SlideShare a Scribd company logo
Submit Search
Upload
Enterprise Strategy Group: Security Survey
Report
Share
Cisco Security
Founding Partner at Cisco Security
Follow
•
3 likes
•
3,144 views
1
of
5
Enterprise Strategy Group: Security Survey
•
3 likes
•
3,144 views
Report
Share
Download Now
Download to read offline
Technology
Understand what your organization is up against and where security is needed.
Read more
Cisco Security
Founding Partner at Cisco Security
Follow
Recommended
Integrated Network Security Strategies by
Integrated Network Security Strategies
Cisco Security
3.5K views
•
1 slide
Cisco Addresses the Full Attack Continuum by
Cisco Addresses the Full Attack Continuum
Cisco Security
4.4K views
•
21 slides
Cisco 2015 Midyear Security Report Slide Deck by
Cisco 2015 Midyear Security Report Slide Deck
Cisco Security
4.4K views
•
28 slides
3 Tips for Choosing a Next Generation Firewall by
3 Tips for Choosing a Next Generation Firewall
Cisco Security
2.5K views
•
1 slide
The Evolution of and Need for Secure Network Access by
The Evolution of and Need for Secure Network Access
Cisco Security
2.6K views
•
11 slides
Infonetics Network and Content Security Vendor Scorecard by
Infonetics Network and Content Security Vendor Scorecard
Cisco Security
2.2K views
•
12 slides
More Related Content
What's hot
Introduction to Risk Management via the NIST Cyber Security Framework by
Introduction to Risk Management via the NIST Cyber Security Framework
PECB
5.5K views
•
20 slides
Darktrace white paper_ics_final by
Darktrace white paper_ics_final
CMR WORLD TECH
2K views
•
12 slides
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL by
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Michael Bunn
1.3K views
•
11 slides
What is Security Orchestration? by
What is Security Orchestration?
Siemplify
136 views
•
11 slides
Understanding cyber resilience by
Understanding cyber resilience
Christophe Foulon, CISSP
1.7K views
•
37 slides
How to implement NIST cybersecurity standards in my organization by
How to implement NIST cybersecurity standards in my organization
Exigent Technologies LLC
757 views
•
14 slides
What's hot
(20)
Introduction to Risk Management via the NIST Cyber Security Framework by PECB
Introduction to Risk Management via the NIST Cyber Security Framework
PECB
•
5.5K views
Darktrace white paper_ics_final by CMR WORLD TECH
Darktrace white paper_ics_final
CMR WORLD TECH
•
2K views
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL by Michael Bunn
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Michael Bunn
•
1.3K views
What is Security Orchestration? by Siemplify
What is Security Orchestration?
Siemplify
•
136 views
Understanding cyber resilience by Christophe Foulon, CISSP
Understanding cyber resilience
Christophe Foulon, CISSP
•
1.7K views
How to implement NIST cybersecurity standards in my organization by Exigent Technologies LLC
How to implement NIST cybersecurity standards in my organization
Exigent Technologies LLC
•
757 views
Debunked: 5 Myths About Zero Trust Security by Centrify Corporation
Debunked: 5 Myths About Zero Trust Security
Centrify Corporation
•
1.8K views
An in depth understanding in the application of the zero-trust security model... by Max Justice
An in depth understanding in the application of the zero-trust security model...
Max Justice
•
190 views
Gartner presentation risq dec 2016 jie zhang by ColloqueRISQ
Gartner presentation risq dec 2016 jie zhang
ColloqueRISQ
•
448 views
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur... by Cisco Security
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Cisco Security
•
4.2K views
Google peter logli & jake shea by ColloqueRISQ
Google peter logli & jake shea
ColloqueRISQ
•
223 views
Making Threat Modeling Useful To Software Development by ConSanFrancisco123
Making Threat Modeling Useful To Software Development
ConSanFrancisco123
•
1.2K views
Addressing Healthcare Challenges Today by Ivanti
Addressing Healthcare Challenges Today
Ivanti
•
207 views
Healthcare Cybersecurity Survey 2018 - Sirius by Sirius
Healthcare Cybersecurity Survey 2018 - Sirius
Sirius
•
1.5K views
Dragos 2019 ICS Year in Review by Dragos, Inc.
