SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
THE CYBER
SECURITY
READINESS
OF CANADIAN
ORGANIZATIONS
Results of the 2015 Scalar Security Study
Research independently conducted by Ponemon Institute
Published February 2015
www.scalar.ca
WE WANTED TO KNOW:
o  HOW PREPARED DO CANADIAN ORGANIZATIONS FEEL TO
RESPOND TO CYBER SECURITY ATTACKS?
o  WHAT IS THE AVERAGE COST OF ATTACKS ON CANADIAN
ORGANIZATIONS?
o  WHAT STRATEGIES AND TECHNOLOGIES ARE MOST
EFFECTIVE IN COMBATTING SECURITY ATTACKS?
o  WHICH ORGANIZATIONS ARE MOST PREPARED TO DEAL
WITH AN ATTACK, AND HOW DO THEY DIFFER FROM
ORGANIZATIONS WHICH ARE UNPREPARED?
WE RECEIVED RESPONSES FROM OVER 600 IT
AND IT SECURITY PRACTITIONERS, FROM A
VARIETY OF INDUSTRIES, WITH OVER HALF
COMING FROM ORGANIZATIONS WITH AN
EMPLOYEE COUNT BETWEEN
250 AND 5,000
KEY
FINDINGS
ONLY
41 %
OF RESPONDENTS
BELIEVE THEY
ARE WINNING
THE CYBER SECURITY
WAR
CHALLENGES TO ACHIEVING
CYBER SECURITY EFFECTIVENESS:
o LACK OF IN-HOUSE EXPERTISE
o LACK OF COLLABORATION WITH OTHER
FUNCTIONS
o INSUFFICIENT PERSONNEL
o LACK OF CLEAR LEADERSHIP
o INSUFFICIENT BUDGET
ORGANIZATIONS
IN CANADA
EXPERIENCE
AN AVERAGE OF
CYBER ATTACKS
PER YEAR
34
46%
OF RESPONDENTS
EXPERIENCED AN
ATTACK IN THE LAST
12 MONTHS WHICH
LED TO THE LOSS
OR EXPOSURE OF
SENSITIVE
INFORMATION
EACH INCIDENT COSTS AN AVERAGE OF
$208, 432 IN
$19,883	
  
$29,035	
  
$38,310	
  
$45,177	
  
$76,087	
  
DAMAGE	
  TO	
  REPUTATION	
  AND	
  
MARKETPLACE	
  IMAGE	
  
DAMAGE	
  OR	
  THEFT	
  OF	
  IT	
  ASSETS	
  AND	
  
INFRASTRUCTURE	
  
DISRUPTION	
  TO	
  NORMAL	
  OPERATIONS	
  
LOST	
  USER	
  PRODUCTIVITY	
  
CLEANUP	
  OR	
  REMEDIATION	
  
HOWEVER,
IT’S NOT ALL BAD NEWS.
OUR RESEARCH FOUND THAT
ORGANIZATIONS CAN TAKE
DEFINITIVE STEPS TO ACHIEVE A
STRONGER SECURITY POSTURE…
OUR RESEARCH IDENTIFIED A SUBSET OF THE
SAMPLE THAT SELF-REPORTED THEY HAD
ACHIEVED A MORE EFFECTIVE CYBER SECURITY
POSTURE (THEY RATED THEMSELVES AS 7 OR
HIGHER ON A 1-10 SCALE OF CYBER SECURITY
EFFECTIVENESS). THIS “HIGH-PERFORMING”
GROUP REPRESENTED 48 PERCENT OF THE
SAMPLE, AND WE COMPARED THEIR
BEHAVIOURS WITH THE REMAINING 52
PERCENT OF THE SAMPLE, THE “LOW
PERFORMERS”…
HIGH-PERFORMING ORGANIZATIONS:
o ARE MORE AWARE OF THE THREAT
LANDSCAPE
o HAVE A HIGHER PERCENTAGE OF THEIR
IT BUDGET DEDICATED TO SECURITY
o INVEST IN CUTTING EDGE
TECHNOLOGIES
o MEASURE THE ROI OF THOSE
TECHNOLOGIES
o AND HAVE A SECURITY STRATEGY THAT
IS ALIGNED WITH THEIR BUSINESS
OBJECTIVES AND MISSION
THESE HIGH
PERFORMING
ORGANIZATIONS ARE
28%LESS
LIKELY THAN LOW-
PERFORMERS TO HAVE
EXPERIENCED
AN ATTACK IN THE LAST YEAR
THAT INVOLVED THE LOSS
OR EXPOSURE OF SENSITIVE
INFORMATION
SOME OF THE SECURITY
TECHNOLOGIES SHOWING THE
HIGHEST ROI:	
  
