Uncovering the Risk of SAP Cyber Breaches

Similar documents
The Cost of Denial-of-Services Attacks

Reducing Cybersecurity Costs & Risk through Automation Technologies

Big Data Cybersecurity Analytics Research Report Sponsored by Cloudera

National Survey on Data Center Outages

The Third Annual Study on the Cyber Resilient Organization

Data Protection Risks & Regulations in the Global Economy

2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB)

The State of Cybersecurity in Healthcare Organizations in 2016

Future State of IT Security A Survey of IT Security Executives

Sponsored by Raytheon. Don t Wait: The Evolution of Proactive Threat Hunting Executive Summary

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

The Cyber Resilient Organisation in the United Kingdom: Learning to Thrive against Threats

2017 State of Cybersecurity in Small & Medium-Sized Businesses (SMB)

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

2012 Cost of Cyber Crime Study: United States

2013 Cost of Cyber Crime Study: Global Report

Big Data Analytics in Cyber Defense

Flying Blind in the Cloud

Third Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way

2014 Global Report on the Cost of Cyber Crime

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT:

Ponemon Institute s 2018 Cost of a Data Breach Study

Cyber Security. June 2015

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

IT Monitoring Tool Gaps are Impacting the Business A survey of IT Professionals and Executives

Tripwire State of Container Security Report

2017 Cost of Data Breach Study

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

A Global Look at IT Audit Best Practices

Cyber Security in Timothy Brown Dell Fellow and CTO Dell Security

2015 VORMETRIC INSIDER THREAT REPORT

Cybersecurity. Securely enabling transformation and change

ACHIEVING FIFTH GENERATION CYBER SECURITY

Security in India: Enabling a New Connected Era

Modern Compute Is The Foundation For Your IT Transformation

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

Spotlight Report. Information Security. Presented by. Group Partner

NYDFS Cybersecurity Regulations

Turning Risk into Advantage

Combating Cyber Risk in the Supply Chain

The Deloitte-NASCIO Cybersecurity Study Insights from

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

Onapsis: The CISO Imperative Taking Control of SAP

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Technology Priorities SURVEY. Exclusive Research from CIO magazine

2017 PKI GLOBAL TRENDS STUDY

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Business continuity management and cyber resiliency

Cyber Security Program

HEALTH CARE AND CYBER SECURITY:

GDPR COMPLIANCE REPORT

First aid toolkit for the management of data breaches. Mary Deligianni Senior Associate 15 February 2018

34% DOING MORE WITH LESS How Red Hat Enterprise Linux shrinks total cost of ownership (TCO) compared to Windows. I n a study measuring

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

The State of Cybersecurity and Digital Trust 2016

CYBERSECURITY AND THE MIDDLE MARKET

COST OF CYBER CRIME STUDY

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

Cybersecurity 2016 Survey Summary Report of Survey Results

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

The Evolving Role of CISOs

KEY FINDINGS INTERACTIVE GUIDE. Uncovering Hidden Threats within Encrypted Traffic

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

SAP Security Remediation: Three Steps for Success Using SAP GRC

FOR FINANCIAL SERVICES ORGANIZATIONS

2012 Consumer Study on Data Breach Notification. Sponsored by Experian Data Breach Resolution

Healthcare Security Success Story

Cyber Resilience. Think18. Felicity March IBM Corporation

Cybersecurity Fundamentals

Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

2016 Nationwide Cyber Security Review: Summary Report. Nationwide Cyber Security Review: Summary Report

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs

Building a Threat Intelligence Program

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

Security and Privacy Governance Program Guidelines

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

ASSESSING THE CYBER READINESS. of the Middle East s Oil and Gas Sector.

