You know the bad guys are up to no good, but did you know the greatest threat to your organization comes from the inside? View this presentation and learn answers to your most pressing questions:
- Do critical gaps exist in your cyberthreat defense posture?
- How does your security spend compare to other organizations?
- What can you do to minimize risk against the internal and external threat?
- Is your business critical data protected from cybercriminals?
1. 2016 Cyberthreat Defense Report
Mark Bouchard, CISSP
COO, CyberEdge Group
www.cyber-edge.com
info@cyber-edge.com
800.327.8711
@CyberEdgeGroup
Sponsored in
part by:
3. About The Cyberthreat Defense Report
3
• 26-question online survey conducted in
Nov 2015
• IT security decision maker or practitioner
• Employed by organization with at least 500
employees
• Survey designed to assess:
• Organization’s security posture
• Perceptions of cyberthreats and cyberthreat
defenses
• Attack surface reduction strategies
• Future security plans
4. Survey Demographics
4
Survey participation by
organization employee count• Global participation
• 40% US/Canada
• 30% Europe
• 20% Asia-Pacific
• 10% Latin America
• Representing >19 industries
• Mix of management and practitioners
• Nearly half from organizations with >5,000
employees
5. Key Findings
5
Infographic Available Now!
• 76% hit by a successful attack in 2015
• 62% expecting to get hit again in 2016
• Security budgets growing for 74%
• Malware and spear phishing continue to
cause headaches
• 86% dissatisfied with their current
endpoint anti-malware solution
• Many backpedaling on BYOD
16. The Road Ahead
16
• Board-level attention and healthy/growing budgets are providing a
golden opportunity to progress security agendas … good areas for
investment include:
• Cloud access security brokers
• Social media brokers, too
• Advanced web app protection
• Special “flavors” of threat intelligence
• User-centric security
• Renewed IAM
• User/entity behavior analytics
• Cyberthreat hunting
• Proactively find threats
• Proactively “war-game” new defense strategies
17. Report and Infographic Available Now!
17
Connect to www.imperva.com/go/cdr
to download the complete report!
Imperva Defends Business-Critical Data and Applications
Three Anchors
That’s what we’ve done for our more than 3,300 customers worldwide, through three key capabilities:
Discovering Your Assets and Vulnerabilities
Protecting Your Information
Complying with Regulations