SlideShare una empresa de Scribd logo
1 de 8
Critical Infrastructure Protection Survey
Key Findings
Methodology
• Survey performed by Applied Research
• Surveyed CIP-specific industries
  – All industries from last year
  – Added 8 new industries this year (all on CIP list)
• 3,475 respondents
  – 1,900 SMBs (5 – 499 employees)
  – 1,575 enterprises (>1,000 US, >500 ROW)
• Spoke to person in charge of computers


                                                         2
Key Findings
• Lower awareness & engagement in government CIP programs
• Slightly more ambivalence about government CIP programs
• Organizations feel less prepared
Lower Awareness & Engagement in Government CIP
Programs
• Lower awareness of government CIP programs in their country (36% vs. 55%)
• Less engaged in government CIP programs (37% vs. 56%)
Slightly More Ambivalence About Government CIP
Programs
• More are ‘neutral’ or have ‘no opinion’ about government CIP programs
  (42% vs. 26%)
• Slightly less willing to cooperate (57% vs. 66%)
Organizations Feel Less Prepared
• Slight decrease in their self-assessment of readiness (-8%)
• Self-assessment of safeguards shows decline in readiness (-5 to -10%)
Recommendations: Protecting Critical Infrastructure
• Develop and enforce IT policies, automate all compliance processes
• Adopt a proactive, information-centric approach to protecting information
  and interactions
• Manage systems by implementing secure operating environments
• Protect the infrastructure by securing endpoints, messaging and Web
  environments
• Ensure 24x7 availability
• Develop an information management strategy that includes an information
  retention plan and policies
Recommendations for Government
• Continue to put forth the resources to establish government critical
  infrastructure programs
• Partner with industry associations and private enterprise groups to
  disseminate information to raise awareness of CIP organizations and plans
• Emphasize that security is not enough to stay resilient in the face of today’s
  cyberattacks

Más contenido relacionado

La actualidad más candente

Federal Risk and Authorization Management Program: Assessment and Recommendat...
Federal Risk and Authorization Management Program: Assessment and Recommendat...Federal Risk and Authorization Management Program: Assessment and Recommendat...
Federal Risk and Authorization Management Program: Assessment and Recommendat...John Gilligan
 
Annual Results and Impact Evaluation Workshop for RBF - Day Eight - IE and HR...
Annual Results and Impact Evaluation Workshop for RBF - Day Eight - IE and HR...Annual Results and Impact Evaluation Workshop for RBF - Day Eight - IE and HR...
Annual Results and Impact Evaluation Workshop for RBF - Day Eight - IE and HR...RBFHealth
 
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...ARC Advisory Group
 
Webinar: Energy Data - The New Profit Lever
Webinar: Energy Data - The New Profit LeverWebinar: Energy Data - The New Profit Lever
Webinar: Energy Data - The New Profit LeverUrjanet
 
Compliance Strategies, Cara Maguire
Compliance Strategies, Cara MaguireCompliance Strategies, Cara Maguire
Compliance Strategies, Cara MaguireOECD Governance
 
TMForum Network Asset Management Survey Report 2014
TMForum Network Asset Management Survey Report 2014TMForum Network Asset Management Survey Report 2014
TMForum Network Asset Management Survey Report 2014Subex
 
Protecting PHi- 1-2016
Protecting PHi-  1-2016Protecting PHi-  1-2016
Protecting PHi- 1-2016Bill Steuer
 
Practical Measures for Measuring Security
Practical Measures for Measuring SecurityPractical Measures for Measuring Security
Practical Measures for Measuring SecurityChris Mullins
 
Clean Energy: Structure and Role of Regulators
Clean Energy: Structure and Role of RegulatorsClean Energy: Structure and Role of Regulators
Clean Energy: Structure and Role of RegulatorsLeonardo ENERGY
 
Inspiring Trust and Transparency: Skyword's Compliance with GDPR [Webinar]
Inspiring Trust and Transparency: Skyword's Compliance with GDPR [Webinar]Inspiring Trust and Transparency: Skyword's Compliance with GDPR [Webinar]
Inspiring Trust and Transparency: Skyword's Compliance with GDPR [Webinar]Skyword Inc.
 
