SlideShare a Scribd company logo
1 of 1
Download to read offline
EXTRACTING VALUE FROM

INFORMATION CHAOS
WHY GOOD GOVERNANCE MAKES GOOD SENSE

BYOD [BRING YOUR OWN DEVICE]
6 OUT OF 10
EMPLOYEES
AGES 18-35
USE A PERSONAL
DEVICE FOR WORK

SECURITY BREACHES

75M

CYBERCRIME COSTS

US $1 TRILLION
PER YEAR

24B

MALWARE
SAMPLES
in

2012

CONNECTED
DEVICES
by

2020

DATA PROLIFERATION

THE AVERAGE CORPORATE
WORKER SENDS & RECEIVES

112

SOCIAL MEDIA RISK

EMAILS
PER DAY

PRIVACY REGULATIONS

2

3

COMPANIES
are at

RISK
from

SOCIAL

MEDIA

PASS

****

1

DOWNTIME

WORKER
RECEIVES

$380B

65

3

AVERAGE COST

TERABYTES
of

$5,000

COUNTRIES HAVE
THEIR OWN DATA
PROTECTION
LAWS

INFORMATION
PER YEAR

A MINUTE

FOR DOWNTIME

INCIDENTS

COST OF DISASTERS

in

2011

9.6 MILLION
PETABYTES:

business-related information
processed by the world’s computer
servers per year

BUSINESS GOVERNANCE AND
MANAGEMENT OF ENTERPRISE IT
Download a complimentary copy of COBIT 5 today or learn more at
www.isaca.org/cobit

SOURCES
http://www.isaca.org/About-ISACA/Press-room/News-Releases/2011/Pages/ISACA-Survey-Bring-Your-Own-Device-Trend-Heightens-Online-Holiday-Shopping-Risk.aspx
http://www.gsma.com/articles/gsma-announces-the-business-impact-of-connected-devices-could-be-worth-us-4-5-trillion-in-2020/22536
http://blogs.mcafee.com/mcafee-labs/mcafee-q4-threats-report-shows-malware-surpassed-75-million-samples-in-2011
http://www.radicati.com/?p=6904
http://ucsdnews.ucsd.edu/newsrel/general/04-05BusinessInformation.asp
http://www.informationweek.com/thebrainyard/news/community_management_development/231602379
http://www.un.org/en/development/desa/news/ecosoc/cybersecurity-demands-global-approach.html
http://www.mofo.com/privacy--data-security-services/
http://www.time.com/time/world/article/0,8599,2108354,00.html
http://www.eweek.com/c/a/IT-Infrastructure/Unplanned-IT-Downtime-Can-Cost-5K-Per-Minute-Report-549007/

More Related Content

Viewers also liked

Cybersecurity Skills Crisis
Cybersecurity Skills CrisisCybersecurity Skills Crisis
Cybersecurity Skills CrisisISACA
 
The Future Tech Workforce is Her
The Future Tech Workforce is HerThe Future Tech Workforce is Her
The Future Tech Workforce is HerISACA
 
Nombres de dominio de internet
Nombres de dominio de internetNombres de dominio de internet
Nombres de dominio de internetJoha Paguay
 
CompTIA Perks
CompTIA PerksCompTIA Perks
CompTIA PerksCompTIA
 
Office365 education transformation collaboration using office 365
Office365 education transformation collaboration using office 365Office365 education transformation collaboration using office 365
Office365 education transformation collaboration using office 365Sachin. Jung
 
Safe Tech. Денис Калемберг: "Интернет-банкинг. Как сделать работу клиента без...
Safe Tech. Денис Калемберг: "Интернет-банкинг. Как сделать работу клиента без...Safe Tech. Денис Калемберг: "Интернет-банкинг. Как сделать работу клиента без...
Safe Tech. Денис Калемберг: "Интернет-банкинг. Как сделать работу клиента без...Expolink
 
Useful Video Conferencing Tools
Useful Video Conferencing ToolsUseful Video Conferencing Tools
Useful Video Conferencing ToolsNupur Singh
 

Viewers also liked (7)

Cybersecurity Skills Crisis
Cybersecurity Skills CrisisCybersecurity Skills Crisis
Cybersecurity Skills Crisis
 
The Future Tech Workforce is Her
The Future Tech Workforce is HerThe Future Tech Workforce is Her
The Future Tech Workforce is Her
 
Nombres de dominio de internet
Nombres de dominio de internetNombres de dominio de internet
Nombres de dominio de internet
 
CompTIA Perks
CompTIA PerksCompTIA Perks
CompTIA Perks
 
Office365 education transformation collaboration using office 365
Office365 education transformation collaboration using office 365Office365 education transformation collaboration using office 365
Office365 education transformation collaboration using office 365
 
Safe Tech. Денис Калемберг: "Интернет-банкинг. Как сделать работу клиента без...
Safe Tech. Денис Калемберг: "Интернет-банкинг. Как сделать работу клиента без...Safe Tech. Денис Калемберг: "Интернет-банкинг. Как сделать работу клиента без...
Safe Tech. Денис Калемберг: "Интернет-банкинг. Как сделать работу клиента без...
 
