ability to
         Prevent Data Loss

                                                                  Bar Chart 7
                                  How confident are you that your current security practices are able to prevent
                                            customer and employee data from being lost or stolen?

            45%
                                                                        40%
            40%
            35%                                                                                          32%
                                                                                  30%
            30%
            25%                                      23%                                                                 22%
            20%
            15%           12%                               12%                                  12%             13%

            10%
                                     4%
             5%
             0%
                          Very confident              Confident     Somew hat confident          Not confident     Uncertain

                                                                  IT Operations    IT Security




Sponsored by :                                                                                                                 Page 19

Ponemon Institute© Private & Confidential Document
Mega Trend: Data Breach
         on the Rise
                                                                         Bar Chart 8
                                                            Security risks due to a data breach
                                      Each bar is the percentage of respondents w ho selected the noted information security risk




         Loss of customer or employee information, thus requiring notification                                                32%
                                    of victims                                                                                      35%


              Sensitive or confidential information that ends up in the hands of                                                                 46%
                             cyber criminals and identity thieves                                                   24%


                                                                                                      14%
                  Diminished reputation as a result of negative media coverage
                                                                                                                 21%
                                                                                                            IT Operations    IT Security

                                                                                          5%
                           Unauthorized parties gain access to private accounts
                                                                                                           17%


                                                                                   0%   5%     10%   15%    20%   25% 30%      35%     40% 45%    50%



Sponsored by :                                                                                                                                   Page 20

Ponemon Institute© Private & Confidential Document
Security Risks Due to Data
         Breach
                                                                                    Bar Chart 9
                                                                       Security risks due to a data breach
                                        Each bar is the percentage of respondents who selected the noted information security risk


                            Inability to restrict or limit use of cloud computing resources or                      17%
                                                           applications                                                              29%

                                                                                                                                                    40%
                      Inability to assess or verify the security of data centers in the cloud
                                                                                                                            24%

                                 Third parties might be able to access private files w ithout                 13%
                                                        authorization                                                18%

                                                                                                   1%
                                           Dow ntime as a result of cloud computing failure
                                                                                                              13%

                                                                                                                                     29%
                                     Inability to protect sensitive or confidential information
                                                                                                             12%

                                                                                                  0%                 IT Operations    IT Security
                                                Information may not be properly backed up
                                                                                                       3%


                                                                                              0%       5% 10% 15% 20% 25% 30% 35% 40% 45%


Sponsored by :                                                                                                                                            Page 21

Ponemon Institute© Private & Confidential Document
Mega Trend: P2P File Sharing
         Causes Security Risk
                                                                                  Bar Chart 10
                                                               Security risks due to P2P file sharing applications
                                            Each bar is the percentage of respondents who selected the noted information security risk



                        Use of P2P w ill result in the loss
                                                                                                                                          55%
                          of sensitive or confidential
                         business information including
                                                                                                                       41%
                                 trade secrets



                                                                                       20%
                        Use of P2P w ill increase the risk
                         of malw are or virus infection
                                                                                                      30%


                       Use of P2P w ill cause the loss of
                                                                                 16%
                        information about employees or
                         customers, thus requiring data
                                                                                       20%
                              breach notification


                                                                                                     IT Operations    IT Security
                                                                3%
                        Use of P2P w ill cause business
                                 interruption
                                                               2%


                                                          0%           10%           20%            30%            40%              50%         60%


Sponsored by :                                                                                                                                        Page 22

Ponemon Institute© Private & Confidential Document
Mega Trend: Web 2.0 Use
         Increases Security Risk
                                                                              Bar Chart 11
                                                                      Security risks due to Web 2.0
                                          Each bar is the percentage of respondents who selected the noted information security risk




                            Use of Web 2.0 will result in the loss of sensitive or                                                            64%
                         confidential business information including trade secrets                                      34%



                           Use of Web 2.0 will cause the loss of information about                13%
                            employees or customers, thus requiring data breach
                                                 notification                                                 26%



                                                                                                   14%
                          Use of Web 2.0 will increase the risk of malware or virus
                                                  infection                                                23%


                                                                                                        IT Operations     IT Security
                                                                                           4%
                                   Use of Web 2.0 will cause business interruption
                                                                                                  12%