Dragos 2019 ICS Year in Review
Dragos, Inc.
•
334 views
Cyber Kill Chain Deck for General Audience by Tom K
Cyber Kill Chain Deck for General Audience
Tom K
•
354 views
Survival of the Fittest: How to Build a Cyber Resilient Organization by Tripwire
Survival of the Fittest: How to Build a Cyber Resilient Organization
Tripwire
•
3.8K views
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan by Tripwire
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
Tripwire
•
2K views
Dressing up the ICS Kill Chain by Dragos, Inc.
Dressing up the ICS Kill Chain
Dragos, Inc.
•
2.8K views
Understanding Cyber Kill Chain and OODA loop by David Sweigert
Understanding Cyber Kill Chain and OODA loop
David Sweigert
•
3.5K views
Viewers also liked
2013 Cisco Annual Security Report by
2013 Cisco Annual Security Report
Cisco Security
2.3K views
•
24 slides
Defending the Data Center: Managing Users from the Edge to the Application by
Defending the Data Center: Managing Users from the Edge to the Application
Cisco Security
1.1K views
•
19 slides
Infographic: Security for Mobile Service Providers by
Infographic: Security for Mobile Service Providers
Cisco Security
4.6K views
•
1 slide
From Physical to Virtual to Cloud by
From Physical to Virtual to Cloud
Cisco Security
1.7K views
•
36 slides
Cisco ISE Reduces the Attack Surface by Controlling Access by
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco Security
4.4K views
•
1 slide
Cisco Web and Email Security Overview by
Cisco Web and Email Security Overview
Cisco Security
26.5K views
•
51 slides
Viewers also liked
(18)
2013 Cisco Annual Security Report by Cisco Security
2013 Cisco Annual Security Report
Cisco Security
•
2.3K views
Defending the Data Center: Managing Users from the Edge to the Application by Cisco Security
Defending the Data Center: Managing Users from the Edge to the Application
Cisco Security
•
1.1K views
Infographic: Security for Mobile Service Providers by Cisco Security
Infographic: Security for Mobile Service Providers
Cisco Security
•
4.6K views
From Physical to Virtual to Cloud by Cisco Security
From Physical to Virtual to Cloud
Cisco Security
•
1.7K views
Cisco ISE Reduces the Attack Surface by Controlling Access by Cisco Security
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco Security
•
4.4K views
Cisco Web and Email Security Overview by Cisco Security
Cisco Web and Email Security Overview
Cisco Security
•
26.5K views
McAllen Intermediate School District by Cisco Security
McAllen Intermediate School District
Cisco Security
•
1.3K views
Midsize Business Solutions: Cybersecurity by Cisco Security
Midsize Business Solutions: Cybersecurity
Cisco Security
•
3.4K views
Balance Data Center Security and Performance by Cisco Security
Balance Data Center Security and Performance
Cisco Security
•
2.5K views
Data Center Security Challenges by Cisco Security
Data Center Security Challenges
Cisco Security
•
8.5K views
Data Center Security Now and into the Future by Cisco Security
Data Center Security Now and into the Future
Cisco Security
•
2.4K views
A Reality Check on the State of Cybersecurity by Cisco Security
A Reality Check on the State of Cybersecurity
Cisco Security
•
3.1K views
Pervasive Security Across Your Extended Network by Cisco Security
Pervasive Security Across Your Extended Network
Cisco Security
•
6.4K views
Malware and the Cost of Inactivity by Cisco Security
Malware and the Cost of Inactivity
Cisco Security
•
8.8K views
William Paterson University by Cisco Security
William Paterson University
Cisco Security
•
810 views
E2 neannapa khajornmot presentation_29-11-09-2 by Neannapa Khajornmot
E2 neannapa khajornmot presentation_29-11-09-2
Neannapa Khajornmot
•
307 views
Rpp bio vii smt 2 by Arya Ningrat
Rpp bio vii smt 2
Arya Ningrat
•
943 views
Roster 2 by Arya Ningrat
Roster 2
Arya Ningrat
•
604 views
Similar to Enterprise Strategy Group: Security Survey
Eng Solutions - Capability Statement-Latest by
Eng Solutions - Capability Statement-Latest
Hank Eng, CISSP, CISA, CISM
190 views
•
6 slides
