SlideShare una empresa de Scribd logo
1 de 8
Critical Infrastructure Protection Survey
Key Findings
Methodology
• Survey performed by Applied Research
• Surveyed CIP-specific industries
  – All industries from last year
  – Added 8 new industries this year (all on CIP list)
• 3,475 respondents
  – 1,900 SMBs (5 – 499 employees)
  – 1,575 enterprises (>1,000 US, >500 ROW)
• Spoke to person in charge of computers


                                                         2
Key Findings
• Lower awareness & engagement in government CIP programs
• Slightly more ambivalence about government CIP programs
• Organizations feel less prepared
Lower Awareness & Engagement in Government CIP
Programs
• Lower awareness of government CIP programs in their country (36% vs. 55%)
• Less engaged in government CIP programs (37% vs. 56%)
Slightly More Ambivalence About Government CIP
Programs
• More are ‘neutral’ or have ‘no opinion’ about government CIP programs
  (42% vs. 26%)
• Slightly less willing to cooperate (57% vs. 66%)
Organizations Feel Less Prepared
• Slight decrease in their self-assessment of readiness (-8%)
• Self-assessment of safeguards shows decline in readiness (-5 to -10%)
Recommendations: Protecting Critical Infrastructure
• Develop and enforce IT policies, automate all compliance processes
• Adopt a proactive, information-centric approach to protecting information
  and interactions
• Manage systems by implementing secure operating environments
• Protect the infrastructure by securing endpoints, messaging and Web
  environments
• Ensure 24x7 availability
• Develop an information management strategy that includes an information
  retention plan and policies
Recommendations for Government
• Continue to put forth the resources to establish government critical
  infrastructure programs
• Partner with industry associations and private enterprise groups to
  disseminate information to raise awareness of CIP organizations and plans
• Emphasize that security is not enough to stay resilient in the face of today’s
  cyberattacks

Más contenido relacionado

La actualidad más candente

Protecting PHi- 1-2016
Protecting PHi-  1-2016Protecting PHi-  1-2016
Protecting PHi- 1-2016
Bill Steuer
 
Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000
Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000
Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000
Mercatus Center
 

La actualidad más candente (20)

Infographic the new era of corporate continuity of operations
Infographic the new era of corporate continuity of operationsInfographic the new era of corporate continuity of operations
Infographic the new era of corporate continuity of operations
 
Federal Risk and Authorization Management Program: Assessment and Recommendat...
Federal Risk and Authorization Management Program: Assessment and Recommendat...Federal Risk and Authorization Management Program: Assessment and Recommendat...
Federal Risk and Authorization Management Program: Assessment and Recommendat...
 
Annual Results and Impact Evaluation Workshop for RBF - Day Eight - IE and HR...
Annual Results and Impact Evaluation Workshop for RBF - Day Eight - IE and HR...Annual Results and Impact Evaluation Workshop for RBF - Day Eight - IE and HR...
Annual Results and Impact Evaluation Workshop for RBF - Day Eight - IE and HR...
 
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
 
Webinar: Energy Data - The New Profit Lever
Webinar: Energy Data - The New Profit LeverWebinar: Energy Data - The New Profit Lever
Webinar: Energy Data - The New Profit Lever
 
Cobit v5 High Level Controls Topology
Cobit v5 High Level Controls TopologyCobit v5 High Level Controls Topology
Cobit v5 High Level Controls Topology
 
Compliance Strategies, Cara Maguire
Compliance Strategies, Cara MaguireCompliance Strategies, Cara Maguire
Compliance Strategies, Cara Maguire
 
TMForum Network Asset Management Survey Report 2014
TMForum Network Asset Management Survey Report 2014TMForum Network Asset Management Survey Report 2014
TMForum Network Asset Management Survey Report 2014
 
Protecting PHi- 1-2016
Protecting PHi-  1-2016Protecting PHi-  1-2016
Protecting PHi- 1-2016
 
Work on Primary Care Spending Measures
Work on Primary Care Spending MeasuresWork on Primary Care Spending Measures
Work on Primary Care Spending Measures
 
The state of open data in Canada & the Open Data Barometer
The state of open data in Canada & the Open Data BarometerThe state of open data in Canada & the Open Data Barometer
The state of open data in Canada & the Open Data Barometer
 
