SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
2018 Global State of
Information Security Survey™
Strengthening digital society against cyber shocks
IDG Communications, Inc.
22018 Global State of Information Security Survey™ conducted by PwC, CSO and CIO.
3
Number of Security Incidents* Detected Continues to Drop
Q. What is the number of security incidents detected in the past 12 months? AND How confident are you that your organization has the ability to
correctly assign attribution to the attack?
* A security incident is defined as any adverse incident that threatens some aspect of computer security.
3,741
4,948
4,782
2018 Global State of Information Security Survey™ conducted by PwC, CSO and CIO.
6,853
4,782
3,458
2016 2017 2018
4
But Losses Per Incident Continue to Climb
Q. What is the number of security incidents detected in the past 12 months? AND What is the estimated total financial losses as a result of all security
incidents?
$364
$501
$578
2016 2017 2018
Are investing in
a security strategy
for the Internet
of Things
+58%
Increase in average
financial losses
per incident
since 2016
2018 Global State of Information Security Survey™ conducted by PwC, CSO and CIO.
5
Current Employees – #1 Source of Security Incidents
Q. Estimated likely source of incidents (Not all factors shown.)
2018 Global State of Information Security Survey™ conducted by PwC, CSO and CIO.
30%
26%
23%
20% 19% 19%
17% 17%
Current
employees
Former
employees
Unknown
hacker
Competitors Current service
providers/
consultants/
contractors
Organized
crime
Former service
providers/
consultants/
contractors
Activists/
activist
organizations/
hacktivistsInsider Outsider
6
To Strengthen Digital Ecosystems, Organizations
Plan to Address Security Safeguards
Q. What types of security safeguards does your organization plan to invest in over the next 12 months? AND What impact has digitization of the
business ecosystem had on your organization’s security spending?
49%
46% 45% 45% 43%
Improved
collaboration among
business,
digital & IT
Biometrics &
advanced
authentication
Security for the
Internet of Things
New security needs
related to evolving
business models
Digital enterprise
architecture
Say digitization
has increased
information
security spending
59%
2018 Global State of Information Security Survey™ conducted by PwC, CSO and CIO.
7
Adoption of Internet of Things Requires
Cybersecurity & Privacy Safeguards
Q. What policies, technologies and people skills does your organization plan to implement over the next 12 months to address the cybersecurity and privacy risks
associated with the Internet of Things (IoT)? AND Does your organization have a security strategy for the convergence of information, operational, and consumer
technologies (also known as the Internet of Things)?
2018 Global State of Information Security Survey™ conducted by PwC, CSO and CIO.
36%
34% 34%
32%
31%
Uniform cybersecurity
standards and policies for
IoT devices and systems
Assess device and system
interconnectivity and
vulnerability across the
business ecosystem
New data collection,
retention and destruction
policies
Employee training on IoT
security practices
Policies and technologies
to safeguard against
consumer privacy
violations
8
Board Leadership Must Be Further Engaged
Q. In which of the following areas does your organization’s Board of Directors actively participate?
19%
26%
31%
36%
39%
44%
45%
Review of security and privacy testing
Review roles and responsibilities
of security organization
Review of current security and privacy risks
Security technologies
Security policies
Overall security strategy
Security budget
2018 Global State of Information Security Survey™ conducted by PwC, CSO and CIO.
9
Continue the
Conversation
www.idg.com
Bob Bragdon
SVP/Publisher, CSO
EMAIL: bob_bragdon@idg.com
TWITTER: @BobOnSecurity

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Digital Business 2018
Digital Business 2018Digital Business 2018
Digital Business 2018
 
2018 State of the Network
2018 State of the Network2018 State of the Network
2018 State of the Network
 
2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of Cybercrime
 
CSO Pandemic Impact Survey, 2020
CSO Pandemic Impact Survey, 2020CSO Pandemic Impact Survey, 2020
CSO Pandemic Impact Survey, 2020
 
CIO Tech Poll: Tech Priorities 2019
CIO Tech Poll: Tech Priorities 2019CIO Tech Poll: Tech Priorities 2019
CIO Tech Poll: Tech Priorities 2019
 