                                                                                      0%    10%     20%       30%        40%      50%   60%    70%


Sponsored by :                                                                                                                                       Page 23

Ponemon Institute© Private & Confidential Document
Mega Trend: Virtualization

                                                                           Bar Chart 12
                                                               Security risks due to virtualization
                                    Each bar is the percentage of respondents who selected the noted information security risk


                     Inability to properly identify
                                                                                                                             48%
                      and authenticate users to
                                                                                                                              49%
                         multiple systems
                 Third parties might be able to
                                                                                                      33%
                  access private files without
                                                                                             28%
                         authorization

                  Increased threat of social                         11%
                engineering and cyber crimes                       10%

                        Sensitive or confidential
                                                          3%
                        information may not be
                                                                  9%                          IT Operations    IT Security
                           properly protected

                         Information may not be       0%
                           properly backed up          1%


                                                     0%          10%           20%           30%              40%            50%    60%


Sponsored by :                                                                                                                       Page 24

Ponemon Institute© Private & Confidential Document
Implications

         •      Organizations are faced with a plethora of security threats to their confidential and
                sensitive data assets. We asked IT operations and security practitioners to rank those
                they believe have a high or very high risk to sensitive and confidential information.
                Based on the risks associated with each of these threats, we believe organizations
                should consider the following solutions:
                  – Create and enforce policies that ensure access to private data files is restricted
                    to authorized parties only.
                  – Secure corporate endpoints to protect against data leakage and malware.
                  – Make sure third parties who have access to your sensitive and confidential
                    information take appropriate security precautions.
                  – Train employees and contractors to understand their responsibility in the
                    protection of data assets.
                  – Ensure that mobile devices are encrypted and that employees understand the
                    organizations’ policies with respect to downloading sensitive information and
                    working remotely.
                  – Understand precautions that should be taken when traveling with laptops, PDAs
                    and other data bearing devices.


Sponsored by :                                                                                  Page 25

Ponemon Institute© Private & Confidential Document
Conclusion


         • We believe the findings from this study provide organizations with
           guidance on which threats are more critical than others to address.
           IT operations and IT security professionals identified outsourcing of
           sensitive information to third parties, external threat of organized
           cyber criminal syndicates, a mobile workforce, data breaches and
           access to cloud computing as the most significant




Sponsored by :                                                               Page 26

Ponemon Institute© Private & Confidential Document
Samples’ Organizational Characteristics




Sponsored by :                                          Page 27

Ponemon Institute© Private & Confidential Document
Samples’ Combined
         Industry Distribution
                                                               Pie Chart 1
                              Industry distribution of the combined IT operations and IT security samples
                                                                      2%1%
                                                               2%2%                                    Financial services
                                                          3%                  17%                      Government
                                                     5%                                                Pharma & Healthcare
                                                                                                       Education
                                               5%                                                      Defense
                                                                                                       Technology & Software
                                                                                                       Hospitality & Leisure
                                            6%                                             11%
                                                                                                       Retail
                                                                                                       Professional Services
                                                                                                       Telecom
                                              6%                                                       Manufacturing
                                                                                                       Research
                                                                                      9%
                                                                                                       Energy
                                                     6%
                                                                                                       Airlines

                                                           6%                8%                        Entertainment
                                                                        6%                             Transportation


Sponsored by :                                                                                                                 Page 28

Ponemon Institute© Private & Confidential Document
Sample Characteristics
         The mean experience level for the IT operations sample
         is 8.9 years and for the IT security sample is 9.4 years.



         Table 2
         What organizational level of respondents                    IT Operations   IT Security

         Senior Executive                                                      1%            0%

         Vice President                                                        2%            2%

         Director                                                            21%            24%

         Manager                                                             24%            26%

         Associate/Staff/Technician                                          45%            39%

         Consultant                                                            4%            6%

         Other                                                                 2%            3%

         Total                                                              100%           100%
Sponsored by :                                                                             Page 29

Ponemon Institute© Private & Confidential Document
Sample Characteristics
         60% of respondents are male and 40% female.