VidSys Public Safety Solution Sheet
VidSys Public Safety Solution SheetVidSys Public Safety Solution Sheet
VidSys Public Safety Solution SheetVidSys, Inc.
 
Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000
Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000
Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000Mercatus Center
 
Integrating efficiency into healthcare - A life cycle approach
Integrating efficiency into healthcare  - A life cycle approachIntegrating efficiency into healthcare  - A life cycle approach
Integrating efficiency into healthcare - A life cycle approachEstellesc
 
A systems engineering approach to cannabis product development.v1.03 21-19
A systems engineering approach to cannabis product development.v1.03 21-19A systems engineering approach to cannabis product development.v1.03 21-19
A systems engineering approach to cannabis product development.v1.03 21-19Jacklyn R. Green
 

La actualidad más candente (20)

Infographic the new era of corporate continuity of operations
Infographic the new era of corporate continuity of operationsInfographic the new era of corporate continuity of operations
Infographic the new era of corporate continuity of operations
 
Federal Risk and Authorization Management Program: Assessment and Recommendat...
Federal Risk and Authorization Management Program: Assessment and Recommendat...Federal Risk and Authorization Management Program: Assessment and Recommendat...
Federal Risk and Authorization Management Program: Assessment and Recommendat...
 
Annual Results and Impact Evaluation Workshop for RBF - Day Eight - IE and HR...
Annual Results and Impact Evaluation Workshop for RBF - Day Eight - IE and HR...Annual Results and Impact Evaluation Workshop for RBF - Day Eight - IE and HR...
Annual Results and Impact Evaluation Workshop for RBF - Day Eight - IE and HR...
 
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
 
Webinar: Energy Data - The New Profit Lever
Webinar: Energy Data - The New Profit LeverWebinar: Energy Data - The New Profit Lever
Webinar: Energy Data - The New Profit Lever
 
Cobit v5 High Level Controls Topology
Cobit v5 High Level Controls TopologyCobit v5 High Level Controls Topology
Cobit v5 High Level Controls Topology
 
Compliance Strategies, Cara Maguire
Compliance Strategies, Cara MaguireCompliance Strategies, Cara Maguire
Compliance Strategies, Cara Maguire
 
TMForum Network Asset Management Survey Report 2014
TMForum Network Asset Management Survey Report 2014TMForum Network Asset Management Survey Report 2014
TMForum Network Asset Management Survey Report 2014
 
Protecting PHi- 1-2016
Protecting PHi-  1-2016Protecting PHi-  1-2016
Protecting PHi- 1-2016
 
Work on Primary Care Spending Measures
Work on Primary Care Spending MeasuresWork on Primary Care Spending Measures
Work on Primary Care Spending Measures
 
The state of open data in Canada & the Open Data Barometer
The state of open data in Canada & the Open Data BarometerThe state of open data in Canada & the Open Data Barometer
The state of open data in Canada & the Open Data Barometer
 
Practical Measures for Measuring Security
Practical Measures for Measuring SecurityPractical Measures for Measuring Security
Practical Measures for Measuring Security
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Clean Energy: Structure and Role of Regulators
Clean Energy: Structure and Role of RegulatorsClean Energy: Structure and Role of Regulators
Clean Energy: Structure and Role of Regulators
 
Horizon Scan 2016 Results Webinar
Horizon Scan 2016 Results WebinarHorizon Scan 2016 Results Webinar
Horizon Scan 2016 Results Webinar
 
Inspiring Trust and Transparency: Skyword's Compliance with GDPR [Webinar]
Inspiring Trust and Transparency: Skyword's Compliance with GDPR [Webinar]Inspiring Trust and Transparency: Skyword's Compliance with GDPR [Webinar]
Inspiring Trust and Transparency: Skyword's Compliance with GDPR [Webinar]
 
