




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、/gsissTurnaround and transformationin cybersecurityKey findings from The Global State of Information Security Survey2016Turnaround and transformation in cybersecurity: Key findings from The Global State of Information Security Survey 2016Table of contentsGlobal responses to rising risks2R
2、eclaiming cybersecurity through innovationThe rewards of risk-based frameworksHarnessingthe power of cloud-enabled cybersecurity The big impact of Big DataReplacingpasswords with advanced authentication Gearing up for the Internet of ThingsGoing mobile with paymentsPartneringupto sharpen security in
3、telligenceWhat cant be protected can be insured445689121315The evolving involvement of executives and the BoardBoards are more involved in cybersecurityDue diligence of cybersecurity in M&As181921Fit for the future of cybersecurity22Appendix A: Responding to rising cyber-risks24Methodology27PwC cybe
4、rsecurity and privacy contacts by country28iPwCGlobal responses to risingrisksThe numbers have become numbing.Year after year, cyberattacks continue to escalate in frequency, severity and impact. Prevention and detection methods have proved largely ineffective against increasingly adept assaults, an
5、d many organizations dont know what to do, or dont have the resources to combat highly skilled and aggressive cybercriminals.38%Increase in detected information security incidents“Many executives are declaring cyber as the risk that will define our generation,” said Dennis Chesley, Global Risk Consu
6、lting Leader for PwC.22Turnaround and transformation in cybersecurity: Key findings from The Global State of Information Security Survey 2016At the same time, technologicalchange continues to disrupt how organizations compete and create value in ways that often alteroperating models. Some of todays
7、most significant business trends the explosion of data analytics, the digitization of business functions and a blending of service offerings across industries, to name a few have expanded the use of technologies and data, and that is creating more risk than ever before.Forward-leaning business leade
8、rsalso are rethinking their cybersecurity practices and focusing on a nexusof innovative technologies that can reduce these risks and improve business performance. If there is one unifying element among these technologies, it is cloud computing. The cloud is central to todays interconnected digital
9、ecosystem for individuals, businesses and governments. Furthermore, itis the platform that is enabling organizations of all sizes to leverage and link cloud-based cybersecurity tools, Big Data analytics and advanced authentication. The cloud also is the conduit that underpins new technology platform
10、s likethe Internet of Things (IoT) and mobile payment systems.essential. Thats why many aremoving toward a more collaborative approach to cybersecurity, onein which intelligence on threats and response techniques are shared with external partners in the public and private sectors.Internally, busines
11、ses are expandingthe roles of key executives and Boards of Directors to allow for enhanced communication of cyberthreat information and help build better-prepared, moreresilient cybersecurity capabilities. They also are implementing awareness programs to help educate employees and executives about c
12、ybersecurity fundamentals and human vulnerabilities like spear phishing, which remains a very successful attack technique.In addition, many executives seeover-regulation as a prime long-term disruptive trend in their industries. Other government impacts, including nation-state use of state- directed
13、 capital to fund and execute cyberattacks, have increasinglyserious implications for cybersecurity.Simply put, cloud computing hashad a towering impact on technology innovation in the past decadeand is likely to continue to do so. Research firm IDC predicts that spending on public cloud computing wi
14、ll soar to nearly $70 billion this year, and that the number of new cloud-based solutions will triple over the next four to fiveyears.1Another notable measure ofprogress is a willingness to invest in cybersecurity. This year, respondents to The Global State of Information Security Survey 2016 report
15、ed they have boosted information security spending significantly, and many are gearing up to tackle the cybersecurity juggernaut head on. (For details on incidents, impacts and costs, seeAppendix A). In this report, well show you how innovative businesses are going about this challenge,and how these
16、 efforts connect and intersect in ways that enable them to implement an integrated approach to protecting assets, reputationand competitive advantages.Together, these issues illustrate whycybersecurity risks have become top of mind for leaders in business and government. “Many executives are declari
17、ng cyber as the riskthat will define our generation,” said Dennis Chesley, Global Risk Consulting Leader for PwC. “Asa result, businesses are taking an enterprise-wide business-oriented view of this important risk area.”Technology alone wont turnaround the state of cybersecurity, however. Smart orga
18、nizations have always known that the human side of the security equation is equally1 IDC, Public Cloud Computing to Reach Nearly $70 billion in 2015 Worldwide, According to IDC, July 21, 20153PwCReclaiming cybersecurity through innovationThe rewards of risk-based frameworksAn effective cybersecurity
19、 program starts with a strategy and a foundation based on risks. So it was encouraging to find that the vast majority of organizations have adopted a security framework, or more often an amalgam of frameworksoften with very productive results.Risk-based frameworks also canhelp businesses design, mea
20、sure and monitor goals toward an improved cybersecurity program that centers around the safety and security of client and organizational information. The Canadian Imperial Bank of Commerce (CIBC), for instance,hasdevelopedascorecard based on framework controls that it uses to measure the maturity of
