SlideShare uma empresa Scribd logo
1 de 25
Baixar para ler offline
Is Your Company Ready for a Big Data Breach? 
The Second Annual Study on Data Breach Preparedness 
Sponsored by Experian® Data Breach Resolution 
Independently conducted by Ponemon Institute LLC 
Publication Date: September 2014 
Ponemon Institute© Research Report
Is Your Company Ready for a Big Data Breach? 
The Second Annual Study on Data Breach Preparedness 
Ponemon Institute, September 2014 
Part 1. Introduction 
With data breaches making headlines the world over, awareness about the importance of having 
technologies and governance practices in place to respond to such incidents should be at an all-time 
high. In this study sponsored by Experian® Data Breach Resolution, we surveyed 567 
executives in the United States about how prepared they think their companies are to respond to 
a data breach. 
In 2013 a similar study was conducted.1 A comparison of those findings to this research reveals 
that companies are making some positive changes. However, many companies are deficient in 
governance and security practices that could strengthen their data breach preparedness. These 
include: keeping the data breach response plan up-to-date, conducting risk assessments of areas 
vulnerable to a breach, continuous monitoring of information systems to detect unusual and 
anomalous traffic and investing in technologies that enable timely detections of a security breach. 
In addition to helping a company prepare for a breach, the existence of a plan can reduce the 
overall cost of an incident. The 2014 Cost of Data Breach Study: United States reported that the 
average cost for each lost or stolen record was $2012. However, if a company has a formal 
incident response plan in place prior to the incident, the average cost of a data breach was 
reduced as much as $17 per record. Appointing a CISO to lead the data breach incident 
response team reduced the cost per lost or stolen record by $10. 
Following is a comparison of findings from the two annual studies: 
§ More companies have data breach response plans and teams in place. In 2013, 61 
percent of companies had such a plan in place. This increased to 73 percent in this year’s 
study. More companies have teams to lead data breach response efforts. In the 2013 study, 
67 percent of respondents said they had a data breach response team. This increased to 72 
percent. 
§ Data breaches have increased in frequency. In 2013, 33 percent of respondents said their 
company had a data breach. This year, the percentage has increased to 43 percent. Sixty 
percent say their company experienced more than one data breach in the past two years. 
This increased from 52 percent of respondents in 2013. 
§ Most companies have privacy and data protection awareness programs. Ponemon 
Institute research has revealed that mistakes made by employees are a frequent cause of 
data breach. While we believe all companies should have such a program, it is a good sign 
that the existence of training programs increased. In this year’s study, 54 percent say they 
have privacy and data protection awareness training for employees and other stakeholders 
who have access to sensitive personal information. This increased from 44 percent in 2013. 
§ Data breach or cyber insurance policies are becoming a more important part of a 
company’s preparedness plans. In 2013, only 10 percent of respondents said their 
company purchased a policy. This year, the percentage more than doubled to 26 percent. 
1 Is Your Company Ready for a Big Data Breach? Sponsored by Experian® Data Breach Resolution, 
conducted by Ponemon Institute, April 2013. 
2 2014 Cost of Data Breach Study: United States, conducted by Ponemon Institute and sponsored by IBM, 
May 2014. 
Ponemon Institute© Research Report Page 1
Further, the use of standard or model contract terms with third parties, vendors or business 
partners increased. In 2013, 65 percent of respondents said their organizations had these in 
place and this year it increased to 70 percent of respondents. 
§ There was very little change in the training of customer service personnel. When 
companies lose customer data, very often it is customer service that must field questions 
from concerned customers. In 2013, 30 percent of respondents said they provided training on 
how to respond to questions about a data breach incident. This increased slightly to 34 
percent of respondents in 2014. 
Ponemon Institute© Research Report Page 2
Part 2. Key findings 
In this section we provide an analysis of the responses. As explained in Part 4 of this study, most 
of the respondents report to the chief information officer, compliance officer, chief information 
security officer or general counsel. The complete audited findings are presented in the appendix 
of this report. 
We have organized the report according to the following themes: 
§ Data breaches and the current state of preparedness 
§ Barriers to effective data breach response 
§ Technical security considerations 
§ How data breach preparedness can be improved 
Data breach and the current state of preparedness 
Data breaches are increasing in frequency. Forty-three percent of respondents say their 
companies had a data breach involving the loss or theft of more than 1,000 records, an increase 
of 10 percent from 2013. Sixty percent of respondents say their companies have had more than 
one breach. Last year, 52 percent of respondents said their company had more than one breach. 
Current data breach preparedness programs often fail to deal with all consequences of an 
incident. Despite the increased existence of data response teams and plans in organizations 
represented in this research, Figure 1 reveals 68 percent of respondents do not agree their 
company would know how to deal with negative public opinion, blog posts and media reports. 
Further, only 67 percent do not agree their organization understands what needs to be done 
following a material data breach to prevent the loss of customers’ and business partners’ trust 
and confidence. 
Figure 1. Most respondents believe their companies are not able to deal with the 
consequences of a data breach 
Unsure, disagree and strongly disagree responses 
27% 
30% 
29% 
19% 
18% 
21% 
23% 
20% 
12% 
20% 
14% 
13% 
0% 10% 20% 30% 40% 50% 60% 70% 80% 
My organization understands what needs to be 
done following a material data breach to prevent 
negative public opinion, blog posts and media 
reports 
My organization understands what needs to be 
done following a material data breach to prevent 
the loss of customers’ and business partners’ 
trust and confidence 
My organization is prepared to respond to a data 
breach involving business confidential 
information and intellectual property 
My organization is prepared to respond to the 
theft of sensitive and confidential information that 
requires notification to victims and regulators 
Unsure Disagree Strongly disagree 
Ponemon Institute© Research Report Page 3
Barriers to effective data breach response 
Despite the plans and teams in place to respond to a data breach, companies are struggling with 
how to reduce its severity. The findings from this research reveal the gaps in response that 
should be addressed if a company is going to minimize the financial, operational and reputational 
consequences of a breach. 
More companies have data breach response plans but they are not considered effective. In 
2013, 61 percent of organizations had such a plan in place. This increased to 73 percent in this 
year’s study. More organizations have teams to lead data breach response efforts. In the 2013 
study, 67 percent of respondents said they had a data breach response team. This increased to 
72 percent. 
Despite the existence of plans only 30 percent of respondents say their organizations are 
effective or very effective in developing and executing a data breach plan, as shown in Figure 2. 
Figure 2. How effective is the development and execution of a data breach response plan? 
9% 
21% 
23% 
30% 
17% 
35% 
30% 
25% 
20% 
15% 
10% 
5% 
0% 
Very effective Effective Somewhat 
effective 
Not effective Unsure 
Ponemon Institute© Research Report Page 4
Data breach response plans are often not effective because response plans are not 
reviewed in a timely manner. Figure 3 shows that in many cases once the plan is prepared it is 
largely ignored. Forty-one percent say there is no set time for reviewing and updating the plan 
and 37 percent say they have not reviewed or updated the plan since it was put in place. 
Frequent reviews are essential to ensuring the plan addresses any changes in threats and areas 
vulnerable to attack or employee negligence. Regularly reviewing, updating and practicing a data 
breach plan based on changes in the threat landscape and a company’s structure are essential 
for properly managing a breach. Unfortunately a lot of companies do not take this vital step. 
Figure 3. How often does the company review & update the data breach response plan? 
41% 
37% 
14% 
3% 
5% 
0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 
Each quarter 
Twice per year 
Once each year 
No set time period for reviewing and updating the 
plan 
We have not reviewed or updated since the plan 
was put in place 
Ponemon Institute© Research Report Page 5
More senior executives and board members should be engaged in data breach response 
planning. Only 29 percent of respondents say their company’s board of directors, chairman and 
CEO are informed and involved in plans to deal with a possible data breach. 
Figure 4 reveals that if they are involved it is to approve funds and resources for data breach 
response efforts and to review these plans, according to 50 percent and 45 percent of 
respondents, respectively. Only 36 percent say their leadership team has requested to be notified 
ASAP if a material data breach occurs. As breaches now often cause significant corporate-wide 
risk, C-suite and board support for managing these issues is at an all-time high. 
Figure 4. How are the board of directors, chairman and CEO involved? 
More than one response permitted 
2% 
18% 
36% 
50% 
45% 
0% 10% 20% 30% 40% 50% 60% 
They approve funds and resources for data 
breach response efforts 
They participate in a high level review of the data 
breach response plan in place 
They have requested to be notified ASAP if a 
material data breach occurs 
They participate in a high level review of the 
organization’s data protection and privacy 
practices 
Other 
Ponemon Institute© Research Report Page 6
As part of a data breach preparedness plan, more companies need to have training and 
awareness programs. Having a data breach response plan in place is critical. However, 
employees who are not made aware of their responsibilities when handling sensitive information 
or answering questions about steps to protect customer information can be the company’s 
weakest link. 
Figure 5 shows the results of two questions about training and awareness. According to 43 
percent of respondents, their organizations do not have training and awareness programs for 
employees and other stakeholders who have access to sensitive or confidential personal 
information (3 percent are unsure). 
Another area in need of attention is the training of customer service personnel. Forty-nine 
percent of respondents say no training on how to respond to questions about a data breach 
incident takes place and 17 percent are unsure. Managing how consumers are treated following a 
large breach is often critical to maintaining their trust, yet it still remains an area that companies 
struggle to prepare for properly. 
Figure 5. Do you have training programs for employees handling sensitive personal 
information and do you have training programs for customer service personnel? 
54% 
43% 
3% 
34% 
49% 
17% 
60% 
50% 
40% 
30% 
20% 
10% 
0% 
Yes No Unsure 
Privacy/data protection awareness program for employees and other stakeholders who have 
access to sensitive or confidential personal information 
Customer service personnel trained on how to respond to questions about a data breach 
incident 
