• Share
  • Email
  • Embed
  • Like
  • Private Content
State of endpoint risk v3
 

State of endpoint risk v3

on

  • 423 views

 

Statistics

Views

Total Views
423
Views on SlideShare
423
Embed Views
0

Actions

Likes
0
Downloads
4
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Larry

State of endpoint risk v3 State of endpoint risk v3 Presentation Transcript

  • The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
  • Today’s Agenda
    2011 Trends in the Threat Landscape
    State of Endpoint Risk 2011:
    Survey Results
    Summary and Recommendations
    Q&A
  • Today’s Panelists
    Dr. Larry Ponemon
    Founder
    Ponemon Institute
    Paul Henry
    Security & Forensics Analyst
    MCP+I, MCSE, CCSA, CCSE, CFSA, CFSO, CISSP,-ISSAP, CISM, CISA, CIFI, CCE
    3
  • 4
    2011 Threat Trends
    State-sponsored cyber crime will become a regular occurrence
    Social media goes deeper – increasing threats
    Security will finally arrive for virtualization
    Wikileaks will not go away
    Mobile devices will come under greater attack
    VoIP will be used as a covert channel in data breaches
    Medicare fraud via ID theft will see explosive growth
    View Paul’s entire blog at: http://blog.lumension.com/?p=3507
  • State of Endpoint Risk 2011Survey Results
  • PonemonInstituteLLC
    • The Institute is dedicated to advancing responsible information management practices that positively affect privacy and data protection in business and government.
    • The Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations.
    • Ponemon Institute is a full member of CASRO (Council of American Survey Research Organizations. Dr. Ponemon serves as CASRO’s chairman of Government & Public Affairs Committee of the Board.
    • The Institute has assembled more than 50 leading multinational corporations called the RIM Council, which focuses the development and execution of ethical principles for the collection and use of personal data about people and households.
    6
  • Project Summary
    The purpose of this study is to determine how effective organizations are in the protection of their endpoints and what they perceive are the biggest obstacles to reducing risk.
    Our study involves 564 respondents located in the United States who are deeply involved in their organization’s IT function.
    51 percent are managers or hold higher positions in their organizations.
    50 percent report directly to the chief information officer (CIO).
    21 percent report to the chief information security officer (CISO).
    28 percent work in IT security.
    22 percent are in IT operations.
    21 percent are in IT management. 
    7
  • Industry distribution of the 564 respondents
    8
  • Attributions About Endpoint Security
    Agree = strongly agree and agree combined.
    Disagree = unsure, disagree and strongly disagree combined.
    9
  • Is your IT network more secure now than it was a year ago?
    The study finds that the majority of respondents believe their organizations’ endpoints are vulnerable to attacks. 64 percent of respondents say their organizations’ IT networks are not more secure than last year percent or are unsure (36 percent + 28 percent).
    10
  • Which of the following incidents happened during the past year?
    Organizations face a variety of incidents that threaten the security of the endpoint. During the past year, 98 percent have had virus or malware network intrusions, 95 percent have had desktops and laptops or other devices stolen. Eighty-nine percent have lost sensitive data because of a negligent insider and 61 percent lost sensitive data because of a malicious insider.
    11
  • Which incidents are you seeing frequently in your IT network?
    The most frequently encountered IT network incidents are general malware attacks (92 percent of respondents), web-borne malware attacks (75 percent of respondents), botnet attacks (64 percent of respondents) and SQL injections (38 percent of respondents).
    12
  • Have your malware incidents increased over the past year?
    43 percent of respondents say there has been a major increase in malware attacks and 22 percent say there has been a slight increase over the past year. Only 9 percent of respondents believe malware attacks have decreased over the past year.
    13
  • How many malware incidents does your org deal with monthly?
    35 percent of respondents say they have had more than 50 malware attempt incidents each month. Another 27 percent believe their organizations encounter between 25 to 50 malware attacks each month. On average, that means that there can be one or more malware attacks per day.
    14
  • Where is the greatest rise of potential IT risk? (Top 3 choices)
    Only 11 percent say the network infrastructure environment (gateway to endpoint) and vulnerabilities within their operating systems are driving greater potential IT risks. 10 percent say removable devices such as USB sticks and/or media such as CDs and data centers are contributing to IT risks.
    15
  • Which one incident represents your biggest headache?
    The top three incidents that present the most difficult challenges for respondents are zero day attacks (35 percent), SQL injections (23 percent) and the exploit of existing software vulnerabilities greater than three months old (16 percent).
    16
  •  Which are the greatest IT security risks next year? (Top 3 concerns)
    The below chart lists in descending order what respondents perceive as the seven most serious security risks their organizations will face in the near future. Respondents predict the top three IT security risks in the next 12 months will be:
    17
  • Which endpoint technologies does your org use?
    Nearly everyone (98 percent) has anti-virus and anti-malware technologies in place followed by endpoint firewalls (60 percent) and intrusion detection systems
    18
  • Which endpoint technologies are most effective?
    Respondents reveal what we refer to as the gap between the technologies used and the technologies considered most effective.
    19
  • Is your IT organization’s operating cost increasing?
    20
  • What are the main cost drivers to increasing IT OPEX?
    The two main cost drivers are lost employee productivity (64 percent) and IT staff bandwidth consumption (40 percent). With respect to bandwidth, this has become a critical issue as IT and end-users access Internet sites that provide rich content such as videos.
    21
  • Does your org have application installation and usage policies?
    They are, however, leaving their endpoints vulnerable by allowing the indiscriminate use of applications or not enforcing policies governing the appropriate use of applications. As shown below, 38 percent of respondents have policies regarding application installation and usage but do not enforce them and one-third of organizations allow any applications to be used.
    22
  • Endpoint apps - what are the greatest challenges? (Top 3 choices)
    The top 3 challenges with respect to their endpoint applications are: preventing applications from being installed or executing on their endpoints (55 percent), discovering what applications are residing on the network (47 percent) and ensuring that vulnerable applications are patched (42 percent).
    23
  • What application management capabilities does your org have?
    Respondents say they have the following capabilities in place or plan to implement in the next 12 months:
    24
  • Which Web 2.0 challenges are of greatest concern?
    The concern respondents have about negligent and malicious insiders is reflected in their response to how Web 2.0/social media will affect their information risk environment. The top Web 2.0/social media challenges facing respondents’ organizations are: ability for IT to identify applications in use across the IT network (59 percent), ability to manage the risk of inadvertent exposure of data (51 percent) and increasing malware (48 percent).
    25
  • Are any of these applications forbidden by policy or blocked?
    When it comes to IT security, which applications concern you the most in terms of increasing vulnerabilities and IT risk?
    26
  • Do you have a dedicated team for patch/vulnerability management?
    Twenty-six percent have not changed their priorities regarding patch/vulnerability management. Fifty-two percent say they do not have a dedicated team for patch/vulnerability management. One-third of respondents say they do have a dedicated team and 15 percent are planning to create one.
    27
  • Summary of Findings
    Current approaches to endpoint security are ineffective and costly.
    Organizations do not feel more secure than they did last year.
    This is mainly due to the use of ineffective technology solutions when better, more effective/efficient technologies exist but are not heavily implemented.
    IT operating expenses are increasing and a main driver of those costs is tied directly to an increase in malware incidents.
    59 percent of respondents consider malware a significant factor in those cost drivers.
    Malware is on the rise with attack vectors focused more on third-party and web-based applications.
    28
  • Q&A
  • Global Headquarters
    8660 East Hartford Drive
    Suite 300
    Scottsdale, AZ 85255
    1.888.725.7828
    info@lumension.com