THALES DATA THREAT REPORT

Similar documents
THALES DATA THREAT REPORT

2018 THALES DATA THREAT REPORT

2017 THALES DATA THREAT REPORT

2018 THALES DATA THREAT REPORT

GLOBAL PKI TRENDS STUDY

GLOBAL ENCRYPTION TRENDS STUDY

GLOBAL ENCRYPTION TRENDS STUDY

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT

2015 VORMETRIC INSIDER THREAT REPORT

5 Steps to Government IT Modernization

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES

Healthcare IT Modernization and the Adoption of Hybrid Cloud

Best Practices in Securing a Multicloud World

nshield GENERAL PURPOSE HARDWARE SECURITY MODULES

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

State of Cloud Survey GERMANY FINDINGS

Moving Workloads to the Public Cloud? Don t Forget About Security.

MOVING MISSION IT SERVICES TO THE CLOUD

Government IT Modernization and the Adoption of Hybrid Cloud

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals

IT Security: Managing a New Reality

Spotlight Report. Information Security. Presented by. Group Partner

The Value Of NEONet Cybersecurity. Why You Need To Protect Your The Value Of NEOnet Cybersecurity. Private Student Data In Ohio

THE IMPLICATIONS OF PERFORMANCE, SECURITY, AND RESOURCE CONSTRAINTS IN DIGITAL TRANSFORMATION

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

HOW IT INVESTMENT STRATEGIES HELP AND HINDER GOVERNMENT S ADOPTION OF CLOUD & AI

Gaps in Resources, Risk and Visibility Weaken Cybersecurity Posture

TechValidate Survey Report: SaaS Application Trends and Challenges

How to Create, Deploy, & Operate Secure IoT Applications

HOW MIDSIZE ORGANIZATIONS CAN MEET COMPLIANCE REQUIREMENTS AND ENHANCE CYBERSECURITY WITH MICRO-SEGMENTATION WHITE PAPER FEBRUARY 2018

Danish Cloud Maturity Survey 2018

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Have breaches declined since the massive Heartland Payments leak in 2008? What proportion of breaches are the result of hacking?

Sales Presentation Case 2018 Dell EMC

WHY LEGACY SECURITY ARCHITECTURES ARE INADEQUATE IN A MULTI-CLOUD WORLD

CYBERSECURITY RESILIENCE

Jim Reavis CEO and Founder Cloud Security Alliance December 2017

THALES esecurity: SECURING YOUR DIGITAL TRANSFORMATION

Future Shifts in Enterprise Architecture Evolution. IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013

Business Technology Briefing: Fear of Flying, And How You Can Overcome It

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES

Application Networking Trends

Angela McKay Director, Government Security Policy and Strategy Microsoft

Securing Your Cloud Introduction Presentation

Next-Generation HCI: Fine- Tuned for New Ways of Working

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Modern Database Architectures Demand Modern Data Security Measures

Roadmap to the Efficient Cloud: 3 Checkpoints for the Modern Enterprise

10 Cloud Myths Demystified

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE

BRINGING CLARITY TO THE CLOUD

Cloud Communications for Healthcare

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

THE THALES SECURITY WORLD ARCHITECTURE

Why Enterprises Need to Optimize Their Data Centers

Combating Cyber Risk in the Supply Chain

HyTrust government cloud adoption survey

74% 2014 SIEM Efficiency Report. Hunting out IT changes with SIEM

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

ENABLING SECURE CLOUD CONNECTIVITY. Create a Successful Cloud Strategy with Reliable Connectivity Solutions

AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs

Global Information Security Survey. A life sciences perspective

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

Virtualizing Networks:

Securing Digital Transformation

Who s Protecting Your Keys? August 2018

Simple and Secure Micro-Segmentation for Internet of Things (IoT)

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Protect Your Data the Way Banks Protect Your Money

Clearing the Path to Micro-Segmentation. A Strategy Guide for Implementing Micro- Segmentation in Hybrid Clouds

Retail Security in a World of Digital Touchpoint Complexity

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

CA Security Management

Todd Sander Vice President, Research e.republic Inc.

Cloud Computing: Making the Right Choice for Your Organization

EMBRACING THE CLOUD: Why the Time Is Now

Security Asia The biggest breaches and cyber-attacks of 2017, and what threats to expect in 2018

Why Converged Infrastructure?