GLOBAL ENCRYPTION TRENDS STUDY

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Tripwire State of Cyber Hygiene Report

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank

The Quest for Independence - Information Security Management Pyramid. Mikhail Utin, CISSP, PhD, Daniil Utin, MS and Rubos, Inc.

whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk

The Value of Automated Penetration Testing White Paper

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals

Background FAST FACTS

Mastering The Endpoint

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

Transcription:

Uncovering the Risk of SAP Cyber Breaches Research sponsored by Onapsis Independently Conducted by Ponemon Institute LLC February 2016

1 Part 1. Introduction Uncovering the Risks of SAP Cyber Breaches Ponemon Institute, February 2016 Ponemon Institute is pleased to present the results of Uncovering the Risks of SAP Cyber Breaches sponsored by Onapsis. The purpose of this study is to understand the threat of a SAP cyber breach and how companies are managing the risk of information theft, modification of data and disruption of business processes. Based on the findings, the companies represented in this study say their SAP platform has been breached an average of two times in the past 24 months. We surveyed 607 IT and IT security practitioners who are involved in the security of SAP applications used by their organizations to manage business operations and customer relations. The most common SAP products deployed are enterprise management (ERP), technology platforms (backbone), financial and data management and customer relationship management (CRM). The respondents in this study understand the risk of a SAP cyber breach. Sixty percent of respondents say the impact of information theft, modification of data and disruption of business processes on their company s SAP would be catastrophic (17 percent of respondents) or very serious (43 percent of respondents). Figure 1. Perceptions about SAP security risks Strongly agree and agree responses combined However, many senior executives are underestimating the risk and do not have an understanding of the impact of the value of the data that could be lost from the SAP system, according to respondents. As shown in Figure 1 only 21 percent of respondents say senior leadership is aware of SAP cybersecurity risks, but 56 percent of respondents say a security or data breach resulting from insecure SAP applications is likely (100 percent 44 percent of respondents). The following are key takeaways from this research: Senior leadership values the importance of SAP to the bottom line but ignores its cybersecurity risks. Seventy-six percent of respondents say their senior leadership understands the importance and criticality of SAP installations to profitability. However, 63 percent of respondents say C-level executives in their company tend to underestimate the risks associated with insecure SAP applications. SAP systems are critical to the revenues of companies represented in this research. When asked about the financial consequences if their companies SAP systems were taken offline, the average cost was estimated to be $4.5 million. This includes all direct cash outlays, direct labor expenditures, indirect labor costs, overhead costs and lost business opportunities. Are SAP applications secure? Fifty-four percent of respondents believe it is the responsibility of SAP, not their company, to ensure the security of its applications and platform. While 62 percent of respondents say SAP applications are more secure than other applications deployed by their company, respondents say their companies are evenly divided about confidence in the security of 1

2 SAP applications (50 percent of respondents). A barrier to achieving security is that only 34 percent of respondents say they have full visibility into the security of SAP applications and many companies do not have the required expertise to prevent, detect and respond to cyber attacks on their SAP applications. The SAP security team is seldom accountable for the security of SAP systems, applications and processes. The majority of respondents believe it is difficult to secure SAP applications. One possible reason could be due to the lack of clear ownership over securing SAP applications. Twenty-five percent of respondents say no one function is most accountable for SAP security in their organizations followed by IT infrastructure (21 percent of respondents). Only 19 percent of respondents say the SAP security team is accountable. SAP platforms are likely to contain one or more malware infections. Fifty-eight percent of respondents rate the difficulty in securing SAP applications as very high and 65 percent of respondents rate their level of concern about malware infections in the SAP infrastructure as very high. Seventy-five percent of respondents say it is very likely (33 percent) or likely (42 percent) SAP platforms have one or more malware infections. If a data breach involving the SAP system occurred, who would be responsible for remediating the incident? Despite the perceptions of the seriousness of a SAP breach, 30 percent of respondents say no one is most accountable if their organization had a SAP breach followed by the CIO (26 percent of respondents) and the CISO (18 percent of respondents). There is little confidence a breach involving the SAP platform would be detected immediately or within one week. Only 25 percent of respondents say they are very confident or confident such a data breach would be detected immediately and 35 percent of respondents say they are very confident or confident a breach would be detected within one week. Frequency and sophistication of cyber attacks against SAP platforms will increase. Fortyseven percent of respondents say the frequency of cyber attacks against their companies SAP platform will increase over the next 2 years and 54 percent of respondents say the stealth and sophistication of cyber attacks against the companies SAP platform will increase. New technologies and trends increase the risk of a data breach involving SAP applications. Fifty-nine percent of respondents also believe new technologies and trends such as cloud, mobile, big data and the Internet of Things increases the attack surface of their SAP applications. Despite this concern about the cloud, only 43 percent of respondents say it is important to understand the cybersecurity and privacy risks before deciding to move SAP applications to the cloud. How can organizations improve the security of their SAP infrastructure? Understanding the latest threats and vulnerabilities in SAP applications helps strengthen the organization s cybersecurity posture. Seventy-three percent of respondents say knowledge about the latest threats and vulnerabilities affecting SAP applications improves their organization s ability to manage cybersecurity risks. Further, 83 percent of respondents say it is very important to be able to detect zero-day vulnerabilities in SAP applications, 81 percent say the ability to prioritize threats against SAP applications based on when the attack is likely to succeed and 81 percent say it is very important to have continuous monitoring in order to ensure SAP applications are safe and secure. Segregation of duties can improve SAP security. Sixty-six percent of respondents say their current approach to SAP security includes segregation of duties and access controls and 51 percent of these respondents say it is effective in safeguarding your company s core business. 2