Ponemon Institute© Research Report Page 7
Responsibility for data breach response is dispersed throughout the company. According 
to Figure 6, primary responsibility for data breach preparedness is either with the CISO or no one 
person, according to 21 percent of respondents. In some cases, the compliance officer has 
assumed responsibility. Centralized control over the management of the data breach response 
team would encourage greater accountability and responsibility for minimizing the consequences 
of a breach. As mentioned previously, Ponemon Institute research has shown that appointing the 
CISO to lead the incident response team can reduce the cost of a data breach. 
Figure 6. The primary person/function to manage the data breach response team 
21% 
21% 
2% 
6% 
6% 
5% 
5% 
4% 
8% 
12% 
10% 
0% 5% 10% 15% 20% 25% 
Chief Information Security Officer 
Compliance Officer 
Head of Business Continuity Management 
Chief Information Officer 
Chief Risk Officer 
Chief Security Officer 
Head of PR and communications 
General Counsel 
Chief Privacy Officer 
Human Resources 
No one person/department has been designated 
to manage data breach response 
An effective incident response plan requires the skills of a variety of functions such as IT 
security, legal and public relations. When responding to a data breach, companies are most 
likely to engage those functions critical to minimizing the damage created by an incident. Eighty-five 
percent of respondents say the IT security function participates. Departments also key to 
response are legal and compliance (76 percent of respondents), public relations and 
communications (65 percent). It is interesting to note that only 19 percent say the privacy function 
is engaged in data breach response. 
Data breach or cyber insurance policies are becoming a more important part of a 
company’s preparedness plans. In 2013, only 10 percent of respondents said their company 
purchased a policy. This year, the percentage more than doubled to 26 percent. 
Further, the use of standard or model contract terms with third parties, vendors or business 
partners increased. In 2013, 65 percent of respondents said their company had these in place 
and this year it increased to 70 percent of respondents. 
Ponemon Institute© Research Report Page 8
Technical security considerations 
Managing the risks created by end-users and mobile devices are important to IT security’s 
data breach preparedness. When asked how IT security could reduce barriers and improve 
data breach detection and responsiveness, 56 percent of respondents say it would be to increase 
visibility into end-user access of sensitive and confidential information, as shown in Figure 7. 
Another big security issue is the ability to reduce the risk created by the proliferation of mobile 
devices and cloud services (43 percent of respondents). 
Figure 7. Barriers to improving the ability of IT security to respond to a data breach 
Two responses permitted 
2% 
15% 
23% 
21% 
43% 
40% 
56% 
0% 10% 20% 30% 40% 50% 60% 
Lack of visibility into end-user access of sensitive 
and confidential information 
Proliferation of mobile devices and cloud 
services 
Third party access to or management of data 
Lack of expertise 
Lack of investment in much needed technologies 
Lack of C-suite support 
None of the above 
Ponemon Institute© Research Report Page 9
Data breach detection technologies are not often deployed. Despite the increase in data 
breaches, slightly less than half of respondents (48 percent) say their organizations made an 
investment in technologies to detect and respond to a data breach. The technologies that are 
most often deployed do not improve data breach detection. As shown in Figure 8, anti-virus and 
intrusion prevention systems are the most frequently used. Only 31 percent say their companies 
have security incident & event management technologies. 
Some improvements have occurred in the ability to detect a data breach. Last year 22 percent 
were uncertain as to whether their company had a data breach. This has declined to 17 percent 
this year. This finding points to the need for companies to assess their security vulnerabilities and 
whether technologies are in place to reduce the risks created by gaps in their security posture. 
Figure 8. Technologies in place to quickly detect a data breach 
More than one response permitted 
5% 
34% 
31% 
25% 
54% 
89% 
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 
Anti-virus 
Intrusion prevention systems 
Mobile Device Management (MDM) 
Security Incident & Event Management 
Analysis of netflow or packet captures 
None of the above 
Ponemon Institute© Research Report Page 10
Risk assessments and continuous monitoring of information systems for unusual or 
anomalous traffic are needed. Fifty-six percent of respondents say their organizations do not 
perform risk or impact assessments to determine areas vulnerable to a data breach. These steps 
are critical to understanding what security gaps exist in the company in order to minimize the risk 
of a data breach. 
To have timely detection of data breaches, companies should be monitoring their systems for 
unusual or anomalous traffic. However, as shown in Figure 9, only 20 percent of respondents say 
their organizations continually monitor their systems and 44 percent say they never monitor or are 
unsure. 
Figure 9. Frequency for monitoring information systems for unusual or anomalous traffic 
20% 21% 
8% 
4% 
2% 1% 
28% 
16% 
30% 
25% 
20% 
15% 
10% 
5% 
0% 
Continuous 
monitoring 
Daily Weekly Monthly Quarterly Annually Never Unsure 
Ponemon Institute© Research Report Page 11
How data breach preparedness can be improved 
Fire drills, senior executive oversight and an adequate budget are considered key steps to 
improve data breach response. These findings indicate that respondents are aware of what 
needs to be done to have a more effective response process. 
Figure 10 shows the tactical and governance steps that respondents believe should be taken. 
The most important step is to conduct more fire drills to practice data breach response (77 
percent of respondents). Also key is to have more participation and oversight from senior 
executives (70 percent of respondents) and a budget dedicated to data breach preparedness (69 
percent). Companies should also have the necessary security expertise involved in the planning 
process (63 percent). 
Figure 10. How could the data breach response plan become more effective? 
More than one response permitted 
2% 
45% 
77% 
70% 
69% 
63% 
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 
Conduct more fire drills to practice data breach 
response 
More participation and oversight from senior 
executives 
A budget dedicated to data breach preparedness 
Individuals with a high level of expertise in 
security assigned to the team 
Individuals with a high level of expertise in 
compliance with privacy, data protection laws 
and regulations 
Other 
Ponemon Institute© Research Report Page 12
To stop the loss of customers following a breach, free identity theft protection and credit 
monitoring services is the best approach. When asked about preferred methods for retaining 
trust after a breach, providing free identity theft protection and credit monitoring services is clearly 
the preferred method. These services help customers manage potential security concerns after 
an incident. Only 13 percent of respondents say discounts or gift cards and 3 percent say an 
apology would make a difference. 
Figure 11. The best approach to keep customers and maintain reputation 
3% 
9% 
17% 
13% 
13% 
45% 
0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 
Free identity theft protection and credit 
monitoring services 
Access to a call center to respond to their 
concerns and provide information 
Gift cards 
Discounts on products or services 
None of the above would make a difference 
A sincere and personal apology (not a generic 
notification) 
Ponemon Institute© Research Report Page 13
Part 3. Conclusion 
Incident response planning is critical to a company’s data protection and security strategy. 
Research has shown that a comprehensive plan that is in place in advance of a data breach can 
reduce overall costs and keep the trust of customers and business partners. Following are some 
recommendations: 
§ The incident response plans should undergo frequent reviews and reflect the current security 
risks facing the company. 
§ Risk assessments should be conducted to ensure the appropriate technologies are in place 
to prevent and detect a data breach. 
§ The board of directors, CEO and chairman should play an active role in helping their 
companies prepare for and respond to a data breach. These include briefings on the security 
posture of the company and a review of the incident response plan. 
§ Employees should receive training on the importance of safeguarding sensitive data— 
especially customer information. Call center employees should become skilled at answering 
customers’ questions about the privacy and security practices of the company as well as 
explaining what the company is doing in the aftermath of a data breach. 
§ Accountability and responsibility for data breach response should be clearly defined and not 
dispersed throughout the company. Cross-functional teams that include the expertise 
necessary to respond to a data breach should be part of the incident response planning 
process. 
Ponemon Institute© Research Report Page 14
Part 4. Methods 
A sampling frame of 14,639 U.S. executives was selected for participation in this survey. Most 
participants report to the chief information officer, compliance officer, chief information security 
officer and general counsel. As shown in the following table, 615 respondents completed the 
survey. Screening removed 48 surveys. The final sample was 567 surveys (or a 3.9 percent 
response rate). 
Table 1: Survey response Freq Pct% 
Sampling frame 14,639 100.0% 
Total returns 615 4.2% 
Total rejections 48 0.3% 
Final sample 567 3.9% 
Pie Chart 1 reports the organizational level for survey participants. By design, 87 percent of 
respondents are at or above the supervisory level. 
Pie Chart 1. Organizational level for current position 
8% 
8% 
28% 
8% 
27% 
16% 
4% 1% 
Senior Executive 
Vice President 
Director 
Manager 
Supervisor 
Technician 
Staff 
Contractor 
Pie Chart 2 reveals that 19 percent of respondents report directly to the chief information officer 
and another 19 percent report to the compliance officer. Sixteen percent report to the chief 
information security officer. 
Pie Chart 2. The primary person you report to within the organization 
19% 
19% 
16% 
2% 6% 
3% 
4% 
14% 
4% 
5% 
8% 
Chief Information Officer 
Compliance Officer 
Chief Information Security Officer 
General Counsel 
Chief Privacy Officer 
CEO/Executive Committee 
Chief Financial Officer 
Chief Security Officer 
Chief Risk Officer 
Human Resources VP 
Other 
Ponemon Institute© Research Report Page 15
Pie Chart 3 reports the industry focus of respondents’ organizations. This chart identifies financial 
services (19 percent) as the largest segment, followed by healthcare and pharmaceuticals (13 
percent) and public sector (11 percent). 
Pie Chart 3. Industry distribution of respondents’ organizations 
19% 
13% 
11% 
10% 
3% 2% 2% 3% 
9% 
4% 
4% 
5% 
7% 
8% 
Financial services 
Healthcare & pharmaceuticals 
Public sector 
Retail 
Industrial 
Services 
Technology & software 
Hospitality 
Entertainment & media 
Transportation 
Energy & utilities 
Communications 
Education & research 
Other 
According to Pie Chart 4, more than half of the respondents (70 percent) are from organizations 
with a global headcount of over 1,000 employees. 
Pie Chart 4. Global headcount 
11% 
19% 
24% 
17% 
20% 
9% 
Less than 500 
500 to 1,000 
1,001 to 5,000 
5,001 to 25,000 
25,001 to 75,000 
More than 75,000 
Ponemon Institute© Research Report Page 16
Part 5. Caveats 
There are inherent limitations to survey research that need to be carefully considered before 
drawing inferences from findings. The following items are specific limitations that are germane to 
