SlideShare une entreprise Scribd logo
1  sur  34
Télécharger pour lire hors ligne
Symantec 2010 Critical Infrastructure
Protection Study

Global Results
Methodology
• Applied Research performed survey
• 1,580 enterprises worldwide
• SMBs and enterprises
• Cross-industry




                                      2
Key Findings
• The threat of attack is real
• Industry is a willing partner with Government
• Room for readiness improvement




                                                  3
The Threat is Real



                     4
Companies Being Attacked
• Half experienced politically-minded attacks

• Typically attacked 10 times in the
  last five years

• 48% expect attacks over
  next year

• 80% believe attacks staying
  constant or increasing




                                                5
Attacks are Effective and Costly
• Three in five attacks effective

• Cost $850K over last 5 years




                                    6
Industry is a Willing Partner with
Government in CIP



                                     7
Industry Aware of CIP Programs
• 90% have engaged with program
• 56% significantly/completely engaged




                                         8
Industry Enthusiastic About Government CIP Programs
• Two-thirds have positive attitudes about programs
• “Accepting,” “appreciative” and “enthusiastic”
• Two-thirds willing to cooperate




                                                      9
Room for Readiness Improvement



                                 10
Companies Not Prepared
• Only one third “extremely prepared”
• Safeguards in less than high state of readiness:
  – Security training
  – Awareness/appreciation of threat
    by executive management
  – Endpoint security measures

  – Security response
  – Completed security audit
• Best segment: Energy
• Worst: Communications
• Small firms most unprepared
                                                     11
Symantec Recommendations
• Develop and Enforce IT Policies
• Protect the information
• Authenticate identities
• Manage systems
• Protect the infrastructure
• Ensure 24x7 availability
• Develop information
  management strategy




                                    12
Recommendations for Government
• Continue to make resources available to establish critical
  infrastructure programs
• Partner with industry associations to develop and disseminate
  information to raise awareness
• Emphasize that security alone is not enough to stay resilient in
  the face of today’s cyberattacks




                                                                     13
Appendix
All questions included



                         14
Industry
                                     Q1: In which industry do you work?
                                0%      10%           20%          30%    40%   50%



         Banking and Finance                       17%




            Communications                         17%




          Emergency services                       17%




                      Energy                       17%




Health Care and Public Health                      17%




      Information technology                       17%




                                                                                 15
Company size
                         Q3: How many employees work at your firm worldwide?
                    0%           10%           20%          30%           40%   50%




         10 to 99                      13%




      100 to 999                               19%




   1,000 to 2,499                                           29%




   2,500 to 9,999                            18%




More than 10,000                                     22%




                                                                                 16
Computer involvement
       Q4: What is your involvement with your organization's computer
         systems? Mark all that apply. Don't mark any if none apply.
100%


90%


80%


70%


60%

                       50%                                   50%
50%


40%


30%


20%


10%


 0%
             I have strategic oversight               I manage operations

                                                                            17
IT knowledge
          Q5: In which of the following areas of IT / computer are you
                                knowledgeable?
        100%
100%


90%                            86%

80%                                                    76%

70%                                                                       67%


60%


50%


40%


30%


20%


10%


 0%
       Security             Applications     Network or infrastructure   Storage

                                                                                   18
CIP awareness
                   Q6: What is your awareness of the critical infrastructure plans being
                                     discussed within your country?
                                                    0%   10%         20%           30%         40%   50%



       I am completely unaware of these plans                  16%




It sounds vaguely familiar, but I cannot place it         9%




I have heard of them, but I am not very familiar                       20%




         I am somewhat familiar with the plans                               22%




            I am completely aware of the plans                                           33%




                                                                                                      19
Inclusion in CIP
      Q7: Is your country planning to include your industry sector within
                                 these plans?



                  Not sure or don't know
                           24%



        No
        6%



                                                              Yes
                                                              70%




                                                                            20
Company engagement
                Q8: How engaged is your company with the critical infrastructure plans
                              being discussed within your country?
                        0%       10%            20%               30%        40%         50%



   Not engaged at all             10%




Only slightly engaged                   12%




             Neutral                                  22%




Significantly engaged                                               30%




Completely engaged                                          26%




                                                                                          21
Company engagement
                           Q9: How long has your company been engaged with the critical
                             infrastructure plans being discussed within your country?
                  (Only asked of those who are at least slightly engaged with plans in their country)
                      0%               10%             20%                30%               40%         50%



Less than 3 months                           11%




     3 to 6 months                                               24%




6 months to 1 year                                                  26%




       1 to 2 years                                     20%




More than 2 years                                        20%




                                                                                                         22
CIP opinion
                    Q10: What is your overall opinion of the critical infrastructure plans
                                  being discussed within your country?
                         0%              10%        20%               30%          40%       50%



    I have no opinion               7%




Significantly negative        4%




 Somewhat negative                 6%




              Neutral                               19%




  Somewhat positive                                                               38%




