SlideShare a Scribd company logo
The Cyber Security Readiness
of Canadian Organizations
summary of the 2016
scalar security study
INTRODUCTION
The second annual Scalar Security Study examines the cyber security readiness of Canadian organizations and the
trends in dealing with growing cyber threats.
We surveyed 654 IT and IT security practitioners in Canada. The research was independently conducted by Ponemon
Institute. Participants in this study play a role in directing the IT function, improving IT security in their organizations,
setting IT priorities, and managing budgets. Respondents came from a wide variety of industries, and almost two
thirds work at organizations with between 251 and 5,000 employees in Canada.
KEY FINDINGS OF OUR RESEARCH INCLUDE:
Respondents reported an average of 40 cyber attacks per year. With this in mind, it is not surprising that over half (51
percent) of this year’s respondents experienced an incident involving the loss or exposure of sensitive information
within the last twelve months.
The vast majority of respondents believe that cyber crimes are increasing in frequency, sophistication, and severity.
It also appears that respondents are becoming more discouraged in their efforts to fight cyber crime. Only 37 percent
of respondents believe they are winning the cyber security war, compared with 41 percent last year.
Seventy percent of respondents say their organizations experienced situations when exploits and malware have
evaded their intrusion detection systems (IDS), and 82 percent of respondents say their organizations experienced
situations when cyber attacks have evaded their anti-virus (AV) solutions.
Only 38 percent of respondents say their organizations have systems and controls in place to deal with advanced
persistent threats (APTs), and organizations have an average of almost one separate APT-related incident per
month. IT downtime, business disruption, and theft of personal information are the primary consequences of APTs or
zero day threats experienced.
In the past 12 months, companies represented in this research experienced an average of 5 denial of service (DoS)
attacks or about one every two months. Further, 44 percent of respondents say their organization experienced a DoS
attack that caused a disruption to business operations and/or system downtime. The cost of business disruptions and
system downtimes averaged $1.2 million.
The greatest threats to organizations are web-borne attacks. Eighty percent of respondents say the most frequent
compromises are web-borne malware attacks, followed by rootkits at 65 percent of respondents.
Mobile devices and applications are seen as the greatest IT security risk. Mobile devices, third party applications,
and negligent third party risk are the top three concerns for 72 percent, 68 percent, and 45 percent of respondents,
respectively. These risks all have in common the human factor, which requires both technology and governance to
reduce the threat.
Cyber security compromises are costly, and intellectual property is a target. Thirty-three percent of respondents say
their firm experienced a loss of intellectual property due to cyber attacks within the past 24 months, with 36 percent
of them believing it caused a loss of competitive advantage. The average cost of the loss of this information was just
under $6 million.
However, theft of intellectual property is not the only cost from a cyber attack. On average, over the last 12 months,
organizations spent approximately $7 million each on the following: clean up or remediation ($766,667), lost user
productivity ($950,625), disruption to normal operations ($1.1 million), damage or theft of IT assets and infrastructure
($1.6 million), and damage to reputation and marketplace image ($2.6 million). With organizations reporting an
average of 40 attacks per year, this makes the average cost per attack approximately $175,000.
Cyber security spend has increased slightly. On average, respondents estimate their approximate annual budget
for IT is $71 million and an average of 11 percent of this budget is dedicated to information security. This increased
slightly from about 10 percent last year.
The majority of respondents believe gathering and using threat intelligence is key to winning the cyber security
war. Sixty percent of respondents do either fully or partially participate in an initiative or program for exchanging
threat intelligence with peers, government, and/or industry groups, believing it improves the security posture of their
organization, in addition to improving situational awareness.
What can organizations do to improve their security posture? Once again we identified certain organizations
represented in this study that self-report to have achieved a more effective cyber security posture and are better able
to mitigate risks, vulnerabilities, and attacks. We refer to these as “high performing” organizations, and they represent
53 percent of the sample size. When compared with the remaining 47 percent of the sample, the “low performers”, we
see that high performers spend 43 percent more of their IT budget on information security, and are almost twice as
likely to have a cyber security strategy that is fully aligned with business objectives and mission.
As a result of these strategies, tactics, and investments, high performers experienced less situations when cyber
attacks evaded their AV or IDS controls, are 28 percent more confident they are winning the cyber security war, and
are 19 percent less likely to have experienced an attack that led to the loss or exposure of sensitive information.
Looking forward, the technologies that are expected to receive the most funding over the next 12 months across all
respondents are: network traffic surveillance, SIEM, endpoint security solutions, big data analytics for cyber security,
and identity management and authentication.
CONCLUSIONS
While it appears that the overall threat landscape has become more severe in the last 12 months, high performing
organizations continue to illustrate that it is possible to improve an organization’s cyber security posture. The practices
of these high performers provide guidance on how organizations can improve their cyber security effectiveness. Some
specific strategies and tactics organizations should consider to increase their security posture are:
	 Conduct assessments to understand areas where the organization is most vulnerable to an attack. If necessary,
enlist the help of trusted risk advisory consultants who will work directly with your organization to efficiently identify
and manage risk in your environment.
	 Secure adequate resources for investment in practices and technologies determined to be critical to achieving a
strong cyber security posture. Align your security strategy to the overall business goals and mission to help secure
sufficient budget and ensure your spend is being allocated wisely. If you don’t know where to start, look to trusted
advisory firms who can provide virtual CISO programs and help you to build an end-to-end security program.
	 Invest in technologies such as SIEM, network intelligence, and identity management and authentication to identify
and understand normal versus abnormal behaviour in your environment.
	 Proactively recruit experts with the necessary skillset to help lead the organization’s cyber security team. Ensure the
in-house expertise exists and encourage all IT and IT security practitioners on staff to obtain specialized training and
maintain their credentials. If you do not have sufficient in-house expertise, consider outsourcing to a managed security
services provider.
To download a copy of the full report, visit scalar.ca/security-study-2016
Research independently conducted by Ponemon Institute LLC | Published February 2016

