SlideShare una empresa de Scribd logo
1 de 30
Descargar para leer sin conexión
2014 State of Endpoint Risk
Sponsored by Lumension Corporation
Presentation by Dr. Larry Ponemon
January 8, 2014
Today’s Agenda

•

Introduction

•

2014 State of the Endpoint Survey
o Key Findings
o
o

•

1/8/14

Additional Findings
Methods

Q&A

Ponemon Institute© presentation

1
Today’s Presenters

Ed Brice
SVP, Worldwide Marketing
Lumension

2

Dr. Larry Ponemon
Chairman & President
Ponemon Institute
Ponemon Institute LLC
The Institute is dedicated to advancing responsible information management
practices that positively affect privacy, data protection and information security in
business and government.
The Institute conducts independent research, educates leaders from the private
and public sectors and verifies the privacy and data protection practices of
organizations.
Ponemon Institute is a full member of CASRO (Council of American Survey
Research organizations). Dr. Ponemon serves as CASRO’s chairman of
Government & Public Affairs Committee of the Board.
The Institute has assembled more than 65+ leading multinational corporations
called the RIM Council, which focuses the development and execution of ethical
principles for the collection and use of personal data about people and
households.
The majority of active participants are privacy or information security leaders.

1/8/14

Ponemon Institute: Private and Confidential

3
About this research

The purpose of this study is to understand how organizations
are dealing with the IT endpoint risk. The study reveals that
endpoint security risk is more difficult to manage than ever due
to the growing number of employees and other insiders using
multiple mobile devices in the workplace. Another challenge
organizations face is the increase in personal devices
connected to the network and the growing popularity of public
cloud services.

1/8/14

Ponemon Institute© presentation

4
Key findings
•

•

•

•

1/8/14

Endpoint security risk is more difficult than ever to manage.
Seventy-one percent of respondents say the security threats created
by vulnerabilities to the endpoint have become more difficult to stop
or mitigate.
In the IT environment, mobility and third party applications are
the greatest security risks. Seventy-five percent of respondents
say mobile devices such as smart phones represent the greatest
risk of potential IT security risk within the IT environment.
The frequency of malware incidents increases. Forty-four
percent of respondents report a major increase in the number of
malware incidents targeting their endpoints.
Mobile endpoints are vulnerable to malware attacks. Sixty-eight
percent of respondents say their mobile endpoints have been the
target of malware in the last 12 months.

Ponemon Institute© presentation

5
More key findings
•

•

•

1/8/14

APTs are attacking endpoints. Forty percent of respondents say
their endpoints have been the entry point for an APT/targeted attack
in the past 12 months.
Most organizations make endpoint security a priority but
budgets lag behind. In the past 24 months, more respondents say
endpoint security is a priority in their organization’s overall IT
security strategy (65 percent of respondents). However, only 29
percent of respondents say spending will either significantly
increase or increase for endpoint security.
Malware incidents are straining IT security budgets. Fifty
percent of respondents say their organization’s IT operating
expenses are increasing. Sixty-seven percent say malware incidents
contribute a very significant or significant increase in these
expenses.