21、 its security program, accordingto Joe LoBianco, vice president of information security for the Toronto- based bank. “If we didnt have that framework providing the structure, progress would be difficult to measure year over year,” he said.91%The two most frequently implementedguidelines are ISO 2700
22、1 and the US National Institute of Standards and Technology (NIST) Cybersecurity Framework. These guidelines enable organizations to identifyand prioritize risks, gauge the maturity of their cybersecurity practices and better communicate internally and externally.Have adopted a risk-based cybersecur
23、ity frameworkBenefits of security frameworks49%Better able to identify & prioritize security risks47%Better able to quickly detect & mitigate security incidents45%Sensitive data is more secure37%Better understand security gaps & how to improve themImproved internal & external collaboration& communic
24、ations32%4Turnaround and transformation in cybersecurity: Key findings from The Global State of Information Security Survey 201669%Harnessing the powerof cloud-enabled cybersecurityCloud computing has emerged as a sophisticated tool for cybersecurity safeguards in recent years ascloud providers stea
25、dily invested in advanced technologies for data protection, privacy, network security and identity and access management. Many also haveadded capabilities that enable them to improve intelligence gathering and threat modeling, better block attacks, enhance collective learning and accelerate incident
26、 response.task because cloud providers havemassive processing horsepower necessary to quickly sift through a huge volume of threat and event data, he said. In addition, cloud providers are likely to have internal expertisein building algorithms for analytics, which is a difficult skill set for most
27、corporations to develop and grow.Another example of adoption ofcloud-based cybersecurity comes from Steelcase, the Grand Rapids, MI-based office furniture company.Steelcase employs a range ofcloud-based managed services that include advanced authentication, penetration and vulnerability testing, sec
28、urity alert analysis and network behavior analysis, according to Stuart Berman, IT security architectUse cloud-based cybersecurity servicesIts no wonder, then, that most surveyrespondents said they use cloud- based security services to help protect sensitive data and strengthen privacy. And they ent
29、rust a broadening range of critical services to the cloud, including real-time monitoring and analytics, advanced authentication and identity and access management.Adoption of cloud-based cybersecurity services56%55%For instance, Global Payments, aworldwide provider of payment technology services ba
30、sed in Atlanta, leverages private cloud managed services to handle threat monitoring and incident response. “We use a cloud-based solution that aggregates all of our alerts and threat information, and the solution then filters out events or alerts that are either considered not a security threat or
31、are a false positive,” said Guido Sacchi, the companys executive vice president and CIO. “It then communicatesevents that our Security Operations Center SOC needs to investigate.” The cloud is ideal for this type of48%47%44%Real-time monitoring & analyticsAdvanced authenticationIdentity & access man
32、agementThreat intelligenceEnd-point protection5PwCand innovation fellow. These cloudservices have helped the company build a security program that is capable as well as cost-effective. “The use of cloud-based managed security services, which require very deep and specific technical expertise, allows
33、 our full-time security employees to focus on identifying and managing security problems, rather than building and maintaining deep technical knowledge. That enables us to better manage costs based on risks,” Berman said.The synergies of cloud and DevOpsWeb-based companies are enhancing and automati
34、ng their cybersecurity programs through the adoption of DevOps, a software development model that promotes close collaboration between application developers and IT operations. This agile approach is particularly beneficial for companies that have thousands of active applications, as well as those t
35、hat deploy code updates very frequently. Streaming media provider Netflix, for example, employs DevOps to automate tasks like identifying changes in configurations across dozens of cloud services accounts.2When aligned with cloud-enabled services, DevOps can deliver powerfulenhancements to cybersecu
36、rity programs. Heres what the fusion of DevOps and cloud-based cybersecurity could look like: When an intruder modifies application code, automated analytics and monitoring software identifies the breach, terminates connections and alerts developers. Cybersecurity engineers then pinpoint changes mad
37、e by adversaries and repair the code. The system can then reroute all user traffic to the updated version and automaticallyissue a patch for all other vulnerable applications across the enterprise.The big impactof Big DataA growing number of organizations are leveraging Big Data analytics to model a
38、nd monitor for cybersecurity threats, respond to incidents, and audit and review data to understand how it is used, by whom and when.behavior for suspicious activity.But Big Data analytics typicallyrequires an enormous commitment to computing resources and software expertise. Companies like Global P
39、ayments address these challenges by using a cloud-based solutionto analyze the aggregated system log data because the cloud can better handle the heavy computing demands of such analysis.59%“Data analytics is an area that wereinvesting in right now,” said LoBianco of CIBC. “I think its going to be a
40、 significant growth area for us in the security space, one that will change how we do our work the most.”A data-driven approach can shiftsecurity away from perimeter-based defenses and enable organizations to put real-time information to use in ways that can help predict security incidents. Data-dri