3 Part 2. Key findings In this section, we present an analysis of the research findings. The complete audited findings are presented in the appendix of the report. We have organized the findings according to the following topics from the research: Senior leadership s perceptions about SAP SAP security challenges SAP and the risk of data breaches and cyber attacks Senior leadership s perceptions about SAP Senior leadership values the importance of SAP to the bottom line but ignores its cybersecurity risks. As shown in Figure 2, 76 percent of respondents say their senior leadership understands the importance and criticality of SAP installations to profitability. However, only 21 percent of respondents say their leaders recognize SAP cybersecurity risks and 63 percent of respondents say C-level executives in their company tend to underestimate the risks associated with insecure SAP applications. Moreover, only 41 percent of respondents say their organization understands the impact of the value of the data that could be lost from our SAP system and only 23 percent of respondents say the senior leadership in their companies know what data resides on the SAP systems. Figure 2. Senior leadership s perceptions about SAP security risks Strongly agree and agree responses combined Our senior leadership understands the importance and criticality of SAP installations to our organization s bottom line 76% C-level executives in my company tend to underestimate the risks associated with insecure SAP applications 63% Our organization understands the impact of the value of the data that could be lost from our SAP system 41% Our senior leadership knows what data resides on our company s SAP systems 23% 0% 10% 20% 30% 40% 50% 60% 70% 80% SAP systems are critical to the revenues of companies represented in this research. When asked about the financial consequences if their companies SAP systems were taken offline, the average cost was estimated to be $4.5 million. This includes all direct cash outlays, direct labor expenditures, indirect labor costs, overhead costs and lost business opportunities. 3

4 SAP security challenges How secure are SAP applications? As shown in Figure 3, 54 percent of respondents believe it is the responsibility of SAP, not their company, to ensure the security of its applications and platform. While 62 percent of respondents say SAP applications are more secure than other applications deployed by their company, respondents say their companies are evenly divided about confidence in the security of SAP applications (50 percent of respondents). Barriers to achieving better security are the lack of full visibility into the security of SAP applications and required expertise. Less than half (49 percent) of respondents say their organization has the required expertise to prevent, detect and respond to cyber attacks on their SAP applications. This lack of expertise could be due to more resources allocated to network rather than applications security (68 percent of respondents). Figure 3. How secure are SAP applications? Strongly agree and agree responses combined My company s budget provides a higher funding level for network rather than application security 68% SAP applications are more secure than other applications deployed by my company 62% It is the responsibility of SAP, not my company, to ensure its applications and platform are safe and secure 54% My company is confident in the security of SAP applications 50% Our organization has the required expertise to prevent, detect and respond to cyber attacks on our SAP applications 49% 0% 10% 20% 30% 40% 50% 60% 70% 80% 4

