SlideShare une entreprise Scribd logo
1  sur  1
 
	
  	
  
CompTIA	
  Member	
  Services,	
  LLC	
  
	
  
	
   	
  
IT	
  Security	
  Still	
  a	
  Critical	
  Area	
  After	
  a	
  Decade	
  of	
  Study	
  
CompTIA’s	
  10th
	
  Annual	
  Information	
  Security	
  Trends	
  study	
  comes	
  at	
  a	
  time	
  of	
  dramatic	
  change	
  in	
  the	
  IT	
  
industry.	
  Cloud	
  computing,	
  mobility,	
  and	
  big	
  data	
  are	
  altering	
  the	
  landscape	
  and	
  causing	
  technology	
  to	
  
be	
  ingrained	
  in	
  business	
  operations	
  like	
  never	
  before.	
  Yet	
  security	
  remains	
  a	
  high	
  priority,	
  even	
  among	
  
these	
  trendy	
  topics.	
  Four	
  out	
  of	
  five	
  companies	
  place	
  a	
  higher	
  priority	
  on	
  security	
  today	
  than	
  they	
  did	
  
two	
  years	
  ago,	
  and	
  PricewaterhouseCoopers	
  estimates	
  that	
  global	
  cybersecurity	
  spending	
  hit	
  $60	
  billion	
  
in	
  2011.	
  	
  
As	
  companies	
  take	
  actions	
  to	
  address	
  
new	
  trends	
  in	
  technology—such	
  as	
  
detailed	
  reviews	
  of	
  cloud	
  provider	
  
security—they	
  are	
  also	
  finding	
  that	
  
new	
  technology	
  is	
  causing	
  end	
  users	
  
to	
  play	
  a	
  more	
  prominent	
  role	
  in	
  
security	
  schemes.	
  End	
  users	
  are	
  
important	
  because	
  the	
  human	
  
element	
  is	
  playing	
  a	
  larger	
  part	
  in	
  
security	
  breaches.	
  Not	
  only	
  does	
  it	
  
contribute	
  to	
  over	
  half	
  of	
  root	
  cause	
  
of	
  breaches,	
  but	
  46%	
  of	
  companies	
  
also	
  see	
  it	
  becoming	
  more	
  of	
  a	
  factor	
  
over	
  the	
  past	
  two	
  years.	
  The	
  top	
  
source	
  of	
  human	
  error	
  is	
  end	
  user	
  
failure	
  to	
  follow	
  procedure.	
  It	
  is	
  
difficult	
  for	
  a	
  product	
  to	
  adequately	
  
address	
  this	
  issue,	
  so	
  companies	
  
must	
  consider	
  new	
  ways	
  of	
  educating	
  their	
  workforce.	
  Instead	
  of	
  one-­‐time	
  training,	
  companies	
  should	
  
build	
  programs	
  that	
  are	
  ongoing	
  and	
  interactive,	
  with	
  metrics	
  that	
  track	
  effectiveness.	
  
Another	
  source	
  of	
  error	
  could	
  be	
  the	
  IT	
  staff.	
  While	
  nearly	
  6	
  out	
  of	
  10	
  companies	
  believe	
  their	
  staff	
  has	
  
an	
  appropriate	
  level	
  of	
  expertise,	
  companies	
  are	
  aware	
  that	
  skills	
  gaps	
  exist	
  in	
  areas	
  such	
  as	
  cloud	
  
security,	
  mobile	
  security,	
  and	
  data	
  loss	
  prevention.	
  These	
  gaps	
  can	
  be	
  closed	
  with	
  training	
  and	
  
certification—84%	
  of	
  companies	
  report	
  a	
  positive	
  ROI	
  from	
  certifying	
  their	
  staff.	
  