Big Data Impacts on Hybrid Infrastructure and Management by
Big Data Impacts on Hybrid Infrastructure and Management
Enterprise Management Associates
622 views
•
37 slides
2015 Scalar Security Study Executive Summary by
2015 Scalar Security Study Executive Summary
patmisasi
528 views
•
4 slides
Prevent & Protect by
Prevent & Protect
Mike McMillan
118 views
•
5 slides
Value Stories - 3rd issue - April 2019 by
Value Stories - 3rd issue - April 2019
Redington Value Distribution
93 views
•
24 slides
Implementing IT Security Controls by
Implementing IT Security Controls
Thomas Jones
731 views
•
8 slides
Similar to Enterprise Strategy Group: Security Survey
(20)
Eng Solutions - Capability Statement-Latest by Hank Eng, CISSP, CISA, CISM
Eng Solutions - Capability Statement-Latest
Hank Eng, CISSP, CISA, CISM
•
190 views
Big Data Impacts on Hybrid Infrastructure and Management by Enterprise Management Associates
Big Data Impacts on Hybrid Infrastructure and Management
Enterprise Management Associates
•
622 views
2015 Scalar Security Study Executive Summary by patmisasi
2015 Scalar Security Study Executive Summary
patmisasi
•
528 views
Prevent & Protect by Mike McMillan
Prevent & Protect
Mike McMillan
•
118 views
Value Stories - 3rd issue - April 2019 by Redington Value Distribution
Value Stories - 3rd issue - April 2019
Redington Value Distribution
•
93 views
Implementing IT Security Controls by Thomas Jones
Implementing IT Security Controls
Thomas Jones
•
731 views
Sec 360 full course new by Laynebaril
Sec 360 full course new
Laynebaril
•
86 views
InsiderAttack_p3.ppt by VaishnavGhadge1
InsiderAttack_p3.ppt
VaishnavGhadge1
•
6 views
Accelerating Enhanced Threat Identification and Incident Investigation by Enterprise Management Associates
Accelerating Enhanced Threat Identification and Incident Investigation
Enterprise Management Associates
•
91 views
Cybersecurity processes and technologies Information Systems homework help.docx by write31
Cybersecurity processes and technologies Information Systems homework help.docx
write31
•
6 views
Select and Implement a Next Generation Endpoint Protection Solution by Info-Tech Research Group
Select and Implement a Next Generation Endpoint Protection Solution
Info-Tech Research Group
•
3.1K views
Cybersecurity: Perceptions & Practices by Joseph DeFever
Cybersecurity: Perceptions & Practices
Joseph DeFever
•
156 views
ZSAH Security - Web by Fahd Khan
ZSAH Security - Web
Fahd Khan
•
150 views
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ... by CA Technologies
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
CA Technologies
•
737 views
Security Analytics and Big Data: What You Need to Know by MapR Technologies
Security Analytics and Big Data: What You Need to Know
MapR Technologies
•
2.8K views
Cyber security white paper final PMD 12_28_16 by Dave Darnell
Cyber security white paper final PMD 12_28_16
Dave Darnell
•
399 views
Improving Incident Response: Building a More Efficient IT Infrastructure by Emulex Corporation
Improving Incident Response: Building a More Efficient IT Infrastructure
Emulex Corporation
•
946 views
Proteus OCM Company Profile by KGanzy
Proteus OCM Company Profile
KGanzy
•
270 views
A data-centric program by at MicroFocus Italy ❖✔
A data-centric program
at MicroFocus Italy ❖✔
•
414 views
Adapt or Die: The Evolution of Endpoint Security by Tripwire
Adapt or Die: The Evolution of Endpoint Security
Tripwire
•
7.4K views
More from Cisco Security
Incident Response Services Template - Cisco Security by
Incident Response Services Template - Cisco Security
Cisco Security
11.2K views
•
2 slides
AMP Helps Cisco IT Catch 50% More Malware threats by
AMP Helps Cisco IT Catch 50% More Malware threats
Cisco Security
4.9K views
•
1 slide
The Cost of Inactivity: Malware Infographic by
The Cost of Inactivity: Malware Infographic
Cisco Security
1.7K views
•
1 slide
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ... by
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Cisco Security
7.3K views
•
15 slides