VidSys Public Safety Solution Sheet
VidSys Public Safety Solution SheetVidSys Public Safety Solution Sheet
VidSys Public Safety Solution Sheet
 
Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000
Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000
Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000
 
Integrating efficiency into healthcare - A life cycle approach
Integrating efficiency into healthcare  - A life cycle approachIntegrating efficiency into healthcare  - A life cycle approach
Integrating efficiency into healthcare - A life cycle approach
 
A systems engineering approach to cannabis product development.v1.03 21-19
A systems engineering approach to cannabis product development.v1.03 21-19A systems engineering approach to cannabis product development.v1.03 21-19
A systems engineering approach to cannabis product development.v1.03 21-19
 

Destacado

Simple webapps with nginx, uwsgi emperor and bottle
Simple webapps with nginx, uwsgi emperor and bottleSimple webapps with nginx, uwsgi emperor and bottle
Simple webapps with nginx, uwsgi emperor and bottleJordi Soucheiron
 
EuroPython 2014 - How we switched our 800+ projects from Apache to uWSGI
EuroPython 2014 - How we switched our 800+ projects from Apache to uWSGIEuroPython 2014 - How we switched our 800+ projects from Apache to uWSGI
EuroPython 2014 - How we switched our 800+ projects from Apache to uWSGIMax Tepkeev
 
uWSGI - Swiss army knife for your Python web apps
uWSGI - Swiss army knife for your Python web appsuWSGI - Swiss army knife for your Python web apps
uWSGI - Swiss army knife for your Python web appsTomislav Raseta
 
Getting Started with ASP.net Core 1.0
Getting Started with ASP.net Core 1.0Getting Started with ASP.net Core 1.0
Getting Started with ASP.net Core 1.0joescars
 
An Introduction to OAuth 2
An Introduction to OAuth 2An Introduction to OAuth 2
An Introduction to OAuth 2Aaron Parecki
 
Scalable Django Architecture
Scalable Django ArchitectureScalable Django Architecture
Scalable Django ArchitectureRami Sayar
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
containerd and CRI
containerd and CRIcontainerd and CRI
containerd and CRIDocker, Inc.
 

Destacado (10)

Simple webapps with nginx, uwsgi emperor and bottle
Simple webapps with nginx, uwsgi emperor and bottleSimple webapps with nginx, uwsgi emperor and bottle
Simple webapps with nginx, uwsgi emperor and bottle
 
EuroPython 2014 - How we switched our 800+ projects from Apache to uWSGI
EuroPython 2014 - How we switched our 800+ projects from Apache to uWSGIEuroPython 2014 - How we switched our 800+ projects from Apache to uWSGI
EuroPython 2014 - How we switched our 800+ projects from Apache to uWSGI
 
uWSGI - Swiss army knife for your Python web apps
uWSGI - Swiss army knife for your Python web appsuWSGI - Swiss army knife for your Python web apps
uWSGI - Swiss army knife for your Python web apps
 
Getting Started with ASP.net Core 1.0
Getting Started with ASP.net Core 1.0Getting Started with ASP.net Core 1.0
Getting Started with ASP.net Core 1.0
 
nginx入門
nginx入門nginx入門
nginx入門
 
An Introduction to OAuth 2
An Introduction to OAuth 2An Introduction to OAuth 2
An Introduction to OAuth 2
 
Scalable Django Architecture
Scalable Django ArchitectureScalable Django Architecture
Scalable Django Architecture
 
ASP.NET Core 1.0 Overview
ASP.NET Core 1.0 OverviewASP.NET Core 1.0 Overview
ASP.NET Core 1.0 Overview
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
containerd and CRI
containerd and CRIcontainerd and CRI
containerd and CRI
 

Similar a Symantec 2011 CIP Survey Global Results

Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseGeorge Goodall
 
Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1jmariani14
 
ILRI program outline: Impact at Scale
ILRI program outline: Impact at ScaleILRI program outline: Impact at Scale
ILRI program outline: Impact at ScaleILRI
 
Moving to the Cloud: Modernizing Data Architecture in Healthcare
Moving to the Cloud: Modernizing Data Architecture in HealthcareMoving to the Cloud: Modernizing Data Architecture in Healthcare
Moving to the Cloud: Modernizing Data Architecture in HealthcarePerficient, Inc.
 
