版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認(rèn)領(lǐng)
文檔簡介
1、/gsissTurnaround and transformationin cybersecurityKey findings from The Global State of Information Security Survey2016Turnaround and transformation in cybersecurity: Key findings from The Global State of Information Security Survey 2016Table of contentsGlobal responses to rising risks2R
2、eclaiming cybersecurity through innovationThe rewards of risk-based frameworksHarnessingthe power of cloud-enabled cybersecurity The big impact of Big DataReplacingpasswords with advanced authentication Gearing up for the Internet of ThingsGoing mobile with paymentsPartneringupto sharpen security in
3、telligenceWhat cant be protected can be insured445689121315The evolving involvement of executives and the BoardBoards are more involved in cybersecurityDue diligence of cybersecurity in M&As181921Fit for the future of cybersecurity22Appendix A: Responding to rising cyber-risks24Methodology27PwC cybe
4、rsecurity and privacy contacts by country28iPwCGlobal responses to risingrisksThe numbers have become numbing.Year after year, cyberattacks continue to escalate in frequency, severity and impact. Prevention and detection methods have proved largely ineffective against increasingly adept assaults, an
5、d many organizations dont know what to do, or dont have the resources to combat highly skilled and aggressive cybercriminals.38%Increase in detected information security incidents“Many executives are declaring cyber as the risk that will define our generation,” said Dennis Chesley, Global Risk Consu
6、lting Leader for PwC.22Turnaround and transformation in cybersecurity: Key findings from The Global State of Information Security Survey 2016At the same time, technologicalchange continues to disrupt how organizations compete and create value in ways that often alteroperating models. Some of todays
7、most significant business trends the explosion of data analytics, the digitization of business functions and a blending of service offerings across industries, to name a few have expanded the use of technologies and data, and that is creating more risk than ever before.Forward-leaning business leade
8、rsalso are rethinking their cybersecurity practices and focusing on a nexusof innovative technologies that can reduce these risks and improve business performance. If there is one unifying element among these technologies, it is cloud computing. The cloud is central to todays interconnected digital
9、ecosystem for individuals, businesses and governments. Furthermore, itis the platform that is enabling organizations of all sizes to leverage and link cloud-based cybersecurity tools, Big Data analytics and advanced authentication. The cloud also is the conduit that underpins new technology platform
10、s likethe Internet of Things (IoT) and mobile payment systems.essential. Thats why many aremoving toward a more collaborative approach to cybersecurity, onein which intelligence on threats and response techniques are shared with external partners in the public and private sectors.Internally, busines
11、ses are expandingthe roles of key executives and Boards of Directors to allow for enhanced communication of cyberthreat information and help build better-prepared, moreresilient cybersecurity capabilities. They also are implementing awareness programs to help educate employees and executives about c
12、ybersecurity fundamentals and human vulnerabilities like spear phishing, which remains a very successful attack technique.In addition, many executives seeover-regulation as a prime long-term disruptive trend in their industries. Other government impacts, including nation-state use of state- directed
13、 capital to fund and execute cyberattacks, have increasinglyserious implications for cybersecurity.Simply put, cloud computing hashad a towering impact on technology innovation in the past decadeand is likely to continue to do so. Research firm IDC predicts that spending on public cloud computing wi
14、ll soar to nearly $70 billion this year, and that the number of new cloud-based solutions will triple over the next four to fiveyears.1Another notable measure ofprogress is a willingness to invest in cybersecurity. This year, respondents to The Global State of Information Security Survey 2016 report
15、ed they have boosted information security spending significantly, and many are gearing up to tackle the cybersecurity juggernaut head on. (For details on incidents, impacts and costs, seeAppendix A). In this report, well show you how innovative businesses are going about this challenge,and how these
