Uncovering the Risk of SAP Cyber Breaches

Size: px
Start display at page:

Download "Uncovering the Risk of SAP Cyber Breaches"

Transcription

1 Uncovering the Risk of SAP Cyber Breaches Research sponsored by Onapsis Independently Conducted by Ponemon Institute LLC February 2016

2 1 Part 1. Introduction Uncovering the Risks of SAP Cyber Breaches Ponemon Institute, February 2016 Ponemon Institute is pleased to present the results of Uncovering the Risks of SAP Cyber Breaches sponsored by Onapsis. The purpose of this study is to understand the threat of a SAP cyber breach and how companies are managing the risk of information theft, modification of data and disruption of business processes. Based on the findings, the companies represented in this study say their SAP platform has been breached an average of two times in the past 24 months. We surveyed 607 IT and IT security practitioners who are involved in the security of SAP applications used by their organizations to manage business operations and customer relations. The most common SAP products deployed are enterprise management (ERP), technology platforms (backbone), financial and data management and customer relationship management (CRM). The respondents in this study understand the risk of a SAP cyber breach. Sixty percent of respondents say the impact of information theft, modification of data and disruption of business processes on their company s SAP would be catastrophic (17 percent of respondents) or very serious (43 percent of respondents). Figure 1. Perceptions about SAP security risks Strongly agree and agree responses combined However, many senior executives are underestimating the risk and do not have an understanding of the impact of the value of the data that could be lost from the SAP system, according to respondents. As shown in Figure 1 only 21 percent of respondents say senior leadership is aware of SAP cybersecurity risks, but 56 percent of respondents say a security or data breach resulting from insecure SAP applications is likely (100 percent 44 percent of respondents). The following are key takeaways from this research: Senior leadership values the importance of SAP to the bottom line but ignores its cybersecurity risks. Seventy-six percent of respondents say their senior leadership understands the importance and criticality of SAP installations to profitability. However, 63 percent of respondents say C-level executives in their company tend to underestimate the risks associated with insecure SAP applications. SAP systems are critical to the revenues of companies represented in this research. When asked about the financial consequences if their companies SAP systems were taken offline, the average cost was estimated to be $4.5 million. This includes all direct cash outlays, direct labor expenditures, indirect labor costs, overhead costs and lost business opportunities. Are SAP applications secure? Fifty-four percent of respondents believe it is the responsibility of SAP, not their company, to ensure the security of its applications and platform. While 62 percent of respondents say SAP applications are more secure than other applications deployed by their company, respondents say their companies are evenly divided about confidence in the security of 1

3 2 SAP applications (50 percent of respondents). A barrier to achieving security is that only 34 percent of respondents say they have full visibility into the security of SAP applications and many companies do not have the required expertise to prevent, detect and respond to cyber attacks on their SAP applications. The SAP security team is seldom accountable for the security of SAP systems, applications and processes. The majority of respondents believe it is difficult to secure SAP applications. One possible reason could be due to the lack of clear ownership over securing SAP applications. Twenty-five percent of respondents say no one function is most accountable for SAP security in their organizations followed by IT infrastructure (21 percent of respondents). Only 19 percent of respondents say the SAP security team is accountable. SAP platforms are likely to contain one or more malware infections. Fifty-eight percent of respondents rate the difficulty in securing SAP applications as very high and 65 percent of respondents rate their level of concern about malware infections in the SAP infrastructure as very high. Seventy-five percent of respondents say it is very likely (33 percent) or likely (42 percent) SAP platforms have one or more malware infections. If a data breach involving the SAP system occurred, who would be responsible for remediating the incident? Despite the perceptions of the seriousness of a SAP breach, 30 percent of respondents say no one is most accountable if their organization had a SAP breach followed by the CIO (26 percent of respondents) and the CISO (18 percent of respondents). There is little confidence a breach involving the SAP platform would be detected immediately or within one week. Only 25 percent of respondents say they are very confident or confident such a data breach would be detected immediately and 35 percent of respondents say they are very confident or confident a breach would be detected within one week. Frequency and sophistication of cyber attacks against SAP platforms will increase. Fortyseven percent of respondents say the frequency of cyber attacks against their companies SAP platform will increase over the next 2 years and 54 percent of respondents say the stealth and sophistication of cyber attacks against the companies SAP platform will increase. New technologies and trends increase the risk of a data breach involving SAP applications. Fifty-nine percent of respondents also believe new technologies and trends such as cloud, mobile, big data and the Internet of Things increases the attack surface of their SAP applications. Despite this concern about the cloud, only 43 percent of respondents say it is important to understand the cybersecurity and privacy risks before deciding to move SAP applications to the cloud. How can organizations improve the security of their SAP infrastructure? Understanding the latest threats and vulnerabilities in SAP applications helps strengthen the organization s cybersecurity posture. Seventy-three percent of respondents say knowledge about the latest threats and vulnerabilities affecting SAP applications improves their organization s ability to manage cybersecurity risks. Further, 83 percent of respondents say it is very important to be able to detect zero-day vulnerabilities in SAP applications, 81 percent say the ability to prioritize threats against SAP applications based on when the attack is likely to succeed and 81 percent say it is very important to have continuous monitoring in order to ensure SAP applications are safe and secure. Segregation of duties can improve SAP security. Sixty-six percent of respondents say their current approach to SAP security includes segregation of duties and access controls and 51 percent of these respondents say it is effective in safeguarding your company s core business. 2

4 3 Part 2. Key findings In this section, we present an analysis of the research findings. The complete audited findings are presented in the appendix of the report. We have organized the findings according to the following topics from the research: Senior leadership s perceptions about SAP SAP security challenges SAP and the risk of data breaches and cyber attacks Senior leadership s perceptions about SAP Senior leadership values the importance of SAP to the bottom line but ignores its cybersecurity risks. As shown in Figure 2, 76 percent of respondents say their senior leadership understands the importance and criticality of SAP installations to profitability. However, only 21 percent of respondents say their leaders recognize SAP cybersecurity risks and 63 percent of respondents say C-level executives in their company tend to underestimate the risks associated with insecure SAP applications. Moreover, only 41 percent of respondents say their organization understands the impact of the value of the data that could be lost from our SAP system and only 23 percent of respondents say the senior leadership in their companies know what data resides on the SAP systems. Figure 2. Senior leadership s perceptions about SAP security risks Strongly agree and agree responses combined Our senior leadership understands the importance and criticality of SAP installations to our organization s bottom line 76% C-level executives in my company tend to underestimate the risks associated with insecure SAP applications 63% Our organization understands the impact of the value of the data that could be lost from our SAP system 41% Our senior leadership knows what data resides on our company s SAP systems 23% 0% 10% 20% 30% 40% 50% 60% 70% 80% SAP systems are critical to the revenues of companies represented in this research. When asked about the financial consequences if their companies SAP systems were taken offline, the average cost was estimated to be $4.5 million. This includes all direct cash outlays, direct labor expenditures, indirect labor costs, overhead costs and lost business opportunities. 3