Significantly positive                                          26%



                                                                                              23
CIP opinion
                    Q11: Which of the following words reflect your reaction to the critical
                         infrastructure plans being discussed within your country?
               0%                10%             20%              30%             40%         50%



  Accepting                                                         30%




Appreciative                                              24%




Enthusiastic                                     18%




   Skeptical                             12%




      Wary                         10%




   Resistant                6%



                                                                                               24
Willingness to cooperate
                 Q12: How willing are you to cooperate with the critical infrastructure
                            plans being discussed within your country?
                       0%          10%           20%            30%               40%     50%



Completely unwilling              8%




Somewhat unwilling           6%




            Neutral                                    21%




   Somewhat willing                                                         34%




  Completely willing                                                  32%




                                                                                           25
Experience with attacks
              Q13: What best describes your company's experience with each of the
               following types of attacks in terms of an attack being waged with a
                                      specific goal in mind?
                                     1 - We are completely sure this has never happened in our country
                                     2 - We doubt, but are not completely sure, this has ever happened to our company
                                     3 - We are not sure this has happened to our company
                                     4 - We suspect this has happened to our company
                                     5 - We are pretty sure this has happened to our company
100%
                      12%                                 13%                                   11%                                 12%
90%
80%                                                                                             21%                                 20%
                      21%                                 19%
70%
60%                   18%                                 15%                                   18%                                 16%
50%
40%                                                       19%                                                                       24%
                      20%                                                                       24%
30%
20%
                      30%                                 33%                                                                       28%
10%                                                                                             26%

 0%
       Attempt to shut down or degrade our   Attempt to manipulate physical     Attempt to alter or destroy electronic   Attempt to steal electronic
               computer networks             equipment through our control          information on our networks                information
                                                        network

                                                                                                                                                       26
Number of attacks
                 Q14: How many times over the past five years have you suspected or
                          been sure each of the following has occurred?
                                (Only asked of those who at least suspect each type of attack)
                                                      (Medians shown)
                                                                         0   2   4          6        8   10




                               Attempt to steal electronic information                           7




    Attempt to alter or destroy electronic information on our networks                           7




             Attempt to shut down or degrade our computer networks                               7




Attempt to manipulate physical equipment through our control network                             7




                                                                                                         27
Attack effectiveness
          Q15: In general, how effective have each of the following types of attack
                                           been?
                             (Only asked of those who at least suspect each type of attack)
            1 - Extremely ineffective   2 - Somewhat ineffective      3 - Neutral        4 - Somewhat effective    5 - Extremely effective

100%

90%
                                                       28%                                     24%                                27%
                    29%
80%

70%

60%
                                                                                               36%                                32%
                    32%                                33%
50%

40%
                                                                                               13%                                13%
30%                 15%                                14%

20%                                                    11%                                     17%                                15%
                    12%
10%
                    11%                                14%                                     11%                                13%
 0%
       Attempt to manipulate physical   Attempt to shut down or degrade our         Attempt to steal electronic   Attempt to alter or destroy electronic
       equipment through our control            computer networks                         information                 information on our networks
                  network

                                                                                                                                                     28
Attack frequency
          Q16: In general, how is the frequency of each of the following types of
                                     attacks changing?
                           (Only asked of those who at least suspect each type of attack)
                                     1 - Decreasing over time      2 - Staying the same     3 - Increasing over time

100%

90%

80%
                                                                                               45%                                    44%
                  49%                                     49%
70%

60%

50%

40%
                  30%                                     30%                                  37%                                    38%
30%

20%

10%               20%                                     21%                                  19%                                    17%

 0%
       Attempt to steal electronic       Attempt to alter or destroy electronic   Attempt to manipulate physical       Attempt to shut down or degrade our
             information                     information on our networks          equipment through our control                computer networks
                                                                                             network

                                                                                                                                                       29
Cost of attacks
               Q17: Estimate the total cost of all such attacks over the past five years.
               Include the direct costs (loss of property, information, revenue) as well
                                        as the cost to mitigate.
                                                                   (Means shown)
                                                                         $0   $50,000   $100,000   $150,000   $200,000   $250,000   $300,000   $350,000




                               Attempt to steal electronic information                                                                  $296,375




Attempt to manipulate physical equipment through our control network                                                            $261,495




             Attempt to shut down or degrade our computer networks                                               $193,044




    Attempt to alter or destroy electronic information on our networks                       $99,633




                                                                                                                                                    30
Expectation of attacks
             Q18: What best describes your estimation of the likelihood that your
             company will sustain the following types of attacks (in terms of being
                        waged with a specific political goal in mind)?
                                        1 - We are completely sure this will not happen to our company
                                        2 - We doubt, but are not completely sure, this will happen to our company
                                        3 - We are not sure if this will or will not happen to our company
                                        4 - We suspect this will happen to our company
                                        5 - We are pretty sure this will happen to our company
100%
                    12%                                    9%                                     11%                                  9%
90%
80%                 20%                                    22%                                    19%                                 21%
70%
60%                 17%                                    17%                                    21%                                 20%
50%
40%                 24%                                    27%                                                                        24%
                                                                                                  26%
30%
20%
                    27%                                    25%                                    23%                                 26%
10%
 0%
       Attempt to manipulate physical          Attempt to steal electronic       Attempt to alter or destroy electronic Attempt to shut down or degrade our
       equipment through our control                 information                     information on our networks                computer networks
                  network