Cisco 2014 Midyear Security Report by
Cisco 2014 Midyear Security Report
Cisco Security
2.4K views
•
53 slides
String of Paerls Infographic by
String of Paerls Infographic
Cisco Security
1.4K views
•
1 slide
More from Cisco Security
(12)
Incident Response Services Template - Cisco Security by Cisco Security
Incident Response Services Template - Cisco Security
Cisco Security
•
11.2K views
AMP Helps Cisco IT Catch 50% More Malware threats by Cisco Security
AMP Helps Cisco IT Catch 50% More Malware threats
Cisco Security
•
4.9K views
The Cost of Inactivity: Malware Infographic by Cisco Security
The Cost of Inactivity: Malware Infographic
Cisco Security
•
1.7K views
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ... by Cisco Security
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Cisco Security
•
7.3K views
Cisco 2014 Midyear Security Report by Cisco Security
Cisco 2014 Midyear Security Report
Cisco Security
•
2.4K views
String of Paerls Infographic by Cisco Security
String of Paerls Infographic
Cisco Security
•
1.4K views
Midyear Security Report Infographic by Cisco Security
Midyear Security Report Infographic
Cisco Security
•
478 views
Cisco Annual Security Report Infographic by Cisco Security
Cisco Annual Security Report Infographic
Cisco Security
•
602 views
City of Tomorrow Builds in Next-Generation Security by Cisco Security
City of Tomorrow Builds in Next-Generation Security
Cisco Security
•
2.2K views
Laser Pioneer Secures Network End-to-End to Protect Assets by Cisco Security
Laser Pioneer Secures Network End-to-End to Protect Assets
Cisco Security
•
1.1K views
Leveraging Context-Aware Security to Safeguard Patient Data by Cisco Security
Leveraging Context-Aware Security to Safeguard Patient Data
Cisco Security
•
1.1K views
Secure, Automated Network Access for Any Device on Campus by Cisco Security
Secure, Automated Network Access for Any Device on Campus
Cisco Security
•
669 views
Recently uploaded
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker
40 views
•
69 slides
Democratising digital commerce in India-Report by
Democratising digital commerce in India-Report
Kapil Khandelwal (KK)
18 views
•
161 slides
PRODUCT LISTING.pptx by
PRODUCT LISTING.pptx
angelicacueva6
14 views
•
1 slide
MVP and prioritization.pdf by
MVP and prioritization.pdf
rahuldharwal141
31 views
•
8 slides
Vertical User Stories by
Vertical User Stories
Moisés Armani Ramírez
14 views
•
16 slides
NET Conf 2023 Recap by
NET Conf 2023 Recap
Lee Richardson
10 views
•
71 slides
Recently uploaded
(20)
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker
•
40 views
Democratising digital commerce in India-Report by Kapil Khandelwal (KK)
Democratising digital commerce in India-Report
Kapil Khandelwal (KK)
•
18 views
PRODUCT LISTING.pptx by angelicacueva6
PRODUCT LISTING.pptx
angelicacueva6
•
14 views
MVP and prioritization.pdf by rahuldharwal141
MVP and prioritization.pdf
rahuldharwal141
•
31 views
Vertical User Stories by Moisés Armani Ramírez
Vertical User Stories
Moisés Armani Ramírez
•
14 views
NET Conf 2023 Recap by Lee Richardson
NET Conf 2023 Recap
Lee Richardson
•
10 views
Piloting & Scaling Successfully With Microsoft Viva by Richard Harbridge
Piloting & Scaling Successfully With Microsoft Viva
Richard Harbridge
•
12 views
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdf
madhurjyapb
•
14 views
Melek BEN MAHMOUD.pdf by MelekBenMahmoud
Melek BEN MAHMOUD.pdf
MelekBenMahmoud
•
14 views
Future of AR - Facebook Presentation by ssuserb54b561
Future of AR - Facebook Presentation
ssuserb54b561
•
15 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software
•
280 views
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
IttrainingIttraining
•
58 views
Kyo - Functional Scala 2023.pdf by Flavio W. Brasil
Kyo - Functional Scala 2023.pdf
Flavio W. Brasil
•
400 views
Data Integrity for Banking and Financial Services by Precisely
Data Integrity for Banking and Financial Services
Precisely
•
25 views
Mini-Track: AI and ML in Network Operations Applications by Network Automation Forum