           Table 3a                                         Table 3b.
           Geographic location                       Pct%   Organizational headcount   Pct%.
           Northeast                                  20%   Less than 500 people         2%
           Mid-Atlantic                               19%   500 to 1,000 people          4%
           Midwest                                    19%   1,001 to 5,000 people       12%
           Southeast                                  13%   5,001 to 25,000 people      29%
           Southwest                                  14%   25,001 to 75,000 people     34%
           Pacific                                    17%   More than 75,000 people     19%
           Total                                     100%   Total                      100%




Sponsored by :                                                                            Page 30

Ponemon Institute© Private & Confidential Document
Ponemon Institute                               LLC



                      The Institute is dedicated to advancing responsible information management
                      practices that positively affect privacy and data protection in business and
                      government.
                      The Institute conducts independent research, educates leaders from the private
                      and public sectors and verifies the privacy and data protection practices of
                      organizations.
                      Ponemon Institute is a full member of CASRO (Council of American Survey
                      Research Organizations. Dr. Ponemon serves as CASRO’s chairman of
                      Government & Public Affairs Committee of the Board.
                      The Institute has assembled more than 50 leading multinational corporations
                      called the RIM Council, which focuses the development and execution of ethical
                      principles for the collection and use of personal data about people and
                      households.
                      The majority of active participants are privacy or information security leaders.


Sponsored by :                                                                                           Page 31

Ponemon Institute© Private & Confidential Document

Mais conteúdo relacionado

Mais procurados

Network Environments
Network EnvironmentsNetwork Environments
Network EnvironmentsGFI Software
 
Is your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersIs your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersFindWhitePapers
 
The Economic Impact of File Virtualization
The Economic Impact of File VirtualizationThe Economic Impact of File Virtualization
The Economic Impact of File VirtualizationFindWhitePapers
 
Cloud Computing White Paper
Cloud Computing White PaperCloud Computing White Paper
Cloud Computing White PaperChris O'Neal
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
The state of privacy and data security compliance
The state of privacy and data security complianceThe state of privacy and data security compliance
The state of privacy and data security complianceFindWhitePapers
 
IT Security for Oil and Gas Companies
IT Security for Oil and Gas CompaniesIT Security for Oil and Gas Companies
IT Security for Oil and Gas CompaniesRichard Cole
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...Andris Soroka
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploitsecarrow
 
The impact of a security breach on MSP's and their clients
The impact of a security breach on MSP's and their clientsThe impact of a security breach on MSP's and their clients
The impact of a security breach on MSP's and their clientsJose Lopez
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?Windstream Enterprise
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseAirTight Networks
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromiseCMR WORLD TECH
 
Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_psNet motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_psAccenture
 

Mais procurados (20)

Network Environments
Network EnvironmentsNetwork Environments
Network Environments
 
Is your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersIs your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computers
 
The Economic Impact of File Virtualization
The Economic Impact of File VirtualizationThe Economic Impact of File Virtualization
The Economic Impact of File Virtualization
 
Cloud Computing White Paper
Cloud Computing White PaperCloud Computing White Paper
Cloud Computing White Paper
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
The state of privacy and data security compliance
The state of privacy and data security complianceThe state of privacy and data security compliance
The state of privacy and data security compliance
 
IT Security for Oil and Gas Companies
IT Security for Oil and Gas CompaniesIT Security for Oil and Gas Companies
IT Security for Oil and Gas Companies
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploits
 
The impact of a security breach on MSP's and their clients
The impact of a security breach on MSP's and their clientsThe impact of a security breach on MSP's and their clients
The impact of a security breach on MSP's and their clients
 
White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?White Paper: Is Your Network Safe Behind Just a Firewall?
White Paper: Is Your Network Safe Behind Just a Firewall?
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your Enterprise
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromise
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_psNet motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
 

Destaque (20)

Security MEGA PRojects
Security MEGA PRojectsSecurity MEGA PRojects
Security MEGA PRojects
 
Mega Events- מכון היצוא
Mega Events- מכון היצוא Mega Events- מכון היצוא
Mega Events- מכון היצוא
 
Event management
Event managementEvent management
Event management
 
Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...
Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...
Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...
 