                                                                                                                                                        31
Attack readiness
          Q19: Overall, what is your readiness to withstand the types of attacks
           we have been discussing (i.e., attacks with a specific political goal in
                                          mind)?
        1 - Extremely unprepared     2 - Somewhat unprepared        3 - Neutral      4 - Somewhat prepared        5 - Extremely prepared

100%

90%
                  28%                                31%                                  30%                                  33%
80%

70%

60%

50%               41%                                37%                                  40%                                  36%

40%

30%
                  13%                                16%                                  17%                                  18%
20%
                   9%
10%                                                  9%                                    7%                                  6%
                   9%                                7%                                    6%                                  7%
 0%
       Attempt to steal electronic   Attempt to alter or destroy electronic Attempt to shut down or degrade our   Attempt to manipulate physical
             information                 information on our networks                computer networks             equipment through our control
                                                                                                                             network

                                                                                                                                                   32
Safeguards
            Q20: What is the status of each of these specific safeguards within your
                                          company?
                   1 - Not in place         2 - Low state of readiness         3 - Medium state of readiness         4 - High state of readiness

100%

90%

80%     35%           36%             39%           39%            40%             40%           40%           42%             46%           46%        48%
70%

60%

50%
        44%           45%
40%                                   45%           44%            43%             43%           45%           43%
                                                                                                                               40%           42%
30%                                                                                                                                                     40%

20%

10%     17%           14%                           12%            13%             14%
                                      13%                                                        12%           12%             12%           11%        10%
         4%           5%              4%             4%             4%             4%            3%            3%              3%             2%        2%
 0%
       Security    Awareness     Endpoint          Security   Security audit     Disaster       Access     Security        Messaging       Website    Network
       training       and         security        response                       recovery      control to monitoring        security       security   security
                  appreciation   measures                                        planning   infrastructure                                            measures
                  of threat by                                                                    and
                   executive                                                                 information
                  management                                                                based on user
                                                                                              credentials

                                                                                                                                                              33
Significant challenges
         Q21: Please indicate how significant the following challenges are to the
         success of a national program to secure critical infrastructure in specific
                                     industry sectors.
          1 - Not a challenge at all     2 - Very slight challenge    3 - Neutral      4 - Moderate challenge      5 - Significant challenge

100%

90%         23%                                                                         23%                                               23%
                                       24%                      26%
                                                                                                                31%
80%

70%

60%         32%
                                       37%                      32%                     39%                                               38%
50%                                                                                                             38%

40%
            25%
30%                                                             26%
                                       21%                                              23%                                               25%
                                                                                                                17%
20%
            13%
10%                                    12%                      11%                     10%                     9%                         9%
             8%                        5%                        6%                     6%                      6%                         6%
 0%
       Lack of interest     Lack of trained resources Mistrust of government Lack of understanding of           Cost            Lack of understanding of
                             within industry sectors         motives          industry-specific issues                          government-wide issues
                                                                                 on the part of the                                on the part of the
                                                                                   government                                            industry

                                                                                                                                                     34

Contenu connexe

Tendances

Southeast Asian Media Overview
Southeast Asian Media OverviewSoutheast Asian Media Overview
Southeast Asian Media OverviewRoss Settles
 
Southeast asia -_why_you_should_pay_attention_now
Southeast asia -_why_you_should_pay_attention_nowSoutheast asia -_why_you_should_pay_attention_now
Southeast asia -_why_you_should_pay_attention_nowShaen PD
 
Survey Results: The consumerization of it from the end user’s perspective
Survey Results: The consumerization of it from the end user’s perspectiveSurvey Results: The consumerization of it from the end user’s perspective
Survey Results: The consumerization of it from the end user’s perspectiveSymantec
 
Social Networking while at Work - July 2010
Social Networking while at Work - July 2010Social Networking while at Work - July 2010
Social Networking while at Work - July 2010Symantec
 
Jobvite Social Recruiting Survey
Jobvite Social Recruiting SurveyJobvite Social Recruiting Survey
Jobvite Social Recruiting SurveyGabe Teperow
 
2011 Social Recruiting Survey From Jobvite
2011 Social Recruiting Survey From Jobvite2011 Social Recruiting Survey From Jobvite
2011 Social Recruiting Survey From Jobviteglennmanko
 
Economic impact of covid 19 on wayra startups
Economic impact of covid 19 on wayra startupsEconomic impact of covid 19 on wayra startups
Economic impact of covid 19 on wayra startupsYuting Jiang
 
Bridging the Global Infrastructure Gap
Bridging the Global Infrastructure GapBridging the Global Infrastructure Gap
Bridging the Global Infrastructure GapJordi Planas Manzano
 
