SlideShare a Scribd company logo
1 of 39
Download to read offline
Leaders & Laggards:
The 2019 Cyber Resilient Organization Study
1
Sponsored by
Our Speakers
Dr. Larry Ponemon
The Ponemon Institute
Maria Battaglia
IBM Security
The Ponemon
Institute
Ponemon Institute Presentation Private and Confidential 4
Cyber Resilience
An enterprise’s capacity to
maintain its core purpose and
integrity in the face of
cyberattacks through the
alignment of prevention,
detection and response
capabilities to manage, mitigate
and move on from cyberattacks.
The Ponemon Study on The Cyber Resilient
Organization YOY Trends Since 2015
Ponemon Institute Presentation Private and Confidential 5
Challenges
Implementing and practicing a response plan
Containing the growing number & severity of cyber
attacks
Managing a large number of tools & solutions
Complying to GDPR
Improvements
Organizations gained overall Cyber
Resilience
Better Ability to Prevent Attacks
More value on Cyber Resilience
2019 Study
Results
Ponemon Institute Presentation Private and Confidential 6
The 2019 Study on Cyber Resilient Organization
Ponemon Institute Presentation Private and Confidential
In Year 4
3,655
45%
12 Countries
7
Southeast Asian countries (ASEAN),
Australia, Brazil, Canada, Germany,
France, India, Japan, The Middle East
(UAE/Saudi Arabia). The United
Kingdom & the United States
IT & Security Professionals
Respondents Manager level and
above
Able to Benchmark at scale
Organizations rate their Cyber Resilience as better
but all else is steady
Ponemon Institute Presentation Private and Confidential 8
32%
40%
49%
53%
48%
55%
52%
50%
54%54% 53% 53%
49%
53%
0%
10%
20%
30%
40%
50%
60%
Cyber
resilience
Prevent a cyber
attack
Quickly detect
a cyber attack
Contain a cyber
attack
Respond to a
cyber attack *
* Response not available in 2016
FY2016 FY2017 FY2018
6%
Improvement in
Cyber Resilience
from 2016 – today.
1 = low ability to 10 = high ability, 7+ responses reported
In 2019, top ways to improve CyberResilience were hiring,
visibility into applications, and improving information
governance practices
Ponemon Institute Presentation Private and Confidential 9
17%
24%
28%
29%
36%
40%
50%
56%
57%
62%
15%
23%
29%
30%
39%
39%
47%
60%
57%
61%
0% 10% 20% 30% 40% 50% 60% 70%
Board-level reporting on the organization’s…
C-level buy-in and support for the…
Training for end-users
Training and certification for Cybersecurity…
Engaging a managed security services…
Elimination of silo and turf issues
Implementation of new technology,…
Improved information governance practices
Visibility into applications and data assets
Hiring skilled personnel
FY2017 FY2018
Organizations measured these improvements based on cyber attacks
prevented, time shortened to identify the incident & to contain the
incident.
More than one response permitted
Ponemon Institute Presentation Private and Confidential 10
1%
12%
15%
16%
22%
22%
27%
31%
48%
51%
55%
0% 10% 20% 30% 40% 50% 60%
Other
Increased market share
Decreased operating cost
Increased share value
Enhanced reputation and…
Increased revenues
Data center availability (uptime)
Increased productivity of employees
Time to contain the incident
Time to identify the incident
Cyber attacks prevented
Cybersecurity & cyber resilience budget remains steady
Ponemon Institute Presentation Private and Confidential 11
Extrapolated average (millions) US$ 2018 2017 2016
Cybersecurity budget $11.6 $11.3 $11.4
Percentage allocated to cyber resilience
activities
31% 30% 30%
Total average budget allocated to cyber
resilience
$3.6 $3.4 $3.4
2019 Cyber Resilience Deeper
Findings
Ponemon Institute Presentation Private and Confidential 12
Studied the High Performers
- Technology Adoption Trend
Automation
- Alignment between Privacy & Cyber
Security
High Performers
Ponemon Institute Presentation Private and Confidential 13
Represent 26% of the 3655
in the study
Highest level of cyber resilience
More prepared to respond
Less impacted by cyber threats.
Report less attacks, better
containment and recovery
Ponemon Institute Presentation Private and Confidential
Confidence
Dedication
Communication
Skills
Industry
Awareness
Streamlined SOC
14
Who are High Performers?
High Performers See Results Across All Areas
IBM Security / © 2019 IBM Corporation 15
preventing
an attack
+16%
detecting
an attack
+23%
responding to
an attack
+15%
containing an
attack
+25%
Better
CyberResilience
+18%
Ponemon Institute Presentation Private and Confidential 16
High Performers have less data breaches
Very frequently and Frequently responses
combined
30%
45%
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
50%
High performer Overall
High performers experience
15%less data breaches than the
overall group .
How Do High
Performers
Achieve Better
Overall
CyberResilience?
Ponemon Institute Presentation Private and Confidential 18
69%
31%
56%
44%
0%
10%
