SlideShare una empresa de Scribd logo
1 de 25
Descargar para leer sin conexión
CIOnet survey on
Cyber Security
The results

Chris Verdonck
EMEA Leader, Deloitte Enterprise Risk Services




Brussels, October 12th 2010
“It's the great irony of our Information Age - the very technologies that
      empower us to create and to build also empower those who would
                               disrupt and destroy.”

                              USA President Barack Obama on "Securing Our Nation's Cyber Infrastructure “




2   UNCLASSIFIED - CIOnet survey on Cyber Security                                                          © 2010
Agenda.




3   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Agenda


     Survey context
     Respondents
     Results




4    UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Survey Context


                                                      Cyber culture is growing faster than
                                                       cyber security, so everything that
                                                       depends on cyber space is at risk

                                                      Information is ubiquitous - Our society
                                                       and economy have become critically
                                                       dependent on digital connectivity and
                                                       services;

                                                      Cyber security threats are continuously
                                                       increasing in complexity and occurrence;
                                                       thus they require more management
                                                       attention;

                                                      CIOnet members were surveyed on 16
                                                       questions regarding cyber security until
                                                       September 26th 2010.

5   UNCLASSIFIED - CIOnet survey on Cyber Security                                      © 2010
Respondents.




6   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Response demographics

                                                                  Countries
                                                      53 respondents from 6 different
                                                       countries;

                                                      Most responses from Belgium
                                                       (35,8%) followed by Italy and UK
                                                       (each 18,8%)



                                                                   Sectors
                                                      Responses spread over different
                                                       sectors

                                                      Most respondents in Financials
                                                       (24,5%), and Industrial &
                                                       Manufacturing (20,7%)


7   UNCLASSIFIED - CIOnet survey on Cyber Security                                  © 2010
Response company types

                                                                Company type
                                                      67.9% of respondents
                                                       representing their company’s
                                                       headquarters.




                                                            Number of employees
                                                      In terms of company size, over
                                                       half of the survey responders has
                                                       more then 1000+ employees.




8   UNCLASSIFIED - CIOnet survey on Cyber Security                                    © 2010
Results.




9   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Cyber liabilities


 Almost 85% responded that
  they analyzed their cyber
  liabilities in a thorough way;

 However there is still
  uncertainty on what
  regulations are applicable. EU
  DPA and ISO 27001 may not
  be enough to comply with;

 Despite that respondents
  indicate to have assessed
  their liabilities, further
  responses in the survey
  indicate a need for stronger
  action.



10   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Applicable legislation


 Over 76% of the survey
  respondents is confident that
  their organization have an
  overview of applicable laws in
  the context of cyber security;

 A large part of them only
  operates in one country, but
  legal aspect with regards to
  cyber security can differ
  greatly between countries.




11   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Theft of trade secrets


 Almost 18% of the
  respondents’ organizations
  have not assessed the risk of
  loosing trade secrets;

 For the respondents that
  claim they have, the question
  is how comprehensive such
  assessment was;

 It is essential to ensure that
  the risks regarding theft of
  trade secrets are frequently
  re-assessed and appropriate
  actions taken to mitigate
  them.



12   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Impact of internal or external cyber attacks

 All respondents indicated their
  organisation could be
  impacted in at least one
  domain;

 Over 81% of respondents
  believes cyber attacks would
  impact the brand and image of
  their organization.
  Stakeholders expect cyber
  security challenges to be
  addressed appropriately;

 Respondents indicate that
  internal attacks are more likely
  to cause critical operation
  disruption, and external
  attacks could affect market
  share more.
13   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Cyber Security threats


 Over 35% of respondents see
  a primary threat in the
  increased complexity of
  identity and access
  management;

 It is interesting to note that
  almost 22% of the
  respondents indicate that
  their current controls are
  struggling to keep pace;

 Inadequate network access
  control and the uptake of
  social networks also raises
  cyber security concerns.
                                                      Other:
                                                      •  User and management awareness of cyber risks,
                                                      •  Unpatched and unsupported legacy applications and systems
                                                      •  Crimeware will be the biggest threat over workstations, mobile operators and
                                                         eventually mobile phones
14   UNCLASSIFIED - CIOnet survey on Cyber Security                                                                          © 2010
Security Staff


 Over 35% of the respondents’
  organizations have no policy
  regarding maintaining a
  security staff;

 There is a risk of critical
  information exposure and
  knowledge drain as people
  rotate in and out of
  organizations;

 The increasingly complexity
  of technology and the cyber
  threats which organizations
  face require adequate
  security staff and skills.