25%	
  
26%	
  
29%	
  
44%	
  
38%	
  
43%	
  
35%	
  
41%	
  
42%	
  
48%	
  
53%	
  
58%	
  
ENDPOINT	
  SECURITY	
  SOLUTIONS	
  
NEXT-­‐GENERATION	
  FIREWALLS	
  
ENCRYPTION	
  FOR	
  DATA	
  AT	
  REST	
  
NETWORK	
  TRAFFIC	
  SURVEILLANCE	
  
IDENTITY	
  MANAGEMENT	
  &	
  AUTHENTICATION	
  
SECURITY	
  INFORMATION	
  AND	
  EVENT	
  
MANAGEMENT	
  (SIEM)	
  
HIGH	
  PERFORMING	
  COMPANY	
   LOW	
  PERFORMING	
  COMPANY	
  
THE PRACTICES OF HIGH-
PERFORMING ORGANIZATIONS
PROVIDE GUIDANCE ON HOW
ORGANIZATIONS CAN IMPROVE
THEIR CYBER SECURITY
EFFECTIVENESS…
PREPARE
BE MORE AWARE OF THREATS AND
ALIGN YOUR SECURITY STRATEGY
WITH BUSINESS OBJECTIVES AND
MISSION. INVEST IN A SECURITY AUDIT
TO HELP YOU DO SO.
DEFEND
ALLOCATE MORE OF YOUR BUDGET TO
IT SECURITY, AND INVEST IN
CUTTING-EDGE TECHNOLOGIES WITH
HIGH ROI. PROACTIVELY RECRUIT
EXPERTS TO JOIN YOUR
CYBERSECURITY TEAM.
RESPOND
LEVERAGE TECHNOLOGIES, PEOPLE,
AND PROCESS TO QUICKLY CONTAIN
THREATS AS THEY ARISE, AND
CONDUCT REGULAR ANALYSIS TO
IDENTIFY AREAS FOR IMPROVEMENT.
DOWNLOAD THE COMPLETE STUDY
http://hubs.ly/y0tFbr0

Contenu connexe

Tendances

2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
patmisasi
 

Tendances (19)

2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
 
Plan for the Worst; Fight for the Best
Plan for the Worst; Fight for the BestPlan for the Worst; Fight for the Best
Plan for the Worst; Fight for the Best
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for Cybersecurity
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
 
Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
Imperva ppt
Imperva pptImperva ppt
Imperva ppt
 
Websense
WebsenseWebsense
Websense
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
Data Science Transforming Security Operations
Data Science Transforming Security OperationsData Science Transforming Security Operations
Data Science Transforming Security Operations
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Cyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsCyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teams
 
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 

En vedette

Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation  Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation
Jackseen Jeyaluck
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime
Challenge:Future
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
segughana
 
Social security on employment in sri lanka
Social security on employment in sri lankaSocial security on employment in sri lanka
Social security on employment in sri lanka
Arjun Ariaratnam
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
Evan Pathiratne
 

En vedette (19)

