2013 DataProtection MaturityTrends: How DoYou Compare?
Today’s Agenda             Data Protection Trends             Aspects of Data Protection: The Survey Says …             A ...
Today’s Panelists          Paul Henry                    Chris Merritt     Security Consultant, Author   Director of Solut...
Data Protection Trends
Changing IT Network LandscapeSource: Is BYOD Right for Your Small Business?        by Melinda Emerson, PGi blog (24-Oct-20...
Increasing Threats LandscapeSource: Expect a wave of Java applet attacks: Microsoft        by Liam Tung, CSO Online (19-No...
Increasing Threats LandscapeSource: New Report Out of Taiwan Says Prepare For APT Warfare,        by Paul Henry in Optimal...
Evolving Organizational Landscape • According to the Ponemon Institute, 58% of organizations have more   than 25 malware i...
Uncertain Regulatory LandscapeRegulatory• An effort is underway to modernize the European Union framework for  data protec...
Aspects of Data Protection:   The Survey Says …
Discovering the State of Data ProtectionWorldwide Data Protection Maturity Assessment Survey• Anonymous Results• Over 406 ...
Administrative Controls12
Administrative Controls13
Technical Controls14
Technical Controls15
Technical Controls16
Organizational Motivation17
Organizational Motivation18
Organizational Motivation19
A Data Protection Maturity Model
A Model for Data Protection Maturity21
Data Protection Maturity Results22
Rising to the Challenge          Creating Policies          • Ad Hoc: Minimal or No Security Policies          • Optimal: ...
More Information• Free Security Scanner Tools                    • Get a Quote (and more) » Application Scanner – discover...
Global Headquarters8660 East Hartford DriveSuite 300Scottsdale, AZ 852551.888.725.7828info@lumension.comhttp://blog.lumens...
Upcoming SlideShare
Loading in...5
×

2013 Data Protection Maturity Trends: How Do You Compare?

613

Published on

In 2012 we found out that the BYOD environment and consumerization of the workplace had turned traditional notions of corporate IT upside down. The 2013 Data Protection Maturity Report will highlight how organizations have managed this trend over the last year and what steps are being taken in 2013 to further enhance data security. Find out how IT teams are developing a holistic model that encompasses policy, education, technology and enforcement.

Within this slide deck, we look at each of data protection trends, helping you define your organization’s best practice guide to address the top concerns. We will also be showing you how you can gauge the maturity of your security systems, allowing you to plug any holes before your valuable data starts to leak through them.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
613
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
23
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

2013 Data Protection Maturity Trends: How Do You Compare?

  1. 1. 2013 DataProtection MaturityTrends: How DoYou Compare?
  2. 2. Today’s Agenda Data Protection Trends Aspects of Data Protection: The Survey Says … A Model of Data Protection Maturity Recommendations
  3. 3. Today’s Panelists Paul Henry Chris Merritt Security Consultant, Author Director of Solution Marketing and Columnist Lumension3
  4. 4. Data Protection Trends
  5. 5. Changing IT Network LandscapeSource: Is BYOD Right for Your Small Business? by Melinda Emerson, PGi blog (24-Oct-2012)5
  6. 6. Increasing Threats LandscapeSource: Expect a wave of Java applet attacks: Microsoft by Liam Tung, CSO Online (19-Nov-2012)6
  7. 7. Increasing Threats LandscapeSource: New Report Out of Taiwan Says Prepare For APT Warfare, by Paul Henry in Optimal Security (Lumension) blog (15-Aug-2012)7
  8. 8. Evolving Organizational Landscape • According to the Ponemon Institute, 58% of organizations have more than 25 malware incidents each month, and another 20% are unsure how many incidents they’re dealing with.1 • The data breaches reported in 2012 increased almost 35% over 2011, according to datalossdb.org.2 • The average cost of a data breach was about $194 per record in 2011; of this, about 70% were indirect costs such as lost business, cus- tomer churn, etc.3 • About 70 – 80% of an organization’s market value is based on intangible assets such as IP.41. Ponemon Institute, 2013 State of the Endpoint (Dec-2012)2. Based on data retrieved 11-Jan-2013.3. Ponemon Institute, 2011 Cost of Data Breach Study (Mar-2012)4. Ocean Tomo, http://www.oceantomo.com/about/intellectualcapitalequity8
  9. 9. Uncertain Regulatory LandscapeRegulatory• An effort is underway to modernize the European Union framework for data protection rules (GDPR)• In the United States … » we see continued pressure from the States on the data protection front » on the Federal front, some are holding out hope for a comprehensive Cybersecurity Act, or an equivalent Executive Order » for public companies, we now have SEC guidance on cyber risks• Elsewhere, we see continued legislative action on data protection » examples include: Colombia, Italy and PhilippinesIndustry• Next PCI-DSS update scheduled for Oct-2013• NERC CIP 5 scheduled for vote in Apr-2013• Impact of legislation on FFIEC, NCUA, OCC, etc.9
  10. 10. Aspects of Data Protection: The Survey Says …
  11. 11. Discovering the State of Data ProtectionWorldwide Data Protection Maturity Assessment Survey• Anonymous Results• Over 406 Initial Respondents• Respondent ScreeningThree areas of focus• Administrative Controls• Technical Controls• “Organizational Motivation”11
  12. 12. Administrative Controls12
  13. 13. Administrative Controls13
  14. 14. Technical Controls14
  15. 15. Technical Controls15
  16. 16. Technical Controls16
  17. 17. Organizational Motivation17
  18. 18. Organizational Motivation18
  19. 19. Organizational Motivation19
  20. 20. A Data Protection Maturity Model
  21. 21. A Model for Data Protection Maturity21
  22. 22. Data Protection Maturity Results22
  23. 23. Rising to the Challenge Creating Policies • Ad Hoc: Minimal or No Security Policies • Optimal: Comprehensive & Exhaustive Enforcing Policies • Ad Hoc: Limited Technical Controls • Optimal: Robust Technical Controls Educating Staff • Ad Hoc: One-Time or No Training • Optimal: On-Going, Formal Training23
  24. 24. More Information• Free Security Scanner Tools • Get a Quote (and more) » Application Scanner – discover all the apps http://www.lumension.com/ being used in your network endpoint-management-security-suite/ » Vulnerability Scanner – discover all OS and buy-now.aspx#2 application vulnerabilities on your network » Device Scanner – discover all the devices being used in your network http://www.lumension.com/Resources/ Security-Tools.aspx• Lumension® Endpoint Management and Security Suite » Demo: http://www.lumension.com/endpoint- management-security-suite/demo.aspx » Evaluation: http://www.lumension.com/endpoint- management-security-suite/free-trial.aspx24
  25. 25. Global Headquarters8660 East Hartford DriveSuite 300Scottsdale, AZ 852551.888.725.7828info@lumension.comhttp://blog.lumension.com
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×