What It Takes to be a CISO in 2017

How Your Organization Can Drive Success in the Age of Digital Disruption

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Unlock The Value Of Cloud: A Spotlight On IT Executives

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

Protecting Sensitive Data in the Cloud. Presented by: Eric Wolff Thales e-security

A CISO GUIDE TO MULTI-CLOUD SECURITY Achieving Transparent Visibility and Control and Enhanced Risk Management

Cyber Security in Timothy Brown Dell Fellow and CTO Dell Security

Governance for the Public Sector Cloud

Cybersecurity. Securely enabling transformation and change

2018 Report The State of Securing Cloud Workloads

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

Business White Paper. Healthcare IT In The Cloud: Predicting Threats, Protecting Patient Data

Security in India: Enabling a New Connected Era

Build confidence in the cloud Best practice frameworks for cloud security

The Challenge of Cloud Security

IDENTITY: A KEY ELEMENT OF BUSINESS-DRIVEN SECURITY

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

Cybersecurity and Nonprofit

Building a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.

Transcription:

2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat

THE TOPLINE Federal agency data is under siege. Over half of all agency IT security pros surveyed report a breach in the past year The U.S. federal government continues to struggle with the same cybersecurity challenges that most organizations are wrestling with, but against a different set of obstacles than typical commercial enterprises. Just as elsewhere, breach counts are continuing to mount even as record increases in IT security spending continue. Federal agencies, however, seem to be experiencing a Perfect Storm around data that is putting agency secrets, and the private data of over 330 million citizens, at risk by: Mounting cyber threats and attacks from cyber thieves and nation state hackers Requirements to make government more accessible and transparent via digital transformation The necessity of supporting and maintaining some of the oldest systems and software found anywhere DATA BREACHES ARE THE NEW REALITY Breached ever CLOUD DRIVES EFFICIENCY, CREATES NEW EXPOSURES Levels of concern are high Breached in the last year 71% of U.S. federal agencies have now been breached 57% 34% 18% 2018 2017 2016 3x Rates of breaches in the last year are up 3x from 2016 in this year s results 72% Fear increased vulnerabilities 68% Worry about breaches at the cloud provider 67% Think cloud privileged users are a threat Massive adoption compounds the problem or more using 5 or more IaaS or PaaS providers Versus 45% 20% 48% for commercial enterprises 67% Are apprehensive about meeting their compliance requirements Using more than 100 SaaS applications Where data is inherently harder to control U.S. FEDERAL RESPONDENTS ARE STILL NOT PUTTING THEIR MONEY WHERE THEIR DATA IS THE LARGEST AMOUNT OF RESPONDENTS PLAN TO INCREASE SPENDING ON ENDPOINT AND MOBILE DEVICES, DESPITE RANKING ENDPOINT AND MOBILE DEVICES AS LEAST EFFECTIVE AT PROTECTING SENSITIVE FEDERAL DATA A MAJOR DISCONNECT. Garrett Bekker, 451 Research Principal Analyst, Information Security Endpoint & mobile device 64% 56% Network 74% 29% Data in motion 78% 50% ENCRYPTION IS THE CRITICAL SOLUTION Encryption needed to drive use of digitally transformative technologies: Cloud Big Data IoT Containers 25% 34% 34% 42% Good news Agencies are implementing, or planning to implement, encryption technologies this year: CREDIT CARD Data at rest 19% Rated very or extremely effective Analysis & correlation tools 70% 50% Spending increase 1234 5678 9123 4567 89% 88% 84% Data masking Database and file encryption Encryption in the cloud Application layer encryption 2 2018 THALES DATA THREAT REPORT U.S. FEDERAL EDITION

FEDERAL AGENCY DATA IS UNDER SIEGE Over half of all agency IT security pros surveyed report a breach in the past year More than any industry we measured this year, federal agencies are experiencing higher rates of data breaches. Rates of data breaches in the last year reported by our federal respondents are 57% (versus 36% in our total sample), more than three times higher than the federal rate of 18% measured only two years ago. Federal agencies experience a very challenging threat environment in which they must protect sensitive data. They are targeted by criminals seeking citizen s private data, nation state hackers with their own agendas as well as suffering from perennial problems with funding, staffing and antiquated systems long since discarded by commercial enterprises. But these factors don t completely explain the steep rise in breach rates federal agencies are encountering. Breached ever Breached in the last year 57% 34% 18% 71% of U.S. federal agencies have now been breached 3x 2018 2017 2016 Rates of breaches in the last year are up 3x from 2016 in this year s results In spite of the challenges, agency IT security pros are reporting that positive developments are happening. Spending is sharply increasing this year. 93% in total reported that their agencies will increase IT security spending and 73% report that their IT security spending will be much higher. This change comes after several years where federal agencies rates of IT security spending increases were well below those of commercial enterprises. They also report implementing, or planning to implement, the encryption technologies that protect data best at rates of or higher. Spending increases: Federal agency rates of increasing IT security spending at a 'Much Higher' rate by year 2018 2017 2016 24% 13% 73% 88% of federal agency IT security pros report their organizations are implementing, or plan to implement database and file encryption this year. Implementing now, or planning to implement, these top tools for protecting sensitive data. CREDIT CARD 1234 5678 9123 4567 89% Data masking 88% Database and file encryption 84% Encryption in the cloud Application layer encryption 2018 THALES DATA THREAT REPORT U.S. FEDERAL EDITION 3