20%
30%
40%
50%
60%
70%
80%
Yes No
High performer Overall
High performers are more likely to share
information about data breaches with
government or industry peers.
13%
more likely to
participate in threat
sharing
70%
produce either a formal or
‘ad hoc’ report on the
organizations Cyber
Resilience to their
executive level and Board
Ponemon Institute Presentation Private and Confidential
19
51%
19%
30%
40%
21%
39%
0%
10%
20%
30%
40%
50%
60%
Yes, formal report Yes, informal or
“ad hoc” report
No
High performer Overall
High Performers Talk to the Board and C Suite Regularly
High Performers Adopt and Deploy New Methods &
Technologies
Ponemon Institute Presentation Private and Confidential 20
+7% Threat Sharing & Intel
Programs
+10% Use DevOPs & Secure SDLC
+12% Use of Cybersecurity
Analytics
+12% Leverage AI
60% 57%
45%
32%
53%
47%
33%
20%
0%
10%
20%
30%
40%
50%
60%
70%
High automation Overall
High performers embrace both artificial intelligence and
machine learning
Ponemon Institute Presentation Private and Confidential 21
Embraced AI & ML
+82% High Performers are using in
moderately or significantly
Only +18% insignificant
or no automation versus 30% of all
organizations
34%
48%
8% 10%
23%
48%
11%
18%
0%
10%
20%
30%
40%
50%
60%
Yes,
significant
use
Yes,
moderate use
Yes,
insignificant
No use
High performer Overall
Ponemon Institute Presentation Private and Confidential 22
0% 1%
9%
43%
47%
2%
6%
17%
43%
32%
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
50%
1 or 2 3 or 4 5 or 6 7 or 8 9 or 10
High performer Overall
High Performers value Automation
On a scale From 1 = low value to 10 = high value
High performers
are
15%
More likely to rate
automation as a 9
and above
Ponemon Institute Presentation Private and Confidential 23
24%
25%
27%
23%
5%
9%
31%
55%
0% 10% 20% 30% 40% 50% 60%
We don’t have a CSIRP
Our CSIRP is informal or “ad hoc”
We have a CSIRP, but is not applied
consistently across the enterprise
We have a CSIRP that is applied
consistently across the entire enterprise
High performer Overall
High Performers have a set cybersecurity incident
response plan (CSIRP)
32%
Of high performers have a
CSIRP that is applied
consistently across the
entire enterprise
Automations impact on
CyberResilience
Ponemon Institute Presentation Private and Confidential 24
Threat Sharing
& Advanced
Technologies
Prevention Confidence
Skilled
Professionals
Reduce
Complexity
GDPR
Compliance
Ponemon Institute Presentation Private and Confidential 25
30%
33%
48%
41%
43%
60%
0% 10% 20% 30% 40% 50% 60% 70%
Staffing for cybersecurity is sufficient to achieve a
high level of cyber resilience
Funding for cybersecurity is sufficient to achieve a
high level of cyber resilience
Too many separate security solutions and
technologies are deployed which increases
operational complexity and reduces visibility
High performer Overall
High Performers have a greater ability
to achieve a high level of cyber
resilience
Strongly agree and Agree responses combined
Collaboration
between privacy
and cyber
security improves
cyber resilience
Ponemon Institute Presentation Private and Confidential 26
Organizations that implement automation recognize the
importance of the privacy role
Essential and Very important responses combined
Ponemon Institute Presentation Private and Confidential 27
66%
71%
65% 62%
0%
10%
20%
30%
40%
50%
60%
70%
80%
The importance of the privacy role The importance of aligning the privacy and
cybersecurity roles
High automation Overall
If alignment is essential or very important, why?
More than one response permitted
Ponemon Institute Presentation Private and Confidential 28
2%
48%
49%
60%
63%
0% 10% 20% 30% 40% 50% 60% 70%
Other
Increase in perceived trustworthiness
More effective approach to compliance with data
protection regulations (such as GDPR)
Less redundancy and more efficiency in both
privacy and cybersecurity operations
Reduction in silos and turf issues
How long has your organization’s
current CPO or privacy leader held
their position?
March 2019
Ponemon Institute Presentation Private and Confidential 29
27%
11%
19%
20%
14%
9%
0% 5% 10% 15% 20% 25% 30%
Currently, we don’t have a CPO or privacy
leader
Less than 1 year
1 to 3 years
4 to 6 years
7 to 10 years
More than 10 years
Average full-time headcount of the organization’s privacy
function today and what it should be
Extrapolated values presented
Ponemon Institute Presentation Private and Confidential 30
3.21
3.95
1.00
1.50
2.00
2.50
3.00
3.50
4.00
4.50
Full-time equivalent (FTE) headcount of
your privacy function today
What the full-time equivalent (FTE) privacy
headcount should be to achieve cyber
resilience
Recommendations for High Cyber Resilience
Ponemon Institute Presentation Private and Confidential 31
Focus on
Prevention
Build &
Deploy CSIRP
widely
Retain &
Train Talent
Invest in
Automation
Align Privacy &
Security
