State of Cybersecurity - ISACA [PDF]

to go unchecked and the sophistication of attack methodologies is evolving. .... How concerned is your organization's bo

19 downloads 23 Views 4MB Size

Recommend Stories


[PDF] Cybersecurity and Cyberwar
Your big opportunity may be right where you are now. Napoleon Hill

[PDF] Cybersecurity and Cyberwar
Kindness, like a boomerang, always returns. Unknown

cybersecurity
If you are irritated by every rub, how will your mirror be polished? Rumi

Cybersecurity
I tried to make sense of the Four Books, until love arrived, and it all became a single syllable. Yunus

cybersecurity
Nothing in nature is unbeautiful. Alfred, Lord Tennyson

Cybersecurity
The wound is the place where the Light enters you. Rumi

cybersecurity
Stop acting so small. You are the universe in ecstatic motion. Rumi

cybersecurity
Your task is not to seek for love, but merely to seek and find all the barriers within yourself that

Cybersecurity
You're not going to master the rest of your life in one day. Just relax. Master the day. Than just keep

ISACA One-Day Workshop
And you? When will you begin that long journey into yourself? Rumi

Idea Transcript


State of Cybersecurity Implications for 2016 An ISACA and RSA Conference Survey

State of Cybersecurity: Implications for 2016

The State of Cybersecurity In November and December 2015, ISACA and RSA Conference conducted a global survey of 461 cybersecurity managers and practitioners. Survey participants confirmed that the number of breaches targeting organizational and individual data continues to go unchecked and the sophistication of attack methodologies is evolving. The current state of global cybersecurity remains chaotic, the attacks are not expected to slow down, and almost 75 percent of respondents expect to fall prey to a cyberattack in 2016. Cybercriminals are the most prevalent attackers and continue to employ social engineering as their primary initial attack vector.

As the rate of incidents continues to escalate, the magnitude of related brand, reputation, and fiscal impact is driving organizations to address cybersecurity risk. Executive leadership teams are demonstrating cybersecurity resiliency support by taking a more active role in enforcing policy, mandating awareness training, supporting budgetary increases for cybersecurity-related technology and training, and modeling the way by practicing good cybersecurity practices themselves. Although enterprises continue to increase spending and effort on cybersecurity, respondents indicate that they struggle to fill positions with highly skilled workers—60 percent of all respondents do not believe their information security staff can handle anything more than simple cybersecurity incidents.

Survey Methodology An invitation to participate in the survey was emailed to a global population of cybersecurity professionals composed of individuals holding ISACA’s Certified Information Security Manager® (CISM®) and Cybersecurity Nexus Practitioner™ (CSX Practitioner™) designations, individuals in information security positions, RSA Conference’s Loyalty Plus customers, and individuals preregistered for the 2016 RSA Conference. The survey data were collected anonymously through SurveyMonkey®. The results reveal many interesting findings that indicate positives and negatives for cybersecurity professionals. The survey, which used multiple-choice and Likert scale formats, was organized in four major sections:

Demographics Organizational security Threats, attacks and crime Emerging trends

© 2016 ISACA. All Rights Reserved.

2

State of Cybersecurity: Implications for 2016

The populations invited to respond to the survey were selected ISACA certification holders and RSA Conference constituents. Due to the nature of the survey, the targeted population consisted of individuals who have cybersecurity job responsibilities. More than 842 individuals participated, of which 461 indicated that their primary job function is cybersecurity or information security. The data represented in this report reflect the information provided by those 461 individuals. A typical respondent can be described as:

81%

North America

A member of ISACA

21%

financial services

© 2016 ISACA. All Rights Reserved.

Europe/Asia

46%

79%

Cybersecurity/ Information Security Management

Working in technology services/consulting

22%

39%

69%

Cybersecurity/ Information Security Practitioners

21%

Employed in an enterprise with at least 1,000 employees

3

State of Cybersecurity: Implications for 2016

While the norms of the sample population are interesting to consider, it is important to note some characteristics that reflect the population’s diversity. Among those surveyed, respondents hailed from more than 20 industries (figure 1) and all five major global regions (figure 2).

Figure 1—Industry Representation In which of the following industries are you employed? 2%

Aerospace

Education/Student

3%

Financial Banking

22%

Government/ Military-National

15%

6%

Healthcare/Medical

3%

Insurance

Legal/Law/ Real Estate

2%

Manufacturing/ Engineering

5%

Mining/Construction/ Petroleum

2%

Pharmaceutical

1%

Public Accounting

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.