Ponemon Institute© presentation

6
Key Findings
What are the biggest threats to
endpoint security?
Two responses permitted

More multiple mobile devices in the workplace

60%

More personal devices connected to the network

51%

More insecure mobile devices in the workplace

33%

Malware infections are more difficult to detect

32%

More offsite employees using insecure WiFi

16%

Employees believe productivity is more important than
the security of devices

8%
0%

1/8/14

10%

20%

Ponemon Institute© presentation

30%

40%

50%

60%

70%

8
Greatest IT security risks

Mobile devices such as smart phones

75%

Across 3rd party applications

66%

Mobile/remote employees

45%

Our PC desktop/laptop

43%

Negligent insider risk

40%

0%

1/8/14

10%

20%

30%

Ponemon Institute© presentation

40%

50%

60%

70%

80%

9
IT security risks of greatest concern
to the organization
Three choices permitted
55%

Increased use of mobile platforms

47%
44%

Use of cloud computing

28%
39%
36%

APTs

35%
31%

Sophistication of cyber attackers

28%
30%

Growing volume of malware

25%

Insufficient budget

30%

Lack of integration between endpoint operations and
security technologies

6%
18%
0%

FY 2013

1/8/14

10%

20%

30%

40%

50%

60%

FY 2012

Ponemon Institute© presentation

10
Applications with the greatest IT risk
Top five choices

60%

Adobe

55%
50%

Google Docs

55%
37%

Microsoft OS/applications

44%
33%

General 3rd party applications outside of Microsoft

40%
30%

Apple/Mac OS

30%
0%
FY 2013

1/8/14

10%

20%

30%

40%

50%

60%

70%

FY 2012

Ponemon Institute© presentation

11
The most frequent types of malware
incidents
More than one response permitted
80%

General malware

86%
74%
79%

Web-borne malware attacks

67%
65%

Rootkits

59%
54%

APTs / Targeted attacks

49%

Botnet attacks

55%
48%

Spear phishing *
0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

This response was not an option in FY 2012

FY 2013
1/8/14

FY 2012

Ponemon Institute© presentation

12
What are the most important MDM
features?
Three choices permitted

73%

Virus and malware detection or prevention

65%
70%
70%

Provisioning and access policy management
52%

Asset tracking

43%
38%

Encryption and other data loss technologies

44%
35%
39%

Anti-theft features

32%

Remote wipe capability

Other

38%
0%
1%
0%

10%
FY 2013

1/8/14

20%

30%

40%

50%

60%

70%

80%

FY 2012

Ponemon Institute© presentation

13
Steps to make BYOD more secure
More than one response permitted

Voluntary installation of endpoint protection agent

54%

Mandatory enrollment in company MDM solution through
technological means

35%

Mandatory endpoint protection agent on laptops through
technological means

32%

Voluntary enrollment in MDM solution

29%

Prohibiting exchange activesync through technologic
means

29%

Active discovery of BYOD devices on the network and in
exchange/email server logs

25%
0%

1/8/14

10%

Ponemon Institute© presentation

20%

30%

40%

50%

60%

14
How did the organization learn about the
APT attack?

Anomalous exfiltration traffic on the network

53%

Endpoint security technology alerted us to a possible
breach

24%

Notified by law enforcement

21%

Other

2%

0%

1/8/14

10%

Ponemon Institute© presentation

20%

30%

40%

50%

60%

15
How did the APT attack start?
More than one response permitted

Spear phishing emails sent to employees

45%

Web-based click jacking

34%

Fraudulently signed code/ digital certificates

33%

Memory based attack

21%

SQL injection code

12%

USB key delivery

9%

Unsure

25%

Other

2%
0%

1/8/14

5%

10%

15%

20%

Ponemon Institute© presentation

25%

30%

35%

40%

45%

50%

16
Will the budget for endpoint security
change?
60%
55%
50%

40%

30%
24%
20%
12%
10%
5%

4%

0%
Significantly
increased

1/8/14

Increased

Stayed the same

Ponemon Institute© presentation

Decreased

Significantly
decreased

17
Do malware incidents increase IT
security expenses?
50%
44%

45%

43%

40%
35%
30%
25%

28%
23%

23%
21%

20%
15%
10%

10%

8%

5%
0%
Very significant

Significant
FY 2013

1/8/14

Some significance

None

FY 2012

Ponemon Institute© presentation

18
What technologies will organizations
buy?
More than one response permitted

40%

Application control

50%
33%

DLP (content filtering)

48%
33%

Mobile device management

34%
26%

Device control

33%
20%

Big data analytics

37%
0%

10%

20%

Today's use rate

1/8/14

30%

40%

50%

60%

Use will increase

Ponemon Institute© presentation

19
Software agents & software
management user interfaces for
endpoint risk management
40%

38%

38%

35%
30%
25%

25%

23%

20%

18%
16%

15%

14%

14%
9%

10%
5%

5%
0%
1 to 2

3 to 5

6 to 10

More than 10

Cannot determine

Number of software agents installed on each endpoint
Number of user interfacesused to manage endpoint operations