Value Privacy
function
Participate in Threat
Sharing
Page 32Ponemon Institute Presentation Private and Confidential
Questions?
Caveats
Ponemon Institute Presentation Private and Confidential 33
This study utilizes a confidential and proprietary benchmark method that has been successfully deployed in earlier Ponemon
Institute research. However, there are inherent limitations to benchmark research that need to be carefully considered before
drawing conclusions from findings.
Non-response bias: The current findings are based on a sample of survey returns. We sent surveys to a representative sample of
individuals, resulting in a large number of usable returned responses. Despite non-response tests, it is always possible that
individuals who did not participate are substantially different in terms of underlying beliefs from those who completed the
instrument.
Sampling-frame bias: The accuracy is based on contact information and the degree to which the list is representative of individuals
who are IT or IT security practitioners. We also acknowledge that the results may be biased by external events such as media
coverage. Finally, because we used a Web-based collection method, it is possible that non-Web responses by mailed survey or
telephone call would result in a different pattern of findings.
Self-reported results: The quality of survey research is based on the integrity of confidential responses received from subjects.
While certain checks and balances can be incorporated into the survey process, there is always the possibility that a subject did not
provide accurate responses.
Ponemon Institute Presentation Private and Confidential 34
92%
79%
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
High performer Overall
It is very important to have skilled
cybersecurity professionals in a CSIRP
1 = low importance to 10 = high importance,
7+ responses reported
Ponemon Institute Presentation Private and Confidential 35
49%
56%
60%
61%
56%
62%
65%
66%
0% 10% 20% 30% 40% 50% 60% 70%
Leaders recognize that cyber resilience
affects brand and reputation
Leaders recognize that enterprise risks
affect cyber resilience
Leaders recognize that automation,
machine learning, artificial intelligence
and orchestration strengthens our…
Leaders recognize that cyber resilience
affects revenues
High performer Overall
Senior management’s awareness about the
positive impact of cyber resilience on the
enterprise
Strongly agree and Agree responses combined
Ponemon Institute Presentation Private and Confidential 36
35%
35%
30%
23%
24%
53%
0% 10% 20% 30% 40% 50% 60%
We have too many security solutions and
technologies to achieve cyber resilience
We do not have enough security
solutions and technologies to achieve
cyber resilience
We have the right number of security
solutions and technologies to achieve
cyber resilience
High performer Overall
What one statement best describes the
number of separate security technologies
deployed by your organization
The eight most effective security
technologies
Twenty-two technologies were listed in
the survey instrument
Ponemon Institute Presentation Private and Confidential 37
44%
50%
53%
53%
55%
56%
56%
69%
55%
52%
59%
53%
41%
70%
58%
52%
53%
58%
41%
71%
0% 10% 20% 30% 40% 50% 60% 70% 80%
Intrusion detection & prevention
Network traffic surveillance
Intelligence and threat sharing *
Anti-malware solution (AVAM)
Cryptographic technologies *
Incident response platform
Security information & event management
Identity management & authentication
* Response not available in FY2016 & FY2017
FY2016 FY2017 FY2018
Some organizations do not find the
value in threat-sharing programs
Four responses permitted
Ponemon Institute Presentation Private and Confidential 38
3%
34%
39%
43%
43%
52%
53%
60%
73%
4%
9%
16%
11%
19%
24%
33%
43%
40%
4%
11%
16%
10%
21%
22%
33%
42%
42%
0% 10% 20% 30% 40% 50% 60% 70% 80%
Other
Do not know about options to share
intelligence
Lack of incentives
Potential liability of sharing
Anti-competitive concerns
Risk of the exposure of sensitive and
confidential information
Cost
Lack of resources
No perceived benefit to my organization
FY2016 FY2017 FY2018
73%
of organizations
do not see a
benefit to threat-
sharing programs
Threat sharing paves the way for
collaboration between peers and
industry groups
Three choices allowed
Ponemon Institute Presentation Private and Confidential 39
46%
52%
55%
58%
58%
58%
58%
72%
57%
32%
52%
75%
53%
33%
0% 10% 20% 30% 40% 50% 60% 70% 80%
Reduces the cost of detecting and
preventing data breaches
Improves the effectiveness of our incident
response plan
Enhances the timeliness of incident
response
Improves the cyber resilience of my
organization *
Improves the ability to detect, contain and
respond *
Fosters collaboration among peers,
industry groups and government
* Response not available in 2016 & 2017
FY2016 FY2017 FY2018