Growth (Xactly Express)
Growth (Xactly Express)Growth (Xactly Express)
Growth (Xactly Express)XactlyCorp
 
Alfresco Community Survey 2012 Results
Alfresco Community Survey 2012 ResultsAlfresco Community Survey 2012 Results
Alfresco Community Survey 2012 ResultsJeff Potts
 
CharityComms Digital Comms Snapshot 2011
CharityComms Digital Comms Snapshot 2011CharityComms Digital Comms Snapshot 2011
CharityComms Digital Comms Snapshot 2011CharityComms
 
Online Reputation in a Connected World
Online Reputation in a Connected WorldOnline Reputation in a Connected World
Online Reputation in a Connected WorldNick Braak
 
2010 EIA Presentation to KPAC
2010 EIA Presentation to KPAC2010 EIA Presentation to KPAC
2010 EIA Presentation to KPACJay Younger
 
Jobvite Social Recruiting Survey Results - 2011
Jobvite Social Recruiting Survey Results - 2011Jobvite Social Recruiting Survey Results - 2011
Jobvite Social Recruiting Survey Results - 2011Steven Duque
 
Outcomes strategies metros v2
Outcomes strategies   metros v2Outcomes strategies   metros v2
Outcomes strategies metros v2JCC Association
 

Tendances (17)

Southeast Asian Media Overview
Southeast Asian Media OverviewSoutheast Asian Media Overview
Southeast Asian Media Overview
 
Southeast asia -_why_you_should_pay_attention_now
Southeast asia -_why_you_should_pay_attention_nowSoutheast asia -_why_you_should_pay_attention_now
Southeast asia -_why_you_should_pay_attention_now
 
Survey Results: The consumerization of it from the end user’s perspective
Survey Results: The consumerization of it from the end user’s perspectiveSurvey Results: The consumerization of it from the end user’s perspective
Survey Results: The consumerization of it from the end user’s perspective
 
Social Networking while at Work - July 2010
Social Networking while at Work - July 2010Social Networking while at Work - July 2010
Social Networking while at Work - July 2010
 
Jobvite Social Recruiting Survey
Jobvite Social Recruiting SurveyJobvite Social Recruiting Survey
Jobvite Social Recruiting Survey
 
2011 Social Recruiting Survey From Jobvite
2011 Social Recruiting Survey From Jobvite2011 Social Recruiting Survey From Jobvite
2011 Social Recruiting Survey From Jobvite
 
Economic impact of covid 19 on wayra startups
Economic impact of covid 19 on wayra startupsEconomic impact of covid 19 on wayra startups
Economic impact of covid 19 on wayra startups
 
The Influential CIO
The Influential CIOThe Influential CIO
The Influential CIO
 
Bridging the Global Infrastructure Gap
Bridging the Global Infrastructure GapBridging the Global Infrastructure Gap
Bridging the Global Infrastructure Gap
 
Growth (Xactly Express)
Growth (Xactly Express)Growth (Xactly Express)
Growth (Xactly Express)
 
Alfresco Community Survey 2012 Results
Alfresco Community Survey 2012 ResultsAlfresco Community Survey 2012 Results
Alfresco Community Survey 2012 Results
 
CharityComms Digital Comms Snapshot 2011
CharityComms Digital Comms Snapshot 2011CharityComms Digital Comms Snapshot 2011
CharityComms Digital Comms Snapshot 2011
 
Online Reputation in a Connected World
Online Reputation in a Connected WorldOnline Reputation in a Connected World
Online Reputation in a Connected World
 
2010 EIA Presentation to KPAC
2010 EIA Presentation to KPAC2010 EIA Presentation to KPAC
2010 EIA Presentation to KPAC
 
Mobile Recruiting Observations 2012 | MREC
Mobile Recruiting Observations 2012 | MRECMobile Recruiting Observations 2012 | MREC
Mobile Recruiting Observations 2012 | MREC
 
Jobvite Social Recruiting Survey Results - 2011
Jobvite Social Recruiting Survey Results - 2011Jobvite Social Recruiting Survey Results - 2011
Jobvite Social Recruiting Survey Results - 2011
 
Outcomes strategies metros v2
Outcomes strategies   metros v2Outcomes strategies   metros v2
Outcomes strategies metros v2
 

En vedette

Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropePositive Hack Days
 
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...Bryn Davidson
 
Route Hijaking and the role of RPKI
Route Hijaking and the role of RPKIRoute Hijaking and the role of RPKI
Route Hijaking and the role of RPKIAPNIC
 
RPKI Trust Anchor
RPKI Trust AnchorRPKI Trust Anchor
RPKI Trust AnchorAPNIC
 
RPKI Deployment Panel
RPKI Deployment PanelRPKI Deployment Panel
RPKI Deployment PanelAPNIC
 
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015tmuehleisen
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2Kyle Lai
 
Hacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00bHacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00bPriyanka Aash
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Securitydocomusa
 
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...Carlos Moreno
 
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetCybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetJuniper Networks
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorEuropean Services Institute
 
City Infrastructure Cybersecurity
City Infrastructure CybersecurityCity Infrastructure Cybersecurity
City Infrastructure CybersecurityLogitek Solutions
 
RPKI (Resource Public Key Infrastructure)
RPKI (Resource Public Key Infrastructure)RPKI (Resource Public Key Infrastructure)
RPKI (Resource Public Key Infrastructure)Fakrul Alam
 
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...AVEVA
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policieswardjo
 

En vedette (20)

Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
 
Critical infrastructure
Critical infrastructureCritical infrastructure
Critical infrastructure
 
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...
Resilient Cities - Peak Oil and Climate Change - Vancouver Board of Trade Nov...
 