5 4 SAP security challenges How secure are SAP applications? As shown in Figure 3, 54 percent of respondents believe it is the responsibility of SAP, not their company, to ensure the security of its applications and platform. While 62 percent of respondents say SAP applications are more secure than other applications deployed by their company, respondents say their companies are evenly divided about confidence in the security of SAP applications (50 percent of respondents). Barriers to achieving better security are the lack of full visibility into the security of SAP applications and required expertise. Less than half (49 percent) of respondents say their organization has the required expertise to prevent, detect and respond to cyber attacks on their SAP applications. This lack of expertise could be due to more resources allocated to network rather than applications security (68 percent of respondents). Figure 3. How secure are SAP applications? Strongly agree and agree responses combined My company s budget provides a higher funding level for network rather than application security 68% SAP applications are more secure than other applications deployed by my company 62% It is the responsibility of SAP, not my company, to ensure its applications and platform are safe and secure 54% My company is confident in the security of SAP applications 50% Our organization has the required expertise to prevent, detect and respond to cyber attacks on our SAP applications 49% 0% 10% 20% 30% 40% 50% 60% 70% 80% 4

6 5 The SAP security team is seldom accountable for the security of SAP systems, applications and processes. The majority of respondents believe it is difficult to secure SAP applications. One possible reason could be due to the lack of clear ownership over securing SAP applications. As shown in Figure 4, 25 percent of respondents say no one function is most accountable for SAP security in their organizations followed by IT infrastructure (21 percent of respondents). Only 19 percent of respondents say the SAP security team is accountable followed by information security (18 percent of respondents). Figure 4. Which function is most accountable to ensure the security of SAP systems, applications and processes? No one function is most accountable for SAP security 25% IT infrastructure SAP security team Information security 19% 18% 21% Risk executives 9% Audit 6% Board of directors 2% 0% 5% 10% 15% 20% 25% 30% SAP security is difficult to achieve. According to Figure 5, 58 percent of respondents rate the difficulty in securing SAP applications as high and 65 percent of respondents rate their level of concern about malware infections in the SAP infrastructure as very high. Only 34 percent of respondents say their companies have visibility into the security of SAP applications Figure 5. Difficulty SAP security, concern about malware infections and visibility 1 = no difficulty, no concern and no visibility to 10 = high difficulty, high concern and high visibility (7 + responses reported) Level of concern about malware infection in the SAP infrastructure 65% Level of difficulty in securing SAP applications 58% Visibility into the security of SAP applications 34% 0% 10% 20% 30% 40% 50% 60% 70% 5

7 6 SAP platforms are likely to contain one or more malware infections As shown in Figure 6, 75 percent of respondents say it is very likely (33 percent) or likely (42 percent) SAP platforms have one or more malware infections. Figure 6. What is the likelihood that your company s SAP platform at any point in time contains one or more malware infections? 45% 42% 40% 35% 33% 30% 25% 20% 21% 15% 10% 5% 0% Very likely Likely Not likely No chance 4% 6

8 7 SAP and the risk of data breaches and cyber attacks If a data breach involving the SAP system occurred, who would be responsible for remediating the incident? Despite the perceptions of the seriousness of a SAP breach, 30 percent of respondents say no one is most accountable if their organization had a SAP breach followed by the CIO (26 percent of respondents) and the CISO (18 percent of respondents), as shown in Figure 7. Figure 7. Who is the person most accountable if your organization has a SAP breach? No one person is accountable 30% CIO 26% CISO 18% SAP security 14% SAP BASIS administrator 8% CFO 1% Other 3% 0% 5% 10% 15% 20% 25% 30% 35% There is little confidence a breach involving the SAP platform would be detected immediately or within one week. According to Figure 8, only 25 percent of respondents say they are very confident or confident such a data breach would be detected immediately and 35 percent of respondents say they are very confident or confident a breach would be detected within one week. Confidence increases in the detection of a breach within one month (41 percent of respondents) or one year (53 percent of respondents). Figure 8. How soon would you know if the SAP platform was breached? Very confident and confident responses combined 60% 53% 50% 40% 35% 41% 30% 25% 20% 10% 0% Detected immediately Detected within one week Detected within one month Detected within one year 7

9 8 Certain SAP applications are most susceptible to cyber attack. According to respondents, content and collaboration, data management, customer relationship management (CRM) and the technology platform (backbone) are the most vulnerable to attack, as shown in Figure 9. Figure 9. SAP applications most susceptible to attack More than one response permitted Content and collaboration Data management Customer relationship management (CRM) Technology platform (backbone) Enterprise management (ERP) Financial management Supply chain management Supplier relationship management Human capital management Analytics Product life cycle management Other 5% 5% 11% 37% 35% 33% 31% 25% 50% 48% 56% 64% 0% 10% 20% 30% 40% 50% 60% 70% Frequency and sophistication of cyber attacks against SAP platforms will increase. As shown in Figure 10, 47 percent of respondents say the frequency of cyber attacks against their companies SAP platform will increase over the next 2 years and 54 percent of respondents say the stealth and sophistication of cyber attacks against the companies SAP platform will increase. Figure 10. How will the frequency and stealth and sophistication of cyber attacks against your company s SAP platform change over the next 24 months? 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% 12% 15% Significant increase 35% 39% 42% 37% Increase No change Decrease Significant decrease 8% 7% 3% 2% Frequency of cyber attacks Stealth and sophistication of cyber attacks 8

10 9 New technologies and trends increase the risk of a data breach involving SAP applications. Fifty-nine percent of respondents believe new technologies and trends such as cloud, mobile, big data and the Internet of Things increases the attack surface of their SAP applications, according to Figure 11. Despite this concern about the cloud, only 43 percent of respondents say it is important to understand the cybersecurity and privacy risks before deciding to move SAP applications to the cloud. Figure 11. What new technologies and trends will increase the risk of a data breach involving SAP applications? Strongly agree and agree responses combined Cloud, mobile, big data and the Internet of Things increase the attack surface of our SAP applications and therefore the probability of a breach 59% Understanding the cyber security and privacy risks are considered when evaluating whether or not to move SAP applications to the cloud 43% 0% 10% 20% 30% 40% 50% 60% 70% 9

