Enviar búsqueda
Cargar
20101012 CIOnet Cyber Security Final Results
•
1 recomendación
•
603 vistas
CIONET
Seguir
Tecnología
Empresariales
Denunciar
Compartir
Denunciar
Compartir
1 de 25
Descargar ahora
Descargar para leer sin conexión
Recomendados
20101012 isa larry_clinton
20101012 isa larry_clinton
CIONET
20101116 deckers
20101116 deckers
CIONET
The Changing Role of the CIO by CIONET Luxembourg Dec. 17th | agenda
The Changing Role of the CIO by CIONET Luxembourg Dec. 17th | agenda
CIONET
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
BDPA Education and Technology Foundation
White Paper: Mobile Security
White Paper: Mobile Security
Rogers Communications
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
Merry D'souza
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
Don Grauel
OS17 Brochure
OS17 Brochure
Dominic Vogel
Recomendados
20101012 isa larry_clinton
20101012 isa larry_clinton
CIONET
20101116 deckers
20101116 deckers
CIONET
The Changing Role of the CIO by CIONET Luxembourg Dec. 17th | agenda
The Changing Role of the CIO by CIONET Luxembourg Dec. 17th | agenda
CIONET
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
BDPA Education and Technology Foundation
White Paper: Mobile Security
White Paper: Mobile Security
Rogers Communications
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
Merry D'souza
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
Don Grauel
OS17 Brochure
OS17 Brochure
Dominic Vogel
Ensuring Cyber Security Resilience with a Skilled Workforce
Ensuring Cyber Security Resilience with a Skilled Workforce
Zeshan Sattar
Security annual report_mid2010
Security annual report_mid2010
thaiantivirus
Cybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
Abdul-Hakeem Ajijola
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
Omlis
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
ReadWrite
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!
Ludmila Morozova-Buss
Cyber Security - Things you need to know
Cyber Security - Things you need to know
Nathan Desfontaines
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
Ludmila Morozova-Buss
GCC eGov Cyberwar, Cybercrime Risks and Defences 2010
GCC eGov Cyberwar, Cybercrime Risks and Defences 2010
Jorge Sebastiao
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
jaredcarst
CCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
CCIAOR
Ten Security Essentials for CIOs
Ten Security Essentials for CIOs
IBM Security
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respond
Lydia Shepherd
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Withum
Cybersecurity and The Board
Cybersecurity and The Board
Paul Melson
THE 5 CHALLENGES
THE 5 CHALLENGES
Martin Andenmatten
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
This account is closed
News letter oct 12
News letter oct 12
Capt SB Tyagi, COAC'CC*,FISM,CSC,
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Withum
NACD Directorship Article - Cyber July:Aug 2015 published
NACD Directorship Article - Cyber July:Aug 2015 published
Prista Corporation
European IT Services outsourcing market (Chinese)
European IT Services outsourcing market (Chinese)
CIONET
Digital Agenda Scoreboard 2013: Italy
Digital Agenda Scoreboard 2013: Italy
CIONET
Más contenido relacionado
La actualidad más candente
Ensuring Cyber Security Resilience with a Skilled Workforce
Ensuring Cyber Security Resilience with a Skilled Workforce
Zeshan Sattar
Security annual report_mid2010
Security annual report_mid2010
thaiantivirus
Cybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
Abdul-Hakeem Ajijola
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
Omlis
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
ReadWrite
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!
Ludmila Morozova-Buss
Cyber Security - Things you need to know
Cyber Security - Things you need to know
Nathan Desfontaines
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
Ludmila Morozova-Buss
GCC eGov Cyberwar, Cybercrime Risks and Defences 2010
GCC eGov Cyberwar, Cybercrime Risks and Defences 2010
Jorge Sebastiao
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
jaredcarst
CCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
CCIAOR
Ten Security Essentials for CIOs
Ten Security Essentials for CIOs
IBM Security
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respond
Lydia Shepherd
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Withum
Cybersecurity and The Board
Cybersecurity and The Board
Paul Melson
THE 5 CHALLENGES
THE 5 CHALLENGES
Martin Andenmatten
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
This account is closed
News letter oct 12
News letter oct 12
Capt SB Tyagi, COAC'CC*,FISM,CSC,
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Withum
NACD Directorship Article - Cyber July:Aug 2015 published
NACD Directorship Article - Cyber July:Aug 2015 published
Prista Corporation
La actualidad más candente
(20)
Ensuring Cyber Security Resilience with a Skilled Workforce
Ensuring Cyber Security Resilience with a Skilled Workforce
Security annual report_mid2010
Security annual report_mid2010
Cybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!