Route Hijaking and the role of RPKI
Route Hijaking and the role of RPKIRoute Hijaking and the role of RPKI
Route Hijaking and the role of RPKI
 
RPKI Trust Anchor
RPKI Trust AnchorRPKI Trust Anchor
RPKI Trust Anchor
 
RPKI Deployment Panel
RPKI Deployment PanelRPKI Deployment Panel
RPKI Deployment Panel
 
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
Hacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00bHacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00b
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
 
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
 
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetCybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
Presentation
Presentation Presentation
Presentation
 
City Infrastructure Cybersecurity
City Infrastructure CybersecurityCity Infrastructure Cybersecurity
City Infrastructure Cybersecurity
 
RPKI (Resource Public Key Infrastructure)
RPKI (Resource Public Key Infrastructure)RPKI (Resource Public Key Infrastructure)
RPKI (Resource Public Key Infrastructure)
 
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
Cybersecurity Critical Infrastructure Framework Course Textbook and the class...
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Bio Daniel Donatelli
Bio Daniel DonatelliBio Daniel Donatelli
Bio Daniel Donatelli
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
 

Similaire à Symantec 2010 Critical Infrastructure Protection Study

HP SME Index January 2012
HP SME Index January 2012HP SME Index January 2012
HP SME Index January 2012Edelman
 
Прогноз венчурных инвесторов США на 2010 год
Прогноз венчурных инвесторов США на 2010 годПрогноз венчурных инвесторов США на 2010 год
Прогноз венчурных инвесторов США на 2010 годDmitry Tseitlin
 
Inflexion 2013 [compatibility mode]
Inflexion 2013 [compatibility mode]Inflexion 2013 [compatibility mode]
Inflexion 2013 [compatibility mode]Naveen Chand Singh
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012Lumension
 
B2B buyers and social media
B2B buyers and social mediaB2B buyers and social media
B2B buyers and social mediaJosh Feldberg
 
Best practice in sales and marketing alignment
Best practice in sales and marketing alignment Best practice in sales and marketing alignment
Best practice in sales and marketing alignment B2B Marketing
 
11479 Ponemon Report Egrc Ar
11479 Ponemon Report Egrc Ar11479 Ponemon Report Egrc Ar
11479 Ponemon Report Egrc Arbalejandre
 
Aop Mobile Insights by Tim Cain - Incisive Create Mobile Strategies
Aop Mobile Insights by Tim Cain - Incisive Create Mobile StrategiesAop Mobile Insights by Tim Cain - Incisive Create Mobile Strategies
Aop Mobile Insights by Tim Cain - Incisive Create Mobile StrategiesIncisive Create
 
1001 J V C A N V C A 2010 Survey
1001  J V C A    N V C A 2010  Survey1001  J V C A    N V C A 2010  Survey
1001 J V C A N V C A 2010 SurveyAllen Miner
 
Acxiom / Digiday - Marketing Maturity Survey #digiday
Acxiom / Digiday - Marketing Maturity Survey #digidayAcxiom / Digiday - Marketing Maturity Survey #digiday
Acxiom / Digiday - Marketing Maturity Survey #digidayAcxiom Corporation
 
2008 Colocation Industry Trends Report
2008 Colocation Industry Trends Report2008 Colocation Industry Trends Report
2008 Colocation Industry Trends Reportahollobaugh
 
Brands2Life & PR Week UK 2009 Communications Directors Survey
Brands2Life & PR Week UK 2009 Communications Directors SurveyBrands2Life & PR Week UK 2009 Communications Directors Survey
Brands2Life & PR Week UK 2009 Communications Directors SurveyTony Smith
 
2017 Ventureburn Tech Startup Survey results
2017 Ventureburn Tech Startup Survey results2017 Ventureburn Tech Startup Survey results
2017 Ventureburn Tech Startup Survey resultsBurn Media
 
Area vision market research
Area vision market researchArea vision market research
Area vision market researchAreaVision
 
Trends in Collaboration Technology and Open Source Software 2011-2012
Trends in Collaboration Technology and Open Source Software 2011-2012Trends in Collaboration Technology and Open Source Software 2011-2012
Trends in Collaboration Technology and Open Source Software 2011-2012Mithi Software Technologies Pvt Ltd
 
2012 Connell & Partners Fall Pulse Survey Participant Report
2012 Connell & Partners Fall Pulse Survey Participant Report2012 Connell & Partners Fall Pulse Survey Participant Report
2012 Connell & Partners Fall Pulse Survey Participant ReportConnell & Partners
 