DIGITAL TRANSFORMATION IS ENABLING GOVERNMENT EFFICIENCY, AND CREATING NEW RISKS FOR DATA New environments require new approaches to protecting citizen data, government secrets and other sensitive information As in the private sector, digital transformation has evolved as a significant driver for data threats at federal agencies. The overall adoption of Cloud and SaaS applications, Big Data implementations, IoT, containers, mobile payments and blockchain technologies also raise security risks owing to their relative newness, the unique approaches required to protect data within each environment and the sheer scale of deployments. What s more, sensitive data will be used within these environments as reported by 81% of respondents. Adoption of the technologies for digital transformation in federal agencies is high 81% Using sensitive data within these environments Adoption levels for digital transformation technologies by U.S. federal agencies Cloud Big Data IoT Blockchain Mobile payments 100% 96% 88% 87% 80% Nowhere is the risk to federal agency data clearer than in cloud environments. Due to the requirements of digital government initiatives, agency IT security pros report much higher adoption of cloud environments than their commercial counterparts. 45% are using 5 or more IaaS or PaaS environments (versus only 20% for commercial enterprises) and 48% are using more than 100 SaaS applications (versus 22% of all surveyed globally). Massive adoption compounds the problem 45% 20% 48% or more using 5 or more IaaS or PaaS providers Versus for commercial enterprises Using more than 100 SaaS applications Where data is inherently harder to control For IaaS and PaaS, a specific data security plan must be created for each deployment and environment, then enforced by policy, operational methods and tools. For SaaS environments the case is more complex. In many environments agencies and enterprises are given little control over how their data is stored or protected, and in some cases where data security controls are available (such as AWS S3 storage buckets), we ve often seen agencies fail to take control of their data with tools such as encryption that are readily available. Complicating the picture, agencies also seem to prefer that the cloud provider control their encryption keys rather than own and manage the keys themselves (34% to 32%), yet were also concerned about the custodianship of encryption keys in the cloud (69%). A basic security maxim is that whoever owns the keys, controls the data. Effectively, this leaves control of agency data security in the hands of the cloud provider. It s also a potential violation of NIST 800-53, FedRAMP and the federal risk management framework that requires agencies to maintain control of access to their data. 23% of federal agencies are using encryption to protect cloud data today 81% of federal agency IT security pros we surveyed report using sensitive data with tools for digital transformation cloud, big data, IoT, containers, mobile payments and blockchain Top cloud security concerns Shared infrastructure vulnerabilities Custodianship of encryption keys Security breaches at the cloud provider Compliance requirements Cloud privileged users 72% 69% 68% 67% 67% 4 2018 THALES DATA THREAT REPORT U.S. FEDERAL EDITION

NOT PUTTING THEIR MONEY WHERE THEIR DATA IS Respondents report biggest spending increases in tools that no longer protect data effectively This year for the first time in our polling, we found that respondents clearly recognize that the designed specifically for protecting data are the most effective tools for doing so. Data-in-motion and data-at-rest were in a virtual tie at 78% and respectively as the most effective tools for protecting data. But this isn t where increases in IT security spending are going. In fact, the data-at-rest that are the most effective at protecting large data stores are getting the lowest increases in spending, at only 19%, while end point and mobile garner the biggest increases (56%). In past years, there was often poor recognition of the most effective tools for data security, and so agencies could be at least partially forgiven for investing in the tools they believed were more effective. But not this year. It s clear respondents understood what s effective and working, but that s not where the money is going. Endpoint & mobile device Network Data in motion Data at rest Analysis & correlation tools 64% 56% 29% 74% 78% 50% 19% 70% 50% Rated very or extremely effective Spending Increase The largest amount of respondents plan to increase spending on endpoint and mobile devices, despite ranking endpoint and mobile devices as least effective at protecting sensitive federal data a major disconnect. Garrett Bekker, 451 Research Principal Analyst, Information Security Author of the 2018 Thales Data Threat Report In part, the usual concerns about budget and priorities are cited as reasons for low data security adoption. But perhaps a larger part of the reason for the disconnect may be the perception that data security is hard, expensive and has a high impact on operations. Usually this perception is the result of having experience with older legacy data security tools. Modern tools have lower costs than in the past, extremely low performance overhead (as a result of using hardware encryption capabilities built into today s CPUS) as well as low impact on business processes and operations. In some cases, no changes are required to applications and operations on deployment of data security tools. Perceived barriers to data security 53% 47% 41% 36% 34% 30% Lack of budget Perceived impacts on performance and operations Perceived complexity Lack of perceived need Low priority Lack of staff 2018 THALES DATA THREAT REPORT U.S. FEDERAL EDITION 5