2018 IDG Customer Engagement Study
2018 IDG Customer Engagement Study2018 IDG Customer Engagement Study
2018 IDG Customer Engagement Study
 
IDG 2020 Security Priorities Research
IDG 2020 Security Priorities ResearchIDG 2020 Security Priorities Research
IDG 2020 Security Priorities Research
 
CIO COVID-19 Impact Survey, Infographic
CIO COVID-19 Impact Survey, InfographicCIO COVID-19 Impact Survey, Infographic
CIO COVID-19 Impact Survey, Infographic
 
Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]
 
Understanding the Security-Specific Purchase Process [Infographic]
Understanding the Security-Specific Purchase Process [Infographic]Understanding the Security-Specific Purchase Process [Infographic]
Understanding the Security-Specific Purchase Process [Infographic]
 
IDG 2019 Digital Business infographic
IDG 2019 Digital Business infographicIDG 2019 Digital Business infographic
IDG 2019 Digital Business infographic
 
Understanding the Data & Analytics Specific Purchase Process [Infographic]
Understanding the Data & Analytics Specific Purchase Process [Infographic]Understanding the Data & Analytics Specific Purchase Process [Infographic]
Understanding the Data & Analytics Specific Purchase Process [Infographic]
 
Data Analytics is Driving The Business Forward
Data Analytics is Driving The Business ForwardData Analytics is Driving The Business Forward
Data Analytics is Driving The Business Forward
 
2020 IDG Role & Influence of the Technology Decision-Maker
2020 IDG Role & Influence of the Technology Decision-Maker2020 IDG Role & Influence of the Technology Decision-Maker
2020 IDG Role & Influence of the Technology Decision-Maker
 
CIO COVID Research Infographic
CIO COVID Research InfographicCIO COVID Research Infographic
CIO COVID Research Infographic
 
CIO CV-19 Impact Study
CIO CV-19 Impact StudyCIO CV-19 Impact Study
CIO CV-19 Impact Study
 
2020 State of the CIO Research
2020 State of the CIO Research2020 State of the CIO Research
2020 State of the CIO Research
 
6 Months In: How IT Leaders are Responding to the Pandemic
6 Months In: How IT Leaders are Responding to the Pandemic 6 Months In: How IT Leaders are Responding to the Pandemic
6 Months In: How IT Leaders are Responding to the Pandemic
 
Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides
 
CIO COVID-19 Impact Survey, Sample Slides
CIO COVID-19 Impact Survey, Sample SlidesCIO COVID-19 Impact Survey, Sample Slides
CIO COVID-19 Impact Survey, Sample Slides
 

Semelhante a 2018 Global State of Information Security Survey

What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 

Semelhante a 2018 Global State of Information Security Survey (20)

2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Global Threats| Cybersecurity|
Global Threats| Cybersecurity| Global Threats| Cybersecurity|
Global Threats| Cybersecurity|
 
Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...
 
Exploring the Tech Specific Purchase Process
Exploring the Tech Specific Purchase ProcessExploring the Tech Specific Purchase Process
Exploring the Tech Specific Purchase Process
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
 
Vodafone cyber ready barometer 2018
Vodafone cyber ready barometer 2018Vodafone cyber ready barometer 2018
Vodafone cyber ready barometer 2018
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint Webinar
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
 
Encuesta Mundial de Ciberseguridad de la Información 2017
Encuesta Mundial de Ciberseguridad de la Información 2017Encuesta Mundial de Ciberseguridad de la Información 2017
Encuesta Mundial de Ciberseguridad de la Información 2017
 
Securing the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustSecuring the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for Trust
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
The state of cyber resilience in the UK
The state of cyber resilience in the UKThe state of cyber resilience in the UK
The state of cyber resilience in the UK
 

Mais de IDG

Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
IDG
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
IDG
 

Mais de IDG (20)

Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
Role and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdfRole and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdf
 
2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
 
CIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdfCIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdf
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxState of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
 
State of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfState of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdf
 
