Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on the Cyber Resilient Organization

IBM Security
IBM SecurityIBM Security
Leaders & Laggards:
The 2019 Cyber Resilient Organization Study
1
Sponsored by
Our Speakers
Dr. Larry Ponemon
The Ponemon Institute
Maria Battaglia
IBM Security
The Ponemon
Institute
Ponemon Institute Presentation Private and Confidential 4
Cyber Resilience
An enterprise’s capacity to
maintain its core purpose and
integrity in the face of
cyberattacks through the
alignment of prevention,
detection and response
capabilities to manage, mitigate
and move on from cyberattacks.
The Ponemon Study on The Cyber Resilient
Organization YOY Trends Since 2015
Ponemon Institute Presentation Private and Confidential 5
Challenges
Implementing and practicing a response plan
Containing the growing number & severity of cyber
attacks
Managing a large number of tools & solutions
Complying to GDPR
Improvements
Organizations gained overall Cyber
Resilience
Better Ability to Prevent Attacks
More value on Cyber Resilience
2019 Study
Results
Ponemon Institute Presentation Private and Confidential 6
The 2019 Study on Cyber Resilient Organization
Ponemon Institute Presentation Private and Confidential
In Year 4
3,655
45%
12 Countries
7
Southeast Asian countries (ASEAN),
Australia, Brazil, Canada, Germany,
France, India, Japan, The Middle East
(UAE/Saudi Arabia). The United
Kingdom & the United States
IT & Security Professionals
Respondents Manager level and
above
Able to Benchmark at scale
Organizations rate their Cyber Resilience as better
but all else is steady
Ponemon Institute Presentation Private and Confidential 8
32%
40%
49%
53%
48%
55%
52%
50%
54%54% 53% 53%
49%
53%
0%
10%
20%
30%
40%
50%
60%
Cyber
resilience
Prevent a cyber
attack
Quickly detect
a cyber attack
Contain a cyber
attack
Respond to a
cyber attack *
* Response not available in 2016
FY2016 FY2017 FY2018
6%
Improvement in
Cyber Resilience
from 2016 – today.
1 = low ability to 10 = high ability, 7+ responses reported
In 2019, top ways to improve CyberResilience were hiring,
visibility into applications, and improving information
governance practices
Ponemon Institute Presentation Private and Confidential 9
17%
24%
28%
29%
36%
40%
50%
56%
57%
62%
15%
23%
29%
30%
39%
39%
47%
60%
57%
61%
0% 10% 20% 30% 40% 50% 60% 70%
Board-level reporting on the organization’s…
C-level buy-in and support for the…
Training for end-users
Training and certification for Cybersecurity…
Engaging a managed security services…
Elimination of silo and turf issues
Implementation of new technology,…
Improved information governance practices
Visibility into applications and data assets
Hiring skilled personnel
FY2017 FY2018
Organizations measured these improvements based on cyber attacks
prevented, time shortened to identify the incident & to contain the
incident.
More than one response permitted
Ponemon Institute Presentation Private and Confidential 10
1%
12%
15%
16%
22%
22%
27%
31%
48%
51%
55%
0% 10% 20% 30% 40% 50% 60%
Other
Increased market share
Decreased operating cost
Increased share value
Enhanced reputation and…
Increased revenues
Data center availability (uptime)
Increased productivity of employees
Time to contain the incident
Time to identify the incident
Cyber attacks prevented
Cybersecurity & cyber resilience budget remains steady
Ponemon Institute Presentation Private and Confidential 11
Extrapolated average (millions) US$ 2018 2017 2016
Cybersecurity budget $11.6 $11.3 $11.4
Percentage allocated to cyber resilience
activities
31% 30% 30%
Total average budget allocated to cyber
resilience
$3.6 $3.4 $3.4
2019 Cyber Resilience Deeper
Findings
Ponemon Institute Presentation Private and Confidential 12
Studied the High Performers
- Technology Adoption Trend
Automation
- Alignment between Privacy & Cyber
Security
High Performers
Ponemon Institute Presentation Private and Confidential 13
Represent 26% of the 3655
in the study
Highest level of cyber resilience
More prepared to respond
Less impacted by cyber threats.
Report less attacks, better
containment and recovery
Ponemon Institute Presentation Private and Confidential
Confidence
Dedication
Communication
Skills
Industry
Awareness
Streamlined SOC
14
Who are High Performers?
High Performers See Results Across All Areas
IBM Security / © 2019 IBM Corporation 15
preventing
an attack
+16%
detecting
an attack
+23%
responding to
an attack
+15%
containing an
attack
+25%
Better
CyberResilience
+18%
Ponemon Institute Presentation Private and Confidential 16
High Performers have less data breaches
Very frequently and Frequently responses
combined
30%
45%
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
50%
High performer Overall
High performers experience
15%less data breaches than the
overall group .
How Do High
Performers
Achieve Better
Overall
CyberResilience?
Ponemon Institute Presentation Private and Confidential 18
