SlideShare una empresa de Scribd logo
1 de 18
Cybersecurity: Impact on Innovation
09.20.13
Highlights
 Cybersecurity is seen as a serious threat across all industries: 93% of respondents
indicate that cybersecurity is a priority
 Almost half (46%) indicate that media has affected their perceptions of cybersecurity
 Most respondents are relatively confident regarding the security of information they
possess but less confident about their partners such as vendors and customers
 Nearly half say resources devoted to cybersecurity have increased this year
 Small and mid-size tech companies are now focusing more on measures to respond
to inevitable cyber attacks — monitoring, preventive policies, training and staffing —
than on preventive infrastructure
 Over half of companies say cybersecurity is a key offering or component of product
offering
 Over half of respondents storing information privately, and show lower appetite for
storing information in public cloud
 Software is most confident about using the public cloud
 Software firms are equally concerned about business interruption as IP loss, while
hardware and cleantech companies are more concerned with IP loss
2
Most tech and healthcare companies believe cyber attack is
a serious threat to their data and overall business
3Pulse Survey: Cyber Security Results
“Way too much
resource must be
spent managing and
defending, which
prevents time better
spent on innovation
and growth. Very sad
state for the
technology
community”.
CEO, Big Data
Company
Source: Silicon Valley Bank
Only 35% of companies are completely/very confident regarding
the security of their own information and are less so when it
comes to protective measures of business partners
Pulse Survey: Cyber Security Results 4
“I believe it will be an
ever-increasing
concern and
challenge. We are
particularly concerned
about foreign states
who attempt to hack
into our businesses.”
- CEO, Consumer
Electronics Company
Source: Silicon Valley Bank
Nearly half of respondents say resources devoted to the
problem have increased
Pulse Survey: Cyber Security Results 5
“It's a constant battle
that won't go away
and we are now
spending more to
protect ourselves from
when we are hacked
than to try and keep
from being hacked.”
- CEO, Financial
Technology Company
Source: Silicon Valley Bank
Most common resource investments focus on active
response to cyber attacks vs. infrastructure enhancements
6Pulse Survey: Cyber Security Results
“Cybersecurity is a
losing battle if a
sophisticated hacker
wants your data. The
best you can do is
minimize
vulnerabilities,
educate the executive
team to care,
implement and
monitor policy.”
- CEO, Financial
Technology Company
Source: Silicon Valley Bank
7
Over half of companies (56%) say cybersecurity is at least a
component of their offering
Pulse Survey: Cyber Security Results
“Cybersecurity is an
important issue, and
needs to be integrated
into every aspect of
the running of the
company. Companies
need to take…disaster
recovery, risk
assessments as well
as regular audits
seriously.”
- CEO, Enterprise
Applications Startup
Source: Silicon Valley Bank
Media attention has affected clients’ perceptions of
cybersecurity
Pulse Survey: Cyber Security Results 8
“Although there is a lot
of useless media
hype, cybersecurity is
important and should
never be ignored. For
the foreseeable
future, cyber attacks
will be a daily constant
for any company with
an Internet presence.”
- CEO, Hardware
/Cleantech Startup
Source: Silicon Valley Bank
Company information is more likely to be stored privately or
using some combination of a private/public cloud
Pulse Survey: Cyber Security Results 9
“Data security is and
always will be an
important part of
technology
infrastructure. The
cloud is not a silver
bullet.”
CEO, IT Services
Startup
Source: Silicon Valley Bank
Sector Focus
Most sectors are devoting more resources to cybersecurity;
this is more pronounced among software clients
11Pulse Survey: Cyber Security Results
Source: Silicon Valley Bank
Software companies more likely than hardware/cleantech or
healthcare to consider a cyber attack a serious threat in
terms of business interruption (58% vs. 47% and 41%)
Pulse Survey: Cyber Security Results 12
Source: Silicon Valley Bank
13Pulse Survey: Cyber Security Results
Cleantech/hardware companies more likely than software or
healthcare to consider a cyber attack to their data/IP a serious
threat (69% vs. 58% and 60%)
Source: Silicon Valley Bank
Software clients are more confident in security of their own
information and less confident in security measures of their
partners
Pulse Survey: Cyber Security Results 14
Source: Silicon Valley Bank
All subsectors have been influenced by the media to some
degree; this is more pronounced among software companies
Pulse Survey: Cyber Security Results 15
Source: Silicon Valley Bank
Software companies are more likely to store company data in
the cloud
16Pulse Survey: Cyber Security Results
Source: Silicon Valley Bank
Over half of companies (56%) say cybersecurity is at least a
component of their offering
Pulse Survey: Cyber Security Results 17
Source: Silicon Valley Bank
Survey Methodology
 Online survey conducted between July 16-29, 2013
 216 surveys were taken
 62% CEO, 27% other C-level, 8% Other
Pulse Survey: Cyber Security Results 18
About Silicon Valley Bank
Silicon Valley Bank is the premier bank for technology, life science, cleantech, venture
capital, private equity and premium wine businesses. SVB provides industry
knowledge and connections, financing, treasury management, corporate investment
and international banking services to its clients worldwide through 27 U.S. offices and
six international operations. (Nasdaq: SIVB) www.svb.com.
Silicon Valley Bank is the California bank subsidiary and the commercial banking operation of SVB Financial Group.
Banking services are provided by Silicon Valley Bank, a member of the FDIC and the Federal Reserve System. SVB
Financial Group is also a member of the Federal Reserve System.
©2013 SVB Financial Group. All rights reserved. Silicon Valley Bank is a member of FDIC and Federal Reserve
System. SVB>, SVB>Find a way, SVB Financial Group, and Silicon Valley Bank are registered trademark.