41、ven cybersecurity enables companies to better understand anomalous network activity and more quickly identify and respond to security incidents. It also can be effective in reducing or quickly detecting employee security incidents by monitoring theirData analytics also can be combinedwith existing s
42、ecurity information and event management (SIEM) technologies to generate a more customizable and extensive view of network activity. CIBC is testing a new analytics-based threat detection and monitoring system to augment traditional rule-based SIEM, according to LoBianco. “This will essentially take
43、 data that weLeverage Big Data analytics for security2 Netflix, Announcing Security Monkey-AWS Security Configuration and Monitoring, June 30, 20146Turnaround and transformation in cybersecurity: Key findings from The Global State of Information Security Survey 2016Benefits of data-driven cybersecur
44、ity61%49%41%40%39%Better understanding of external threatsBetter understanding of internal threatsBetter understanding of user behaviorBetter visibility into anomalous network activityImproved ability to quickly identify & respond to security incidentscollect for SIEM, as well as someadditional data
45、, and provide a more open-ended and exploratory capability that will support ourSecurity Operations Center in threatdetection and monitoring,” he said.the data analysis solution looksfor patterns around the employee access entitlements and then identifies unwanted access.unknown network performancei
46、ssues. “Data analytics can help you find the needle in the haystack, and the needle in the haystack is not only the security needle, sometimes its a performance needle,” Berman said. “Thats what Big Data analysis is really good at: Finding patterns you didnt know existed and not necessarily answerin
47、g questions you have but answering questions you didnt have.”This kind of wide-open view canhelp companies improve systems in unexpected ways. Steelcase, for instance, deployed analytics to monitor for advanced persistentthreats and insider risks, but it also found that Big Data helped identifyOther
48、 organizations are exploringthe use of data analytics for identity and access management to monitor employee usage patterns and flag outliers. In this scenario,“Data analytics is an area that were investing in right now,” said Joe LoBianco of CIBC. “I think its going to be a significant growth area
49、for us in the security space, one that will change how we doour work the most.”7PwCReplacing passwordswith advanced authenticationIn an era in which passwords are generally considered inadequate, at best, its easy to understand why many organizations are turning to advanced authentication to helpman
50、ageaccess and improve trust among customers and business partners.Banks, in particular, are moving awayfrom traditional passwords for both clients and employees. LoBiancoof CIBC says one-time passwords sent to a clients mobile phone have proved popular with users and have enabled the bank to enhance
51、 its data security while trimming support desk costs. CIBC is also using two-factor authentication for employeeswithprivileged access to networks and data. Many employees already have strong- authentication tokens for remote access, and the bank is leveragingthe same token for privileged access wher
52、ever possible, he said.91%Use advanced authenticationAs noted above, many organizations areembracing advanced authenticationas a cloud service. The reason is pretty apparent, considering that many high- profile hacks begin with compromised credentials. “If youre counting on passwords for security, y
53、ouve got a problem,” said Berman of Steelcase, which uses a combination of one-time passwords and hardware tokens with cloud-based authentication platforms.Other businesses are developing andimplementing more advanced on- premises authentication technologies such as biometrics. USAA, the San Antonio
54、, TX-based financial services and insurance firm that caters to military veterans and service members, has implemented facial and voice recognition and fingerprint scanning for customer access to mobile apps.3 Biometrics has enabled USAA to enhance security andcustomerservice, reduce help desk calls
55、 and improve ease of use for customers.Benefits of advanced authentication50%Improved customer/business partner confidence in security & privacyAnother approach is hardware-basedauthentication. Tech giant Google has developed a USB device called Security Key that provides highly secure two-factor au
56、thentication for its Google for Work applications.4 Using the FIDO Alliances Universal 2nd Factor (U2F) standard, the Security Key transmits an encrypted signature rather than a verification code to help ensure that credentials cannot be phished. To authenticate, users simply tap the Security Key, a
57、 method that is faster than requesting and entering an authentication code.45%Enhanced fraud protection/reduced fraud44%More secure online transactions39%Improved customer experience38%Improved regulatory compliance3 SecureID News, Biometrics secure next generation of mobile banking apps, July 7, 20154 Google, The key for working smarter, faster, and more securely, April 21,20158Turnaround and transformation in cybersecurity: Key findings from The Global State of Information Security Sur
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 劳动局合同模板
- 股权转让顾问协议二零二五年
- 二零二五厦门二手房买卖合同大全
- 房屋抵押协议书二零二五年
- 个人猪场转让合同
- 二零二五版冷静期离婚协议书
- 家庭宽带业务协议
- 知识产权共有协议二零二五年
- 活体买卖合同
- 二零二五版党建联建共建协议书
- 2025届贵州省安顺市高三二模语文试题
- 2025中国海洋大学辅导员考试题库
- 新疆维吾尔自治区普通高职(专科)单招政策解读与报名课件
- 2024年昆明渝润水务有限公司招聘考试真题
- 2025-2030中国小武器和轻武器行业市场发展趋势与前景展望战略研究报告
- 高中主题班会 高考励志冲刺主题班会课件
- 高三复习:2025年高中化学模拟试题及答案
- 月考试卷(1~3单元)(试题)-2024-2025学年六年级下册数学人教版(带答案)
- 8.1薪火相传的传统美德 教学设计-2024-2025学年统编版道德与法治七年级下册
- 中国急性缺血性卒中诊治指南(2023)解读
- 2025年中国大唐集团有限公司校园招聘笔试参考题库附带答案详解
评论
0/150
提交评论