SlideShare a Scribd company logo
1 of 7
Download to read offline
EXECUTIVE SUMMARY
Protecting Corporate
Information in the Cloud
©2015 WSJ. Custom Studios, a unit of The Wall Street Journal Advertising Department. The Wall Street Journal news organization was not involved in the creation of this content.
IN COLLABORATION WITH
©2015 WSJ. Custom Studios.	 2
ABOUT THE STUDY
Keeping Your Data Safe: Protecting Corporate Information in the
Cloud is an insights-driven thought leadership study conducted by
WSJ. Custom Studios in collaboration with Symantec Corporation.
The goal of this research is to better understand worldwide cloud
adoption across leading organizations and the challenges associated
with its use. This survey also explores attitudes toward security
as well as the behaviors that can lead to potential data loss and
security breaches.
An online survey was conducted from February to March 2015
among 360 global business and IT executives with 180 respondents
from the United States, 60 from the United Kingdom, 60 from
Germany and 60 from Japan. Of these, 15% are CEOs, presidents or
owners; 14% are CIOs/CTOs/CSOs; 5% are other C-level executives;
13% are heads of business units or EVPs/VPs/directors; 23% are IT/
security professionals; and 30% are managers or other business
professionals (e.g., engineering, research and development, sales,
legal and compliance, etc.).
KEY FINDINGS
Cloud applications and technologies are becoming increasingly
mainstream across organizations worldwide: Two-thirds of
global executives now have a cloud strategy in place within their
organization. While the majority of executives realize the benefits,
data security and privacy concerns remain the biggest challenges of
usingthecloud.Infact,confidenceinthesecurityofcloudapplications
is subpar at most, and organizations with cloud applications were
more likely to have suffered a data breach than organizations
without them. This study reveals that employees often engage in
high-risk behaviors, either knowingly or unknowingly, that can lead
to data loss and breaches. Part of the challenge for organizations
will be to create a culture that welcomes new technologies, such as
the cloud, to drive business growth and productivity, yet fosters a
safe haven for valuable information.
©2015 WSJ. Custom Studios.	 3
INTRODUCTION
Seeing Above the Horizon
Cloud applications and technologies are revolutionizing the way
businesses communicate, collaborate and access information. From
increased productivity to lower operational costs, organizations
around the world are realizing the true value of the cloud, its vast
impact on the future of work and its potential to drive business growth
and innovation. With revenues expected to surpass $500 billion by
2020, cloud solutions are poised to become the dominant IT model
across organizations.1
In fact, two-thirds of corporate executives
worldwide have now adopted cloud solutions, according to the WSJ.
Custom Studios/Symantec Corporation survey.
Cloud adoption is highest in Europe, followed by the United States,
and lowest in Japan.
Mid-sized to large corporations (i.e., those with more than 500
employees) are more likely to use cloud services than small-sized
firms (54% vs. 22%).
Company
Cloud Use by
Country
Cloud Use
by Company
Size
87%
GERMANY
72%
UNITED
STATES 25%
JAPAN
75%
UNITED
KINGDOM
54%
Companies
with
500+
employees
22%
Companies
with 99 or
fewer
employees
©2015 WSJ. Custom Studios.	 4
As cloud technologies become more common, it’s not surprising
that nearly three-quarters of C-level executives, including IT
leaders, now believe that the benefits of the cloud outweigh any
potential risk to corporate data security. This is in stark contrast
to opinions held in 2010, where only 17% of executives held the
same belief.2
The Cloud’s Biggest Challenge Remains
However, this isn’t to say concerns over data security and privacy are
abating. In fact, the opposite is true: Among non-users of the cloud,
about seven in 10 (68%) cite concerns over data security as the
number one roadblock to cloud implementation of any kind within
their organization. These concerns are more likely to be echoed by
C-level executives than IT management (74% vs. 61%).
Among companies with a cloud strategy, confidence in the
cloud’s ability to safely store corporate assets is subpar: Only
four in 10 executives worldwide are “very confident” that their
company’s confidential and sensitive information is secure when
using cloud-based services. Additionally, companies who have
adopted cloud services were more likely to have had a security
breach in the past year than companies with no cloud—18% vs.
3%. Clearly these results are discouraging, but they demonstrate
the complexities and challenges surrounding company-wide
cloud adoption.
With security hacks becoming a daily fact of digital life, nearly
all executives say safeguarding corporate data (which includes
intellectual property, customer data, financial information and
records) is a critical business priority.
Employees Don’t Always Know
Yet, there’s a dichotomy between what executives say and what
they do when it comes to keeping company-sensitive data secure.
Despite the recent high-profile data breaches and increased privacy
regulations, employees (including those in IT and top management
as well as others) appear to be largely unaware of the behaviors
that put corporate and personal data at risk.
79% of corporate executives
surveyed admit to—intentionally or
unintentionally—engaging in behaviors
that wind up placing corporate data at
significant risk of security breach.
©2015 WSJ. Custom Studios.	 5