The	
  IT	
  channel	
  can	
  also	
  play	
  a	
  role	
  in	
  improving	
  the	
  security	
  posture	
  for	
  organizations.	
  Three	
  fourths	
  of	
  
channel	
  firms	
  are	
  involved	
  in	
  security	
  in	
  some	
  form,	
  with	
  18%	
  offering	
  security	
  as	
  a	
  stand-­‐alone	
  product	
  
or	
  service.	
  As	
  with	
  other	
  areas	
  of	
  technology,	
  channel	
  firms	
  are	
  looking	
  for	
  ways	
  to	
  offer	
  security	
  in	
  a	
  
recurring	
  revenue	
  model.	
  This	
  could	
  be	
  offering	
  cloud	
  security	
  products	
  in	
  place	
  of	
  traditional	
  on-­‐
premise	
  hardware	
  or	
  software,	
  or	
  it	
  could	
  be	
  offering	
  security	
  as	
  a	
  managed	
  service.	
  Education	
  for	
  end	
  
users	
  represents	
  a	
  prime	
  opportunity	
  here	
  if	
  channel	
  firms	
  can	
  build	
  effective,	
  ongoing	
  training	
  
programs.	
  Addressing	
  this	
  important	
  topic	
  is	
  also	
  good	
  business:	
  66%	
  of	
  channel	
  firms	
  involved	
  with	
  
security	
  expect	
  security-­‐related	
  revenue	
  to	
  grow	
  in	
  the	
  next	
  year,	
  with	
  16%	
  expecting	
  significant	
  growth	
  
of	
  10%	
  or	
  greater.	
  
CompTIA’s	
  10th
	
  Annual	
  Information	
  Security	
  Trends	
  study	
  was	
  developed	
  from	
  a	
  survey	
  of	
  500	
  end	
  user	
  
firms	
  and	
  368	
  channel	
  firms	
  in	
  the	
  US.	
  The	
  data	
  was	
  collected	
  during	
  September/October	
  2012.	
  The	
  full	
  
report	
  is	
  available	
  at	
  no	
  cost	
  to	
  CompTIA	
  members.	
  Visit	
  www.comptia.org/research	
  or	
  contact	
  
research@comptia.org	
  for	
  details.	
  
Human&Element&a&Major&Part&of&Security&Risk&
Factors(in(
Security(Breaches(
54%(
46%(
Human(
Error(
Technology(
Error(
Top(Human(Error(Sources(
(
49% &End&user&failure&to&follow&
&policies&and&procedures&
(
36%& &IT&staff&failure&to&follow&
&policies&and&procedures&
&
34%& &General&carelessness&
&regarding&security&
&
34% &Lack&of&security&experBse&
&with&website/applicaBons(
Source:&CompTIA’s&10th%Annual%Informa0on%Security%Trends%study&
Base:&308&end&users&experiencing&security&breaches&

Contenu connexe

Tendances

2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey ReportDImension Data
 
CompTIA 5th Annual State of the Channel Study
CompTIA 5th Annual State of the Channel StudyCompTIA 5th Annual State of the Channel Study
CompTIA 5th Annual State of the Channel StudyCompTIA
 
CompTIA - Brazil Research Summary Final
CompTIA - Brazil Research Summary FinalCompTIA - Brazil Research Summary Final
CompTIA - Brazil Research Summary FinalAssespro Nacional
 
Mobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceBlueboxer2014
 
Sameer Mitter |The impact of automation on the workforce
Sameer Mitter |The impact of automation on the workforceSameer Mitter |The impact of automation on the workforce
Sameer Mitter |The impact of automation on the workforceSameer Mitter
 
White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...Samsung Biz Mobile
 
Managing Mobile Menaces
Managing Mobile MenacesManaging Mobile Menaces
Managing Mobile MenacesNalneesh Gaur
 
2021 IDG Security Priorities Study
2021 IDG Security Priorities Study2021 IDG Security Priorities Study
2021 IDG Security Priorities StudyIDG
 
Are you prepared for information compliance
 Are you prepared for information compliance  Are you prepared for information compliance
Are you prepared for information compliance Mia Richards
 
CompTIA Breakaway 2011 press research briefing v final
CompTIA Breakaway 2011 press research briefing v finalCompTIA Breakaway 2011 press research briefing v final
CompTIA Breakaway 2011 press research briefing v finalCompTIA
 
