SlideShare a Scribd company logo
Cybersecurity Preparedness
Benchmark Study
2Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
National Cybersecurity Awareness
Month (NCSAM)
• This October is the 13th annual National Cyber
Security Awareness Month
• As the month comes to a close we hope you will
continue to promote a safer, more secure and
more trusted internet all year long
• BRG is a proud NCSAM Champion and we
encourage everyone to support the 6th
anniversary of STOP. THINK. CONNECT.™
NCSAM initiative
• More information can be found @
https://staysafeonline.org/
3Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
BRG Overview
Over 1,000 professionals in 37 offices
4Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
Study Background
Why the need for cybersecurity benchmarking?
• Financial and non-financial consequences of a successful cyber attack
• Governance and Technology
• Gain understanding how other peers implement Information Security
• Study results from two different points of view:
– overall results across all participants to provide a thorough and balanced
view of the current state of Cybersecurity
– an individual assessment for each participant where individual answers
are discussed and compared against other study respondents
5
Study Background
Target group: Executive Management and Board of
Directors from different sectors
Survey: 103 Questions, approximately 60 minutes.
Online questionnaire; select phone
interviews
Timeline: Q1 and Q2 2016
Results: Q3 2016
Participants received: Anonymized evaluation of participant data
including indication of their individual
answers
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
6
Objectives
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
7
Country of Origin
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
8
Study Participants
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
Primary Industry of Organization Title or Level in Organization
Total Employees with Average FTE IT Employees
9
Strategic Insights
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
10
Who does the CISO/CSO report to?
Growing Importance
of CISO
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
54%
of organizations
report an
Information Security
Officer is in place
11
How would you rate your organization’s
information security culture?
Security Culture
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
CISO
73%
of organizations
have a formal
cybersecurity training
and awareness program
12
Rate the effectiveness of your
organization’s cyber security program
Cybersecurity Effectiveness
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
CISO
80%
of organizations report
that senior managers
approach information
security as an enterprise
risk-management issue
13
How would you rate your organization’s cyber
security incident response capabilities?
Incident Response Capability
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
CISO
60%
of organizations inform
governments and
regulators of
cybersecurity breaches
14
What strategic initiatives has your
organization adopted in its security program?
Strategic Initiatives
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
90%
of organizations do not
have a cybersecurity
strategy for the Internet
of Things
15
Board and Executive Leadership
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
16
Areas in which the Board of
Directors actively participate:
Board Engagement
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
CISO
55%
of organizations
report that the Board
of Directors actively
participate in overall
cybersecurity strategy
17
Areas board participation has helped improve your
organization’s information security program:
Board Influence
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
18
How does the board oversee cyber security-related issues?
Board Oversight
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
19
How would you rate the organizational leadership support for cybersecurity?
Rate senior management focus on information security
Leadership Support & Focus
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
20
How do you measure the effectiveness of
the organization’s cyber security program?
Feedback Mechanisms
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
69%
of organizations rely
on auditors, both
internal and external
as a measure of their
cybersecurity
effectiveness
21
Managing Security Risk
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
22
Has your organization performed a cyber risk appetite assessment?
Has your organization performed a cyber threat assessment?
Cybersecurity Risk
Assessments
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
CISO
CISO
47%
of organizations do
not believe that
leadership has a
functional
understanding of their
network security
Are there formal security and operational procedures documented?
23
Documented Procedures
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
91%
of organizations
document their
cybersecurity
policies and
procedures
24
Areas for improvement and awareness programs?
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
Improvement & Awareness
25
How often does executive management receive periodical briefings
on the state of your organization’s network security system?
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
Executive Briefings
30%
of executive
management receive
a briefing once every
six months or less
26
Systems and Controls
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
Which information security standard and best practice does
your organization follow?
27Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
Security Standards
37%
of organizations
used ISO27001,
with financial
services at 43%
Security controls and business continuity
plans are tested on a regular basis?
28Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
Controls Testing
How often are the security controls of the enterprise
systems and interconnected systems reviewed?