69%
31%
56%
44%
0%
10%
20%
30%
40%
50%
60%
70%
80%
Yes No
High performer Overall
High performers are more likely to share
information about data breaches with
government or industry peers.
13%
more likely to
participate in threat
sharing
70%
produce either a formal or
‘ad hoc’ report on the
organizations Cyber
Resilience to their
executive level and Board
Ponemon Institute Presentation Private and Confidential
19
51%
19%
30%
40%
21%
39%
0%
10%
20%
30%
40%
50%
60%
Yes, formal report Yes, informal or
“ad hoc” report
No
High performer Overall
High Performers Talk to the Board and C Suite Regularly
High Performers Adopt and Deploy New Methods &
Technologies
Ponemon Institute Presentation Private and Confidential 20
+7% Threat Sharing & Intel
Programs
+10% Use DevOPs & Secure SDLC
+12% Use of Cybersecurity
Analytics
+12% Leverage AI
60% 57%
45%
32%
53%
47%
33%
20%
0%
10%
20%
30%
40%
50%
60%
70%
High automation Overall
High performers embrace both artificial intelligence and
machine learning
Ponemon Institute Presentation Private and Confidential 21
Embraced AI & ML
+82% High Performers are using in
moderately or significantly
Only +18% insignificant
or no automation versus 30% of all
organizations
34%
48%
8% 10%
23%
48%
11%
18%
0%
10%
20%
30%
40%
50%
60%
Yes,
significant
use
Yes,
moderate use
Yes,
insignificant
No use
High performer Overall
Ponemon Institute Presentation Private and Confidential 22
0% 1%
9%
43%
47%
2%
6%
17%
43%
32%
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
50%
1 or 2 3 or 4 5 or 6 7 or 8 9 or 10
High performer Overall
High Performers value Automation
On a scale From 1 = low value to 10 = high value
High performers
are
15%
More likely to rate
automation as a 9
and above
Ponemon Institute Presentation Private and Confidential 23
24%
25%
27%
23%
5%
9%
31%
55%
0% 10% 20% 30% 40% 50% 60%
We don’t have a CSIRP
Our CSIRP is informal or “ad hoc”
We have a CSIRP, but is not applied
consistently across the enterprise
We have a CSIRP that is applied
consistently across the entire enterprise
High performer Overall
High Performers have a set cybersecurity incident
response plan (CSIRP)
32%
Of high performers have a
CSIRP that is applied
consistently across the
entire enterprise
Automations impact on
CyberResilience
Ponemon Institute Presentation Private and Confidential 24
Threat Sharing
& Advanced
Technologies
Prevention Confidence
Skilled
Professionals
Reduce
Complexity
GDPR
Compliance
Ponemon Institute Presentation Private and Confidential 25
30%
33%
48%
41%
43%
60%
0% 10% 20% 30% 40% 50% 60% 70%
Staffing for cybersecurity is sufficient to achieve a
high level of cyber resilience
Funding for cybersecurity is sufficient to achieve a
high level of cyber resilience
Too many separate security solutions and
technologies are deployed which increases
operational complexity and reduces visibility
High performer Overall
High Performers have a greater ability
to achieve a high level of cyber
resilience
Strongly agree and Agree responses combined
Collaboration
between privacy
and cyber
security improves
cyber resilience
Ponemon Institute Presentation Private and Confidential 26
Organizations that implement automation recognize the
importance of the privacy role
Essential and Very important responses combined
Ponemon Institute Presentation Private and Confidential 27
66%
71%
65% 62%
0%
10%
20%
30%
40%
50%
60%
70%
80%
The importance of the privacy role The importance of aligning the privacy and
cybersecurity roles
High automation Overall
If alignment is essential or very important, why?
More than one response permitted
Ponemon Institute Presentation Private and Confidential 28
2%
48%
49%
60%
63%
0% 10% 20% 30% 40% 50% 60% 70%
Other
Increase in perceived trustworthiness
More effective approach to compliance with data
protection regulations (such as GDPR)
Less redundancy and more efficiency in both
privacy and cybersecurity operations
Reduction in silos and turf issues
How long has your organization’s
current CPO or privacy leader held
their position?
March 2019
Ponemon Institute Presentation Private and Confidential 29
27%
11%
19%
20%
14%
9%
0% 5% 10% 15% 20% 25% 30%
Currently, we don’t have a CPO or privacy
leader
Less than 1 year
1 to 3 years
4 to 6 years
7 to 10 years
More than 10 years
Average full-time headcount of the organization’s privacy
function today and what it should be
Extrapolated values presented
Ponemon Institute Presentation Private and Confidential 30
3.21
3.95
1.00
1.50
2.00
2.50
3.00
3.50
4.00
4.50
Full-time equivalent (FTE) headcount of
your privacy function today
What the full-time equivalent (FTE) privacy
headcount should be to achieve cyber
resilience
Recommendations for High Cyber Resilience
Ponemon Institute Presentation Private and Confidential 31
Focus on
Prevention
Build &
Deploy CSIRP
widely
Retain &
Train Talent
Invest in
Automation
Align Privacy &
