2016年全球信息安全状况调查 - 网络安全领域的转变和转型_en_201603_第1页
2016年全球信息安全状况调查 - 网络安全领域的转变和转型_en_201603_第2页
2016年全球信息安全状况调查 - 网络安全领域的转变和转型_en_201603_第3页
2016年全球信息安全状况调查 - 网络安全领域的转变和转型_en_201603_第4页
2016年全球信息安全状况调查 - 网络安全领域的转变和转型_en_201603_第5页
已阅读5页,还剩27页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、/gsissTurnaround and transformationin cybersecurityKey findings from The Global State of Information Security Survey2016Turnaround and transformation in cybersecurity: Key findings from The Global State of Information Security Survey 2016Table of contentsGlobal responses to rising risks2R

2、eclaiming cybersecurity through innovationThe rewards of risk-based frameworksHarnessingthe power of cloud-enabled cybersecurity The big impact of Big DataReplacingpasswords with advanced authentication Gearing up for the Internet of ThingsGoing mobile with paymentsPartneringupto sharpen security in

3、telligenceWhat cant be protected can be insured445689121315The evolving involvement of executives and the BoardBoards are more involved in cybersecurityDue diligence of cybersecurity in M&As181921Fit for the future of cybersecurity22Appendix A: Responding to rising cyber-risks24Methodology27PwC cybe

4、rsecurity and privacy contacts by country28iPwCGlobal responses to risingrisksThe numbers have become numbing.Year after year, cyberattacks continue to escalate in frequency, severity and impact. Prevention and detection methods have proved largely ineffective against increasingly adept assaults, an

5、d many organizations dont know what to do, or dont have the resources to combat highly skilled and aggressive cybercriminals.38%Increase in detected information security incidents“Many executives are declaring cyber as the risk that will define our generation,” said Dennis Chesley, Global Risk Consu

6、lting Leader for PwC.22Turnaround and transformation in cybersecurity: Key findings from The Global State of Information Security Survey 2016At the same time, technologicalchange continues to disrupt how organizations compete and create value in ways that often alteroperating models. Some of todays

7、most significant business trends the explosion of data analytics, the digitization of business functions and a blending of service offerings across industries, to name a few have expanded the use of technologies and data, and that is creating more risk than ever before.Forward-leaning business leade

8、rsalso are rethinking their cybersecurity practices and focusing on a nexusof innovative technologies that can reduce these risks and improve business performance. If there is one unifying element among these technologies, it is cloud computing. The cloud is central to todays interconnected digital

9、ecosystem for individuals, businesses and governments. Furthermore, itis the platform that is enabling organizations of all sizes to leverage and link cloud-based cybersecurity tools, Big Data analytics and advanced authentication. The cloud also is the conduit that underpins new technology platform

10、s likethe Internet of Things (IoT) and mobile payment systems.essential. Thats why many aremoving toward a more collaborative approach to cybersecurity, onein which intelligence on threats and response techniques are shared with external partners in the public and private sectors.Internally, busines

11、ses are expandingthe roles of key executives and Boards of Directors to allow for enhanced communication of cyberthreat information and help build better-prepared, moreresilient cybersecurity capabilities. They also are implementing awareness programs to help educate employees and executives about c

12、ybersecurity fundamentals and human vulnerabilities like spear phishing, which remains a very successful attack technique.In addition, many executives seeover-regulation as a prime long-term disruptive trend in their industries. Other government impacts, including nation-state use of state- directed

13、 capital to fund and execute cyberattacks, have increasinglyserious implications for cybersecurity.Simply put, cloud computing hashad a towering impact on technology innovation in the past decadeand is likely to continue to do so. Research firm IDC predicts that spending on public cloud computing wi

14、ll soar to nearly $70 billion this year, and that the number of new cloud-based solutions will triple over the next four to fiveyears.1Another notable measure ofprogress is a willingness to invest in cybersecurity. This year, respondents to The Global State of Information Security Survey 2016 report

15、ed they have boosted information security spending significantly, and many are gearing up to tackle the cybersecurity juggernaut head on. (For details on incidents, impacts and costs, seeAppendix A). In this report, well show you how innovative businesses are going about this challenge,and how these

16、 efforts connect and intersect in ways that enable them to implement an integrated approach to protecting assets, reputationand competitive advantages.Together, these issues illustrate whycybersecurity risks have become top of mind for leaders in business and government. “Many executives are declari

17、ng cyber as the riskthat will define our generation,” said Dennis Chesley, Global Risk Consulting Leader for PwC. “Asa result, businesses are taking an enterprise-wide business-oriented view of this important risk area.”Technology alone wont turnaround the state of cybersecurity, however. Smart orga

18、nizations have always known that the human side of the security equation is equally1 IDC, Public Cloud Computing to Reach Nearly $70 billion in 2015 Worldwide, According to IDC, July 21, 20153PwCReclaiming cybersecurity through innovationThe rewards of risk-based frameworksAn effective cybersecurity