More Related Content

What's hot

What's hot (20)

EMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-Security
 
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
 
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ... 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Cyber Secuirty Visualization
Cyber Secuirty VisualizationCyber Secuirty Visualization
Cyber Secuirty Visualization
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
Trends in Information Security
Trends in Information SecurityTrends in Information Security
Trends in Information Security
 
2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of Security
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun Intended
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 

Similar to Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on the Cyber Resilient Organization

Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
IDG
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014
Peggy Lawless
 

Similar to Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on the Cyber Resilient Organization (20)

Cloud Management in the U.S. Federal Government
Cloud Management in the U.S. Federal GovernmentCloud Management in the U.S. Federal Government
Cloud Management in the U.S. Federal Government
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
 
Unlocking High Fidelity Security
Unlocking High Fidelity SecurityUnlocking High Fidelity Security
Unlocking High Fidelity Security
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
 
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...
 
NEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfNEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdf
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014
 
CompTIA 2014 IT Trends in Review
CompTIA 2014 IT Trends in ReviewCompTIA 2014 IT Trends in Review
CompTIA 2014 IT Trends in Review
 

More from IBM Security

Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
IBM Security
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
IBM Security
 

More from IBM Security (20)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
 

Recently uploaded

CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 

Recently uploaded (20)

%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 

Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on the Cyber Resilient Organization