R_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdfR_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdf
 
Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022
 
R-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdfR-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdf
 
Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022
 
Security Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdfSecurity Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdf
 
R_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdfR_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdf
 
Foundry Future of Work Study 2022
Foundry Future of Work Study 2022Foundry Future of Work Study 2022
Foundry Future of Work Study 2022
 
Data & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdfData & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdf
 
NEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfNEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdf
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22
 
R if data_analytics_03.08.22
R if data_analytics_03.08.22R if data_analytics_03.08.22
R if data_analytics_03.08.22
 
Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020
 
Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021
 

Último

Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
Sheetaleventcompany
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 

Último (20)

AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 

2018 Global State of Information Security Survey

  • 1. 2018 Global State of Information Security Survey™ Strengthening digital society against cyber shocks IDG Communications, Inc.
  • 2. 22018 Global State of Information Security Survey™ conducted by PwC, CSO and CIO.
  • 3. 3 Number of Security Incidents* Detected Continues to Drop Q. What is the number of security incidents detected in the past 12 months? AND How confident are you that your organization has the ability to correctly assign attribution to the attack? * A security incident is defined as any adverse incident that threatens some aspect of computer security. 3,741 4,948 4,782 2018 Global State of Information Security Survey™ conducted by PwC, CSO and CIO. 6,853 4,782 3,458 2016 2017 2018
  • 4. 4 But Losses Per Incident Continue to Climb Q. What is the number of security incidents detected in the past 12 months? AND What is the estimated total financial losses as a result of all security incidents? $364 $501 $578 2016 2017 2018 Are investing in a security strategy for the Internet of Things +58% Increase in average financial losses per incident since 2016 2018 Global State of Information Security Survey™ conducted by PwC, CSO and CIO.
  • 5. 5 Current Employees – #1 Source of Security Incidents Q. Estimated likely source of incidents (Not all factors shown.) 2018 Global State of Information Security Survey™ conducted by PwC, CSO and CIO. 30% 26% 23% 20% 19% 19% 17% 17% Current employees Former employees Unknown hacker Competitors Current service providers/ consultants/ contractors Organized crime Former service providers/ consultants/ contractors Activists/ activist organizations/ hacktivistsInsider Outsider
  • 6. 6 To Strengthen Digital Ecosystems, Organizations Plan to Address Security Safeguards Q. What types of security safeguards does your organization plan to invest in over the next 12 months? AND What impact has digitization of the business ecosystem had on your organization’s security spending? 49% 46% 45% 45% 43% Improved collaboration among business, digital & IT Biometrics & advanced authentication Security for the Internet of Things New security needs related to evolving business models Digital enterprise architecture Say digitization has increased information security spending 59% 2018 Global State of Information Security Survey™ conducted by PwC, CSO and CIO.
  • 7. 7 Adoption of Internet of Things Requires Cybersecurity & Privacy Safeguards Q. What policies, technologies and people skills does your organization plan to implement over the next 12 months to address the cybersecurity and privacy risks associated with the Internet of Things (IoT)? AND Does your organization have a security strategy for the convergence of information, operational, and consumer technologies (also known as the Internet of Things)? 2018 Global State of Information Security Survey™ conducted by PwC, CSO and CIO. 36% 34% 34% 32% 31% Uniform cybersecurity standards and policies for IoT devices and systems Assess device and system interconnectivity and vulnerability across the business ecosystem New data collection, retention and destruction policies Employee training on IoT security practices Policies and technologies to safeguard against consumer privacy violations
  • 8. 8 Board Leadership Must Be Further Engaged Q. In which of the following areas does your organization’s Board of Directors actively participate? 19% 26% 31% 36% 39% 44% 45% Review of security and privacy testing Review roles and responsibilities of security organization Review of current security and privacy risks Security technologies Security policies Overall security strategy Security budget 2018 Global State of Information Security Survey™ conducted by PwC, CSO and CIO.
  • 9. 9 Continue the Conversation www.idg.com Bob Bragdon SVP/Publisher, CSO EMAIL: bob_bragdon@idg.com TWITTER: @BobOnSecurity