most web-based surveys. 
Non-response bias: The current findings are based on a sample of survey returns. We sent 
surveys to a representative sample of individuals, resulting in a large number of usable returned 
responses. Despite non-response tests, it is always possible that individuals who did not 
participate are substantially different in terms of underlying beliefs from those who completed the 
instrument. 
Sampling frame bias: The accuracy is based on contact information and the degree to which the 
list is representative of individuals who are executives in various organizations in the United 
States. We also acknowledge that the results may be biased by external events such as media 
coverage. We also acknowledge bias caused by compensating subjects to complete this 
research within a specified time period. 
Self-reported results: The quality of survey research is based on the integrity of confidential 
responses received from subjects. While certain checks and balances can be incorporated into 
the survey process, there is always the possibility that a subject did not provide accurate 
responses. 
Ponemon Institute© Research Report Page 17
Appendix: Detailed Survey Results 
The following tables provide the frequency or percentage frequency of responses to all survey 
questions contained in this study. All survey responses were captured in July 2014. 
Survey response Freq Pct% 
Sampling frame 14,639 100.0% 
Total returns 615 4.2% 
Rejected or screened surveys 48 0.3% 
Final sample 567 3.9% 
Part 1. Background & Attributions 
Q1a. Did your organization have a data breach involving the loss or theft 
of more than 1,000 records containing sensitive or confidential customer 
or business information in the past 2 years? FY 2014 FY 2013 
Yes 43% 33% 
No 40% 45% 
Unsure 17% 22% 
Total 100% 100% 
Q1b. If yes, how frequently did these incidents occur during the past 2 
years? FY 2014 FY 2013 
Only once 40% 48% 
2 to 3 times 30% 27% 
4 to 5 times 21% 16% 
More than 5 times 9% 9% 
Total 100% 100% 
Attributions. Please rate each statement using the scale provided below 
each item. 
Strongly 
agree Agree 
Q2. My organization is prepared to respond to the theft of sensitive and 
confidential information that requires notification to victims and regulators. 25% 26% 
Q3. My organization is prepared to respond to a data breach involving 
business confidential information and intellectual property. 18% 20% 
Q4 My organization understands what needs to be done following a 
material data breach to prevent the loss of customers’ and business 
partners’ trust and confidence. 16% 17% 
Q5. My organization understands what needs to be done following a 
material data breach to prevent negative public opinion, blog posts and 
media reports. 16% 16% 
Q6. Following a data breach, a credit monitoring and/or identity theft 
protection product is the best protection for consumers. 23% 31% 
Part 2. Data security preparedness 
Q7. Does your organization have the following technologies in place to 
quickly detect a data breach? Please select all that apply. Pct% 
Security Incident & Event Management 31% 
Intrusion prevention systems 54% 
Analysis of netflow or packet captures 25% 
Mobile Device Management (MDM) 34% 
Anti-virus 89% 
None of the above 5% 
Unsure 0% 
Total 238% 
Ponemon Institute© Research Report Page 18
Q8. In the past 12 months, has your organization increased its investment 
in security technologies in order to be able to detect and respond quickly 
to a data breach? Pct% 
Yes 48% 
No 46% 
Unsure 6% 
Total 100% 
Q9. Has your organization performed risk or impact assessments to 
determine areas vulnerable to a data breach? Pct% 
Yes 44% 
No 51% 
Unsure 5% 
Total 100% 
Q10. How frequently does your organization monitor its information 
systems for unusual or anomalous traffic? Pct% 
Continuous monitoring 20% 
Daily 21% 
Weekly 8% 
Monthly 4% 
Quarterly 2% 
Annually 1% 
Never 28% 
Unsure 16% 
Total 100% 
Q11. Does your organization use standard or model contract terms 
(preferably with indemnification) with third parties, vendors or business 
partners? FY 2014 FY 2013 
Yes 70% 65% 
No 25% 28% 
Unsure 5% 7% 
Total 100% 100% 
Q12. Does your organization have a privacy/data protection awareness 
program for employees and other stakeholders who have access to 
sensitive or confidential personal information? FY 2014 FY 2013 
Yes 54% 44% 
No 43% 52% 
Unsure 3% 4% 
Total 100% 100% 
Q13. Does your organization have a data breach or cyber insurance 
policy? FY 2014 FY 2013 
Yes 26% 10% 
No 68% 82% 
Unsure 6% 8% 
Total 100% 100% 
Ponemon Institute© Research Report Page 19
Q14. What is the biggest barrier to improving the ability of IT security to 
respond to a data breach? Please select the top two reasons. Pct% 
Lack of investment in much needed technologies 21% 
Lack of expertise 23% 
Lack of C-suite support 15% 
Third party access to or management of data 40% 
Lack of visibility into end-user access of sensitive and confidential 
information 56% 
Proliferation of mobile devices and cloud services 43% 
None of the above 2% 
Total 200% 
Part 3. Data breach preparedness. The following questions are intended 
to determine how well prepared an organization is to respond to a data 
breach. 
Q15. What is your source for information about how best to respond to a 
data breach? Please check all that apply Pct% 
Privacy and security publications and websites 65% 
Privacy and security associations and conferences 47% 
Information from forensics firms, cyber insurance providers, identity 
theft/credit monitoring companies 40% 
Business publications and television programs 15% 
None of the above 15% 
Total 182% 
Q16a. Is your company’s board of directors, chairman and CEO informed 
and involved in plans to deal with a possible data breach? Pct% 
Yes 29% 
No 59% 
Don’t know 12% 
Total 100% 
Q16b. If yes, how are they involved? Pct% 
They approve funds and resources for data breach response efforts 50% 
They participate in a high level review of the data breach response plan in 
place 45% 
They have requested to be notified ASAP if a material data breach occurs 36% 
They participate in a high level review of the organization’s data protection 
and privacy practices 18% 
Other 2% 
Total 151% 
Q17a. Does your organization have a data breach response plan in 
place? FY 2014 FY 2013 
Yes 73% 61% 
No 22% 30% 
Don’t know 5% 9% 
Total 100% 100% 
Q17b. If no, why? [Proceed to Q23] Pct% 
No resources or budget 44% 
Not important to have data breach response plan in place 25% 
Lack of C-level support 16% 
Outsourced to consultants 13% 
Other 2% 
Total 100% 
Ponemon Institute© Research Report Page 20
Q17c. If yes, how often does the organization review and update the 
plan? Pct% 
Each quarter 3% 
Twice per year 5% 
Once each year 14% 
No set time period for reviewing and updating the plan 41% 
We have not reviewed or updated since the plan was put in place 37% 
Total 100% 
Q18a. Does your organization have a data breach response team? FY 2014 FY 2013 
Yes 72% 67% 
No 23% 25% 
Unsure 5% 8% 
Total 100% 100% 
Q18b. If yes, who is the primary person/function to manage the data 
breach response team? Pct% 
General Counsel 5% 
Head of PR and communications 5% 
Head of Business Continuity Management 10% 
Chief Privacy Officer 4% 
Chief Information Officer 8% 
Compliance Officer 12% 
Human Resources 2% 
Chief Security Officer 6% 
Chief Information Security Officer 21% 
Chief Risk Officer 6% 
No one person/department has been designated to manage data breach 
response 21% 
Total 100% 
Q19. Who is most committed to having an effective data breach response 
plan in place? Please select only one person. Pct% 
Chief Executive Officer 6% 
Board of Directors 4% 
General Counsel 11% 
Head of PR and communications 10% 
Head of Business Continuity Management 7% 
Chief Privacy Officer 0% 
Chief Information Officer 6% 
Chief Technology Officer 0% 
Compliance Officer 15% 
Human Resources 0% 
Chief Security Officer 5% 
Chief Information Security Officer 25% 
Chief Risk Officer 11% 
Total 100% 
Ponemon Institute© Research Report Page 21
Q20. What departments participate in the organization’s data breach 
response? Please select all that apply. Pct% 
Office of the CEO and Board of Directors 27% 
Legal and compliance 76% 
Privacy function 19% 
IT function 26% 
IT security 85% 
Human Resources 22% 
Risk management 38% 
Communication and public relations 65% 
Business continuity management/disaster recovery 38% 
Other 5% 
Total 401% 
Q21. How effective is your organization in developing and executing a 
data breach response plan? Pct% 
Very effective 9% 
Effective 21% 
Somewhat effective 23% 
Not effective 30% 
Unsure 17% 
Total 100% 
Q22. How could the data breach response plan become more effective? 
Please select all that apply. Pct% 
Conduct more fire drills to practice data breach response 77% 
More participation and oversight from senior executives 70% 
Individuals with a high level of expertise in security assigned to the team 63% 
Individuals with a high level of expertise in compliance with privacy, data 
protection laws and regulations 45% 
A budget dedicated to data breach preparedness 69% 
Other 2% 
Total 326% 
Q23a. Does your organization have a retainer or master service 
agreement with a third-party firm that will help it prepare and respond to a 
data breach or security incident? Pct% 
Yes 28% 
No 66% 
Unsure 6% 
Total 100% 
Q23b. If yes, what type of provider? Please check all that apply. Pct% 
Identity theft and/or credit monitoring provider 43% 
Call center 37% 
Data breach resolution provider (i.e.notification, protection products) 49% 
Outside legal counsel 76% 
Forensic/IT security provider 61% 
Public relations firm 36% 
Regulatory influencer/lobbyist 15% 
Total 317% 
Ponemon Institute© Research Report Page 22
Q24. Does your organization train customer service personnel on how to 
respond to questions about a data breach incident? FY 2014 FY 2013 
Yes 34% 30% 
No 49% 52% 
Unsure 17% 18% 
Total 100% 100% 
Part 5. Organizational characteristics & respondent demographics 
D1. What organizational level best describes your current position? Pct% 
Senior Executive 8% 
Vice President 8% 
Director 28% 
Manager 27% 
Supervisor 16% 
Technician 8% 
Staff 4% 
Contractor 1% 
Other 0% 
Total 100% 
D2. Check the Primary Person you report to within your organization. Pct% 
CEO/Executive Committee 5% 
Chief Financial Officer 4% 
General Counsel 14% 
Chief Privacy Officer 8% 
Chief Information Officer 19% 
Compliance Officer 19% 
Human Resources VP 2% 
Chief Information Security Officer 16% 
Chief Security Officer 4% 
Chief Risk Officer 3% 
Other 6% 
Total 100% 
Ponemon Institute© Research Report Page 23
D3. What industry best describes your organization’s industry focus? Pct% 
Agriculture & food services 1% 
Communications 2% 
Defense & aerospace 1% 
Education & research 2% 
Energy & utilities 3% 
Entertainment & media 4% 
Financial services 19% 
Healthcare & pharmaceuticals 13% 
Hospitality 5% 
Industrial 9% 
Public sector 11% 
Retail 10% 
Services 8% 
Technology & software 7% 
Transportation 4% 
Other 1% 
Total 100% 
D4. What is the worldwide headcount of your organization? Pct% 
Less than 500 11% 
500 to 1,000 19% 
1,001 to 5,000 24% 
5,001 to 25,000 20% 
25,001 to 75,000 17% 
More than 75,000 9% 
Total 100% 
Ponemon Institute 
Advancing Responsible Information Management 
Ponemon Institute is dedicated to independent research and education that advances responsible 
information and privacy management practices within business and government. Our mission is to conduct 
high quality, empirical studies on critical issues affecting the management and security of sensitive 
information about people and organizations. 
As a member of the Council of American Survey Research Organizations (CASRO), we uphold strict 
data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable 
information from individuals (or company identifiable information in our business research). Furthermore, we 
have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper 
questions. 
Ponemon Institute© Research Report Page 24

