SlideShare a Scribd company logo
1 of 1
Download to read offline
C
ommonnvybersecu
st C ource I estmen rity
Mo Res Monitoring/Assessment ts

Cybersecurity

How Tech Companies
Prepare for Cyber Attacks

98%

Of small and mid-size
technology and healthcare
companies are maintaining or increasing
resources devoted to cybersecurity this year,
preparing for when, not if, cyber attacks occur.

50%

Are increasing their spend,
and investing in active
response, not infrastructure.

18%

Policies/controls

Just

35%

Are completely or
very confident
in the security of
their company
information.

15%

Hiring

12%

Software

8%

52%

Are storing their
info privately,
not in the public
cloud.

Firewalls

76%

54%

Say cyber attacks
threaten serious
business interruption.

Of non-security companies
have or plan to add a
cybersecurity component
to their product.

8%

entication/Acces
uth
s
A

6%

Encryption

6%

46%

Say media
attention
has increased
awareness of
the issue.

78%

Say their data
and IP are threatened.

Statistics come from the results of an SVB survey about cybersecurity completed by 216 C-level executives from US-based technology and life science companies in July 2013. B-13-12992. Rev. 09-20-13

More Related Content

What's hot

What's hot (20)

ICS Security in the Energy Industry
ICS Security in the Energy IndustryICS Security in the Energy Industry
ICS Security in the Energy Industry
 
2018 IDG Security Priorities Infographic
2018 IDG Security Priorities Infographic2018 IDG Security Priorities Infographic
2018 IDG Security Priorities Infographic
 
2018 Trends in Cybersecurity: Building Effective Security Teams
2018 Trends in Cybersecurity: Building Effective Security Teams 2018 Trends in Cybersecurity: Building Effective Security Teams
2018 Trends in Cybersecurity: Building Effective Security Teams
 
Security automation system
Security automation systemSecurity automation system
Security automation system
 
Infosecurity Europe - Infographic
Infosecurity Europe - InfographicInfosecurity Europe - Infographic
Infosecurity Europe - Infographic
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
Understanding the Security-Specific Purchase Process [Infographic]
Understanding the Security-Specific Purchase Process [Infographic]Understanding the Security-Specific Purchase Process [Infographic]
Understanding the Security-Specific Purchase Process [Infographic]
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
 
State of the CIO 2018 Infographic
State of the CIO 2018 InfographicState of the CIO 2018 Infographic
State of the CIO 2018 Infographic
 
Cloud Insights 2018
Cloud Insights 2018Cloud Insights 2018
Cloud Insights 2018
 
2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update
 
The State of Network Security 2014
The State of Network Security 2014The State of Network Security 2014
The State of Network Security 2014
 
Managing Security Policies Across Hybrid Cloud Environments
Managing Security Policies Across Hybrid Cloud EnvironmentsManaging Security Policies Across Hybrid Cloud Environments
Managing Security Policies Across Hybrid Cloud Environments
 
The Value of Using Security Policy Orchestration and Automation for Improving...
The Value of Using Security Policy Orchestration and Automation for Improving...The Value of Using Security Policy Orchestration and Automation for Improving...
The Value of Using Security Policy Orchestration and Automation for Improving...
 
Cyber Security Infographic
Cyber Security InfographicCyber Security Infographic
Cyber Security Infographic
 
Insights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense ReportInsights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense Report
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 

Viewers also liked

06 19-11 am your place in him
06 19-11 am  your place in him06 19-11 am  your place in him
06 19-11 am your place in him
Jerry Watts
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity Assessment
Claude Baudoin
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 

Viewers also liked (17)

ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
Security Maturity Models.
Security Maturity Models.Security Maturity Models.
Security Maturity Models.
 
06 19-11 am your place in him
06 19-11 am  your place in him06 19-11 am  your place in him
06 19-11 am your place in him
 
NTXISSACSC3 - Beyond ISO 27034 - Intel's Product Security Maturity Model (PSM...
NTXISSACSC3 - Beyond ISO 27034 - Intel's Product Security Maturity Model (PSM...NTXISSACSC3 - Beyond ISO 27034 - Intel's Product Security Maturity Model (PSM...
NTXISSACSC3 - Beyond ISO 27034 - Intel's Product Security Maturity Model (PSM...
 
Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...
 
The Future of Cybersecurity
The Future of CybersecurityThe Future of Cybersecurity
The Future of Cybersecurity
 
Estimating Development Security Maturity in About an Hour
Estimating Development Security Maturity in About an HourEstimating Development Security Maturity in About an Hour
Estimating Development Security Maturity in About an Hour
 
NISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best PracticeNISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best Practice
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity Assessment
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
Cybersecurity Risk Assessment - 'All Done' with WISER
Cybersecurity Risk Assessment - 'All Done' with WISERCybersecurity Risk Assessment - 'All Done' with WISER
Cybersecurity Risk Assessment - 'All Done' with WISER
 
The Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesThe Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best Practices
 

Similar to Cybersecurity's Impact on Innovation

Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
IBM Security
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
IBM Security
 

Similar to Cybersecurity's Impact on Innovation (20)

Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel
 
IDG 2020 Security Priorities Research
IDG 2020 Security Priorities ResearchIDG 2020 Security Priorities Research
IDG 2020 Security Priorities Research
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian Summary
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22
 