Más contenido relacionado

La actualidad más candente

2018 Security Priorities
2018 Security Priorities 2018 Security Priorities
2018 Security Priorities IDG
 
2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study RoadshowScalar Decisions
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
Chief Audit Execs speak out: Cybersecurity & risk management
Chief Audit Execs speak out: Cybersecurity & risk managementChief Audit Execs speak out: Cybersecurity & risk management
Chief Audit Execs speak out: Cybersecurity & risk managementGrant Thornton LLP
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Reportaccenture
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseThe Economist Media Businesses
 
Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)PwC France
 
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Marcello Marchesini
 
Best of Both Worlds: Correlating Static and Dynamic Analysis Results
Best of Both Worlds: Correlating Static and Dynamic Analysis ResultsBest of Both Worlds: Correlating Static and Dynamic Analysis Results
Best of Both Worlds: Correlating Static and Dynamic Analysis ResultsJeremiah Grossman
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]IDG
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013Bee_Ware
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011Lumension
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMatthew Rosenquist
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
 

La actualidad más candente (19)

2018 Security Priorities
2018 Security Priorities 2018 Security Priorities
2018 Security Priorities
 
2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Chief Audit Execs speak out: Cybersecurity & risk management
Chief Audit Execs speak out: Cybersecurity & risk managementChief Audit Execs speak out: Cybersecurity & risk management
Chief Audit Execs speak out: Cybersecurity & risk management
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
 
Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)Etude PwC sécurité de l’information et protection des données (2014)
Etude PwC sécurité de l’information et protection des données (2014)
 
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
 
Cybersecurity report-vol-8
Cybersecurity report-vol-8Cybersecurity report-vol-8
Cybersecurity report-vol-8
 
Best of Both Worlds: Correlating Static and Dynamic Analysis Results
Best of Both Worlds: Correlating Static and Dynamic Analysis ResultsBest of Both Worlds: Correlating Static and Dynamic Analysis Results
Best of Both Worlds: Correlating Static and Dynamic Analysis Results
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinar
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 

Similar a SVB Cybersecurity Impact on Innovation Report

2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summarypatmisasi
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesJoseph DeFever
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital FutureCognizant
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey Rahul Neel Mani
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursSurfWatch Labs
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016Accenture Operations
 
20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final ResultsCIONET
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise The Economist Media Businesses
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for InsuranceAccenture Insurance
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...Symantec
 
Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Mourad Khalil
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportFERMA
 
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframeBig Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframePrecisely
 
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...Capgemini
 
Ivan dragas get ahead of cybercrime
Ivan dragas   get ahead of cybercrimeIvan dragas   get ahead of cybercrime
Ivan dragas get ahead of cybercrimeDejan Jeremic
 
Insights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense ReportInsights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense ReportStephanie Brannan
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise ReportOkta-Inc
 

Similar a SVB Cybersecurity Impact on Innovation Report (20)

2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital Future
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframeBig Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
 
