SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
EVIDENCE OF CYBERSECURITY
BREACHES ABOUND IN OUR
DAILY LIVES – BOTH AT WORK
AND AT HOME.
Alarming stories in the press and comprehensive reports, such
as Verizon’s 2013 Data Breach Investigations Report, serve as
daily reminders that we need controls in place and constant
vigilance to prevent considerable losses in data, funds and
intellectual property.
Due to widespread concern about the issue, Silicon Valley Bank
decided to poll our clients about how they’re addressing
this clear and present risk – with revealing results from the
unique perspective of technology companies themselves.
Cybersecurity Risk is Real – and Growing
Most survey respondents believe cybersecurity is a serious
threat to both their data and business continuity, with a full
51% rating the threat to business interruption as very serious
or serious. The threat to data or intellectual property (IP)
was viewed as more significant with 60% saying it was a very
serious or serious threat. Software companies are more likely
than those in healthcare and cleantech/hardware to consider a
cyber attack a serious threat in terms of business interruption
(58% versus 47% and 41%, respectively).
Threat Cyber Attack
Causes Serious Business
Interruption
Very Serious Threat
Minor Threat
Serious Threat
Not at All a Threat
Moderate Threat
Threat of Cyber Attack
to Company Data or IP
100%
90%
80%
70%
60%
50%
40%
30%
20%
10%
0%
51%
60%
25% 31%
29%
18%
20%
26%
25%
22%
Level of Concern about Cybersecurity Threat
“If our security fails, it has the strong potential to destroy
the company. We take that risk very seriously.”
CEO, Cloud Infrastructure Company
CYBERSECURITY REPORT
Cybersecurity Survey			
Impact on Innovation
CYBERSECURITY REPORT  2
Only 35% are Completely or Very Confident About
Their Own Security, and Even Less Confident About
Business Partners
Overall, companies express confidence in the security of their
information, but only 35% are completely/very confident,
while 57% are moderately confident. Survey respondents
were far less confident about the security measures taken
by their critical business partners, including vendors,
distributors and customers, with only 16% completely/
very confident.
“I believe it will be an ever-increasing concern and challenge.
We are particularly concerned about foreign states who attempt
to hack into our businesses.”
CEO, Consumer Electronics Company
57%
27%
16%
57%
8%
35%
Confidence in Security of Information
Moderately Confident Not ConfidentCompletely/Very Confident
Security Measures of PartnersOwn Company Information
“Way too much resource must be spent managing and defending,
which prevents time better spent on innovation and growth.
Very sad state for the technology community.”
CEO, Big Data Company
98% of Companies Are Maintaining or Increasing
Security Resources
Of those 98%, half say they’ve increased resources (time or
money) devoted to the problem this year.
60%
40%
20%
0%
More resources About the same Fewer resources
Amount of Resources for Cybersecurity
“We've dedicated
an Info Security
Officer to this role.”
49% 49%
2%
“Firewalls, hosting
facilities and business
continuity plans.”
Resources Focus on When, Not if, Attack Occurs
Notably, companies are currently investing more in measures
to respond to inevitable attacks — monitoring, preventive
policies, training and staffing – than in preventative
infrastructure. This is consistent with executives describing
an increase in the magnitude of cyber attacks, not only in
frequency but also in the severity of highly organized attacks
from rogue nations.
“It’s a constant battle that won’t go away and we are now
spending more to protect ourselves from when we are hacked
than to try and keep from being hacked.”
CEO, Financial Technology Company
Monitoring/Assessment
Policies/Controls
Hiring
Software
Firewalls
Encryption
Authentication/Access
Cloud
Servers
Hosting
0% 2% 4% 6% 8% 10% 12% 14% 16% 18% 20%
Top Cybersecurity Investments
MOST TECH AND HEALTHCARE
EXECUTIVES VIEW CYBER
ATTACKS AS A SERIOUS THREAT,
NOT JUST HYPE.
“Cybersecurity is an important issue, and needs to be integrated
into every aspect of the running of the company.”