Behaviors That Can Make Corporate Data Vulnerable
Of those surveyed, 79% engaged in at least one of these activities:
These risky or rogue behaviors are most prevalent in Europe—
highest in Germany (97%) and the United Kingdom (87%)—
followed by the United States (79%). In Japan, these behaviors
are least prevalent (53%).
Additionally,nearlyaquarterofemployeesusedcloud-basedservices
(such as file storage) without IT approval. Using unauthorized cloud
or mobile applications can compromise confidential corporate
assets and lead to data leaks largely because these applications
are unmonitored—that is, the company and IT department lose
visibility and control of the information.
With increased work demands and blurred lines between work and
personal life, these statistics are not entirely shocking. However,
it is surprising that nearly 50% of executives say they don’t think
about security risks when transferring files or sharing documents
over cloud-based services. These types of relaxed attitudes can
lead to significant data loss or breach, not to mention substantial
revenue loss and irrevocable reputational damage. Think about the
massive losses by multinational corporations that have made the
news recently, for instance.
Part of the issue is that many employees believe that data security
falls outside their realm. A full half of corporate leaders worldwide
say safeguarding corporate information is IT’s problem—not theirs.
uploaded to and stored company documents
on a USB stick
emailed company documents from a personal
email address
uploaded company documents to file-sharing sites
so they could work from other devices or share
with others
shared company information and documents via
social-networking sites
installed unauthorized software or accessed
unauthorized cloud services on a corporate
desktop/laptop
installed unauthorized software on corporate devices
53%
51%
44%
38%
24%
22%
©2015 WSJ. Custom Studios.	 6
So even though employees say security is a top business priority,
at the end of the day, many believe corporate security rests on the
shoulders of IT.
Keeping Data Secure When Using the Cloud
So what are companies doing to better manage the risk of potential
data loss or breach? Worldwide, 71% of corporate executives have
increased their technology and security budgets. This percentage
jumps to 98% across companies that have suffered from a data
breach in the past year. It’s a tall order, but spending additional
funds is necessary to keep businesses flowing efficiently and safely.
Additionally, close to eight in 10 have implemented company-wide
training initiatives, including new-hire security orientation, to raise
security awareness and curb risky behavior. Staggeringly, only 28%
have a formalized plan that outlines policies and procedures for
reporting and responding to security threats. Clearly, a lot remains
to be done.
CONCLUSION
Cloud technologies are here to stay: Two-thirds of leading
organizations have now embraced the cloud and many believe its
benefits outweigh any potential security risk. However, managing
security risk and preventing data loss continues to be a business-
wide challenge. Employees care about the security of their
company’s assets but often overlook potential security risks. Many
executives and employees alike are simply unaware of how their
behaviors can place their company at risk of data loss or breach.
This study reveals a gap between what executives say and do as it
relates to data security and illustrates how leading organizations
are taking numerous steps to ensure that progress is being made
toward better safety controls.
1
Bessemer Venture Partners: State of the Cloud Report, 2015:
www.bvp.com/cloud/cloudreport#sthash.o4mBXBrv.dpuf
2
ISACA IT Risk/Reward Barometer Survey, March 2010:
www.isaca.org/About-ISACA/Press-room/News-Releases/2010/Pages/
ISACA-US-IT-Risk-Reward-Barometer-Survey.aspx
NEW YORK
1211 Avenue of the Americas
9th Floor
New York, NY 10036
LONDON
The News Building
1 London Bridge Street
London SE1 9GF
HONG KONG
25/F, Central Plaza
18 Harbour Road
Wanchai
Hong Kong
Sarah Dale
Vice President, Media Sales
212.597.5729
sarah.dale@dowjones.com
WSJ. Custom Studios
WSJ. Custom Studios, the content marketing division within
The Wall Street Journal’s advertising department, crafts stories that
engage consumers and elevate the conversation for brands.
Its global team of award-winning editors, designers and interactive
developers are all held to the high standards for which
The Wall Street Journal is known, resulting in highly original and
credible content that resonates with the client’s target audience.
This work was commissioned by
Symantec Corporation.
Symantec Corporation (NASDAQ:
SYMC) is an information protection
expert that helps people, businesses
and governments seeking the
freedom to unlock the opportunities
technology brings—anytime,
anywhere. Founded in April 1982,
Symantec, a Fortune 500 company,
operating one of the largest global
data-intelligence networks, has
provided leading security, backup
and availability solutions for where
vital information is stored, accessed
and shared. The company’s more
than 19,000 employees reside in
more than 50 countries. Ninety-nine
percent of Fortune 500 companies
are Symantec customers. In fiscal
2015, it recorded revenues of
$6.5 billion. To learn more go to
www.symantec.com or connect
with Symantec at: go.symantec.com/
socialmedia.
IN COLLABORATION WITH
©2015 WSJ. Custom Studios, a unit of The Wall Street Journal Advertising Department. The Wall Street Journal news organization was not involved in the creation of this content.