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
 
Ivan dragas get ahead of cybercrime
Ivan dragas   get ahead of cybercrimeIvan dragas   get ahead of cybercrime
Ivan dragas get ahead of cybercrime
 
Insights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense ReportInsights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense Report
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
 

Más de Silicon Valley Bank

2019 Startup Outlook Canada Report
2019 Startup Outlook Canada Report2019 Startup Outlook Canada Report
2019 Startup Outlook Canada ReportSilicon Valley Bank
 
2019 Startup Outlook China Report
2019 Startup Outlook China Report2019 Startup Outlook China Report
2019 Startup Outlook China ReportSilicon Valley Bank
 
Trends in Healthcare Investments and Exits 2018 - Mid-Year Report
Trends in Healthcare Investments and Exits 2018 - Mid-Year ReportTrends in Healthcare Investments and Exits 2018 - Mid-Year Report
Trends in Healthcare Investments and Exits 2018 - Mid-Year ReportSilicon Valley Bank
 
SVB State of the Markets Q3 2018
SVB State of the Markets Q3 2018SVB State of the Markets Q3 2018
SVB State of the Markets Q3 2018Silicon Valley Bank
 
Women in Technology Leadership 2018
Women in Technology Leadership 2018Women in Technology Leadership 2018
Women in Technology Leadership 2018Silicon Valley Bank
 
Trends in Healthcare Investments and Exits 2018
Trends in Healthcare Investments and Exits 2018Trends in Healthcare Investments and Exits 2018
Trends in Healthcare Investments and Exits 2018Silicon Valley Bank
 
How Paperless Payables Can Streamline Ops and Improve Cash Flow
How Paperless Payables Can Streamline Ops and Improve Cash FlowHow Paperless Payables Can Streamline Ops and Improve Cash Flow
How Paperless Payables Can Streamline Ops and Improve Cash FlowSilicon Valley Bank
 
Trends in Healthcare Investments and Exits: Mid-Year 2017
Trends in Healthcare Investments and Exits: Mid-Year 2017Trends in Healthcare Investments and Exits: Mid-Year 2017
Trends in Healthcare Investments and Exits: Mid-Year 2017Silicon Valley Bank
 
Life Science and Healthcare Startup Outlook 2017
Life Science and Healthcare Startup Outlook 2017Life Science and Healthcare Startup Outlook 2017
Life Science and Healthcare Startup Outlook 2017Silicon Valley Bank
 
3 ways to sell your suppliers on credit card payments
3 ways to sell your suppliers on credit card payments3 ways to sell your suppliers on credit card payments
3 ways to sell your suppliers on credit card paymentsSilicon Valley Bank
 
SVB State of the Markets: Second Quarter 2017
SVB State of the Markets: Second Quarter 2017SVB State of the Markets: Second Quarter 2017
SVB State of the Markets: Second Quarter 2017Silicon Valley Bank
 
Southern California Startup Outlook 2017
Southern California Startup Outlook 2017 Southern California Startup Outlook 2017
Southern California Startup Outlook 2017 Silicon Valley Bank
 
SVB State of the Markets Report Q1 2017
SVB State of the Markets Report Q1 2017SVB State of the Markets Report Q1 2017
SVB State of the Markets Report Q1 2017Silicon Valley Bank
 
Silicon Valley Bank 2017 State of the Wine Industry Report
Silicon Valley Bank 2017 State of the Wine Industry ReportSilicon Valley Bank 2017 State of the Wine Industry Report
Silicon Valley Bank 2017 State of the Wine Industry ReportSilicon Valley Bank
 

Más de Silicon Valley Bank (20)

2019 Startup Outlook Canada Report
2019 Startup Outlook Canada Report2019 Startup Outlook Canada Report
2019 Startup Outlook Canada Report
 
2019 Startup Outlook China Report
2019 Startup Outlook China Report2019 Startup Outlook China Report
2019 Startup Outlook China Report
 
2019 Startup Outlook US Report
2019 Startup Outlook US Report2019 Startup Outlook US Report
2019 Startup Outlook US Report
 
Trends in Healthcare Investments and Exits 2018 - Mid-Year Report
Trends in Healthcare Investments and Exits 2018 - Mid-Year ReportTrends in Healthcare Investments and Exits 2018 - Mid-Year Report
Trends in Healthcare Investments and Exits 2018 - Mid-Year Report
 