2010 State Of The Data Center
2010  State Of The  Data  Center2010  State Of The  Data  Center
2010 State Of The Data CenterSymantec
 
Effectively Leveraging Social Media as a Support Channel
Effectively Leveraging Social Media as a Support ChannelEffectively Leveraging Social Media as a Support Channel
Effectively Leveraging Social Media as a Support ChannelTatyana Kanzaveli
 

Similaire à Symantec 2010 Critical Infrastructure Protection Study (20)

HP SME Index January 2012
HP SME Index January 2012HP SME Index January 2012
HP SME Index January 2012
 
Прогноз венчурных инвесторов США на 2010 год
Прогноз венчурных инвесторов США на 2010 годПрогноз венчурных инвесторов США на 2010 год
Прогноз венчурных инвесторов США на 2010 год
 
Inflexion 2013 [compatibility mode]
Inflexion 2013 [compatibility mode]Inflexion 2013 [compatibility mode]
Inflexion 2013 [compatibility mode]
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
 
Upwardly mobile
Upwardly mobileUpwardly mobile
Upwardly mobile
 
B2B buyers and social media
B2B buyers and social mediaB2B buyers and social media
B2B buyers and social media
 
Best practice in sales and marketing alignment
Best practice in sales and marketing alignment Best practice in sales and marketing alignment
Best practice in sales and marketing alignment
 
11479 Ponemon Report Egrc Ar
11479 Ponemon Report Egrc Ar11479 Ponemon Report Egrc Ar
11479 Ponemon Report Egrc Ar
 
Aop Mobile Insights by Tim Cain - Incisive Create Mobile Strategies
Aop Mobile Insights by Tim Cain - Incisive Create Mobile StrategiesAop Mobile Insights by Tim Cain - Incisive Create Mobile Strategies
Aop Mobile Insights by Tim Cain - Incisive Create Mobile Strategies
 
1001 J V C A N V C A 2010 Survey
1001  J V C A    N V C A 2010  Survey1001  J V C A    N V C A 2010  Survey
1001 J V C A N V C A 2010 Survey
 
Acxiom / Digiday - Marketing Maturity Survey #digiday
Acxiom / Digiday - Marketing Maturity Survey #digidayAcxiom / Digiday - Marketing Maturity Survey #digiday
Acxiom / Digiday - Marketing Maturity Survey #digiday
 
2008 Colocation Industry Trends Report
2008 Colocation Industry Trends Report2008 Colocation Industry Trends Report
2008 Colocation Industry Trends Report
 
Brands2Life & PR Week UK 2009 Communications Directors Survey
Brands2Life & PR Week UK 2009 Communications Directors SurveyBrands2Life & PR Week UK 2009 Communications Directors Survey
Brands2Life & PR Week UK 2009 Communications Directors Survey
 
2017 Ventureburn Tech Startup Survey results
2017 Ventureburn Tech Startup Survey results2017 Ventureburn Tech Startup Survey results
2017 Ventureburn Tech Startup Survey results
 
Area vision market research
Area vision market researchArea vision market research
Area vision market research
 
Trends in Collaboration Technology and Open Source Software 2011-2012
Trends in Collaboration Technology and Open Source Software 2011-2012Trends in Collaboration Technology and Open Source Software 2011-2012
Trends in Collaboration Technology and Open Source Software 2011-2012
 
What's Your Business Grade?
What's Your Business Grade?What's Your Business Grade?
What's Your Business Grade?
 
2012 Connell & Partners Fall Pulse Survey Participant Report
2012 Connell & Partners Fall Pulse Survey Participant Report2012 Connell & Partners Fall Pulse Survey Participant Report
2012 Connell & Partners Fall Pulse Survey Participant Report
 
2010 State Of The Data Center
2010  State Of The  Data  Center2010  State Of The  Data  Center
2010 State Of The Data Center
 
Effectively Leveraging Social Media as a Support Channel
Effectively Leveraging Social Media as a Support ChannelEffectively Leveraging Social Media as a Support Channel
Effectively Leveraging Social Media as a Support Channel
 

Plus de Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

Plus de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Dernier

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Dernier (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