IGF Sri Lanka
IGF Sri LankaIGF Sri Lanka
IGF Sri Lanka
 
The Lanka Gate Initiative
The Lanka Gate InitiativeThe Lanka Gate Initiative
The Lanka Gate Initiative
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
ISOC Sri Lanka Way Forward
ISOC Sri Lanka Way ForwardISOC Sri Lanka Way Forward
ISOC Sri Lanka Way Forward
 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARY
 
ION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLSION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLS
 
Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation  Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime
 
Intellectual Property in Sri Lanka
Intellectual Property in Sri LankaIntellectual Property in Sri Lanka
Intellectual Property in Sri Lanka
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Sri Lankan Context for Electronic Commerce
Sri Lankan Context for Electronic CommerceSri Lankan Context for Electronic Commerce
Sri Lankan Context for Electronic Commerce
 
Intellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsIntellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and Copyrights
 
Ict act in sri lanka
Ict act in sri lankaIct act in sri lanka
Ict act in sri lanka
 
SRI LANKA, CHINA MARITIME INFRASTRUCTURE
SRI LANKA, CHINA MARITIME INFRASTRUCTURESRI LANKA, CHINA MARITIME INFRASTRUCTURE
SRI LANKA, CHINA MARITIME INFRASTRUCTURE
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
Social security on employment in sri lanka
Social security on employment in sri lankaSocial security on employment in sri lanka
Social security on employment in sri lanka
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similaire à The Cyber Security Readiness of Canadian Organizations

Cybersecurity is a field of IT concerned with reducing.docx
Cybersecurity is a field of IT concerned with reducing.docxCybersecurity is a field of IT concerned with reducing.docx
Cybersecurity is a field of IT concerned with reducing.docx
write31
 

Similaire à The Cyber Security Readiness of Canadian Organizations (20)

2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary
 
2017 Scalar Security Study Summary
2017 Scalar Security Study Summary2017 Scalar Security Study Summary
2017 Scalar Security Study Summary
 
2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York
 
Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
 
Cyberthreat Defense Report Edge 2017-cdr-report
Cyberthreat Defense Report Edge 2017-cdr-reportCyberthreat Defense Report Edge 2017-cdr-report
Cyberthreat Defense Report Edge 2017-cdr-report
 
Cyberthreat Defense Report 2017 by Impreva
Cyberthreat Defense Report 2017 by ImprevaCyberthreat Defense Report 2017 by Impreva
Cyberthreat Defense Report 2017 by Impreva
 
20 million cyber attacks per day
20 million cyber attacks per day20 million cyber attacks per day
20 million cyber attacks per day
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare
 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industry
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
Cybersecurity is a field of IT concerned with reducing.docx
Cybersecurity is a field of IT concerned with reducing.docxCybersecurity is a field of IT concerned with reducing.docx
Cybersecurity is a field of IT concerned with reducing.docx
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
 
The software-security-risk-report
The software-security-risk-reportThe software-security-risk-report
The software-security-risk-report
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 

Plus de Scalar Decisions

Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Decisions
 

Plus de Scalar Decisions (20)

La transformation numérique de Scalar
La transformation numérique de ScalarLa transformation numérique de Scalar
La transformation numérique de Scalar
 
Digital Transformation
Digital TransformationDigital Transformation
Digital Transformation
 
Scalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar cloud study2016_slideshare
Scalar cloud study2016_slideshare
 
Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Résumé de l’étude sur la sécurité de Scalar 2016
Résumé de l’étude sur la sécurité de Scalar 2016Résumé de l’étude sur la sécurité de Scalar 2016
Résumé de l’étude sur la sécurité de Scalar 2016
 
Optimize IT Infrastructure
Optimize IT InfrastructureOptimize IT Infrastructure
Optimize IT Infrastructure
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Web scale with-nutanix_rev
Web scale with-nutanix_revWeb scale with-nutanix_rev
Web scale with-nutanix_rev
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Cloudforms Workshop
Cloudforms WorkshopCloudforms Workshop
Cloudforms Workshop
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
 
Scalar - a brief introduction
Scalar - a brief introductionScalar - a brief introduction
Scalar - a brief introduction
 
Scalar Case Study: Strong Project Management Helps McMaster University Succes...
Scalar Case Study: Strong Project Management Helps McMaster University Succes...Scalar Case Study: Strong Project Management Helps McMaster University Succes...
Scalar Case Study: Strong Project Management Helps McMaster University Succes...
 