11 10 Certain practices are very important to achieving security and avoiding cyber breaches in the SAP infrastructure. Understanding the latest threats and vulnerabilities in SAP applications helps strengthen the organization s cybersecurity posture. Seventy-three percent of respondents say knowledge about the latest threats and vulnerabilities affecting SAP applications improves their organization s ability to manage cybersecurity risks. According to Figure 12, 83 percent of respondents say it is very important to be able to detect zero-day vulnerabilities in SAP applications, 81 percent say the ability to prioritize threats against SAP applications based on when the attack is likely to succeed and 81 percent say it is very important to have continuous monitoring in order to ensure SAP applications are safe and secure. The following practices are also important: the ability to assess and audit SAP compliance with policies, industry standards and government regulations (78 percent of respondents), the ability to integrate existing security technologies including GRC, SIEM, network security and security operations management with their company s SAP security solution (73 percent of respondents), the ability to receive a direct feed of the latest SAP vulnerabilities confirmed by security experts (72 percent of respondents) and compliance when deploying SAP applications (67 percent of respondents). Figure 12. What practices are important in achieving security in the SAP infrastructure? 1 = low importance to 10 = high importance, 7+ responses Ability to detect zero-day vulnerabilities in SAP applications 83% Ability to prioritize threats against SAP applications based on when the attack is likely to succeed 81% Continuous monitoring in ensuring SAP applications are safe and secure 81% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Segregation of duties can improve SAP security. Sixty-six percent of respondents say their current approach to SAP security includes segregation of duties and access controls and 51 percent of these respondents say it is effective in safeguarding your company s core business. 10

12 11 Part 3. Methods & Limitations A sampling frame of 17,473 experienced IT and IT security practitioners located in the United States were selected as participants to this survey. From this sampling frame, we captured 709 returns of which 102 were rejected for reliability issues. Our final sample was 607, thus resulting in an overall 3.5 percent response rate, as shown in Table 1. Table 1. Sample response Freq Total sampling frame 17, % Total returns % Rejected or screened surveys % Final sample % Pie Chart 1 summarizes the approximate position levels of respondents in our study. As can be seen, the majority of respondents (58 percent) are at or above the supervisory level. Pie Chart 1. Distribution of respondents according to position level 5% 2% 2% 3% 35% 17% 21% Senior Executive Vice President Director Manager Supervisor Technician Staff Contractor 15% Pie Chart 2 reveals 25 percent of respondents identified their primary role as within IT management, 18 percent responded IT security and 15 percent responded SAP infrastructure. Pie Chart 2. Primary role within the organization 4% 3% 2% 2% 5% 5% 8% 13% 25% 18% IT management IT security SAP infrastructure Application security Application development Security architecture Risk management SAP security SAP consultant Quality assurance Other 15% 11

13 12 Pie Chart 3 reports the respondents organizations primary industry focus. As shown, 18 percent of respondents identified financial services and insurance, which includes banking, investment management, insurance, brokerage, payments and credit cards. Nine percent responded manufacturing, and eight percent responded public sector / government. Pie Chart 3. Distribution of respondents according to primary industry classification 2% 2% 2% 3% Financial services & Insurance 18% Manufacturing Public sector/ Government 3% Retail 3% Healthcare 3% Services Technology & Software 3% Airlines/Automotive/Transportation 9% Hospitality 4% Internet & ISPs Pharmaceuticals 4% Communications/Telecom 8% Consumer Products 4% Energy/Oil & Gas Utilities 4% Chemicals 8% 5% Education 6% 7% Media Professional Services Other According to Pie Chart 4, the majority of respondent are located in larger-sized organizations with a global headcount of more than 1,000 employees. Pie Chart 4. Distribution of respondents according to world headcount 13% 5,000 to 25,000 people 51% 25,001 to 75,000 people 36% More than 75,000 people In addition to the United States, 70 percent of respondents reported their organization has employees located in Europe, 67 percent responded Canada, and 63 percent responded Asia- Pacific. Table 2. Location of employees United States 100% Europe 70% Canada 67% Asia-Pacific 63% Middle East & Africa 54% Latin America (including Mexico) 49% Total 403% 12

14 13 Limitations There are inherent limitations to survey research that need to be carefully considered before drawing inferences from findings. The following items are specific limitations that are germane to most web-based surveys. Non-response bias: The current findings are based on a sample of survey returns. We sent surveys to a representative sample of individuals, resulting in a large number of usable returned responses. Despite non-response tests, it is always possible that individuals who did not participate are substantially different in terms of underlying beliefs from those who completed the instrument. Sampling-frame bias: The accuracy is based on contact information and the degree to which the list is representative of individuals who are IT or IT security practitioners. We also acknowledge that the results may be biased by external events such as media coverage. We also acknowledge bias caused by compensating subjects to complete this research within a holdout period. Self-reported results: The quality of survey research is based on the integrity of confidential responses received from subjects. While certain checks and balances can be incorporated into the survey process, there is always the possibility that a subject did not provide a truthful response. 13

15 14 Appendix: Detailed Survey Results The following tables provide the frequency or percentage frequency of responses to all survey questions contained in this study. All survey responses were captured in mid December 2015 through January 4, Survey response Freq. Total sampling frame 17,473 Total returns 709 Rejected or screened surveys 102 Final sample 607 Response rate 3.5% Part 1. Screening S1a. Does your company use SAP? Yes 81% No 19% S1b. If no, do you use any of the following solutions? Oracle E-Business Suite (Financials) 25% Oracle JD Edwards 19% Oracle Siebel 19% Oracle PeopleSoft 13% Other 5% None of the above (stop) 19% S2. Which SAP products (e.g., modules) does your organization deploy? Enterprise management (ERP) 73% Technology platform (backbone) 69% Financial management 53% Data management 50% Customer relationship management (CRM) 46% Human capital management 41% Supply chain management 33% Supplier relationship management 33% Content and collaboration 25% Product life cycle management 25% Analytics 18% Other (please specify) 0% None of the above (stop) 0% Total 466% S3. What best describes your involvement in the security of SAP applications deployed by your organization? Very significant 31% Significant 47% Moderate 22% Minimal or none (stop) 0% 14