19、 program starts with a strategy and a foundation based on risks. So it was encouraging to find that the vast majority of organizations have adopted a security framework, or more often an amalgam of frameworksoften with very productive results.Risk-based frameworks also canhelp businesses design, mea

20、sure and monitor goals toward an improved cybersecurity program that centers around the safety and security of client and organizational information. The Canadian Imperial Bank of Commerce (CIBC), for instance,hasdevelopedascorecard based on framework controls that it uses to measure the maturity of

21、 its security program, accordingto Joe LoBianco, vice president of information security for the Toronto- based bank. “If we didnt have that framework providing the structure, progress would be difficult to measure year over year,” he said.91%The two most frequently implementedguidelines are ISO 2700

22、1 and the US National Institute of Standards and Technology (NIST) Cybersecurity Framework. These guidelines enable organizations to identifyand prioritize risks, gauge the maturity of their cybersecurity practices and better communicate internally and externally.Have adopted a risk-based cybersecur

23、ity frameworkBenefits of security frameworks49%Better able to identify & prioritize security risks47%Better able to quickly detect & mitigate security incidents45%Sensitive data is more secure37%Better understand security gaps & how to improve themImproved internal & external collaboration& communic

24、ations32%4Turnaround and transformation in cybersecurity: Key findings from The Global State of Information Security Survey 201669%Harnessing the powerof cloud-enabled cybersecurityCloud computing has emerged as a sophisticated tool for cybersecurity safeguards in recent years ascloud providers stea

25、dily invested in advanced technologies for data protection, privacy, network security and identity and access management. Many also haveadded capabilities that enable them to improve intelligence gathering and threat modeling, better block attacks, enhance collective learning and accelerate incident

26、 response.task because cloud providers havemassive processing horsepower necessary to quickly sift through a huge volume of threat and event data, he said. In addition, cloud providers are likely to have internal expertisein building algorithms for analytics, which is a difficult skill set for most

27、corporations to develop and grow.Another example of adoption ofcloud-based cybersecurity comes from Steelcase, the Grand Rapids, MI-based office furniture company.Steelcase employs a range ofcloud-based managed services that include advanced authentication, penetration and vulnerability testing, sec

28、urity alert analysis and network behavior analysis, according to Stuart Berman, IT security architectUse cloud-based cybersecurity servicesIts no wonder, then, that most surveyrespondents said they use cloud- based security services to help protect sensitive data and strengthen privacy. And they ent

29、rust a broadening range of critical services to the cloud, including real-time monitoring and analytics, advanced authentication and identity and access management.Adoption of cloud-based cybersecurity services56%55%For instance, Global Payments, aworldwide provider of payment technology services ba

30、sed in Atlanta, leverages private cloud managed services to handle threat monitoring and incident response. “We use a cloud-based solution that aggregates all of our alerts and threat information, and the solution then filters out events or alerts that are either considered not a security threat or

31、are a false positive,” said Guido Sacchi, the companys executive vice president and CIO. “It then communicatesevents that our Security Operations Center SOC needs to investigate.” The cloud is ideal for this type of48%47%44%Real-time monitoring & analyticsAdvanced authenticationIdentity & access man

32、agementThreat intelligenceEnd-point protection5PwCand innovation fellow. These cloudservices have helped the company build a security program that is capable as well as cost-effective. “The use of cloud-based managed security services, which require very deep and specific technical expertise, allows

33、 our full-time security employees to focus on identifying and managing security problems, rather than building and maintaining deep technical knowledge. That enables us to better manage costs based on risks,” Berman said.The synergies of cloud and DevOpsWeb-based companies are enhancing and automati

34、ng their cybersecurity programs through the adoption of DevOps, a software development model that promotes close collaboration between application developers and IT operations. This agile approach is particularly beneficial for companies that have thousands of active applications, as well as those t

35、hat deploy code updates very frequently. Streaming media provider Netflix, for example, employs DevOps to automate tasks like identifying changes in configurations across dozens of cloud services accounts.2When aligned with cloud-enabled services, DevOps can deliver powerfulenhancements to cybersecu

36、rity programs. Heres what the fusion of DevOps and cloud-based cybersecurity could look like: When an intruder modifies application code, automated analytics and monitoring software identifies the breach, terminates connections and alerts developers. Cybersecurity engineers then pinpoint changes mad

37、e by adversaries and repair the code. The system can then reroute all user traffic to the updated version and automaticallyissue a patch for all other vulnerable applications across the enterprise.The big impactof Big DataA growing number of organizations are leveraging Big Data analytics to model a

38、nd monitor for cybersecurity threats, respond to incidents, and audit and review data to understand how it is used, by whom and when.behavior for suspicious activity.But Big Data analytics typicallyrequires an enormous commitment to computing resources and software expertise. Companies like Global P