Security
Value Privacy
function
Participate in Threat
Sharing
Page 32Ponemon Institute Presentation Private and Confidential
Questions?
Caveats
Ponemon Institute Presentation Private and Confidential 33
This study utilizes a confidential and proprietary benchmark method that has been successfully deployed in earlier Ponemon
Institute research. However, there are inherent limitations to benchmark research that need to be carefully considered before
drawing conclusions from findings.
Non-response bias: The current findings are based on a sample of survey returns. We sent surveys to a representative sample of
individuals, resulting in a large number of usable returned responses. Despite non-response tests, it is always possible that
individuals who did not participate are substantially different in terms of underlying beliefs from those who completed the
instrument.
Sampling-frame bias: The accuracy is based on contact information and the degree to which the list is representative of individuals
who are IT or IT security practitioners. We also acknowledge that the results may be biased by external events such as media
coverage. Finally, because we used a Web-based collection method, it is possible that non-Web responses by mailed survey or
telephone call would result in a different pattern of findings.
Self-reported results: The quality of survey research is based on the integrity of confidential responses received from subjects.
While certain checks and balances can be incorporated into the survey process, there is always the possibility that a subject did not
provide accurate responses.
Ponemon Institute Presentation Private and Confidential 34
92%
79%
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
High performer Overall
It is very important to have skilled
cybersecurity professionals in a CSIRP
1 = low importance to 10 = high importance,
7+ responses reported
Ponemon Institute Presentation Private and Confidential 35
49%
56%
60%
61%
56%
62%
65%
66%
0% 10% 20% 30% 40% 50% 60% 70%
Leaders recognize that cyber resilience
affects brand and reputation
Leaders recognize that enterprise risks
affect cyber resilience
Leaders recognize that automation,
machine learning, artificial intelligence
and orchestration strengthens our…
Leaders recognize that cyber resilience
affects revenues
High performer Overall
Senior management’s awareness about the
positive impact of cyber resilience on the
enterprise
Strongly agree and Agree responses combined
Ponemon Institute Presentation Private and Confidential 36
35%
35%
30%
23%
24%
53%
0% 10% 20% 30% 40% 50% 60%
We have too many security solutions and
technologies to achieve cyber resilience
We do not have enough security
solutions and technologies to achieve
cyber resilience
We have the right number of security
solutions and technologies to achieve
cyber resilience
High performer Overall
What one statement best describes the
number of separate security technologies
deployed by your organization
The eight most effective security
technologies
Twenty-two technologies were listed in
the survey instrument
Ponemon Institute Presentation Private and Confidential 37
44%
50%
53%
53%
55%
56%
56%
69%
55%
52%
59%
53%
41%
70%
58%
52%
53%
58%
41%
71%
0% 10% 20% 30% 40% 50% 60% 70% 80%
Intrusion detection & prevention
Network traffic surveillance
Intelligence and threat sharing *
Anti-malware solution (AVAM)
Cryptographic technologies *
Incident response platform
Security information & event management
Identity management & authentication
* Response not available in FY2016 & FY2017
FY2016 FY2017 FY2018
Some organizations do not find the
value in threat-sharing programs
Four responses permitted
Ponemon Institute Presentation Private and Confidential 38
3%
34%
39%
43%
43%
52%
53%
60%
73%
4%
9%
16%
11%
19%
24%
33%
43%
40%
4%
11%
16%
10%
21%
22%
33%
42%
42%
0% 10% 20% 30% 40% 50% 60% 70% 80%
Other
Do not know about options to share
intelligence
Lack of incentives
Potential liability of sharing
Anti-competitive concerns
Risk of the exposure of sensitive and
confidential information
Cost
Lack of resources
No perceived benefit to my organization
FY2016 FY2017 FY2018
73%
of organizations
do not see a
benefit to threat-
sharing programs
Threat sharing paves the way for
collaboration between peers and
industry groups
Three choices allowed
Ponemon Institute Presentation Private and Confidential 39
46%
52%
55%
58%
58%
58%
58%
72%
57%
32%
52%
75%
53%
33%
0% 10% 20% 30% 40% 50% 60% 70% 80%
Reduces the cost of detecting and
preventing data breaches
Improves the effectiveness of our incident
response plan
Enhances the timeliness of incident
response
Improves the cyber resilience of my
organization *
Improves the ability to detect, contain and
respond *
Fosters collaboration among peers,
industry groups and government
* Response not available in 2016 & 2017
FY2016 FY2017 FY2018
1 de 39