16 15 Part 2. Attributions: Are organizations prepared to deal with SAP security risks? Strongly agree and Agree responses combined Q1. My company s budget provides a higher funding level for network rather than application security. 68% Q2. C-level executives in my company tend to underestimate the risks associated with insecure SAP applications. 63% Q3. My company is confident in the security of SAP applications. 50% Q4. It is the responsibility of SAP, not my company, to ensure its applications and platform are safe and secure. 54% Q5. Our senior leadership understands the importance and criticality of SAP installations to our organization s bottom line. 76% Q6. Our organization understands the impact of the value of the data that could be lost from our SAP system. 41% Q7. Our senior leadership knows what data resides on our company s SAP systems. 23% Q8. Our organization has the required expertise to prevent, detect and respond to cyber attacks on our SAP applications. 49% Q9. SAP applications that are not connected to the Internet pose no real security threat to my company. 56% Q10. SAP applications are more secure than other applications deployed by my company. 62% Q11. Our senior leadership is aware of SAP cybersecurity risks. 21% Q12. Understanding the latest threats and vulnerabilities affecting SAP applications improves our organization s ability to manage cyber security risks. 73% Q13. My company is unlikely to experience a material security or data breach resulting from insecure SAP applications. 44% Q14. New technologies and trends such as cloud, mobile, big data and the Internet of Things increase the attack surface of our SAP applications and therefore the probability of a breach. 59% Q15. Understanding the cyber security and privacy risks are considered when evaluating whether or not to move SAP applications to the cloud. 43% Part 3. SAP security challenges Q16. Which function is most accountable to ensure the security of SAP systems, applications and processes? SAP security team 19% Information security 18% Audit 6% IT infrastructure 21% Risk executives 9% Board of directors 2% No one function is most accountable for SAP security 25% Q17a. Does your current approach to SAP security include segregation of duties and access controls? Yes 66% No 30% Unsure 4% Q17b. If yes, is it effective in safeguarding your companies core business systems? Yes 51% No 44% Unsure 5% 15

17 16 Q18. What is the likelihood that your company s SAP platform at any point in time contains one or more malware infections? Very likely 33% Likely 42% Not likely 21% No chance 4% The following items are rated using a 10-point scale ranging from 1 = lowest to 10 = highest. Q19. Please rate the level of difficulty in securing SAP applications. Average 1 or 2 4% 3 or 4 10% 5 or 6 30% 7 or 8 36% 9 or 10 22% Extrapolated value 6.73 Q20. Please rate your organization s level of concern about malware infection in the SAP infrastructure. 1 or 2 3% 3 or 4 12% 5 or 6 20% 7 or 8 31% 9 or 10 34% Extrapolated value 7.12 Q21. Please rate your organization s effectiveness in managing the SAP infrastructure. 1 or 2 0% 3 or 4 8% 5 or 6 17% 7 or 8 43% 9 or 10 32% Extrapolated value 7.48 Q22. Please rate the importance of compliance when deploying SAP applications. 1 or 2 1% 3 or 4 7% 5 or 6 15% 7 or 8 38% 9 or 10 39% Extrapolated value

18 17 Q23. Please rate the importance of continuous monitoring in ensuring SAP applications are safe and secure. 1 or 2 1% 3 or 4 5% 5 or 6 13% 7 or 8 42% 9 or 10 39% Extrapolated value 7.76 Q24. Using the following 10-point scale, what best defines your company s visibility into the security of SAP applications? 1 or 2 16% 3 or 4 28% 5 or 6 22% 7 or 8 21% 9 or 10 13% Extrapolated value 5.24 Q25. Using the following 10-point scale, how important is the ability to integrate existing security technologies including GRC, SIEM, network security and security operations management with your company s SAP security solution? 1 or 2 5% 3 or 4 4% 5 or 6 18% 7 or 8 38% 9 or 10 35% Extrapolated value 7.38 Q26. Using the following 10-point scale, how important is the ability to assess and audit SAP compliance with policies, industry standards and government regulations? 1 or 2 4% 3 or 4 2% 5 or 6 16% 7 or 8 20% 9 or 10 58% Extrapolated value 8.02 Q27. Using the following 10-point scale, how important is the ability to prioritize threats against SAP applications based on when the attack is likely to succeed? 1 or 2 3% 3 or 4 8% 5 or 6 8% 7 or 8 28% 9 or 10 53% Extrapolated value

19 18 Q28. Using the following 10-point scale, how important is the ability to detect zero-day vulnerabilities in SAP applications? 1 or 2 0% 3 or 4 1% 5 or 6 16% 7 or 8 40% 9 or 10 43% Extrapolated value 8.00 Q29. Using the following 10-point scale, how important is the ability to receive a direct feed of the latest SAP vulnerabilities confirmed by security experts? 1 or 2 3% 3 or 4 7% 5 or 6 18% 7 or 8 42% 9 or 10 30% Extrapolated value 7.28 Part 4. Data breaches and cyber attack Q30. What SAP applications are most susceptible to cyber attack? Please select your top four choices. Content and collaboration 64% Data management 56% Customer relationship management (CRM) 50% Technology platform (backbone) 48% Enterprise management (ERP) 37% Financial management 35% Supply chain management 33% Supplier relationship management 31% Human capital management 25% Analytics 11% Product life cycle management 5% Other (please specify) 5% Total 400% Q31. In your opinion, how will the frequency of cyber attacks against you company s SAP platform change over the next 24 months? Significant increase 12% Increase 35% No change 42% Decrease 8% Significant decrease 3% Q32. In your opinion, how will the stealth and sophistication of cyber attacks against you company s SAP platform change over the next 24 months? Significant increase 15% Increase 39% No change 37% Decrease 7% Significant decrease 2% 18

20 19 Q33. Who is the primary person most accountable if your organization has a SAP breach? CIO 26% CISO 18% CFO 1% SAP security 14% SAP BASIS administrator 8% No one person is accountable 30% Other (please specify) 3% Q34a. If your company s SAP platform was breached, how confident are you that this breach would be detected immediately? Very confident 6% Confident 19% Not confident 35% No confidence 40% Q34b. If your company s SAP platform was breached, how confident are you that this breach would be detected within one week? Very confident 12% Confident 23% Not confident 34% No confidence 31% Q34c. If your company s SAP platform was breached, how confident are you that this breach would be detected within one month? Very confident 15% Confident 26% Not confident 31% No confidence 28% Q34d. If your company s SAP platform was breached, how confident are you that this breach would be detected within one year? Very confident 23% Confident 30% Not confident 29% No confidence 18% Q35. To the best of your knowledge, how many times has your company s SAP platform been breached over the past 24 months? Zero 35% 1 or 2 32% 3 or 4 16% 5 or 6 12% 7 or 8 3% 9 or 10 1% More than 10 1% Extrapolated value