Semiconductors: The Changing Landscape
Semiconductors: The Changing LandscapeSemiconductors: The Changing Landscape
Semiconductors: The Changing LandscapeMike Kay
 
Technology Vision 2016 - Infographic
Technology Vision 2016 - InfographicTechnology Vision 2016 - Infographic
Technology Vision 2016 - InfographicAccenture Technology
 
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)Data Driven Innovation
 
Final 2021 security_priorities_infographic (1)
Final 2021 security_priorities_infographic (1)Final 2021 security_priorities_infographic (1)
Final 2021 security_priorities_infographic (1)IDG
 
2020 IDG Role & Influence of the Technology Decision-Maker
2020 IDG Role & Influence of the Technology Decision-Maker2020 IDG Role & Influence of the Technology Decision-Maker
2020 IDG Role & Influence of the Technology Decision-MakerIDG
 

Tendances (18)

2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report
 
CompTIA 5th Annual State of the Channel Study
CompTIA 5th Annual State of the Channel StudyCompTIA 5th Annual State of the Channel Study
CompTIA 5th Annual State of the Channel Study
 
CompTIA - Brazil Research Summary Final
CompTIA - Brazil Research Summary FinalCompTIA - Brazil Research Summary Final
CompTIA - Brazil Research Summary Final
 
Plan for the Worst; Fight for the Best
Plan for the Worst; Fight for the BestPlan for the Worst; Fight for the Best
Plan for the Worst; Fight for the Best
 
Mobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the Workplace
 
Sameer Mitter |The impact of automation on the workforce
Sameer Mitter |The impact of automation on the workforceSameer Mitter |The impact of automation on the workforce
Sameer Mitter |The impact of automation on the workforce
 
White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...
 
Managing Mobile Menaces
Managing Mobile MenacesManaging Mobile Menaces
Managing Mobile Menaces
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
2021 IDG Security Priorities Study
2021 IDG Security Priorities Study2021 IDG Security Priorities Study
2021 IDG Security Priorities Study
 
Are you prepared for information compliance
 Are you prepared for information compliance  Are you prepared for information compliance
Are you prepared for information compliance
 
CompTIA Breakaway 2011 press research briefing v final
CompTIA Breakaway 2011 press research briefing v finalCompTIA Breakaway 2011 press research briefing v final
CompTIA Breakaway 2011 press research briefing v final
 
Semiconductors: The Changing Landscape
Semiconductors: The Changing LandscapeSemiconductors: The Changing Landscape
Semiconductors: The Changing Landscape
 
Technology Vision 2016 - Infographic
Technology Vision 2016 - InfographicTechnology Vision 2016 - Infographic
Technology Vision 2016 - Infographic
 
2018 NBOA Annual Meeting Information Technology Track
2018 NBOA Annual Meeting Information Technology Track2018 NBOA Annual Meeting Information Technology Track
2018 NBOA Annual Meeting Information Technology Track
 
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
Data Governance: cos’è e perché è importante? (Elena Arista, Erwin)
 
Final 2021 security_priorities_infographic (1)
Final 2021 security_priorities_infographic (1)Final 2021 security_priorities_infographic (1)
Final 2021 security_priorities_infographic (1)
 
2020 IDG Role & Influence of the Technology Decision-Maker
2020 IDG Role & Influence of the Technology Decision-Maker2020 IDG Role & Influence of the Technology Decision-Maker
2020 IDG Role & Influence of the Technology Decision-Maker
 

Similaire à CompTIA 10th Security Study

State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...at MicroFocus Italy ❖✔
 
State of Security Operations 2016
State of Security Operations 2016State of Security Operations 2016
State of Security Operations 2016Tim Grieveson
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudSymantec
 
Information Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFInformation Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFAlexander Goodwin
 
White Paper: The Age of Data
White Paper: The Age of DataWhite Paper: The Age of Data
White Paper: The Age of DataKim Cook
 