More Related Content

What's hot

SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
Silicon Valley Bank
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
FireEye, Inc.
 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
Dawn Yankeelov
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
- Mark - Fullbright
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for Cybersecurity
ShareDocView.com
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
Marko Suswanto
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
Rahul Tyagi
 
2015 IA survey - Protiviti
2015 IA survey - Protiviti2015 IA survey - Protiviti
2015 IA survey - Protiviti
Simone Luca Giargia
 
Chief Audit Execs speak out: Cybersecurity & risk management
Chief Audit Execs speak out: Cybersecurity & risk managementChief Audit Execs speak out: Cybersecurity & risk management
Chief Audit Execs speak out: Cybersecurity & risk management
Grant Thornton LLP
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey
FireEye, Inc.
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
Kim Jensen
 
Websense
WebsenseWebsense
Websense
CMR WORLD TECH
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
Abhishek Sood
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinar
Synack
 
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance SectorThe Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
Accenture Insurance
 
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
Kim Jensen
 
How to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness ProgramHow to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness Program
Matt Moneypenny
 
Cost of Cybercrime 2017
Cost of Cybercrime 2017Cost of Cybercrime 2017
Cost of Cybercrime 2017
Paperjam_redaction
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
Ramón Gómez de Olea y Bustinza
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
Semir Ibrahimovic
 

What's hot (20)

SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for Cybersecurity
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
2015 IA survey - Protiviti
2015 IA survey - Protiviti2015 IA survey - Protiviti
2015 IA survey - Protiviti
 
Chief Audit Execs speak out: Cybersecurity & risk management
Chief Audit Execs speak out: Cybersecurity & risk managementChief Audit Execs speak out: Cybersecurity & risk management
Chief Audit Execs speak out: Cybersecurity & risk management
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
Websense
WebsenseWebsense
Websense
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinar
 
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance SectorThe Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
 
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
How to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness ProgramHow to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness Program
 
Cost of Cybercrime 2017
Cost of Cybercrime 2017Cost of Cybercrime 2017
Cost of Cybercrime 2017
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 