21 20 Q36. What best describes the impact of information theft, modification of data and disruption of business processes on your company s SAP? Catastrophic 17% Very serious 43% Serious 32% Not serious 8% Nominal or none 0% Q37. How much would it cost your company if your SAP systems were taken offline? Please note that the cost estimate should include all direct cash outlays, direct labor expenditures, indirect labor costs, overhead costs and lost business opportunities. Zero 0% Less than $100,000 15% 100,001 to $250,000 18% 250,001 to $500,000 23% 500,001 to $1,000,000 17% 1,000,001 to $5,000,000 11% 5,000,001 to $10,000,000 6% 10,000,001 to $25,000,000 5% 25,000,001 to $50,000,000 3% 50,000,001 to $100,000,000 2% More than $100,000,000 0% Extrapolated value 4,538,750 Part 5. Your Role D1. What organizational level best describes your current position? Senior Executive 2% Vice President 3% Director 17% Manager 21% Supervisor 15% Technician 35% Staff 5% Contractor 2% Other 0% D2. What best describes your primary role in the organization? Application development 8% SAP security 4% SAP infrastructure 15% SAP consultant 3% Application security 13% Security architecture 5% IT management 25% IT security 18% Quality assurance 2% Compliance/audit 1% Risk management 5% Network engineering 1% Other 0% 20

22 21 D3. What industry best describes your organization s industry focus? Agriculture/Food & Beverage 1% Airlines/Automotive/Transportation 4% Communications/Telecom 3% Consumer Products 3% Chemicals 2% Defense 1% Education 2% Energy/Oil & Gas 3% Entertainment 0% Financial services & Insurance 18% Healthcare 7% Hospitality 4% Internet & ISPs 4% Manufacturing 9% Media 2% Mining & Metals 1% Pharmaceuticals 4% Professional Services 2% Public sector/ Government 8% Research 0% Retail 8% Services 6% Technology & Software 5% Utilities 3% Other 0% D4. Where are your employees located? (check all that apply): United States 100% Canada 67% Europe 70% Middle East & Africa 54% Asia-Pacific 63% Latin America (including Mexico) 49% Total 403% D5. What is the worldwide headcount of your organization? 5,000 to 25,000 people 51% 25,001 to 75,000 people 36% More than 75,000 people 13% 21

23 22 Please contact or call us at if you have any questions. Ponemon Institute Advancing Responsible Information Management Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations. As a member of the Council of American Survey Research Organizations (CASRO),we uphold strict data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or company identifiable information in our business research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions. 22

The Cost of Denial-of-Services Attacks

The Cost of Denial-of-Services Attacks The Cost of Denial-of-Services Attacks Sponsored by Akamai Technologies Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute Research Report The Cost of Denial-of-Service

More information

Reducing Cybersecurity Costs & Risk through Automation Technologies

Reducing Cybersecurity Costs & Risk through Automation Technologies Reducing Cybersecurity Costs & Risk through Automation Technologies Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: November 2017 Ponemon Institute Research

More information

Big Data Cybersecurity Analytics Research Report Sponsored by Cloudera

Big Data Cybersecurity Analytics Research Report Sponsored by Cloudera Big Data Cybersecurity Analytics Research Report! Sponsored by Cloudera Independently conducted by Ponemon Institute LLC Publication Date: August 2016 Ponemon Institute Research Report Part 1. Introduction

More information

National Survey on Data Center Outages

National Survey on Data Center Outages National Survey on Data Center Outages Independently conducted by Ponemon Institute LLC Publication Date: 30 September 2010 National Survey on Data Center Outages Ponemon Institute, 30 September 2010 Part

More information

The Third Annual Study on the Cyber Resilient Organization

The Third Annual Study on the Cyber Resilient Organization The Third Annual Study on the Cyber Resilient Organization Global Independently conducted by the Ponemon Institute Sponsored by IBM Resilient Publication Date: March 2018 Ponemon Institute Research Report

More information

Data Protection Risks & Regulations in the Global Economy

Data Protection Risks & Regulations in the Global Economy Data Protection Risks & Regulations in the Global Economy Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: June 2017 Ponemon Institute Research

More information

2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB)

2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB) 2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB) Sponsored by Keeper Security Independently conducted by Ponemon Institute LLC Publication Date: June 2016 Ponemon Institute Research

More information

The State of Cybersecurity in Healthcare Organizations in 2016

The State of Cybersecurity in Healthcare Organizations in 2016 THE STATE OF CYBERSECURITY IN HEALTHCARE ORGANIZATIONS IN 2016 The State of Cybersecurity in Healthcare Organizations in 2016 Independently conducted by Ponemon Institute LLC Sponsored by ESET Publication

More information

Future State of IT Security A Survey of IT Security Executives

Future State of IT Security A Survey of IT Security Executives Future State of IT Security A Survey of IT Security Executives In Partnership with RSA Conference Independently conducted by Ponemon Institute LLC Publication Date: February 2012 Ponemon Institute Research

More information

Sponsored by Raytheon. Don t Wait: The Evolution of Proactive Threat Hunting Executive Summary

Sponsored by Raytheon. Don t Wait: The Evolution of Proactive Threat Hunting Executive Summary Don t Wait: The Evolution of Proactive Threat Hunting Executive Summary Sponsored by Raytheon Independently conducted by Ponemon Institute LLC Publication Date: June 2016 Connect with us: #DontWaitHunt

More information

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on

More information

The Cyber Resilient Organisation in the United Kingdom: Learning to Thrive against Threats

The Cyber Resilient Organisation in the United Kingdom: Learning to Thrive against Threats The Cyber Resilient Organisation in the United Kingdom: Learning to Thrive against Threats Independently conducted by Ponemon Institute LLC Sponsored by Resilient Systems Publication Date: January 2016

More information

2017 State of Cybersecurity in Small & Medium-Sized Businesses (SMB)

2017 State of Cybersecurity in Small & Medium-Sized Businesses (SMB) 2017 State of Cybersecurity in Small & Medium-Sized Businesses (SMB) Sponsored by Keeper Security Independently conducted by Ponemon Institute LLC Publication Date: September 2017 Ponemon Institute Research

More information

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner MOBILE SECURITY 2017 SPOTLIGHT REPORT Group Partner Information Security PRESENTED BY OVERVIEW Security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use