Cyber Security - Things you need to know
Cyber Security - Things you need to know
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
GCC eGov Cyberwar, Cybercrime Risks and Defences 2010
GCC eGov Cyberwar, Cybercrime Risks and Defences 2010
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
CCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
Ten Security Essentials for CIOs
Ten Security Essentials for CIOs
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respond
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Cybersecurity and The Board
Cybersecurity and The Board
THE 5 CHALLENGES
THE 5 CHALLENGES
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
News letter oct 12
News letter oct 12
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
NACD Directorship Article - Cyber July:Aug 2015 published
NACD Directorship Article - Cyber July:Aug 2015 published
Destacado
European IT Services outsourcing market (Chinese)
European IT Services outsourcing market (Chinese)
CIONET
Digital Agenda Scoreboard 2013: Italy
Digital Agenda Scoreboard 2013: Italy
CIONET
European IT trends 2014 (Japanese)
European IT trends 2014 (Japanese)
CIONET
European IT trends 2014 (Chinese)
European IT trends 2014 (Chinese)
CIONET
European services outsourcing trends
European services outsourcing trends
CIONET
The future of IT
The future of IT
CIONET
Destacado
(6)
European IT Services outsourcing market (Chinese)
European IT Services outsourcing market (Chinese)
Digital Agenda Scoreboard 2013: Italy
Digital Agenda Scoreboard 2013: Italy
European IT trends 2014 (Japanese)
European IT trends 2014 (Japanese)
European IT trends 2014 (Chinese)
European IT trends 2014 (Chinese)
European services outsourcing trends
European services outsourcing trends
The future of IT
The future of IT
Similar a 20101012 CIOnet Cyber Security Final Results
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
Silicon Valley Bank
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
Silicon Valley Bank
Ics white paper report 2017
Ics white paper report 2017
Ir. Indin Hasan ST, MT, IPM, ASEAN Eng
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
Symantec
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
International Federation of Accountants
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
Accenture Insurance
Resilience in the Cyber Era
Resilience in the Cyber Era
Booz Allen Hamilton
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
Dr Lendy Spires
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
Judith Beckhard Cardoso
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
Thierry Labro
Analyzing the WEF’s 2024 Cybersecurity Report- Insights for Tackling Cyber In...
Analyzing the WEF’s 2024 Cybersecurity Report- Insights for Tackling Cyber In...
tonyStark925586
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Sarah Nirschl
Heidi
Heidi
kategat
State of endpoint risk v3
State of endpoint risk v3
Lumension
State of endpoint risk v3
State of endpoint risk v3
Lumension
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019 survey report
Bricata, Inc.
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Microsoft
CompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
CompTIA
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
itnewsafrica
The State of IT Security for 2019
The State of IT Security for 2019
Precisely
Similar a 20101012 CIOnet Cyber Security Final Results
(20)
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
Ics white paper report 2017
Ics white paper report 2017
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
Resilience in the Cyber Era
Resilience in the Cyber Era
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
Analyzing the WEF’s 2024 Cybersecurity Report- Insights for Tackling Cyber In...
Analyzing the WEF’s 2024 Cybersecurity Report- Insights for Tackling Cyber In...