Healthcare Cybersecurity Survey 2018 - Sirius
Healthcare Cybersecurity Survey 2018 - SiriusHealthcare Cybersecurity Survey 2018 - Sirius
Healthcare Cybersecurity Survey 2018 - Sirius
 
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 

More from Silicon Valley Bank

Silicon Valley Bank 2017 State of the Wine Industry Report
Silicon Valley Bank 2017 State of the Wine Industry ReportSilicon Valley Bank 2017 State of the Wine Industry Report
Silicon Valley Bank 2017 State of the Wine Industry Report
Silicon Valley Bank
 

More from Silicon Valley Bank (20)

2019 Startup Outlook Canada Report
2019 Startup Outlook Canada Report2019 Startup Outlook Canada Report
2019 Startup Outlook Canada Report
 
2019 Startup Outlook China Report
2019 Startup Outlook China Report2019 Startup Outlook China Report
2019 Startup Outlook China Report
 
2019 Startup Outlook US Report
2019 Startup Outlook US Report2019 Startup Outlook US Report
2019 Startup Outlook US Report
 
Trends in Healthcare Investments and Exits 2018 - Mid-Year Report
Trends in Healthcare Investments and Exits 2018 - Mid-Year ReportTrends in Healthcare Investments and Exits 2018 - Mid-Year Report
Trends in Healthcare Investments and Exits 2018 - Mid-Year Report
 
SVB State of the Markets Q3 2018
SVB State of the Markets Q3 2018SVB State of the Markets Q3 2018
SVB State of the Markets Q3 2018
 
Women in Technology Leadership 2018
Women in Technology Leadership 2018Women in Technology Leadership 2018
Women in Technology Leadership 2018
 
Trends in Healthcare Investments and Exits 2018
Trends in Healthcare Investments and Exits 2018Trends in Healthcare Investments and Exits 2018
Trends in Healthcare Investments and Exits 2018
 
US Startup Outlook 2018
US Startup Outlook 2018US Startup Outlook 2018
US Startup Outlook 2018
 
How Paperless Payables Can Streamline Ops and Improve Cash Flow
How Paperless Payables Can Streamline Ops and Improve Cash FlowHow Paperless Payables Can Streamline Ops and Improve Cash Flow
How Paperless Payables Can Streamline Ops and Improve Cash Flow
 
Trends in Healthcare Investments and Exits: Mid-Year 2017
Trends in Healthcare Investments and Exits: Mid-Year 2017Trends in Healthcare Investments and Exits: Mid-Year 2017
Trends in Healthcare Investments and Exits: Mid-Year 2017
 
Life Science and Healthcare Startup Outlook 2017
Life Science and Healthcare Startup Outlook 2017Life Science and Healthcare Startup Outlook 2017
Life Science and Healthcare Startup Outlook 2017
 
3 ways to sell your suppliers on credit card payments
3 ways to sell your suppliers on credit card payments3 ways to sell your suppliers on credit card payments
3 ways to sell your suppliers on credit card payments
 
SVB Q2 2017 Economic Report
SVB Q2 2017 Economic ReportSVB Q2 2017 Economic Report
SVB Q2 2017 Economic Report
 
SVB State of the Markets: Second Quarter 2017
SVB State of the Markets: Second Quarter 2017SVB State of the Markets: Second Quarter 2017
SVB State of the Markets: Second Quarter 2017
 
Southern California Startup Outlook 2017
Southern California Startup Outlook 2017 Southern California Startup Outlook 2017
Southern California Startup Outlook 2017
 
SVB State of the Markets Report Q1 2017
SVB State of the Markets Report Q1 2017SVB State of the Markets Report Q1 2017
SVB State of the Markets Report Q1 2017
 
UK Startup Outlook Report 2017
UK Startup Outlook Report 2017UK Startup Outlook Report 2017
UK Startup Outlook Report 2017
 
US Startup Outlook Report 2017
US Startup Outlook Report 2017US Startup Outlook Report 2017
US Startup Outlook Report 2017
 
SVB Q1 2017 Economic Report
SVB Q1 2017 Economic ReportSVB Q1 2017 Economic Report
SVB Q1 2017 Economic Report
 
Silicon Valley Bank 2017 State of the Wine Industry Report
Silicon Valley Bank 2017 State of the Wine Industry ReportSilicon Valley Bank 2017 State of the Wine Industry Report
Silicon Valley Bank 2017 State of the Wine Industry Report
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Cybersecurity's Impact on Innovation

  • 1. C ommonnvybersecu st C ource I estmen rity Mo Res Monitoring/Assessment ts Cybersecurity How Tech Companies Prepare for Cyber Attacks 98% Of small and mid-size technology and healthcare companies are maintaining or increasing resources devoted to cybersecurity this year, preparing for when, not if, cyber attacks occur. 50% Are increasing their spend, and investing in active response, not infrastructure. 18% Policies/controls Just 35% Are completely or very confident in the security of their company information. 15% Hiring 12% Software 8% 52% Are storing their info privately, not in the public cloud. Firewalls 76% 54% Say cyber attacks threaten serious business interruption. Of non-security companies have or plan to add a cybersecurity component to their product. 8% entication/Acces uth s A 6% Encryption 6% 46% Say media attention has increased awareness of the issue. 78% Say their data and IP are threatened. Statistics come from the results of an SVB survey about cybersecurity completed by 216 C-level executives from US-based technology and life science companies in July 2013. B-13-12992. Rev. 09-20-13