More Related Content

What's hot

Enterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey ReportEnterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey ReportEchoworx
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprisesTaranggg11
 
11 pp-cybersecurity-revised2 a
11 pp-cybersecurity-revised2 a11 pp-cybersecurity-revised2 a
11 pp-cybersecurity-revised2 aIT Strategy Group
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory ComplianceLifeline Data Centers
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software developmentMuhammadArif823
 
Convince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureConvince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureDave James
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - WebFahd Khan
 
Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-IT Strategy Group
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
Signacure Brochure
Signacure BrochureSignacure Brochure
Signacure BrochureDave Lloyd
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The BoardPaul Melson
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänsterTranscendent Group
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incDruva
 
Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy QuizDruva
 
Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2Graham Mann
 
Is Ukraine safe for software development outsourcing?
Is Ukraine safe for software development outsourcing? Is Ukraine safe for software development outsourcing?
Is Ukraine safe for software development outsourcing? N-iX
 

What's hot (20)

Enterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey ReportEnterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey Report
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
11 pp-cybersecurity-revised2 a
11 pp-cybersecurity-revised2 a11 pp-cybersecurity-revised2 a
11 pp-cybersecurity-revised2 a
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
Convince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureConvince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cure
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
Signacure Brochure
Signacure BrochureSignacure Brochure
Signacure Brochure
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva inc
 
Big Data for Security
Big Data for SecurityBig Data for Security
Big Data for Security
 
Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy Quiz
 
Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2
 
Is Ukraine safe for software development outsourcing?
Is Ukraine safe for software development outsourcing? Is Ukraine safe for software development outsourcing?
Is Ukraine safe for software development outsourcing?
 

Viewers also liked

Symantec White Paper: W32.Ramnit Analysis
Symantec White Paper: W32.Ramnit AnalysisSymantec White Paper: W32.Ramnit Analysis
Symantec White Paper: W32.Ramnit AnalysisSymantec
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture Symantec
 
Source Code Security the Symantec Way
Source Code Security the Symantec WaySource Code Security the Symantec Way
Source Code Security the Symantec WaySymantec
 
INFOGRAPHIC▶ Spear Phishing Scammers Sharpen Their Attacks
INFOGRAPHIC▶ Spear Phishing Scammers Sharpen Their AttacksINFOGRAPHIC▶ Spear Phishing Scammers Sharpen Their Attacks
INFOGRAPHIC▶ Spear Phishing Scammers Sharpen Their AttacksSymantec
 
5 Belangrijke Feiten Over Geavanceerde Bedreigingen
5 Belangrijke Feiten Over Geavanceerde Bedreigingen5 Belangrijke Feiten Over Geavanceerde Bedreigingen
5 Belangrijke Feiten Over Geavanceerde BedreigingenSymantec
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewSymantec
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec
 
State of Information Survey 2012 Global Results
State of Information Survey 2012 Global ResultsState of Information Survey 2012 Global Results
State of Information Survey 2012 Global ResultsSymantec
 
What Every CISO Needs to Know About Cyber Insurance
What Every CISO Needs to Know About Cyber InsuranceWhat Every CISO Needs to Know About Cyber Insurance
What Every CISO Needs to Know About Cyber InsuranceSymantec
 
Symantec Netbackup Appliance Family
Symantec Netbackup Appliance FamilySymantec Netbackup Appliance Family
Symantec Netbackup Appliance FamilySymantec
 