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Heidi
Heidi
State of endpoint risk v3
State of endpoint risk v3
State of endpoint risk v3
State of endpoint risk v3
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019 survey report
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
CompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
The State of IT Security for 2019
The State of IT Security for 2019
Más de CIONET
European services outsourcing trends 2014
European services outsourcing trends 2014
CIONET
European IT Services Outsourcing market (Japanese)
European IT Services Outsourcing market (Japanese)
CIONET
Présentation "big data" Philippe Nieuwbourg
Présentation "big data" Philippe Nieuwbourg
CIONET
CIONET 2
CIONET 2
CIONET
Agenda Evento CIOnet - Agenda Digital europea
Agenda Evento CIOnet - Agenda Digital europea
CIONET
Joaquín Reyes-CEPSA
Joaquín Reyes-CEPSA
CIONET
Ppt Samuel Ronquillo-Cemex.pptx
Ppt Samuel Ronquillo-Cemex.pptx
CIONET
CIOnet Spain Annual Event_Javier Gómez Guillamón
CIOnet Spain Annual Event_Javier Gómez Guillamón
CIONET
20090210 Ci Onet Belgium Plans 2009
20090210 Ci Onet Belgium Plans 2009
CIONET
Más de CIONET
(9)
European services outsourcing trends 2014
European services outsourcing trends 2014
European IT Services Outsourcing market (Japanese)
European IT Services Outsourcing market (Japanese)
Présentation "big data" Philippe Nieuwbourg
Présentation "big data" Philippe Nieuwbourg
CIONET 2
CIONET 2
Agenda Evento CIOnet - Agenda Digital europea
Agenda Evento CIOnet - Agenda Digital europea
Joaquín Reyes-CEPSA
Joaquín Reyes-CEPSA
Ppt Samuel Ronquillo-Cemex.pptx
Ppt Samuel Ronquillo-Cemex.pptx
CIOnet Spain Annual Event_Javier Gómez Guillamón
CIOnet Spain Annual Event_Javier Gómez Guillamón
20090210 Ci Onet Belgium Plans 2009
20090210 Ci Onet Belgium Plans 2009
Último
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
Evaluating the top large language models.pdf
Evaluating the top large language models.pdf
ChristopherTHyatt
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
Último
(20)
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
Evaluating the top large language models.pdf
Evaluating the top large language models.pdf
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
20101012 CIOnet Cyber Security Final Results
1.
CIOnet survey on Cyber
Security The results Chris Verdonck EMEA Leader, Deloitte Enterprise Risk Services Brussels, October 12th 2010
2.
“It's the great
irony of our Information Age - the very technologies that empower us to create and to build also empower those who would disrupt and destroy.” USA President Barack Obama on "Securing Our Nation's Cyber Infrastructure “ 2 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
3.
Agenda. 3
UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
4.
Agenda
Survey context Respondents Results 4 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
5.
Survey Context
Cyber culture is growing faster than cyber security, so everything that depends on cyber space is at risk Information is ubiquitous - Our society and economy have become critically dependent on digital connectivity and services; Cyber security threats are continuously increasing in complexity and occurrence; thus they require more management attention; CIOnet members were surveyed on 16 questions regarding cyber security until September 26th 2010. 5 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
6.
Respondents. 6
UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
7.
Response demographics
Countries 53 respondents from 6 different countries; Most responses from Belgium (35,8%) followed by Italy and UK (each 18,8%) Sectors Responses spread over different sectors Most respondents in Financials (24,5%), and Industrial & Manufacturing (20,7%) 7 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
8.
Response company types
Company type 67.9% of respondents representing their company’s headquarters. Number of employees In terms of company size, over half of the survey responders has more then 1000+ employees. 8 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
9.
Results. 9
UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
10.
Cyber liabilities Almost 85%
responded that they analyzed their cyber liabilities in a thorough way; However there is still uncertainty on what regulations are applicable. EU DPA and ISO 27001 may not be enough to comply with; Despite that respondents indicate to have assessed their liabilities, further responses in the survey indicate a need for stronger action. 10 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
11.
Applicable legislation Over 76%
of the survey respondents is confident that their organization have an overview of applicable laws in the context of cyber security; A large part of them only operates in one country, but legal aspect with regards to cyber security can differ greatly between countries. 11 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
12.
Theft of trade
secrets Almost 18% of the respondents’ organizations have not assessed the risk of loosing trade secrets; For the respondents that claim they have, the question is how comprehensive such assessment was; It is essential to ensure that the risks regarding theft of trade secrets are frequently re-assessed and appropriate actions taken to mitigate them. 12 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
13.