New Horizons - 2019 State of IT Training Report
New Horizons - 2019 State of IT Training ReportNew Horizons - 2019 State of IT Training Report
New Horizons - 2019 State of IT Training ReportTynan Fischer
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesCompTIA
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryCompTIA
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise ReportOkta-Inc
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Accenture Technology
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5accenture
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software developmentMuhammadArif823
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital FutureCognizant
 
Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Thoughtworks
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentationrevaathey
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentationrevaathey
 
[CompTIA] 4th Annual Trends in Cloud Computing - Full Report
[CompTIA] 4th Annual Trends in Cloud Computing - Full Report[CompTIA] 4th Annual Trends in Cloud Computing - Full Report
[CompTIA] 4th Annual Trends in Cloud Computing - Full ReportAssespro Nacional
 
50 Things You Absolutely Need To Know About The Cloud
50 Things You Absolutely Need To Know About The Cloud50 Things You Absolutely Need To Know About The Cloud
50 Things You Absolutely Need To Know About The CloudApptix
 

Similaire à CompTIA 10th Security Study (20)

Global Threats| Cybersecurity|
Global Threats| Cybersecurity| Global Threats| Cybersecurity|
Global Threats| Cybersecurity|
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...
 
State of Security Operations 2016
State of Security Operations 2016State of Security Operations 2016
State of Security Operations 2016
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
Information Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFInformation Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDF
 
White Paper: The Age of Data
White Paper: The Age of DataWhite Paper: The Age of Data
White Paper: The Age of Data
 
New Horizons - 2019 State of IT Training Report
New Horizons - 2019 State of IT Training ReportNew Horizons - 2019 State of IT Training Report
New Horizons - 2019 State of IT Training Report
 
The quest for digital skills
The quest for digital skillsThe quest for digital skills
The quest for digital skills
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian Summary
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital Future
 
Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
[CompTIA] 4th Annual Trends in Cloud Computing - Full Report
[CompTIA] 4th Annual Trends in Cloud Computing - Full Report[CompTIA] 4th Annual Trends in Cloud Computing - Full Report
[CompTIA] 4th Annual Trends in Cloud Computing - Full Report
 
50 Things You Absolutely Need To Know About The Cloud
50 Things You Absolutely Need To Know About The Cloud50 Things You Absolutely Need To Know About The Cloud
50 Things You Absolutely Need To Know About The Cloud
 

Plus de Assespro Nacional

2018 aleti+-it-census-results-2017
2018 aleti+-it-census-results-20172018 aleti+-it-census-results-2017
2018 aleti+-it-census-results-2017Assespro Nacional
 
WCIT 2016 | Informativo nº4
WCIT 2016 | Informativo nº4WCIT 2016 | Informativo nº4
WCIT 2016 | Informativo nº4Assespro Nacional
 
WCIT 2016 - Informativo nº3
WCIT 2016 - Informativo nº3WCIT 2016 - Informativo nº3
WCIT 2016 - Informativo nº3Assespro Nacional
 
[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...
[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...
[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...Assespro Nacional
 
2014 - Censo ALETI do Setor de TIC: Resultados
2014 - Censo ALETI do Setor de TIC: Resultados2014 - Censo ALETI do Setor de TIC: Resultados
2014 - Censo ALETI do Setor de TIC: ResultadosAssespro Nacional
 
Dissertação - Sr. Luiz Paiva
Dissertação - Sr. Luiz PaivaDissertação - Sr. Luiz Paiva
Dissertação - Sr. Luiz PaivaAssespro Nacional
 
Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...
Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...
Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...Assespro Nacional
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping IIAssespro Nacional
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...Assespro Nacional
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados
[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados
[Prêmio Imre Simon 2014] Multimídia Educacional - AtestadosAssespro Nacional
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping
[Prêmio Imre Simon 2014] Multimídia Educacional - ClippingAssespro Nacional
 
[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos
[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos
[Prêmio Imre Simon 2014] Grupo Consulters - DepoimentosAssespro Nacional
 
Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...
Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...
Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...Assespro Nacional
 
