Flying Blind in the Cloud

Size: px
Start display at page:

Download "Flying Blind in the Cloud"

Transcription

1 Independently conducted by Ponemon Institute LLC Publication Date: April 7, 2010 Flying Blind in the Cloud The State of Information Governance Flying Blind in the Cloud Ponemon Institute Research Report

2 The State of Information Governance Prepared by Ponemon Institute, April I. Executive Summary Despite widespread interest in adopting cloud computing technologies, many organizations are flying blind with respect to making them secure, potentially putting their operations, intellectual property and customer information at risk., Ponemon Institute independently conducted this national study, Flying Blind in the Cloud: the State of Information Governance, to better understand how organizations are securing their information assets in a cloud computing environment. The survey was completed by 637 U.S. IT security practitioners and focused on the following issues: Organizations use of cloud computing applications, platforms and infrastructure services. The importance of cloud computing in the organization s IT and data processing objectives. Policies and procedures in place to protect sensitive information in the cloud, especially regulated data subject to data breach notification. The following are the major findings of this study: Business applications, solution stacks and storage are the most popular cloud computing applications, platforms and infrastructure services. Seventy-one percent report their organizations use business applications such as CRM inc., Salesforce.com and webmail. This is followed by peer-to-peer applications (58 percent) and social media applications (50 percent). Fortysix percent use computing platforms such as solution stacks (Java, PHP and Python) and 45 percent use services such as identity management, payments and search. The most popular infrastructure service is storage (56 percent) followed by computing (43 percent). Few organizations take proactive steps to protect both their own sensitive business information and that of their customers, consumers and employees when they store that information with cloud computing vendors. In both cases, fewer than 1 in 10 respondents say their organizations use any kind of product vetting or employee training to determine that the cloud computing resources meet all appropriate security requirements before deploying cloud applications. Organizations are adopting cloud technologies without the usual vetting procedures. Despite security concerns and the expected growth in cloud computing, most organizations lack the procedures, policies and tools to ensure that sensitive data they put in the cloud remains secure. Only 27 percent of respondents say their organizations have procedures for approving cloud applications that use sensitive or confidential data. The main reason organizations permit cloud computing without vetting vendors for security risks is that they can t control end users, 76 percent of respondents say, followed by not enough resources to conduct an evaluation (50 percent), no one is in charge (44 percent) and not considered a priority (43 percent). Employees are making decisions without their IT departments insights or full knowledge of the security risks involved. Only 30 percent of respondents vet or evaluate cloud computing vendors prior to deploying their products and those people rely overwhelmingly 65 percent on word-of-mouth recommendations and market reputation in making their purchase decisions. The next-most common means were contractual agreements and assurances from the vendor (55 percent and 53 percent, respectively). Only 23 percent require proof of security compliance such as SAS 70, Page 2

3 18 percent rely on in-house security assessments and just 6 percent rely on third-party assessments by security experts or auditors. Our survey reveals a potential explanation for this ad hoc environment: In most organizations, large gaps exist between which people are most responsible for vetting or evaluating cloud computing vendors, and which people should be most responsible. End users (45 percent) and business managers (23 percent) currently carry the brunt of responsibility, while corporate IT (11 percent) and information security (9 percent) personnel are far less involved. Overall, respondents would prefer to see the latter positions take charge (35 percent for information security, 34 percent for corporate IT), so end users (9 percent) and business managers (11 percent) can focus elsewhere. Moreover, only 20 percent of organizations reported that members of their IT security teams are regularly involved in the decision-making process for allowing the use of cloud applications or platforms. More than half say they were rarely involved and nearly 1 in 4 say they never participated at all. Not surprisingly, 49 percent say they are not confident they know about all cloud computing applications, platforms and infrastructure services their organizations currently use. These results indicate that many organizations are flying blind with regards to securing these technologies, potentially putting their operations, organizational and customer information at risk. Other important findings include: Two years from now, most respondents plan to use cloud computing much more intensively than they do today. Eighty percent of respondents up from 50 percent today expect cloud computing to be very important and important to meeting their IT and data processing goals. The percentage of organizations using cloud computing to meet between 21 and 80 percent of their IT and data processing requirements is projected to triple, from 24 percent to 72 percent. Yet even as momentum for cloud computing builds, doubts about security difficulties of cloud computing persist. Fifty-one percent of respondents state they saw disadvantages to using cloud computing in their organizations: increased security risk (56 percent), loss of control over end users (40 percent) and increased risks of non-compliance and data breaches (33 and 31 percent, respectively). Two-thirds (66 percent) of respondents say cloud computing makes it more difficult to protect confidential or sensitive information. The most common difficulties are controlling or restricting end-user access (80 percent) and directly inspecting cloud computing vendors for security compliance (77 percent). Organizations most frequently protect themselves through traditional IT security solutions and legal or indemnification agreements with vendors. Legal or indemnification agreements with cloud computing vendors are the most common means to protect both sensitive business and customer data (32 percent for each kind of data). A point of potential concern is that most organizations (60 percent) use conventional security tools to protect information in the cloud, even though some of those tools data loss prevention (DLP) and some encryption technologies come to mind sometimes don t work in cloud environments. This indicates that many respondents don t understand the specific security risks and remedies cloud computing environments present. Page 3

4 II. Key Findings Following are the most salient findings of this survey research. Please note that most of the results are displayed in Figure format. The actual data utilized in each figure and referenced in the paper are also in the percentage frequency tables attached as the Appendix to this paper. 1. Business applications, solution stacks and storage are the most popular cloud computing applications, platforms and infrastructure services. Seventy-one percent report their organizations use business applications such as CRM Inc., Salesforce.com and Web mail. This is followed by peer-topeer applications (58 percent) and social media applications (50 percent). Forty-six percent use computing platforms such as solution stacks (Java, PHP and Python) and 45 percent use services such as identity management, payments and search. The most popular infrastructure service is storage (56 percent) followed by computing (43 percent). Accordingly, see Bar Charts 1a and 1b. Bar Chart 1a: Most popular cloud computing applications Bar Chart 1b: Most popular cloud computing platform or infrastructure services Respondents primary reasons for using cloud computing resources help explain these results. The overwhelmingly most popular reason is reducing costs (71 percent), followed by increasing efficiency (49 percent) and faster deployment time (43 percent). The least popular reasons are improving security (11 percent), increasing flexibility and choice (10 percent), improving customer service (9 percent) and complying with contractual agreements or policies (6 percent). Page 4

5 Bar Chart 2: Primary reasons for choosing cloud computing resources Analysis of these statistics reveals several interesting points. Respondents are concerned about security and don t use the cloud for mission-critical applications and information, while simultaneously viewing the benefits of cloud computing as so compelling that they re willing to accept the risks. For the cloud model to grow, cloud vendors must assure customers that operating in the cloud is secure. Another possible reason could be that individual business units can deploy cloud computing applications without coordinating with IT staff or buying and configuring their own equipment. All three factors can slow deployment of cloud computing technologies and thus cause a perceived competitive disadvantage. 2. Few organizations take proactive steps to protect both their own sensitive business information and that of their customers, consumers and employees when they store that information with cloud computing vendors. In both cases, the most popular action (32 percent) is legal or indemnification agreements with cloud computing vendors. Fewer than 1 in 10 respondents say their organizations uses any kind of product vetting or employee training to determine that cloud computing resources meet all appropriate security requirements before deploying cloud resources. See Bar Chart 3. Bar Chart 3: Steps taken to protect sensitive or confidential information These results suggest that organizations are relying mostly on bureaucratic and passive means to educate employees about cloud computing security policies, as the most popular responses don t require Page 5