CEO, Enterprise Applications Startup
CYBERSECURITY REPORT  3
Key offering
No plans to add
Component of offering
Don’t currently have but plan to
100%
80%
60%
40%
20%
0%
Software Hardware/Cleantech/
Other
Healthcare
Role of Cybersecurity Functionality in Key Offering
15%
6%
56%
36%
6%
53% 60%
10%
30%
8%
21%
Most Companies Have Security Aspect to Product
Attention to cybersecurity now cuts to the core of what
companies do. Over half of respondents say cybersecurity
is at least one component of their product offering. Not
surprisingly, software companies are most likely to offer a
cybersecurity component to their product.
“Although there is a lot of useless media hype, cybersecurity
is important and should never be ignored. For the foreseeable
future, cyber attacks will be a daily constant for any company
with an Internet presence.”
CEO, Hardware/Cleantech Startup
“Data security is and always will be an important part of
technology infrastructure. The cloud is not a silver bullet.”
CEO, IT Services Startup
Media Coverage Makes an Impact
For nearly half of executives surveyed, increased media
attention to cyber attacks has changed the tide of opinions
on cybersecurity and has helped heighten its priority in
companies across the board. In addition to risks to their
intellectual property and business interruption, they may be
keenly aware of the mounting customer concern that comes
from rising media exposure – which in turn creates even
more incentive to beef up cybersecurity resources.
Media
Had Impact
48%
32%
14%
4%
3%
No – Cybersecurity remains an
important priority
No – This is just media hype
Other
Yes – My company is making
cybersecurity a bigger priority
Yes - I am more aware
of the cybersecurity threat
Impact of Media on Cybersecurity Perceptions
Not Everyone is Embracing the Cloud’s “Public” Nature
Most respondents say they still store company information
either privately or only partially on the cloud, showing a
lower appetite for using the public cloud – even with security
measures in place – to cost-effectively store important
company information. While 52% are storing information
privately, nearly half are using the public cloud for at
least some of their data. Software companies are the most
aggressive users, with 59% using the public cloud for at
least some of their data– likely one reason why they are the
sector most concerned about IP and business risk, and most
influenced by media coverage. Early-stage companies are also
more likely to embrace the cloud, presumably to lower their
costs and achieve efficiencies even at a small scale.
40%
20%
0%
Public cloud only Both Private cloud only Neither
19%
29%
34%
18%
How Company Information is Stored
Study Methodology
Results for Silicon Valley Bank’s cybersecurity study were
collected through an online survey conducted from July
16-29, 2013. The survey was completed by 216 C-level tech
and healthcare clients, 65% of whom are President/CEO.
Industry distribution of respondents is 43% software,
20% healthcare, 14% consumer Internet and digital media,
8% hardware and 7% clean technology. Seventy-five percent
of respondent companies are startups and 20% in growth
stage. Over 60% are based on the west coast. All figures in
this report are based on the unweighted responses to closed-
ended questions, except the statistics in the Top Security
Investments graph, which are based on the classification of
free-form open-ended comments typed by survey participants.
About Silicon Valley Bank
Silicon Valley Bank is the premier bank for technology, life
science, cleantech, venture capital, private equity and premium
wine businesses. SVB provides industry knowledge and
connections, financing, treasury management, corporate
investment and international banking services to its clients
worldwide through 28 U.S. offices and six international
operations. (Nasdaq: SIVB) www.svb.com.
Silicon Valley Bank
3003 Tasman Drive
Santa Clara, ca 95054
t 408 654 7400
svb.com
©2013 SVB Financial Group. All rights reserved. Silicon Valley Bank is a member of FDIC and Federal Reserve System.
SVB>, SVB>Find a way, SVB Financial Group, and Silicon Valley Bank are registered trademarks. B-13-12992. Rev 09-16-13.