More information

2012 Cost of Cyber Crime Study: United States

2012 Cost of Cyber Crime Study: United States 2012 Cost of Cyber Crime Study: United States Sponsored by HP Enterprise Security Independently conducted by Ponemon Institute LLC Publication Date: October 2012 Ponemon Institute Research Report Part

More information

2013 Cost of Cyber Crime Study: Global Report

2013 Cost of Cyber Crime Study: Global Report 2013 Cost of Cyber Crime Study: Global Report Sponsored by HP Enterprise Security Independently conducted by Ponemon Institute LLC Publication Date: October 2013 Ponemon Institute Research Report Part

More information

Big Data Analytics in Cyber Defense

Big Data Analytics in Cyber Defense Big Data Analytics in Cyber Defense Sponsored by Teradata Independently conducted by Ponemon Institute LLC Publication Date: February 2013 Ponemon Institute Research Report Big Data Analytics in Cyber

More information

Flying Blind in the Cloud

Flying Blind in the Cloud Independently conducted by Ponemon Institute LLC Publication Date: April 7, 2010 Flying Blind in the Cloud The State of Information Governance Flying Blind in the Cloud Ponemon Institute Research Report

More information

Third Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way

Third Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way Third Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way Sponsored by Infoblox Independently conducted by Ponemon Institute LLC Publication Date: January 2018 Ponemon Institute

More information

2014 Global Report on the Cost of Cyber Crime

2014 Global Report on the Cost of Cyber Crime 2014 Global Report on the Cost of Cyber Crime Sponsored by HP Enterprise Security Independently conducted by Ponemon Institute LLC Publication Date: October 2014 Ponemon Institute Research Report Part

More information

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE 2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE February 2014 Sponsored by: 2014 Network Security & Cyber Risk Management:

More information

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results Operationalizing Cybersecurity in Healthcare - - 2017 IT Security & Risk Management Study Quantitative and Qualitative Research Program Results David S. Finn, CISA, CISM, CRISC Health IT Officer, Symantec

More information

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT:

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: 2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: A SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN THE ASIA-PACIFIC REGION April 2014 Sponsored by: 2014 NETWORK SECURITY & CYBER RISK MANAGEMENT:

More information

Ponemon Institute s 2018 Cost of a Data Breach Study

Ponemon Institute s 2018 Cost of a Data Breach Study Ponemon Institute s 2018 Cost of a Data Breach Study September 18, 2018 1 IBM Security Speakers Deborah Snyder CISO State of New York Dr. Larry Ponemon Chairman and Founder Ponemon Institute Megan Powell

More information

Cyber Security. June 2015

Cyber Security. June 2015 Cyber Security June 2015 Table of contents Section Pages Introduction and methodology 3 Key findings 4 Respondent profile 5-9 Cyber security practices 10-25 Resources for monitoring cyber security events

More information

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report. 2019 SIEM REPORT INTRODUCTION Security Information and Event Management (SIEM) is a powerful technology that allows security operations teams to collect, correlate and analyze log data from a variety of

More information

IT Monitoring Tool Gaps are Impacting the Business A survey of IT Professionals and Executives

IT Monitoring Tool Gaps are Impacting the Business A survey of IT Professionals and Executives IT Monitoring Tool Gaps are Impacting the Business A survey of IT Professionals and Executives June 2018 1 Executive Summary This research finds that large enterprise customers and employees endure a substantial

More information

Tripwire State of Container Security Report

Tripwire State of Container Security Report RESEARCH Tripwire State of Container Security Report January 2019 FOUNDATIONAL CONTROLS FOR SECURITY, COMPLIANCE & IT OPERATIONS As DevOps continues to drive increased use of containers, security teams

More information

2017 Cost of Data Breach Study

2017 Cost of Data Breach Study 2017 Cost of Data Breach Study South Africa Benchmark research sponsored by IBM Security Independently conducted by Ponemon Institute LLC June 2017 Ponemon Institute Research Report 2017 Cost of Data Breach

More information

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Cybersecurity: Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda Key Risks Incorporating Internal Audit Resources Questions 2 San Francisco

More information

A Global Look at IT Audit Best Practices

A Global Look at IT Audit Best Practices A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory

More information

Cyber Security in Timothy Brown Dell Fellow and CTO Dell Security

Cyber Security in Timothy Brown Dell Fellow and CTO Dell Security Cyber Security in 2016 Timothy Brown Dell Fellow and CTO Dell Security 2016 The middle of a perfect storm Technology Driving Innovation Advanced Adversaries Limited Resources Dell Secureworks Underground

More information

2015 VORMETRIC INSIDER THREAT REPORT

2015 VORMETRIC INSIDER THREAT REPORT Research Conducted by Research Analyzed by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security GLOBAL EDITION #2015InsiderThreat EXECUTIVE PERSPECTIVE 1 INSIDER THREATS:

More information

Cybersecurity. Securely enabling transformation and change

Cybersecurity. Securely enabling transformation and change Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why

More information

ACHIEVING FIFTH GENERATION CYBER SECURITY

ACHIEVING FIFTH GENERATION CYBER SECURITY ACHIEVING FIFTH GENERATION CYBER SECURITY A Survey Research Report of IT and Security Professionals MARCH 2018 INTRODUCTION The pursuit of the highest level of cyber security is a top priority for IT and

More information

Security in India: Enabling a New Connected Era

Security in India: Enabling a New Connected Era White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile

More information

Modern Compute Is The Foundation For Your IT Transformation

Modern Compute Is The Foundation For Your IT Transformation A Forrester Consulting Thought Leadership Paper Commissioned By Dell EMC And Intel February 2018 Modern Compute Is The Foundation For Your IT Transformation Failure To Update Can Stunt Your Growth Table

More information

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) June 2017 INSERT YEAR HERE Contact Information: Jeremy Dalpiaz AVP, Cyber and Data Security Policy Jeremy.Dalpiaz@icba.org ICBA Summary

More information

Spotlight Report. Information Security. Presented by. Group Partner

Spotlight Report. Information Security. Presented by. Group Partner Cloud SecuriTY Spotlight Report Group Partner Information Security Presented by OVERVIEW Key FINDINGS Public cloud apps like Office 365 and Salesforce have become a dominant, driving force for change in

More information

NYDFS Cybersecurity Regulations

NYDFS Cybersecurity Regulations SPEAKERS NYDFS Cybersecurity Regulations Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 lsotto@hunton.com www.huntonprivacyblog.com March 9, 2017 The Privacy Team at Hunton & Williams Over 30 privacy

