2017 THALES DATA THREAT REPORT
|
|
- Giles Hancock
- 5 years ago
- Views:
Transcription
1 2017 THALES DATA THREAT REPORT Trends in Encryption and Data Security FINANCIAL SERVICES EDITION
2 2017 THALES DATA THREAT REPORT TRENDS IN ENCRYPTION AND DATA PROTECTION U.S. U.K. GERMANY JAPAN MEXICO RESPONDENTS ORGANIZATIONS (ALL) 73% - $500M OR MORE 48% - $1B OR MORE ALL US - $250M+ ALL GLOBAL - $150M+ Copyright 2017 Thales BRAZIL AUSTRALIA 1,100+ SENIOR IT SECURITY EXECUTIVES SURVEYED GLOBALLY 100 U.S. FINANCIAL SERVICES 90 GLOBAL FINANCIAL SERVICES
3 U.S. FINANCIAL SERVICES IT SECURITY SPEND INCREASES AND SO DO THE BREACHES 78% OF U.S. FINANCIAL SERVICES RESPONDENTS REPORTED THAT THEIR ORGANIZATIONS SPENDING ON IT SECURITY WILL BE INCREASED, BUT RATES OF BREACHES IN THE LAST YEAR INCREASED FROM 19% LAST YEAR TO 24% THIS YEAR CLEARLY, THERE S STILL A BIG DISCONNECT BETWEEN WHAT WE ARE SPENDING THE MOST OF OUR SECURITY BUDGET ON AND WHAT S NEEDED TO ENSURE THAT OUR SENSITIVE DATA REMAINS SECURE. GARRET BEKKER SENIOR ANALYST, INFORMATION SECURITY
4 U.S. FINANCIAL SERVICES INCREASINGLY A TARGET FOR DATA BREACHES 24% of U.S. financial firms reported a breach last year, slightly lower than the overall global average of 26%, but higher than most other U.S. verticals and also up markedly from 19% the previous year the implication is that U.S. financials are becoming more of a target. Garrett Bekker Principal Analyst, Information Security, 451 Research U.S. FINANCIAL SERVICES DATA BREACHES 2017 DATA BREACH RESULTS BY U.S. VERTICAL 84% 47% 52% 42% 65% EVER IN THE LAST YEAR 19% 24% 25% 42% 68% IN THE LAST YEAR AT ANOTHER TIME IN THE PAST 20% HEALTHCARE 19% RETAIL 24% 34% FINANCIAL FEDERAL SERVICES GOVERNMENT
5 U.S. FINANCIAL SERVICES 42% HAVE EXPERIENCED A DATA BREACH 24% IN THE LAST YEAR (UP FROM 19% PREVIOUSLY) 12% MORE THAN ONCE $ GLOBAL FINANCIAL SERVICES 49% HAVE EXPERIENCED A DATA BREACH 28% IN THE LAST YEAR 21% MORE THAN ONCE
6 .. external attackers frequently masquerade as insiders by using stolen or compromised credentials to access all types of valuable data, including PII, PHI, financial data and intellectual property Garrett Bekker Principal Analyst Information Security, 451 Research THE MOST DANGEROUS INSIDERS 40% U.S. FINANCIAL SERVICES 48% GLOBAL FINANCIAL SERVICES 61% U.S. FINANCIAL SERVICES 60% GLOBAL FINANCIAL SERVICES 34% U.S. FINANCIAL SERVICES 38% GLOBAL FIN. SERV. 33% U.S. FIN. SERV. 35% GLOBAL FIN. SERV EXECUTIVE MANAGEMENT PRIVILEGED USERS CONTRACTORS ORDINARY EMPLOYEES
7 FINANCIAL FIRMS ARE A PRIME TARGET OF ATTACKERS, BECAUSE, IN THE INFAMOUS WORDS OF WILLIE SUTTON, THAT S WHERE THE MONEY IS. TOP EXTERNAL THREAT ACTOR SELECTIONS U.S. FINANCIAL SERVICES 52% CYBER CRIMINALS GLOBAL FINANCIAL SERVICES 40% CYBER CRIMINALS HACKTIVISTS 12% HACKTIVISTS 16% 12% CYBER- TERRORISTS NATION STATES CYBER- TERRORISTS 18% 18% NATION STATES 14% 4% COMPETITORS 13% COMPETITORS
8 U.S. FINANCIAL SERVICES USING SENSITIVE DATA WITH ADVANCED TECHNOLOGIES WITHOUT DATA SECURITY * U.S. RESULTS 47% OF U.S. FINANCIAL SERVICES RESPONDENTS SURVEYED ARE DEPLOYING NEW TECHNOLOGIES IN ADVANCE OF HAVING APPROPRIATE LEVELS OF DATA SECURITY IN PLACE 96% WILL USE SENSITIVE DATA IN AT LEAST ONE OF THESE ADVANCED TECHNOLOGY ENVIRONMENTS 61% 45% 39% 40% 58% 35% 23% 14% SAAS IAAS PAAS MOBILE BIG DATA IOT CONTAINERS BLOCKCHAIN
9 WITH NATIONAL REGULATIONS LIKE GDPR COMING WORDWIDE DATA PRIVACY AND SOVEREIGNTY ARE MAKING WAVES EVERYWHERE ADDRESSING REQUIREMENTS BY: 70% 49% 38% 28% 66% 54% 33% 21% 75% - U.S. 72% - GLOBAL Impacted by Data Privacy and Data Sovereignty U.S. Fin Serv. ENCRYPTING DATA TOKENIZING DATA MIGRATING DATA LOCAL HOSTING & CLOUD ENCRYPTING DATA TOKENIZING DATA MIGRATING DATA LOCAL HOSTING & CLOUD GLOBAL FINANCIAL SERVICES 100+ NATIONAL DATA PRIVACY/SOVEREIGNTY REGULATIONS WORLDWIDE EUROPE JAPAN MEXICO AUSTRALIA GDPR GOES LIVE MAY 2018 AIPP DATA PROTECTION AND PRIVACY RULES LIVE MAY 2017 LFPDPPP PRIVACY LAW WITH FINES UP TO 1.5M NEW DATA BREACH DISCLOSURE REQUIREMENT ENFORCEMENT BEGINS FEBRUARY 2018