5 The SAP security team is seldom accountable for the security of SAP systems, applications and processes. The majority of respondents believe it is difficult to secure SAP applications. One possible reason could be due to the lack of clear ownership over securing SAP applications. As shown in Figure 4, 25 percent of respondents say no one function is most accountable for SAP security in their organizations followed by IT infrastructure (21 percent of respondents). Only 19 percent of respondents say the SAP security team is accountable followed by information security (18 percent of respondents). Figure 4. Which function is most accountable to ensure the security of SAP systems, applications and processes? No one function is most accountable for SAP security 25% IT infrastructure SAP security team Information security 19% 18% 21% Risk executives 9% Audit 6% Board of directors 2% 0% 5% 10% 15% 20% 25% 30% SAP security is difficult to achieve. According to Figure 5, 58 percent of respondents rate the difficulty in securing SAP applications as high and 65 percent of respondents rate their level of concern about malware infections in the SAP infrastructure as very high. Only 34 percent of respondents say their companies have visibility into the security of SAP applications Figure 5. Difficulty SAP security, concern about malware infections and visibility 1 = no difficulty, no concern and no visibility to 10 = high difficulty, high concern and high visibility (7 + responses reported) Level of concern about malware infection in the SAP infrastructure 65% Level of difficulty in securing SAP applications 58% Visibility into the security of SAP applications 34% 0% 10% 20% 30% 40% 50% 60% 70% 5

6 SAP platforms are likely to contain one or more malware infections As shown in Figure 6, 75 percent of respondents say it is very likely (33 percent) or likely (42 percent) SAP platforms have one or more malware infections. Figure 6. What is the likelihood that your company s SAP platform at any point in time contains one or more malware infections? 45% 42% 40% 35% 33% 30% 25% 20% 21% 15% 10% 5% 0% Very likely Likely Not likely No chance 4% 6

7 SAP and the risk of data breaches and cyber attacks If a data breach involving the SAP system occurred, who would be responsible for remediating the incident? Despite the perceptions of the seriousness of a SAP breach, 30 percent of respondents say no one is most accountable if their organization had a SAP breach followed by the CIO (26 percent of respondents) and the CISO (18 percent of respondents), as shown in Figure 7. Figure 7. Who is the person most accountable if your organization has a SAP breach? No one person is accountable 30% CIO 26% CISO 18% SAP security 14% SAP BASIS administrator 8% CFO 1% Other 3% 0% 5% 10% 15% 20% 25% 30% 35% There is little confidence a breach involving the SAP platform would be detected immediately or within one week. According to Figure 8, only 25 percent of respondents say they are very confident or confident such a data breach would be detected immediately and 35 percent of respondents say they are very confident or confident a breach would be detected within one week. Confidence increases in the detection of a breach within one month (41 percent of respondents) or one year (53 percent of respondents). Figure 8. How soon would you know if the SAP platform was breached? Very confident and confident responses combined 60% 53% 50% 40% 35% 41% 30% 25% 20% 10% 0% Detected immediately Detected within one week Detected within one month Detected within one year 7

8 Certain SAP applications are most susceptible to cyber attack. According to respondents, content and collaboration, data management, customer relationship management (CRM) and the technology platform (backbone) are the most vulnerable to attack, as shown in Figure 9. Figure 9. SAP applications most susceptible to attack More than one response permitted Content and collaboration Data management Customer relationship management (CRM) Technology platform (backbone) Enterprise management (ERP) Financial management Supply chain management Supplier relationship management Human capital management Analytics Product life cycle management Other 5% 5% 11% 37% 35% 33% 31% 25% 50% 48% 56% 64% 0% 10% 20% 30% 40% 50% 60% 70% Frequency and sophistication of cyber attacks against SAP platforms will increase. As shown in Figure 10, 47 percent of respondents say the frequency of cyber attacks against their companies SAP platform will increase over the next 2 years and 54 percent of respondents say the stealth and sophistication of cyber attacks against the companies SAP platform will increase. Figure 10. How will the frequency and stealth and sophistication of cyber attacks against your company s SAP platform change over the next 24 months? 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% 12% 15% Significant increase 35% 39% 42% 37% Increase No change Decrease Significant decrease 8% 7% 3% 2% Frequency of cyber attacks Stealth and sophistication of cyber attacks 8