Why Backup Exec for Virtualization?
Why Backup Exec for Virtualization?Why Backup Exec for Virtualization?
Why Backup Exec for Virtualization?Symantec
 
Backup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance GuideBackup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance GuideSymantec
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacySymantec
 
Thinking of choosing Sophos?
Thinking of choosing Sophos?Thinking of choosing Sophos?
Thinking of choosing Sophos?Symantec
 
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large InstallationsTECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large InstallationsSymantec
 

Viewers also liked (15)

Symantec White Paper: W32.Ramnit Analysis
Symantec White Paper: W32.Ramnit AnalysisSymantec White Paper: W32.Ramnit Analysis
Symantec White Paper: W32.Ramnit Analysis
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
 
Source Code Security the Symantec Way
Source Code Security the Symantec WaySource Code Security the Symantec Way
Source Code Security the Symantec Way
 
INFOGRAPHIC▶ Spear Phishing Scammers Sharpen Their Attacks
INFOGRAPHIC▶ Spear Phishing Scammers Sharpen Their AttacksINFOGRAPHIC▶ Spear Phishing Scammers Sharpen Their Attacks
INFOGRAPHIC▶ Spear Phishing Scammers Sharpen Their Attacks
 
5 Belangrijke Feiten Over Geavanceerde Bedreigingen
5 Belangrijke Feiten Over Geavanceerde Bedreigingen5 Belangrijke Feiten Over Geavanceerde Bedreigingen
5 Belangrijke Feiten Over Geavanceerde Bedreigingen
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to Maturity
 
State of Information Survey 2012 Global Results
State of Information Survey 2012 Global ResultsState of Information Survey 2012 Global Results
State of Information Survey 2012 Global Results
 
What Every CISO Needs to Know About Cyber Insurance
What Every CISO Needs to Know About Cyber InsuranceWhat Every CISO Needs to Know About Cyber Insurance
What Every CISO Needs to Know About Cyber Insurance
 
Symantec Netbackup Appliance Family
Symantec Netbackup Appliance FamilySymantec Netbackup Appliance Family
Symantec Netbackup Appliance Family
 
Why Backup Exec for Virtualization?
Why Backup Exec for Virtualization?Why Backup Exec for Virtualization?
Why Backup Exec for Virtualization?
 
Backup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance GuideBackup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance Guide
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data Privacy
 
Thinking of choosing Sophos?
Thinking of choosing Sophos?Thinking of choosing Sophos?
Thinking of choosing Sophos?
 
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large InstallationsTECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
 

Similar to Protecting Corporate Information in the Cloud

2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey ReportDImension Data
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Cloudflare
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemBernard Marr
 
2013 global encryption trends study
2013 global encryption trends study2013 global encryption trends study
2013 global encryption trends studyBee_Ware
 
Sharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesSharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesThe Economist Media Businesses
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital FutureCognizant
 
7 major changes in big data security in 2021
7 major changes in big data security in 20217 major changes in big data security in 2021
7 major changes in big data security in 2021Antenna Manufacturer Coco
 
Information Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFInformation Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFAlexander Goodwin
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The Economist Media Businesses
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991Jim Romeo
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFLaurie Mosca-Cocca
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesJoseph DeFever
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...at MicroFocus Italy ❖✔
 

Similar to Protecting Corporate Information in the Cloud (20)

2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
Cloud complexity: the need for resilience
Cloud complexity: the need for resilienceCloud complexity: the need for resilience
Cloud complexity: the need for resilience
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data Problem
 
2013 global encryption trends study
2013 global encryption trends study2013 global encryption trends study
2013 global encryption trends study
 
Sharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesSharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breaches
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital Future
 
7 major changes in big data security in 2021
7 major changes in big data security in 20217 major changes in big data security in 2021
7 major changes in big data security in 2021
 
CompTIA 10th Security Study
CompTIA 10th Security StudyCompTIA 10th Security Study
CompTIA 10th Security Study
 
Information Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFInformation Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDF
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Protecting Corporate Information in the Cloud