SVB State of the Markets Q3 2018
SVB State of the Markets Q3 2018SVB State of the Markets Q3 2018
SVB State of the Markets Q3 2018
 
Women in Technology Leadership 2018
Women in Technology Leadership 2018Women in Technology Leadership 2018
Women in Technology Leadership 2018
 
Trends in Healthcare Investments and Exits 2018
Trends in Healthcare Investments and Exits 2018Trends in Healthcare Investments and Exits 2018
Trends in Healthcare Investments and Exits 2018
 
US Startup Outlook 2018
US Startup Outlook 2018US Startup Outlook 2018
US Startup Outlook 2018
 
How Paperless Payables Can Streamline Ops and Improve Cash Flow
How Paperless Payables Can Streamline Ops and Improve Cash FlowHow Paperless Payables Can Streamline Ops and Improve Cash Flow
How Paperless Payables Can Streamline Ops and Improve Cash Flow
 
Trends in Healthcare Investments and Exits: Mid-Year 2017
Trends in Healthcare Investments and Exits: Mid-Year 2017Trends in Healthcare Investments and Exits: Mid-Year 2017
Trends in Healthcare Investments and Exits: Mid-Year 2017
 
Life Science and Healthcare Startup Outlook 2017
Life Science and Healthcare Startup Outlook 2017Life Science and Healthcare Startup Outlook 2017
Life Science and Healthcare Startup Outlook 2017
 
3 ways to sell your suppliers on credit card payments
3 ways to sell your suppliers on credit card payments3 ways to sell your suppliers on credit card payments
3 ways to sell your suppliers on credit card payments
 
SVB Q2 2017 Economic Report
SVB Q2 2017 Economic ReportSVB Q2 2017 Economic Report
SVB Q2 2017 Economic Report
 
SVB State of the Markets: Second Quarter 2017
SVB State of the Markets: Second Quarter 2017SVB State of the Markets: Second Quarter 2017
SVB State of the Markets: Second Quarter 2017
 
Southern California Startup Outlook 2017
Southern California Startup Outlook 2017 Southern California Startup Outlook 2017
Southern California Startup Outlook 2017
 
SVB State of the Markets Report Q1 2017
SVB State of the Markets Report Q1 2017SVB State of the Markets Report Q1 2017
SVB State of the Markets Report Q1 2017
 
UK Startup Outlook Report 2017
UK Startup Outlook Report 2017UK Startup Outlook Report 2017
UK Startup Outlook Report 2017
 
US Startup Outlook Report 2017
US Startup Outlook Report 2017US Startup Outlook Report 2017
US Startup Outlook Report 2017
 
SVB Q1 2017 Economic Report
SVB Q1 2017 Economic ReportSVB Q1 2017 Economic Report
SVB Q1 2017 Economic Report
 
Silicon Valley Bank 2017 State of the Wine Industry Report
Silicon Valley Bank 2017 State of the Wine Industry ReportSilicon Valley Bank 2017 State of the Wine Industry Report
Silicon Valley Bank 2017 State of the Wine Industry Report
 

Último

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Último (20)