9 New technologies and trends increase the risk of a data breach involving SAP applications. Fifty-nine percent of respondents believe new technologies and trends such as cloud, mobile, big data and the Internet of Things increases the attack surface of their SAP applications, according to Figure 11. Despite this concern about the cloud, only 43 percent of respondents say it is important to understand the cybersecurity and privacy risks before deciding to move SAP applications to the cloud. Figure 11. What new technologies and trends will increase the risk of a data breach involving SAP applications? Strongly agree and agree responses combined Cloud, mobile, big data and the Internet of Things increase the attack surface of our SAP applications and therefore the probability of a breach 59% Understanding the cyber security and privacy risks are considered when evaluating whether or not to move SAP applications to the cloud 43% 0% 10% 20% 30% 40% 50% 60% 70% 9

10 Certain practices are very important to achieving security and avoiding cyber breaches in the SAP infrastructure. Understanding the latest threats and vulnerabilities in SAP applications helps strengthen the organization s cybersecurity posture. Seventy-three percent of respondents say knowledge about the latest threats and vulnerabilities affecting SAP applications improves their organization s ability to manage cybersecurity risks. According to Figure 12, 83 percent of respondents say it is very important to be able to detect zero-day vulnerabilities in SAP applications, 81 percent say the ability to prioritize threats against SAP applications based on when the attack is likely to succeed and 81 percent say it is very important to have continuous monitoring in order to ensure SAP applications are safe and secure. The following practices are also important: the ability to assess and audit SAP compliance with policies, industry standards and government regulations (78 percent of respondents), the ability to integrate existing security technologies including GRC, SIEM, network security and security operations management with their company s SAP security solution (73 percent of respondents), the ability to receive a direct feed of the latest SAP vulnerabilities confirmed by security experts (72 percent of respondents) and compliance when deploying SAP applications (67 percent of respondents). Figure 12. What practices are important in achieving security in the SAP infrastructure? 1 = low importance to 10 = high importance, 7+ responses Ability to detect zero-day vulnerabilities in SAP applications 83% Ability to prioritize threats against SAP applications based on when the attack is likely to succeed 81% Continuous monitoring in ensuring SAP applications are safe and secure 81% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Segregation of duties can improve SAP security. Sixty-six percent of respondents say their current approach to SAP security includes segregation of duties and access controls and 51 percent of these respondents say it is effective in safeguarding your company s core business. 10

11 Part 3. Methods & Limitations A sampling frame of 17,473 experienced IT and IT security practitioners located in the United States were selected as participants to this survey. From this sampling frame, we captured 709 returns of which 102 were rejected for reliability issues. Our final sample was 607, thus resulting in an overall 3.5 percent response rate, as shown in Table 1. Table 1. Sample response Freq Total sampling frame 17,473 100% Total returns 709 4.1% Rejected or screened surveys 102 0.6% Final sample 607 3.5% Pie Chart 1 summarizes the approximate position levels of respondents in our study. As can be seen, the majority of respondents (58 percent) are at or above the supervisory level. Pie Chart 1. Distribution of respondents according to position level 5% 2% 2% 3% 35% 17% 21% Senior Executive Vice President Director Manager Supervisor Technician Staff Contractor 15% Pie Chart 2 reveals 25 percent of respondents identified their primary role as within IT management, 18 percent responded IT security and 15 percent responded SAP infrastructure. Pie Chart 2. Primary role within the organization 4% 3% 2% 2% 5% 5% 8% 13% 25% 18% IT management IT security SAP infrastructure Application security Application development Security architecture Risk management SAP security SAP consultant Quality assurance Other 15% 11