1/8/14

Ponemon Institute© presentation

20
Methods
Sample response

Freq

Total sampling frame

Pct%

19,001

100.0%

Total returns

894

4.7%

Rejected and screened surveys

218

1.1%

Final sample

676

3.6%

1/8/14

Ponemon Institute© presentation

22
Organizational level that best
describes your current position

8%

2% 1% 2%
Senior Executive

18%

Vice President
Director
Manager

25%

Supervisor
Technician
Staff
25%
Contractor

19%

1/8/14

Ponemon Institute© presentation

23
Primary Person you or your IT
security leader reports

4%

2%
2% 2%
Chief Information Officer

12%

Chief Information Security Officer
Chief Risk Officer
Compliance Officer
53%

Chief Financial Officer
Chief Security Officer

25%

1/8/14

Other

Ponemon Institute© presentation

24
What industry best describes your
organization’s primary industry
focus?
3%

2% 3%

3%

Financial Services

21%

3%

Health & pharmaceuticals
Public Sector

4%

Services
4%

Retailing
Technology & software
Energy

5%
12%

Consumer products
Entertainment & media
Hospitality

8%

Education & research
Transportation
12%

9%

Communications
Other

11%

1/8/14

Ponemon Institute© presentation

25
Organization’s worldwide headcount

3%

8%

20%

< 500 people
15%
500 to 1,000 people
1,001 to 5,000 people
5,001 to 25,000 people
25,001 to 75,000 people
20%

> 75,000 people

34%

1/8/14

Ponemon Institute© presentation

26
Caveats
There are inherent limitations to survey research that need to be carefully considered
before drawing inferences from findings. The following items are specific limitations
that are germane to most web-based surveys.
Non-response bias: The current findings are based on a sample of survey returns. We
sent surveys to a representative sample of individuals, resulting in a large number of
usable returned responses. Despite non-response tests, it is always possible that
individuals who did not participate are substantially different in terms of underlying
beliefs from those who completed the instrument.
Sampling-frame bias: The accuracy is based on contact information and the degree to
which the list is representative of individuals who are IT or IT security practitioners.
We also acknowledge that the results may be biased by external events such as
media coverage. We also acknowledge bias caused by compensating subjects to
complete this research within a holdout period.
Self-reported results: The quality of survey research is based on the integrity of
confidential responses received from subjects. While certain checks and balances can
be incorporated into the survey process, there is always the possibility that a subject
did not provide a truthful response.

1/8/14

Ponemon Institute© presentation

27
Questions?
Ponemon Institute
Toll Free: 800.887.3118
Michigan HQ: 2308 US 31 N.
Traverse City, MI 49686 USA
research@ponemon.org

Ponemon Institute© presentation

Page 28
More Information
• 5 Years of Endpoint Risk
https://www.lumension.com/2014
»
»
»
»

2014 State of Endpoint Risk Report
What Keeps IT Up All Night Video
5 Years of Endpoint Risk Infographic
Greatest IT Security Risks of 2014 Webcast
On-Demand

• Lumension® Endpoint Management
and Security Suite
» Online Demo Video:
https://www.lumension.com/endpointmanagement-security-suite/demo.aspx
» Free Trial (virtual or download):
https://www.lumension.com/endpointmanagement-security-suite/free-trial.aspx
» Get a Quote (and more)
https://www.lumension.com/get-a-quote.aspx

29

Más contenido relacionado

La actualidad más candente

Better Security Through Big Data Analytics
Better Security Through Big Data AnalyticsBetter Security Through Big Data Analytics
Better Security Through Big Data AnalyticsSymantec
 
Survey: IT is Everywhere (End Users’ Perspective, North America)
Survey: IT is Everywhere (End Users’ Perspective, North America)Survey: IT is Everywhere (End Users’ Perspective, North America)
Survey: IT is Everywhere (End Users’ Perspective, North America)SolarWinds
 
Ponemon survey cloud security webcast
Ponemon survey cloud security webcastPonemon survey cloud security webcast
Ponemon survey cloud security webcastDome9 Security
 
Report: How Engaged Are Employees During COVID-19?
Report: How Engaged Are Employees During COVID-19?Report: How Engaged Are Employees During COVID-19?
Report: How Engaged Are Employees During COVID-19?Sarah Jackson
 
Network GRC Delivery
Network GRC DeliveryNetwork GRC Delivery
Network GRC Deliveryiansadler
 
Corporate Internet Addiction
Corporate Internet AddictionCorporate Internet Addiction
Corporate Internet Addictionbesimplybe
 