Mais conteúdo relacionado

Mais procurados

Creating a Federal Innovation Process
Creating a Federal Innovation ProcessCreating a Federal Innovation Process
Creating a Federal Innovation ProcessGov BizCouncil
 
Envisioning IC ITE: The Next Generation of Information Sharing
Envisioning IC ITE: The Next Generation of Information SharingEnvisioning IC ITE: The Next Generation of Information Sharing
Envisioning IC ITE: The Next Generation of Information SharingGov BizCouncil
 
Ponemon Institute Research Report
Ponemon Institute Research ReportPonemon Institute Research Report
Ponemon Institute Research ReportPeter Tutty
 
Treat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance IssueTreat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance IssueResilient Systems
 
2014 State of Backup for SMBs
2014 State of Backup for SMBs2014 State of Backup for SMBs
2014 State of Backup for SMBsCarbonite
 
Inside Federal Outsourcing
Inside Federal OutsourcingInside Federal Outsourcing
Inside Federal OutsourcingGov BizCouncil
 
Reach the Edge of the Joint Information Environment
Reach the Edge of the Joint Information EnvironmentReach the Edge of the Joint Information Environment
Reach the Edge of the Joint Information EnvironmentGov BizCouncil
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskFiona Lew
 
A New Network Acquisition Model for the Federal Government
A New Network Acquisition Model for the Federal GovernmentA New Network Acquisition Model for the Federal Government
A New Network Acquisition Model for the Federal GovernmentGov BizCouncil
 
The Path to Customer-Centric Service
The Path to Customer-Centric ServiceThe Path to Customer-Centric Service
The Path to Customer-Centric ServiceGov BizCouncil
 
Communication Challenges in Federal Telework
Communication Challenges in Federal TeleworkCommunication Challenges in Federal Telework
Communication Challenges in Federal TeleworkGov BizCouncil
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
Delivering on Digital Government
Delivering on Digital GovernmentDelivering on Digital Government
Delivering on Digital GovernmentGov BizCouncil
 
Study: Employee Expectations Are Changing Due to COVID-19
Study: Employee Expectations Are Changing Due to COVID-19Study: Employee Expectations Are Changing Due to COVID-19
Study: Employee Expectations Are Changing Due to COVID-19Sarah Jackson
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 - Mark - Fullbright
 
STUDY: Website Vulnerability Assessment
STUDY: Website Vulnerability AssessmentSTUDY: Website Vulnerability Assessment
STUDY: Website Vulnerability AssessmentSymantec
 
Report: How Engaged Are Employees During COVID-19?
Report: How Engaged Are Employees During COVID-19?Report: How Engaged Are Employees During COVID-19?
Report: How Engaged Are Employees During COVID-19?Sarah Jackson
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-StudyTam Nguyen
 

Mais procurados (19)

Creating a Federal Innovation Process
Creating a Federal Innovation ProcessCreating a Federal Innovation Process
Creating a Federal Innovation Process
 
Envisioning IC ITE: The Next Generation of Information Sharing
Envisioning IC ITE: The Next Generation of Information SharingEnvisioning IC ITE: The Next Generation of Information Sharing
Envisioning IC ITE: The Next Generation of Information Sharing
 