More information

Turning Risk into Advantage

Turning Risk into Advantage Turning Risk into Advantage How Enterprise Wide Risk Management is helping customers succeed in turbulent times and increase their competitiveness Glenn Tjon Partner KPMG Advisory Presentation Overview

More information

Combating Cyber Risk in the Supply Chain

Combating Cyber Risk in the Supply Chain SESSION ID: CIN-W10 Combating Cyber Risk in the Supply Chain Ashok Sankar Senior Director Cyber Strategy Raytheon Websense @ashoksankar Introduction The velocity of data breaches is accelerating at an

More information

The Deloitte-NASCIO Cybersecurity Study Insights from

The Deloitte-NASCIO Cybersecurity Study Insights from The Deloitte-NASCIO Cybersecurity Study Insights from 2010-2016 August 21, 2018 Srini Subramanian State Government Sector Leader Deloitte Erik Avakian CISO Pennsylvania Michael Roling CISO Missouri Meredith

More information

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? What the new data regulations mean for your business, and how Brennan IT and Microsoft 365 can help. THE REGULATIONS: WHAT YOU NEED TO KNOW Australia:

More information

Onapsis: The CISO Imperative Taking Control of SAP

Onapsis: The CISO Imperative Taking Control of SAP Onapsis: The CISO Imperative Taking Control of SAP Cyberattacks @onapsis 2016 Key SAP Cyber-Security Trends Over 95% of the SAP systems we have assessed, were exposed to vulnerabilities that could lead

More information

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions

More information

Technology Priorities SURVEY. Exclusive Research from CIO magazine

Technology Priorities SURVEY. Exclusive Research from CIO magazine Technology Priorities SURVEY Exclusive Research from CIO magazine JULY 2010 EXECUTIVE SUMMARY Top Technology Priorities for CIOs: Cloud Computing, Virtualization Desktop and network virtualization, along

More information

2017 PKI GLOBAL TRENDS STUDY

2017 PKI GLOBAL TRENDS STUDY 2017 PKI GLOBAL TRENDS STUDY October 2017 1 2017 PKI GLOBAL TRENDS STUDY TABLE OF CONTENTS PART 1. EXECUTIVE SUMMARY 3 PART 2. KEY FINDINGS 5 Trends in PKI maturity 7 PART 3. METHODS 20 PART 4. LIMITATIONS

More information

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. In today s escalating cyber risk environment, you need to make sure you re focused on the right priorities by

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Business continuity management and cyber resiliency

Business continuity management and cyber resiliency Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Business continuity management and cyber resiliency Introductions Eric Wunderlich,

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

HEALTH CARE AND CYBER SECURITY:

HEALTH CARE AND CYBER SECURITY: HEALTH CARE AND CYBER SECURITY: Increasing Threats Require Increased Capabilities kpmg.com 1 HEALTH CARE AND CYBER SECURITY EXECUTIVE SUMMARY Four-fifths of executives at healthcare providers and payers

More information

GDPR COMPLIANCE REPORT

GDPR COMPLIANCE REPORT 2018 GDPR COMPLIANCE REPORT INTRODUCTION Effective as of May 25, 2018, the European Union General Data Protection Regulation (GDPR) represents the most sweeping change in data privacy regulation in decades.

More information

First aid toolkit for the management of data breaches. Mary Deligianni Senior Associate 15 February 2018

First aid toolkit for the management of data breaches. Mary Deligianni Senior Associate 15 February 2018 First aid toolkit for the management of data breaches Mary Deligianni Senior Associate 15 February 2018 What is a personal data breach? Breach of security which leads to the accidental or unlawful destruction,

More information

34% DOING MORE WITH LESS How Red Hat Enterprise Linux shrinks total cost of ownership (TCO) compared to Windows. I n a study measuring

34% DOING MORE WITH LESS How Red Hat Enterprise Linux shrinks total cost of ownership (TCO) compared to Windows. I n a study measuring WHITEPAPER DOING MORE WITH LESS How shrinks total cost of ownership (TCO) compared to Windows I n a study measuring the TCO of Windows and servers, Red Hat Enterprise platforms exhibited 34% lower annual

More information

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015 ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO 27001 FRAMEWORK AUGUST 19, 2015 Agenda Coalfire Overview Threat Landscape What is ISO Why ISO ISO Cycle Q&A 2 Presenters

More information

The State of Cybersecurity and Digital Trust 2016

The State of Cybersecurity and Digital Trust 2016 The State of Cybersecurity and Digital Trust 2016 Identifying Cybersecurity Gaps to Rethink State of the Art Executive Summary Executive Summary While the advent of digital technology has fueled new business

More information

CYBERSECURITY AND THE MIDDLE MARKET

CYBERSECURITY AND THE MIDDLE MARKET CYBERSECURITY AND THE MIDDLE MARKET The Importance of Cybersecurity and How Middle Market Companies Manage Cyber Risks IN COLLABORATION WITH 2 Concerns about cybersecurity are not matched by plans. IMPORTANCE

More information

COST OF CYBER CRIME STUDY

COST OF CYBER CRIME STUDY 2017 COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE Independently conducted by Ponemon Institute LLC and jointly developed by Accenture EXECUTIVE SUMMARY Average

More information

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Risk: Security s New Compliance Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Agenda Market Dynamics Organizational Challenges Risk: Security s New Compliance

More information

Cybersecurity 2016 Survey Summary Report of Survey Results

Cybersecurity 2016 Survey Summary Report of Survey Results Introduction In 2016, the International City/County Management Association (ICMA), in partnership with the University of Maryland, Baltimore County (UMBC), conducted a survey to better understand local

More information

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee

More information

The Evolving Role of CISOs

The Evolving Role of CISOs Security Report The Evolving Role of CISOs and their Importance to the Business August 2017 Independently conducted by Ponemon Institute LLC Sponsored by F5 Networks What s inside Executive Summary 2 Section

More information

KEY FINDINGS INTERACTIVE GUIDE. Uncovering Hidden Threats within Encrypted Traffic

KEY FINDINGS INTERACTIVE GUIDE. Uncovering Hidden Threats within Encrypted Traffic KEY FINDINGS INTERACTIVE GUIDE Uncovering Hidden Threats within Encrypted Traffic Introduction In a study commissioned by A10 Networks, Ponemon surveyed 1,023 IT and IT security practitioners in North

More information

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey CyberMaryland Conference 2017 Bob Andersen, Sr. Manager Federal Sales Engineering robert.andersen@solarwinds.com