12 Pie Chart 3 reports the respondents organizations primary industry focus. As shown, 18 percent of respondents identified financial services and insurance, which includes banking, investment management, insurance, brokerage, payments and credit cards. Nine percent responded manufacturing, and eight percent responded public sector / government. Pie Chart 3. Distribution of respondents according to primary industry classification 2% 2% 2% 3% Financial services & Insurance 18% Manufacturing Public sector/ Government 3% Retail 3% Healthcare 3% Services Technology & Software 3% Airlines/Automotive/Transportation 9% Hospitality 4% Internet & ISPs Pharmaceuticals 4% Communications/Telecom 8% Consumer Products 4% Energy/Oil & Gas Utilities 4% Chemicals 8% 5% Education 6% 7% Media Professional Services Other According to Pie Chart 4, the majority of respondent are located in larger-sized organizations with a global headcount of more than 1,000 employees. Pie Chart 4. Distribution of respondents according to world headcount 13% 5,000 to 25,000 people 51% 25,001 to 75,000 people 36% More than 75,000 people In addition to the United States, 70 percent of respondents reported their organization has employees located in Europe, 67 percent responded Canada, and 63 percent responded Asia- Pacific. Table 2. Location of employees United States 100% Europe 70% Canada 67% Asia-Pacific 63% Middle East & Africa 54% Latin America (including Mexico) 49% Total 403% 12

13 Limitations There are inherent limitations to survey research that need to be carefully considered before drawing inferences from findings. The following items are specific limitations that are germane to most web-based surveys. Non-response bias: The current findings are based on a sample of survey returns. We sent surveys to a representative sample of individuals, resulting in a large number of usable returned responses. Despite non-response tests, it is always possible that individuals who did not participate are substantially different in terms of underlying beliefs from those who completed the instrument. Sampling-frame bias: The accuracy is based on contact information and the degree to which the list is representative of individuals who are IT or IT security practitioners. We also acknowledge that the results may be biased by external events such as media coverage. We also acknowledge bias caused by compensating subjects to complete this research within a holdout period. Self-reported results: The quality of survey research is based on the integrity of confidential responses received from subjects. While certain checks and balances can be incorporated into the survey process, there is always the possibility that a subject did not provide a truthful response. 13

14 Appendix: Detailed Survey Results The following tables provide the frequency or percentage frequency of responses to all survey questions contained in this study. All survey responses were captured in mid December 2015 through January 4, 2016. Survey response Freq. Total sampling frame 17,473 Total returns 709 Rejected or screened surveys 102 Final sample 607 Response rate 3.5% Part 1. Screening S1a. Does your company use SAP? Yes 81% No 19% S1b. If no, do you use any of the following solutions? Oracle E-Business Suite (Financials) 25% Oracle JD Edwards 19% Oracle Siebel 19% Oracle PeopleSoft 13% Other 5% None of the above (stop) 19% S2. Which SAP products (e.g., modules) does your organization deploy? Enterprise management (ERP) 73% Technology platform (backbone) 69% Financial management 53% Data management 50% Customer relationship management (CRM) 46% Human capital management 41% Supply chain management 33% Supplier relationship management 33% Content and collaboration 25% Product life cycle management 25% Analytics 18% Other (please specify) 0% None of the above (stop) 0% Total 466% S3. What best describes your involvement in the security of SAP applications deployed by your organization? Very significant 31% Significant 47% Moderate 22% Minimal or none (stop) 0% 14

15 Part 2. Attributions: Are organizations prepared to deal with SAP security risks? Strongly agree and Agree responses combined Q1. My company s budget provides a higher funding level for network rather than application security. 68% Q2. C-level executives in my company tend to underestimate the risks associated with insecure SAP applications. 63% Q3. My company is confident in the security of SAP applications. 50% Q4. It is the responsibility of SAP, not my company, to ensure its applications and platform are safe and secure. 54% Q5. Our senior leadership understands the importance and criticality of SAP installations to our organization s bottom line. 76% Q6. Our organization understands the impact of the value of the data that could be lost from our SAP system. 41% Q7. Our senior leadership knows what data resides on our company s SAP systems. 23% Q8. Our organization has the required expertise to prevent, detect and respond to cyber attacks on our SAP applications. 49% Q9. SAP applications that are not connected to the Internet pose no real security threat to my company. 56% Q10. SAP applications are more secure than other applications deployed by my company. 62% Q11. Our senior leadership is aware of SAP cybersecurity risks. 21% Q12. Understanding the latest threats and vulnerabilities affecting SAP applications improves our organization s ability to manage cyber security risks. 73% Q13. My company is unlikely to experience a material security or data breach resulting from insecure SAP applications. 44% Q14. New technologies and trends such as cloud, mobile, big data and the Internet of Things increase the attack surface of our SAP applications and therefore the probability of a breach. 59% Q15. Understanding the cyber security and privacy risks are considered when evaluating whether or not to move SAP applications to the cloud. 43% Part 3. SAP security challenges Q16. Which function is most accountable to ensure the security of SAP systems, applications and processes? SAP security team 19% Information security 18% Audit 6% IT infrastructure 21% Risk executives 9% Board of directors 2% No one function is most accountable for SAP security 25% Q17a. Does your current approach to SAP security include segregation of duties and access controls? Yes 66% No 30% Unsure 4% Q17b. If yes, is it effective in safeguarding your companies core business systems? Yes 51% No 44% Unsure 5% 15