10 86% OF U.S. FINANCIAL SERVICES RESPONDENTS FELT THEIR ORGANIZATIONS WERE VULNERABLE TO DATA THREATS 27% WERE VERY OR EXTREMELY VULNERABLE Today s unbroken string of high profile data breaches serves as stark proof that data on any system can be attacked and compromised. Garrett Bekker, Principal Analyst Information Security, 451 Research
11 FINANCIAL SERVICES ORGANIZATIONS FEELING VULNERABLE Just 27% of U.S. respondents said they feel very or extremely vulnerable to data threats, slightly below the global average of 30%. Global financial respondents, however, show a much greater degree of concern, with a full 43% indicating very or extremely vulnerable. Garrett Bekker Principal Analyst, Information Security, 451 Research U.S. Verticals Global Verticals SOMEWHAT OR MORE VULNERABLE 84% 90% 85% 86% 96% 88% 88% 90% 88% VERY OR EXTREMELY VULNERABLE 16% 29% HEALTHCARE 19% 27% 48% 47% 37% RETAIL FINANCIAL SERVICES FEDERAL 44% 31% HEALTHCARE RETAIL FINANCIAL FEDERAL SERVICES
12 $ 78% % 73% EXPECT THEIR SPENDING ON IT SECURITY TO INCREASE % 58.5% UP FROM 70% IN 2016 GLOBAL AVERAGE 73%
13 COMPLIANCE THE TOP PRIORITY FOR U.S. FINANCIAL SERVICES IT SECURITY SPENDING IT SECURITY SPENDING PRIORITIES (RATES OF TOP 3 SELECTION) 49% % COMPLIANCE REQUIREMENTS 45% REPUTATION AND 62% BRAND PROTECTION 41% % % % % % DATA BREACH PENALTIES IT SECURITY BEST PRACTICES 31% INCREASING CLOUD USAGE Not measured 25% % % % % % % % EXECUTIVE DIRECTIVE PARTNER AND PROSPECT REQUIREMENTS COMPETITIVE/STRATEGIC CONCERNS PREVIOUS DATA BREACH DATA BREACHES AT PARTNERS OR COMPETITORS ONCE AGAIN OWING TO HEAVY REGULATIONS, COMPLIANCE REQUIREMENTS ARE THE TOP REASON FOR SECURITY SPENDING AT 49% FOR U.S. FINANCIAL RESPONDENTS, WITH REPUTATION AND BRAND SECOND AT 45%, FOLLOWED BY PENALTY AVOIDANCE WHICH IS CLEARLY RELATED TO COMPLIANCE AT 41%. Garrett Bekker, Principal Analyst Information Security, 451 Research
14 OLD HABITS DIE HARD INVESTING HEAVILY IN NETWORK/END POINT SECURITY AS THEY BECOME LESS EFFECTIVE AND LESS RELEVANT 89% +4% FROM 2016 AT BELIEVE NETWORK SECURITY VERY/ EXTREMELY EFFECTIVE PROTECTING DATA The sad truth is that as the data breaches continue to pile up, we continue to spend the bulk of our resources on the same old solutions, while approaches like data security that could arguably do a better job of protecting data, particularly among new technologies like cloud, Big Data and IoT, continue to lag. IT SECURITY DEFENSE SPENDING INCREASES RATES OF EFFECTIVENESS FOR PROTECTING DATA NETWORK END POINT AND MOBILE ANALYSIS AND CORRELATION DATA IN MOTION 73% 54% 59% 50% NETWORK END POINT AND MOBILE ANALYSIS AND CORRELATION DATA IN MOTION 89% 66% 81% 81% DATA AT REST 52% DATA AT REST 79%
15 COMPLEXITY AND POTENTIAL PERFORMANCE IMPACTS TOP BARRIERS TO DATA SECURITY DEPLOYMENT U.S. FINANCIAL SERVICES The lack of skilled security staff has been a consistent theme in 451 s research efforts the past few years, and in conjunction with complexity, makes a strong case for data security functionality delivered as a service Garrett Bekker 451 Research PERCEPTION OF COMPLEXITY UNIVERSALLY THE TOP BARRIER 56% COMPLEXITY 40% POTENTIAL PERFORMANCE IMPACTS 24% 15% 56% GLOBAL 50% PERCEIVE COMPLEXITY AS THE TOP BARRIER TO ADOPTION DATA SECURITY SOLUTIONS LACK OF STAFF TO MANAGE 24% LACK OF BUDGET 24% LACK OF PERCEIVED NEED LACK OF ORGANIZATIONAL BUY IN PERCEIVED BARRIERS TO ADOPTING DATA SECURITY