Recomendados

Accenture Banking Security Index por
Accenture Banking Security IndexAccenture Banking Security Index
Accenture Banking Security Indexaccenture
2.1K visualizações2 slides
2018 U.S State of Cybercrime por
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of CybercrimeIDG
2.3K visualizações9 slides
Companies Aware, but Not Prepared for GDPR por
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRImperva
3.1K visualizações9 slides
Decoding Organizational DNA por
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNAaccenture
913 visualizações16 slides
Securing the Digital Economy: Reinventing the Internet por
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
707 visualizações12 slides
Cybersecurity and Healthcare - HIMSS 2018 Survey por
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyImperva
10.2K visualizações15 slides

Mais conteúdo relacionado

Mais procurados

EMA Megatrends in Cyber-Security por
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEnterprise Management Associates
131 visualizações39 slides
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020? por
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?AGILLY
250 visualizações34 slides
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ... por
 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ... 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...Proofpoint
709 visualizações19 slides
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration por
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
1.3K visualizações27 slides
Cyber Secuirty Visualization por
Cyber Secuirty VisualizationCyber Secuirty Visualization
Cyber Secuirty VisualizationDoug Cogswell
95 visualizações31 slides
Scalar security study2017_slideshare_rev[1] por
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Tracey Ong
82 visualizações23 slides

Mais procurados(20)

Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020? por AGILLY
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
AGILLY250 visualizações
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ... por Proofpoint
 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ... 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
Proofpoint709 visualizações
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration por IBM Security
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
IBM Security1.3K visualizações
Cyber Secuirty Visualization por Doug Cogswell
Cyber Secuirty VisualizationCyber Secuirty Visualization
Cyber Secuirty Visualization
Doug Cogswell95 visualizações
Scalar security study2017_slideshare_rev[1] por Tracey Ong
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]
Tracey Ong82 visualizações
Cyber security: Five leadership issues worthy of board and executive attention por Ramón Gómez de Olea y Bustinza
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
Ramón Gómez de Olea y Bustinza457 visualizações
How to Improve Threat Detection & Simplify Security Operations por IBM Security
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
IBM Security1.9K visualizações
The Cyber Security Readiness of Canadian Organizations por Scalar Decisions
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
Scalar Decisions2.2K visualizações
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ... por IBM Security
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
IBM Security3.6K visualizações
Trends in Information Security por CompTIA
Trends in Information SecurityTrends in Information Security
Trends in Information Security
CompTIA2.1K visualizações
2015 Energy Industry Cybersecurity Research Update por GridCyberSec
2015 Energy Industry Cybersecurity Research Update2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update
GridCyberSec270 visualizações
Ruben Melendez - Economically Justifying IT Security Initiatives por centralohioissa
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
centralohioissa824 visualizações
Security Program Guidance and Establishing a Culture of Security por Doug Copley
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of Security
Doug Copley881 visualizações
Building Human Intelligence – Pun Intended por EnergySec
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun Intended
EnergySec920 visualizações
SVB Cybersecurity Impact on Innovation Report - Overview por Silicon Valley Bank
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
Silicon Valley Bank4.9K visualizações
SVB Cybersecurity Impact on Innovation Report por Silicon Valley Bank
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
Silicon Valley Bank4.9K visualizações
Executive Summary of the 2016 Scalar Security Study por Scalar Decisions
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
Scalar Decisions792 visualizações
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full... por Accenture Technology
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Accenture Technology5.3K visualizações
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy por Mighty Guides, Inc.
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Mighty Guides, Inc.258 visualizações

Similar a Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on the Cyber Resilient Organization

Cloud Management in the U.S. Federal Government por
Cloud Management in the U.S. Federal GovernmentCloud Management in the U.S. Federal Government
Cloud Management in the U.S. Federal Governmentscoopnewsgroup
609 visualizações28 slides
CompTIA International Trends in Cybersecurity por
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA
665 visualizações19 slides
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk por
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskLumension
874 visualizações30 slides
Security Priorities Sample Slides 2023.pdf por
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfIDG
165 visualizações9 slides
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe por
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe TrustArc
805 visualizações38 slides
CompTIA - IT Security Sales Practices in the Channel por
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA
1K visualizações6 slides

Similar a Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on the Cyber Resilient Organization(20)

Cloud Management in the U.S. Federal Government por scoopnewsgroup
Cloud Management in the U.S. Federal GovernmentCloud Management in the U.S. Federal Government
Cloud Management in the U.S. Federal Government
scoopnewsgroup609 visualizações
CompTIA International Trends in Cybersecurity por CompTIA
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
CompTIA665 visualizações
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk por Lumension
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Lumension874 visualizações
Security Priorities Sample Slides 2023.pdf por IDG
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
IDG 165 visualizações
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe por TrustArc
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
TrustArc805 visualizações
CompTIA - IT Security Sales Practices in the Channel por CompTIA
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel
CompTIA1K visualizações
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P... por TrustArc
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
TrustArc469 visualizações
Security Priorities Sample Slides 2023.pdf por IDG
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
IDG 20 visualizações
Legal Firms and the Struggle to Protect Sensitive Data por Bluelock
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
Bluelock114 visualizações
Legal Firms and the Struggle to Protect Sensitive Data por Kayla Catron
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
Kayla Catron115 visualizações
Security Awareness Training: Are We Getting Any Better at Organizational and ... por Enterprise Management Associates
Security Awareness Training: Are We Getting Any Better at Organizational and ...Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Enterprise Management Associates521 visualizações
Information Security Benchmarking 2015 por Capgemini
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
Capgemini15K visualizações
Event 16 12-15 global information security workforce study 1.0 por isc2-hellenic
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0
isc2-hellenic417 visualizações
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli... por IBM Security
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
IBM Security1.4K visualizações
EndpointSecurityConcerns2014 por Peggy Lawless
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014
Peggy Lawless133 visualizações
CompTIA 2014 IT Trends in Review por CompTIA
CompTIA 2014 IT Trends in ReviewCompTIA 2014 IT Trends in Review
CompTIA 2014 IT Trends in Review
CompTIA1.2K visualizações
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su... por Precisely
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Precisely266 visualizações
Meraj Ahmad - Information security in a borderless world por nooralmousa
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
nooralmousa922 visualizações

Mais de IBM Security

Automation: Embracing the Future of SecOps por
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
2K visualizações22 slides
Bridging the Gap between Privacy and Security: Using Technology to Manage Com... por
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
941 visualizações24 slides
Integrated Response with v32 of IBM Resilient por
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
1K visualizações21 slides
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P... por
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
775 visualizações12 slides
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated... por
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
742 visualizações18 slides
Accelerating SOC Transformation with IBM Resilient and Carbon Black por
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackIBM Security
966 visualizações20 slides

Mais de IBM Security(20)