Security Architecture
Security ArchitectureSecurity Architecture
Security ArchitecturePriyank Hada
 
2 growth, concept and design
2 growth, concept and design2 growth, concept and design
2 growth, concept and designsakshi garg
 
Jisc's cyber security posture survey - how secure are you?
Jisc's cyber security posture survey - how secure are you?Jisc's cyber security posture survey - how secure are you?
Jisc's cyber security posture survey - how secure are you?Jisc
 
Creating a culture for data use: It takes a system strengthening approach
 Creating a culture for data use: It takes asystem strengthening approach Creating a culture for data use: It takes asystem strengthening approach
Creating a culture for data use: It takes a system strengthening approachGolam Kibria Madhurza
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickJacqueline Fick
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to Leaderaccenture
 
The Roadmap to Becoming a Top Performing Organization in Managing IT Operations
The Roadmap to Becoming a Top Performing Organization in Managing IT OperationsThe Roadmap to Becoming a Top Performing Organization in Managing IT Operations
The Roadmap to Becoming a Top Performing Organization in Managing IT OperationsDigital Enterprise Journal
 
Is Your Agency Data Challenged?
Is Your Agency Data Challenged?Is Your Agency Data Challenged?
Is Your Agency Data Challenged?DLT Solutions
 
2012 Information Retention and eDiscovery Survey Global Results
2012 Information Retention and eDiscovery Survey Global Results2012 Information Retention and eDiscovery Survey Global Results
2012 Information Retention and eDiscovery Survey Global ResultsSymantec
 
inSupply Overview Presentation
inSupply Overview PresentationinSupply Overview Presentation
inSupply Overview PresentationinSupply
 
IT Governance Presentation by omaha 2008
IT Governance Presentation by  omaha 2008IT Governance Presentation by  omaha 2008
IT Governance Presentation by omaha 2008ssusera19f45
 
IT governance in the public sector: a conceptual model
IT governance in the public sector: a conceptual modelIT governance in the public sector: a conceptual model
IT governance in the public sector: a conceptual modelRiri Kusumarani
 
Monitoring & Evaluation of National Adaptation: Key challenges and emerging s...
Monitoring & Evaluation of National Adaptation: Key challenges and emerging s...Monitoring & Evaluation of National Adaptation: Key challenges and emerging s...
Monitoring & Evaluation of National Adaptation: Key challenges and emerging s...NAP Global Network
 
Canada’s innovation agenda apr 13, 2017
Canada’s innovation agenda apr 13, 2017Canada’s innovation agenda apr 13, 2017
Canada’s innovation agenda apr 13, 2017Karim Keshavjee
 

Similar a Symantec 2011 CIP Survey Global Results (20)

Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
 
Benchmarking IT Agility Final Report
Benchmarking IT Agility Final ReportBenchmarking IT Agility Final Report
Benchmarking IT Agility Final Report
 
Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1
 
ILRI program outline: Impact at Scale
ILRI program outline: Impact at ScaleILRI program outline: Impact at Scale
ILRI program outline: Impact at Scale
 
Moving to the Cloud: Modernizing Data Architecture in Healthcare
Moving to the Cloud: Modernizing Data Architecture in HealthcareMoving to the Cloud: Modernizing Data Architecture in Healthcare
Moving to the Cloud: Modernizing Data Architecture in Healthcare
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
2 growth, concept and design
2 growth, concept and design2 growth, concept and design
2 growth, concept and design
 
Jisc's cyber security posture survey - how secure are you?
Jisc's cyber security posture survey - how secure are you?Jisc's cyber security posture survey - how secure are you?
Jisc's cyber security posture survey - how secure are you?
 