  • 1. EXECUTIVE SUMMARY Protecting Corporate Information in the Cloud ©2015 WSJ. Custom Studios, a unit of The Wall Street Journal Advertising Department. The Wall Street Journal news organization was not involved in the creation of this content. IN COLLABORATION WITH
  • 2. ©2015 WSJ. Custom Studios. 2 ABOUT THE STUDY Keeping Your Data Safe: Protecting Corporate Information in the Cloud is an insights-driven thought leadership study conducted by WSJ. Custom Studios in collaboration with Symantec Corporation. The goal of this research is to better understand worldwide cloud adoption across leading organizations and the challenges associated with its use. This survey also explores attitudes toward security as well as the behaviors that can lead to potential data loss and security breaches. An online survey was conducted from February to March 2015 among 360 global business and IT executives with 180 respondents from the United States, 60 from the United Kingdom, 60 from Germany and 60 from Japan. Of these, 15% are CEOs, presidents or owners; 14% are CIOs/CTOs/CSOs; 5% are other C-level executives; 13% are heads of business units or EVPs/VPs/directors; 23% are IT/ security professionals; and 30% are managers or other business professionals (e.g., engineering, research and development, sales, legal and compliance, etc.). KEY FINDINGS Cloud applications and technologies are becoming increasingly mainstream across organizations worldwide: Two-thirds of global executives now have a cloud strategy in place within their organization. While the majority of executives realize the benefits, data security and privacy concerns remain the biggest challenges of usingthecloud.Infact,confidenceinthesecurityofcloudapplications is subpar at most, and organizations with cloud applications were more likely to have suffered a data breach than organizations without them. This study reveals that employees often engage in high-risk behaviors, either knowingly or unknowingly, that can lead to data loss and breaches. Part of the challenge for organizations will be to create a culture that welcomes new technologies, such as the cloud, to drive business growth and productivity, yet fosters a safe haven for valuable information.
  • 3. ©2015 WSJ. Custom Studios. 3 INTRODUCTION Seeing Above the Horizon Cloud applications and technologies are revolutionizing the way businesses communicate, collaborate and access information. From increased productivity to lower operational costs, organizations around the world are realizing the true value of the cloud, its vast impact on the future of work and its potential to drive business growth and innovation. With revenues expected to surpass $500 billion by 2020, cloud solutions are poised to become the dominant IT model across organizations.1 In fact, two-thirds of corporate executives worldwide have now adopted cloud solutions, according to the WSJ. Custom Studios/Symantec Corporation survey. Cloud adoption is highest in Europe, followed by the United States, and lowest in Japan. Mid-sized to large corporations (i.e., those with more than 500 employees) are more likely to use cloud services than small-sized firms (54% vs. 22%). Company Cloud Use by Country Cloud Use by Company Size 87% GERMANY 72% UNITED STATES 25% JAPAN 75% UNITED KINGDOM 54% Companies with 500+ employees 22% Companies with 99 or fewer employees
  • 4. ©2015 WSJ. Custom Studios. 4 As cloud technologies become more common, it’s not surprising that nearly three-quarters of C-level executives, including IT leaders, now believe that the benefits of the cloud outweigh any potential risk to corporate data security. This is in stark contrast to opinions held in 2010, where only 17% of executives held the same belief.2 The Cloud’s Biggest Challenge Remains However, this isn’t to say concerns over data security and privacy are abating. In fact, the opposite is true: Among non-users of the cloud, about seven in 10 (68%) cite concerns over data security as the number one roadblock to cloud implementation of any kind within their organization. These concerns are more likely to be echoed by C-level executives than IT management (74% vs. 61%). Among companies with a cloud strategy, confidence in the cloud’s ability to safely store corporate assets is subpar: Only four in 10 executives worldwide are “very confident” that their company’s confidential and sensitive information is secure when using cloud-based services. Additionally, companies who have adopted cloud services were more likely to have had a security breach in the past year than companies with no cloud—18% vs. 3%. Clearly these results are discouraging, but they demonstrate the complexities and challenges surrounding company-wide cloud adoption. With security hacks becoming a daily fact of digital life, nearly all executives say safeguarding corporate data (which includes intellectual property, customer data, financial information and records) is a critical business priority. Employees Don’t Always Know Yet, there’s a dichotomy between what executives say and what they do when it comes to keeping company-sensitive data secure. Despite the recent high-profile data breaches and increased privacy regulations, employees (including those in IT and top management as well as others) appear to be largely unaware of the behaviors that put corporate and personal data at risk. 79% of corporate executives surveyed admit to—intentionally or unintentionally—engaging in behaviors that wind up placing corporate data at significant risk of security breach.