Survey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT InfrastructuresSurvey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT InfrastructuresSolarWinds
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportSymantec
 
Ponemon cloud security study
Ponemon cloud security studyPonemon cloud security study
Ponemon cloud security studyDome9 Security
 
Study: Employee Expectations Are Changing Due to COVID-19
Study: Employee Expectations Are Changing Due to COVID-19Study: Employee Expectations Are Changing Due to COVID-19
Study: Employee Expectations Are Changing Due to COVID-19Sarah Jackson
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012Lumension
 
COVID-19: How Businesses Are Handling the Crisis
COVID-19: How Businesses Are Handling the CrisisCOVID-19: How Businesses Are Handling the Crisis
COVID-19: How Businesses Are Handling the CrisisSarah Jackson
 
APNIC 2018 Survey Results
APNIC 2018 Survey ResultsAPNIC 2018 Survey Results
APNIC 2018 Survey ResultsAPNIC
 
Online reputation management survey presentation
Online reputation management survey presentationOnline reputation management survey presentation
Online reputation management survey presentationJosep Claret
 
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsOsterman Research, Inc.
 

La actualidad más candente (18)

Better Security Through Big Data Analytics
Better Security Through Big Data AnalyticsBetter Security Through Big Data Analytics
Better Security Through Big Data Analytics
 
Survey: IT is Everywhere (End Users’ Perspective, North America)
Survey: IT is Everywhere (End Users’ Perspective, North America)Survey: IT is Everywhere (End Users’ Perspective, North America)
Survey: IT is Everywhere (End Users’ Perspective, North America)
 
Software piracy in Bangladesh
Software piracy in BangladeshSoftware piracy in Bangladesh
Software piracy in Bangladesh
 
Ponemon survey cloud security webcast
Ponemon survey cloud security webcastPonemon survey cloud security webcast
Ponemon survey cloud security webcast
 
Report: How Engaged Are Employees During COVID-19?
Report: How Engaged Are Employees During COVID-19?Report: How Engaged Are Employees During COVID-19?
Report: How Engaged Are Employees During COVID-19?
 
Network GRC Delivery
Network GRC DeliveryNetwork GRC Delivery
Network GRC Delivery
 
Corporate Internet Addiction
Corporate Internet AddictionCorporate Internet Addiction
Corporate Internet Addiction
 
Survey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT InfrastructuresSurvey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT Infrastructures
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
Ponemon cloud security study
Ponemon cloud security studyPonemon cloud security study
Ponemon cloud security study
 
Study: Employee Expectations Are Changing Due to COVID-19
Study: Employee Expectations Are Changing Due to COVID-19Study: Employee Expectations Are Changing Due to COVID-19
Study: Employee Expectations Are Changing Due to COVID-19
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
 
2010 GISS EY
2010 GISS EY2010 GISS EY
2010 GISS EY
 
COVID-19: How Businesses Are Handling the Crisis
COVID-19: How Businesses Are Handling the CrisisCOVID-19: How Businesses Are Handling the Crisis
COVID-19: How Businesses Are Handling the Crisis
 
APNIC 2018 Survey Results
APNIC 2018 Survey ResultsAPNIC 2018 Survey Results
APNIC 2018 Survey Results
 
Online reputation management survey presentation
Online reputation management survey presentationOnline reputation management survey presentation
Online reputation management survey presentation
 
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate Environments
 

Similar a Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk

State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe TrustArc
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014Peggy Lawless
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSilicon Valley Bank
 
Jonathan raymond 2010 rotman telus - atlseccon2011
Jonathan raymond   2010 rotman telus - atlseccon2011Jonathan raymond   2010 rotman telus - atlseccon2011
Jonathan raymond 2010 rotman telus - atlseccon2011Atlantic Security Conference
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskFiona Lew
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...IBM Security
 
The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.CAS
 
Cloud Management in the U.S. Federal Government
Cloud Management in the U.S. Federal GovernmentCloud Management in the U.S. Federal Government
Cloud Management in the U.S. Federal Governmentscoopnewsgroup
 
Security in the New World of Content and Documents
Security in the New World of Content and DocumentsSecurity in the New World of Content and Documents
Security in the New World of Content and DocumentsNitro, Inc.
 