Más contenido relacionado

La actualidad más candente

2018 Security Priorities
2018 Security Priorities 2018 Security Priorities
2018 Security Priorities IDG
 
2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study RoadshowScalar Decisions
 
Chief Audit Execs speak out: Cybersecurity & risk management
Chief Audit Execs speak out: Cybersecurity & risk managementChief Audit Execs speak out: Cybersecurity & risk management
Chief Audit Execs speak out: Cybersecurity & risk managementGrant Thornton LLP
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Kim Jensen
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Reportaccenture
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Marcello Marchesini
 
Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)PwC France
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseThe Economist Media Businesses
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]IDG
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011Lumension
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The Economist Media Businesses
 

La actualidad más candente (16)

2018 Security Priorities
2018 Security Priorities 2018 Security Priorities
2018 Security Priorities
 
2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow
 
Chief Audit Execs speak out: Cybersecurity & risk management
Chief Audit Execs speak out: Cybersecurity & risk managementChief Audit Execs speak out: Cybersecurity & risk management
Chief Audit Execs speak out: Cybersecurity & risk management
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
 
Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinar
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...
 

Similar a SVB Cybersecurity Impact on Innovation Report - Overview

The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016Accenture Operations
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...Symantec
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey Rahul Neel Mani
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Cybersecurity's Impact on Innovation
Cybersecurity's Impact on InnovationCybersecurity's Impact on Innovation
Cybersecurity's Impact on InnovationSilicon Valley Bank
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summarypatmisasi
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise ReportOkta-Inc
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital FutureCognizant
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportFERMA
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesJoseph DeFever
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskFiona Lew
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey ReportDImension Data
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014Peggy Lawless
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
 
VIPRE --Responding to Cyberattacks
VIPRE --Responding to CyberattacksVIPRE --Responding to Cyberattacks
VIPRE --Responding to CyberattacksAbhishek Sood
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 

Similar a SVB Cybersecurity Impact on Innovation Report - Overview (20)

The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Cybersecurity's Impact on Innovation
Cybersecurity's Impact on InnovationCybersecurity's Impact on Innovation
Cybersecurity's Impact on Innovation
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
 
2010 GISS EY
2010 GISS EY2010 GISS EY
2010 GISS EY
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital Future
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data Risk
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
VIPRE --Responding to Cyberattacks
VIPRE --Responding to CyberattacksVIPRE --Responding to Cyberattacks
VIPRE --Responding to Cyberattacks
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 

Más de Silicon Valley Bank

2019 Startup Outlook Canada Report
2019 Startup Outlook Canada Report2019 Startup Outlook Canada Report
2019 Startup Outlook Canada ReportSilicon Valley Bank
 
2019 Startup Outlook China Report
2019 Startup Outlook China Report2019 Startup Outlook China Report
2019 Startup Outlook China ReportSilicon Valley Bank
 
Trends in Healthcare Investments and Exits 2018 - Mid-Year Report
Trends in Healthcare Investments and Exits 2018 - Mid-Year ReportTrends in Healthcare Investments and Exits 2018 - Mid-Year Report
Trends in Healthcare Investments and Exits 2018 - Mid-Year ReportSilicon Valley Bank
 
SVB State of the Markets Q3 2018
SVB State of the Markets Q3 2018SVB State of the Markets Q3 2018
SVB State of the Markets Q3 2018Silicon Valley Bank
 
Women in Technology Leadership 2018
Women in Technology Leadership 2018Women in Technology Leadership 2018
Women in Technology Leadership 2018Silicon Valley Bank
 
Trends in Healthcare Investments and Exits 2018
Trends in Healthcare Investments and Exits 2018Trends in Healthcare Investments and Exits 2018
Trends in Healthcare Investments and Exits 2018Silicon Valley Bank
 
How Paperless Payables Can Streamline Ops and Improve Cash Flow
How Paperless Payables Can Streamline Ops and Improve Cash FlowHow Paperless Payables Can Streamline Ops and Improve Cash Flow
How Paperless Payables Can Streamline Ops and Improve Cash FlowSilicon Valley Bank
 
Trends in Healthcare Investments and Exits: Mid-Year 2017
Trends in Healthcare Investments and Exits: Mid-Year 2017Trends in Healthcare Investments and Exits: Mid-Year 2017
Trends in Healthcare Investments and Exits: Mid-Year 2017Silicon Valley Bank
 
Life Science and Healthcare Startup Outlook 2017
Life Science and Healthcare Startup Outlook 2017Life Science and Healthcare Startup Outlook 2017
Life Science and Healthcare Startup Outlook 2017Silicon Valley Bank
 
