SlideShare a Scribd company logo
1 of 1
Download to read offline
CybersecurityisnotjustanITproblem.
Tobeeffective,itneedsstatewideexecutivesupport.Electedand
appointedofficialsshould haveakey rolein this processby better
understandingcyberthreats,supportingagency leaders,educating
citizensandchampioningfundingfor stateCIOsandCISOs.Butasthe
GoverningInstituterecentlydiscoveredin its survey of 103statelegislators
andstaff,1
althoughlegislatorsknowtherisksarehigh,many arenotas
involvedastheycould beandcybersecurity gapsremain.
Whatlegislators
NEED
TOKNOW
about cybersecurity
ThreatLevel:High
Involvement:Low
Opportunities Exist
EducationisKey
2/3of respondents
reported their
state’scurrent
levelofcyberriskis
moderatetohigh.
Only18%
ofrespondents
currentlysitona
COMMITTEE
withcybersecurity
aspartofitsmandate.
Criminal
organizations
outside
theU.S.
Political
hacktivists
Criminal
organizations
within
theU.S.
Respondents said their
TOP 3 THREATS ARE:
PERSONNEL
The most reported source for
cybersecurity information
IS THE MEDIA.
Amajorityoflegislatorsunderstandcyberthreatsareevolving
andposearisktotheirstate.
Despiteunderstandingtherisk,legislatorsarenotasimmersedin
statecybersecurityeffortsastheycouldbe.
Legislatorsshouldbeinvolvedincybersecurityforan
effectivestatewidestrategy.Thefirststepiseducation.
Thetop5topicslegislatorssaytheywanttolearnmoreaboutare:
Respondentshighlightedcybersecuritygapsaround:
67%
knowit’samatter
OFWHEN,
notif,thestate
willbeattacked.
80%
ofrespondents
DONOTKNOW
iftheirstatehasa
cyber-emergency
incidentplaninplace.
43%
saythereis
insufficientfunding
atthestatelevel.
43%
saythereisalack
ofunderstandingabout
risksandincidents.
50%
saytheirstatehasan
inadequatenumberof
cybersecuritypersonnel.
?
BUDGET KNOWLEDGE
Biggestcyberthreatsfacing
stategovernment
Bestcybersecuritymethods
forhelpingtoprotectstatenetworks
Topcausesofdatabreaches
Protectionformobiledevices
Databreachresponse
Conductedby:
© 2016 e.REPUBLIC. ALL RIGHTS RESERVED
CLICKHERETOREGISTERANDATTENDTHEGOVERNINGWEBINARONMARCH10TH
,
CYBERSECURITY:WHATMOSTELECTEDOFFICIALSNEEDTOKNOW.
1.TheGoverningInstitutesurveyedmembersoftheGoverningExchangeandtheNationalConferenceofStateLegislatures(NCSL)inOctoberandNovember2015.
Seventy-fourstateelectedandappointedofficialsand29legislativestaffmembersresponded.

More Related Content

What's hot

Consumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical GapConsumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical GapPing Identity
 
2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey 2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey 4iQ
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalPriyanka Aash
 
Security Concerns Around the World | Infographic
Security Concerns Around the World | InfographicSecurity Concerns Around the World | Infographic
Security Concerns Around the World | InfographicPing Identity
 
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational GapPing Identity
 
Group and family liability of crime accused
Group and family liability of crime accusedGroup and family liability of crime accused
Group and family liability of crime accusedM S Siddiqui
 
Cybersecurity: What Defense Lawyers Need to Know about Cyberliability, Cyberc...
Cybersecurity: What Defense Lawyers Need to Know about Cyberliability, Cyberc...Cybersecurity: What Defense Lawyers Need to Know about Cyberliability, Cyberc...
Cybersecurity: What Defense Lawyers Need to Know about Cyberliability, Cyberc...Shawn Tuma
 
Security Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicSecurity Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicPing Identity
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidentsassanesignate
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
Toolkit on factchecking by shreedeep rayamajhi
Toolkit on factchecking by shreedeep rayamajhiToolkit on factchecking by shreedeep rayamajhi
Toolkit on factchecking by shreedeep rayamajhiShreedeep Rayamajhi
 
RIA Roadshow - Electronic Communications Compliance for Investment Advisors
RIA Roadshow - Electronic Communications Compliance for Investment AdvisorsRIA Roadshow - Electronic Communications Compliance for Investment Advisors
RIA Roadshow - Electronic Communications Compliance for Investment AdvisorsSmarsh
 
The JPMC Data Breach Column
The JPMC Data Breach ColumnThe JPMC Data Breach Column
The JPMC Data Breach ColumnMichael Sexton
 
Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2Felipe Prado
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for FamiliesSusan Chavez
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudPaige Rasid
 
Report on data breach and privacy in nepal during covid19 by shreedeep rayamajhi
Report on data breach and privacy in nepal during covid19 by shreedeep rayamajhiReport on data breach and privacy in nepal during covid19 by shreedeep rayamajhi
Report on data breach and privacy in nepal during covid19 by shreedeep rayamajhiShreedeep Rayamajhi
 