Jupiter physical security ppt 2016 1
Jupiter physical security ppt 2016 1Jupiter physical security ppt 2016 1
Jupiter physical security ppt 2016 1
 
מצגת ערים חכמות
מצגת ערים חכמות מצגת ערים חכמות
מצגת ערים חכמות
 
T20 World Cup 2012 Android Apps
T20 World Cup 2012 Android AppsT20 World Cup 2012 Android Apps
T20 World Cup 2012 Android Apps
 
Mega event managemnt
Mega event managemntMega event managemnt
Mega event managemnt
 
Wcdma physical layer
Wcdma physical layerWcdma physical layer
Wcdma physical layer
 
Safe City 1.0
Safe City 1.0Safe City 1.0
Safe City 1.0
 
OSI Physical Layer
OSI Physical LayerOSI Physical Layer
OSI Physical Layer
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
 
Lecture3 Physical Layer
Lecture3 Physical LayerLecture3 Physical Layer
Lecture3 Physical Layer
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Hotel security
Hotel securityHotel security
Hotel security
 
The Case of SAFE and Smart cities
The Case of SAFE and Smart cities The Case of SAFE and Smart cities
The Case of SAFE and Smart cities
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
Event infrastructure
Event infrastructure Event infrastructure
Event infrastructure
 

Semelhante a 2009 Security Mega Trends & Emerging Threats

Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formattedMatthew Moldvan
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricMark Underwood
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)Ahmed Banafa
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfDataSpace Academy
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Cloud Security Survey Peer Research Summary
Cloud Security Survey Peer Research SummaryCloud Security Survey Peer Research Summary
Cloud Security Survey Peer Research SummaryIntel IT Center
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Troy Marshall
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the MassesIRJET Journal
 
“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information securityAhmed Banafa
 

Semelhante a 2009 Security Mega Trends & Emerging Threats (20)

Level3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation SnapshotLevel3-ATC comSpark.tech Presentation Snapshot
Level3-ATC comSpark.tech Presentation Snapshot
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
BEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICESBEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICES
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Cloud Security Survey Peer Research Summary
Cloud Security Survey Peer Research SummaryCloud Security Survey Peer Research Summary
Cloud Security Survey Peer Research Summary
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security
 

Mais de Lumension

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsLumension
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers GuideLumension
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationLumension
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary ResultsLumension
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Lumension
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Lumension
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftLumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and AnalysisLumension
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskLumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateLumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskLumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security SolutionsLumension
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesLumension
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksLumension
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT RiskLumension
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...Lumension
 

Mais de Lumension (20)

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 

Último

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Último (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