6 active end-user participation. Only 16 percent offer any kind of employee training, while 43 percent just incorporate cloud computing security policies in their overall enterprise security policies and 23 percent offer internal awareness programs that include s to employees. Only 29 percent of respondents have policies that restrict or limit the use of certain cloud computing applications. This data suggests huge defects in how organizations communicate internally about securely using cloud computing. Pie Chart 1: Does your organization have a policy that restricts the use of certain cloud applications? Table 1: If yes, how is this policy communicated to end-users in the company? It is part of the enterprise security policy 43% Internal awareness including to employees 23% Don t know 18% Informal process 11% Formal in-house training 5% The survey results also suggest that organizations training programs may not sufficiently prepare employees to sufficiently protect sensitive or confidential information in the cloud. The largest number of respondents (42 percent) offer general data security training without specifically discussing cloud applications, followed by general data security training that does discuss cloud applications (19 percent). Only 5 percent 1 in 20 of organizations offer specialized training for each cloud application. Bar Chart 4: Methods for training employees about safeguarding sensitive or confidential information when using cloud applications and resources. 3. Organizations are adopting cloud technologies without the usual vetting procedures. Despite security concerns and the expected growth in cloud computing, most organizations lack the procedures, policies and tools to ensure that sensitive information they put in the cloud remains secure. Fifty-three percent of respondents say their organizations do not have vetting procedures for approving cloud applications that use sensitive or confidential data. The main reason organizations permit cloud computing without vetting vendors for security risk is that they can t control end users, 76 percent of Page 6

7 respondents say there are not enough resources to conduct an evaluation (50 percent), no one is in charge (44 percent) and is not considered a priority (43 percent). Pie Chart 2: Are cloud computing services evaluated for security prior to deployment or engagement? Table 2: If no, why does your organization permit cloud computing resources without vetting or evaluation for security? Not able to control end-users 76% Not enough resources to conduct evaluation 50% No one is in-charge 44% Not considered a priority 43% Don t know 18% When correlated with Key Finding 1, these results show why cloud computing applications readily available to end users through the Internet are much more popular than cloud computing platforms and infrastructure services, which require more coordination with organizations IT staffs. Some of the very qualities that make cloud computing attractive ease of use, end-user accessibility through the Internet, potential cost savings and productivity improvements can make it difficult to engage the IT staff necessary to keep sensitive and confidential information secure. So much of what IT security does is driven by engagement with IT staff but unfortunately in the case of cloud computing, both IT security and management staff are often out of the loop. 4. Employees are making decisions without their IT departments insights or full knowledge of the security risks involved. Only 30 percent of respondents vet or evaluate cloud computing vendors prior to deploying their products and those people rely overwhelmingly 65 percent on word-of-mouth recommendations and market reputation in making their purchase decisions. The next-most common means are contractual agreements and assurances from the vendor (55 percent and 53 percent, respectively). Only 23 percent require proof of security compliance such as SAS 70, 18 percent rely on inhouse security assessments and just 6 percent rely on third-party assessments by experts or auditors. Bar Chart 5: How does your organization go about vetting cloud vendors? Page 7

8 5. Our survey reveals a potential explanation for this ad hoc environment: In most organizations, large gaps exist between which people are most responsible for vetting or evaluating cloud computing vendors, and which people respondents thought should be most responsible. End users (45 percent) and business managers (23 percent) currently carry the brunt of responsibility, while corporate IT (11 percent) and information security (9 percent) personnel are far less involved. Overall, respondents would prefer to see the latter positions take charge (35 percent for information security, 34 percent for corporate IT), so end users (9 percent) and business managers (11 percent) can focus elsewhere. Bar Chart 6: Who is (and who should be) most responsible for vetting and evaluating cloud vendors? Despite a wider appreciation for the need for IT security, Findings 3, 4 and 5 (described above) show that security is not a primary job responsibility or concern for many people making cloud computing decisions. These employees often don t have a sophisticated-enough understanding of IT security risks and remedies, especially regarding new technologies such as cloud computing that emphasize key business imperatives such as ease of use and cost savings. This can contribute to a mindset that puts immediate business needs and technological benefits ahead of ensuring information is sufficiently secure. As we have mentioned, the use of cloud computing is relatively new and growing quickly. Consequently, organizations may have been caught off guard because they haven t updated their security procedures and policies to include cloud computing and its requirements. In addition, lines of business may be circumventing IT in their efforts to realize the benefits of cloud as soon as they can. These factors present a real challenge for IT. The use of cloud computing in business environments raises an important point about how to secure information in the cloud. As people adopt more dispersed systems, data becomes more fluid and protecting access to that data is critical. In this environment, the cloud is driving the trend that IT governance requires a combination of both business and IT management and leadership. 6. Moreover, only 20 percent of organizations reported that members of their IT security teams are regularly involved in the decision-making process for allowing the use of cloud applications or platforms. More than half say they are rarely involved and nearly 1 in 4 say they never participate. Not surprisingly, 49 percent say they are not confident they know about all cloud computing applications, platforms and infrastructure services their organizations currently use. These results indicate that many organizations are flying blind with regards to securing these technologies, potentially putting their business operations, intellectual property and customer information at risk. Page 8

9 Pie Chart 3: How confident are you that your IT organization knows all cloud computing resources used within your company today? Table 3: How involved are members of your security team in the decision-making process for allowing the use of cloud applications or platforms? Rarely 56% Never 24% Some of the time 12% Most of the time 5% Always 3% 7.Two years from now, most respondents plan to use cloud computing much more intensively than they do today. Eighty percent of respondents up from 50 percent today expect cloud computing to be very important and important to meeting their IT and data processing goals. The percentage of organizations using cloud computing to meet between 21 and 80 percent of their IT and data processing requirements is projected to triple, from 24 percent to 72 percent. Bar Chart 7: How important is the use of cloud computing for meeting IT objectives 8. Yet even as momentum for cloud computing builds, doubts about the security of cloud computing persist. Fifty-one percent of respondents state they saw disadvantages to using cloud computing in their organizations: increased security risk (56 percent), loss of control over end users (40 percent) and increased risks of non-compliance and data breaches (33 and 31 percent, respectively). Page 9