16 TOP CONCERNS WITH CLOUD/SAAS ENVIRONMENTS RATES OF VERY OR EXTREMELY CONCERNED FINANCIAL SERVICES 53% U.S. 57% GLOBAL 53% U.S. 50% GLOBAL SHARED INFRASTRUCTURE VULNERABILITIES LACK OF DATA LOCATION CONTROL 52% U.S. SECURITY BREACHES / 55% GLOBAL ATTACKS AT CSP 49% U.S. 58% GLOBAL 47% U.S. 52% GLOBAL CLOUD PRIVILEGED USER ABUSE/THREATS LACK OF DATA PRIVACY POLICY / SLA 43% U.S. MEETING COMPLIANCE 50% GLOBAL REQUIREMENTS With tidal volumes of data and applications moving to the cloud, global respondents are most concerned about attacks on the cloud service provider (59%). However, for U.S. financial respondents, 53% are most concerned with security vulnerabilities from shared infrastructure, while slightly less (52%) are concerned with security breaches and attacks at the cloud service provider level. 42% U.S. LACK OF VISIBILITY INTO 55% GLOBAL SECURITY PRACTICES 35% U.S. CUSTODIANSHIP OF 52% GLOBAL ENCRYPTION KEYS Garrett Bekker Principal Analyst, Information Security, 451 Research
17 WHAT CAN CSPS AND SAAS PROVIDERS DO TO INCREASE FINANCIAL SERVICES CLOUD ADOPTION? 60% U.S. 49% GLOBAL 51% U.S. 54% GLOBAL 50% U.S. 40% GLOBAL 52% U.S. 42% GLOBAL DATA ENCRYPTION IN THE CLOUD WITH ENTERPRISE PREMISES KEY CONTROL DATA ENCRYPTION IN THE CLOUD WITH CSP KEY CONTROL SLA AGREEMENTS AND LIABILITY TERMS FOR DATA BREACHES DETAILED PHYSICAL AND IT SECURITY IMPLEMENTATION INFORMATION U.S. financial services organizations that would choose encryption of their data in public cloud services also have a preference towards the storage of encryption keys locally. Garrett Bekker Principal Analyst, Information Security, 451 Research
18 BIG DATA TOP FINANCIAL SERVICES DATA SECURITY STATS TOP 5 CONCERNS 41% U.S. 46% GLOBAL 39% U.S. 43% GLOBAL SENSITIVE DATA MAY RESIDE ANYWHERE SECURITY OF REPORTS THAT MAY INCLUDE SENSITIVE DATA 42% U.S. 35% GLOBAL USING ENCRYPTION TO PROTECT DATA IN BIG DATA ENVIRONMENTS TODAY 37% U.S. 39% GLOBAL 36% U.S. 30% GLOBAL 29% U.S. 38% GLOBAL PRIVACY VIOLATIONS - DATA ORIGINATES IN MANY COUNTRIES LACK OF EFFECTIVE ACCESS CONTROLS PRIVILEGED USER ACCESS TO PROTECTED DATA 58% U.S. 39% GLOBAL 53% U.S. 39% GLOBAL USING SENSITIVE INFORMATION IN BIG DATA ENVIRONMENTS VERY CONCERNED THAT THEY ARE USING SENSITIVE INFORMATION IN BIG DATA WITHOUT DATA SECURITY CONTROLS
19 IOT ADOPTION IS HIGH FOR U.S. FINANCIAL SERVICES USE OF SENSITIVE DATA A CONCERN 84% ADOPTING IOT 35% ALREADY USING SENSITIVE DATA IN IOT 32% VERY CONCERNED ABOUT SENSITIVE DATA IN IOT TOP 5 DATA SECURITY CONCERNS FOR IOT 37% - IDENTIFYING WHICH DATA IS SENSITIVE 35% - PROTECTING SENSITIVE DATA GENERATED BY IOT 25% - PRIVACY VIOLATIONS GENERATED BY IOT 25% - LOSS OR THEFT OF IOT DEVICES 24% - PRIVILEGED USER ACCESS TO DATA AND DEVICES TOP 5 CONTROLS NEEDED TO INCREASE IOT ADOPTION 54% - ANTI-MALWARE FOR DEVICES 49% ENCYPTION OF DATA 49% SECURE ID & AUTH 33% - ANOMALY DETECT/ BEHAV ANALYSIS 33% - IOT NETWORK ISOLATION
20 CONTAINERS: TOP SECURITY CONTROLS TO INCREASE FINANCIAL SERVICES CONTAINER ADOPTION AND USE U.S. 84% DEPLOYING CONTAINERS THIS YEAR. SECURITY THE TOP BARRIER TO DEPLOYMENT 45% 48% U.S. GLOBAL 54% ENCRYPTION 44% ANTI-MALWARE 43% MONITORING TOOLS FOR CONTAINERS 38% VULNERABILITY SCANNING 26% DIGITAL SIGNATURE IMAGE VALIDATION GLOBAL 53% ANTI-MALWARE 42% ENCRYPTION 38% VULNERABILITY SCANNING 36% MONITORING TOOLS FOR CONTAINERS 29% DIGITAL SIGNATURE IMAGE VALIDATION
21 ENCRYPTION ENABLES DIGITAL TRANSFORMATION IN FINANCIAL SERV. A KEY TOOL REQUIRED FOR ADVANCED TECHNOLOGY ADOPTION CLOUD ENCRYPTION ENABLING FURTHER ADOPTION OF CLOUD DATA ENCRYPTION IN THE CLOUD WITH ENTERPRISE PREMISE KEY CONTROL 60% U.S. GLOBAL 49% BIG DATA U.S. ENCRYPTION OFFSETS TOP SECURITY CONCERNS 37% 39% 41% PRIVACY VIOLATIONS SECURITY OF REPORTS SENSITIVE DATA EVERYWHERE 39% 43% 46% GLOBAL IOT U.S. THE TOP TECHNOLOGIES NEEDED TO EXPAND USAGE 49% 49% DATA ENCRYPTION SECURE DIGITAL IDENTITY (AN ENCRYPTION TECHNOLOGY) 58% 55% GLOBAL CONTAINERS ENCRYPTION A TOP CONTROL NEEDED TO ENABLE GREATER ADOPTION 42% GLOBAL 54% U.S.