XtremIO
XtremIOXtremIO
XtremIO
 
Hyperconverged Infrastructure: The Leading Edge of Virtualization
Hyperconverged Infrastructure: The Leading Edge of VirtualizationHyperconverged Infrastructure: The Leading Edge of Virtualization
Hyperconverged Infrastructure: The Leading Edge of Virtualization
 
The road to clustered data ontap.
The road to clustered data ontap.The road to clustered data ontap.
The road to clustered data ontap.
 
Where Technology Meets Medicine: SickKids High Performance Computing Data Centre
Where Technology Meets Medicine: SickKids High Performance Computing Data CentreWhere Technology Meets Medicine: SickKids High Performance Computing Data Centre
Where Technology Meets Medicine: SickKids High Performance Computing Data Centre
 
Cyber Security trends and tactics for 2015
Cyber Security trends and tactics for 2015Cyber Security trends and tactics for 2015
Cyber Security trends and tactics for 2015
 
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am GamesScalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

The Cyber Security Readiness of Canadian Organizations

  • 1. THE CYBER SECURITY READINESS OF CANADIAN ORGANIZATIONS Results of the 2015 Scalar Security Study Research independently conducted by Ponemon Institute Published February 2015 www.scalar.ca
  • 2. WE WANTED TO KNOW: o  HOW PREPARED DO CANADIAN ORGANIZATIONS FEEL TO RESPOND TO CYBER SECURITY ATTACKS? o  WHAT IS THE AVERAGE COST OF ATTACKS ON CANADIAN ORGANIZATIONS? o  WHAT STRATEGIES AND TECHNOLOGIES ARE MOST EFFECTIVE IN COMBATTING SECURITY ATTACKS? o  WHICH ORGANIZATIONS ARE MOST PREPARED TO DEAL WITH AN ATTACK, AND HOW DO THEY DIFFER FROM ORGANIZATIONS WHICH ARE UNPREPARED?
  • 3. WE RECEIVED RESPONSES FROM OVER 600 IT AND IT SECURITY PRACTITIONERS, FROM A VARIETY OF INDUSTRIES, WITH OVER HALF COMING FROM ORGANIZATIONS WITH AN EMPLOYEE COUNT BETWEEN 250 AND 5,000
  • 5. ONLY 41 % OF RESPONDENTS BELIEVE THEY ARE WINNING THE CYBER SECURITY WAR
  • 6. CHALLENGES TO ACHIEVING CYBER SECURITY EFFECTIVENESS: o LACK OF IN-HOUSE EXPERTISE o LACK OF COLLABORATION WITH OTHER FUNCTIONS o INSUFFICIENT PERSONNEL o LACK OF CLEAR LEADERSHIP o INSUFFICIENT BUDGET
  • 7. ORGANIZATIONS IN CANADA EXPERIENCE AN AVERAGE OF CYBER ATTACKS PER YEAR 34
  • 8. 46% OF RESPONDENTS EXPERIENCED AN ATTACK IN THE LAST 12 MONTHS WHICH LED TO THE LOSS OR EXPOSURE OF SENSITIVE INFORMATION