10 Pie Chart 3: In your opinion, are there any disadvantages to using cloud computing resources within your organization? Table 3: If yes, what are the main disadvantages? Increased security risk 56% Loss of control over end-users 40% Increased risk of non-compliance 33% Increased data privacy risk 31% Increased risk of business process conflicts or snafus 19% Increased complexity in meeting IT requirements 16% Two-thirds (66 percent) of respondents say cloud computing makes it more difficult to protect confidential or sensitive information. The most common difficulties are in controlling or restricting end-user access (80 percent) and directly inspecting cloud computing vendors for security compliance (77 percent). Pie Chart 3: In your opinion, are there any disadvantages to using cloud computing resources within your organization? Table 3: If yes, what are the main disadvantages? It is more difficult to control or restrict end-user access 80% It is more difficult to inspect cloud computing vendor for security compliance directly 77% It is more difficult to apply conventional information security in the cloud computing environment 31% Don t know 10% Taken together, these statistics indicate that not many cloud service providers are offering complianceready infrastructure. Vendors that facilitate security and regulatory compliance through their services and solutions, therefore, differentiate themselves in a competitive market. So what is considered too dangerous or risky to store in the public cloud ecosystem. According to respondents, the top three categories of confidential information considered too risky to be stored in the cloud include: financial business information (69 percent), health information (65 percent) and credit card information (53 percent). Page 10

11 Bar 8: Types of sensitive or confidential information considered too risky for public clouds 9. Organizations most frequently protect themselves through traditional IT security solutions and legal or indemnification agreements with vendors. Legal or indemnification agreements with cloud computing vendors were the most common means to protect both sensitive business and customer data (32 percent for each kind of data [see Bar Chart 3]). A point of potential concern is that most organizations (60 percent) use conventional security tools to protect information in the cloud, even though some of those tools don t work in cloud environments. These results suggest that many respondents don t understand the specific security risks and remedies cloud computing environments present. Bar 10: Types of sensitive or confidential information considered too risky for public clouds Cloud providers and their customers must be in sync about security but that level of maturity by and large hasn t developed yet. Such syncing is particularly challenging because most organizations don t have IT professionals involved in assessing cloud-related risks. Business managers and end-users put business considerations first and are often too busy to take advantage of cloud computing trends. As a result, they trust too much in standard business practices and not in evaluations based on IT security best practices. While legal protections are of course necessary, they don t always effectively address issues specific to IT security, which can leave organizations at risk. Page 11

12 III. Implications for Public Sector & Financial Services Organizations This study underscores pervasive concerns many public sector organizations have about keeping data especially personal and/or sensitive data under control and secure in cloud computing environments. Implications for the public sector include the following: The primary reasons organizations use cloud computing tie directly into public sector priorities. These are reducing taxpayer costs and delivering better services faster to constituencies. Increased focus on security is crucial for cloud vendors to persuade public sector organizations that cloud computing can help accomplish those organizations missions (Key Finding 1). Developing an effective combination of business and IT management and leadership that cloud computing demands is especially important for public sector organizations given the specific business, security and regulatory challenges the public sector faces compared to other industry sectors (Key Finding 5). Public sector organizations are especially interested in cloud vendors offering compliance-ready infrastructure because that infrastructure can help them meet security and regulatory requirements more quickly and effectively. This can lead to faster and better mission success and help avoid costly data breaches (Key Finding 8). Financial services organizations face similar issues: Developing an effective combination of business and IT management and leadership that cloud computing demands is especially important for financial services organizations given the specific business, security and regulatory challenges they face compared to other industry sectors (Key Finding 5). Financial services organizations are especially interested in cloud vendors offering compliance-ready infrastructure because that infrastructure can help them meet security and regulatory requirements more quickly and effectively. This can lead to faster and better service delivery, improved performance and avoidance of costly data breaches (Key Finding 8). Financial services organizations that rely on legal or indemnification agreements for protection need to ensure those agreements contain sufficient data security and access provisions to meet regulatory requirements (Key Finding 9). Page 12

13 IV: Methods A sampling frame of nearly 14,000 adult-aged individuals who reside within the United States was used to recruit and select participants to this survey. Our randomly selected sampling frame was built from several proprietary lists of experienced IT and IT security practitioners. Table 4: Sample response statistics Freq. Sampling frame 13, % Total invitations 12, % Bounce back 1, % Returns % Rejections % Final sample % After screen % After screen % In total, 918 respondents completed the survey. Of the returned instruments, 109 surveys failed reliability checks. A total of 809 surveys were used as our final sample, which represents a 5.8 percent response rate. Two screening questions were used to ensure respondents had relevant knowledge and experience, resulting in a reduced sample size of 637 individuals. Ninety percent of respondents completed all survey items within 15 minutes. 1 The average overall experience level of respondents is years, and the years of experience in their present job is 4.5 years. Pie Chart 4 reports the primary industry sector of respondents organizations. As shown, the largest segments include financial services, government, industrial companies, pharmaceuticals and healthcare (combined), and services. Pie Chart 4: Industry distribution of respondents organizations 1 Please note that nominal compensation was provided to respondents who successfully completed the survey instrument. Page 13

14 Table 5 reports the respondent organization s global headcount. As shown, a majority of respondents work within companies with more than 1,000 employees. Over 38 percent of respondents are located in larger-sized companies with more than 10,000 employees. Table 5: The worldwide headcount of respondents organizations Less than 500 people 4% 500 to 1,000 people 11% 1,001 to 5,000 people 21% 5,001 to 10,000 people 26% 10,001 to 25,000 people 25% 25,001 to 75,000 people 8% More than 75,000 people 5% Table 6 reports the respondent s primary reporting channel. As can be seen, 52 percent of respondents are located in the organization s IT department (led by the company s CIO). Eighteen percent report to the company s security officer (or CISO). Table 6: Respondent s primary reporting channel CEO/Executive Committee 1% Chief Financial Officer 4% Chief Information Officer 52% Chief Information Security Officer 18% Compliance Officer 5% Chief Privacy Officer 0% Director of Internal Audit 1% General Counsel 0% Chief Technology Officer 7% Human Resources Leader 0% Chief Security Officer 4% Chief Risk Officer 6% Other 3% Table 7 reports the respondent organization s global footprint. As can be seen, a large number of participating organizations are multinational companies that operate outside the United States. Table 7: Location of the respondent Northeast 20% Mid-Atlantic 18% Midwest 18% Southeast 13% Southwest 12% Pacific 19% Page 14

15 V. Caveats to this study There are inherent limitations to survey research that need to be carefully considered before drawing inferences from findings. The following items are specific limitations that are germane to most web-based surveys. Non-response bias: The current findings are based on a sample of survey returns. We sent surveys to a representative sample of individuals, resulting in a large number of usable returned responses. Despite non-response tests, it is always possible that individuals who did not participate are substantially different in terms of underlying beliefs from those who completed the instrument. Sampling-frame bias: The accuracy is based on contact information and the degree to which the list is representative of individuals who are IT or IT security practitioners. We also acknowledge that the results may be biased by external events such as media coverage. We also acknowledge bias caused by compensating subjects to complete this research within a holdout period. Finally, because we used a web-based collection method, it is possible that non-web responses by mailed survey or telephone call would result in a different pattern of findings. 0BSelf-reported results: The quality of survey research is based on the integrity of confidential responses received from subjects. While certain checks and balances can be incorporated into the survey process, there is always the possibility that a subject did not provide a truthful response. Page 15