16、 efforts connect and intersect in ways that enable them to implement an integrated approach to protecting assets, reputationand competitive advantages.Together, these issues illustrate whycybersecurity risks have become top of mind for leaders in business and government. “Many executives are declari
17、ng cyber as the riskthat will define our generation,” said Dennis Chesley, Global Risk Consulting Leader for PwC. “Asa result, businesses are taking an enterprise-wide business-oriented view of this important risk area.”Technology alone wont turnaround the state of cybersecurity, however. Smart orga
18、nizations have always known that the human side of the security equation is equally1 IDC, Public Cloud Computing to Reach Nearly $70 billion in 2015 Worldwide, According to IDC, July 21, 20153PwCReclaiming cybersecurity through innovationThe rewards of risk-based frameworksAn effective cybersecurity
19、 program starts with a strategy and a foundation based on risks. So it was encouraging to find that the vast majority of organizations have adopted a security framework, or more often an amalgam of frameworksoften with very productive results.Risk-based frameworks also canhelp businesses design, mea
20、sure and monitor goals toward an improved cybersecurity program that centers around the safety and security of client and organizational information. The Canadian Imperial Bank of Commerce (CIBC), for instance,hasdevelopedascorecard based on framework controls that it uses to measure the maturity of
21、 its security program, accordingto Joe LoBianco, vice president of information security for the Toronto- based bank. “If we didnt have that framework providing the structure, progress would be difficult to measure year over year,” he said.91%The two most frequently implementedguidelines are ISO 2700
22、1 and the US National Institute of Standards and Technology (NIST) Cybersecurity Framework. These guidelines enable organizations to identifyand prioritize risks, gauge the maturity of their cybersecurity practices and better communicate internally and externally.Have adopted a risk-based cybersecur
23、ity frameworkBenefits of security frameworks49%Better able to identify & prioritize security risks47%Better able to quickly detect & mitigate security incidents45%Sensitive data is more secure37%Better understand security gaps & how to improve themImproved internal & external collaboration& communic
24、ations32%4Turnaround and transformation in cybersecurity: Key findings from The Global State of Information Security Survey 201669%Harnessing the powerof cloud-enabled cybersecurityCloud computing has emerged as a sophisticated tool for cybersecurity safeguards in recent years ascloud providers stea
25、dily invested in advanced technologies for data protection, privacy, network security and identity and access management. Many also haveadded capabilities that enable them to improve intelligence gathering and threat modeling, better block attacks, enhance collective learning and accelerate incident
26、 response.task because cloud providers havemassive processing horsepower necessary to quickly sift through a huge volume of threat and event data, he said. In addition, cloud providers are likely to have internal expertisein building algorithms for analytics, which is a difficult skill set for most
27、corporations to develop and grow.Another example of adoption ofcloud-based cybersecurity comes from Steelcase, the Grand Rapids, MI-based office furniture company.Steelcase employs a range ofcloud-based managed services that include advanced authentication, penetration and vulnerability testing, sec
28、urity alert analysis and network behavior analysis, according to Stuart Berman, IT security architectUse cloud-based cybersecurity servicesIts no wonder, then, that most surveyrespondents said they use cloud- based security services to help protect sensitive data and strengthen privacy. And they ent
29、rust a broadening range of critical services to the cloud, including real-time monitoring and analytics, advanced authentication and identity and access management.Adoption of cloud-based cybersecurity services56%55%For instance, Global Payments, aworldwide provider of payment technology services ba
30、sed in Atlanta, leverages private cloud managed services to handle threat monitoring and incident response. “We use a cloud-based solution that aggregates all of our alerts and threat information, and the solution then filters out events or alerts that are either considered not a security threat or
31、are a false positive,” said Guido Sacchi, the companys executive vice president and CIO. “It then communicatesevents that our Security Operations Center SOC needs to investigate.” The cloud is ideal for this type of48%47%44%Real-time monitoring & analyticsAdvanced authenticationIdentity & access man