Ponemon Institute Research Report
Ponemon Institute Research ReportPonemon Institute Research Report
Ponemon Institute Research ReportPeter Tutty
 
Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Emily Brady
 
Best practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingBest practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingwardell henley
 
5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats5 Key Findings on Advanced Threats
5 Key Findings on Advanced ThreatsHannah Jenney
 

Similar a Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk (20)

State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
Jonathan raymond 2010 rotman telus - atlseccon2011
Jonathan raymond   2010 rotman telus - atlseccon2011Jonathan raymond   2010 rotman telus - atlseccon2011
Jonathan raymond 2010 rotman telus - atlseccon2011
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data Risk
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
 
The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.
 
Cloud Management in the U.S. Federal Government
Cloud Management in the U.S. Federal GovernmentCloud Management in the U.S. Federal Government
Cloud Management in the U.S. Federal Government
 
Security in the New World of Content and Documents
Security in the New World of Content and DocumentsSecurity in the New World of Content and Documents
Security in the New World of Content and Documents
 
Ponemon Institute Research Report
Ponemon Institute Research ReportPonemon Institute Research Report
Ponemon Institute Research Report
 
Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16
 
Best practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingBest practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_training
 
5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats
 
2014 Executive Breach Preparedness Research Report
2014 Executive Breach Preparedness Research Report2014 Executive Breach Preparedness Research Report
2014 Executive Breach Preparedness Research Report
 

Más de Lumension

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsLumension
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers GuideLumension
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationLumension
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary ResultsLumension
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Lumension
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Lumension
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftLumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and AnalysisLumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateLumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskLumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security SolutionsLumension
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesLumension
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksLumension
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT RiskLumension
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...Lumension
 
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusDefending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusLumension
 

Más de Lumension (20)

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusDefending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
 