2009 Security Mega Trends & Emerging Threats

  • 1. 2009 Security Mega Trends Survey Independently conducted by Ponemon Institute LLC November 2008 Sponsored by : Page 1 Ponemon Institute© Private & Confidential Document
  • 2. About the study • The 2009 Security Mega Trends Survey was conducted by Ponemon Institute and sponsored by Lumension to better understand if certain publicized IT risks to personal and confidential data are or should be more or less of a concern for organizations. • We asked respondents in IT operations and IT security to consider how eight Security Mega Trends affect organizations today and during the next 12 to 24 months. • Based on interviews with IT experts in operations and information security, we selected the following eight Mega Trends for this study: cloud computing, virtualization, mobility and mobile devices, cyber crime, outsourcing to third parties, data breaches and the risk of identity theft, peer-to-peer file sharing and Web 2.0 Sponsored by : Page 2 Ponemon Institute© Private & Confidential Document
  • 3. Security Mega Trends Mega Trend 1: Cloud computing • Cloud computing refers to distributed computing solutions owned by third-parties on data center locations outside the end-user company’s IT infrastructure. The demand for cloud computing is expanding quickly, especially as the cost of remote connectivity decreases. Mega Trend 2: Virtualization • Virtualization technology allows end-users to access multiple secure networks from a single computer, wherein the PC or laptop essentially acts as a hardware authentication token. With one computer, the end-user is able to gain access to separate virtual devices or machines. Virtualization makes server and operating system deployments more flexible and improves the use of storage and systems resources. Mega Trend 3: Mobility • Organizations are dependent upon a mobile workforce with access to information no matter where they work or travel. Employees can use the following mobile devices when they travel or work at home: laptops, VPNs, PDAs, cell phones and memory sticks. The opportunity to work from home or other locations is a benefit to many employees. In addition, mobility can increase employees’ productivity and as a result improve the organization’s bottom line. Sponsored by : Page 3 Ponemon Institute© Private & Confidential Document
  • 4. Security Mega Trends Mega Trend 4: The external threat of organized cyber criminal syndicates • The black market for personal records makes data theft an attractive crime for thieves around the world. Cyber crime usually describes criminal activity in which the computer or network is an essential part of the illegal criminal activity. This term also is used to include traditional crimes in which computers or networks are used to enable the illicit activity. Mega Trend 5: Outsourcing to third parties • Organizations outsource sensitive and confidential customer and employee data to vendors and other third parties to reduce processing costs and improve operating efficiencies. These purposes can include (but are not limited to): marketing and sales campaigns, software application development, call center operations, and mortgage and other credit application processing. Mega Trend 6: Data breaches involving personal information are increasing • The Federal Trade Commission reports that the number one consumer complaint it receives concerns the theft of identity. It addition to potential fines, organizations risk the loss of customer confidence and trust. Some experts believe that identity theft crimes will increase substantially over the next several years. Sponsored by : Page 4 Ponemon Institute© Private & Confidential Document
  • 5. Security Mega Trends Mega Trend 7: Peer-to-peer file sharing • P2P file sharing networks allow a group of computers to connect with each other and directly access files from one another's hard drives. P2P file sharing networks started with Napster by enabling Internet users to share music files. P2P file-sharing networks can cause inadvertent transfers and disclosures of documents that reside on an organization’s computers and laptops. File sharing networks where inadvertent file sharing typically occurs include networks. For example, a sales representative downloads a peer-to-peer music sharing application onto his company assigned notebook computer. This P2P file sharing network exposes confidential business documents contained on his computer. Mega Trend 8: Web 2.0 • Web 2.0 refers to a plethora of Internet tools that enhance information sharing and collaboration among users. These concepts have led to the evolution of web-based communities and hosted services, such as social networking sites, wikis and blogs. This term does not refer to an update to any technical. Unsupervised monitoring of employees’ use of Web 2.0 applications can result in the loss of critical confidential business data on the Internet. The other risk is that damaging information can be posted about an organization that can negatively affect its reputation. Sponsored by : Page 5 Ponemon Institute© Private & Confidential Document