Impact of internal
or external cyber attacks All respondents indicated their organisation could be impacted in at least one domain; Over 81% of respondents believes cyber attacks would impact the brand and image of their organization. Stakeholders expect cyber security challenges to be addressed appropriately; Respondents indicate that internal attacks are more likely to cause critical operation disruption, and external attacks could affect market share more. 13 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
14.
Cyber Security threats Over
35% of respondents see a primary threat in the increased complexity of identity and access management; It is interesting to note that almost 22% of the respondents indicate that their current controls are struggling to keep pace; Inadequate network access control and the uptake of social networks also raises cyber security concerns. Other: • User and management awareness of cyber risks, • Unpatched and unsupported legacy applications and systems • Crimeware will be the biggest threat over workstations, mobile operators and eventually mobile phones 14 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
15.
Security Staff Over 35%
of the respondents’ organizations have no policy regarding maintaining a security staff; There is a risk of critical information exposure and knowledge drain as people rotate in and out of organizations; The increasingly complexity of technology and the cyber threats which organizations face require adequate security staff and skills. 15 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
16.
Cyber Security awareness 82%
of respondents indicate to increase cyber security awareness through security audits. These typically present a partial snapshot of the risk posture to the stakeholders; Furthermore respondents indicate specific training and awareness initiatives (72%), provisions in the disciplinary policy (68%), while 56% indicate to have been implementing a security framework that contributed to the general awareness. 16 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
17.
Preventing legal exposure Respondents
indicate how monitoring and audit of compliance is the most common action to prevent legal exposure (82%); Half of the survey candidates also monitors and requests audit reports from your third party business partners as some of the risk scope is outsourced. Other: • Vulnerability assessments and penetration testing; • Defining security controls; • Ensuring good contracting practices. 17 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
18.
Assessing vulnerabilities About 20%
of all organizations do not regularly assess their biggest vulnerabilities, implying they do not have a view on the most critical cyber risks they face; Organizations need a consolidated risk overview in order to define funded actions and manage risk appropriately. Comment: • “It is more a day to day job whereby risks are constantly monitored and priorities adapted overtime” 18 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
19.
Incident response Over 35%
of all organizations do not regularly review and update their incident response plans. Several respondents commented update action was ongoing; As the nature of cyber incidents in function of threats and vulnerabilities is constantly evolving, one can debate if yearly updates on incident response plans is even enough. 19 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
20.
Incident communication Over 82%
of the responding organizations are convinced of the importance of appropriate communication during and after a Cyber Security incident; In almost 18% of the respondents companies, inadequate awareness is in place regarding the significance of controlled incident communications with internal and external stakeholders. 20 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
21.
Business continuity management While
many respondents commented on the limited scope of their current business continuity plans (BCP), a surprising 76% indicated such plans are in place; This does conflict with the fact that only 50% have a crisis communications plan, which is an essential part of a continuity planning; Some respondents referred to their third party service agreements, but should keep in mind their own responsibilities to ensure business continuity. 21 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
22.
Insurance Almost 72% indicates
not having insurance coverage for cyber security incidents. Typically expert evidence is needed to calculate the financial and other damages that need to be covered; If an insurance policy is in place, 83.3% have third party damage coverage; Of all respondents, less than 10% is insured for first party losses due to cyber security incidents. 22 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
23.
Final thoughts Don’t think
of cyber security as merely protecting IT systems as it is ultimately about protecting a broader interest of the organization. Understand your regulatory context and possible liabilities, and take appropriate measures to mitigate the risk to your business; Approach cyber security as the ongoing management of continuously evolving risk in function of value to the organization, and the likelihood of threats and vulnerabilities; Ensure adequate and appropriate controls are implemented to coordinate and communicate actions in the case of cyber security incidents. The increasingly complexity of technology and the cyber threats which organizations face require adequate security staff, as well as broad awareness and skills; Align cyber security with other related activities in the business to create leverage and resource efficiencies – e.g. business continuity. 23 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
24.
Thank you. 24
UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
25.
Contact
Deloitte Enterprise Risk Services Berkenlaan 8 b B-1831 B-1831 Diegem Chris Verdonck Belgium Partner Tel: + 32 2 800 24 20 cverdonck@deloitte.com Member of Deloitte Touche Tohmatsu 25 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
Descargar ahora