  • 9. EACH INCIDENT COSTS AN AVERAGE OF $208, 432 IN $19,883   $29,035   $38,310   $45,177   $76,087   DAMAGE  TO  REPUTATION  AND   MARKETPLACE  IMAGE   DAMAGE  OR  THEFT  OF  IT  ASSETS  AND   INFRASTRUCTURE   DISRUPTION  TO  NORMAL  OPERATIONS   LOST  USER  PRODUCTIVITY   CLEANUP  OR  REMEDIATION  
  • 10. HOWEVER, IT’S NOT ALL BAD NEWS. OUR RESEARCH FOUND THAT ORGANIZATIONS CAN TAKE DEFINITIVE STEPS TO ACHIEVE A STRONGER SECURITY POSTURE…
  • 11. OUR RESEARCH IDENTIFIED A SUBSET OF THE SAMPLE THAT SELF-REPORTED THEY HAD ACHIEVED A MORE EFFECTIVE CYBER SECURITY POSTURE (THEY RATED THEMSELVES AS 7 OR HIGHER ON A 1-10 SCALE OF CYBER SECURITY EFFECTIVENESS). THIS “HIGH-PERFORMING” GROUP REPRESENTED 48 PERCENT OF THE SAMPLE, AND WE COMPARED THEIR BEHAVIOURS WITH THE REMAINING 52 PERCENT OF THE SAMPLE, THE “LOW PERFORMERS”…
  • 12. HIGH-PERFORMING ORGANIZATIONS: o ARE MORE AWARE OF THE THREAT LANDSCAPE o HAVE A HIGHER PERCENTAGE OF THEIR IT BUDGET DEDICATED TO SECURITY o INVEST IN CUTTING EDGE TECHNOLOGIES o MEASURE THE ROI OF THOSE TECHNOLOGIES o AND HAVE A SECURITY STRATEGY THAT IS ALIGNED WITH THEIR BUSINESS OBJECTIVES AND MISSION
  • 13. THESE HIGH PERFORMING ORGANIZATIONS ARE 28%LESS LIKELY THAN LOW- PERFORMERS TO HAVE EXPERIENCED AN ATTACK IN THE LAST YEAR THAT INVOLVED THE LOSS OR EXPOSURE OF SENSITIVE INFORMATION
  • 14. SOME OF THE SECURITY TECHNOLOGIES SHOWING THE HIGHEST ROI:   25%   26%   29%   44%   38%   43%   35%   41%   42%   48%   53%   58%   ENDPOINT  SECURITY  SOLUTIONS   NEXT-­‐GENERATION  FIREWALLS   ENCRYPTION  FOR  DATA  AT  REST   NETWORK  TRAFFIC  SURVEILLANCE   IDENTITY  MANAGEMENT  &  AUTHENTICATION   SECURITY  INFORMATION  AND  EVENT   MANAGEMENT  (SIEM)   HIGH  PERFORMING  COMPANY   LOW  PERFORMING  COMPANY  
  • 15. THE PRACTICES OF HIGH- PERFORMING ORGANIZATIONS PROVIDE GUIDANCE ON HOW ORGANIZATIONS CAN IMPROVE THEIR CYBER SECURITY EFFECTIVENESS…
  • 16. PREPARE BE MORE AWARE OF THREATS AND ALIGN YOUR SECURITY STRATEGY WITH BUSINESS OBJECTIVES AND MISSION. INVEST IN A SECURITY AUDIT TO HELP YOU DO SO. DEFEND ALLOCATE MORE OF YOUR BUDGET TO IT SECURITY, AND INVEST IN CUTTING-EDGE TECHNOLOGIES WITH HIGH ROI. PROACTIVELY RECRUIT EXPERTS TO JOIN YOUR CYBERSECURITY TEAM. RESPOND LEVERAGE TECHNOLOGIES, PEOPLE, AND PROCESS TO QUICKLY CONTAIN THREATS AS THEY ARISE, AND CONDUCT REGULAR ANALYSIS TO IDENTIFY AREAS FOR IMPROVEMENT.
  • 17. DOWNLOAD THE COMPLETE STUDY http://hubs.ly/y0tFbr0