22 BEST PRACTICE RECOMMENDATIONS GARRETT BEKKER, 451 RESEARCH Re-prioritize your IT security tool set Cloud and SaaS break legacy IT Security models Data security with encryption and access controls across environments is required. Service-based solutions and platforms that include automation are preferred for reduced costs and simplicity. Discover and classify Get a better handle on the location of sensitive data, particularly for Cloud, Big Data, Containers and IoT Don t just check off the compliance box Encryption and access control Global and industry regulations can be demanding, but agencies should consider moving beyond compliance to greater use of encryption and BYOK, especially for cloud and other advanced technology environments. Encryption needs to move beyond laptops and desktops. Data center: File and application level encryption and access controls Cloud: Encrypt and manage keys locally, BYOK enables safe SaaS, PaaS and IaaS Big Data: Encryption and access control within the environment Containers: Encrypt and control access to data both within containers and underlying data storage locations IoT: Use secure device ID and authentication, as well as encryption of data at rest on devices, back end systems and in transit to limit data threats
23 OUR SPONSORS
24 ABOUT THALES E-SECURITY Instilling trust across the data landscape Our powerful technology platform provides advanced data security for more servers, applications, and environments than any other security alternative What we do Thales e-security provides companies everything they need to protect and manage their data and scale easily to new environments and requirements encryption, advanced key management, tokenization, authorization, privileged user control, and HSMs. Our customers Our customers include 19 of the world s 20 largest banks, four of the world s five largest oil companies, 27 NATO country members and 15 of the Fortune 25.
25 Our solutions protect data while eliminating complexity, inefficiency and cost DB/ File Encryption Application Encryption Big Data Code Signing Tokenization Data Masking Transaction Security Public Key Infra (PKI) Cloud Security Customer Records PII Secure Analytics Script Developmen t PCI, PHI Payment related apps Internet of Things Cloud Migration Use Cases Key Management Encryption Data Protection Platform DATA PROTECTION HARDWARE DATA PROTECTION SOFTWARE
26 2017 THALES DATA THREAT REPORT Trends in Encryption and Data Security FINANCIAL SERVICES EDITION
2018 THALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security GLOBAL EDITION www.thales-esecurity.com 2018 THALES DATA THREAT REPORT NOW IN ITS SIXTH YEAR SWEDEN NETHERLANDS U.S. U.K. GERMANY KOREA
More information2018 THALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. HEALTHCARE EDITION www.thales-esecurity.com 2018 THALES DATA THREAT REPORT NOW IN ITS SIXTH YEAR SWEDEN NETHERLANDS U.S. U.K.
More informationTHALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security
More informationTHALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security INDIA EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Rising risks for sensitive data in India In India, as in the rest of the
More information2015 VORMETRIC INSIDER THREAT REPORT
Research Conducted by Research Analyzed by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security GLOBAL EDITION #2015InsiderThreat EXECUTIVE PERSPECTIVE 1 INSIDER THREATS:
More informationGLOBAL ENCRYPTION TRENDS STUDY
GLOBAL ENCRYPTION TRENDS STUDY April 2017 EXECUTIVE SUMMARY EXECUTIVE SUMMARY Ponemon Institute is pleased to present the findings of the 2017 Global Encryption Trends Study, sponsored by Thales e-security.
More informationTHALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. HEALTHCARE EDITION #2018DataThreat TABLE OF CONTENTS INTRODUCTION 3 KEY FINDINGS 4 RISING BREACH COUNTS OUTPACING SPENDING PLANS
More informationTHALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security RETAIL EDITION #2018DataThreat TABLE OF CONTENTS INTRODUCTION 3 KEY FINDINGS 4 SPENDING MORE, ENJOYING IT LESS 13 Spending in all the
More informationMove Cyber Threats On To Another Target. Encrypt Everything, Everywhere. Imam Sheikh Director, Product Management Vormetric
Move Cyber Threats On To Another Target Encrypt Everything, Everywhere Imam Sheikh Director, Product Management Vormetric State of the Market Evolving Threats Today s spectrum of Insider Threats TRADITIONAL
More informationGLOBAL ENCRYPTION TRENDS STUDY
GLOBAL ENCRYPTION TRENDS STUDY April 2018 1 PONEMON INSTITUTE RESEARCH REPORT EXECUTIVE SUMMARY Ponemon Institute is pleased to present the findings of the 2018 Global Encryption Trends Study, 1 sponsored
More informationCipherCloud CASB+ Connector for ServiceNow
ServiceNow CASB+ Connector CipherCloud CASB+ Connector for ServiceNow The CipherCloud CASB+ Connector for ServiceNow enables the full suite of CipherCloud CASB+ capabilities, in addition to field-level
More informationCombating Cyber Risk in the Supply Chain
SESSION ID: CIN-W10 Combating Cyber Risk in the Supply Chain Ashok Sankar Senior Director Cyber Strategy Raytheon Websense @ashoksankar Introduction The velocity of data breaches is accelerating at an
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationSecuring Your Cloud Introduction Presentation
Securing Your Cloud Introduction Presentation Slides originally created by IBM Partial deck derived by Continental Resources, Inc. (ConRes) Security Division Revision March 17, 2017 1 IBM Security Today
More informationPONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY
PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on
More informationOffice 365 Buyers Guide: Best Practices for Securing Office 365
Office 365 Buyers Guide: Best Practices for Securing Office 365 Microsoft Office 365 has become the standard productivity platform for the majority of organizations, large and small, around the world.
More informationBuilding a Threat Intelligence Program
WHITE PAPER Building a Threat Intelligence Program Research findings on best practices and impact www. Building a Threat Intelligence Program 2 Methodology FIELD DATES: March 30th - April 4th 2018 351
More informationIBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan
IBM Cloud Security for the Cloud Amr Ismail Security Solutions Sales Leader Middle East & Pakistan Today s Drivers for Cloud Adoption ELASTIC LOWER COST SOLVES SKILLS SHORTAGE RAPID INNOVATION GREATER
More informationGLOBAL PKI TRENDS STUDY
2018 GLOBAL PKI TRENDS STUDY Sponsored by Thales esecurity Independently conducted by Ponemon Institute LLC SEPTEMBER 2018 EXECUTIVE SUMMARY #2018GlobalPKI Mi Ponemon Institute is pleased to present the
More informationTeradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 12.16 EB7178 DATA SECURITY Table of Contents 2 Data Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
More informationWho s Protecting Your Keys? August 2018
Who s Protecting Your Keys? August 2018 Protecting the most vital data from the core to the cloud to the field Trusted, U.S. based source for cyber security solutions We develop, manufacture, sell and
More informationSIEM: Five Requirements that Solve the Bigger Business Issues
SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered
More informationCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm Webinar April 19,
More informationNine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
More informationSpotlight Report. Information Security. Presented by. Group Partner
Cloud SecuriTY Spotlight Report Group Partner Information Security Presented by OVERVIEW Key FINDINGS Public cloud apps like Office 365 and Salesforce have become a dominant, driving force for change in
More informationProtecting Against Modern Attacks. Protection Against Modern Attack Vectors
Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches
More informationCybersecurity The Evolving Landscape
Cybersecurity The Evolving Landscape 1 Presenter Zach Shelton, CISA Principal DHG IT Advisory Zach.Shelton@DHG.com Raleigh, NC 14+ years of experience in IT Consulting 11+ years of experience with DHG
More informationWelcome to the SafeNet Day! Prague 1st of October Insert Your Name Insert Your Title Insert Date
Welcome to the SafeNet Day! Prague 1st of October 2013 Insert Your Name Insert Your Title Insert Date Corporate Brief & Presence in Central Europe Anton Porok Director Central EMEA, SafeNet IT Landscape
More informationAN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP
AN IPSWITCH WHITEPAPER The Definitive Guide to Secure FTP The Importance of File Transfer Are you concerned with the security of file transfer processes in your company? According to a survey of IT pros
More informationAltitude Software. Data Protection Heading 2018
Altitude Software Data Protection Heading 2018 How to prevent our Contact Centers from Data Leaks? Why is this a priority for Altitude? How does it affect the Contact Center environment? How does this
More informationGo mobile. Stay in control.