Guia GIFE - IBGC 2014: Guia das Melhores Práticas de Governança para Institu...
Guia GIFE - IBGC 2014:  Guia das Melhores Práticas de Governança para Institu...Guia GIFE - IBGC 2014:  Guia das Melhores Práticas de Governança para Institu...
Guia GIFE - IBGC 2014: Guia das Melhores Práticas de Governança para Institu...Assespro Nacional
 
[GPATS 2013] The São Paulo Declaration
[GPATS 2013] The São Paulo Declaration[GPATS 2013] The São Paulo Declaration
[GPATS 2013] The São Paulo DeclarationAssespro Nacional
 
[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
[GPATS 2013]  Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...[GPATS 2013]  Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...Assespro Nacional
 
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...Assespro Nacional
 
[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia
[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia
[GPATS 2013] Ivo Ivanovski - Master Presentation of MacedoniaAssespro Nacional
 
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and ServicesAssespro Nacional
 

Plus de Assespro Nacional (20)

2018 aleti+-it-census-results-2017
2018 aleti+-it-census-results-20172018 aleti+-it-census-results-2017
2018 aleti+-it-census-results-2017
 
WCIT 2016 | Informativo nº4
WCIT 2016 | Informativo nº4WCIT 2016 | Informativo nº4
WCIT 2016 | Informativo nº4
 
WCIT 2016 - Informativo nº3
WCIT 2016 - Informativo nº3WCIT 2016 - Informativo nº3
WCIT 2016 - Informativo nº3
 
[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...
[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...
[WCIT 2016] World Congress on Information Technology | Confresso Mundial de T...
 
2014 - Censo ALETI do Setor de TIC: Resultados
2014 - Censo ALETI do Setor de TIC: Resultados2014 - Censo ALETI do Setor de TIC: Resultados
2014 - Censo ALETI do Setor de TIC: Resultados
 
Dissertação - Sr. Luiz Paiva
Dissertação - Sr. Luiz PaivaDissertação - Sr. Luiz Paiva
Dissertação - Sr. Luiz Paiva
 
Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...
Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...
Propostas para Um Programa de Governo Voltado à Tecnologia da Informação e Co...
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping II
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...
[Prêmio Imre Simon 2014] Multimídia Educacional - Depoimentos Clientes Interm...
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados
[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados
[Prêmio Imre Simon 2014] Multimídia Educacional - Atestados
 
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping
[Prêmio Imre Simon 2014] Multimídia Educacional - Clipping
 
[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos
[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos
[Prêmio Imre Simon 2014] Grupo Consulters - Depoimentos
 
Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...
Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...
Prêmio Prof. Dr. Imre Simon Ed. 2014 - Reportagens sobre a Infraestrutura da ...
 
Guia GIFE - IBGC 2014: Guia das Melhores Práticas de Governança para Institu...
Guia GIFE - IBGC 2014:  Guia das Melhores Práticas de Governança para Institu...Guia GIFE - IBGC 2014:  Guia das Melhores Práticas de Governança para Institu...
Guia GIFE - IBGC 2014: Guia das Melhores Práticas de Governança para Institu...
 
Censo do Setor de TI 2013
Censo do Setor de TI 2013 Censo do Setor de TI 2013
Censo do Setor de TI 2013
 
[GPATS 2013] The São Paulo Declaration
[GPATS 2013] The São Paulo Declaration[GPATS 2013] The São Paulo Declaration
[GPATS 2013] The São Paulo Declaration
 
[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
[GPATS 2013]  Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...[GPATS 2013]  Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
[GPATS 2013] Makoto (Mac) Yokozawa - Cyber Immune Systems That Helps Trust a...
 
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...
[GPATS 2013 ] Bernd FRIEDRICH and Milena SEIBOLD - Measuring the IT Industry ...
 