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

SVB Cybersecurity Impact on Innovation Report

  • 1. Cybersecurity: Impact on Innovation 09.20.13
  • 2. Highlights  Cybersecurity is seen as a serious threat across all industries: 93% of respondents indicate that cybersecurity is a priority  Almost half (46%) indicate that media has affected their perceptions of cybersecurity  Most respondents are relatively confident regarding the security of information they possess but less confident about their partners such as vendors and customers  Nearly half say resources devoted to cybersecurity have increased this year  Small and mid-size tech companies are now focusing more on measures to respond to inevitable cyber attacks — monitoring, preventive policies, training and staffing — than on preventive infrastructure  Over half of companies say cybersecurity is a key offering or component of product offering  Over half of respondents storing information privately, and show lower appetite for storing information in public cloud  Software is most confident about using the public cloud  Software firms are equally concerned about business interruption as IP loss, while hardware and cleantech companies are more concerned with IP loss 2
  • 3. Most tech and healthcare companies believe cyber attack is a serious threat to their data and overall business 3Pulse Survey: Cyber Security Results “Way too much resource must be spent managing and defending, which prevents time better spent on innovation and growth. Very sad state for the technology community”. CEO, Big Data Company Source: Silicon Valley Bank
  • 4. Only 35% of companies are completely/very confident regarding the security of their own information and are less so when it comes to protective measures of business partners Pulse Survey: Cyber Security Results 4 “I believe it will be an ever-increasing concern and challenge. We are particularly concerned about foreign states who attempt to hack into our businesses.” - CEO, Consumer Electronics Company Source: Silicon Valley Bank
  • 5. Nearly half of respondents say resources devoted to the problem have increased Pulse Survey: Cyber Security Results 5 “It's a constant battle that won't go away and we are now spending more to protect ourselves from when we are hacked than to try and keep from being hacked.” - CEO, Financial Technology Company Source: Silicon Valley Bank
  • 6. Most common resource investments focus on active response to cyber attacks vs. infrastructure enhancements 6Pulse Survey: Cyber Security Results “Cybersecurity is a losing battle if a sophisticated hacker wants your data. The best you can do is minimize vulnerabilities, educate the executive team to care, implement and monitor policy.” - CEO, Financial Technology Company Source: Silicon Valley Bank
  • 7. 7 Over half of companies (56%) say cybersecurity is at least a component of their offering Pulse Survey: Cyber Security Results “Cybersecurity is an important issue, and needs to be integrated into every aspect of the running of the company. Companies need to take…disaster recovery, risk assessments as well as regular audits seriously.” - CEO, Enterprise Applications Startup Source: Silicon Valley Bank
  • 8. Media attention has affected clients’ perceptions of cybersecurity Pulse Survey: Cyber Security Results 8 “Although there is a lot of useless media hype, cybersecurity is important and should never be ignored. For the foreseeable future, cyber attacks will be a daily constant for any company with an Internet presence.” - CEO, Hardware /Cleantech Startup Source: Silicon Valley Bank
  • 9. Company information is more likely to be stored privately or using some combination of a private/public cloud Pulse Survey: Cyber Security Results 9 “Data security is and always will be an important part of technology infrastructure. The cloud is not a silver bullet.” CEO, IT Services Startup Source: Silicon Valley Bank
  • 11. Most sectors are devoting more resources to cybersecurity; this is more pronounced among software clients 11Pulse Survey: Cyber Security Results Source: Silicon Valley Bank
  • 12. Software companies more likely than hardware/cleantech or healthcare to consider a cyber attack a serious threat in terms of business interruption (58% vs. 47% and 41%) Pulse Survey: Cyber Security Results 12 Source: Silicon Valley Bank
  • 13. 13Pulse Survey: Cyber Security Results Cleantech/hardware companies more likely than software or healthcare to consider a cyber attack to their data/IP a serious threat (69% vs. 58% and 60%) Source: Silicon Valley Bank
  • 14. Software clients are more confident in security of their own information and less confident in security measures of their partners Pulse Survey: Cyber Security Results 14 Source: Silicon Valley Bank
  • 15. All subsectors have been influenced by the media to some degree; this is more pronounced among software companies Pulse Survey: Cyber Security Results 15 Source: Silicon Valley Bank
  • 16. Software companies are more likely to store company data in the cloud 16Pulse Survey: Cyber Security Results Source: Silicon Valley Bank
  • 17. Over half of companies (56%) say cybersecurity is at least a component of their offering Pulse Survey: Cyber Security Results 17 Source: Silicon Valley Bank
  • 18. Survey Methodology  Online survey conducted between July 16-29, 2013  216 surveys were taken  62% CEO, 27% other C-level, 8% Other Pulse Survey: Cyber Security Results 18 About Silicon Valley Bank Silicon Valley Bank is the premier bank for technology, life science, cleantech, venture capital, private equity and premium wine businesses. SVB provides industry knowledge and connections, financing, treasury management, corporate investment and international banking services to its clients worldwide through 27 U.S. offices and six international operations. (Nasdaq: SIVB) www.svb.com. Silicon Valley Bank is the California bank subsidiary and the commercial banking operation of SVB Financial Group. Banking services are provided by Silicon Valley Bank, a member of the FDIC and the Federal Reserve System. SVB Financial Group is also a member of the Federal Reserve System. ©2013 SVB Financial Group. All rights reserved. Silicon Valley Bank is a member of FDIC and Federal Reserve System. SVB>, SVB>Find a way, SVB Financial Group, and Silicon Valley Bank are registered trademark.