Último

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk

  • 1. 2014 State of Endpoint Risk Sponsored by Lumension Corporation Presentation by Dr. Larry Ponemon January 8, 2014
  • 2. Today’s Agenda • Introduction • 2014 State of the Endpoint Survey o Key Findings o o • 1/8/14 Additional Findings Methods Q&A Ponemon Institute© presentation 1
  • 3. Today’s Presenters Ed Brice SVP, Worldwide Marketing Lumension 2 Dr. Larry Ponemon Chairman & President Ponemon Institute
  • 4. Ponemon Institute LLC The Institute is dedicated to advancing responsible information management practices that positively affect privacy, data protection and information security in business and government. The Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations. Ponemon Institute is a full member of CASRO (Council of American Survey Research organizations). Dr. Ponemon serves as CASRO’s chairman of Government & Public Affairs Committee of the Board. The Institute has assembled more than 65+ leading multinational corporations called the RIM Council, which focuses the development and execution of ethical principles for the collection and use of personal data about people and households. The majority of active participants are privacy or information security leaders. 1/8/14 Ponemon Institute: Private and Confidential 3
  • 5. About this research The purpose of this study is to understand how organizations are dealing with the IT endpoint risk. The study reveals that endpoint security risk is more difficult to manage than ever due to the growing number of employees and other insiders using multiple mobile devices in the workplace. Another challenge organizations face is the increase in personal devices connected to the network and the growing popularity of public cloud services. 1/8/14 Ponemon Institute© presentation 4
  • 6. Key findings • • • • 1/8/14 Endpoint security risk is more difficult than ever to manage. Seventy-one percent of respondents say the security threats created by vulnerabilities to the endpoint have become more difficult to stop or mitigate. In the IT environment, mobility and third party applications are the greatest security risks. Seventy-five percent of respondents say mobile devices such as smart phones represent the greatest risk of potential IT security risk within the IT environment. The frequency of malware incidents increases. Forty-four percent of respondents report a major increase in the number of malware incidents targeting their endpoints. Mobile endpoints are vulnerable to malware attacks. Sixty-eight percent of respondents say their mobile endpoints have been the target of malware in the last 12 months. Ponemon Institute© presentation 5
  • 7. More key findings • • • 1/8/14 APTs are attacking endpoints. Forty percent of respondents say their endpoints have been the entry point for an APT/targeted attack in the past 12 months. Most organizations make endpoint security a priority but budgets lag behind. In the past 24 months, more respondents say endpoint security is a priority in their organization’s overall IT security strategy (65 percent of respondents). However, only 29 percent of respondents say spending will either significantly increase or increase for endpoint security. Malware incidents are straining IT security budgets. Fifty percent of respondents say their organization’s IT operating expenses are increasing. Sixty-seven percent say malware incidents contribute a very significant or significant increase in these expenses. Ponemon Institute© presentation 6
  • 9. What are the biggest threats to endpoint security? Two responses permitted More multiple mobile devices in the workplace 60% More personal devices connected to the network 51% More insecure mobile devices in the workplace 33% Malware infections are more difficult to detect 32% More offsite employees using insecure WiFi 16% Employees believe productivity is more important than the security of devices 8% 0% 1/8/14 10% 20% Ponemon Institute© presentation 30% 40% 50% 60% 70% 8
  • 10. Greatest IT security risks Mobile devices such as smart phones 75% Across 3rd party applications 66% Mobile/remote employees 45% Our PC desktop/laptop 43% Negligent insider risk 40% 0% 1/8/14 10% 20% 30% Ponemon Institute© presentation 40% 50% 60% 70% 80% 9
  • 11. IT security risks of greatest concern to the organization Three choices permitted 55% Increased use of mobile platforms 47% 44% Use of cloud computing 28% 39% 36% APTs 35% 31% Sophistication of cyber attackers 28% 30% Growing volume of malware 25% Insufficient budget 30% Lack of integration between endpoint operations and security technologies 6% 18% 0% FY 2013 1/8/14 10% 20% 30% 40% 50% 60% FY 2012 Ponemon Institute© presentation 10
  • 12. Applications with the greatest IT risk Top five choices 60% Adobe 55% 50% Google Docs 55% 37% Microsoft OS/applications 44% 33% General 3rd party applications outside of Microsoft 40% 30% Apple/Mac OS 30% 0% FY 2013 1/8/14 10% 20% 30% 40% 50% 60% 70% FY 2012 Ponemon Institute© presentation 11
  • 13. The most frequent types of malware incidents More than one response permitted 80% General malware 86% 74% 79% Web-borne malware attacks 67% 65% Rootkits 59% 54% APTs / Targeted attacks 49% Botnet attacks 55% 48% Spear phishing * 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% This response was not an option in FY 2012 FY 2013 1/8/14 FY 2012 Ponemon Institute© presentation 12
  • 14. What are the most important MDM features? Three choices permitted 73% Virus and malware detection or prevention 65% 70% 70% Provisioning and access policy management 52% Asset tracking 43% 38% Encryption and other data loss technologies 44% 35% 39% Anti-theft features 32% Remote wipe capability Other 38% 0% 1% 0% 10% FY 2013 1/8/14 20% 30% 40% 50% 60% 70% 80% FY 2012 Ponemon Institute© presentation 13