Practical Measures for Measuring Security
Practical Measures for Measuring SecurityPractical Measures for Measuring Security
Practical Measures for Measuring Security
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Clean Energy: Structure and Role of Regulators
Clean Energy: Structure and Role of RegulatorsClean Energy: Structure and Role of Regulators
Clean Energy: Structure and Role of Regulators
 
Horizon Scan 2016 Results Webinar
Horizon Scan 2016 Results WebinarHorizon Scan 2016 Results Webinar
Horizon Scan 2016 Results Webinar
 
Inspiring Trust and Transparency: Skyword's Compliance with GDPR [Webinar]
Inspiring Trust and Transparency: Skyword's Compliance with GDPR [Webinar]Inspiring Trust and Transparency: Skyword's Compliance with GDPR [Webinar]
Inspiring Trust and Transparency: Skyword's Compliance with GDPR [Webinar]
 
VidSys Public Safety Solution Sheet
VidSys Public Safety Solution SheetVidSys Public Safety Solution Sheet
VidSys Public Safety Solution Sheet
 
Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000
Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000
Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000
 
Integrating efficiency into healthcare - A life cycle approach
Integrating efficiency into healthcare  - A life cycle approachIntegrating efficiency into healthcare  - A life cycle approach
Integrating efficiency into healthcare - A life cycle approach
 
A systems engineering approach to cannabis product development.v1.03 21-19
A systems engineering approach to cannabis product development.v1.03 21-19A systems engineering approach to cannabis product development.v1.03 21-19
A systems engineering approach to cannabis product development.v1.03 21-19
 

Destacado

Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
Wajahat Rajab
 

Destacado (10)

Simple webapps with nginx, uwsgi emperor and bottle
Simple webapps with nginx, uwsgi emperor and bottleSimple webapps with nginx, uwsgi emperor and bottle
Simple webapps with nginx, uwsgi emperor and bottle
 
EuroPython 2014 - How we switched our 800+ projects from Apache to uWSGI
EuroPython 2014 - How we switched our 800+ projects from Apache to uWSGIEuroPython 2014 - How we switched our 800+ projects from Apache to uWSGI
EuroPython 2014 - How we switched our 800+ projects from Apache to uWSGI
 
uWSGI - Swiss army knife for your Python web apps
uWSGI - Swiss army knife for your Python web appsuWSGI - Swiss army knife for your Python web apps
uWSGI - Swiss army knife for your Python web apps
 
Getting Started with ASP.net Core 1.0
Getting Started with ASP.net Core 1.0Getting Started with ASP.net Core 1.0
Getting Started with ASP.net Core 1.0
 
nginx入門
nginx入門nginx入門
nginx入門
 
An Introduction to OAuth 2
An Introduction to OAuth 2An Introduction to OAuth 2
An Introduction to OAuth 2
 
Scalable Django Architecture
Scalable Django ArchitectureScalable Django Architecture
Scalable Django Architecture
 
ASP.NET Core 1.0 Overview
ASP.NET Core 1.0 OverviewASP.NET Core 1.0 Overview
ASP.NET Core 1.0 Overview
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
containerd and CRI
containerd and CRIcontainerd and CRI
containerd and CRI
 

Similar a Symantec 2011 CIP Survey Global Results

Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
Priyank Hada
 
IT Governance Presentation by omaha 2008
IT Governance Presentation by  omaha 2008IT Governance Presentation by  omaha 2008
IT Governance Presentation by omaha 2008
ssusera19f45
 

Similar a Symantec 2011 CIP Survey Global Results (20)

Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
 
Benchmarking IT Agility Final Report
Benchmarking IT Agility Final ReportBenchmarking IT Agility Final Report
Benchmarking IT Agility Final Report
 
Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1
 
ILRI program outline: Impact at Scale
ILRI program outline: Impact at ScaleILRI program outline: Impact at Scale
ILRI program outline: Impact at Scale
 
Moving to the Cloud: Modernizing Data Architecture in Healthcare
Moving to the Cloud: Modernizing Data Architecture in HealthcareMoving to the Cloud: Modernizing Data Architecture in Healthcare
Moving to the Cloud: Modernizing Data Architecture in Healthcare
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
2 growth, concept and design
2 growth, concept and design2 growth, concept and design
2 growth, concept and design
 
Jisc's cyber security posture survey - how secure are you?
Jisc's cyber security posture survey - how secure are you?Jisc's cyber security posture survey - how secure are you?
Jisc's cyber security posture survey - how secure are you?
 