Mini-Track: AI and ML in Network Operations Applications
Network Automation Forum
•
10 views
Scaling Knowledge Graph Architectures with AI by Enterprise Knowledge
Scaling Knowledge Graph Architectures with AI
Enterprise Knowledge
•
38 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Network Automation Forum
•
34 views
Serverless computing with Google Cloud (2023-24) by wesley chun
Serverless computing with Google Cloud (2023-24)
wesley chun
•
11 views
6g - REPORT.pdf by Liveplex
6g - REPORT.pdf
Liveplex
•
10 views
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf by Dr. Jimmy Schwarzkopf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf
Dr. Jimmy Schwarzkopf
•
20 views
Enterprise Strategy Group: Security Survey
1.
ESG Reports Understand what
your organization is up against and where security is needed
2.
Original survey question: To
the best of your knowledge,has your organization experienced a technical error(i.e., misconfiguration that led to a security vulnerability,performance problem, service interruption,etc.) with changing or configuring networksin the last 12 months? © 2015 by The Enterprise Strategy Group, Inc. All Rights Reserved. Survey respondents: 154 network security-focusedIT professionalsat large midmarket (500-999 employees) and enterprise-class(1,000+ employees) organizationsin North America. Enterprise Strategy Group | Getting to the bigger truth.InstaGraphic This InstaGraphicis based on research conducted by ESG on behalf of: Managing network segments, ACLs, and firewall rules is a complex process that can lead to human errors by security and network operations teams. of organizations report network configuration errors have caused multiple service outages over the last 12 months. 37%
3.
Original survey question: In
your opinion, could some degree of further network segmentation (i.e., segmentingservers with specific additional securitypolicies) help preventa server compromise in your organization’s data center? © 2015 by The Enterprise Strategy Group, Inc. All Rights Reserved. Survey respondents: 154 network security-focusedIT professionalsat large midmarket (500-999 employees) and enterprise-class(1,000+ employees) organizationsin North America. Enterprise Strategy Group | Getting to the bigger truth.InstaGraphic This InstaGraphicis based on research conducted by ESG on behalf of: of organizations that have suffered lateral data center server attacks have confidence that additional network segmentation could definitely prevent future compromises. This validates that granular network segmentation can be used as a threat prevention best practice. 68%
4.
Original survey question: How
would you characterize your organization’s method for removing expired and/or out-of-date ACLs or firewall rules? © 2015 by The Enterprise Strategy Group, Inc. All Rights Reserved. Survey respondents: 130 network security-focusedIT professionalsat large midmarket (500-999 employees) and enterprise-class(1,000+ employees) organizationsin North America that have a methodof removing expired ACL and/or firewall rules. Enterprise Strategy Group | Getting to the bigger truth.InstaGraphic This InstaGraphicis based on research conducted by ESG on behalf of: of organizations with a method for removing out-of-date ACL or firewall rules say this process is difficult and time-consuming. 68%
5.
Original survey question: On
average, how long does the entire process take to make a firewall or routing ACL change (i.e., the entire processfrom request to production implementation)? © 2015 by The Enterprise Strategy Group, Inc. All Rights Reserved. Survey respondents: 154 network security-focused IT professionals at large midmarket (500-999 employees) and enterprise-class (1,000+ employees) organizations in North America. Enterprise Strategy Group | Getting to the bigger truth.InstaGraphic This InstaGraphicis based on research conducted by ESG on behalf of: of organizations report that – on average – firewall or routing ACL changes take days or weeks to complete. 74%