  • 15. Steps to make BYOD more secure More than one response permitted Voluntary installation of endpoint protection agent 54% Mandatory enrollment in company MDM solution through technological means 35% Mandatory endpoint protection agent on laptops through technological means 32% Voluntary enrollment in MDM solution 29% Prohibiting exchange activesync through technologic means 29% Active discovery of BYOD devices on the network and in exchange/email server logs 25% 0% 1/8/14 10% Ponemon Institute© presentation 20% 30% 40% 50% 60% 14
  • 16. How did the organization learn about the APT attack? Anomalous exfiltration traffic on the network 53% Endpoint security technology alerted us to a possible breach 24% Notified by law enforcement 21% Other 2% 0% 1/8/14 10% Ponemon Institute© presentation 20% 30% 40% 50% 60% 15
  • 17. How did the APT attack start? More than one response permitted Spear phishing emails sent to employees 45% Web-based click jacking 34% Fraudulently signed code/ digital certificates 33% Memory based attack 21% SQL injection code 12% USB key delivery 9% Unsure 25% Other 2% 0% 1/8/14 5% 10% 15% 20% Ponemon Institute© presentation 25% 30% 35% 40% 45% 50% 16
  • 18. Will the budget for endpoint security change? 60% 55% 50% 40% 30% 24% 20% 12% 10% 5% 4% 0% Significantly increased 1/8/14 Increased Stayed the same Ponemon Institute© presentation Decreased Significantly decreased 17
  • 19. Do malware incidents increase IT security expenses? 50% 44% 45% 43% 40% 35% 30% 25% 28% 23% 23% 21% 20% 15% 10% 10% 8% 5% 0% Very significant Significant FY 2013 1/8/14 Some significance None FY 2012 Ponemon Institute© presentation 18
  • 20. What technologies will organizations buy? More than one response permitted 40% Application control 50% 33% DLP (content filtering) 48% 33% Mobile device management 34% 26% Device control 33% 20% Big data analytics 37% 0% 10% 20% Today's use rate 1/8/14 30% 40% 50% 60% Use will increase Ponemon Institute© presentation 19
  • 21. Software agents & software management user interfaces for endpoint risk management 40% 38% 38% 35% 30% 25% 25% 23% 20% 18% 16% 15% 14% 14% 9% 10% 5% 5% 0% 1 to 2 3 to 5 6 to 10 More than 10 Cannot determine Number of software agents installed on each endpoint Number of user interfacesused to manage endpoint operations 1/8/14 Ponemon Institute© presentation 20
  • 23. Sample response Freq Total sampling frame Pct% 19,001 100.0% Total returns 894 4.7% Rejected and screened surveys 218 1.1% Final sample 676 3.6% 1/8/14 Ponemon Institute© presentation 22
  • 24. Organizational level that best describes your current position 8% 2% 1% 2% Senior Executive 18% Vice President Director Manager 25% Supervisor Technician Staff 25% Contractor 19% 1/8/14 Ponemon Institute© presentation 23
  • 25. Primary Person you or your IT security leader reports 4% 2% 2% 2% Chief Information Officer 12% Chief Information Security Officer Chief Risk Officer Compliance Officer 53% Chief Financial Officer Chief Security Officer 25% 1/8/14 Other Ponemon Institute© presentation 24
  • 26. What industry best describes your organization’s primary industry focus? 3% 2% 3% 3% Financial Services 21% 3% Health & pharmaceuticals Public Sector 4% Services 4% Retailing Technology & software Energy 5% 12% Consumer products Entertainment & media Hospitality 8% Education & research Transportation 12% 9% Communications Other 11% 1/8/14 Ponemon Institute© presentation 25
  • 27. Organization’s worldwide headcount 3% 8% 20% < 500 people 15% 500 to 1,000 people 1,001 to 5,000 people 5,001 to 25,000 people 25,001 to 75,000 people 20% > 75,000 people 34% 1/8/14 Ponemon Institute© presentation 26
  • 28. Caveats There are inherent limitations to survey research that need to be carefully considered before drawing inferences from findings. The following items are specific limitations that are germane to most web-based surveys. Non-response bias: The current findings are based on a sample of survey returns. We sent surveys to a representative sample of individuals, resulting in a large number of usable returned responses. Despite non-response tests, it is always possible that individuals who did not participate are substantially different in terms of underlying beliefs from those who completed the instrument. Sampling-frame bias: The accuracy is based on contact information and the degree to which the list is representative of individuals who are IT or IT security practitioners. We also acknowledge that the results may be biased by external events such as media coverage. We also acknowledge bias caused by compensating subjects to complete this research within a holdout period. Self-reported results: The quality of survey research is based on the integrity of confidential responses received from subjects. While certain checks and balances can be incorporated into the survey process, there is always the possibility that a subject did not provide a truthful response. 1/8/14 Ponemon Institute© presentation 27
  • 29. Questions? Ponemon Institute Toll Free: 800.887.3118 Michigan HQ: 2308 US 31 N. Traverse City, MI 49686 USA research@ponemon.org Ponemon Institute© presentation Page 28
  • 30. More Information • 5 Years of Endpoint Risk https://www.lumension.com/2014 » » » » 2014 State of Endpoint Risk Report What Keeps IT Up All Night Video 5 Years of Endpoint Risk Infographic Greatest IT Security Risks of 2014 Webcast On-Demand • Lumension® Endpoint Management and Security Suite » Online Demo Video: https://www.lumension.com/endpointmanagement-security-suite/demo.aspx » Free Trial (virtual or download): https://www.lumension.com/endpointmanagement-security-suite/free-trial.aspx » Get a Quote (and more) https://www.lumension.com/get-a-quote.aspx 29