  • 5. ©2015 WSJ. Custom Studios. 5 Behaviors That Can Make Corporate Data Vulnerable Of those surveyed, 79% engaged in at least one of these activities: These risky or rogue behaviors are most prevalent in Europe— highest in Germany (97%) and the United Kingdom (87%)— followed by the United States (79%). In Japan, these behaviors are least prevalent (53%). Additionally,nearlyaquarterofemployeesusedcloud-basedservices (such as file storage) without IT approval. Using unauthorized cloud or mobile applications can compromise confidential corporate assets and lead to data leaks largely because these applications are unmonitored—that is, the company and IT department lose visibility and control of the information. With increased work demands and blurred lines between work and personal life, these statistics are not entirely shocking. However, it is surprising that nearly 50% of executives say they don’t think about security risks when transferring files or sharing documents over cloud-based services. These types of relaxed attitudes can lead to significant data loss or breach, not to mention substantial revenue loss and irrevocable reputational damage. Think about the massive losses by multinational corporations that have made the news recently, for instance. Part of the issue is that many employees believe that data security falls outside their realm. A full half of corporate leaders worldwide say safeguarding corporate information is IT’s problem—not theirs. uploaded to and stored company documents on a USB stick emailed company documents from a personal email address uploaded company documents to file-sharing sites so they could work from other devices or share with others shared company information and documents via social-networking sites installed unauthorized software or accessed unauthorized cloud services on a corporate desktop/laptop installed unauthorized software on corporate devices 53% 51% 44% 38% 24% 22%
  • 6. ©2015 WSJ. Custom Studios. 6 So even though employees say security is a top business priority, at the end of the day, many believe corporate security rests on the shoulders of IT. Keeping Data Secure When Using the Cloud So what are companies doing to better manage the risk of potential data loss or breach? Worldwide, 71% of corporate executives have increased their technology and security budgets. This percentage jumps to 98% across companies that have suffered from a data breach in the past year. It’s a tall order, but spending additional funds is necessary to keep businesses flowing efficiently and safely. Additionally, close to eight in 10 have implemented company-wide training initiatives, including new-hire security orientation, to raise security awareness and curb risky behavior. Staggeringly, only 28% have a formalized plan that outlines policies and procedures for reporting and responding to security threats. Clearly, a lot remains to be done. CONCLUSION Cloud technologies are here to stay: Two-thirds of leading organizations have now embraced the cloud and many believe its benefits outweigh any potential security risk. However, managing security risk and preventing data loss continues to be a business- wide challenge. Employees care about the security of their company’s assets but often overlook potential security risks. Many executives and employees alike are simply unaware of how their behaviors can place their company at risk of data loss or breach. This study reveals a gap between what executives say and do as it relates to data security and illustrates how leading organizations are taking numerous steps to ensure that progress is being made toward better safety controls. 1 Bessemer Venture Partners: State of the Cloud Report, 2015: www.bvp.com/cloud/cloudreport#sthash.o4mBXBrv.dpuf 2 ISACA IT Risk/Reward Barometer Survey, March 2010: www.isaca.org/About-ISACA/Press-room/News-Releases/2010/Pages/ ISACA-US-IT-Risk-Reward-Barometer-Survey.aspx
  • 7. NEW YORK 1211 Avenue of the Americas 9th Floor New York, NY 10036 LONDON The News Building 1 London Bridge Street London SE1 9GF HONG KONG 25/F, Central Plaza 18 Harbour Road Wanchai Hong Kong Sarah Dale Vice President, Media Sales 212.597.5729 sarah.dale@dowjones.com WSJ. Custom Studios WSJ. Custom Studios, the content marketing division within The Wall Street Journal’s advertising department, crafts stories that engage consumers and elevate the conversation for brands. Its global team of award-winning editors, designers and interactive developers are all held to the high standards for which The Wall Street Journal is known, resulting in highly original and credible content that resonates with the client’s target audience. This work was commissioned by Symantec Corporation. Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses and governments seeking the freedom to unlock the opportunities technology brings—anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company, operating one of the largest global data-intelligence networks, has provided leading security, backup and availability solutions for where vital information is stored, accessed and shared. The company’s more than 19,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2015, it recorded revenues of $6.5 billion. To learn more go to www.symantec.com or connect with Symantec at: go.symantec.com/ socialmedia. IN COLLABORATION WITH ©2015 WSJ. Custom Studios, a unit of The Wall Street Journal Advertising Department. The Wall Street Journal news organization was not involved in the creation of this content.