15   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Cyber Security awareness


 82% of respondents indicate to
  increase cyber security
  awareness through security
  audits. These typically present
  a partial snapshot of the risk
  posture to the stakeholders;

 Furthermore respondents
  indicate specific training and
  awareness initiatives (72%),
  provisions in the disciplinary
  policy (68%), while 56%
  indicate to have been
  implementing a security
  framework that contributed to
  the general awareness.



16   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Preventing legal exposure



 Respondents indicate how
  monitoring and audit of
  compliance is the most
  common action to prevent
  legal exposure (82%);

 Half of the survey candidates
  also monitors and requests
  audit reports from your third
  party business partners as
  some of the risk scope is
  outsourced.



                                                      Other:
                                                      •  Vulnerability assessments and penetration testing;
                                                      •  Defining security controls;
                                                      •  Ensuring good contracting practices.

17   UNCLASSIFIED - CIOnet survey on Cyber Security                                                           © 2010
Assessing vulnerabilities


 About 20% of all
  organizations do not regularly
  assess their biggest
  vulnerabilities, implying they
  do not have a view on the
  most critical cyber risks they
  face;

 Organizations need a
  consolidated risk overview in
  order to define funded actions
  and manage risk
  appropriately.


                                                      Comment:

                                                      •  “It is more a day to day job whereby risks are constantly monitored and
                                                         priorities adapted overtime”



18   UNCLASSIFIED - CIOnet survey on Cyber Security                                                                     © 2010
Incident response


 Over 35% of all organizations
  do not regularly review and
  update their incident
  response plans. Several
  respondents commented
  update action was ongoing;

 As the nature of cyber
  incidents in function of threats
  and vulnerabilities is
  constantly evolving, one can
  debate if yearly updates on
  incident response plans is
  even enough.




19   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Incident communication


 Over 82% of the responding
  organizations are convinced of
  the importance of appropriate
  communication during and after
  a Cyber Security incident;

 In almost 18% of the
  respondents companies,
  inadequate awareness is in
  place regarding the significance
  of controlled incident
  communications with internal
  and external stakeholders.




20   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Business continuity management

 While many respondents
  commented on the limited scope of
  their current business continuity
  plans (BCP), a surprising 76%
  indicated such plans are in place;

 This does conflict with the fact that
  only 50% have a crisis
  communications plan, which is an
  essential part of a continuity
  planning;

 Some respondents referred to their
  third party service agreements, but
  should keep in mind their own
  responsibilities to ensure business
  continuity.



21   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Insurance


 Almost 72% indicates not
  having insurance coverage
  for cyber security incidents.
  Typically expert evidence is
  needed to calculate the
  financial and other damages
  that need to be covered;

 If an insurance policy is in
  place, 83.3% have third party
  damage coverage;

 Of all respondents, less than
  10% is insured for first party
  losses due to cyber security
  incidents.



22   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Final thoughts


 Don’t think of cyber security as merely protecting IT systems as it is
  ultimately about protecting a broader interest of the organization.
  Understand your regulatory context and possible liabilities, and take
  appropriate measures to mitigate the risk to your business;

 Approach cyber security as the ongoing management of continuously
  evolving risk in function of value to the organization, and the likelihood of
  threats and vulnerabilities;

 Ensure adequate and appropriate controls are implemented to coordinate
  and communicate actions in the case of cyber security incidents.

 The increasingly complexity of technology and the cyber threats which
  organizations face require adequate security staff, as well as broad
  awareness and skills;

 Align cyber security with other related activities in the business to create
  leverage and resource efficiencies – e.g. business continuity.