32、agementThreat intelligenceEnd-point protection5PwCand innovation fellow. These cloudservices have helped the company build a security program that is capable as well as cost-effective. “The use of cloud-based managed security services, which require very deep and specific technical expertise, allows
33、 our full-time security employees to focus on identifying and managing security problems, rather than building and maintaining deep technical knowledge. That enables us to better manage costs based on risks,” Berman said.The synergies of cloud and DevOpsWeb-based companies are enhancing and automati
34、ng their cybersecurity programs through the adoption of DevOps, a software development model that promotes close collaboration between application developers and IT operations. This agile approach is particularly beneficial for companies that have thousands of active applications, as well as those t
35、hat deploy code updates very frequently. Streaming media provider Netflix, for example, employs DevOps to automate tasks like identifying changes in configurations across dozens of cloud services accounts.2When aligned with cloud-enabled services, DevOps can deliver powerfulenhancements to cybersecu
36、rity programs. Heres what the fusion of DevOps and cloud-based cybersecurity could look like: When an intruder modifies application code, automated analytics and monitoring software identifies the breach, terminates connections and alerts developers. Cybersecurity engineers then pinpoint changes mad
37、e by adversaries and repair the code. The system can then reroute all user traffic to the updated version and automaticallyissue a patch for all other vulnerable applications across the enterprise.The big impactof Big DataA growing number of organizations are leveraging Big Data analytics to model a
38、nd monitor for cybersecurity threats, respond to incidents, and audit and review data to understand how it is used, by whom and when.behavior for suspicious activity.But Big Data analytics typicallyrequires an enormous commitment to computing resources and software expertise. Companies like Global P
39、ayments address these challenges by using a cloud-based solutionto analyze the aggregated system log data because the cloud can better handle the heavy computing demands of such analysis.59%“Data analytics is an area that wereinvesting in right now,” said LoBianco of CIBC. “I think its going to be a
40、 significant growth area for us in the security space, one that will change how we do our work the most.”A data-driven approach can shiftsecurity away from perimeter-based defenses and enable organizations to put real-time information to use in ways that can help predict security incidents. Data-dri
41、ven cybersecurity enables companies to better understand anomalous network activity and more quickly identify and respond to security incidents. It also can be effective in reducing or quickly detecting employee security incidents by monitoring theirData analytics also can be combinedwith existing s
42、ecurity information and event management (SIEM) technologies to generate a more customizable and extensive view of network activity. CIBC is testing a new analytics-based threat detection and monitoring system to augment traditional rule-based SIEM, according to LoBianco. “This will essentially take
43、 data that weLeverage Big Data analytics for security2 Netflix, Announcing Security Monkey-AWS Security Configuration and Monitoring, June 30, 20146Turnaround and transformation in cybersecurity: Key findings from The Global State of Information Security Survey 2016Benefits of data-driven cybersecur
44、ity61%49%41%40%39%Better understanding of external threatsBetter understanding of internal threatsBetter understanding of user behaviorBetter visibility into anomalous network activityImproved ability to quickly identify & respond to security incidentscollect for SIEM, as well as someadditional data
45、, and provide a more open-ended and exploratory capability that will support ourSecurity Operations Center in threatdetection and monitoring,” he said.the data analysis solution looksfor patterns around the employee access entitlements and then identifies unwanted access.unknown network performancei
46、ssues. “Data analytics can help you find the needle in the haystack, and the needle in the haystack is not only the security needle, sometimes its a performance needle,” Berman said. “Thats what Big Data analysis is really good at: Finding patterns you didnt know existed and not necessarily answerin