Similar to 2016 Scalar Security Study Executive Summary

2017 Scalar Security Study Summary
2017 Scalar Security Study Summary2017 Scalar Security Study Summary
2017 Scalar Security Study Summary
Scalar Decisions
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
Rahul Neel Mani
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
Scalar Decisions
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
Brian Rushton-Phillips
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
The Economist Media Businesses
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Ernst & Young
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
NishantSisodiya
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
Accenture Operations
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
CynergisTek, Inc.
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Randall Chase
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
TechBiz Forense Digital
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
Accenture Insurance
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise
The Economist Media Businesses
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdf
ramsetl
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
galagirishp
 

Similar to 2016 Scalar Security Study Executive Summary (20)

2017 Scalar Security Study Summary
2017 Scalar Security Study Summary2017 Scalar Security Study Summary
2017 Scalar Security Study Summary
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdf
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 

More from patmisasi

Scalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services OverviewScalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services Overview
patmisasi
 
Scalar Corporate Overview FY17 patmisasi
Scalar Corporate Overview FY17 patmisasiScalar Corporate Overview FY17 patmisasi
Scalar Corporate Overview FY17 patmisasi
patmisasi
 
Scalar Cloud Consulting Advisory Services
Scalar Cloud Consulting Advisory ServicesScalar Cloud Consulting Advisory Services
Scalar Cloud Consulting Advisory Services
patmisasi
 
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...
patmisasi
 
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
patmisasi
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016patmisasi
 
Scalar Whiteboard
Scalar WhiteboardScalar Whiteboard
Scalar Whiteboardpatmisasi
 
Top 10 Executive IT concerns in 2016
Top 10 Executive IT concerns in 2016Top 10 Executive IT concerns in 2016
Top 10 Executive IT concerns in 2016
patmisasi
 
Top Executive IT concerns in 2016
Top Executive IT concerns in 2016Top Executive IT concerns in 2016
Top Executive IT concerns in 2016
patmisasi
 
Power of Leasing for Pat Misasi at Scalar
Power of Leasing for Pat Misasi at ScalarPower of Leasing for Pat Misasi at Scalar
Power of Leasing for Pat Misasi at Scalarpatmisasi
 
Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015patmisasi
 
ScalarTASK_One-Pager_FINAL
ScalarTASK_One-Pager_FINALScalarTASK_One-Pager_FINAL
ScalarTASK_One-Pager_FINALpatmisasi
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
patmisasi
 
corp-overview-about-us-FY15
corp-overview-about-us-FY15corp-overview-about-us-FY15
corp-overview-about-us-FY15patmisasi
 
Scalar Decisions: Emerging Trends and Technologies in Storage
Scalar  Decisions: Emerging Trends and Technologies in StorageScalar  Decisions: Emerging Trends and Technologies in Storage
Scalar Decisions: Emerging Trends and Technologies in Storage
patmisasi
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshow
patmisasi
 
Vdi storage challenges_presented at vmug_toronto 2014 by scalar decisions
Vdi storage challenges_presented at vmug_toronto 2014 by scalar decisionsVdi storage challenges_presented at vmug_toronto 2014 by scalar decisions
Vdi storage challenges_presented at vmug_toronto 2014 by scalar decisions
patmisasi
 
Scalar Decisions Sunnybrook Health Sciences VDI Case Study
Scalar Decisions Sunnybrook Health Sciences VDI Case Study Scalar Decisions Sunnybrook Health Sciences VDI Case Study
Scalar Decisions Sunnybrook Health Sciences VDI Case Study
patmisasi
 
Scalar Decisions 2013 Overview
Scalar Decisions 2013 OverviewScalar Decisions 2013 Overview
Scalar Decisions 2013 Overview
patmisasi
 

More from patmisasi (20)

Scalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services OverviewScalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services Overview
 
Scalar Corporate Overview FY17 patmisasi
Scalar Corporate Overview FY17 patmisasiScalar Corporate Overview FY17 patmisasi
Scalar Corporate Overview FY17 patmisasi
 
Scalar Cloud Consulting Advisory Services
Scalar Cloud Consulting Advisory ServicesScalar Cloud Consulting Advisory Services
Scalar Cloud Consulting Advisory Services
 
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...
 