Go mobile. Stay in control. Enterprise Mobility + Security Jeff Alexander Sr. Technical Evangelist http://about.me/jeffa36 Mobile-first, cloud-first reality 63% 80% 0.6% Data breaches Shadow IT IT Budget
More informationSecuring Digital Transformation
September 4, 2017 Securing Digital Transformation DXC Security Andreas Wuchner, CTO Security Innovation Risk surface is evolving and increasingly complex The adversary is highly innovative and sophisticated
More informationPKI at the Crossroads: the Impact of the IoT and more! Amogh Ranade
PKI at the Crossroads: the Impact of the IoT and more! Amogh Ranade About this research 1,510 global respondents Covers US, Germany, India, UK, Brazil, Japan, Mexico, France, Arabia, Russian Federation,
More informationSecuring Your Most Sensitive Data
Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way
More informationRetail Security in a World of Digital Touchpoint Complexity
Retail Security in a World of Digital Touchpoint Complexity Author Greg Buzek, President of IHL Services Sponsored by Cisco Systems Inc. Featuring industry research by Previously in part 1 and part 2 of
More informationEnhancing the Cybersecurity of Federal Information and Assets through CSIP
TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3
More informationto protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large
Executive Summary As a County Government servicing about 1.5 million citizens, we have the utmost responsibility to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large
More informationKey Findings from the Global State of Information Security Survey 2017 Indonesian Insights
www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.
More informationPerimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN
T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN Perimeter Defenses Enterprises need to take their security strategy beyond stacking up layers of perimeter defenses to building up predictive
More informationNext-Generation HCI: Fine- Tuned for New Ways of Working
www. Govtech.com Next-Generation HCI: Fine-Tuned for New Ways of Working - p. 1 February 21, 2018 Next-Generation HCI: Fine- Tuned for New Ways of Working Traditional data center management focuses mainly
More information6 Vulnerabilities of the Retail Payment Ecosystem
6 Vulnerabilities of the Retail Payment Ecosystem FINANCIAL INSTITUTION PAYMENT GATEWAY DATABASES POINT OF SALE POINT OF INTERACTION SOFTWARE VENDOR Table of Contents 4 7 8 11 12 14 16 18 Intercepting
More information2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT
2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT THYCOTIC 2018 GLOBAL CHANNEL PARTNER SURVEY Channel Partner survey highlights client cybersecurity concerns and opportunities for
More informationRelated Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)
PRESENTED BY: Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced) One of the main problems that customers face with the adoption of SaaS and cloud-based apps is how to deliver the
More informationHave breaches declined since the massive Heartland Payments leak in 2008? What proportion of breaches are the result of hacking?
The financial sector struggles with data leakage in part because many such organizations rely on dinosaurs - security solutions that struggle to protect data outside the corporate network. These orgs also
More informationModern Database Architectures Demand Modern Data Security Measures
Forrester Opportunity Snapshot: A Custom Study Commissioned By Imperva January 2018 Modern Database Architectures Demand Modern Data Security Measures GET STARTED Introduction The fast-paced, ever-changing
More informationHow unified backup and cloud enable your digital transformation success
Key Considerations for Data Protection and Cloud on Your Digital Journey How unified backup and cloud enable your digital transformation success An IDC InfoBrief, Sponsored by February 2018 1 Digital Transformation
More informationDanish Cloud Maturity Survey 2018
Danish Cloud Maturity Survey 2018 Current and planned adoption of cloud services Danish Cloud Maturity Survey 2018 1 Early days for cloud adoption with concerns for security and expertise, and complexity
More informationEvolution Of Cyber Threats & Defense Approaches
Evolution Of Cyber Threats & Defense Approaches Antony Abraham IT Architect, Information Security, State Farm Kevin McIntyre Tech Lead, Information Security, State Farm Agenda About State Farm Evolution
More informationSecuring Office 365 with SecureCloud
Securing Office 365 with SecureCloud 1 Introduction Microsoft Office 365 has become incredibly popular because of the mobility and collaboration it enables. With Office 365, companies always have the latest
More informationSafeguarding company from cyber-crimes and other technology scams ASSOCHAM
www.pwc.com Safeguarding company from cyber-crimes and other technology scams ASSOCHAM Rahul Aggarwal - Director The new digital business ecosystem is complex and highly interconnected The new business
More informationalign security instill confidence
align security instill confidence cyber security Securing data has become a top priority across all industries. High-profile data breaches and the proliferation of advanced persistent threats have changed
More informationMOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner
MOBILE SECURITY 2017 SPOTLIGHT REPORT Group Partner Information Security PRESENTED BY OVERVIEW Security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use
More informationData Privacy and Protection GDPR Compliance for Databases
Data Privacy and Protection GDPR Compliance for Databases Walo Weber, Senior Sales Engineer September, 2016 Agenda GDPR: who, what, why, when Requirements for databases Discovery Classification Masking
More informationDIGITAL TRUST Making digital work by making digital secure
Making digital work by making digital secure MARKET DRIVERS AND CHALLENGES THE ROLE OF IT SECURITY IN THE DIGITAL AGE 2 In today s digital age we see the impact of poor security controls everywhere. Bots
More informationCloud Communications for Healthcare
Cloud Communications for Healthcare Today, many powerful business communication challenges face everyone in the healthcare chain including clinics, hospitals, insurance providers and any other organization
More informationGDPR COMPLIANCE REPORT
2018 GDPR COMPLIANCE REPORT INTRODUCTION Effective as of May 25, 2018, the European Union General Data Protection Regulation (GDPR) represents the most sweeping change in data privacy regulation in decades.