  • 6. Two Samples • Our study utilized two separate sampling frames (panels) built from conference, association and professional certification lists. Sample description IT Operations IT Security • Web-based survey responses were captured on a secure extranet platform. Total sampling frames 14,518 11,506 • We utilized two separate samples of U.S. participants: Bounce-back 3,957 2,109 – IT operations: 825 (5.7% response) – IT security: 577 (5.0% response) Total returns 915 658 • Less than 1% rejection rate because of reliability failures. Rejected surveys 90 81 • Respondents in both groups were asked to complete the same survey instrument. Final sample 825 577 • Margin of error is ≤ 3% on all adjective or yes/no responses for both samples Response rate 5.7% 5.0% Sponsored by : Page 6 Ponemon Institute© Private & Confidential Document
  • 7. The Survey Example: Cloud Computing Mega Trend 1: Cloud computing Cloud computing refers to distributed computing solutions owned by third-parties on data center locations outside the end-user company’s IT infrastructure. Consumers of cloud computing services purchase capacity on-demand and are not concerned with the underlying technologies used to increase computing capacity. The demand for cloud computing is expanding quickly, especially as the cost of remote connectivity decreases. The services that can be delivered from the cloud have expanded Web applications to include storage, raw computing capability, and access to any number of specialized applications or services. Q1a. How familiar are you with cloud computing? Very familiar Familiar Not familiar Q1b. Does your organization access cloud computing resources or applications? Yes No Unsure Sponsored by : Page 7 Ponemon Institute© Private & Confidential Document
  • 8. The Survey – Continued Example: Cloud Computing What are the security implications? Experts say the use of cloud computing increases information security risks because the end-user’s organization is unable to control the data management environment. • Q1c. Do you believe that cloud computing increases the information security risks within your company? Yes No (Go to Q2a) Q1d. If yes, what is the most significant security risk associated with cloud computing? Please check only one choice: Inability to assess or verify the security of data centers in the cloud Inability to protect sensitive or confidential information Inability to restrict or limit use of cloud computing resources or applications Third parties might be able to access private files without authorization Information may not be properly backed up Downtime as a result of cloud computing failure Other (please specify) Sponsored by : Page 8 Ponemon Institute© Private & Confidential Document
  • 9. The Survey – Continued Example: Cloud Computing Mega Trend 1: Cloud computing Q1e. If yes, please rate the security risk presented by cloud computing within your organization today. Very low Low Moderate High Very high Q1e. If yes, please rate the security risk presented by cloud computing in your organization within the next 12 to 24 months. Very low Low Moderate High Very high Sponsored by : Page 9 Ponemon Institute© Private & Confidential Document
  • 10. Mega Trends Comparison of IT Operations and IT Security Samples – Current Outlook Line Graph 1a Security mega trends as perceived today for both samples Each point reflects the percentage responses for very high or high security risks at presentt 70% 60% 50% 40% 30% 20% 10% 0% Cloud Virt ualization M obility M obile devices Cyber crime Outsourcing Data breach P2P file sharing Web 2.0 M alware computing IT Operations IT Security Sponsored by : Page 10 Ponemon Institute© Private & Confidential Document
  • 11. Mega Trends Comparison of IT Operations and IT Security Samples – Future Outlook Line Graph 1b Security mega trends as perceived 12 to 24 months for both samples Each point reflects the percentage responses for very high or high security risks at presentt 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Cloud Virt ualization M obility M obile devices Cyber crime Outsourcing Data breach P2P file sharing Web 2.0 M alware computing IT Operations IT Security Sponsored by : Page 11 Ponemon Institute© Private & Confidential Document
  • 12. IT Operations Mega trend risk rating today and 12 to 24 months in the future Bar Chart 1a Mega trends today and in the next 12 to 24 months by respondents in IT operations Each bar summarizes the combined percentage response for quot;Very Highquot; and quot;Highquot; security risks. Outsourcing 50% 50% Mobile devices 45% 48% Cyber crime 49% 47% Mobility 47% 47% Data breach 40% 44% Cloud computing 42% 39% P2P file sharing 36% 35% Web 2.0 35% 31% Virtualization 18% 25% Malware 24% 22% 0% 10% 20% 30% 40% 50% 60% Risk as perceived today Risk as perceived in the next 12 to 24 months Sponsored by : Page 12 Ponemon Institute© Private & Confidential Document
  • 13. IT Security Mega trend risk rating today and 12 to 24 months in the future Bar Chart 1b Mega trends today and in the next 12 to 24 months by respondents in IT security Each bar summarizes the combined percentage response for quot;Very Highquot; and quot;Highquot; security risks. Data breach 65% 66% Cyber crime 77% 65% Mobility 48% 60% Outsourcing 59% 59% Cloud computing 61% 58% Mobile devices 50% 48% P2P file sharing 44% 46% Web 2.0 41% 39% Malware 41% 39% Virtualization 25% 29% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Risk as perceived today Risk as perceived in the next 12 to 24 months Sponsored by : Page 13 Ponemon Institute© Private & Confidential Document