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016
 
Scalar Whiteboard
Scalar WhiteboardScalar Whiteboard
Scalar Whiteboard
 
Top 10 Executive IT concerns in 2016
Top 10 Executive IT concerns in 2016Top 10 Executive IT concerns in 2016
Top 10 Executive IT concerns in 2016
 
Top Executive IT concerns in 2016
Top Executive IT concerns in 2016Top Executive IT concerns in 2016
Top Executive IT concerns in 2016
 
Power of Leasing for Pat Misasi at Scalar
Power of Leasing for Pat Misasi at ScalarPower of Leasing for Pat Misasi at Scalar
Power of Leasing for Pat Misasi at Scalar
 
Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015
 
ScalarTASK_One-Pager_FINAL
ScalarTASK_One-Pager_FINALScalarTASK_One-Pager_FINAL
ScalarTASK_One-Pager_FINAL
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
 
corp-overview-about-us-FY15
corp-overview-about-us-FY15corp-overview-about-us-FY15
corp-overview-about-us-FY15
 
Scalar Decisions: Emerging Trends and Technologies in Storage
Scalar  Decisions: Emerging Trends and Technologies in StorageScalar  Decisions: Emerging Trends and Technologies in Storage
Scalar Decisions: Emerging Trends and Technologies in Storage
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshow
 
Vdi storage challenges_presented at vmug_toronto 2014 by scalar decisions
Vdi storage challenges_presented at vmug_toronto 2014 by scalar decisionsVdi storage challenges_presented at vmug_toronto 2014 by scalar decisions
Vdi storage challenges_presented at vmug_toronto 2014 by scalar decisions
 
Scalar Decisions Sunnybrook Health Sciences VDI Case Study
Scalar Decisions Sunnybrook Health Sciences VDI Case Study Scalar Decisions Sunnybrook Health Sciences VDI Case Study
Scalar Decisions Sunnybrook Health Sciences VDI Case Study
 
Scalar Decisions 2013 Overview
Scalar Decisions 2013 OverviewScalar Decisions 2013 Overview
Scalar Decisions 2013 Overview
 

Recently uploaded

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 

Recently uploaded (20)