More informationCybersecurity and Nonprofit
Cybersecurity and Nonprofit 2 2 Agenda Cybersecurity and Non Profits Scenario #1 Scenario #2 What Makes a Difference Cyber Insurance and How it Helps Question and Answer 3 3 Cybersecurity and Nonprofit
More information2016 Survey: A Pulse on Mobility in Healthcare
2016 Survey: A Pulse on Mobility in Healthcare Introduction Mobile Trends in Healthcare Mobility in Healthcare Top Motivation for Implementing a Mobile Solution Impact of Mobility on Patient Experience
More informationData Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle
Data Security and Privacy : Compliance to Stewardship Jignesh Patel Solution Consultant,Oracle Agenda Connected Government Security Threats and Risks Defense In Depth Approach Summary Connected Government
More informationPrivacy and Security in the Age of Meaningful Use
Privacy and Security in the Age of Meaningful Use David S. Finn Health IT Officer Lewis Etheridge Principal Systems Engineer, Symantec Healthcare Privacy & Security in the Age of Meaningful Use SYMANTEC
More information2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE
2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE February 2014 Sponsored by: 2014 Network Security & Cyber Risk Management:
More informationThales esecurity Cloud Data Protection
Thales esecurity Cloud Data Protection Marcel Derksen www.thalesesecurity.com Before we start. 2 3 The old model was perimeter security to wall off the data 4 T h is d o c u m e n t m a y n o t b e re
More informationIdentity & Access Management
Identity & Access Management THE PROBLEM: HOW DO WE ENABLE PRODUCTIVITY WITHOUT COMPROMISING SECURITY? S E C U R I T Y OR P R O D U C T I V I T Y On-premises THE PROBLEM: HOW DO WE ENABLE PRODUCTIVITY
More informationJeff Wilbur VP Marketing Iconix
2016 Data Protection & Breach Readiness Guide February 3, 2016 Craig Spiezle Executive Director & President Online Trust Alliance Jeff Wilbur VP Marketing Iconix 1 Who is OTA? Mission to enhance online
More informationSecure & Unified Identity
Secure & Unified Identity for End & Privileged Users Copyright 2015 Centrify Corporation. All Rights Reserved. 1 Key Point #1: Perimeter is Dissolving Making Identity Matter Most You must plant a strong
More informationmhealth SECURITY: STATS AND SOLUTIONS
mhealth SECURITY: STATS AND SOLUTIONS www.eset.com WHAT IS mhealth? mhealth (also written as m-health) is an abbreviation for mobile health, a term used for the practice of medicine and public health supported
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationwith Advanced Protection
with Advanced Email Protection OVERVIEW Today s sophisticated threats are changing. They re multiplying. They re morphing into new variants. And they re targeting people, not just technology. As organizations
More informationDIGITAL TRANSFORMATION IN FINANCIAL SERVICES
DIGITAL TRANSFORMATION IN FINANCIAL SERVICES Global Priorities, Progress, and Obstacles Insights from business and IT executives at financial services institutions worldwide reveal that while digital transformation
More informationTop 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)
ESG Lab Review Sophos Security Heartbeat Date: January 2016 Author: Tony Palmer, Sr. ESG Lab Analyst; and Jack Poller, ESG Lab Analyst Abstract: This report examines the key attributes of Sophos synchronized
More informationConducted by Vanson Bourne Research
Conducted by Vanson Bourne Research N o v e m b e r 2 0 1 3 1 3200 INTERVIEWS ALTOGETHER, 1600 IT & 1600 BUSINESS DECISION- MAKERS 100 & 100 IT BUSINESS DECISION- DECISION- MAKERS MAKERS COUNTRIES USA
More informationFTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.