  • 14. Mega Trend: Outsourcing Causes Data Breach Bar Chart 2 Security risks due to outsourcing Each bar is the percentage of respondents who selected the noted information security risk Sensitive or confidential information may not be properly 60% protected 56% Unauthorized parties might be able to access private files 32% without authorization 23% 4% Increased threat of social engineering and cyber crimes 10% IT Operations IT Security 2% Information may not be properly backed up 3% 1% Inability to properly identify and authenticate remote users 3% 0% 10% 20% 30% 40% 50% 60% 70% Sponsored by : Page 14 Ponemon Institute© Private & Confidential Document
  • 15. Cyber Crime Experience Bar Chart 3 Did your organization have a cyber attack? 100% 92% 90% IT Operations IT Security 80% 70% 60% 55% 50% 40% 32% 30% 20% 13% 10% 5% 3% 0% Yes No Don't know Sponsored by : Page 15 Ponemon Institute© Private & Confidential Document
  • 16. Mega Trend: Cyber Crime Will Increase Bar Chart 4 Security risks due to cyber crime Each bar is the percentage of respondents who selected the noted information security risk Attack will cause business 40% interruption 61% Attack will result in the loss of sensitive or confidential 29% business information 24% including trade secrets IT Operations IT Security Attack will cause the loss of information about employees 29% or customers, thus requiring 14% data breach notification 0% 10% 20% 30% 40% 50% 60% 70% Sponsored by : Page 16 Ponemon Institute© Private & Confidential Document
  • 17. Most Risky Mobile Devices Bar Chart 5 Most risky mobile devices Each bar is the percentage of respondents who selected the device as their highest risk 38% Laptop computers 48% PDAs and other handheld 18% devices 19% 24% Insecure wireless networks 14% IT Operations IT Security 15% USB memory sticks 11% 5% Cellular phones 8% 0% 10% 20% 30% 40% 50% 60% Sponsored by : Page 17 Ponemon Institute© Private & Confidential Document
  • 18. Mega Trend: Mobile Workforce Increases Security Risk Bar Chart 6 Security risks due to a mobile workforce Each bar is the percentage of respondents who selected the noted information security risk 62% Inability to properly identify and authenticate remote users 59% 16% Information may not be properly backed up 19% Third parties might be able to access private files without 11% authorization 10% Sensitive or confidential information may not be properly 2% protected 6% IT Operations IT Security 9% Increased threat of social engineering and cyber crimes 3% 0% 10% 20% 30% 40% 50% 60% 70% Sponsored by : Page 18 Ponemon Institute© Private & Confidential Document
  • 19. Confidence in the Ability to Prevent Data Loss Bar Chart 7 How confident are you that your current security practices are able to prevent customer and employee data from being lost or stolen? 45% 40% 40% 35% 32% 30% 30% 25% 23% 22% 20% 15% 12% 12% 12% 13% 10% 4% 5% 0% Very confident Confident Somew hat confident Not confident Uncertain IT Operations IT Security Sponsored by : Page 19 Ponemon Institute© Private & Confidential Document
  • 20. Mega Trend: Data Breach on the Rise Bar Chart 8 Security risks due to a data breach Each bar is the percentage of respondents w ho selected the noted information security risk Loss of customer or employee information, thus requiring notification 32% of victims 35% Sensitive or confidential information that ends up in the hands of 46% cyber criminals and identity thieves 24% 14% Diminished reputation as a result of negative media coverage 21% IT Operations IT Security 5% Unauthorized parties gain access to private accounts 17% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% Sponsored by : Page 20 Ponemon Institute© Private & Confidential Document
  • 21. Security Risks Due to Data Breach Bar Chart 9 Security risks due to a data breach Each bar is the percentage of respondents who selected the noted information security risk Inability to restrict or limit use of cloud computing resources or 17% applications 29% 40% Inability to assess or verify the security of data centers in the cloud 24% Third parties might be able to access private files w ithout 13% authorization 18% 1% Dow ntime as a result of cloud computing failure 13% 29% Inability to protect sensitive or confidential information 12% 0% IT Operations IT Security Information may not be properly backed up 3% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Sponsored by : Page 21 Ponemon Institute© Private & Confidential Document
  • 22. Mega Trend: P2P File Sharing Causes Security Risk Bar Chart 10 Security risks due to P2P file sharing applications Each bar is the percentage of respondents who selected the noted information security risk Use of P2P w ill result in the loss 55% of sensitive or confidential business information including 41% trade secrets 20% Use of P2P w ill increase the risk of malw are or virus infection 30% Use of P2P w ill cause the loss of 16% information about employees or customers, thus requiring data 20% breach notification IT Operations IT Security 3% Use of P2P w ill cause business interruption 2% 0% 10% 20% 30% 40% 50% 60% Sponsored by : Page 22 Ponemon Institute© Private & Confidential Document