16 VI: Recommendations We recommend that organizations immediately assess what specific, proactive steps they should take to protect sensitive information stored in the cloud. Other recommendations to implement immediately include the following: Organizations should ensure that policies and procedures clearly state the importance of protecting sensitive information stored in the cloud. The policy should outline what information is considered sensitive and proprietary. Organizations should vet and evaluate the security posture of third parties before sharing confidential or sensitive information. As part of the process, corporate IT and/or IT security experts should conduct a thorough review and audit of the vendor s security qualifications. Prior to deploying cloud technology, organizations should formally train employees how to mitigate the security risks specific to the new technology to make sure sensitive and confidential information is not threatened. Organizations should establish an organizational structure that allows the CIO, CISO or other security/privacy leaders to participate actively in the vetting, purchasing and implementing processes to ensure they are handled appropriately. Larger organizations should establish a function dedicated to information governance oversight. Organizations should expand their governance activities beyond traditional IT areas to better protect their business. Organizations should define policy around information and applications they are willing to put in the cloud. Cloud computing vendors should provide more transparency into their security infrastructure to help ensure customer confidence that information stored in the cloud is secure. These recommendations should be incorporated into all procedures involving employees using cloud computing resources. Doing so will address numerous significant risks facing organizations as cloud computing technologies become more pervasive. If you have questions or comments about this research report or you would like to obtain additional copies of the document (including permission to quote from or reuse this report), please contact us by letter, phone call or Ponemon Institute LLC Attn: Research Department 2308 US 31 North Traverse City, Michigan USA Hresearch@ponemon.org Page 16

17 Detailed Survey Results Audited results presented by Dr. Larry Ponemon, completed March 2009 The following tables provide the frequency and percentage frequency of responses to all survey questions. This webbased survey was conducted by Ponemon Institute with subject debriefing completed on March 2, The final sample size involves 809 respondents (637 after screening). Sample response statistics Freq. Sampling frame % Total invitations % Bounce back % Returns % Rejections % Final sample % I. Screening Q1. Does your organization use cloud computing resources? Freq, Remainder Yes No (stop) 54 0 Total Q2. What percent of your organization s total use of cloud computing resources involves public versus private clouds? Freq, Remainder All or mostly public cloud About equal public and private cloud All or mostly private cloud (stop) Total II. Attributions about information governance. Please use the scale provided below each statement to express your opinions about information governance within your organization. Strongly agree Agree Q3a. My organization is committed to protecting confidential or sensitive information. 19% 32% Q3b. My organization has established clearly defined accountability for safeguarding of confidential or sensitive information. 16% 26% Q3c. My organization educates employees to understand their responsibilities in safeguarding sensitive or confidential information. 16% 24% Q3d. My organization is careful about sharing confidential or sensitive information with third parties such as business partners, contractors, and vendors. 16% 32% Q3e. My organization respects the privacy rights of customers, consumers and employees. 12% 27% Q3f. My organization is proactive in managing compliance with privacy and data protection requirements around the globe. 8% 23% Page 17

18 III. Background on cloud computing Q4.What cloud computing applications does your organization presently use? Please select all that apply. Total% We don t use cloud computing applications 14% Peer-to-peer (such as Skype) 58% Social media applications (such as Facebook, YouTube, Twitter, etc.) 50% Business applications (such as CRM inc, SalesForce.com, webmail, HR, GoogleDocs, etc.) 79% Infrastructure applications (online backup, security, archiving, etc.) 23% Other 5% Total 229% Q5. What cloud computing platforms does your organization presently use? Please select all that apply. Total% We don t use cloud computing platforms 39% Services (such as identity management, payments, search and others) 45% Solution stacks (such as Java, PHP, Python, ColdFusion and others) 46% Other 11% Total 141% Q6. What cloud computing infrastructure services does your organization presently use? Please select all that apply. Total% We don t use infrastructure services 38% Computing 43% Network 14% Storage 56% Other 10% Total 161% Q7. Approximately, what percent of your organization s total IT and data processing requirements are met by using cloud computing resources today? Extrapolated Percent Less than 5% 15% 1% Between 5 to 10% 12% 1% Between 11 to 20% 29% 4% Between 21 to 30% 9% 2% Between 31 to 40% 6% 2% Between 40 to 50% 5% 2% Between 51 to 60% 3% 2% Between 61 to 70% 1% 1% Between 71 to 80% 0% 0% Between 81 to 90% 0% 0% More than 90% 3% 3% Don t know 17% 0% 18% Page 18

19 Q8. In your opinion (best guess), what percent of your organization s total IT and data processing requirements will be met by using cloud computing resources two years from today? Extrapolated Percent Less than 5% 4% 0% Between 5 to 10% 3% 0% Between 11 to 20% 6% 1% Between 21 to 30% 11% 3% Between 31 to 40% 17% 6% Between 40 to 50% 13% 6% Between 51 to 60% 12% 7% Between 61 to 70% 11% 7% Between 71 to 80% 8% 6% Between 81 to 90% 0% 0% More than 90% 5% 5% Don t know 10% 0% 40% Q9. How important is the use of cloud computing applications or platform solutions for meeting your organization s IT and data processing objectives? Today Next two years Very important 18% 34% Important 32% 46% Not important 31% 18% Irrelevant 19% 2% 100% Q10. What are the primary reasons why cloud computing resources are used within your organization? Please select only two choices. Total% Reduce cost 71% Increase efficiency 49% Improve security 11% Faster deployment time 43% Increase flexibility and choice 10% Improve customer service 9% Comply with contractual agreements or policies 6% Other 0% Total 199% Q11. How confident are you that your IT organization knows all cloud computing applications, platform or infrastructure services in use today? Very confident 19% Confident 32% Not confident 49% Page 19

20 Q12a. Are cloud computing services evaluated for security prior to engagement or deployment by your end-users in you organization? Yes 30% No 53% Don t know 17% Q12b. If yes, who is responsible for vetting or evaluating cloud computing vendors in your organization? Who is most responsible Who should be most responsible End-users 45% 9% Business unit managers 23% 11% Corporate IT 11% 34% Compliance 3% 6% Legal 1% 0% Procurement 3% 2% Internal audit 1% 0% Information security 9% 35% Physical security 0% 0% Other 2% 0% No one person (shared responsibility) 2% 3% 100% Q12c. If yes, how does your organization go about vetting or evaluating cloud computing vendors? Please select all that apply. Total% Word-of-mouth (market reputation) 65% Contractual negotiation and legal review 26% Proof of security compliance (such as SAS 70) 23% Self-assessment checklist or questionnaire completed by vendor 25% Assessment by in-house security team 18% Third-party assessment by security expert or auditor 6% Other 6% Total 169% Q12d. If no, why does your organization permit cloud computing resources to be deployed without vetting or evaluation for security risks? Please select all that apply. Total% No one is in-charge 44% Not considered a priority 43% Not enough resources to conduct evaluation 50% Not able to control end-users 76% Other 5% Don t know 18% Total 236% Page 20

21 Q13a. In your opinion, are there any disadvantages to using cloud computing resources within your organization? Yes 51% No 26% Don t know 23% Q13b. If yes, what are the main disadvantages? Please select only two choices. Total% Increased security risk 56% Increased data privacy risk 31% Loss of control over end-users 40% Increased risk of non-compliance 33% Increased complexity in meeting IT requirements 16% Increased risk of business process conflicts or snafus 19% Other 0% Total 195% IV. Information governance in the cloud Q14. How does your organization go about protecting confidential or sensitive information in the cloud? Please select only two choices. Total% We rely on assurances from the cloud computing vendor 53% We rely on contractual agreements with the cloud computing vendor 55% We buy additional security services provided by the cloud computing vendor 11% We use conventional security tools to protect information in the cloud 60% Don t know 16% Other 2% Total 197% Q15a. Does cloud computing make it more difficult to protect confidential or sensitive information? Yes 66% No 23% Don t know 11% Q15b. If yes, why does it make it more difficult to protect confidential or sensitive information in the cloud? Please select only two choices. Total% It is more difficult to inspect cloud computing vendor for security compliance directly 77% It is more difficult to apply conventional information security in the cloud computing environment 31% It is more difficult to control or restrict end-user access 80% Don t know 10% Other 0% Total 198% Page 21