Infographic Economic Impact of Cybercrime
Infographic Economic Impact of CybercrimeInfographic Economic Impact of Cybercrime
Infographic Economic Impact of CybercrimeJeferson Propheta
 

What's hot (20)

Protect the personal
Protect the personalProtect the personal
Protect the personal
 
Consumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical GapConsumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical Gap
 
2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey 2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
Security Concerns Around the World | Infographic
Security Concerns Around the World | InfographicSecurity Concerns Around the World | Infographic
Security Concerns Around the World | Infographic
 
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
 
Group and family liability of crime accused
Group and family liability of crime accusedGroup and family liability of crime accused
Group and family liability of crime accused
 
Cybersecurity: What Defense Lawyers Need to Know about Cyberliability, Cyberc...
Cybersecurity: What Defense Lawyers Need to Know about Cyberliability, Cyberc...Cybersecurity: What Defense Lawyers Need to Know about Cyberliability, Cyberc...
Cybersecurity: What Defense Lawyers Need to Know about Cyberliability, Cyberc...
 
Security Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicSecurity Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | Infographic
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Toolkit on factchecking by shreedeep rayamajhi
Toolkit on factchecking by shreedeep rayamajhiToolkit on factchecking by shreedeep rayamajhi
Toolkit on factchecking by shreedeep rayamajhi
 
RIA Roadshow - Electronic Communications Compliance for Investment Advisors
RIA Roadshow - Electronic Communications Compliance for Investment AdvisorsRIA Roadshow - Electronic Communications Compliance for Investment Advisors
RIA Roadshow - Electronic Communications Compliance for Investment Advisors
 
The JPMC Data Breach Column
The JPMC Data Breach ColumnThe JPMC Data Breach Column
The JPMC Data Breach Column
 
Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
 
Report on data breach and privacy in nepal during covid19 by shreedeep rayamajhi
Report on data breach and privacy in nepal during covid19 by shreedeep rayamajhiReport on data breach and privacy in nepal during covid19 by shreedeep rayamajhi
Report on data breach and privacy in nepal during covid19 by shreedeep rayamajhi
 
Infographic Economic Impact of Cybercrime
Infographic Economic Impact of CybercrimeInfographic Economic Impact of Cybercrime
Infographic Economic Impact of Cybercrime
 
Threatsploit Adversary Report January 2019
Threatsploit Adversary Report January  2019Threatsploit Adversary Report January  2019
Threatsploit Adversary Report January 2019
 

Similar to GOV16_INFOGRAPHIC_ATT_P (1).PDF

Policy Guide for Legislators
Policy Guide for LegislatorsPolicy Guide for Legislators
Policy Guide for LegislatorsKristin Judge
 
Winning the Cybersecurity Battle
Winning the Cybersecurity BattleWinning the Cybersecurity Battle
Winning the Cybersecurity BattleGovLoop
 
Internet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityInternet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityTracy Clark
 
The ability to provide the public with information regarding ter.docx
The ability to provide the public with information regarding ter.docxThe ability to provide the public with information regarding ter.docx
The ability to provide the public with information regarding ter.docxtodd801
 
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...CMR WORLD TECH
 
deloitte-au-risk-tasmanian-fraud-corruption-survey-2015-010915
deloitte-au-risk-tasmanian-fraud-corruption-survey-2015-010915deloitte-au-risk-tasmanian-fraud-corruption-survey-2015-010915
deloitte-au-risk-tasmanian-fraud-corruption-survey-2015-010915Blair Browning
 
Ability to provide public with I information regarding terrorist gro.docx
Ability to provide public with I information regarding terrorist gro.docxAbility to provide public with I information regarding terrorist gro.docx
Ability to provide public with I information regarding terrorist gro.docxrhetttrevannion
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportFERMA
 
Advancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National PriorityAdvancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National PriorityCareer Communications Group
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
Raytheon Millennial Cybersecurity Survey
Raytheon Millennial Cybersecurity SurveyRaytheon Millennial Cybersecurity Survey
Raytheon Millennial Cybersecurity Survey- Mark - Fullbright
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxphilipnelson29183
 
2016-Black-Hat-Attendee-Survey
2016-Black-Hat-Attendee-Survey2016-Black-Hat-Attendee-Survey
2016-Black-Hat-Attendee-SurveyRob Raleigh
 
Third Annual Study on Patient Privacy
Third Annual Study on Patient PrivacyThird Annual Study on Patient Privacy
Third Annual Study on Patient Privacy- Mark - Fullbright
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskFiona Lew
 
Gabrielle HetlandAlthough the United States has a very stron.docx
Gabrielle HetlandAlthough the United States has a very stron.docxGabrielle HetlandAlthough the United States has a very stron.docx
Gabrielle HetlandAlthough the United States has a very stron.docxhanneloremccaffery
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGSJun Hao Lim
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & ThievesLorena Magee
 

Similar to GOV16_INFOGRAPHIC_ATT_P (1).PDF (20)

