InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All...

download InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.

If you can't read please download the document

Transcript of InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All...

  • Slide 1
  • InformationWeek 2014 Strategic Security Survey Research Findings 2014 Property of UBM Tech; All Rights Reserved
  • Slide 2 > 58% see an infected personal device connecting to the corporate network as a top endpoint security concern, making it the No. 1 response, ahead of phishing and lost devices. >> 56% say cyber-criminals pose the greatest threat to their organizations this year, the top answer, ahead of authorized users and employees at 49%. >> 31% conduct their own audits of cloud providers. >> 23% have experienced a security breach or espionage in the past year. Respondent breakdown: 41% have 5,000 or more employees; 30% are over 10,000. Government, financial services, and education are well-represented. Want more? Visit InformationWeek ReportsInformationWeek Reports Executive Summary v 2014 Property of UBM Tech; All Rights Reserved">
  • Enterprises outsource everything from server hosting to application development. Why not security? Look for this year to mark the start of a new era in information security, where organizations that can afford to build sophisticated analysis teams -- able to incorporate device context into security events data in a high-volume information steam -- do so, and those that can't hire specialized providers. "Managing the complexity of security" reclaimed the No. 1 spot among 10 challenges facing the 536 respondents to our InformationWeek 2014 Strategic Security Survey, all from organizations with 100 or more employees. More stats: >> 58% see an infected personal device connecting to the corporate network as a top endpoint security concern, making it the No. 1 response, ahead of phishing and lost devices. >> 56% say cyber-criminals pose the greatest threat to their organizations this year, the top answer, ahead of authorized users and employees at 49%. >> 31% conduct their own audits of cloud providers. >> 23% have experienced a security breach or espionage in the past year. Respondent breakdown: 41% have 5,000 or more employees; 30% are over 10,000. Government, financial services, and education are well-represented. Want more? Visit InformationWeek ReportsInformationWeek Reports Executive Summary v 2014 Property of UBM Tech; All Rights Reserved
  • Slide 3
  • Biggest challenges: managing complexity, enforcing policies 2014 Property of UBM Tech; All Rights Reserved
  • Slide 4
  • Vulnerability is largely unchanged 2014 Property of UBM Tech; All Rights Reserved
  • Slide 5
  • Most feel threats are getting more sophisticated 2014 Property of UBM Tech; All Rights Reserved
  • Slide 6
  • Most have not experienced security breach 2014 Property of UBM Tech; All Rights Reserved
  • Slide 7
  • Most common breach: Malware 2014 Property of UBM Tech; All Rights Reserved
  • Slide 8
  • Network/business apps most common victims 2014 Property of UBM Tech; All Rights Reserved
  • Slide 9
  • Top breach/espionage threats: Cyber-criminals, employees 2014 Property of UBM Tech; All Rights Reserved
  • Slide 10
  • Most use firewalls, email security tools 2014 Property of UBM Tech; All Rights Reserved
  • Slide 11
  • Firewalls considered most valuable 2014 Property of UBM Tech; All Rights Reserved
  • Slide 12
  • Most require strong passwords
  • Slide 13
  • Strong passwords, training valued most 2014 Property of UBM Tech; All Rights Reserved
  • Slide 14
  • Best way to manage vulnerabilities 2014 Property of UBM Tech; All Rights Reserved
  • Slide 15
  • Best way to achieve regulatory compliance 2014 Property of UBM Tech; All Rights Reserved
  • Slide 16
  • Who sets security policy? 2014 Property of UBM Tech; All Rights Reserved
  • Slide 17
  • Security budget 2014 Property of UBM Tech; All Rights Reserved
  • Slide 18
  • Security spending relatively consistent 2014 Property of UBM Tech; All Rights Reserved
  • Slide 19
  • How valuable are security investments? 2014 Property of UBM Tech; All Rights Reserved
  • Slide 20
  • Half consider mobile a minor security threat 2014 Property of UBM Tech; All Rights Reserved
  • Slide 21
  • MDM software used? 2014 Property of UBM Tech; All Rights Reserved
  • Slide 22
  • Top endpoint security concern: personal devices 2014 Property of UBM Tech; All Rights Reserved
  • Slide 23
  • Top cloud concerns: leaks, defects 2014 Property of UBM Tech; All Rights Reserved
  • Slide 24
  • Who does cloud risk assessments? 2014 Property of UBM Tech; All Rights Reserved
  • Slide 25
  • Who has SIEM systems? 2014 Property of UBM Tech; All Rights Reserved
  • Slide 26
  • Who has big data security analytics system? 2014 Property of UBM Tech; All Rights Reserved
  • Slide 27
  • Top security analytics: Hadoop 2014 Property of UBM Tech; All Rights Reserved
  • Slide 28
  • Big data analytics focus on endpoint, web activity 2014 Property of UBM Tech; All Rights Reserved
  • Slide 29
  • Who gets big data security info? 2014 Property of UBM Tech; All Rights Reserved
  • Slide 30
  • Most have security operations team 2014 Property of UBM Tech; All Rights Reserved
  • Slide 31
  • Who has insurance policy? 2014 Property of UBM Tech; All Rights Reserved
  • Slide 32
  • How is insurance need determined? 2014 Property of UBM Tech; All Rights Reserved
  • Slide 33
  • Most have not been directly targeted 2014 Property of UBM Tech; All Rights Reserved
  • Slide 34
  • Subscribe to threat service? 2014 Property of UBM Tech; All Rights Reserved
  • Slide 35
  • Security staffing 2014 Property of UBM Tech; All Rights Reserved
  • Slide 36
  • Security skills shortage: little change expected 2014 Property of UBM Tech; All Rights Reserved
  • Slide 37
  • Respondents job titles 2014 Property of UBM Tech; All Rights Reserved
  • Slide 38
  • Industries represented 2014 Property of UBM Tech; All Rights Reserved
  • Slide 39
  • Respondents company revenues 2014 Property of UBM Tech; All Rights Reserved
  • Slide 40
  • Respondents company sizes 2014 Property of UBM Tech; All Rights Reserved
  • Slide 41
  • Survey Name InformationWeek 2014 Strategic Security Survey Survey Date April 2014 Region North America Number of Respondents 536 at organizations with 100 or more employees Purpose To comprehensively assess the current state of security programs, where organizations are focusing their security efforts, and how IT is adapting to current threats and trends. Methodology InformationWeek surveyed business technology decision-makers at North American organizations with 100 or more employees. The survey was conducted online, and respondents were recruited via an email invitation containing an embedded link to the survey. The email invitation was sent to qualified InformationWeek and Dark Reading subscribers. Want more? Visit InformationWeek ReportsInformationWeek Reports Research Synopsis 2014 Property of UBM Tech; All Rights Reserved
  • Slide 42