3 ways to sell your suppliers on credit card payments
3 ways to sell your suppliers on credit card payments3 ways to sell your suppliers on credit card payments
3 ways to sell your suppliers on credit card paymentsSilicon Valley Bank
 
SVB State of the Markets: Second Quarter 2017
SVB State of the Markets: Second Quarter 2017SVB State of the Markets: Second Quarter 2017
SVB State of the Markets: Second Quarter 2017Silicon Valley Bank
 
Southern California Startup Outlook 2017
Southern California Startup Outlook 2017 Southern California Startup Outlook 2017
Southern California Startup Outlook 2017 Silicon Valley Bank
 
SVB State of the Markets Report Q1 2017
SVB State of the Markets Report Q1 2017SVB State of the Markets Report Q1 2017
SVB State of the Markets Report Q1 2017Silicon Valley Bank
 
Silicon Valley Bank 2017 State of the Wine Industry Report
Silicon Valley Bank 2017 State of the Wine Industry ReportSilicon Valley Bank 2017 State of the Wine Industry Report
Silicon Valley Bank 2017 State of the Wine Industry ReportSilicon Valley Bank
 

Más de Silicon Valley Bank (20)

2019 Startup Outlook Canada Report
2019 Startup Outlook Canada Report2019 Startup Outlook Canada Report
2019 Startup Outlook Canada Report
 
2019 Startup Outlook China Report
2019 Startup Outlook China Report2019 Startup Outlook China Report
2019 Startup Outlook China Report
 
2019 Startup Outlook US Report
2019 Startup Outlook US Report2019 Startup Outlook US Report
2019 Startup Outlook US Report
 
Trends in Healthcare Investments and Exits 2018 - Mid-Year Report
Trends in Healthcare Investments and Exits 2018 - Mid-Year ReportTrends in Healthcare Investments and Exits 2018 - Mid-Year Report
Trends in Healthcare Investments and Exits 2018 - Mid-Year Report
 
SVB State of the Markets Q3 2018
SVB State of the Markets Q3 2018SVB State of the Markets Q3 2018
SVB State of the Markets Q3 2018
 
Women in Technology Leadership 2018
Women in Technology Leadership 2018Women in Technology Leadership 2018
Women in Technology Leadership 2018
 
Trends in Healthcare Investments and Exits 2018
Trends in Healthcare Investments and Exits 2018Trends in Healthcare Investments and Exits 2018
Trends in Healthcare Investments and Exits 2018
 
US Startup Outlook 2018
US Startup Outlook 2018US Startup Outlook 2018
US Startup Outlook 2018
 
How Paperless Payables Can Streamline Ops and Improve Cash Flow
How Paperless Payables Can Streamline Ops and Improve Cash FlowHow Paperless Payables Can Streamline Ops and Improve Cash Flow
How Paperless Payables Can Streamline Ops and Improve Cash Flow
 
Trends in Healthcare Investments and Exits: Mid-Year 2017
Trends in Healthcare Investments and Exits: Mid-Year 2017Trends in Healthcare Investments and Exits: Mid-Year 2017
Trends in Healthcare Investments and Exits: Mid-Year 2017
 
Life Science and Healthcare Startup Outlook 2017
Life Science and Healthcare Startup Outlook 2017Life Science and Healthcare Startup Outlook 2017
Life Science and Healthcare Startup Outlook 2017
 
3 ways to sell your suppliers on credit card payments
3 ways to sell your suppliers on credit card payments3 ways to sell your suppliers on credit card payments
3 ways to sell your suppliers on credit card payments
 
SVB Q2 2017 Economic Report
SVB Q2 2017 Economic ReportSVB Q2 2017 Economic Report
SVB Q2 2017 Economic Report
 
SVB State of the Markets: Second Quarter 2017
SVB State of the Markets: Second Quarter 2017SVB State of the Markets: Second Quarter 2017
SVB State of the Markets: Second Quarter 2017
 
Southern California Startup Outlook 2017
Southern California Startup Outlook 2017 Southern California Startup Outlook 2017
Southern California Startup Outlook 2017
 