39、ayments address these challenges by using a cloud-based solutionto analyze the aggregated system log data because the cloud can better handle the heavy computing demands of such analysis.59%“Data analytics is an area that wereinvesting in right now,” said LoBianco of CIBC. “I think its going to be a

40、 significant growth area for us in the security space, one that will change how we do our work the most.”A data-driven approach can shiftsecurity away from perimeter-based defenses and enable organizations to put real-time information to use in ways that can help predict security incidents. Data-dri

41、ven cybersecurity enables companies to better understand anomalous network activity and more quickly identify and respond to security incidents. It also can be effective in reducing or quickly detecting employee security incidents by monitoring theirData analytics also can be combinedwith existing s

42、ecurity information and event management (SIEM) technologies to generate a more customizable and extensive view of network activity. CIBC is testing a new analytics-based threat detection and monitoring system to augment traditional rule-based SIEM, according to LoBianco. “This will essentially take

43、 data that weLeverage Big Data analytics for security2 Netflix, Announcing Security Monkey-AWS Security Configuration and Monitoring, June 30, 20146Turnaround and transformation in cybersecurity: Key findings from The Global State of Information Security Survey 2016Benefits of data-driven cybersecur

44、ity61%49%41%40%39%Better understanding of external threatsBetter understanding of internal threatsBetter understanding of user behaviorBetter visibility into anomalous network activityImproved ability to quickly identify & respond to security incidentscollect for SIEM, as well as someadditional data

45、, and provide a more open-ended and exploratory capability that will support ourSecurity Operations Center in threatdetection and monitoring,” he said.the data analysis solution looksfor patterns around the employee access entitlements and then identifies unwanted access.unknown network performancei

46、ssues. “Data analytics can help you find the needle in the haystack, and the needle in the haystack is not only the security needle, sometimes its a performance needle,” Berman said. “Thats what Big Data analysis is really good at: Finding patterns you didnt know existed and not necessarily answerin

47、g questions you have but answering questions you didnt have.”This kind of wide-open view canhelp companies improve systems in unexpected ways. Steelcase, for instance, deployed analytics to monitor for advanced persistentthreats and insider risks, but it also found that Big Data helped identifyOther

48、 organizations are exploringthe use of data analytics for identity and access management to monitor employee usage patterns and flag outliers. In this scenario,“Data analytics is an area that were investing in right now,” said Joe LoBianco of CIBC. “I think its going to be a significant growth area

49、for us in the security space, one that will change how we doour work the most.”7PwCReplacing passwordswith advanced authenticationIn an era in which passwords are generally considered inadequate, at best, its easy to understand why many organizations are turning to advanced authentication to helpman

50、ageaccess and improve trust among customers and business partners.Banks, in particular, are moving awayfrom traditional passwords for both clients and employees. LoBiancoof CIBC says one-time passwords sent to a clients mobile phone have proved popular with users and have enabled the bank to enhance

51、 its data security while trimming support desk costs. CIBC is also using two-factor authentication for employeeswithprivileged access to networks and data. Many employees already have strong- authentication tokens for remote access, and the bank is leveragingthe same token for privileged access wher

52、ever possible, he said.91%Use advanced authenticationAs noted above, many organizations areembracing advanced authenticationas a cloud service. The reason is pretty apparent, considering that many high- profile hacks begin with compromised credentials. “If youre counting on passwords for security, y

53、ouve got a problem,” said Berman of Steelcase, which uses a combination of one-time passwords and hardware tokens with cloud-based authentication platforms.Other businesses are developing andimplementing more advanced on- premises authentication technologies such as biometrics. USAA, the San Antonio

54、, TX-based financial services and insurance firm that caters to military veterans and service members, has implemented facial and voice recognition and fingerprint scanning for customer access to mobile apps.3 Biometrics has enabled USAA to enhance security andcustomerservice, reduce help desk calls

55、 and improve ease of use for customers.Benefits of advanced authentication50%Improved customer/business partner confidence in security & privacyAnother approach is hardware-basedauthentication. Tech giant Google has developed a USB device called Security Key that provides highly secure two-factor au

56、thentication for its Google for Work applications.4 Using the FIDO Alliances Universal 2nd Factor (U2F) standard, the Security Key transmits an encrypted signature rather than a verification code to help ensure that credentials cannot be phished. To authenticate, users simply tap the Security Key, a

57、 method that is faster than requesting and entering an authentication code.45%Enhanced fraud protection/reduced fraud44%More secure online transactions39%Improved customer experience38%Improved regulatory compliance3 SecureID News, Biometrics secure next generation of mobile banking apps, July 7, 20154 Google, The key for working smarter, faster, and more securely, April 21,20158Turnaround and transformation in cybersecurity: Key findings from The Global State of Information Security Sur

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论