22 Q15c. What types of confidential or sensitive information does your organization consider too risky to be stored in the cloud? Please select all that apply. Total% Consumer data 12% Customer information 20% Credit card information 53% Employee records 38% Health information 65% Non-financial confidential business information 19% Financial business information 69% Intellectual property such as source code, design plans, architectural renderings 22% Research data 29% Other 9% Total 336% Q16. How does your organization determine that all appropriate security requirements are met before deploying cloud computing resources? Self-assessment completed by the vendor 8% Vetting and evaluation by in-house security team 5% Vetting and evaluation by outside security expert or auditor 2% Legal or indemnification agreement with cloud computing vendor 21% Training of end-users before deploying cloud applications 6% Other 3% None of the above 55% Q17. How does your organization educate employees about safeguarding sensitive or confidential information when using cloud applications? Specialized training for each cloud application 5% General data security training includes discussion of cloud applications 19% General data security training without specific discussion about cloud applications 42% Informal awareness effort 24% Other 0% None of the above 10% Q18a. Does your organization have a policy that restricts or limits the use of certain cloud computing applications? Yes 29% No 49% Don t know 22% Page 22

23 Q18b. If yes, how is this policy communicated to end-users? Internal awareness including to employees 23% It is part of the enterprise security policy 43% Formal in-house training 5% Informal process 11% Don t know 18% Other 0% Q19. In your opinion, how does the use of cloud computing applications affect the individual employee s responsibility to safeguard sensitive or confidential information stored in the cloud? Cloud computing increases employee (end-user) responsibility. 62% Cloud computing decreases employee (end-user) responsibility. 4% Cloud computing does not affect employee (end-user) responsibility. 34% Q20. How does your organization ensure safe sharing of confidential or sensitive information with cloud computing vendors? Informal self-assessment to review security requirements 8% Vetting and evaluation by in-house security team 6% Vetting and evaluation by outside expert or auditor 2% Legal or indemnification agreement with cloud computing vendor 32% Training of end-users before deploying cloud applications 6% Other 3% None of the above 43% Q21. How does your organization go about ensuring the privacy rights of customers, consumers and employees when this personal information is stored in the cloud? Informal self-assessment to review privacy requirements 8% Vetting and evaluation by in-house privacy compliance expert 5% Vetting and evaluation by outside privacy expert or auditor 0% Legal or indemnification agreement with cloud computing vendor 32% Training of end-users before deploying cloud applications 6% Other 5% None of the above 44% Q22. What privacy and data protection regulatory requirements are most difficult to meet in the cloud computing environment? Please select no more than three choices. Total% Various US state data breach laws 48% Health Insurance Portability and Accountability Act (HIPAA) 45% EU Data Protection Directive 43% Sarbanes-Oxley 40% Safe Harbor (US and EU agreement) 39% Various country-specific privacy laws 35% Page 23

24 Gramm-Leach-Bliley 12% Various FTC requirements including the Red Flags Rule 10% Fair and Accurate Credit Transaction Act (FACTA) 9% Fair Credit Reporting Act (FCRA) 7% US Federal Privacy Act 5% Children s Online Privacy Protection Act (COPPA) 2% Total 295% Q23. Does the organization have procedures on how to decide if cloud applications using sensitive or confidential information should be allowed? Yes 27% No 51% Don t know 22% Q24. Are members of your security team involved in the decisionmaking process about allowing the use of certain cloud applications or platforms? Always 3% Most of the time 5% Some of the time 12% Rarely 56% Never 24% V. Attributions about cloud computing. Please use the scale provided below each statement to express your opinions about information governance within your organization. Strongly agree Agree Q25a. My organization assesses the affect cloud computing applications may have on the classification of data according to risk. 9% 12% Q25b. My organization determines what data is too sensitive for cloud computing applications. 8% 16% Q25c. My organization is vigilant in conducting audits or assessments of data used by cloud computing applications. 6% 9% Q25d. My organization is proactive in assessing the types of data to be allowed in the cloud. 6% 17% Q25e. My organization s IT infrastructure has the ability to ensure substantial security of information in the cloud. 11% 12% VI. Organization characteristics and respondent demographics D1. Your current title is (approximate only) Director IT security 20% Manager, network security 18% Chief information security officer (CISO or approximate) 15% IT compliance & security 14% Quality assurance 12% All others 22% Page 24

25 D2. What organizational level best describes your current position? Senior Executive 0% Vice President 2% Director 20% Manager 26% Supervisor 15% Staff or technician 34% Other 3% D3. Check the Primary Person you or your supervisor reports to within your organization. CEO/Executive Committee 1% Chief Financial Officer 4% Chief Information Officer 52% Chief Information Security Officer 18% Compliance Officer 5% Chief Privacy Officer 0% Director of Internal Audit 1% General Counsel 0% Chief Technology Officer 7% Human Resources Leader 0% Chief Security Officer 4% Chief Risk Officer 6% Other 3% D4. Location Northeast 20% Mid-Atlantic 18% Midwest 18% Southeast 13% Southwest 12% Pacific 19% D5. Experience Mean Median D5a. Total years in business D5b. Total years in IT security D5c. Total years in current position Page 25

26 D6. Educational and career background: Compliance (auditing, accountant, legal) 9% IT (systems, software, computer science) 42% Security (law enforcement, military, intelligence) 29% Other non-technical field 13% Other technical field 7% D7. What industry best describes your organization s industry concentration or focus? Airlines 1% Automotive 1% Agriculture 0% Brokerage 2% Cable 1% Chemicals 1% Credit Cards 2% Defense 2% Education 3% Entertainment & Media 3% Services 4% Health Care 6% Hospitality & Leisure 5% Manufacturing 7% Insurance 3% Internet & ISPs 2% Government 11% Pharmaceutical 5% Professional Services 4% Research 2% Retail 7% Banking 11% Energy 3% Telecommunications 3% Technology & Software 6% Transportation 4% Wireless 1% D8. What best describes your role in managing data protection and security risk in your organization? Check all that apply. Setting priorities 69% Managing budgets 68% Selecting vendors and contractors 63% Determining privacy and data protection strategy 58% Evaluating program performance 60% Page 26

27 D9. What is the worldwide headcount of your organization? Less than 500 people 4% 500 to 1,000 people 11% 1,001 to 5,000 people 21% 5,001 to 10,000 people 26% 10,001 to 25,000 people 25% 25,001 to 75,000 people 8% More than 75,000 people 5% Ponemon Institute Advancing Responsible Information Management Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations. As a member of the Council of American Survey Research Organizations (CASRO), we uphold strict data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or organization identifiable information in our business research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions. Page 27