SVB State of the Markets Report Q1 2017
SVB State of the Markets Report Q1 2017SVB State of the Markets Report Q1 2017
SVB State of the Markets Report Q1 2017
 
UK Startup Outlook Report 2017
UK Startup Outlook Report 2017UK Startup Outlook Report 2017
UK Startup Outlook Report 2017
 
US Startup Outlook Report 2017
US Startup Outlook Report 2017US Startup Outlook Report 2017
US Startup Outlook Report 2017
 
SVB Q1 2017 Economic Report
SVB Q1 2017 Economic ReportSVB Q1 2017 Economic Report
SVB Q1 2017 Economic Report
 
Silicon Valley Bank 2017 State of the Wine Industry Report
Silicon Valley Bank 2017 State of the Wine Industry ReportSilicon Valley Bank 2017 State of the Wine Industry Report
Silicon Valley Bank 2017 State of the Wine Industry Report
 

Último

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

SVB Cybersecurity Impact on Innovation Report - Overview

  • 1. EVIDENCE OF CYBERSECURITY BREACHES ABOUND IN OUR DAILY LIVES – BOTH AT WORK AND AT HOME. Alarming stories in the press and comprehensive reports, such as Verizon’s 2013 Data Breach Investigations Report, serve as daily reminders that we need controls in place and constant vigilance to prevent considerable losses in data, funds and intellectual property. Due to widespread concern about the issue, Silicon Valley Bank decided to poll our clients about how they’re addressing this clear and present risk – with revealing results from the unique perspective of technology companies themselves. Cybersecurity Risk is Real – and Growing Most survey respondents believe cybersecurity is a serious threat to both their data and business continuity, with a full 51% rating the threat to business interruption as very serious or serious. The threat to data or intellectual property (IP) was viewed as more significant with 60% saying it was a very serious or serious threat. Software companies are more likely than those in healthcare and cleantech/hardware to consider a cyber attack a serious threat in terms of business interruption (58% versus 47% and 41%, respectively). Threat Cyber Attack Causes Serious Business Interruption Very Serious Threat Minor Threat Serious Threat Not at All a Threat Moderate Threat Threat of Cyber Attack to Company Data or IP 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% 51% 60% 25% 31% 29% 18% 20% 26% 25% 22% Level of Concern about Cybersecurity Threat “If our security fails, it has the strong potential to destroy the company. We take that risk very seriously.” CEO, Cloud Infrastructure Company CYBERSECURITY REPORT Cybersecurity Survey Impact on Innovation
  • 2. CYBERSECURITY REPORT  2 Only 35% are Completely or Very Confident About Their Own Security, and Even Less Confident About Business Partners Overall, companies express confidence in the security of their information, but only 35% are completely/very confident, while 57% are moderately confident. Survey respondents were far less confident about the security measures taken by their critical business partners, including vendors, distributors and customers, with only 16% completely/ very confident. “I believe it will be an ever-increasing concern and challenge. We are particularly concerned about foreign states who attempt to hack into our businesses.” CEO, Consumer Electronics Company 57% 27% 16% 57% 8% 35% Confidence in Security of Information Moderately Confident Not ConfidentCompletely/Very Confident Security Measures of PartnersOwn Company Information “Way too much resource must be spent managing and defending, which prevents time better spent on innovation and growth. Very sad state for the technology community.” CEO, Big Data Company 98% of Companies Are Maintaining or Increasing Security Resources Of those 98%, half say they’ve increased resources (time or money) devoted to the problem this year. 60% 40% 20% 0% More resources About the same Fewer resources Amount of Resources for Cybersecurity “We've dedicated an Info Security Officer to this role.” 49% 49% 2% “Firewalls, hosting facilities and business continuity plans.” Resources Focus on When, Not if, Attack Occurs Notably, companies are currently investing more in measures to respond to inevitable attacks — monitoring, preventive policies, training and staffing – than in preventative infrastructure. This is consistent with executives describing an increase in the magnitude of cyber attacks, not only in frequency but also in the severity of highly organized attacks from rogue nations. “It’s a constant battle that won’t go away and we are now spending more to protect ourselves from when we are hacked than to try and keep from being hacked.” CEO, Financial Technology Company Monitoring/Assessment Policies/Controls Hiring Software Firewalls Encryption Authentication/Access Cloud Servers Hosting 0% 2% 4% 6% 8% 10% 12% 14% 16% 18% 20% Top Cybersecurity Investments MOST TECH AND HEALTHCARE EXECUTIVES VIEW CYBER ATTACKS AS A SERIOUS THREAT, NOT JUST HYPE.