Ponemon Institute Research Report
Ponemon Institute Research ReportPonemon Institute Research Report
Ponemon Institute Research Report
 
Treat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance IssueTreat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance Issue
 
2014 State of Backup for SMBs
2014 State of Backup for SMBs2014 State of Backup for SMBs
2014 State of Backup for SMBs
 
Inside Federal Outsourcing
Inside Federal OutsourcingInside Federal Outsourcing
Inside Federal Outsourcing
 
Reach the Edge of the Joint Information Environment
Reach the Edge of the Joint Information EnvironmentReach the Edge of the Joint Information Environment
Reach the Edge of the Joint Information Environment
 
2010 GISS EY
2010 GISS EY2010 GISS EY
2010 GISS EY
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data Risk
 
A New Network Acquisition Model for the Federal Government
A New Network Acquisition Model for the Federal GovernmentA New Network Acquisition Model for the Federal Government
A New Network Acquisition Model for the Federal Government
 
The Path to Customer-Centric Service
The Path to Customer-Centric ServiceThe Path to Customer-Centric Service
The Path to Customer-Centric Service
 
Communication Challenges in Federal Telework
Communication Challenges in Federal TeleworkCommunication Challenges in Federal Telework
Communication Challenges in Federal Telework
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Delivering on Digital Government
Delivering on Digital GovernmentDelivering on Digital Government
Delivering on Digital Government
 
Study: Employee Expectations Are Changing Due to COVID-19
Study: Employee Expectations Are Changing Due to COVID-19Study: Employee Expectations Are Changing Due to COVID-19
Study: Employee Expectations Are Changing Due to COVID-19
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
 
STUDY: Website Vulnerability Assessment
STUDY: Website Vulnerability AssessmentSTUDY: Website Vulnerability Assessment
STUDY: Website Vulnerability Assessment
 
Report: How Engaged Are Employees During COVID-19?
Report: How Engaged Are Employees During COVID-19?Report: How Engaged Are Employees During COVID-19?
Report: How Engaged Are Employees During COVID-19?
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study
 

Semelhante a Is Your Company Ready for a Big Data Breach?

2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guideJames Fisher
 
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Security Regulations & Guidelines:  Is Your Business on the Path to Compliance? Security Regulations & Guidelines:  Is Your Business on the Path to Compliance?
Security Regulations & Guidelines: Is Your Business on the Path to Compliance? Blancco
 
Lets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNixLets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNixFixNix Inc.,
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe TrustArc
 
Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)PwC France
 
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...Melissa Luongo
 
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016Harmaldeep Cassam
 
Experion Data Breach Response Excerpts
Experion Data Breach Response ExcerptsExperion Data Breach Response Excerpts
Experion Data Breach Response ExcerptsPeter Henley
 
Managing complexity in IAM
Managing complexity in IAMManaging complexity in IAM
Managing complexity in IAMBee_Ware
 
Ponemon: Managing Complexity in IAM
Ponemon: Managing Complexity in IAMPonemon: Managing Complexity in IAM
Ponemon: Managing Complexity in IAMEMC
 
Big risks require big data thinking, Global Forensic Data Analytics Survey 2014
Big risks require big data thinking, Global Forensic Data Analytics Survey 2014Big risks require big data thinking, Global Forensic Data Analytics Survey 2014
Big risks require big data thinking, Global Forensic Data Analytics Survey 2014EY
 
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...Capgemini
 
Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013EY
 
Cracking the data conundrum - how successful companies make big data operational
Cracking the data conundrum - how successful companies make big data operationalCracking the data conundrum - how successful companies make big data operational
Cracking the data conundrum - how successful companies make big data operationalRick Bouter
 
Cracking the Data Conundrum: How Successful Companies Make #BigData Operational
Cracking the Data Conundrum: How Successful Companies Make #BigData OperationalCracking the Data Conundrum: How Successful Companies Make #BigData Operational
Cracking the Data Conundrum: How Successful Companies Make #BigData OperationalSubrahmanyam KVJ
 
Cracking the Data Conundrum: How Successful Companies Make #BigData Operational
Cracking the Data Conundrum: How Successful Companies Make #BigData OperationalCracking the Data Conundrum: How Successful Companies Make #BigData Operational
Cracking the Data Conundrum: How Successful Companies Make #BigData OperationalCapgemini
 

Semelhante a Is Your Company Ready for a Big Data Breach? (20)

2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide
 
2014 Executive Breach Preparedness Research Report
2014 Executive Breach Preparedness Research Report2014 Executive Breach Preparedness Research Report
2014 Executive Breach Preparedness Research Report
 
Executive Breach Response Playbook
Executive Breach Response PlaybookExecutive Breach Response Playbook
Executive Breach Response Playbook
 
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Security Regulations & Guidelines:  Is Your Business on the Path to Compliance? Security Regulations & Guidelines:  Is Your Business on the Path to Compliance?
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
 
Lets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNixLets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNix
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
 
Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)
 
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
 
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
EY FIDS GLOBAL FORENSIC DATA ANALYTICS SURVEY 01142016
 
Experion Data Breach Response Excerpts
Experion Data Breach Response ExcerptsExperion Data Breach Response Excerpts
Experion Data Breach Response Excerpts
 
Decision making article
Decision making articleDecision making article
Decision making article
 
Managing complexity in IAM
Managing complexity in IAMManaging complexity in IAM
Managing complexity in IAM
 
Ponemon: Managing Complexity in IAM
Ponemon: Managing Complexity in IAMPonemon: Managing Complexity in IAM
Ponemon: Managing Complexity in IAM
 
Big risks require big data thinking, Global Forensic Data Analytics Survey 2014
Big risks require big data thinking, Global Forensic Data Analytics Survey 2014Big risks require big data thinking, Global Forensic Data Analytics Survey 2014
Big risks require big data thinking, Global Forensic Data Analytics Survey 2014
 
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 
Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013
 
Cracking the data conundrum - how successful companies make big data operational
Cracking the data conundrum - how successful companies make big data operationalCracking the data conundrum - how successful companies make big data operational
Cracking the data conundrum - how successful companies make big data operational
 
Cracking the Data Conundrum: How Successful Companies Make #BigData Operational
Cracking the Data Conundrum: How Successful Companies Make #BigData OperationalCracking the Data Conundrum: How Successful Companies Make #BigData Operational
Cracking the Data Conundrum: How Successful Companies Make #BigData Operational
 
Cracking the Data Conundrum: How Successful Companies Make #BigData Operational
Cracking the Data Conundrum: How Successful Companies Make #BigData OperationalCracking the Data Conundrum: How Successful Companies Make #BigData Operational
Cracking the Data Conundrum: How Successful Companies Make #BigData Operational
 

Mais de - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Mais de - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Último

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 

Último (20)

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 

Is Your Company Ready for a Big Data Breach?