16 Q18. What is the likelihood that your company s SAP platform at any point in time contains one or more malware infections? Very likely 33% Likely 42% Not likely 21% No chance 4% The following items are rated using a 10-point scale ranging from 1 = lowest to 10 = highest. Q19. Please rate the level of difficulty in securing SAP applications. Average 1 or 2 4% 3 or 4 10% 5 or 6 30% 7 or 8 36% 9 or 10 22% Extrapolated value 6.73 Q20. Please rate your organization s level of concern about malware infection in the SAP infrastructure. 1 or 2 3% 3 or 4 12% 5 or 6 20% 7 or 8 31% 9 or 10 34% Extrapolated value 7.12 Q21. Please rate your organization s effectiveness in managing the SAP infrastructure. 1 or 2 0% 3 or 4 8% 5 or 6 17% 7 or 8 43% 9 or 10 32% Extrapolated value 7.48 Q22. Please rate the importance of compliance when deploying SAP applications. 1 or 2 1% 3 or 4 7% 5 or 6 15% 7 or 8 38% 9 or 10 39% Extrapolated value 7.64 16

17 Q23. Please rate the importance of continuous monitoring in ensuring SAP applications are safe and secure. 1 or 2 1% 3 or 4 5% 5 or 6 13% 7 or 8 42% 9 or 10 39% Extrapolated value 7.76 Q24. Using the following 10-point scale, what best defines your company s visibility into the security of SAP applications? 1 or 2 16% 3 or 4 28% 5 or 6 22% 7 or 8 21% 9 or 10 13% Extrapolated value 5.24 Q25. Using the following 10-point scale, how important is the ability to integrate existing security technologies including GRC, SIEM, network security and security operations management with your company s SAP security solution? 1 or 2 5% 3 or 4 4% 5 or 6 18% 7 or 8 38% 9 or 10 35% Extrapolated value 7.38 Q26. Using the following 10-point scale, how important is the ability to assess and audit SAP compliance with policies, industry standards and government regulations? 1 or 2 4% 3 or 4 2% 5 or 6 16% 7 or 8 20% 9 or 10 58% Extrapolated value 8.02 Q27. Using the following 10-point scale, how important is the ability to prioritize threats against SAP applications based on when the attack is likely to succeed? 1 or 2 3% 3 or 4 8% 5 or 6 8% 7 or 8 28% 9 or 10 53% Extrapolated value 7.90 17

18 Q28. Using the following 10-point scale, how important is the ability to detect zero-day vulnerabilities in SAP applications? 1 or 2 0% 3 or 4 1% 5 or 6 16% 7 or 8 40% 9 or 10 43% Extrapolated value 8.00 Q29. Using the following 10-point scale, how important is the ability to receive a direct feed of the latest SAP vulnerabilities confirmed by security experts? 1 or 2 3% 3 or 4 7% 5 or 6 18% 7 or 8 42% 9 or 10 30% Extrapolated value 7.28 Part 4. Data breaches and cyber attack Q30. What SAP applications are most susceptible to cyber attack? Please select your top four choices. Content and collaboration 64% Data management 56% Customer relationship management (CRM) 50% Technology platform (backbone) 48% Enterprise management (ERP) 37% Financial management 35% Supply chain management 33% Supplier relationship management 31% Human capital management 25% Analytics 11% Product life cycle management 5% Other (please specify) 5% Total 400% Q31. In your opinion, how will the frequency of cyber attacks against you company s SAP platform change over the next 24 months? Significant increase 12% Increase 35% No change 42% Decrease 8% Significant decrease 3% Q32. In your opinion, how will the stealth and sophistication of cyber attacks against you company s SAP platform change over the next 24 months? Significant increase 15% Increase 39% No change 37% Decrease 7% Significant decrease 2% 18