Policy Guide for Legislators
Policy Guide for LegislatorsPolicy Guide for Legislators
Policy Guide for Legislators
 
Winning the Cybersecurity Battle
Winning the Cybersecurity BattleWinning the Cybersecurity Battle
Winning the Cybersecurity Battle
 
Internet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityInternet Crime And Moral Responsibility
Internet Crime And Moral Responsibility
 
The ability to provide the public with information regarding ter.docx
The ability to provide the public with information regarding ter.docxThe ability to provide the public with information regarding ter.docx
The ability to provide the public with information regarding ter.docx
 
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
 
Privacy
PrivacyPrivacy
Privacy
 
deloitte-au-risk-tasmanian-fraud-corruption-survey-2015-010915
deloitte-au-risk-tasmanian-fraud-corruption-survey-2015-010915deloitte-au-risk-tasmanian-fraud-corruption-survey-2015-010915
deloitte-au-risk-tasmanian-fraud-corruption-survey-2015-010915
 
Ability to provide public with I information regarding terrorist gro.docx
Ability to provide public with I information regarding terrorist gro.docxAbility to provide public with I information regarding terrorist gro.docx
Ability to provide public with I information regarding terrorist gro.docx
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 
Advancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National PriorityAdvancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National Priority
 
Confrance presntstation
Confrance presntstationConfrance presntstation
Confrance presntstation
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
Raytheon Millennial Cybersecurity Survey
Raytheon Millennial Cybersecurity SurveyRaytheon Millennial Cybersecurity Survey
Raytheon Millennial Cybersecurity Survey
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
 
2016-Black-Hat-Attendee-Survey
2016-Black-Hat-Attendee-Survey2016-Black-Hat-Attendee-Survey
2016-Black-Hat-Attendee-Survey
 
Third Annual Study on Patient Privacy
Third Annual Study on Patient PrivacyThird Annual Study on Patient Privacy
Third Annual Study on Patient Privacy
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data Risk
 
Gabrielle HetlandAlthough the United States has a very stron.docx
Gabrielle HetlandAlthough the United States has a very stron.docxGabrielle HetlandAlthough the United States has a very stron.docx
Gabrielle HetlandAlthough the United States has a very stron.docx
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & Thieves
 

GOV16_INFOGRAPHIC_ATT_P (1).PDF

  • 1. CybersecurityisnotjustanITproblem. Tobeeffective,itneedsstatewideexecutivesupport.Electedand appointedofficialsshould haveakey rolein this processby better understandingcyberthreats,supportingagency leaders,educating citizensandchampioningfundingfor stateCIOsandCISOs.Butasthe GoverningInstituterecentlydiscoveredin its survey of 103statelegislators andstaff,1 althoughlegislatorsknowtherisksarehigh,many arenotas involvedastheycould beandcybersecurity gapsremain. Whatlegislators NEED TOKNOW about cybersecurity ThreatLevel:High Involvement:Low Opportunities Exist EducationisKey 2/3of respondents reported their state’scurrent levelofcyberriskis moderatetohigh. Only18% ofrespondents currentlysitona COMMITTEE withcybersecurity aspartofitsmandate. Criminal organizations outside theU.S. Political hacktivists Criminal organizations within theU.S. Respondents said their TOP 3 THREATS ARE: PERSONNEL The most reported source for cybersecurity information IS THE MEDIA. Amajorityoflegislatorsunderstandcyberthreatsareevolving andposearisktotheirstate. Despiteunderstandingtherisk,legislatorsarenotasimmersedin statecybersecurityeffortsastheycouldbe. Legislatorsshouldbeinvolvedincybersecurityforan effectivestatewidestrategy.Thefirststepiseducation. Thetop5topicslegislatorssaytheywanttolearnmoreaboutare: Respondentshighlightedcybersecuritygapsaround: 67% knowit’samatter OFWHEN, notif,thestate willbeattacked. 80% ofrespondents DONOTKNOW iftheirstatehasa cyber-emergency incidentplaninplace. 43% saythereis insufficientfunding atthestatelevel. 43% saythereisalack ofunderstandingabout risksandincidents. 50% saytheirstatehasan inadequatenumberof cybersecuritypersonnel. ? BUDGET KNOWLEDGE Biggestcyberthreatsfacing stategovernment Bestcybersecuritymethods forhelpingtoprotectstatenetworks Topcausesofdatabreaches Protectionformobiledevices Databreachresponse Conductedby: © 2016 e.REPUBLIC. ALL RIGHTS RESERVED CLICKHERETOREGISTERANDATTENDTHEGOVERNINGWEBINARONMARCH10TH , CYBERSECURITY:WHATMOSTELECTEDOFFICIALSNEEDTOKNOW. 1.TheGoverningInstitutesurveyedmembersoftheGoverningExchangeandtheNationalConferenceofStateLegislatures(NCSL)inOctoberandNovember2015. Seventy-fourstateelectedandappointedofficialsand29legislativestaffmembersresponded.