  • 1. Is Your Company Ready for a Big Data Breach? The Second Annual Study on Data Breach Preparedness Sponsored by Experian® Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: September 2014 Ponemon Institute© Research Report
  • 2. Is Your Company Ready for a Big Data Breach? The Second Annual Study on Data Breach Preparedness Ponemon Institute, September 2014 Part 1. Introduction With data breaches making headlines the world over, awareness about the importance of having technologies and governance practices in place to respond to such incidents should be at an all-time high. In this study sponsored by Experian® Data Breach Resolution, we surveyed 567 executives in the United States about how prepared they think their companies are to respond to a data breach. In 2013 a similar study was conducted.1 A comparison of those findings to this research reveals that companies are making some positive changes. However, many companies are deficient in governance and security practices that could strengthen their data breach preparedness. These include: keeping the data breach response plan up-to-date, conducting risk assessments of areas vulnerable to a breach, continuous monitoring of information systems to detect unusual and anomalous traffic and investing in technologies that enable timely detections of a security breach. In addition to helping a company prepare for a breach, the existence of a plan can reduce the overall cost of an incident. The 2014 Cost of Data Breach Study: United States reported that the average cost for each lost or stolen record was $2012. However, if a company has a formal incident response plan in place prior to the incident, the average cost of a data breach was reduced as much as $17 per record. Appointing a CISO to lead the data breach incident response team reduced the cost per lost or stolen record by $10. Following is a comparison of findings from the two annual studies: § More companies have data breach response plans and teams in place. In 2013, 61 percent of companies had such a plan in place. This increased to 73 percent in this year’s study. More companies have teams to lead data breach response efforts. In the 2013 study, 67 percent of respondents said they had a data breach response team. This increased to 72 percent. § Data breaches have increased in frequency. In 2013, 33 percent of respondents said their company had a data breach. This year, the percentage has increased to 43 percent. Sixty percent say their company experienced more than one data breach in the past two years. This increased from 52 percent of respondents in 2013. § Most companies have privacy and data protection awareness programs. Ponemon Institute research has revealed that mistakes made by employees are a frequent cause of data breach. While we believe all companies should have such a program, it is a good sign that the existence of training programs increased. In this year’s study, 54 percent say they have privacy and data protection awareness training for employees and other stakeholders who have access to sensitive personal information. This increased from 44 percent in 2013. § Data breach or cyber insurance policies are becoming a more important part of a company’s preparedness plans. In 2013, only 10 percent of respondents said their company purchased a policy. This year, the percentage more than doubled to 26 percent. 1 Is Your Company Ready for a Big Data Breach? Sponsored by Experian® Data Breach Resolution, conducted by Ponemon Institute, April 2013. 2 2014 Cost of Data Breach Study: United States, conducted by Ponemon Institute and sponsored by IBM, May 2014. Ponemon Institute© Research Report Page 1
  • 3. Further, the use of standard or model contract terms with third parties, vendors or business partners increased. In 2013, 65 percent of respondents said their organizations had these in place and this year it increased to 70 percent of respondents. § There was very little change in the training of customer service personnel. When companies lose customer data, very often it is customer service that must field questions from concerned customers. In 2013, 30 percent of respondents said they provided training on how to respond to questions about a data breach incident. This increased slightly to 34 percent of respondents in 2014. Ponemon Institute© Research Report Page 2
  • 4. Part 2. Key findings In this section we provide an analysis of the responses. As explained in Part 4 of this study, most of the respondents report to the chief information officer, compliance officer, chief information security officer or general counsel. The complete audited findings are presented in the appendix of this report. We have organized the report according to the following themes: § Data breaches and the current state of preparedness § Barriers to effective data breach response § Technical security considerations § How data breach preparedness can be improved Data breach and the current state of preparedness Data breaches are increasing in frequency. Forty-three percent of respondents say their companies had a data breach involving the loss or theft of more than 1,000 records, an increase of 10 percent from 2013. Sixty percent of respondents say their companies have had more than one breach. Last year, 52 percent of respondents said their company had more than one breach. Current data breach preparedness programs often fail to deal with all consequences of an incident. Despite the increased existence of data response teams and plans in organizations represented in this research, Figure 1 reveals 68 percent of respondents do not agree their company would know how to deal with negative public opinion, blog posts and media reports. Further, only 67 percent do not agree their organization understands what needs to be done following a material data breach to prevent the loss of customers’ and business partners’ trust and confidence. Figure 1. Most respondents believe their companies are not able to deal with the consequences of a data breach Unsure, disagree and strongly disagree responses 27% 30% 29% 19% 18% 21% 23% 20% 12% 20% 14% 13% 0% 10% 20% 30% 40% 50% 60% 70% 80% My organization understands what needs to be done following a material data breach to prevent negative public opinion, blog posts and media reports My organization understands what needs to be done following a material data breach to prevent the loss of customers’ and business partners’ trust and confidence My organization is prepared to respond to a data breach involving business confidential information and intellectual property My organization is prepared to respond to the theft of sensitive and confidential information that requires notification to victims and regulators Unsure Disagree Strongly disagree Ponemon Institute© Research Report Page 3
  • 5. Barriers to effective data breach response Despite the plans and teams in place to respond to a data breach, companies are struggling with how to reduce its severity. The findings from this research reveal the gaps in response that should be addressed if a company is going to minimize the financial, operational and reputational consequences of a breach. More companies have data breach response plans but they are not considered effective. In 2013, 61 percent of organizations had such a plan in place. This increased to 73 percent in this year’s study. More organizations have teams to lead data breach response efforts. In the 2013 study, 67 percent of respondents said they had a data breach response team. This increased to 72 percent. Despite the existence of plans only 30 percent of respondents say their organizations are effective or very effective in developing and executing a data breach plan, as shown in Figure 2. Figure 2. How effective is the development and execution of a data breach response plan? 9% 21% 23% 30% 17% 35% 30% 25% 20% 15% 10% 5% 0% Very effective Effective Somewhat effective Not effective Unsure Ponemon Institute© Research Report Page 4
  • 6. Data breach response plans are often not effective because response plans are not reviewed in a timely manner. Figure 3 shows that in many cases once the plan is prepared it is largely ignored. Forty-one percent say there is no set time for reviewing and updating the plan and 37 percent say they have not reviewed or updated the plan since it was put in place. Frequent reviews are essential to ensuring the plan addresses any changes in threats and areas vulnerable to attack or employee negligence. Regularly reviewing, updating and practicing a data breach plan based on changes in the threat landscape and a company’s structure are essential for properly managing a breach. Unfortunately a lot of companies do not take this vital step. Figure 3. How often does the company review & update the data breach response plan? 41% 37% 14% 3% 5% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Each quarter Twice per year Once each year No set time period for reviewing and updating the plan We have not reviewed or updated since the plan was put in place Ponemon Institute© Research Report Page 5
  • 7. More senior executives and board members should be engaged in data breach response planning. Only 29 percent of respondents say their company’s board of directors, chairman and CEO are informed and involved in plans to deal with a possible data breach. Figure 4 reveals that if they are involved it is to approve funds and resources for data breach response efforts and to review these plans, according to 50 percent and 45 percent of respondents, respectively. Only 36 percent say their leadership team has requested to be notified ASAP if a material data breach occurs. As breaches now often cause significant corporate-wide risk, C-suite and board support for managing these issues is at an all-time high. Figure 4. How are the board of directors, chairman and CEO involved? More than one response permitted 2% 18% 36% 50% 45% 0% 10% 20% 30% 40% 50% 60% They approve funds and resources for data breach response efforts They participate in a high level review of the data breach response plan in place They have requested to be notified ASAP if a material data breach occurs They participate in a high level review of the organization’s data protection and privacy practices Other Ponemon Institute© Research Report Page 6
  • 8. As part of a data breach preparedness plan, more companies need to have training and awareness programs. Having a data breach response plan in place is critical. However, employees who are not made aware of their responsibilities when handling sensitive information or answering questions about steps to protect customer information can be the company’s weakest link. Figure 5 shows the results of two questions about training and awareness. According to 43 percent of respondents, their organizations do not have training and awareness programs for employees and other stakeholders who have access to sensitive or confidential personal information (3 percent are unsure). Another area in need of attention is the training of customer service personnel. Forty-nine percent of respondents say no training on how to respond to questions about a data breach incident takes place and 17 percent are unsure. Managing how consumers are treated following a large breach is often critical to maintaining their trust, yet it still remains an area that companies struggle to prepare for properly. Figure 5. Do you have training programs for employees handling sensitive personal information and do you have training programs for customer service personnel? 54% 43% 3% 34% 49% 17% 60% 50% 40% 30% 20% 10% 0% Yes No Unsure Privacy/data protection awareness program for employees and other stakeholders who have access to sensitive or confidential personal information Customer service personnel trained on how to respond to questions about a data breach incident Ponemon Institute© Research Report Page 7