23   UNCLASSIFIED - CIOnet survey on Cyber Security                               © 2010
Thank you.




24   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Contact




                                       Deloitte Enterprise Risk Services
                                       Berkenlaan 8 b
                        B-1831         B-1831 Diegem
       Chris Verdonck                  Belgium
       Partner
                                       Tel: + 32 2 800 24 20
                                       cverdonck@deloitte.com


                                       Member of
                                       Deloitte Touche Tohmatsu




25   UNCLASSIFIED - CIOnet survey on Cyber Security                        © 2010

Más contenido relacionado

La actualidad más candente

Ensuring Cyber Security Resilience with a Skilled Workforce
Ensuring Cyber Security Resilience with a Skilled Workforce Ensuring Cyber Security Resilience with a Skilled Workforce
Ensuring Cyber Security Resilience with a Skilled Workforce Zeshan Sattar
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010thaiantivirus
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsAbdul-Hakeem Ajijola
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Ludmila Morozova-Buss
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to knowNathan Desfontaines
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Ludmila Morozova-Buss
 
GCC eGov Cyberwar, Cybercrime Risks and Defences 2010
GCC eGov Cyberwar, Cybercrime Risks and Defences 2010GCC eGov Cyberwar, Cybercrime Risks and Defences 2010
GCC eGov Cyberwar, Cybercrime Risks and Defences 2010Jorge Sebastiao
 
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared CarstensenCyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensenjaredcarst
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOsIBM Security
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondLydia Shepherd
 
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWebinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWithum
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The BoardPaul Melson
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksThis account is closed
 
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Withum
 
NACD Directorship Article - Cyber July:Aug 2015 published
NACD Directorship Article - Cyber July:Aug 2015 publishedNACD Directorship Article - Cyber July:Aug 2015 published
NACD Directorship Article - Cyber July:Aug 2015 publishedPrista Corporation
 

La actualidad más candente (20)

Ensuring Cyber Security Resilience with a Skilled Workforce
Ensuring Cyber Security Resilience with a Skilled Workforce Ensuring Cyber Security Resilience with a Skilled Workforce
Ensuring Cyber Security Resilience with a Skilled Workforce
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
 
GCC eGov Cyberwar, Cybercrime Risks and Defences 2010
GCC eGov Cyberwar, Cybercrime Risks and Defences 2010GCC eGov Cyberwar, Cybercrime Risks and Defences 2010
GCC eGov Cyberwar, Cybercrime Risks and Defences 2010
 
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared CarstensenCyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOs
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respond
 
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWebinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
 
THE 5 CHALLENGES
THE 5 CHALLENGESTHE 5 CHALLENGES
THE 5 CHALLENGES
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
News letter oct 12
News letter oct 12News letter oct 12
News letter oct 12
 
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
 
NACD Directorship Article - Cyber July:Aug 2015 published
NACD Directorship Article - Cyber July:Aug 2015 publishedNACD Directorship Article - Cyber July:Aug 2015 published
NACD Directorship Article - Cyber July:Aug 2015 published
 

Destacado

European IT Services outsourcing market (Chinese)
European IT Services outsourcing market (Chinese)European IT Services outsourcing market (Chinese)
European IT Services outsourcing market (Chinese)CIONET
 
Digital Agenda Scoreboard 2013: Italy
Digital Agenda Scoreboard 2013: ItalyDigital Agenda Scoreboard 2013: Italy
Digital Agenda Scoreboard 2013: ItalyCIONET
 
European IT trends 2014 (Japanese)
European IT trends 2014 (Japanese)European IT trends 2014 (Japanese)
European IT trends 2014 (Japanese)CIONET
 
European IT trends 2014 (Chinese)
European IT trends 2014 (Chinese)European IT trends 2014 (Chinese)
European IT trends 2014 (Chinese)CIONET
 
European services outsourcing trends
European services outsourcing trendsEuropean services outsourcing trends
European services outsourcing trendsCIONET
 
The future of IT
The future of ITThe future of IT
The future of ITCIONET
 

Destacado (6)

European IT Services outsourcing market (Chinese)
European IT Services outsourcing market (Chinese)European IT Services outsourcing market (Chinese)
European IT Services outsourcing market (Chinese)
 