Creating a culture for data use: It takes a system strengthening approach
 Creating a culture for data use: It takes asystem strengthening approach Creating a culture for data use: It takes asystem strengthening approach
Creating a culture for data use: It takes a system strengthening approach
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to Leader
 
The Roadmap to Becoming a Top Performing Organization in Managing IT Operations
The Roadmap to Becoming a Top Performing Organization in Managing IT OperationsThe Roadmap to Becoming a Top Performing Organization in Managing IT Operations
The Roadmap to Becoming a Top Performing Organization in Managing IT Operations
 
Is Your Agency Data Challenged?
Is Your Agency Data Challenged?Is Your Agency Data Challenged?
Is Your Agency Data Challenged?
 
2012 Information Retention and eDiscovery Survey Global Results
2012 Information Retention and eDiscovery Survey Global Results2012 Information Retention and eDiscovery Survey Global Results
2012 Information Retention and eDiscovery Survey Global Results
 
inSupply Overview Presentation
inSupply Overview PresentationinSupply Overview Presentation
inSupply Overview Presentation
 
IT Governance Presentation by omaha 2008
IT Governance Presentation by  omaha 2008IT Governance Presentation by  omaha 2008
IT Governance Presentation by omaha 2008
 
Enterprise Agile Adoption
Enterprise Agile AdoptionEnterprise Agile Adoption
Enterprise Agile Adoption
 
IT governance in the public sector: a conceptual model
IT governance in the public sector: a conceptual modelIT governance in the public sector: a conceptual model
IT governance in the public sector: a conceptual model
 
Monitoring & Evaluation of National Adaptation: Key challenges and emerging s...
Monitoring & Evaluation of National Adaptation: Key challenges and emerging s...Monitoring & Evaluation of National Adaptation: Key challenges and emerging s...
Monitoring & Evaluation of National Adaptation: Key challenges and emerging s...
 
Canada’s innovation agenda apr 13, 2017
Canada’s innovation agenda apr 13, 2017Canada’s innovation agenda apr 13, 2017
Canada’s innovation agenda apr 13, 2017
 

Más de Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

Más de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Último

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Symantec 2011 CIP Survey Global Results

  • 2. Methodology • Survey performed by Applied Research • Surveyed CIP-specific industries – All industries from last year – Added 8 new industries this year (all on CIP list) • 3,475 respondents – 1,900 SMBs (5 – 499 employees) – 1,575 enterprises (>1,000 US, >500 ROW) • Spoke to person in charge of computers 2
  • 3. Key Findings • Lower awareness & engagement in government CIP programs • Slightly more ambivalence about government CIP programs • Organizations feel less prepared
  • 4. Lower Awareness & Engagement in Government CIP Programs • Lower awareness of government CIP programs in their country (36% vs. 55%) • Less engaged in government CIP programs (37% vs. 56%)
  • 5. Slightly More Ambivalence About Government CIP Programs • More are ‘neutral’ or have ‘no opinion’ about government CIP programs (42% vs. 26%) • Slightly less willing to cooperate (57% vs. 66%)
  • 6. Organizations Feel Less Prepared • Slight decrease in their self-assessment of readiness (-8%) • Self-assessment of safeguards shows decline in readiness (-5 to -10%)
  • 7. Recommendations: Protecting Critical Infrastructure • Develop and enforce IT policies, automate all compliance processes • Adopt a proactive, information-centric approach to protecting information and interactions • Manage systems by implementing secure operating environments • Protect the infrastructure by securing endpoints, messaging and Web environments • Ensure 24x7 availability • Develop an information management strategy that includes an information retention plan and policies
  • 8. Recommendations for Government • Continue to put forth the resources to establish government critical infrastructure programs • Partner with industry associations and private enterprise groups to disseminate information to raise awareness of CIP organizations and plans • Emphasize that security is not enough to stay resilient in the face of today’s cyberattacks