Useful Video Conferencing Tools
Useful Video Conferencing ToolsUseful Video Conferencing Tools
Useful Video Conferencing Tools
 

Similar to Extracting value from information chaos with good governance

Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Molly Alexander
 
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...SophiaPalmira
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity reportKevin Leffew
 
Cybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportCybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportSamantha Wagner
 
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer ExperiencesJean-Michel Franco
 
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and SystemsSteve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and SystemsIBM India Smarter Computing
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksIRJET Journal
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionCBIZ, Inc.
 
Cyber risk reporting aicpa framework
Cyber risk reporting aicpa frameworkCyber risk reporting aicpa framework
Cyber risk reporting aicpa frameworkJames Deiotte
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019Omar Bshara
 
http://www.slideshare.net/slideshow/embed_code/28627951
http://www.slideshare.net/slideshow/embed_code/28627951http://www.slideshare.net/slideshow/embed_code/28627951
http://www.slideshare.net/slideshow/embed_code/28627951N0b10111
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...TechSoup
 
Cybersecurity infographic
Cybersecurity infographicCybersecurity infographic
Cybersecurity infographicGabe Schurman
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...Judith Beckhard Cardoso
 
Information security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trendsInformation security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trendsJohn ILIADIS
 
Highlights from IBM Edge2015, z Systems.
Highlights from IBM Edge2015, z Systems.Highlights from IBM Edge2015, z Systems.
Highlights from IBM Edge2015, z Systems.IBM z Systems
 
Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-IT Strategy Group
 

Similar to Extracting value from information chaos with good governance (20)

Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
 
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
 
Cybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportCybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources Report
 
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
 
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and SystemsSteve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special Edition
 
Cyber risk reporting aicpa framework
Cyber risk reporting aicpa frameworkCyber risk reporting aicpa framework
Cyber risk reporting aicpa framework
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
http://www.slideshare.net/slideshow/embed_code/28627951
http://www.slideshare.net/slideshow/embed_code/28627951http://www.slideshare.net/slideshow/embed_code/28627951
http://www.slideshare.net/slideshow/embed_code/28627951
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
 
Cybersecurity infographic
Cybersecurity infographicCybersecurity infographic
Cybersecurity infographic
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
The Right Now Economy
The Right Now EconomyThe Right Now Economy
The Right Now Economy
 
Information security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trendsInformation security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trends
 
Highlights from IBM Edge2015, z Systems.
Highlights from IBM Edge2015, z Systems.Highlights from IBM Edge2015, z Systems.
Highlights from IBM Edge2015, z Systems.
 
Cyber Readiness Index 2.0
Cyber Readiness Index 2.0Cyber Readiness Index 2.0
Cyber Readiness Index 2.0
 
Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-
 

Recently uploaded

The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 

Recently uploaded (20)

The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 

Extracting value from information chaos with good governance

  • 1. EXTRACTING VALUE FROM INFORMATION CHAOS WHY GOOD GOVERNANCE MAKES GOOD SENSE BYOD [BRING YOUR OWN DEVICE] 6 OUT OF 10 EMPLOYEES AGES 18-35 USE A PERSONAL DEVICE FOR WORK SECURITY BREACHES 75M CYBERCRIME COSTS US $1 TRILLION PER YEAR 24B MALWARE SAMPLES in 2012 CONNECTED DEVICES by 2020 DATA PROLIFERATION THE AVERAGE CORPORATE WORKER SENDS & RECEIVES 112 SOCIAL MEDIA RISK EMAILS PER DAY PRIVACY REGULATIONS 2 3 COMPANIES are at RISK from SOCIAL MEDIA PASS **** 1 DOWNTIME WORKER RECEIVES $380B 65 3 AVERAGE COST TERABYTES of $5,000 COUNTRIES HAVE THEIR OWN DATA PROTECTION LAWS INFORMATION PER YEAR A MINUTE FOR DOWNTIME INCIDENTS COST OF DISASTERS in 2011 9.6 MILLION PETABYTES: business-related information processed by the world’s computer servers per year BUSINESS GOVERNANCE AND MANAGEMENT OF ENTERPRISE IT Download a complimentary copy of COBIT 5 today or learn more at www.isaca.org/cobit SOURCES http://www.isaca.org/About-ISACA/Press-room/News-Releases/2011/Pages/ISACA-Survey-Bring-Your-Own-Device-Trend-Heightens-Online-Holiday-Shopping-Risk.aspx http://www.gsma.com/articles/gsma-announces-the-business-impact-of-connected-devices-could-be-worth-us-4-5-trillion-in-2020/22536 http://blogs.mcafee.com/mcafee-labs/mcafee-q4-threats-report-shows-malware-surpassed-75-million-samples-in-2011 http://www.radicati.com/?p=6904 http://ucsdnews.ucsd.edu/newsrel/general/04-05BusinessInformation.asp http://www.informationweek.com/thebrainyard/news/community_management_development/231602379 http://www.un.org/en/development/desa/news/ecosoc/cybersecurity-demands-global-approach.html http://www.mofo.com/privacy--data-security-services/ http://www.time.com/time/world/article/0,8599,2108354,00.html http://www.eweek.com/c/a/IT-Infrastructure/Unplanned-IT-Downtime-Can-Cost-5K-Per-Minute-Report-549007/