[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia
[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia
[GPATS 2013] Ivo Ivanovski - Master Presentation of Macedonia
 
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services
[GPATS 2013] Luís Stein - Free Trade Policies in ICT Goods and Services
 

Dernier

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Dernier (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

CompTIA 10th Security Study

  • 1.       CompTIA  Member  Services,  LLC         IT  Security  Still  a  Critical  Area  After  a  Decade  of  Study   CompTIA’s  10th  Annual  Information  Security  Trends  study  comes  at  a  time  of  dramatic  change  in  the  IT   industry.  Cloud  computing,  mobility,  and  big  data  are  altering  the  landscape  and  causing  technology  to   be  ingrained  in  business  operations  like  never  before.  Yet  security  remains  a  high  priority,  even  among   these  trendy  topics.  Four  out  of  five  companies  place  a  higher  priority  on  security  today  than  they  did   two  years  ago,  and  PricewaterhouseCoopers  estimates  that  global  cybersecurity  spending  hit  $60  billion   in  2011.     As  companies  take  actions  to  address   new  trends  in  technology—such  as   detailed  reviews  of  cloud  provider   security—they  are  also  finding  that   new  technology  is  causing  end  users   to  play  a  more  prominent  role  in   security  schemes.  End  users  are   important  because  the  human   element  is  playing  a  larger  part  in   security  breaches.  Not  only  does  it   contribute  to  over  half  of  root  cause   of  breaches,  but  46%  of  companies   also  see  it  becoming  more  of  a  factor   over  the  past  two  years.  The  top   source  of  human  error  is  end  user   failure  to  follow  procedure.  It  is   difficult  for  a  product  to  adequately   address  this  issue,  so  companies   must  consider  new  ways  of  educating  their  workforce.  Instead  of  one-­‐time  training,  companies  should   build  programs  that  are  ongoing  and  interactive,  with  metrics  that  track  effectiveness.   Another  source  of  error  could  be  the  IT  staff.  While  nearly  6  out  of  10  companies  believe  their  staff  has   an  appropriate  level  of  expertise,  companies  are  aware  that  skills  gaps  exist  in  areas  such  as  cloud   security,  mobile  security,  and  data  loss  prevention.  These  gaps  can  be  closed  with  training  and   certification—84%  of  companies  report  a  positive  ROI  from  certifying  their  staff.   The  IT  channel  can  also  play  a  role  in  improving  the  security  posture  for  organizations.  Three  fourths  of   channel  firms  are  involved  in  security  in  some  form,  with  18%  offering  security  as  a  stand-­‐alone  product   or  service.  As  with  other  areas  of  technology,  channel  firms  are  looking  for  ways  to  offer  security  in  a   recurring  revenue  model.  This  could  be  offering  cloud  security  products  in  place  of  traditional  on-­‐ premise  hardware  or  software,  or  it  could  be  offering  security  as  a  managed  service.  Education  for  end   users  represents  a  prime  opportunity  here  if  channel  firms  can  build  effective,  ongoing  training   programs.  Addressing  this  important  topic  is  also  good  business:  66%  of  channel  firms  involved  with   security  expect  security-­‐related  revenue  to  grow  in  the  next  year,  with  16%  expecting  significant  growth   of  10%  or  greater.   CompTIA’s  10th  Annual  Information  Security  Trends  study  was  developed  from  a  survey  of  500  end  user   firms  and  368  channel  firms  in  the  US.  The  data  was  collected  during  September/October  2012.  The  full   report  is  available  at  no  cost  to  CompTIA  members.  Visit  www.comptia.org/research  or  contact   research@comptia.org  for  details.   Human&Element&a&Major&Part&of&Security&Risk& Factors(in( Security(Breaches( 54%( 46%( Human( Error( Technology( Error( Top(Human(Error(Sources( ( 49% &End&user&failure&to&follow& &policies&and&procedures& ( 36%& &IT&staff&failure&to&follow& &policies&and&procedures& & 34%& &General&carelessness& &regarding&security& & 34% &Lack&of&security&experBse& &with&website/applicaBons( Source:&CompTIA’s&10th%Annual%Informa0on%Security%Trends%study& Base:&308&end&users&experiencing&security&breaches&