  • 23. Mega Trend: Web 2.0 Use Increases Security Risk Bar Chart 11 Security risks due to Web 2.0 Each bar is the percentage of respondents who selected the noted information security risk Use of Web 2.0 will result in the loss of sensitive or 64% confidential business information including trade secrets 34% Use of Web 2.0 will cause the loss of information about 13% employees or customers, thus requiring data breach notification 26% 14% Use of Web 2.0 will increase the risk of malware or virus infection 23% IT Operations IT Security 4% Use of Web 2.0 will cause business interruption 12% 0% 10% 20% 30% 40% 50% 60% 70% Sponsored by : Page 23 Ponemon Institute© Private & Confidential Document
  • 24. Mega Trend: Virtualization Bar Chart 12 Security risks due to virtualization Each bar is the percentage of respondents who selected the noted information security risk Inability to properly identify 48% and authenticate users to 49% multiple systems Third parties might be able to 33% access private files without 28% authorization Increased threat of social 11% engineering and cyber crimes 10% Sensitive or confidential 3% information may not be 9% IT Operations IT Security properly protected Information may not be 0% properly backed up 1% 0% 10% 20% 30% 40% 50% 60% Sponsored by : Page 24 Ponemon Institute© Private & Confidential Document
  • 25. Implications • Organizations are faced with a plethora of security threats to their confidential and sensitive data assets. We asked IT operations and security practitioners to rank those they believe have a high or very high risk to sensitive and confidential information. Based on the risks associated with each of these threats, we believe organizations should consider the following solutions: – Create and enforce policies that ensure access to private data files is restricted to authorized parties only. – Secure corporate endpoints to protect against data leakage and malware. – Make sure third parties who have access to your sensitive and confidential information take appropriate security precautions. – Train employees and contractors to understand their responsibility in the protection of data assets. – Ensure that mobile devices are encrypted and that employees understand the organizations’ policies with respect to downloading sensitive information and working remotely. – Understand precautions that should be taken when traveling with laptops, PDAs and other data bearing devices. Sponsored by : Page 25 Ponemon Institute© Private & Confidential Document
  • 26. Conclusion • We believe the findings from this study provide organizations with guidance on which threats are more critical than others to address. IT operations and IT security professionals identified outsourcing of sensitive information to third parties, external threat of organized cyber criminal syndicates, a mobile workforce, data breaches and access to cloud computing as the most significant Sponsored by : Page 26 Ponemon Institute© Private & Confidential Document
  • 27. Samples’ Organizational Characteristics Sponsored by : Page 27 Ponemon Institute© Private & Confidential Document
  • 28. Samples’ Combined Industry Distribution Pie Chart 1 Industry distribution of the combined IT operations and IT security samples 2%1% 2%2% Financial services 3% 17% Government 5% Pharma & Healthcare Education 5% Defense Technology & Software Hospitality & Leisure 6% 11% Retail Professional Services Telecom 6% Manufacturing Research 9% Energy 6% Airlines 6% 8% Entertainment 6% Transportation Sponsored by : Page 28 Ponemon Institute© Private & Confidential Document
  • 29. Sample Characteristics The mean experience level for the IT operations sample is 8.9 years and for the IT security sample is 9.4 years. Table 2 What organizational level of respondents IT Operations IT Security Senior Executive 1% 0% Vice President 2% 2% Director 21% 24% Manager 24% 26% Associate/Staff/Technician 45% 39% Consultant 4% 6% Other 2% 3% Total 100% 100% Sponsored by : Page 29 Ponemon Institute© Private & Confidential Document
  • 30. Sample Characteristics 60% of respondents are male and 40% female. Table 3a Table 3b. Geographic location Pct% Organizational headcount Pct%. Northeast 20% Less than 500 people 2% Mid-Atlantic 19% 500 to 1,000 people 4% Midwest 19% 1,001 to 5,000 people 12% Southeast 13% 5,001 to 25,000 people 29% Southwest 14% 25,001 to 75,000 people 34% Pacific 17% More than 75,000 people 19% Total 100% Total 100% Sponsored by : Page 30 Ponemon Institute© Private & Confidential Document
  • 31. Ponemon Institute LLC The Institute is dedicated to advancing responsible information management practices that positively affect privacy and data protection in business and government. The Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations. Ponemon Institute is a full member of CASRO (Council of American Survey Research Organizations. Dr. Ponemon serves as CASRO’s chairman of Government & Public Affairs Committee of the Board. The Institute has assembled more than 50 leading multinational corporations called the RIM Council, which focuses the development and execution of ethical principles for the collection and use of personal data about people and households. The majority of active participants are privacy or information security leaders. Sponsored by : Page 31 Ponemon Institute© Private & Confidential Document