47、g questions you have but answering questions you didnt have.”This kind of wide-open view canhelp companies improve systems in unexpected ways. Steelcase, for instance, deployed analytics to monitor for advanced persistentthreats and insider risks, but it also found that Big Data helped identifyOther
48、 organizations are exploringthe use of data analytics for identity and access management to monitor employee usage patterns and flag outliers. In this scenario,“Data analytics is an area that were investing in right now,” said Joe LoBianco of CIBC. “I think its going to be a significant growth area
49、for us in the security space, one that will change how we doour work the most.”7PwCReplacing passwordswith advanced authenticationIn an era in which passwords are generally considered inadequate, at best, its easy to understand why many organizations are turning to advanced authentication to helpman
50、ageaccess and improve trust among customers and business partners.Banks, in particular, are moving awayfrom traditional passwords for both clients and employees. LoBiancoof CIBC says one-time passwords sent to a clients mobile phone have proved popular with users and have enabled the bank to enhance
51、 its data security while trimming support desk costs. CIBC is also using two-factor authentication for employeeswithprivileged access to networks and data. Many employees already have strong- authentication tokens for remote access, and the bank is leveragingthe same token for privileged access wher
52、ever possible, he said.91%Use advanced authenticationAs noted above, many organizations areembracing advanced authenticationas a cloud service. The reason is pretty apparent, considering that many high- profile hacks begin with compromised credentials. “If youre counting on passwords for security, y
53、ouve got a problem,” said Berman of Steelcase, which uses a combination of one-time passwords and hardware tokens with cloud-based authentication platforms.Other businesses are developing andimplementing more advanced on- premises authentication technologies such as biometrics. USAA, the San Antonio
54、, TX-based financial services and insurance firm that caters to military veterans and service members, has implemented facial and voice recognition and fingerprint scanning for customer access to mobile apps.3 Biometrics has enabled USAA to enhance security andcustomerservice, reduce help desk calls
55、 and improve ease of use for customers.Benefits of advanced authentication50%Improved customer/business partner confidence in security & privacyAnother approach is hardware-basedauthentication. Tech giant Google has developed a USB device called Security Key that provides highly secure two-factor au
56、thentication for its Google for Work applications.4 Using the FIDO Alliances Universal 2nd Factor (U2F) standard, the Security Key transmits an encrypted signature rather than a verification code to help ensure that credentials cannot be phished. To authenticate, users simply tap the Security Key, a
57、 method that is faster than requesting and entering an authentication code.45%Enhanced fraud protection/reduced fraud44%More secure online transactions39%Improved customer experience38%Improved regulatory compliance3 SecureID News, Biometrics secure next generation of mobile banking apps, July 7, 20154 Google, The key for working smarter, faster, and more securely, April 21,20158Turnaround and transformation in cybersecurity: Key findings from The Global State of Information Security Sur
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 廣東司法警官職業(yè)學(xué)院《英語視聽說IV》2023-2024學(xué)年第一學(xué)期期末試卷
- 廣東省外語藝術(shù)職業(yè)學(xué)院《現(xiàn)代漢語(二)》2023-2024學(xué)年第一學(xué)期期末試卷
- 廣東輕工職業(yè)技術(shù)學(xué)院《物聯(lián)網(wǎng)移動應(yīng)用開發(fā)實踐》2023-2024學(xué)年第一學(xué)期期末試卷
- 廣東石油化工學(xué)院《土木工程專業(yè)導(dǎo)論》2023-2024學(xué)年第一學(xué)期期末試卷
- 廣東南方職業(yè)學(xué)院《兒童文學(xué)理論教學(xué)》2023-2024學(xué)年第一學(xué)期期末試卷
- 廣東茂名幼兒師范專科學(xué)?!懂a(chǎn)品形態(tài)設(shè)計基礎(chǔ)》2023-2024學(xué)年第一學(xué)期期末試卷
- 廣東茂名健康職業(yè)學(xué)院《小學(xué)隊原理與實踐》2023-2024學(xué)年第一學(xué)期期末試卷
- 廣東理工職業(yè)學(xué)院《口腔內(nèi)科學(xué)1》2023-2024學(xué)年第一學(xué)期期末試卷
- 五年級數(shù)學(xué)(小數(shù)四則混合運算)計算題專項練習(xí)及答案匯編
- 2022年施工實習(xí)報告
- 數(shù)據(jù)中心電力設(shè)備調(diào)試方案
- 2024年度國際物流運輸合同3篇
- 新入職員工年終工作總結(jié)課件
- 2024年危險化學(xué)品生產(chǎn)經(jīng)營單位其他從業(yè)人員考試題庫附答案
- 信號分析與處理課程設(shè)計課程教學(xué)大綱基本要求及規(guī)范(集中實踐環(huán)節(jié))
- 廣西南寧市第三十七中學(xué)2024-2025學(xué)年七年級上學(xué)期11月第一次月考語文試題(含答案)
- 2024-2025學(xué)年高二上學(xué)期期末數(shù)學(xué)試卷(基礎(chǔ)篇)(含答案)
- 2024年人力資源個人年終工作總結(jié)(6篇)
- 2024年中考物理真題及分類匯編-考點25:磁現(xiàn)象-電生磁
- 研究生攻讀(碩)博士學(xué)位期間擬開展的研究計劃范文
- 中華傳統(tǒng)文化之文學(xué)瑰寶學(xué)習(xí)通超星期末考試答案章節(jié)答案2024年
評論
0/150
提交評論