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 

2016 Scalar Security Study Executive Summary

  • 1. The Cyber Security Readiness of Canadian Organizations summary of the 2016 scalar security study
  • 2. INTRODUCTION The second annual Scalar Security Study examines the cyber security readiness of Canadian organizations and the trends in dealing with growing cyber threats. We surveyed 654 IT and IT security practitioners in Canada. The research was independently conducted by Ponemon Institute. Participants in this study play a role in directing the IT function, improving IT security in their organizations, setting IT priorities, and managing budgets. Respondents came from a wide variety of industries, and almost two thirds work at organizations with between 251 and 5,000 employees in Canada. KEY FINDINGS OF OUR RESEARCH INCLUDE: Respondents reported an average of 40 cyber attacks per year. With this in mind, it is not surprising that over half (51 percent) of this year’s respondents experienced an incident involving the loss or exposure of sensitive information within the last twelve months. The vast majority of respondents believe that cyber crimes are increasing in frequency, sophistication, and severity. It also appears that respondents are becoming more discouraged in their efforts to fight cyber crime. Only 37 percent of respondents believe they are winning the cyber security war, compared with 41 percent last year. Seventy percent of respondents say their organizations experienced situations when exploits and malware have evaded their intrusion detection systems (IDS), and 82 percent of respondents say their organizations experienced situations when cyber attacks have evaded their anti-virus (AV) solutions. Only 38 percent of respondents say their organizations have systems and controls in place to deal with advanced persistent threats (APTs), and organizations have an average of almost one separate APT-related incident per month. IT downtime, business disruption, and theft of personal information are the primary consequences of APTs or zero day threats experienced. In the past 12 months, companies represented in this research experienced an average of 5 denial of service (DoS) attacks or about one every two months. Further, 44 percent of respondents say their organization experienced a DoS attack that caused a disruption to business operations and/or system downtime. The cost of business disruptions and system downtimes averaged $1.2 million. The greatest threats to organizations are web-borne attacks. Eighty percent of respondents say the most frequent compromises are web-borne malware attacks, followed by rootkits at 65 percent of respondents. Mobile devices and applications are seen as the greatest IT security risk. Mobile devices, third party applications, and negligent third party risk are the top three concerns for 72 percent, 68 percent, and 45 percent of respondents, respectively. These risks all have in common the human factor, which requires both technology and governance to reduce the threat. Cyber security compromises are costly, and intellectual property is a target. Thirty-three percent of respondents say their firm experienced a loss of intellectual property due to cyber attacks within the past 24 months, with 36 percent of them believing it caused a loss of competitive advantage. The average cost of the loss of this information was just under $6 million. However, theft of intellectual property is not the only cost from a cyber attack. On average, over the last 12 months, organizations spent approximately $7 million each on the following: clean up or remediation ($766,667), lost user productivity ($950,625), disruption to normal operations ($1.1 million), damage or theft of IT assets and infrastructure ($1.6 million), and damage to reputation and marketplace image ($2.6 million). With organizations reporting an average of 40 attacks per year, this makes the average cost per attack approximately $175,000.
  • 3. Cyber security spend has increased slightly. On average, respondents estimate their approximate annual budget for IT is $71 million and an average of 11 percent of this budget is dedicated to information security. This increased slightly from about 10 percent last year. The majority of respondents believe gathering and using threat intelligence is key to winning the cyber security war. Sixty percent of respondents do either fully or partially participate in an initiative or program for exchanging threat intelligence with peers, government, and/or industry groups, believing it improves the security posture of their organization, in addition to improving situational awareness. What can organizations do to improve their security posture? Once again we identified certain organizations represented in this study that self-report to have achieved a more effective cyber security posture and are better able to mitigate risks, vulnerabilities, and attacks. We refer to these as “high performing” organizations, and they represent 53 percent of the sample size. When compared with the remaining 47 percent of the sample, the “low performers”, we see that high performers spend 43 percent more of their IT budget on information security, and are almost twice as likely to have a cyber security strategy that is fully aligned with business objectives and mission. As a result of these strategies, tactics, and investments, high performers experienced less situations when cyber attacks evaded their AV or IDS controls, are 28 percent more confident they are winning the cyber security war, and are 19 percent less likely to have experienced an attack that led to the loss or exposure of sensitive information. Looking forward, the technologies that are expected to receive the most funding over the next 12 months across all respondents are: network traffic surveillance, SIEM, endpoint security solutions, big data analytics for cyber security, and identity management and authentication. CONCLUSIONS While it appears that the overall threat landscape has become more severe in the last 12 months, high performing organizations continue to illustrate that it is possible to improve an organization’s cyber security posture. The practices of these high performers provide guidance on how organizations can improve their cyber security effectiveness. Some specific strategies and tactics organizations should consider to increase their security posture are: Conduct assessments to understand areas where the organization is most vulnerable to an attack. If necessary, enlist the help of trusted risk advisory consultants who will work directly with your organization to efficiently identify and manage risk in your environment. Secure adequate resources for investment in practices and technologies determined to be critical to achieving a strong cyber security posture. Align your security strategy to the overall business goals and mission to help secure sufficient budget and ensure your spend is being allocated wisely. If you don’t know where to start, look to trusted advisory firms who can provide virtual CISO programs and help you to build an end-to-end security program. Invest in technologies such as SIEM, network intelligence, and identity management and authentication to identify and understand normal versus abnormal behaviour in your environment. Proactively recruit experts with the necessary skillset to help lead the organization’s cyber security team. Ensure the in-house expertise exists and encourage all IT and IT security practitioners on staff to obtain specialized training and maintain their credentials. If you do not have sufficient in-house expertise, consider outsourcing to a managed security services provider. To download a copy of the full report, visit scalar.ca/security-study-2016
  • 4. Research independently conducted by Ponemon Institute LLC | Published February 2016