More information

SAP Security Remediation: Three Steps for Success Using SAP GRC

SAP Security Remediation: Three Steps for Success Using SAP GRC SAP Security Remediation: Three Steps for Success Using SAP GRC All companies need strong application security environments as part of a successful overall risk management strategy. Strong risk-oriented

More information

FOR FINANCIAL SERVICES ORGANIZATIONS

FOR FINANCIAL SERVICES ORGANIZATIONS RSA BUSINESS-DRIVEN SECURITYTM FOR FINANCIAL SERVICES ORGANIZATIONS MANAGING THE NEXUS OF RISK & SECURITY A CHANGING LANDSCAPE AND A NEW APPROACH Today s financial services technology landscape is increasingly

More information

2012 Consumer Study on Data Breach Notification. Sponsored by Experian Data Breach Resolution

2012 Consumer Study on Data Breach Notification. Sponsored by Experian Data Breach Resolution 2012 Consumer Study on Data Breach Notification Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: June 2012 Ponemon Institute Research Report

More information

Healthcare Security Success Story

Healthcare Security Success Story Regional Forum on Cybersecurity in the Era of Emerging Technologies & the Second Meeting of the Successful Administrative Practices -2017 Cairo, Egypt 28-29 November 2017 Healthcare Security Success Story

More information

Cyber Resilience. Think18. Felicity March IBM Corporation

Cyber Resilience. Think18. Felicity March IBM Corporation Cyber Resilience Think18 Felicity March 1 2018 IBM Corporation Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack

More information

Cybersecurity Fundamentals

Cybersecurity Fundamentals Cybersecurity Fundamentals Prof. Georges Ataya, Vice President of the Belgian Cybersecurity Coalition Academic Director, IT Management Education (Solvay Brussels School of Economics and Management) Managing

More information

Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group

Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group Presentation Objectives Introductions Cyber security context Cyber security in the maritime sector Developing cybersecurity

More information

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016 Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the

More information

2016 Nationwide Cyber Security Review: Summary Report. Nationwide Cyber Security Review: Summary Report

2016 Nationwide Cyber Security Review: Summary Report. Nationwide Cyber Security Review: Summary Report Nationwide Cyber Security Review: Summary Report Nationwide Cyber Security Review: Summary Report ii Nationwide Cyber Security Review: Summary Report Acknowledgments The Multi-State Information Sharing

More information

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES DIGITAL TRANSFORMATION IN FINANCIAL SERVICES Global Priorities, Progress, and Obstacles Insights from business and IT executives at financial services institutions worldwide reveal that while digital transformation

More information

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs Dominic Cussatt Acting Deputy Assistant Secretary / Chief Information Security Officer (CISO) February 20, 2017 The Cyber

More information

Building a Threat Intelligence Program

Building a Threat Intelligence Program WHITE PAPER Building a Threat Intelligence Program Research findings on best practices and impact www. Building a Threat Intelligence Program 2 Methodology FIELD DATES: March 30th - April 4th 2018 351

More information

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs) Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs) Florida Hospital Association Welcome! John Wilgis Director, Emergency Management Services Florida Hospital Association

More information

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1 Addressing the Evolving Cybersecurity Tom Tollerton, CISSP, CISA, PCI QSA Manager Cybersecurity Advisory Services DHG presenter Tom Tollerton, Manager DHG IT Advisory 704.367.7061 tom.tollerton@dhgllp.com

More information

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During

More information

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Featuring Sophia Vargas, Forrester Research Inc. 30 May 2014 Introducing today s presenters: Matt Miszewski Senior Vice President of Sales

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:

More information

ASSESSING THE CYBER READINESS. of the Middle East s Oil and Gas Sector.

ASSESSING THE CYBER READINESS. of the Middle East s Oil and Gas Sector. ASSESSING THE CYBER READINESS of the Middle East s Oil and Gas Sector www.siemens.com/middleeast 101 An emerging trend of cyber attacks is designed to disrupt physical devices or processes used in operations.

More information

GLOBAL ENCRYPTION TRENDS STUDY

GLOBAL ENCRYPTION TRENDS STUDY GLOBAL ENCRYPTION TRENDS STUDY April 2017 EXECUTIVE SUMMARY EXECUTIVE SUMMARY Ponemon Institute is pleased to present the findings of the 2017 Global Encryption Trends Study, sponsored by Thales e-security.

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

Tripwire State of Cyber Hygiene Report

Tripwire State of Cyber Hygiene Report RESEARCH Tripwire State of Cyber Hygiene Report August 2018 FOUNDATIONAL CONTROLS FOR SECURITY, COMPLIANCE & IT OPERATIONS When a high-profile cyberattack grabs the headlines, your first instinct may be

More information

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank Introduction The 6,331 credit unions in the United States face a unique challenge when it comes to cybersecurity.

More information

The Quest for Independence - Information Security Management Pyramid. Mikhail Utin, CISSP, PhD, Daniil Utin, MS and Rubos, Inc.

The Quest for Independence - Information Security Management Pyramid. Mikhail Utin, CISSP, PhD, Daniil Utin, MS and Rubos, Inc. 1 1. Introduction The Quest for Independence - Information Security Management Pyramid Mikhail Utin, CISSP, PhD, Daniil Utin, MS and Rubos, Inc. team The current state of global cybersecurity remains chaotic

More information

whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk

whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk Assure the board your company won t be the next data breach Introduction A solid vulnerability management program is critical

More information

The Value of Automated Penetration Testing White Paper

The Value of Automated Penetration Testing White Paper The Value of Automated Penetration Testing White Paper Overview As an information security expert and the security manager of the company, I am well aware of the difficulties of enterprises and organizations

More information

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS CYBER SECURITY TAILORED FOR BUSINESS SUCCESS KNOW THE ASIAN CYBER SECURITY LANDSCAPE As your organisation adopts digital transformation initiatives to accelerate your business ahead, understand the cyber

More information

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0 Cyber Security and Inside Threats: Turning Policies into Practices Presented by Ingrid Fredeen and Pamela Passman Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0 Presented By Ingrid Fredeen, J.D.

More information

2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals

2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals 2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals Sponsored by Contents Introduction....3 Key Takeaways from the 2017 Report:....3 Security

More information

Background FAST FACTS

Background FAST FACTS Background Terra Verde was founded in 2008 by cybersecurity, risk and compliance executives. The founders believed that the market needed a company that was focused on using security, risk and compliance

More information

Mastering The Endpoint

Mastering The Endpoint Organizations Find Value In Integrated Suites GET STARTED Overview In the face of constantly evolving threat vectors, IT security decision makers struggle to manage endpoint security effectively. More

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information