Symantec 2010 Critical Infrastructure Protection Study

  • 1. Symantec 2010 Critical Infrastructure Protection Study Global Results
  • 2. Methodology • Applied Research performed survey • 1,580 enterprises worldwide • SMBs and enterprises • Cross-industry 2
  • 3. Key Findings • The threat of attack is real • Industry is a willing partner with Government • Room for readiness improvement 3
  • 4. The Threat is Real 4
  • 5. Companies Being Attacked • Half experienced politically-minded attacks • Typically attacked 10 times in the last five years • 48% expect attacks over next year • 80% believe attacks staying constant or increasing 5
  • 6. Attacks are Effective and Costly • Three in five attacks effective • Cost $850K over last 5 years 6
  • 7. Industry is a Willing Partner with Government in CIP 7
  • 8. Industry Aware of CIP Programs • 90% have engaged with program • 56% significantly/completely engaged 8
  • 9. Industry Enthusiastic About Government CIP Programs • Two-thirds have positive attitudes about programs • “Accepting,” “appreciative” and “enthusiastic” • Two-thirds willing to cooperate 9
  • 10. Room for Readiness Improvement 10
  • 11. Companies Not Prepared • Only one third “extremely prepared” • Safeguards in less than high state of readiness: – Security training – Awareness/appreciation of threat by executive management – Endpoint security measures – Security response – Completed security audit • Best segment: Energy • Worst: Communications • Small firms most unprepared 11
  • 12. Symantec Recommendations • Develop and Enforce IT Policies • Protect the information • Authenticate identities • Manage systems • Protect the infrastructure • Ensure 24x7 availability • Develop information management strategy 12
  • 13. Recommendations for Government • Continue to make resources available to establish critical infrastructure programs • Partner with industry associations to develop and disseminate information to raise awareness • Emphasize that security alone is not enough to stay resilient in the face of today’s cyberattacks 13
  • 15. Industry Q1: In which industry do you work? 0% 10% 20% 30% 40% 50% Banking and Finance 17% Communications 17% Emergency services 17% Energy 17% Health Care and Public Health 17% Information technology 17% 15
  • 16. Company size Q3: How many employees work at your firm worldwide? 0% 10% 20% 30% 40% 50% 10 to 99 13% 100 to 999 19% 1,000 to 2,499 29% 2,500 to 9,999 18% More than 10,000 22% 16
  • 17. Computer involvement Q4: What is your involvement with your organization's computer systems? Mark all that apply. Don't mark any if none apply. 100% 90% 80% 70% 60% 50% 50% 50% 40% 30% 20% 10% 0% I have strategic oversight I manage operations 17
  • 18. IT knowledge Q5: In which of the following areas of IT / computer are you knowledgeable? 100% 100% 90% 86% 80% 76% 70% 67% 60% 50% 40% 30% 20% 10% 0% Security Applications Network or infrastructure Storage 18
  • 19. CIP awareness Q6: What is your awareness of the critical infrastructure plans being discussed within your country? 0% 10% 20% 30% 40% 50% I am completely unaware of these plans 16% It sounds vaguely familiar, but I cannot place it 9% I have heard of them, but I am not very familiar 20% I am somewhat familiar with the plans 22% I am completely aware of the plans 33% 19
  • 20. Inclusion in CIP Q7: Is your country planning to include your industry sector within these plans? Not sure or don't know 24% No 6% Yes 70% 20
  • 21. Company engagement Q8: How engaged is your company with the critical infrastructure plans being discussed within your country? 0% 10% 20% 30% 40% 50% Not engaged at all 10% Only slightly engaged 12% Neutral 22% Significantly engaged 30% Completely engaged 26% 21
  • 22. Company engagement Q9: How long has your company been engaged with the critical infrastructure plans being discussed within your country? (Only asked of those who are at least slightly engaged with plans in their country) 0% 10% 20% 30% 40% 50% Less than 3 months 11% 3 to 6 months 24% 6 months to 1 year 26% 1 to 2 years 20% More than 2 years 20% 22
  • 23. CIP opinion Q10: What is your overall opinion of the critical infrastructure plans being discussed within your country? 0% 10% 20% 30% 40% 50% I have no opinion 7% Significantly negative 4% Somewhat negative 6% Neutral 19% Somewhat positive 38% Significantly positive 26% 23
  • 24. CIP opinion Q11: Which of the following words reflect your reaction to the critical infrastructure plans being discussed within your country? 0% 10% 20% 30% 40% 50% Accepting 30% Appreciative 24% Enthusiastic 18% Skeptical 12% Wary 10% Resistant 6% 24
  • 25. Willingness to cooperate Q12: How willing are you to cooperate with the critical infrastructure plans being discussed within your country? 0% 10% 20% 30% 40% 50% Completely unwilling 8% Somewhat unwilling 6% Neutral 21% Somewhat willing 34% Completely willing 32% 25
  • 26. Experience with attacks Q13: What best describes your company's experience with each of the following types of attacks in terms of an attack being waged with a specific goal in mind? 1 - We are completely sure this has never happened in our country 2 - We doubt, but are not completely sure, this has ever happened to our company 3 - We are not sure this has happened to our company 4 - We suspect this has happened to our company 5 - We are pretty sure this has happened to our company 100% 12% 13% 11% 12% 90% 80% 21% 20% 21% 19% 70% 60% 18% 15% 18% 16% 50% 40% 19% 24% 20% 24% 30% 20% 30% 33% 28% 10% 26% 0% Attempt to shut down or degrade our Attempt to manipulate physical Attempt to alter or destroy electronic Attempt to steal electronic computer networks equipment through our control information on our networks information network 26