  • 1. Leaders & Laggards: The 2019 Cyber Resilient Organization Study 1 Sponsored by
  • 2. Our Speakers Dr. Larry Ponemon The Ponemon Institute Maria Battaglia IBM Security
  • 4. Ponemon Institute Presentation Private and Confidential 4 Cyber Resilience An enterprise’s capacity to maintain its core purpose and integrity in the face of cyberattacks through the alignment of prevention, detection and response capabilities to manage, mitigate and move on from cyberattacks.
  • 5. The Ponemon Study on The Cyber Resilient Organization YOY Trends Since 2015 Ponemon Institute Presentation Private and Confidential 5 Challenges Implementing and practicing a response plan Containing the growing number & severity of cyber attacks Managing a large number of tools & solutions Complying to GDPR Improvements Organizations gained overall Cyber Resilience Better Ability to Prevent Attacks More value on Cyber Resilience
  • 6. 2019 Study Results Ponemon Institute Presentation Private and Confidential 6
  • 7. The 2019 Study on Cyber Resilient Organization Ponemon Institute Presentation Private and Confidential In Year 4 3,655 45% 12 Countries 7 Southeast Asian countries (ASEAN), Australia, Brazil, Canada, Germany, France, India, Japan, The Middle East (UAE/Saudi Arabia). The United Kingdom & the United States IT & Security Professionals Respondents Manager level and above Able to Benchmark at scale
  • 8. Organizations rate their Cyber Resilience as better but all else is steady Ponemon Institute Presentation Private and Confidential 8 32% 40% 49% 53% 48% 55% 52% 50% 54%54% 53% 53% 49% 53% 0% 10% 20% 30% 40% 50% 60% Cyber resilience Prevent a cyber attack Quickly detect a cyber attack Contain a cyber attack Respond to a cyber attack * * Response not available in 2016 FY2016 FY2017 FY2018 6% Improvement in Cyber Resilience from 2016 – today. 1 = low ability to 10 = high ability, 7+ responses reported
  • 9. In 2019, top ways to improve CyberResilience were hiring, visibility into applications, and improving information governance practices Ponemon Institute Presentation Private and Confidential 9 17% 24% 28% 29% 36% 40% 50% 56% 57% 62% 15% 23% 29% 30% 39% 39% 47% 60% 57% 61% 0% 10% 20% 30% 40% 50% 60% 70% Board-level reporting on the organization’s… C-level buy-in and support for the… Training for end-users Training and certification for Cybersecurity… Engaging a managed security services… Elimination of silo and turf issues Implementation of new technology,… Improved information governance practices Visibility into applications and data assets Hiring skilled personnel FY2017 FY2018
  • 10. Organizations measured these improvements based on cyber attacks prevented, time shortened to identify the incident & to contain the incident. More than one response permitted Ponemon Institute Presentation Private and Confidential 10 1% 12% 15% 16% 22% 22% 27% 31% 48% 51% 55% 0% 10% 20% 30% 40% 50% 60% Other Increased market share Decreased operating cost Increased share value Enhanced reputation and… Increased revenues Data center availability (uptime) Increased productivity of employees Time to contain the incident Time to identify the incident Cyber attacks prevented
  • 11. Cybersecurity & cyber resilience budget remains steady Ponemon Institute Presentation Private and Confidential 11 Extrapolated average (millions) US$ 2018 2017 2016 Cybersecurity budget $11.6 $11.3 $11.4 Percentage allocated to cyber resilience activities 31% 30% 30% Total average budget allocated to cyber resilience $3.6 $3.4 $3.4
  • 12. 2019 Cyber Resilience Deeper Findings Ponemon Institute Presentation Private and Confidential 12 Studied the High Performers - Technology Adoption Trend Automation - Alignment between Privacy & Cyber Security
  • 13. High Performers Ponemon Institute Presentation Private and Confidential 13
  • 14. Represent 26% of the 3655 in the study Highest level of cyber resilience More prepared to respond Less impacted by cyber threats. Report less attacks, better containment and recovery Ponemon Institute Presentation Private and Confidential Confidence Dedication Communication Skills Industry Awareness Streamlined SOC 14 Who are High Performers?
  • 15. High Performers See Results Across All Areas IBM Security / © 2019 IBM Corporation 15 preventing an attack +16% detecting an attack +23% responding to an attack +15% containing an attack +25% Better CyberResilience +18%
  • 16. Ponemon Institute Presentation Private and Confidential 16 High Performers have less data breaches Very frequently and Frequently responses combined 30% 45% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% High performer Overall High performers experience 15%less data breaches than the overall group .
  • 17. How Do High Performers Achieve Better Overall CyberResilience?