The Cost of Denial-of-Services Attacks

The Cost of Denial-of-Services Attacks The Cost of Denial-of-Services Attacks Sponsored by Akamai Technologies Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute Research Report The Cost of Denial-of-Service

More information

Reducing Cybersecurity Costs & Risk through Automation Technologies

Reducing Cybersecurity Costs & Risk through Automation Technologies Reducing Cybersecurity Costs & Risk through Automation Technologies Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: November 2017 Ponemon Institute Research

More information

Uncovering the Risk of SAP Cyber Breaches

Uncovering the Risk of SAP Cyber Breaches Uncovering the Risk of SAP Cyber Breaches Research sponsored by Onapsis Independently Conducted by Ponemon Institute LLC February 2016 1 Part 1. Introduction Uncovering the Risks of SAP Cyber Breaches

More information

National Survey on Data Center Outages

National Survey on Data Center Outages National Survey on Data Center Outages Independently conducted by Ponemon Institute LLC Publication Date: 30 September 2010 National Survey on Data Center Outages Ponemon Institute, 30 September 2010 Part

More information

Future State of IT Security A Survey of IT Security Executives

Future State of IT Security A Survey of IT Security Executives Future State of IT Security A Survey of IT Security Executives In Partnership with RSA Conference Independently conducted by Ponemon Institute LLC Publication Date: February 2012 Ponemon Institute Research

More information

Big Data Cybersecurity Analytics Research Report Sponsored by Cloudera

Big Data Cybersecurity Analytics Research Report Sponsored by Cloudera Big Data Cybersecurity Analytics Research Report! Sponsored by Cloudera Independently conducted by Ponemon Institute LLC Publication Date: August 2016 Ponemon Institute Research Report Part 1. Introduction

More information

2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB)

2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB) 2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB) Sponsored by Keeper Security Independently conducted by Ponemon Institute LLC Publication Date: June 2016 Ponemon Institute Research

More information

Sponsored by Raytheon. Don t Wait: The Evolution of Proactive Threat Hunting Executive Summary

Sponsored by Raytheon. Don t Wait: The Evolution of Proactive Threat Hunting Executive Summary Don t Wait: The Evolution of Proactive Threat Hunting Executive Summary Sponsored by Raytheon Independently conducted by Ponemon Institute LLC Publication Date: June 2016 Connect with us: #DontWaitHunt

More information

The Third Annual Study on the Cyber Resilient Organization

The Third Annual Study on the Cyber Resilient Organization The Third Annual Study on the Cyber Resilient Organization Global Independently conducted by the Ponemon Institute Sponsored by IBM Resilient Publication Date: March 2018 Ponemon Institute Research Report

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

Information Security Risk Strategies. By

Information Security Risk Strategies. By Information Security Risk Strategies By Larry.Boettger@Berbee.com Meeting Agenda Challenges Faced By IT Importance of ISO-17799 & NIST The Security Pyramid Benefits of Identifying Risks Dealing or Not

More information

01.0 Policy Responsibilities and Oversight

01.0 Policy Responsibilities and Oversight Number 1.0 Policy Owner Information Security and Technology Policy Policy Responsibility & Oversight Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 1. Policy Responsibilities

More information

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,

More information

The State of Cybersecurity in Healthcare Organizations in 2016

The State of Cybersecurity in Healthcare Organizations in 2016 THE STATE OF CYBERSECURITY IN HEALTHCARE ORGANIZATIONS IN 2016 The State of Cybersecurity in Healthcare Organizations in 2016 Independently conducted by Ponemon Institute LLC Sponsored by ESET Publication

More information

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015 Cloud Computing Standard Effective Date: July 28, 2015 1.1 INTRODUCTION Cloud computing services are application and infrastructure resources that users access via the Internet. These services, contractually

More information

Data Protection Risks & Regulations in the Global Economy

Data Protection Risks & Regulations in the Global Economy Data Protection Risks & Regulations in the Global Economy Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: June 2017 Ponemon Institute Research

More information

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance The RSA Solution for Cloud Security and Compliance The RSA Solution for Cloud Security and Compliance enables enduser organizations and service providers to orchestrate and visualize the security of their

More information

Cybersecurity in Higher Ed

Cybersecurity in Higher Ed Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,

More information

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf

More information

SOC for cybersecurity

SOC for cybersecurity April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory

More information

Development of your Company s Record Information System and Disaster Preparedness. The National Emergency Management Summit

Development of your Company s Record Information System and Disaster Preparedness. The National Emergency Management Summit Development of your Company s Record Information System and Disaster Preparedness The National Emergency Management Summit Thomas D. Anthony Frost Brown Todd LLC Attorneys at Law 201 E. Fifth Street Cincinnati,

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

NYDFS Cybersecurity Regulations

NYDFS Cybersecurity Regulations SPEAKERS NYDFS Cybersecurity Regulations Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 lsotto@hunton.com www.huntonprivacyblog.com March 9, 2017 The Privacy Team at Hunton & Williams Over 30 privacy

More information

The Cyber Resilient Organisation in the United Kingdom: Learning to Thrive against Threats

The Cyber Resilient Organisation in the United Kingdom: Learning to Thrive against Threats The Cyber Resilient Organisation in the United Kingdom: Learning to Thrive against Threats Independently conducted by Ponemon Institute LLC Sponsored by Resilient Systems Publication Date: January 2016

More information

Workday s Robust Privacy Program

Workday s Robust Privacy Program Workday s Robust Privacy Program Workday s Robust Privacy Program Introduction Workday is a leading provider of enterprise cloud applications for human resources and finance. Founded in 2005 by Dave Duffield

More information

IT Monitoring Tool Gaps are Impacting the Business A survey of IT Professionals and Executives

IT Monitoring Tool Gaps are Impacting the Business A survey of IT Professionals and Executives IT Monitoring Tool Gaps are Impacting the Business A survey of IT Professionals and Executives June 2018 1 Executive Summary This research finds that large enterprise customers and employees endure a substantial

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

Why you MUST protect your customer data

Why you MUST protect your customer data Why you MUST protect your customer data If you think you re exempt from compliance with customer data security and privacy laws because you re a small business, think again. Businesses of all sizes are

More information

Protecting your data. EY s approach to data privacy and information security

Protecting your data. EY s approach to data privacy and information security Protecting your data EY s approach to data privacy and information security Digital networks are a key enabler in the globalization of business. They dramatically enhance our ability to communicate, share

More information

DeMystifying Data Breaches and Information Security Compliance

DeMystifying Data Breaches and Information Security Compliance May 22-25, 2016 Los Angeles Convention Center Los Angeles, California DeMystifying Data Breaches and Information Security Compliance Presented by James Harrison OM32 5/25/2016 3:00 PM - 4:15 PM The handouts

More information

Weighing in on the Benefits of a SAS 70 Audit for Third Party Administrators

Weighing in on the Benefits of a SAS 70 Audit for Third Party Administrators Weighing in on the Benefits of a SAS 70 Audit for Third Party Administrators With increasing oversight and growing demands for industry regulations, third party assurance has never been under a keener

More information

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld Balancing Compliance and Operational Security Demands Nov 2015 Steve Winterfeld What is more important? Compliance with laws / regulations Following industry best practices Developing a operational practice

More information

Build confidence in the cloud Best practice frameworks for cloud security

Build confidence in the cloud Best practice frameworks for cloud security Build confidence in the cloud Best practice frameworks for cloud security Cloud services are rapidly growing and becoming more of a focus for business. It s predicted that more than $1 trillion in IT spending

More information

A Global Look at IT Audit Best Practices

A Global Look at IT Audit Best Practices A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory

More information

Data Security: Public Contracts and the Cloud

Data Security: Public Contracts and the Cloud Data Security: Public Contracts and the Cloud July 27, 2012 ABA Public Contract Law Section, State and Local Division Ieuan Mahony Holland & Knight ieuan.mahony@hklaw.com Roadmap Why is security a concern?