19 Q33. Who is the primary person most accountable if your organization has a SAP breach? CIO 26% CISO 18% CFO 1% SAP security 14% SAP BASIS administrator 8% No one person is accountable 30% Other (please specify) 3% Q34a. If your company s SAP platform was breached, how confident are you that this breach would be detected immediately? Very confident 6% Confident 19% Not confident 35% No confidence 40% Q34b. If your company s SAP platform was breached, how confident are you that this breach would be detected within one week? Very confident 12% Confident 23% Not confident 34% No confidence 31% Q34c. If your company s SAP platform was breached, how confident are you that this breach would be detected within one month? Very confident 15% Confident 26% Not confident 31% No confidence 28% Q34d. If your company s SAP platform was breached, how confident are you that this breach would be detected within one year? Very confident 23% Confident 30% Not confident 29% No confidence 18% Q35. To the best of your knowledge, how many times has your company s SAP platform been breached over the past 24 months? Zero 35% 1 or 2 32% 3 or 4 16% 5 or 6 12% 7 or 8 3% 9 or 10 1% More than 10 1% Extrapolated value 2.14 19

20 Q36. What best describes the impact of information theft, modification of data and disruption of business processes on your company s SAP? Catastrophic 17% Very serious 43% Serious 32% Not serious 8% Nominal or none 0% Q37. How much would it cost your company if your SAP systems were taken offline? Please note that the cost estimate should include all direct cash outlays, direct labor expenditures, indirect labor costs, overhead costs and lost business opportunities. Zero 0% Less than $100,000 15% 100,001 to $250,000 18% 250,001 to $500,000 23% 500,001 to $1,000,000 17% 1,000,001 to $5,000,000 11% 5,000,001 to $10,000,000 6% 10,000,001 to $25,000,000 5% 25,000,001 to $50,000,000 3% 50,000,001 to $100,000,000 2% More than $100,000,000 0% Extrapolated value 4,538,750 Part 5. Your Role D1. What organizational level best describes your current position? Senior Executive 2% Vice President 3% Director 17% Manager 21% Supervisor 15% Technician 35% Staff 5% Contractor 2% Other 0% D2. What best describes your primary role in the organization? Application development 8% SAP security 4% SAP infrastructure 15% SAP consultant 3% Application security 13% Security architecture 5% IT management 25% IT security 18% Quality assurance 2% Compliance/audit 1% Risk management 5% Network engineering 1% Other 0% 20

21 D3. What industry best describes your organization s industry focus? Agriculture/Food & Beverage 1% Airlines/Automotive/Transportation 4% Communications/Telecom 3% Consumer Products 3% Chemicals 2% Defense 1% Education 2% Energy/Oil & Gas 3% Entertainment 0% Financial services & Insurance 18% Healthcare 7% Hospitality 4% Internet & ISPs 4% Manufacturing 9% Media 2% Mining & Metals 1% Pharmaceuticals 4% Professional Services 2% Public sector/ Government 8% Research 0% Retail 8% Services 6% Technology & Software 5% Utilities 3% Other 0% D4. Where are your employees located? (check all that apply): United States 100% Canada 67% Europe 70% Middle East & Africa 54% Asia-Pacific 63% Latin America (including Mexico) 49% Total 403% D5. What is the worldwide headcount of your organization? 5,000 to 25,000 people 51% 25,001 to 75,000 people 36% More than 75,000 people 13% 21

22 Please contact research@ponemon.org or call us at 800.877.3118 if you have any questions. Ponemon Institute Advancing Responsible Information Management Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations. As a member of the Council of American Survey Research Organizations (CASRO),we uphold strict data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or company identifiable information in our business research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions. 22