Digital Agenda Scoreboard 2013: Italy
Digital Agenda Scoreboard 2013: ItalyDigital Agenda Scoreboard 2013: Italy
Digital Agenda Scoreboard 2013: Italy
 
European IT trends 2014 (Japanese)
European IT trends 2014 (Japanese)European IT trends 2014 (Japanese)
European IT trends 2014 (Japanese)
 
European IT trends 2014 (Chinese)
European IT trends 2014 (Chinese)European IT trends 2014 (Chinese)
European IT trends 2014 (Chinese)
 
European services outsourcing trends
European services outsourcing trendsEuropean services outsourcing trends
European services outsourcing trends
 
The future of IT
The future of ITThe future of IT
The future of IT
 

Similar a 20101012 CIOnet Cyber Security Final Results

SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSilicon Valley Bank
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSilicon Valley Bank
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...Symantec
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for InsuranceAccenture Insurance
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...Judith Beckhard Cardoso
 
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...Thierry Labro
 
Analyzing the WEF’s 2024 Cybersecurity Report- Insights for Tackling Cyber In...
Analyzing the WEF’s 2024 Cybersecurity Report- Insights for Tackling Cyber In...Analyzing the WEF’s 2024 Cybersecurity Report- Insights for Tackling Cyber In...
Analyzing the WEF’s 2024 Cybersecurity Report- Insights for Tackling Cyber In...tonyStark925586
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report Bricata, Inc.
 
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Microsoft
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019Precisely
 

Similar a 20101012 CIOnet Cyber Security Final Results (20)

SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
Ics white paper report 2017
Ics white paper report 2017Ics white paper report 2017
Ics white paper report 2017
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
Resilience in the Cyber Era
Resilience in the Cyber EraResilience in the Cyber Era
Resilience in the Cyber Era
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
 
Analyzing the WEF’s 2024 Cybersecurity Report- Insights for Tackling Cyber In...
Analyzing the WEF’s 2024 Cybersecurity Report- Insights for Tackling Cyber In...Analyzing the WEF’s 2024 Cybersecurity Report- Insights for Tackling Cyber In...
Analyzing the WEF’s 2024 Cybersecurity Report- Insights for Tackling Cyber In...
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
Heidi
HeidiHeidi
Heidi
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report
 
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019
 

Más de CIONET

European services outsourcing trends 2014
European services outsourcing trends 2014European services outsourcing trends 2014
European services outsourcing trends 2014CIONET
 
European IT Services Outsourcing market (Japanese)
European IT Services Outsourcing market (Japanese)European IT Services Outsourcing market (Japanese)
European IT Services Outsourcing market (Japanese)CIONET
 
Présentation "big data" Philippe Nieuwbourg
 Présentation "big data" Philippe Nieuwbourg Présentation "big data" Philippe Nieuwbourg
Présentation "big data" Philippe NieuwbourgCIONET
 
CIONET 2
CIONET 2CIONET 2
CIONET 2CIONET
 
Agenda Evento CIOnet - Agenda Digital europea
Agenda Evento CIOnet - Agenda Digital europeaAgenda Evento CIOnet - Agenda Digital europea
Agenda Evento CIOnet - Agenda Digital europeaCIONET
 
Joaquín Reyes-CEPSA
Joaquín Reyes-CEPSAJoaquín Reyes-CEPSA
Joaquín Reyes-CEPSACIONET
 
Ppt Samuel Ronquillo-Cemex.pptx
Ppt Samuel Ronquillo-Cemex.pptxPpt Samuel Ronquillo-Cemex.pptx
Ppt Samuel Ronquillo-Cemex.pptxCIONET
 
CIOnet Spain Annual Event_Javier Gómez Guillamón
CIOnet Spain Annual Event_Javier Gómez GuillamónCIOnet Spain Annual Event_Javier Gómez Guillamón
CIOnet Spain Annual Event_Javier Gómez GuillamónCIONET
 
20090210 Ci Onet Belgium Plans 2009
20090210 Ci Onet Belgium Plans 200920090210 Ci Onet Belgium Plans 2009
20090210 Ci Onet Belgium Plans 2009CIONET
 

Más de CIONET (9)