  • 18. Ponemon Institute Presentation Private and Confidential 18 69% 31% 56% 44% 0% 10% 20% 30% 40% 50% 60% 70% 80% Yes No High performer Overall High performers are more likely to share information about data breaches with government or industry peers. 13% more likely to participate in threat sharing
  • 19. 70% produce either a formal or ‘ad hoc’ report on the organizations Cyber Resilience to their executive level and Board Ponemon Institute Presentation Private and Confidential 19 51% 19% 30% 40% 21% 39% 0% 10% 20% 30% 40% 50% 60% Yes, formal report Yes, informal or “ad hoc” report No High performer Overall High Performers Talk to the Board and C Suite Regularly
  • 20. High Performers Adopt and Deploy New Methods & Technologies Ponemon Institute Presentation Private and Confidential 20 +7% Threat Sharing & Intel Programs +10% Use DevOPs & Secure SDLC +12% Use of Cybersecurity Analytics +12% Leverage AI 60% 57% 45% 32% 53% 47% 33% 20% 0% 10% 20% 30% 40% 50% 60% 70% High automation Overall
  • 21. High performers embrace both artificial intelligence and machine learning Ponemon Institute Presentation Private and Confidential 21 Embraced AI & ML +82% High Performers are using in moderately or significantly Only +18% insignificant or no automation versus 30% of all organizations 34% 48% 8% 10% 23% 48% 11% 18% 0% 10% 20% 30% 40% 50% 60% Yes, significant use Yes, moderate use Yes, insignificant No use High performer Overall
  • 22. Ponemon Institute Presentation Private and Confidential 22 0% 1% 9% 43% 47% 2% 6% 17% 43% 32% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 1 or 2 3 or 4 5 or 6 7 or 8 9 or 10 High performer Overall High Performers value Automation On a scale From 1 = low value to 10 = high value High performers are 15% More likely to rate automation as a 9 and above
  • 23. Ponemon Institute Presentation Private and Confidential 23 24% 25% 27% 23% 5% 9% 31% 55% 0% 10% 20% 30% 40% 50% 60% We don’t have a CSIRP Our CSIRP is informal or “ad hoc” We have a CSIRP, but is not applied consistently across the enterprise We have a CSIRP that is applied consistently across the entire enterprise High performer Overall High Performers have a set cybersecurity incident response plan (CSIRP) 32% Of high performers have a CSIRP that is applied consistently across the entire enterprise
  • 24. Automations impact on CyberResilience Ponemon Institute Presentation Private and Confidential 24 Threat Sharing & Advanced Technologies Prevention Confidence Skilled Professionals Reduce Complexity GDPR Compliance
  • 25. Ponemon Institute Presentation Private and Confidential 25 30% 33% 48% 41% 43% 60% 0% 10% 20% 30% 40% 50% 60% 70% Staffing for cybersecurity is sufficient to achieve a high level of cyber resilience Funding for cybersecurity is sufficient to achieve a high level of cyber resilience Too many separate security solutions and technologies are deployed which increases operational complexity and reduces visibility High performer Overall High Performers have a greater ability to achieve a high level of cyber resilience Strongly agree and Agree responses combined
  • 26. Collaboration between privacy and cyber security improves cyber resilience Ponemon Institute Presentation Private and Confidential 26
  • 27. Organizations that implement automation recognize the importance of the privacy role Essential and Very important responses combined Ponemon Institute Presentation Private and Confidential 27 66% 71% 65% 62% 0% 10% 20% 30% 40% 50% 60% 70% 80% The importance of the privacy role The importance of aligning the privacy and cybersecurity roles High automation Overall
  • 28. If alignment is essential or very important, why? More than one response permitted Ponemon Institute Presentation Private and Confidential 28 2% 48% 49% 60% 63% 0% 10% 20% 30% 40% 50% 60% 70% Other Increase in perceived trustworthiness More effective approach to compliance with data protection regulations (such as GDPR) Less redundancy and more efficiency in both privacy and cybersecurity operations Reduction in silos and turf issues
  • 29. How long has your organization’s current CPO or privacy leader held their position? March 2019 Ponemon Institute Presentation Private and Confidential 29 27% 11% 19% 20% 14% 9% 0% 5% 10% 15% 20% 25% 30% Currently, we don’t have a CPO or privacy leader Less than 1 year 1 to 3 years 4 to 6 years 7 to 10 years More than 10 years
  • 30. Average full-time headcount of the organization’s privacy function today and what it should be Extrapolated values presented Ponemon Institute Presentation Private and Confidential 30 3.21 3.95 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 Full-time equivalent (FTE) headcount of your privacy function today What the full-time equivalent (FTE) privacy headcount should be to achieve cyber resilience
  • 31. Recommendations for High Cyber Resilience Ponemon Institute Presentation Private and Confidential 31 Focus on Prevention Build & Deploy CSIRP widely Retain & Train Talent Invest in Automation Align Privacy & Security Value Privacy function Participate in Threat Sharing