  • 3. “Cybersecurity is an important issue, and needs to be integrated into every aspect of the running of the company.” CEO, Enterprise Applications Startup CYBERSECURITY REPORT  3 Key offering No plans to add Component of offering Don’t currently have but plan to 100% 80% 60% 40% 20% 0% Software Hardware/Cleantech/ Other Healthcare Role of Cybersecurity Functionality in Key Offering 15% 6% 56% 36% 6% 53% 60% 10% 30% 8% 21% Most Companies Have Security Aspect to Product Attention to cybersecurity now cuts to the core of what companies do. Over half of respondents say cybersecurity is at least one component of their product offering. Not surprisingly, software companies are most likely to offer a cybersecurity component to their product. “Although there is a lot of useless media hype, cybersecurity is important and should never be ignored. For the foreseeable future, cyber attacks will be a daily constant for any company with an Internet presence.” CEO, Hardware/Cleantech Startup “Data security is and always will be an important part of technology infrastructure. The cloud is not a silver bullet.” CEO, IT Services Startup Media Coverage Makes an Impact For nearly half of executives surveyed, increased media attention to cyber attacks has changed the tide of opinions on cybersecurity and has helped heighten its priority in companies across the board. In addition to risks to their intellectual property and business interruption, they may be keenly aware of the mounting customer concern that comes from rising media exposure – which in turn creates even more incentive to beef up cybersecurity resources. Media Had Impact 48% 32% 14% 4% 3% No – Cybersecurity remains an important priority No – This is just media hype Other Yes – My company is making cybersecurity a bigger priority Yes - I am more aware of the cybersecurity threat Impact of Media on Cybersecurity Perceptions Not Everyone is Embracing the Cloud’s “Public” Nature Most respondents say they still store company information either privately or only partially on the cloud, showing a lower appetite for using the public cloud – even with security measures in place – to cost-effectively store important company information. While 52% are storing information privately, nearly half are using the public cloud for at least some of their data. Software companies are the most aggressive users, with 59% using the public cloud for at least some of their data– likely one reason why they are the sector most concerned about IP and business risk, and most influenced by media coverage. Early-stage companies are also more likely to embrace the cloud, presumably to lower their costs and achieve efficiencies even at a small scale. 40% 20% 0% Public cloud only Both Private cloud only Neither 19% 29% 34% 18% How Company Information is Stored
  • 4. Study Methodology Results for Silicon Valley Bank’s cybersecurity study were collected through an online survey conducted from July 16-29, 2013. The survey was completed by 216 C-level tech and healthcare clients, 65% of whom are President/CEO. Industry distribution of respondents is 43% software, 20% healthcare, 14% consumer Internet and digital media, 8% hardware and 7% clean technology. Seventy-five percent of respondent companies are startups and 20% in growth stage. Over 60% are based on the west coast. All figures in this report are based on the unweighted responses to closed- ended questions, except the statistics in the Top Security Investments graph, which are based on the classification of free-form open-ended comments typed by survey participants. About Silicon Valley Bank Silicon Valley Bank is the premier bank for technology, life science, cleantech, venture capital, private equity and premium wine businesses. SVB provides industry knowledge and connections, financing, treasury management, corporate investment and international banking services to its clients worldwide through 28 U.S. offices and six international operations. (Nasdaq: SIVB) www.svb.com. Silicon Valley Bank 3003 Tasman Drive Santa Clara, ca 95054 t 408 654 7400 svb.com ©2013 SVB Financial Group. All rights reserved. Silicon Valley Bank is a member of FDIC and Federal Reserve System. SVB>, SVB>Find a way, SVB Financial Group, and Silicon Valley Bank are registered trademarks. B-13-12992. Rev 09-16-13.