Identify and plug the security skills gap

Post on 18-Oct-2014

204 views 0 download

description

Infographic that looks at the key security issues, how breaches occor and the most comment defence techniques.

Transcript of Identify and plug the security skills gap

THE SKILLS GAP

© BCS, The Chartered Institute for IT, is the business name of The British Computer Society (Registered charity no. 292786) 2013

Sources: ‘Data Breach Overview: An Executive’s Guide to Data Breach Trends in 2012’, mobistealth.com, floridatechonline.com, siliconrepublic.com, ‘Surviving the Technical Security Skills Crisis’ - Forrester Consulting on behalf of IBM, ‘IT Executives Vision’ - IDG Research Services conducted for HP for 2020 (May 12), ISC Global Information Security Workforce Study 2013

THE ISSUE

?

In 2012, more than 267 million

data records were compromised in

2,644 reported incidents - up 117% over the previous year

In 2012, where insiders

were responsible for data

breaches, 56% of incidents

were accidental - the

result of user error and

inadequate training.

There are 50,000

victims of cybercrime

every hour

89% say that having qualified information security sta� is a top priority

80% believe it is di�cult to find and hire sta� that fit all requirements

92% say sta�ng issues contribute to heightened risk levels

Do you know how to identify and fill the skills gaps in your organisation?

SECURITYIdentify and plug the security skills gap

!

ATTACKHow breaches occur

Socialtactics(7%)

Privilegemisuse(5%)

Physicalattacks(10%)

Malware(69%)

Hacking(81%)

In an industry that's constantly changing, you need to help your people to stay ahead of the game

As The Chartered Institute for IT, we're always up-to-date with the latest trends

We can develop your employees’ skills so they can make decisions critical to your business

READY TO STAY SECURE?Contact us on

+44 (0) 1793 417755or visit enterprise.bcs.org

and help your teammeet the demands

of tomorrow.

DEFENCEMost common techniques

Intrusionprevention

Monitoringtechnologies

Dataencryption

AntivirusFirewalls

10001010010011111000101001001111

010010101001010110001010010011111000101001001111010010101001010101001010100101010100101010010101

senior IT executives are concerned about data privacy and information breaches

Hacking was the number

one breach type for the second

consecutive year in 2012⅔

The business sector accounted for

Incidents by sector Records exposed by sector

Business 60.6% 84.7%

12.6%

1.6%

1.1%

17.9%

12.0%

9.5%

Government

Education

Medical

Business

Government

Education

Medical

of information security breaches in 201285%