Automation: Embracing the Future of SecOps por IBM Security
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
IBM Security2K visualizações
Bridging the Gap between Privacy and Security: Using Technology to Manage Com... por IBM Security
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
IBM Security941 visualizações
Integrated Response with v32 of IBM Resilient por IBM Security
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
IBM Security1K visualizações
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P... por IBM Security
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
IBM Security775 visualizações
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated... por IBM Security
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
IBM Security742 visualizações
Accelerating SOC Transformation with IBM Resilient and Carbon Black por IBM Security
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
IBM Security966 visualizações
Are You Ready to Move Your IAM to the Cloud? por IBM Security
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
IBM Security2K visualizações
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence por IBM Security
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
IBM Security3.2K visualizações
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec... por IBM Security
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
IBM Security1.1K visualizações
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ... por IBM Security
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
IBM Security4.2K visualizações
WannaCry Ransomware Attack: What to Do Now por IBM Security
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
IBM Security6.9K visualizações
IBM QRadar UBA por IBM Security
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
IBM Security5.7K visualizações
Mobile Vision 2020 por IBM Security
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
IBM Security1.5K visualizações
Retail Mobility, Productivity and Security por IBM Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
IBM Security1.4K visualizações
Close the Loop on Incident Response por IBM Security
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
IBM Security2.6K visualizações
Orchestrate Your Security Defenses; Protect Against Insider Threats por IBM Security
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
IBM Security1.2K visualizações
See How You Measure Up With MaaS360 Mobile Metrics por IBM Security
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
IBM Security1.2K visualizações
Valuing Data in the Age of Ransomware por IBM Security
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
IBM Security703 visualizações
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights por IBM Security
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
IBM Security2.7K visualizações
Top 12 Cybersecurity Predictions for 2017 por IBM Security
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
IBM Security1.3K visualizações

Último

El Arte de lo Possible por
El Arte de lo PossibleEl Arte de lo Possible
El Arte de lo PossibleNeo4j
34 visualizações35 slides
DSD-INT 2023 SFINCS Modelling in the U.S. Pacific Northwest - Parker por
DSD-INT 2023 SFINCS Modelling in the U.S. Pacific Northwest - ParkerDSD-INT 2023 SFINCS Modelling in the U.S. Pacific Northwest - Parker
DSD-INT 2023 SFINCS Modelling in the U.S. Pacific Northwest - ParkerDeltares
8 visualizações16 slides
Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea... por
Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea...Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea...
Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea...Safe Software
391 visualizações59 slides
DSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - Prida por
DSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - PridaDSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - Prida
DSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - PridaDeltares
17 visualizações9 slides
What Can Employee Monitoring Software Do?​ por
What Can Employee Monitoring Software Do?​What Can Employee Monitoring Software Do?​
What Can Employee Monitoring Software Do?​wAnywhere
18 visualizações11 slides
Winter '24 Release Chat.pdf por
Winter '24 Release Chat.pdfWinter '24 Release Chat.pdf
Winter '24 Release Chat.pdfmelbourneauuser
9 visualizações20 slides

Último(20)

El Arte de lo Possible por Neo4j
El Arte de lo PossibleEl Arte de lo Possible
El Arte de lo Possible
Neo4j34 visualizações
DSD-INT 2023 SFINCS Modelling in the U.S. Pacific Northwest - Parker por Deltares
DSD-INT 2023 SFINCS Modelling in the U.S. Pacific Northwest - ParkerDSD-INT 2023 SFINCS Modelling in the U.S. Pacific Northwest - Parker
DSD-INT 2023 SFINCS Modelling in the U.S. Pacific Northwest - Parker
Deltares8 visualizações
Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea... por Safe Software
Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea...Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea...
Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea...
Safe Software391 visualizações
DSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - Prida por Deltares
DSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - PridaDSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - Prida
DSD-INT 2023 Dam break simulation in Derna (Libya) using HydroMT_SFINCS - Prida
Deltares17 visualizações
What Can Employee Monitoring Software Do?​ por wAnywhere
What Can Employee Monitoring Software Do?​What Can Employee Monitoring Software Do?​
What Can Employee Monitoring Software Do?​
wAnywhere18 visualizações
Winter '24 Release Chat.pdf por melbourneauuser
Winter '24 Release Chat.pdfWinter '24 Release Chat.pdf
Winter '24 Release Chat.pdf
melbourneauuser9 visualizações
DevsRank por devsrank786
DevsRankDevsRank
DevsRank
devsrank78610 visualizações
DSD-INT 2023 Wave-Current Interaction at Montrose Tidal Inlet System and Its ... por Deltares
DSD-INT 2023 Wave-Current Interaction at Montrose Tidal Inlet System and Its ...DSD-INT 2023 Wave-Current Interaction at Montrose Tidal Inlet System and Its ...
DSD-INT 2023 Wave-Current Interaction at Montrose Tidal Inlet System and Its ...
Deltares9 visualizações
Citi TechTalk Session 2: Kafka Deep Dive por confluent
Citi TechTalk Session 2: Kafka Deep DiveCiti TechTalk Session 2: Kafka Deep Dive
Citi TechTalk Session 2: Kafka Deep Dive
confluent17 visualizações
Roadmap y Novedades de producto por Neo4j
Roadmap y Novedades de productoRoadmap y Novedades de producto
Roadmap y Novedades de producto
Neo4j43 visualizações
Software testing company in India.pptx por SakshiPatel82
Software testing company in India.pptxSoftware testing company in India.pptx
Software testing company in India.pptx
SakshiPatel827 visualizações
Advanced API Mocking Techniques por Dimpy Adhikary
Advanced API Mocking TechniquesAdvanced API Mocking Techniques
Advanced API Mocking Techniques
Dimpy Adhikary18 visualizações
WebAssembly por Jens Siebert
WebAssemblyWebAssembly
WebAssembly
Jens Siebert32 visualizações
DSD-INT 2023 Baseline studies for Strategic Coastal protection for Long Islan... por Deltares
DSD-INT 2023 Baseline studies for Strategic Coastal protection for Long Islan...DSD-INT 2023 Baseline studies for Strategic Coastal protection for Long Islan...
DSD-INT 2023 Baseline studies for Strategic Coastal protection for Long Islan...
Deltares10 visualizações
Tridens DevOps por Tridens
Tridens DevOpsTridens DevOps
Tridens DevOps
Tridens9 visualizações
DSD-INT 2023 Thermobaricity in 3D DCSM-FM - taking pressure into account in t... por Deltares
DSD-INT 2023 Thermobaricity in 3D DCSM-FM - taking pressure into account in t...DSD-INT 2023 Thermobaricity in 3D DCSM-FM - taking pressure into account in t...
DSD-INT 2023 Thermobaricity in 3D DCSM-FM - taking pressure into account in t...
Deltares9 visualizações
MariaDB stored procedures and why they should be improved por Federico Razzoli
MariaDB stored procedures and why they should be improvedMariaDB stored procedures and why they should be improved
MariaDB stored procedures and why they should be improved
Federico Razzoli8 visualizações
How to Make the Most of Regression and Unit Testing.pdf por Abhay Kumar
How to Make the Most of Regression and Unit Testing.pdfHow to Make the Most of Regression and Unit Testing.pdf
How to Make the Most of Regression and Unit Testing.pdf
Abhay Kumar10 visualizações
Software evolution understanding: Automatic extraction of software identifier... por Ra'Fat Al-Msie'deen
Software evolution understanding: Automatic extraction of software identifier...Software evolution understanding: Automatic extraction of software identifier...
Software evolution understanding: Automatic extraction of software identifier...
Ra'Fat Al-Msie'deen7 visualizações
A first look at MariaDB 11.x features and ideas on how to use them por Federico Razzoli
A first look at MariaDB 11.x features and ideas on how to use themA first look at MariaDB 11.x features and ideas on how to use them
A first look at MariaDB 11.x features and ideas on how to use them
Federico Razzoli44 visualizações

Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on the Cyber Resilient Organization

  • 1. Leaders & Laggards: The 2019 Cyber Resilient Organization Study 1 Sponsored by
  • 2. Our Speakers Dr. Larry Ponemon The Ponemon Institute Maria Battaglia IBM Security
  • 4. Ponemon Institute Presentation Private and Confidential 4 Cyber Resilience An enterprise’s capacity to maintain its core purpose and integrity in the face of cyberattacks through the alignment of prevention, detection and response capabilities to manage, mitigate and move on from cyberattacks.
  • 5. The Ponemon Study on The Cyber Resilient Organization YOY Trends Since 2015 Ponemon Institute Presentation Private and Confidential 5 Challenges Implementing and practicing a response plan Containing the growing number & severity of cyber attacks Managing a large number of tools & solutions Complying to GDPR Improvements Organizations gained overall Cyber Resilience Better Ability to Prevent Attacks More value on Cyber Resilience
  • 6. 2019 Study Results Ponemon Institute Presentation Private and Confidential 6
  • 7. The 2019 Study on Cyber Resilient Organization Ponemon Institute Presentation Private and Confidential In Year 4 3,655 45% 12 Countries 7 Southeast Asian countries (ASEAN), Australia, Brazil, Canada, Germany, France, India, Japan, The Middle East (UAE/Saudi Arabia). The United Kingdom & the United States IT & Security Professionals Respondents Manager level and above Able to Benchmark at scale
  • 8. Organizations rate their Cyber Resilience as better but all else is steady Ponemon Institute Presentation Private and Confidential 8 32% 40% 49% 53% 48% 55% 52% 50% 54%54% 53% 53% 49% 53% 0% 10% 20% 30% 40% 50% 60% Cyber resilience Prevent a cyber attack Quickly detect a cyber attack Contain a cyber attack Respond to a cyber attack * * Response not available in 2016 FY2016 FY2017 FY2018 6% Improvement in Cyber Resilience from 2016 – today. 1 = low ability to 10 = high ability, 7+ responses reported
  • 9. In 2019, top ways to improve CyberResilience were hiring, visibility into applications, and improving information governance practices Ponemon Institute Presentation Private and Confidential 9 17% 24% 28% 29% 36% 40% 50% 56% 57% 62% 15% 23% 29% 30% 39% 39% 47% 60% 57% 61% 0% 10% 20% 30% 40% 50% 60% 70% Board-level reporting on the organization’s… C-level buy-in and support for the… Training for end-users Training and certification for Cybersecurity… Engaging a managed security services… Elimination of silo and turf issues Implementation of new technology,… Improved information governance practices Visibility into applications and data assets Hiring skilled personnel FY2017 FY2018
  • 10. Organizations measured these improvements based on cyber attacks prevented, time shortened to identify the incident & to contain the incident. More than one response permitted Ponemon Institute Presentation Private and Confidential 10 1% 12% 15% 16% 22% 22% 27% 31% 48% 51% 55% 0% 10% 20% 30% 40% 50% 60% Other Increased market share Decreased operating cost Increased share value Enhanced reputation and… Increased revenues Data center availability (uptime) Increased productivity of employees Time to contain the incident Time to identify the incident Cyber attacks prevented
  • 11. Cybersecurity & cyber resilience budget remains steady Ponemon Institute Presentation Private and Confidential 11 Extrapolated average (millions) US$ 2018 2017 2016 Cybersecurity budget $11.6 $11.3 $11.4 Percentage allocated to cyber resilience activities 31% 30% 30% Total average budget allocated to cyber resilience $3.6 $3.4 $3.4
  • 12. 2019 Cyber Resilience Deeper Findings Ponemon Institute Presentation Private and Confidential 12 Studied the High Performers - Technology Adoption Trend Automation - Alignment between Privacy & Cyber Security
  • 13. High Performers Ponemon Institute Presentation Private and Confidential 13
  • 14. Represent 26% of the 3655 in the study Highest level of cyber resilience More prepared to respond Less impacted by cyber threats. Report less attacks, better containment and recovery Ponemon Institute Presentation Private and Confidential Confidence Dedication Communication Skills Industry Awareness Streamlined SOC 14 Who are High Performers?
  • 15. High Performers See Results Across All Areas IBM Security / © 2019 IBM Corporation 15 preventing an attack +16% detecting an attack +23% responding to an attack +15% containing an attack +25% Better CyberResilience +18%
  • 16. Ponemon Institute Presentation Private and Confidential 16 High Performers have less data breaches Very frequently and Frequently responses combined 30% 45% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% High performer Overall High performers experience 15%less data breaches than the overall group .
  • 17. How Do High Performers Achieve Better Overall CyberResilience?
  • 18. Ponemon Institute Presentation Private and Confidential 18 69% 31% 56% 44% 0% 10% 20% 30% 40% 50% 60% 70% 80% Yes No High performer Overall High performers are more likely to share information about data breaches with government or industry peers. 13% more likely to participate in threat sharing
  • 19. 70% produce either a formal or ‘ad hoc’ report on the organizations Cyber Resilience to their executive level and Board Ponemon Institute Presentation Private and Confidential 19 51% 19% 30% 40% 21% 39% 0% 10% 20% 30% 40% 50% 60% Yes, formal report Yes, informal or “ad hoc” report No High performer Overall High Performers Talk to the Board and C Suite Regularly
  • 20. High Performers Adopt and Deploy New Methods & Technologies Ponemon Institute Presentation Private and Confidential 20 +7% Threat Sharing & Intel Programs +10% Use DevOPs & Secure SDLC +12% Use of Cybersecurity Analytics +12% Leverage AI 60% 57% 45% 32% 53% 47% 33% 20% 0% 10% 20% 30% 40% 50% 60% 70% High automation Overall
  • 21. High performers embrace both artificial intelligence and machine learning Ponemon Institute Presentation Private and Confidential 21 Embraced AI & ML +82% High Performers are using in moderately or significantly Only +18% insignificant or no automation versus 30% of all organizations 34% 48% 8% 10% 23% 48% 11% 18% 0% 10% 20% 30% 40% 50% 60% Yes, significant use Yes, moderate use Yes, insignificant No use High performer Overall
  • 22. Ponemon Institute Presentation Private and Confidential 22 0% 1% 9% 43% 47% 2% 6% 17% 43% 32% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 1 or 2 3 or 4 5 or 6 7 or 8 9 or 10 High performer Overall High Performers value Automation On a scale From 1 = low value to 10 = high value High performers are 15% More likely to rate automation as a 9 and above
  • 23. Ponemon Institute Presentation Private and Confidential 23 24% 25% 27% 23% 5% 9% 31% 55% 0% 10% 20% 30% 40% 50% 60% We don’t have a CSIRP Our CSIRP is informal or “ad hoc” We have a CSIRP, but is not applied consistently across the enterprise We have a CSIRP that is applied consistently across the entire enterprise High performer Overall High Performers have a set cybersecurity incident response plan (CSIRP) 32% Of high performers have a CSIRP that is applied consistently across the entire enterprise
  • 24. Automations impact on CyberResilience Ponemon Institute Presentation Private and Confidential 24 Threat Sharing & Advanced Technologies Prevention Confidence Skilled Professionals Reduce Complexity GDPR Compliance