  • 32. Page 32Ponemon Institute Presentation Private and Confidential Questions?
  • 33. Caveats Ponemon Institute Presentation Private and Confidential 33 This study utilizes a confidential and proprietary benchmark method that has been successfully deployed in earlier Ponemon Institute research. However, there are inherent limitations to benchmark research that need to be carefully considered before drawing conclusions from findings. Non-response bias: The current findings are based on a sample of survey returns. We sent surveys to a representative sample of individuals, resulting in a large number of usable returned responses. Despite non-response tests, it is always possible that individuals who did not participate are substantially different in terms of underlying beliefs from those who completed the instrument. Sampling-frame bias: The accuracy is based on contact information and the degree to which the list is representative of individuals who are IT or IT security practitioners. We also acknowledge that the results may be biased by external events such as media coverage. Finally, because we used a Web-based collection method, it is possible that non-Web responses by mailed survey or telephone call would result in a different pattern of findings. Self-reported results: The quality of survey research is based on the integrity of confidential responses received from subjects. While certain checks and balances can be incorporated into the survey process, there is always the possibility that a subject did not provide accurate responses.
  • 34. Ponemon Institute Presentation Private and Confidential 34 92% 79% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% High performer Overall It is very important to have skilled cybersecurity professionals in a CSIRP 1 = low importance to 10 = high importance, 7+ responses reported
  • 35. Ponemon Institute Presentation Private and Confidential 35 49% 56% 60% 61% 56% 62% 65% 66% 0% 10% 20% 30% 40% 50% 60% 70% Leaders recognize that cyber resilience affects brand and reputation Leaders recognize that enterprise risks affect cyber resilience Leaders recognize that automation, machine learning, artificial intelligence and orchestration strengthens our… Leaders recognize that cyber resilience affects revenues High performer Overall Senior management’s awareness about the positive impact of cyber resilience on the enterprise Strongly agree and Agree responses combined
  • 36. Ponemon Institute Presentation Private and Confidential 36 35% 35% 30% 23% 24% 53% 0% 10% 20% 30% 40% 50% 60% We have too many security solutions and technologies to achieve cyber resilience We do not have enough security solutions and technologies to achieve cyber resilience We have the right number of security solutions and technologies to achieve cyber resilience High performer Overall What one statement best describes the number of separate security technologies deployed by your organization
  • 37. The eight most effective security technologies Twenty-two technologies were listed in the survey instrument Ponemon Institute Presentation Private and Confidential 37 44% 50% 53% 53% 55% 56% 56% 69% 55% 52% 59% 53% 41% 70% 58% 52% 53% 58% 41% 71% 0% 10% 20% 30% 40% 50% 60% 70% 80% Intrusion detection & prevention Network traffic surveillance Intelligence and threat sharing * Anti-malware solution (AVAM) Cryptographic technologies * Incident response platform Security information & event management Identity management & authentication * Response not available in FY2016 & FY2017 FY2016 FY2017 FY2018
  • 38. Some organizations do not find the value in threat-sharing programs Four responses permitted Ponemon Institute Presentation Private and Confidential 38 3% 34% 39% 43% 43% 52% 53% 60% 73% 4% 9% 16% 11% 19% 24% 33% 43% 40% 4% 11% 16% 10% 21% 22% 33% 42% 42% 0% 10% 20% 30% 40% 50% 60% 70% 80% Other Do not know about options to share intelligence Lack of incentives Potential liability of sharing Anti-competitive concerns Risk of the exposure of sensitive and confidential information Cost Lack of resources No perceived benefit to my organization FY2016 FY2017 FY2018 73% of organizations do not see a benefit to threat- sharing programs
  • 39. Threat sharing paves the way for collaboration between peers and industry groups Three choices allowed Ponemon Institute Presentation Private and Confidential 39 46% 52% 55% 58% 58% 58% 58% 72% 57% 32% 52% 75% 53% 33% 0% 10% 20% 30% 40% 50% 60% 70% 80% Reduces the cost of detecting and preventing data breaches Improves the effectiveness of our incident response plan Enhances the timeliness of incident response Improves the cyber resilience of my organization * Improves the ability to detect, contain and respond * Fosters collaboration among peers, industry groups and government * Response not available in 2016 & 2017 FY2016 FY2017 FY2018