Creating a culture for data use: It takes a system strengthening approach
 Creating a culture for data use: It takes asystem strengthening approach Creating a culture for data use: It takes asystem strengthening approach
Creating a culture for data use: It takes a system strengthening approach
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to Leader
 
The Roadmap to Becoming a Top Performing Organization in Managing IT Operations
The Roadmap to Becoming a Top Performing Organization in Managing IT OperationsThe Roadmap to Becoming a Top Performing Organization in Managing IT Operations
The Roadmap to Becoming a Top Performing Organization in Managing IT Operations
 
Is Your Agency Data Challenged?
Is Your Agency Data Challenged?Is Your Agency Data Challenged?
Is Your Agency Data Challenged?
 
2012 Information Retention and eDiscovery Survey Global Results
2012 Information Retention and eDiscovery Survey Global Results2012 Information Retention and eDiscovery Survey Global Results
2012 Information Retention and eDiscovery Survey Global Results
 
inSupply Overview Presentation
inSupply Overview PresentationinSupply Overview Presentation
inSupply Overview Presentation
 
IT Governance Presentation by omaha 2008
IT Governance Presentation by  omaha 2008IT Governance Presentation by  omaha 2008
IT Governance Presentation by omaha 2008
 
Enterprise Agile Adoption
Enterprise Agile AdoptionEnterprise Agile Adoption
Enterprise Agile Adoption
 
IT governance in the public sector: a conceptual model
IT governance in the public sector: a conceptual modelIT governance in the public sector: a conceptual model
IT governance in the public sector: a conceptual model
 
Monitoring & Evaluation of National Adaptation: Key challenges and emerging s...
Monitoring & Evaluation of National Adaptation: Key challenges and emerging s...Monitoring & Evaluation of National Adaptation: Key challenges and emerging s...
Monitoring & Evaluation of National Adaptation: Key challenges and emerging s...
 
Canada’s innovation agenda apr 13, 2017
Canada’s innovation agenda apr 13, 2017Canada’s innovation agenda apr 13, 2017
Canada’s innovation agenda apr 13, 2017
 

Más de Symantec

Más de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Symantec 2011 CIP Survey Global Results

  • 2. Methodology • Survey performed by Applied Research • Surveyed CIP-specific industries – All industries from last year – Added 8 new industries this year (all on CIP list) • 3,475 respondents – 1,900 SMBs (5 – 499 employees) – 1,575 enterprises (>1,000 US, >500 ROW) • Spoke to person in charge of computers 2
  • 3. Key Findings • Lower awareness & engagement in government CIP programs • Slightly more ambivalence about government CIP programs • Organizations feel less prepared
  • 4. Lower Awareness & Engagement in Government CIP Programs • Lower awareness of government CIP programs in their country (36% vs. 55%) • Less engaged in government CIP programs (37% vs. 56%)
  • 5. Slightly More Ambivalence About Government CIP Programs • More are ‘neutral’ or have ‘no opinion’ about government CIP programs (42% vs. 26%) • Slightly less willing to cooperate (57% vs. 66%)
  • 6. Organizations Feel Less Prepared • Slight decrease in their self-assessment of readiness (-8%) • Self-assessment of safeguards shows decline in readiness (-5 to -10%)
  • 7. Recommendations: Protecting Critical Infrastructure • Develop and enforce IT policies, automate all compliance processes • Adopt a proactive, information-centric approach to protecting information and interactions • Manage systems by implementing secure operating environments • Protect the infrastructure by securing endpoints, messaging and Web environments • Ensure 24x7 availability • Develop an information management strategy that includes an information retention plan and policies
  • 8. Recommendations for Government • Continue to put forth the resources to establish government critical infrastructure programs • Partner with industry associations and private enterprise groups to disseminate information to raise awareness of CIP organizations and plans • Emphasize that security is not enough to stay resilient in the face of today’s cyberattacks