Managing the Unpredictable
Human Element of Cybersecurity
GENERAL HACKING
COMMUNITY
MALICIOUS INSIDERS
TERRORISTS
HACKTIVI...
Upcoming SlideShare
Loading in …5
×

Infographic - Continuous Monitoring: Managing the Unpredictable Human Element of Cybersecurity

2,965 views
2,780 views

Published on

SolarWinds® partnered with leading government research provider Market Connections to survey 200 federal IT and IT security professionals to find out their top cybersecurity concerns and the obstacles they face when implementing IT security strategies. View the infographic for data on Security Event Detection, Continuous Monitoring Implementation and return on investment, top obstacles and frustrations, and cybersecurity threats and threat sources.

Visit http://www.solarwinds.com/federal to learn more.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,965
On SlideShare
0
From Embeds
0
Number of Embeds
659
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Infographic - Continuous Monitoring: Managing the Unpredictable Human Element of Cybersecurity

  1. 1. Managing the Unpredictable Human Element of Cybersecurity GENERAL HACKING COMMUNITY MALICIOUS INSIDERS TERRORISTS HACKTIVISTS FOREIGN GOVERNMENTS CARELESS/UNTRAINED INSIDERSMALICIOUS INSIDERS TERRORISTS HACKTIVISTS FOREIGN GOVERNMENTS CARELESS/UNTRAINED INSIDERSMALICIOUS INSIDERS CARELESS/UNTRAINED INSIDERSMALICIOUS INSIDERS CARELESS/UNTRAINED MALICIOUS INSIDERS CARELESS/UNTRAINED MALICIOUS INSIDERS CARELESS/UNTRAINED MALICIOUS INSIDERS CARELESS/UNTRAINED MALICIOUS INSIDERS CARELESS/UNTRAINED GENERAL HACKINGGENERAL HACKINGGENERAL HACKING COMMUNITY GENERAL HACKING COMMUNITY GENERAL HACKING COMMUNITY GENERAL HACKING COMMUNITY GENERAL HACKING COMMUNITY GENERAL HACKING COMMUNITY GENERAL HACKING COMMUNITY 47% 42% 34% 26% 21% 17% SECURITY THREAT SOURCES CYBERSECURITY THREATS EXTERNAL HACKING MOBILE DEVICE THEFT DENIAL OF SERVICE INSIDER DATA LEAKAGE/THEFT SPAM MALWARE50% 46% SOCIAL ENGINEERING 37% 36% 29% 25% PHYSICAL SECURITY ATTACKS 18% 20% INSIDER DATA LEAKAGE/THEFT 29% SPAM 36% DENIAL OF SERVICE 25% SOCIAL ENGINEERING 37% MOBILE DEVICE THEFT 20% MALWARE 46% PHYSICAL SECURITY ATTACKS 18% EXTERNAL HACKING 50% INAPPROPRIATE INTERNET ACCESS BY INSIDERS46% 29% ROGUE DEVICE ON NETWORK46% 23% MISUSE/ABUSE OF CREDENTIALS37% 23% COMPROMISED ACCOUNT34% 15% FIREWALL RULES OUT OF COMPLIANCE30% 16% WINDOWS SYSTEM CONFIGURATIONS OUT OF COMPLIANCE 23% 8% DATA LEAKAGE22% 8% CONTINUOUS MONITORING USER | NON-USER SECURI T Y EVENT DET ECTION CONTINUOUS MONITORING IMPLEMENTATION Return on InvestmentContinuous Monitoring Plan Nearly half of respondents have measured the ROI in using continuous monitoring and report it is paying off nicely. Two thirds report having implemented at least one continuous monitoring solution. YES, BUT DISAPPOINTED IN RESULTS 9% NO, BUT FEEL LIKE WE ARE GETTING OUR MONEY’S WORTH 38% DON’T KNOW 15% HAVE NOT STARTED PLANNING4% YES, PAYING OFF NICELY 49% NO, BUT FEEL WE AREN’T GETTING A PAYOFF FROM THE TECHNOLOGY 4% IMPLEMENTED AT LEAST ONE CONTINUOUS MONITORING SOLUTION 63% PLANNING TO IMPLEMENT20% 40%LACK OF BUDGET 19% COMPETING PRIORITIES AND OTHER INITIATIVES 14% COMPLEXITY OF INTERNAL ENVIRONMENT IT SECURITY OBSTACLES 63%BUDGET CONTRAINTS TOOL IMPLEMENTATION FRUSTRATIONS 42% ORGANIZATIONAL ISSUES OR TURF BATTLES 32% EXPENSIVE TO MAINTAIN TOP OBSTACLES & FRUSTRATIONS © 2014 Market Connections, Inc. Human Element of CybersecurityHuman Element of Cybersecurity Managing the Unpredictable Human Element of CybersecurityCONTINUOUS MONITORING SolarWinds.com/Federal

×