European services outsourcing trends 2014
European services outsourcing trends 2014European services outsourcing trends 2014
European services outsourcing trends 2014
 
European IT Services Outsourcing market (Japanese)
European IT Services Outsourcing market (Japanese)European IT Services Outsourcing market (Japanese)
European IT Services Outsourcing market (Japanese)
 
Présentation "big data" Philippe Nieuwbourg
 Présentation "big data" Philippe Nieuwbourg Présentation "big data" Philippe Nieuwbourg
Présentation "big data" Philippe Nieuwbourg
 
CIONET 2
CIONET 2CIONET 2
CIONET 2
 
Agenda Evento CIOnet - Agenda Digital europea
Agenda Evento CIOnet - Agenda Digital europeaAgenda Evento CIOnet - Agenda Digital europea
Agenda Evento CIOnet - Agenda Digital europea
 
Joaquín Reyes-CEPSA
Joaquín Reyes-CEPSAJoaquín Reyes-CEPSA
Joaquín Reyes-CEPSA
 
Ppt Samuel Ronquillo-Cemex.pptx
Ppt Samuel Ronquillo-Cemex.pptxPpt Samuel Ronquillo-Cemex.pptx
Ppt Samuel Ronquillo-Cemex.pptx
 
CIOnet Spain Annual Event_Javier Gómez Guillamón
CIOnet Spain Annual Event_Javier Gómez GuillamónCIOnet Spain Annual Event_Javier Gómez Guillamón
CIOnet Spain Annual Event_Javier Gómez Guillamón
 
20090210 Ci Onet Belgium Plans 2009
20090210 Ci Onet Belgium Plans 200920090210 Ci Onet Belgium Plans 2009
20090210 Ci Onet Belgium Plans 2009
 

Último

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Último (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