ENCRYPTION IS A CRITICAL TOOL NEEDED TO PROTECT SENSITIVE DATA Protects data in traditional data centers, cloud, big data, and wherever sensitive information is used or stored There s some good news to mix in with the other results this year. Not only did respondents identify that encryption technologies as the most effective way to protect data for the first time, but in spite of low spending levels, projects are underway to implement encryption for data protection at fairly high levels. Respondents identified that they are implementing now, or planning to implement encryption in the cloud, application layer encryption, database and file encryption and data masking at rates of or higher in the next year. Considering that only 23% are using encryption in the cloud today, an 84% number for respondents implementing or planning to implement this year is an impressive turn around. Good news Agencies are implementing, or planning to implement, encryption technologies this year: CREDIT CARD 1234 5678 9123 4567 89% 88% 84% Data masking Database and file encryption Encryption in the cloud Application layer encryption 84% 88% 84% Cloud Encryption Gateway or CASB Hardware Security Modules (HSMs) BYOK for cloud environments Encryption is also a clear leader among tools that agency professionals are looking for to increase usage of both cloud, big data, IoT and containers. Cloud encryption tools such as encryption gateways and third party encryption key managers for cloud environments are also showing strong plans for adoption as ways that respondents are looking at to bring cloud based data back under agency control. 34% 34% 42% 25% Cloud: The top tool needed for more cloud use Big Data: The capability to analyze encrypted/ tokenized data in big data environments the top tool needed for big data adoption IoT: Secure authentication (an encryption technology) a top tool need for more IoT adoption Containers: Encryption drives container usage 6 2018 THALES DATA THREAT REPORT U.S. FEDERAL EDITION

The U.S. federal government continues to struggle with the same cybersecurity challenges that most verticals are wrestling with, but against a different set of obstacles that other markets don t usually face. Like most other sectors, data security spending plans in the U.S. federal sector are up compared to last year WAY up. Perhaps more importantly, for the first time, U.S. federal ranks the highest of any U.S. vertical in terms of spending increase plans more than 9 out of 10 (93%) plan to increase security spending in 2018. The bad news is that reports by U.S. federal respondents of successful breaches last year (57%) are far ahead of the global average (36%), and also the global federal sector (26%). Further, 70% of U.S. federal respondents say their agencies were breached at some point in the past. Garrett Bekker, 451 Research Principal Analyst, Information Security Author of the 2018 Thales Data Threat Report ENCRYPTION IS THE SOLUTION Encryption technologies are critical to protecting data at rest, in motion and in use. Encryption secures data to meet compliance requirements, best practices and privacy regulations. It s the only tool set that ensures the safety and control of data not only in the traditional data center, but also with the technologies used to drive the digital transformation of the enterprise. ABOUT THALES Thales esecurity is the leader in advanced data security solutions and services that deliver trust wherever information is created, shared or stored. We ensure that the data belonging to companies and government entities is both secure and trusted in any environment on-premises, in the cloud, in data centers or big data environments without sacrificing business agility. Security doesn t just reduce risk, it s an enabler of the digital initiatives that now permeate our daily lives digital money, e-identities, healthcare, connected cars and with the internet of things (IoT) even household devices. Thales provides everything an organization needs to protect and manage its data, identities and intellectual property and meet regulatory compliance through encryption, advanced key management, tokenization, privileged user control and high assurance solutions. Security professionals around the globe rely on Thales to confidently accelerate their organization s digital transformation. Thales esecurity is part of Thales Group. CLICK HERE TO TO READ THE FULL REPORT OUR SPONSORS GEOBRIDGE 2018 THALES DATA THREAT REPORT U.S. FEDERAL EDITION 7

2018 Thales