FTA 2017 SEATTLE Cybersecurity and the State Tax Threat Environment 1 Agenda Cybersecurity Trends By the Numbers Attack Trends Defensive Trends State and Local Intelligence What Can You Do? 2 2016: Who
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationTripwire State of Container Security Report
RESEARCH Tripwire State of Container Security Report January 2019 FOUNDATIONAL CONTROLS FOR SECURITY, COMPLIANCE & IT OPERATIONS As DevOps continues to drive increased use of containers, security teams
More informationSOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:
(Solutions Brief) An integrated cybersecurity Administration solution for securing any Large Enterprise. The Industry s most complete protection for the Large Enterprise and Cloud Deployments. KEY SERVICES:
More informationSecurity-as-a-Service: The Future of Security Management
Security-as-a-Service: The Future of Security Management EVERY SINGLE ATTACK THAT AN ORGANISATION EXPERIENCES IS EITHER ON AN ENDPOINT OR HEADING THERE 65% of CEOs say their risk management approach is
More informationCloud for Government: A Transformative Digital Tool to Better Serve Communities
Cloud for Government: A Transformative Digital Tool to Better Serve Communities 1 005181004 From state to local agencies, government organizations crave access to the same cloud-based tools enabling digital
More informationAKAMAI CLOUD SECURITY SOLUTIONS
AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your
More informationCybersecurity in Higher Ed
Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,
More informationAZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments
AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES To Secure Azure and Hybrid Cloud Environments Introduction Cloud is at the core of every successful digital transformation initiative. With cloud comes new
More informationThe Realities of Data Security and Compliance: Compliance Security
The Realities of Data Security and Compliance: Compliance Security Ulf Mattsson, CTO, Protegrity Ulf.mattsson @ protegrity.com Bio - A Passion for Sailing and International Travel 2 Ulf Mattsson 20 years
More informationINTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.
2019 SIEM REPORT INTRODUCTION Security Information and Event Management (SIEM) is a powerful technology that allows security operations teams to collect, correlate and analyze log data from a variety of
More informationNext Generation Authentication
Next Generation Authentication Bring Your Own security impact Dominique Dessy Sr. Technology Consultant 1 2012 DIGITAL UNIVERSE 1.8 ZETTABYTES 1,800,000,000,000,000,000,000 2 $ 3 4 Threat Landscape 60%
More informationNext-Gen CASB. Patrick Koh Bitglass
Next-Gen CASB Patrick Koh Bitglass pkoh@bitglass.com www.cloudsec.com WW Cloud Service Adoption https://www.gartner.com/newsroom/id/3815165 "As of 2016, approximately 17 percent of the total market revenue
More informationCLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS
CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS Introduction The world of cybersecurity is changing. As all aspects of our lives become increasingly connected, businesses have made
More informationCHALLENGES GOVERNANCE INTEGRATION SECURITY
CLOUD SERVICES The adoption and migration to the cloud is rooted in the need for speed and flexibility in creating and managing services. These benefits are often impacted by the difficulty of enterprises
More informationCredit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank
Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank Introduction The 6,331 credit unions in the United States face a unique challenge when it comes to cybersecurity.
More informationSOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM
RSA NETWITNESS EVOLVED SIEM OVERVIEW A SIEM is technology originally intended for compliance and log management. Later, as SIEMs became the aggregation points for security alerts, they began to be more
More informationDeMystifying Data Breaches and Information Security Compliance
May 22-25, 2016 Los Angeles Convention Center Los Angeles, California DeMystifying Data Breaches and Information Security Compliance Presented by James Harrison OM32 5/25/2016 3:00 PM - 4:15 PM The handouts
More informationTop 5 Reasons. The Business Case for Bomgar Remote Support
Top 5 Reasons The Business Case for Bomgar Remote Support You already know Bomgar will help you connect to remote people, devices, and networks securely and efficiently. Now you need to get your team on
More informationVMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment
VMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment RELIABLE, FAMILIAR INFRASTRUCTURE BACKED BY VMWARE AND DELIVERED THROUGH PARTNERS HELPS OPTIMIZE CLOUD INVESTMENTS AS ENTERPRISES
More informationSolving the Really Big Tech Problems with IoT Data Security and Privacy
Solving the Really Big Tech Problems with IoT Data Security and Privacy HPE Security Data Security March 16, 2017 IoT Everywhere - Promising New Value Manufacturing Energy / Utilities Banks / Financial
More informationSOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE
HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE PREPARATION FOR GDPR IS ESSENTIAL The EU GDPR imposes interrelated obligations for organizations handling
More informationCloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION
Cloud Computing January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Purpose and Methodology Survey Sample Field Work December 20, 2011 January 9, 2012 Total Respondents 554 Margin of Error +/- 4.2%
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More informationSkybox Security Vulnerability Management Survey 2012
Skybox Security Vulnerability Management Survey 2012 Notice: This document contains a summary of the responses to a June 2012 survey of 100 medium to large enterprise organizations about their Vulnerability
More informationChannel FAQ: Smartcrypt Appliances
Channel FAQ: Smartcrypt Appliances Q: When were Smartcrypt appliances announced? A: announced the release of our Smartcrypt virtual and physical appliances on September 19, 2017. Smartcrypt Enterprise
More informationAUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs
AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs WITH PALO ALTO NETWORKS AND REAN CLOUD 1 INTRODUCTION EXECUTIVE SUMMARY Organizations looking to provide developers with a free-range development environment
More informationHealthcare IT Modernization and the Adoption of Hybrid Cloud
Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a
More informationCanada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?
Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY
More information