20101012 CIOnet Cyber Security Final Results

  • 1. CIOnet survey on Cyber Security The results Chris Verdonck EMEA Leader, Deloitte Enterprise Risk Services Brussels, October 12th 2010
  • 2. “It's the great irony of our Information Age - the very technologies that empower us to create and to build also empower those who would disrupt and destroy.” USA President Barack Obama on "Securing Our Nation's Cyber Infrastructure “ 2 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 3. Agenda. 3 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 4. Agenda  Survey context  Respondents  Results 4 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 5. Survey Context Cyber culture is growing faster than cyber security, so everything that depends on cyber space is at risk  Information is ubiquitous - Our society and economy have become critically dependent on digital connectivity and services;  Cyber security threats are continuously increasing in complexity and occurrence; thus they require more management attention;  CIOnet members were surveyed on 16 questions regarding cyber security until September 26th 2010. 5 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 6. Respondents. 6 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 7. Response demographics Countries  53 respondents from 6 different countries;  Most responses from Belgium (35,8%) followed by Italy and UK (each 18,8%) Sectors  Responses spread over different sectors  Most respondents in Financials (24,5%), and Industrial & Manufacturing (20,7%) 7 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 8. Response company types Company type  67.9% of respondents representing their company’s headquarters. Number of employees  In terms of company size, over half of the survey responders has more then 1000+ employees. 8 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 9. Results. 9 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 10. Cyber liabilities  Almost 85% responded that they analyzed their cyber liabilities in a thorough way;  However there is still uncertainty on what regulations are applicable. EU DPA and ISO 27001 may not be enough to comply with;  Despite that respondents indicate to have assessed their liabilities, further responses in the survey indicate a need for stronger action. 10 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 11. Applicable legislation  Over 76% of the survey respondents is confident that their organization have an overview of applicable laws in the context of cyber security;  A large part of them only operates in one country, but legal aspect with regards to cyber security can differ greatly between countries. 11 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 12. Theft of trade secrets  Almost 18% of the respondents’ organizations have not assessed the risk of loosing trade secrets;  For the respondents that claim they have, the question is how comprehensive such assessment was;  It is essential to ensure that the risks regarding theft of trade secrets are frequently re-assessed and appropriate actions taken to mitigate them. 12 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 13. Impact of internal or external cyber attacks  All respondents indicated their organisation could be impacted in at least one domain;  Over 81% of respondents believes cyber attacks would impact the brand and image of their organization. Stakeholders expect cyber security challenges to be addressed appropriately;  Respondents indicate that internal attacks are more likely to cause critical operation disruption, and external attacks could affect market share more. 13 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 14. Cyber Security threats  Over 35% of respondents see a primary threat in the increased complexity of identity and access management;  It is interesting to note that almost 22% of the respondents indicate that their current controls are struggling to keep pace;  Inadequate network access control and the uptake of social networks also raises cyber security concerns. Other: •  User and management awareness of cyber risks, •  Unpatched and unsupported legacy applications and systems •  Crimeware will be the biggest threat over workstations, mobile operators and eventually mobile phones 14 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 15. Security Staff  Over 35% of the respondents’ organizations have no policy regarding maintaining a security staff;  There is a risk of critical information exposure and knowledge drain as people rotate in and out of organizations;  The increasingly complexity of technology and the cyber threats which organizations face require adequate security staff and skills. 15 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 16. Cyber Security awareness  82% of respondents indicate to increase cyber security awareness through security audits. These typically present a partial snapshot of the risk posture to the stakeholders;  Furthermore respondents indicate specific training and awareness initiatives (72%), provisions in the disciplinary policy (68%), while 56% indicate to have been implementing a security framework that contributed to the general awareness. 16 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 17. Preventing legal exposure  Respondents indicate how monitoring and audit of compliance is the most common action to prevent legal exposure (82%);  Half of the survey candidates also monitors and requests audit reports from your third party business partners as some of the risk scope is outsourced. Other: •  Vulnerability assessments and penetration testing; •  Defining security controls; •  Ensuring good contracting practices. 17 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 18. Assessing vulnerabilities  About 20% of all organizations do not regularly assess their biggest vulnerabilities, implying they do not have a view on the most critical cyber risks they face;  Organizations need a consolidated risk overview in order to define funded actions and manage risk appropriately. Comment: •  “It is more a day to day job whereby risks are constantly monitored and priorities adapted overtime” 18 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 19. Incident response  Over 35% of all organizations do not regularly review and update their incident response plans. Several respondents commented update action was ongoing;  As the nature of cyber incidents in function of threats and vulnerabilities is constantly evolving, one can debate if yearly updates on incident response plans is even enough. 19 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 20. Incident communication  Over 82% of the responding organizations are convinced of the importance of appropriate communication during and after a Cyber Security incident;  In almost 18% of the respondents companies, inadequate awareness is in place regarding the significance of controlled incident communications with internal and external stakeholders. 20 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 21. Business continuity management  While many respondents commented on the limited scope of their current business continuity plans (BCP), a surprising 76% indicated such plans are in place;  This does conflict with the fact that only 50% have a crisis communications plan, which is an essential part of a continuity planning;  Some respondents referred to their third party service agreements, but should keep in mind their own responsibilities to ensure business continuity. 21 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 22. Insurance  Almost 72% indicates not having insurance coverage for cyber security incidents. Typically expert evidence is needed to calculate the financial and other damages that need to be covered;  If an insurance policy is in place, 83.3% have third party damage coverage;  Of all respondents, less than 10% is insured for first party losses due to cyber security incidents. 22 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 23. Final thoughts  Don’t think of cyber security as merely protecting IT systems as it is ultimately about protecting a broader interest of the organization. Understand your regulatory context and possible liabilities, and take appropriate measures to mitigate the risk to your business;  Approach cyber security as the ongoing management of continuously evolving risk in function of value to the organization, and the likelihood of threats and vulnerabilities;  Ensure adequate and appropriate controls are implemented to coordinate and communicate actions in the case of cyber security incidents.  The increasingly complexity of technology and the cyber threats which organizations face require adequate security staff, as well as broad awareness and skills;  Align cyber security with other related activities in the business to create leverage and resource efficiencies – e.g. business continuity. 23 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 24. Thank you. 24 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 25. Contact Deloitte Enterprise Risk Services Berkenlaan 8 b B-1831 B-1831 Diegem Chris Verdonck Belgium Partner Tel: + 32 2 800 24 20 cverdonck@deloitte.com Member of Deloitte Touche Tohmatsu 25 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010