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE 2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE February 2014 Sponsored by: 2014 Network Security & Cyber Risk Management:

More information

MNsure Privacy Program Strategic Plan FY

MNsure Privacy Program Strategic Plan FY MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term

More information

SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions

SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions DISCLAIMER: The contents of this publication do not necessarily reflect the position or opinion of the American

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 With the industrialization of hacking and the enormous impact of security breaches,

More information

2017 RIMS CYBER SURVEY

2017 RIMS CYBER SURVEY 2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the

More information

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose:

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose: STAFF REPORT January 26, 2001 To: From: Subject: Audit Committee City Auditor Information Security Framework Purpose: To review the adequacy of the Information Security Framework governing the security

More information

State of Cloud Survey GERMANY FINDINGS

State of Cloud Survey GERMANY FINDINGS 2011 State of Cloud Survey GERMANY FINDINGS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Cloud security is top goal and top concern.................................. 8 Finding 2: IT staff

More information

Big Data Analytics in Cyber Defense

Big Data Analytics in Cyber Defense Big Data Analytics in Cyber Defense Sponsored by Teradata Independently conducted by Ponemon Institute LLC Publication Date: February 2013 Ponemon Institute Research Report Big Data Analytics in Cyber

More information

SQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY

SQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY SQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY THE INTERSECTION OF COMPLIANCE AND DIGITAL DATA Organizations of all sizes and shapes must comply with government and industry regulations.

More information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.

More information

Avanade s Approach to Client Data Protection

Avanade s Approach to Client Data Protection White Paper Avanade s Approach to Client Data Protection White Paper The Threat Landscape Businesses today face many risks and emerging threats to their IT systems and data. To achieve sustainable success

More information

A company built on security

A company built on security Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for

More information

GLOBAL ENCRYPTION TRENDS STUDY

GLOBAL ENCRYPTION TRENDS STUDY GLOBAL ENCRYPTION TRENDS STUDY April 2017 EXECUTIVE SUMMARY EXECUTIVE SUMMARY Ponemon Institute is pleased to present the findings of the 2017 Global Encryption Trends Study, sponsored by Thales e-security.

More information

Data Management and Security in the GDPR Era

Data Management and Security in the GDPR Era Data Management and Security in the GDPR Era Franck Hourdin; Vice President, EMEA Security Russ Lowenthal; Director, Database Security Product Management Mike Turner; Chief Operating Officer, Capgemini

More information

Security Survey Executive Summary October 2008

Security Survey Executive Summary October 2008 A government technology Executive Survey Summary: HP Security Survey Executive Summary October 2008 Produced by: In Partnership With: Introduction Information is paramount to the survival of government

More information

The HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information

The HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information The HITRUST CSF A Revolutionary Way to Protect Electronic Health Information June 2015 The HITRUST CSF 2 Organizations in the healthcare industry are under immense pressure to improve quality, reduce complexity,

More information

Third Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way

Third Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way Third Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way Sponsored by Infoblox Independently conducted by Ponemon Institute LLC Publication Date: January 2018 Ponemon Institute

More information

The Impact of Cybersecurity, Data Privacy and Social Media

The Impact of Cybersecurity, Data Privacy and Social Media Doing Business in a Connected World The Impact of Cybersecurity, Data Privacy and Social Media Security Incident tprevention and Response: Customizing i a Formula for Results Joseph hm. Ah Asher Marcus

More information

A SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS

A SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS A SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS Introduction If you re a growing service organization, whether a technology provider, financial services corporation, healthcare company, or professional

More information

CONSIDERATIONS BEFORE MOVING TO THE CLOUD

CONSIDERATIONS BEFORE MOVING TO THE CLOUD CONSIDERATIONS BEFORE MOVING TO THE CLOUD What Management Needs to Know Part I By Debbie C. Sasso Principal When talking technology today, it s very rare that the word Cloud doesn t come up. The benefits

More information

Cyber Risks in the Boardroom Conference

Cyber Risks in the Boardroom Conference Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks

More information

It s still very important that you take some steps to help keep up security when you re online:

It s still very important that you take some steps to help keep up security when you re online: PRIVACY & SECURITY The protection and privacy of your personal information is a priority to us. Privacy & Security The protection and privacy of your personal information is a priority to us. This means

More information

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative

More information

Protecting Your Business: Best Practices for Implementing a Legally Compliant Cybersecurity Program Trivalent Solutions Expo June 19, 2014

Protecting Your Business: Best Practices for Implementing a Legally Compliant Cybersecurity Program Trivalent Solutions Expo June 19, 2014 Protecting Your Business: Best Practices for Implementing a Legally Compliant Cybersecurity Program Trivalent Solutions Expo June 19, 2014 2014, Mika Meyers Beckett & Jones PLC All Rights Reserved Presented

More information

COBIT 5 With COSO 2013

COBIT 5 With COSO 2013 Integrating COBIT 5 With COSO 2013 Stephen Head Senior Manager, IT Risk Advisory Services 1 Our Time This Evening Importance of Governance COBIT 5 Overview COSO Overview Mapping These Frameworks Stakeholder

More information

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities

More information

2017 State of Cybersecurity in Small & Medium-Sized Businesses (SMB)

2017 State of Cybersecurity in Small & Medium-Sized Businesses (SMB) 2017 State of Cybersecurity in Small & Medium-Sized Businesses (SMB) Sponsored by Keeper Security Independently conducted by Ponemon Institute LLC Publication Date: September 2017 Ponemon Institute Research

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

2017 PKI GLOBAL TRENDS STUDY

2017 PKI GLOBAL TRENDS STUDY 2017 PKI GLOBAL TRENDS STUDY October 2017 1 2017 PKI GLOBAL TRENDS STUDY TABLE OF CONTENTS PART 1. EXECUTIVE SUMMARY 3 PART 2. KEY FINDINGS 5 Trends in PKI maturity 7 PART 3. METHODS 20 PART 4. LIMITATIONS

More information

Chris Apgar, CISSP President, Apgar & Associates, LLC December 12, 2007

Chris Apgar, CISSP President, Apgar & Associates, LLC December 12, 2007 Chris Apgar, CISSP President, Apgar & Associates, LLC December 12, 2007 Balancing business & security Security & privacy not all technology Placement of privacy & security - Organizational oversight Importance

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Clarity on Cyber Security. Media conference 29 May 2018

Clarity on Cyber Security. Media conference 29 May 2018 Clarity on Cyber Security Media conference 29 May 2018 Why this study? 2 Methodology Methodology of the study Online survey consisting of 33 questions 60 participants from C-Level (CISOs, CIOs, CTOs) 26