  • 9. Responsibility for data breach response is dispersed throughout the company. According to Figure 6, primary responsibility for data breach preparedness is either with the CISO or no one person, according to 21 percent of respondents. In some cases, the compliance officer has assumed responsibility. Centralized control over the management of the data breach response team would encourage greater accountability and responsibility for minimizing the consequences of a breach. As mentioned previously, Ponemon Institute research has shown that appointing the CISO to lead the incident response team can reduce the cost of a data breach. Figure 6. The primary person/function to manage the data breach response team 21% 21% 2% 6% 6% 5% 5% 4% 8% 12% 10% 0% 5% 10% 15% 20% 25% Chief Information Security Officer Compliance Officer Head of Business Continuity Management Chief Information Officer Chief Risk Officer Chief Security Officer Head of PR and communications General Counsel Chief Privacy Officer Human Resources No one person/department has been designated to manage data breach response An effective incident response plan requires the skills of a variety of functions such as IT security, legal and public relations. When responding to a data breach, companies are most likely to engage those functions critical to minimizing the damage created by an incident. Eighty-five percent of respondents say the IT security function participates. Departments also key to response are legal and compliance (76 percent of respondents), public relations and communications (65 percent). It is interesting to note that only 19 percent say the privacy function is engaged in data breach response. Data breach or cyber insurance policies are becoming a more important part of a company’s preparedness plans. In 2013, only 10 percent of respondents said their company purchased a policy. This year, the percentage more than doubled to 26 percent. Further, the use of standard or model contract terms with third parties, vendors or business partners increased. In 2013, 65 percent of respondents said their company had these in place and this year it increased to 70 percent of respondents. Ponemon Institute© Research Report Page 8
  • 10. Technical security considerations Managing the risks created by end-users and mobile devices are important to IT security’s data breach preparedness. When asked how IT security could reduce barriers and improve data breach detection and responsiveness, 56 percent of respondents say it would be to increase visibility into end-user access of sensitive and confidential information, as shown in Figure 7. Another big security issue is the ability to reduce the risk created by the proliferation of mobile devices and cloud services (43 percent of respondents). Figure 7. Barriers to improving the ability of IT security to respond to a data breach Two responses permitted 2% 15% 23% 21% 43% 40% 56% 0% 10% 20% 30% 40% 50% 60% Lack of visibility into end-user access of sensitive and confidential information Proliferation of mobile devices and cloud services Third party access to or management of data Lack of expertise Lack of investment in much needed technologies Lack of C-suite support None of the above Ponemon Institute© Research Report Page 9
  • 11. Data breach detection technologies are not often deployed. Despite the increase in data breaches, slightly less than half of respondents (48 percent) say their organizations made an investment in technologies to detect and respond to a data breach. The technologies that are most often deployed do not improve data breach detection. As shown in Figure 8, anti-virus and intrusion prevention systems are the most frequently used. Only 31 percent say their companies have security incident & event management technologies. Some improvements have occurred in the ability to detect a data breach. Last year 22 percent were uncertain as to whether their company had a data breach. This has declined to 17 percent this year. This finding points to the need for companies to assess their security vulnerabilities and whether technologies are in place to reduce the risks created by gaps in their security posture. Figure 8. Technologies in place to quickly detect a data breach More than one response permitted 5% 34% 31% 25% 54% 89% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Anti-virus Intrusion prevention systems Mobile Device Management (MDM) Security Incident & Event Management Analysis of netflow or packet captures None of the above Ponemon Institute© Research Report Page 10
  • 12. Risk assessments and continuous monitoring of information systems for unusual or anomalous traffic are needed. Fifty-six percent of respondents say their organizations do not perform risk or impact assessments to determine areas vulnerable to a data breach. These steps are critical to understanding what security gaps exist in the company in order to minimize the risk of a data breach. To have timely detection of data breaches, companies should be monitoring their systems for unusual or anomalous traffic. However, as shown in Figure 9, only 20 percent of respondents say their organizations continually monitor their systems and 44 percent say they never monitor or are unsure. Figure 9. Frequency for monitoring information systems for unusual or anomalous traffic 20% 21% 8% 4% 2% 1% 28% 16% 30% 25% 20% 15% 10% 5% 0% Continuous monitoring Daily Weekly Monthly Quarterly Annually Never Unsure Ponemon Institute© Research Report Page 11
  • 13. How data breach preparedness can be improved Fire drills, senior executive oversight and an adequate budget are considered key steps to improve data breach response. These findings indicate that respondents are aware of what needs to be done to have a more effective response process. Figure 10 shows the tactical and governance steps that respondents believe should be taken. The most important step is to conduct more fire drills to practice data breach response (77 percent of respondents). Also key is to have more participation and oversight from senior executives (70 percent of respondents) and a budget dedicated to data breach preparedness (69 percent). Companies should also have the necessary security expertise involved in the planning process (63 percent). Figure 10. How could the data breach response plan become more effective? More than one response permitted 2% 45% 77% 70% 69% 63% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Conduct more fire drills to practice data breach response More participation and oversight from senior executives A budget dedicated to data breach preparedness Individuals with a high level of expertise in security assigned to the team Individuals with a high level of expertise in compliance with privacy, data protection laws and regulations Other Ponemon Institute© Research Report Page 12
  • 14. To stop the loss of customers following a breach, free identity theft protection and credit monitoring services is the best approach. When asked about preferred methods for retaining trust after a breach, providing free identity theft protection and credit monitoring services is clearly the preferred method. These services help customers manage potential security concerns after an incident. Only 13 percent of respondents say discounts or gift cards and 3 percent say an apology would make a difference. Figure 11. The best approach to keep customers and maintain reputation 3% 9% 17% 13% 13% 45% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% Free identity theft protection and credit monitoring services Access to a call center to respond to their concerns and provide information Gift cards Discounts on products or services None of the above would make a difference A sincere and personal apology (not a generic notification) Ponemon Institute© Research Report Page 13
  • 15. Part 3. Conclusion Incident response planning is critical to a company’s data protection and security strategy. Research has shown that a comprehensive plan that is in place in advance of a data breach can reduce overall costs and keep the trust of customers and business partners. Following are some recommendations: § The incident response plans should undergo frequent reviews and reflect the current security risks facing the company. § Risk assessments should be conducted to ensure the appropriate technologies are in place to prevent and detect a data breach. § The board of directors, CEO and chairman should play an active role in helping their companies prepare for and respond to a data breach. These include briefings on the security posture of the company and a review of the incident response plan. § Employees should receive training on the importance of safeguarding sensitive data— especially customer information. Call center employees should become skilled at answering customers’ questions about the privacy and security practices of the company as well as explaining what the company is doing in the aftermath of a data breach. § Accountability and responsibility for data breach response should be clearly defined and not dispersed throughout the company. Cross-functional teams that include the expertise necessary to respond to a data breach should be part of the incident response planning process. Ponemon Institute© Research Report Page 14
  • 16. Part 4. Methods A sampling frame of 14,639 U.S. executives was selected for participation in this survey. Most participants report to the chief information officer, compliance officer, chief information security officer and general counsel. As shown in the following table, 615 respondents completed the survey. Screening removed 48 surveys. The final sample was 567 surveys (or a 3.9 percent response rate). Table 1: Survey response Freq Pct% Sampling frame 14,639 100.0% Total returns 615 4.2% Total rejections 48 0.3% Final sample 567 3.9% Pie Chart 1 reports the organizational level for survey participants. By design, 87 percent of respondents are at or above the supervisory level. Pie Chart 1. Organizational level for current position 8% 8% 28% 8% 27% 16% 4% 1% Senior Executive Vice President Director Manager Supervisor Technician Staff Contractor Pie Chart 2 reveals that 19 percent of respondents report directly to the chief information officer and another 19 percent report to the compliance officer. Sixteen percent report to the chief information security officer. Pie Chart 2. The primary person you report to within the organization 19% 19% 16% 2% 6% 3% 4% 14% 4% 5% 8% Chief Information Officer Compliance Officer Chief Information Security Officer General Counsel Chief Privacy Officer CEO/Executive Committee Chief Financial Officer Chief Security Officer Chief Risk Officer Human Resources VP Other Ponemon Institute© Research Report Page 15
  • 17. Pie Chart 3 reports the industry focus of respondents’ organizations. This chart identifies financial services (19 percent) as the largest segment, followed by healthcare and pharmaceuticals (13 percent) and public sector (11 percent). Pie Chart 3. Industry distribution of respondents’ organizations 19% 13% 11% 10% 3% 2% 2% 3% 9% 4% 4% 5% 7% 8% Financial services Healthcare & pharmaceuticals Public sector Retail Industrial Services Technology & software Hospitality Entertainment & media Transportation Energy & utilities Communications Education & research Other According to Pie Chart 4, more than half of the respondents (70 percent) are from organizations with a global headcount of over 1,000 employees. Pie Chart 4. Global headcount 11% 19% 24% 17% 20% 9% Less than 500 500 to 1,000 1,001 to 5,000 5,001 to 25,000 25,001 to 75,000 More than 75,000 Ponemon Institute© Research Report Page 16