  • 25. Ponemon Institute Presentation Private and Confidential 25 30% 33% 48% 41% 43% 60% 0% 10% 20% 30% 40% 50% 60% 70% Staffing for cybersecurity is sufficient to achieve a high level of cyber resilience Funding for cybersecurity is sufficient to achieve a high level of cyber resilience Too many separate security solutions and technologies are deployed which increases operational complexity and reduces visibility High performer Overall High Performers have a greater ability to achieve a high level of cyber resilience Strongly agree and Agree responses combined
  • 26. Collaboration between privacy and cyber security improves cyber resilience Ponemon Institute Presentation Private and Confidential 26
  • 27. Organizations that implement automation recognize the importance of the privacy role Essential and Very important responses combined Ponemon Institute Presentation Private and Confidential 27 66% 71% 65% 62% 0% 10% 20% 30% 40% 50% 60% 70% 80% The importance of the privacy role The importance of aligning the privacy and cybersecurity roles High automation Overall
  • 28. If alignment is essential or very important, why? More than one response permitted Ponemon Institute Presentation Private and Confidential 28 2% 48% 49% 60% 63% 0% 10% 20% 30% 40% 50% 60% 70% Other Increase in perceived trustworthiness More effective approach to compliance with data protection regulations (such as GDPR) Less redundancy and more efficiency in both privacy and cybersecurity operations Reduction in silos and turf issues
  • 29. How long has your organization’s current CPO or privacy leader held their position? March 2019 Ponemon Institute Presentation Private and Confidential 29 27% 11% 19% 20% 14% 9% 0% 5% 10% 15% 20% 25% 30% Currently, we don’t have a CPO or privacy leader Less than 1 year 1 to 3 years 4 to 6 years 7 to 10 years More than 10 years
  • 30. Average full-time headcount of the organization’s privacy function today and what it should be Extrapolated values presented Ponemon Institute Presentation Private and Confidential 30 3.21 3.95 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 Full-time equivalent (FTE) headcount of your privacy function today What the full-time equivalent (FTE) privacy headcount should be to achieve cyber resilience
  • 31. Recommendations for High Cyber Resilience Ponemon Institute Presentation Private and Confidential 31 Focus on Prevention Build & Deploy CSIRP widely Retain & Train Talent Invest in Automation Align Privacy & Security Value Privacy function Participate in Threat Sharing
  • 32. Page 32Ponemon Institute Presentation Private and Confidential Questions?
  • 33. Caveats Ponemon Institute Presentation Private and Confidential 33 This study utilizes a confidential and proprietary benchmark method that has been successfully deployed in earlier Ponemon Institute research. However, there are inherent limitations to benchmark research that need to be carefully considered before drawing conclusions from findings. Non-response bias: The current findings are based on a sample of survey returns. We sent surveys to a representative sample of individuals, resulting in a large number of usable returned responses. Despite non-response tests, it is always possible that individuals who did not participate are substantially different in terms of underlying beliefs from those who completed the instrument. Sampling-frame bias: The accuracy is based on contact information and the degree to which the list is representative of individuals who are IT or IT security practitioners. We also acknowledge that the results may be biased by external events such as media coverage. Finally, because we used a Web-based collection method, it is possible that non-Web responses by mailed survey or telephone call would result in a different pattern of findings. Self-reported results: The quality of survey research is based on the integrity of confidential responses received from subjects. While certain checks and balances can be incorporated into the survey process, there is always the possibility that a subject did not provide accurate responses.
  • 34. Ponemon Institute Presentation Private and Confidential 34 92% 79% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% High performer Overall It is very important to have skilled cybersecurity professionals in a CSIRP 1 = low importance to 10 = high importance, 7+ responses reported
  • 35. Ponemon Institute Presentation Private and Confidential 35 49% 56% 60% 61% 56% 62% 65% 66% 0% 10% 20% 30% 40% 50% 60% 70% Leaders recognize that cyber resilience affects brand and reputation Leaders recognize that enterprise risks affect cyber resilience Leaders recognize that automation, machine learning, artificial intelligence and orchestration strengthens our… Leaders recognize that cyber resilience affects revenues High performer Overall Senior management’s awareness about the positive impact of cyber resilience on the enterprise Strongly agree and Agree responses combined
  • 36. Ponemon Institute Presentation Private and Confidential 36 35% 35% 30% 23% 24% 53% 0% 10% 20% 30% 40% 50% 60% We have too many security solutions and technologies to achieve cyber resilience We do not have enough security solutions and technologies to achieve cyber resilience We have the right number of security solutions and technologies to achieve cyber resilience High performer Overall What one statement best describes the number of separate security technologies deployed by your organization
  • 37. The eight most effective security technologies Twenty-two technologies were listed in the survey instrument Ponemon Institute Presentation Private and Confidential 37 44% 50% 53% 53% 55% 56% 56% 69% 55% 52% 59% 53% 41% 70% 58% 52% 53% 58% 41% 71% 0% 10% 20% 30% 40% 50% 60% 70% 80% Intrusion detection & prevention Network traffic surveillance Intelligence and threat sharing * Anti-malware solution (AVAM) Cryptographic technologies * Incident response platform Security information & event management Identity management & authentication * Response not available in FY2016 & FY2017 FY2016 FY2017 FY2018
  • 38. Some organizations do not find the value in threat-sharing programs Four responses permitted Ponemon Institute Presentation Private and Confidential 38 3% 34% 39% 43% 43% 52% 53% 60% 73% 4% 9% 16% 11% 19% 24% 33% 43% 40% 4% 11% 16% 10% 21% 22% 33% 42% 42% 0% 10% 20% 30% 40% 50% 60% 70% 80% Other Do not know about options to share intelligence Lack of incentives Potential liability of sharing Anti-competitive concerns Risk of the exposure of sensitive and confidential information Cost Lack of resources No perceived benefit to my organization FY2016 FY2017 FY2018 73% of organizations do not see a benefit to threat- sharing programs
  • 39. Threat sharing paves the way for collaboration between peers and industry groups Three choices allowed Ponemon Institute Presentation Private and Confidential 39 46% 52% 55% 58% 58% 58% 58% 72% 57% 32% 52% 75% 53% 33% 0% 10% 20% 30% 40% 50% 60% 70% 80% Reduces the cost of detecting and preventing data breaches Improves the effectiveness of our incident response plan Enhances the timeliness of incident response Improves the cyber resilience of my organization * Improves the ability to detect, contain and respond * Fosters collaboration among peers, industry groups and government * Response not available in 2016 & 2017 FY2016 FY2017 FY2018