More information

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) June 2017 INSERT YEAR HERE Contact Information: Jeremy Dalpiaz AVP, Cyber and Data Security Policy Jeremy.Dalpiaz@icba.org ICBA Summary

More information

2012 Consumer Study on Data Breach Notification. Sponsored by Experian Data Breach Resolution

2012 Consumer Study on Data Breach Notification. Sponsored by Experian Data Breach Resolution 2012 Consumer Study on Data Breach Notification Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: June 2012 Ponemon Institute Research Report

More information

Cyber Security. June 2015

Cyber Security. June 2015 Cyber Security June 2015 Table of contents Section Pages Introduction and methodology 3 Key findings 4 Respondent profile 5-9 Cyber security practices 10-25 Resources for monitoring cyber security events

More information

Enhancing Security With SQL Server How to balance the risks and rewards of using big data

Enhancing Security With SQL Server How to balance the risks and rewards of using big data Enhancing Security With SQL Server 2016 How to balance the risks and rewards of using big data Data s security demands and business opportunities With big data comes both great reward and risk. Every company

More information

ACHIEVING FIFTH GENERATION CYBER SECURITY

ACHIEVING FIFTH GENERATION CYBER SECURITY ACHIEVING FIFTH GENERATION CYBER SECURITY A Survey Research Report of IT and Security Professionals MARCH 2018 INTRODUCTION The pursuit of the highest level of cyber security is a top priority for IT and

More information

Introduction to AWS GoldBase

Introduction to AWS GoldBase Introduction to AWS GoldBase A Solution to Automate Security, Compliance, and Governance in AWS October 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document

More information

Combating Cyber Risk in the Supply Chain

Combating Cyber Risk in the Supply Chain SESSION ID: CIN-W10 Combating Cyber Risk in the Supply Chain Ashok Sankar Senior Director Cyber Strategy Raytheon Websense @ashoksankar Introduction The velocity of data breaches is accelerating at an

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

Outbound and Data Loss Prevention in Today s Enterprise

Outbound  and Data Loss Prevention in Today s Enterprise Outbound Email and Data Loss Prevention in Today s Enterprise Results from Proofpoint s seventh annual survey on outbound messaging and content security issues, fielded by Osterman Research during June

More information

Tripwire State of Container Security Report

Tripwire State of Container Security Report RESEARCH Tripwire State of Container Security Report January 2019 FOUNDATIONAL CONTROLS FOR SECURITY, COMPLIANCE & IT OPERATIONS As DevOps continues to drive increased use of containers, security teams

More information

PREPARING FOR SOC CHANGES. AN ARMANINO WHITE PAPER By Liam Collins, Partner-In-Charge, SOC Audit Practice

PREPARING FOR SOC CHANGES. AN ARMANINO WHITE PAPER By Liam Collins, Partner-In-Charge, SOC Audit Practice PREPARING FOR SOC CHANGES AN ARMANINO WHITE PAPER By Liam Collins, Partner-In-Charge, SOC Audit Practice On May 1, 2017, SSAE 18 went into effect and superseded SSAE 16. The following information is here

More information

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy By David J Lineman

More information

2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals

2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals 2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals Sponsored by Contents Introduction....3 Key Takeaways from the 2017 Report:....3 Security

More information

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using

More information

Seven Requirements for Successfully Implementing Information Security Policies and Standards

Seven Requirements for Successfully Implementing Information Security Policies and Standards Seven Requirements for Successfully Implementing and Standards A guide for executives Stan Stahl, Ph.D., President, Citadel Information Group Kimberly A. Pease, CISSP, Vice President, Citadel Information

More information

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT:

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: 2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: A SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN THE ASIA-PACIFIC REGION April 2014 Sponsored by: 2014 NETWORK SECURITY & CYBER RISK MANAGEMENT:

More information

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow Managing Privacy Risk & Compliance in Financial Services Brett Hamilton Advisory Solutions Consultant ServiceNow 1 Speaker Introduction INSERT PHOTO Name: Brett Hamilton Title: Advisory Solutions Consultant

More information

The HIPAA Omnibus Rule

The HIPAA Omnibus Rule The HIPAA Omnibus Rule What You Should Know and Do as Enforcement Begins Rebecca Fayed, Associate General Counsel and Privacy Officer Eric Banks, Information Security Officer 3 Biographies Rebecca C. Fayed

More information

Security in India: Enabling a New Connected Era

Security in India: Enabling a New Connected Era White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile

More information

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC Auditing and Monitoring for HIPAA Compliance HCCA COMPLIANCE INSTITUTE 2003 April, 2003 Presented by: Suzie Draper Sheryl Vacca, CHC 1 The Elements of Corporate Compliance Program There are seven key elements

More information

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on

More information

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs

More information

Village Software. Security Assessment Report

Village Software. Security Assessment Report Village Software Security Assessment Report Version 1.0 January 25, 2019 Prepared by Manuel Acevedo Helpful Village Security Assessment Report! 1 of! 11 Version 1.0 Table of Contents Executive Summary

More information

WHITE PAPER. Title. Managed Services for SAS Technology

WHITE PAPER. Title. Managed Services for SAS Technology WHITE PAPER Hosted Title Managed Services for SAS Technology ii Contents Performance... 1 Optimal storage and sizing...1 Secure, no-hassle access...2 Dedicated computing infrastructure...2 Early and pre-emptive

More information

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner MOBILE SECURITY 2017 SPOTLIGHT REPORT Group Partner Information Security PRESENTED BY OVERVIEW Security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use

More information

Spotlight Report. Information Security. Presented by. Group Partner

Spotlight Report. Information Security. Presented by. Group Partner Cloud SecuriTY Spotlight Report Group Partner Information Security Presented by OVERVIEW Key FINDINGS Public cloud apps like Office 365 and Salesforce have become a dominant, driving force for change in

More information

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services Building YOUR Privacy Program: One Size Does Not Fit All Justine Gottshall Partner, InfoLawGroup, LLP Chief Privacy Officer, Signal Jgottshall@infolawgroup.com Adam Nelson Executive Consultant Global Data

More information

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. In today s escalating cyber risk environment, you need to make sure you re focused on the right priorities by

More information

Hong Kong s Personal Data (Privacy) Ordinance

Hong Kong s Personal Data (Privacy) Ordinance Asia Privacy Bridge Forum 11 May 2016 Hong Kong s Personal Data (Privacy) Ordinance Fanny Wong Deputy Privacy Commissioner for Personal Data Hong Kong, China The Personal Data Landscape in Asia 2011 2003

More information

Vulnerability Management Survey

Vulnerability Management Survey Vulnerability Management Survey Executive Summary November 1 st, 2006 Conducted by Trusted Strategies for Shavlik Technologies LLC Author: Bill Bosen About Trusted Strategies is a research and advisory

More information

CASA External Peer Review Program Guidelines. Table of Contents

CASA External Peer Review Program Guidelines. Table of Contents CASA External Peer Review Program Guidelines Table of Contents Introduction... I-1 Eligibility/Point System... I-1 How to Request a Peer Review... I-1 Peer Reviewer Qualifications... I-2 CASA Peer Review

More information