  • 27. Number of attacks Q14: How many times over the past five years have you suspected or been sure each of the following has occurred? (Only asked of those who at least suspect each type of attack) (Medians shown) 0 2 4 6 8 10 Attempt to steal electronic information 7 Attempt to alter or destroy electronic information on our networks 7 Attempt to shut down or degrade our computer networks 7 Attempt to manipulate physical equipment through our control network 7 27
  • 28. Attack effectiveness Q15: In general, how effective have each of the following types of attack been? (Only asked of those who at least suspect each type of attack) 1 - Extremely ineffective 2 - Somewhat ineffective 3 - Neutral 4 - Somewhat effective 5 - Extremely effective 100% 90% 28% 24% 27% 29% 80% 70% 60% 36% 32% 32% 33% 50% 40% 13% 13% 30% 15% 14% 20% 11% 17% 15% 12% 10% 11% 14% 11% 13% 0% Attempt to manipulate physical Attempt to shut down or degrade our Attempt to steal electronic Attempt to alter or destroy electronic equipment through our control computer networks information information on our networks network 28
  • 29. Attack frequency Q16: In general, how is the frequency of each of the following types of attacks changing? (Only asked of those who at least suspect each type of attack) 1 - Decreasing over time 2 - Staying the same 3 - Increasing over time 100% 90% 80% 45% 44% 49% 49% 70% 60% 50% 40% 30% 30% 37% 38% 30% 20% 10% 20% 21% 19% 17% 0% Attempt to steal electronic Attempt to alter or destroy electronic Attempt to manipulate physical Attempt to shut down or degrade our information information on our networks equipment through our control computer networks network 29
  • 30. Cost of attacks Q17: Estimate the total cost of all such attacks over the past five years. Include the direct costs (loss of property, information, revenue) as well as the cost to mitigate. (Means shown) $0 $50,000 $100,000 $150,000 $200,000 $250,000 $300,000 $350,000 Attempt to steal electronic information $296,375 Attempt to manipulate physical equipment through our control network $261,495 Attempt to shut down or degrade our computer networks $193,044 Attempt to alter or destroy electronic information on our networks $99,633 30
  • 31. Expectation of attacks Q18: What best describes your estimation of the likelihood that your company will sustain the following types of attacks (in terms of being waged with a specific political goal in mind)? 1 - We are completely sure this will not happen to our company 2 - We doubt, but are not completely sure, this will happen to our company 3 - We are not sure if this will or will not happen to our company 4 - We suspect this will happen to our company 5 - We are pretty sure this will happen to our company 100% 12% 9% 11% 9% 90% 80% 20% 22% 19% 21% 70% 60% 17% 17% 21% 20% 50% 40% 24% 27% 24% 26% 30% 20% 27% 25% 23% 26% 10% 0% Attempt to manipulate physical Attempt to steal electronic Attempt to alter or destroy electronic Attempt to shut down or degrade our equipment through our control information information on our networks computer networks network 31
  • 32. Attack readiness Q19: Overall, what is your readiness to withstand the types of attacks we have been discussing (i.e., attacks with a specific political goal in mind)? 1 - Extremely unprepared 2 - Somewhat unprepared 3 - Neutral 4 - Somewhat prepared 5 - Extremely prepared 100% 90% 28% 31% 30% 33% 80% 70% 60% 50% 41% 37% 40% 36% 40% 30% 13% 16% 17% 18% 20% 9% 10% 9% 7% 6% 9% 7% 6% 7% 0% Attempt to steal electronic Attempt to alter or destroy electronic Attempt to shut down or degrade our Attempt to manipulate physical information information on our networks computer networks equipment through our control network 32
  • 33. Safeguards Q20: What is the status of each of these specific safeguards within your company? 1 - Not in place 2 - Low state of readiness 3 - Medium state of readiness 4 - High state of readiness 100% 90% 80% 35% 36% 39% 39% 40% 40% 40% 42% 46% 46% 48% 70% 60% 50% 44% 45% 40% 45% 44% 43% 43% 45% 43% 40% 42% 30% 40% 20% 10% 17% 14% 12% 13% 14% 13% 12% 12% 12% 11% 10% 4% 5% 4% 4% 4% 4% 3% 3% 3% 2% 2% 0% Security Awareness Endpoint Security Security audit Disaster Access Security Messaging Website Network training and security response recovery control to monitoring security security security appreciation measures planning infrastructure measures of threat by and executive information management based on user credentials 33
  • 34. Significant challenges Q21: Please indicate how significant the following challenges are to the success of a national program to secure critical infrastructure in specific industry sectors. 1 - Not a challenge at all 2 - Very slight challenge 3 - Neutral 4 - Moderate challenge 5 - Significant challenge 100% 90% 23% 23% 23% 24% 26% 31% 80% 70% 60% 32% 37% 32% 39% 38% 50% 38% 40% 25% 30% 26% 21% 23% 25% 17% 20% 13% 10% 12% 11% 10% 9% 9% 8% 5% 6% 6% 6% 6% 0% Lack of interest Lack of trained resources Mistrust of government Lack of understanding of Cost Lack of understanding of within industry sectors motives industry-specific issues government-wide issues on the part of the on the part of the government industry 34