  • 18. Part 5. Caveats There are inherent limitations to survey research that need to be carefully considered before drawing inferences from findings. The following items are specific limitations that are germane to most web-based surveys. Non-response bias: The current findings are based on a sample of survey returns. We sent surveys to a representative sample of individuals, resulting in a large number of usable returned responses. Despite non-response tests, it is always possible that individuals who did not participate are substantially different in terms of underlying beliefs from those who completed the instrument. Sampling frame bias: The accuracy is based on contact information and the degree to which the list is representative of individuals who are executives in various organizations in the United States. We also acknowledge that the results may be biased by external events such as media coverage. We also acknowledge bias caused by compensating subjects to complete this research within a specified time period. Self-reported results: The quality of survey research is based on the integrity of confidential responses received from subjects. While certain checks and balances can be incorporated into the survey process, there is always the possibility that a subject did not provide accurate responses. Ponemon Institute© Research Report Page 17
  • 19. Appendix: Detailed Survey Results The following tables provide the frequency or percentage frequency of responses to all survey questions contained in this study. All survey responses were captured in July 2014. Survey response Freq Pct% Sampling frame 14,639 100.0% Total returns 615 4.2% Rejected or screened surveys 48 0.3% Final sample 567 3.9% Part 1. Background & Attributions Q1a. Did your organization have a data breach involving the loss or theft of more than 1,000 records containing sensitive or confidential customer or business information in the past 2 years? FY 2014 FY 2013 Yes 43% 33% No 40% 45% Unsure 17% 22% Total 100% 100% Q1b. If yes, how frequently did these incidents occur during the past 2 years? FY 2014 FY 2013 Only once 40% 48% 2 to 3 times 30% 27% 4 to 5 times 21% 16% More than 5 times 9% 9% Total 100% 100% Attributions. Please rate each statement using the scale provided below each item. Strongly agree Agree Q2. My organization is prepared to respond to the theft of sensitive and confidential information that requires notification to victims and regulators. 25% 26% Q3. My organization is prepared to respond to a data breach involving business confidential information and intellectual property. 18% 20% Q4 My organization understands what needs to be done following a material data breach to prevent the loss of customers’ and business partners’ trust and confidence. 16% 17% Q5. My organization understands what needs to be done following a material data breach to prevent negative public opinion, blog posts and media reports. 16% 16% Q6. Following a data breach, a credit monitoring and/or identity theft protection product is the best protection for consumers. 23% 31% Part 2. Data security preparedness Q7. Does your organization have the following technologies in place to quickly detect a data breach? Please select all that apply. Pct% Security Incident & Event Management 31% Intrusion prevention systems 54% Analysis of netflow or packet captures 25% Mobile Device Management (MDM) 34% Anti-virus 89% None of the above 5% Unsure 0% Total 238% Ponemon Institute© Research Report Page 18
  • 20. Q8. In the past 12 months, has your organization increased its investment in security technologies in order to be able to detect and respond quickly to a data breach? Pct% Yes 48% No 46% Unsure 6% Total 100% Q9. Has your organization performed risk or impact assessments to determine areas vulnerable to a data breach? Pct% Yes 44% No 51% Unsure 5% Total 100% Q10. How frequently does your organization monitor its information systems for unusual or anomalous traffic? Pct% Continuous monitoring 20% Daily 21% Weekly 8% Monthly 4% Quarterly 2% Annually 1% Never 28% Unsure 16% Total 100% Q11. Does your organization use standard or model contract terms (preferably with indemnification) with third parties, vendors or business partners? FY 2014 FY 2013 Yes 70% 65% No 25% 28% Unsure 5% 7% Total 100% 100% Q12. Does your organization have a privacy/data protection awareness program for employees and other stakeholders who have access to sensitive or confidential personal information? FY 2014 FY 2013 Yes 54% 44% No 43% 52% Unsure 3% 4% Total 100% 100% Q13. Does your organization have a data breach or cyber insurance policy? FY 2014 FY 2013 Yes 26% 10% No 68% 82% Unsure 6% 8% Total 100% 100% Ponemon Institute© Research Report Page 19
  • 21. Q14. What is the biggest barrier to improving the ability of IT security to respond to a data breach? Please select the top two reasons. Pct% Lack of investment in much needed technologies 21% Lack of expertise 23% Lack of C-suite support 15% Third party access to or management of data 40% Lack of visibility into end-user access of sensitive and confidential information 56% Proliferation of mobile devices and cloud services 43% None of the above 2% Total 200% Part 3. Data breach preparedness. The following questions are intended to determine how well prepared an organization is to respond to a data breach. Q15. What is your source for information about how best to respond to a data breach? Please check all that apply Pct% Privacy and security publications and websites 65% Privacy and security associations and conferences 47% Information from forensics firms, cyber insurance providers, identity theft/credit monitoring companies 40% Business publications and television programs 15% None of the above 15% Total 182% Q16a. Is your company’s board of directors, chairman and CEO informed and involved in plans to deal with a possible data breach? Pct% Yes 29% No 59% Don’t know 12% Total 100% Q16b. If yes, how are they involved? Pct% They approve funds and resources for data breach response efforts 50% They participate in a high level review of the data breach response plan in place 45% They have requested to be notified ASAP if a material data breach occurs 36% They participate in a high level review of the organization’s data protection and privacy practices 18% Other 2% Total 151% Q17a. Does your organization have a data breach response plan in place? FY 2014 FY 2013 Yes 73% 61% No 22% 30% Don’t know 5% 9% Total 100% 100% Q17b. If no, why? [Proceed to Q23] Pct% No resources or budget 44% Not important to have data breach response plan in place 25% Lack of C-level support 16% Outsourced to consultants 13% Other 2% Total 100% Ponemon Institute© Research Report Page 20
  • 22. Q17c. If yes, how often does the organization review and update the plan? Pct% Each quarter 3% Twice per year 5% Once each year 14% No set time period for reviewing and updating the plan 41% We have not reviewed or updated since the plan was put in place 37% Total 100% Q18a. Does your organization have a data breach response team? FY 2014 FY 2013 Yes 72% 67% No 23% 25% Unsure 5% 8% Total 100% 100% Q18b. If yes, who is the primary person/function to manage the data breach response team? Pct% General Counsel 5% Head of PR and communications 5% Head of Business Continuity Management 10% Chief Privacy Officer 4% Chief Information Officer 8% Compliance Officer 12% Human Resources 2% Chief Security Officer 6% Chief Information Security Officer 21% Chief Risk Officer 6% No one person/department has been designated to manage data breach response 21% Total 100% Q19. Who is most committed to having an effective data breach response plan in place? Please select only one person. Pct% Chief Executive Officer 6% Board of Directors 4% General Counsel 11% Head of PR and communications 10% Head of Business Continuity Management 7% Chief Privacy Officer 0% Chief Information Officer 6% Chief Technology Officer 0% Compliance Officer 15% Human Resources 0% Chief Security Officer 5% Chief Information Security Officer 25% Chief Risk Officer 11% Total 100% Ponemon Institute© Research Report Page 21
  • 23. Q20. What departments participate in the organization’s data breach response? Please select all that apply. Pct% Office of the CEO and Board of Directors 27% Legal and compliance 76% Privacy function 19% IT function 26% IT security 85% Human Resources 22% Risk management 38% Communication and public relations 65% Business continuity management/disaster recovery 38% Other 5% Total 401% Q21. How effective is your organization in developing and executing a data breach response plan? Pct% Very effective 9% Effective 21% Somewhat effective 23% Not effective 30% Unsure 17% Total 100% Q22. How could the data breach response plan become more effective? Please select all that apply. Pct% Conduct more fire drills to practice data breach response 77% More participation and oversight from senior executives 70% Individuals with a high level of expertise in security assigned to the team 63% Individuals with a high level of expertise in compliance with privacy, data protection laws and regulations 45% A budget dedicated to data breach preparedness 69% Other 2% Total 326% Q23a. Does your organization have a retainer or master service agreement with a third-party firm that will help it prepare and respond to a data breach or security incident? Pct% Yes 28% No 66% Unsure 6% Total 100% Q23b. If yes, what type of provider? Please check all that apply. Pct% Identity theft and/or credit monitoring provider 43% Call center 37% Data breach resolution provider (i.e.notification, protection products) 49% Outside legal counsel 76% Forensic/IT security provider 61% Public relations firm 36% Regulatory influencer/lobbyist 15% Total 317% Ponemon Institute© Research Report Page 22
  • 24. Q24. Does your organization train customer service personnel on how to respond to questions about a data breach incident? FY 2014 FY 2013 Yes 34% 30% No 49% 52% Unsure 17% 18% Total 100% 100% Part 5. Organizational characteristics & respondent demographics D1. What organizational level best describes your current position? Pct% Senior Executive 8% Vice President 8% Director 28% Manager 27% Supervisor 16% Technician 8% Staff 4% Contractor 1% Other 0% Total 100% D2. Check the Primary Person you report to within your organization. Pct% CEO/Executive Committee 5% Chief Financial Officer 4% General Counsel 14% Chief Privacy Officer 8% Chief Information Officer 19% Compliance Officer 19% Human Resources VP 2% Chief Information Security Officer 16% Chief Security Officer 4% Chief Risk Officer 3% Other 6% Total 100% Ponemon Institute© Research Report Page 23
  • 25. D3. What industry best describes your organization’s industry focus? Pct% Agriculture & food services 1% Communications 2% Defense & aerospace 1% Education & research 2% Energy & utilities 3% Entertainment & media 4% Financial services 19% Healthcare & pharmaceuticals 13% Hospitality 5% Industrial 9% Public sector 11% Retail 10% Services 8% Technology & software 7% Transportation 4% Other 1% Total 100% D4. What is the worldwide headcount of your organization? Pct% Less than 500 11% 500 to 1,000 19% 1,001 to 5,000 24% 5,001 to 25,000 20% 25,001 to 75,000 17% More than 75,000 9% Total 100% Ponemon Institute Advancing Responsible Information Management Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations. As a member of the Council of American Survey Research Organizations (CASRO), we uphold strict data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or company identifiable information in our business research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions. Ponemon Institute© Research Report Page 24