29Berkeley Research Group - Cybersecurity Preparedness Benchmark Study
System Reviews
24%
of organizations do
not routinely test
security controls
and business
continuity plans on
a regular basis
How often are self-assessments conducted?
30Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
Self-assessments
30%
of organizations
do not routinely
undertake self-
assessments
CISO
How often are external security assessments conducted?
31Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
External Assessments
CISO
What steps has your organization taken in order to obtain assurances from
external service providers and vendors that their security meets standards?
32Berkeley Research Group - Cybersecurity Preparedness Benchmark Study
External Service
Providers & VendorsCISO
63%
of organizations have
ensured external
service providers and
vendor contracts
include provisions for
security
33
Governance and Reporting
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
Rate your organization’s cyber security
risk management program
34Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
Risk Management Effectiveness
42%
of organizations
somewhat agree that
cybersecurity risks
are being considered
in business decision
making
7%
of organizations
strongly agree that
cybersecurity risks
are being considered
in business decision
making
Rate your organization’s cyber security
Information Governance capabilities
35Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
Information Governance
Capabilities
56%
of organizations rate
their Information
Governance
capabilities as
‘slightly’ or
‘somewhat effective’
Rate your company’s information security governance maturity level
36Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
IS Governance Maturity
CISO
Rate your company’s IT risk management maturity level
37
IT Risk Management Maturity
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
CISOCISO
Rate your company’s cloud computing maturity level
38
Cloud Computing Maturity
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
57%
of organizations do
not allow use of
public cloud services
39
Does the organization incident response
plan outline regulatory and governmental
notification protocols for breaches?
Regulatory &
Government Reporting
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
57%
of organizations are
required by
regulatory and
government
agencies to disclose
system breaches
40
Breaches and Incidents
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
What type of breaches did your organization experience?
41
Type of
Cybersecurity
Breaches
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
51%
of organizations do not
believe they are well
equipped to handle a
breach
46%
of organizations
report having
experienced a
cybersecurity breach
45%
of organizations
report current
employees as the
most likely source of
cybersecurity breach
incidents
42
What was the estimated source
of data breach incidents?
Sources of Breaches
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
Type of staff-related incidents the organization experienced?
43
Staff-related Incidents
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
44Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
Key Observations
Despite a strong focus on cybersecurity culture, many organizations do
not believe their cybersecurity programs are fully effective
45% of respondents reported that they needed to improve security awareness
and training
Current employees are the likely cause behind most cybersecurity
breaches
Respondents reported that current employees were the likely source of 45% of
data breach incidents, followed by 22% of incidents caused by hackers
and 13% by former employees
Viruses and malicious software are the most common breaches.
Respondents reported that infections from viruses or malicious software
accounted for 39% of all data breaches, followed by system failures or data
corruption accounting for 35% of breaches
45Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
Key Observations
Most organizations do not have strategies for the emerging fields of the
Internet of Things or Big Data
90% of respondents do not have a cybersecurity strategy for the Internet of
Things, and 86% do not have a strategy for Big Data
Organizations lack confidence in their cybersecurity incident response
capability
65% of respondents reported having a formal cyber incident response plan,
and 60% incorporated regulatory and government notification protocols for
breaches. However, when asked if their organization was well equipped to
handle a cyber breach, 51% of respondents were neutral or disagreed
Organizations anticipate an increase in information security budgets
54% of respondents reported that they expected an increase in their 2016
cybersecurity budget. However, 48% of respondents reported they were neutral
or disagreed when asked if leadership allocated adequate budget for
cybersecurity efforts
46Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
Recommendations
• Review and approve the cyber risk appetite and tolerance at board level;
• Ensure the board has sufficient cybersecurity expertise and/or access to such
expertise;
• Build cybersecurity in to all activities and develop enterprise-wide cyber risk
management strategies and procedures;
• Incorporate cybersecurity within business strategy and risk management
frameworks;
• Develop procedures to identify and manage cyber risks associated with
outside vendors, suppliers, customers, utilities, and other external
organizations and service providers;
• Undertake testing to include the potential for multiple attacks and the impact
of interruptions on critical infrastructure;
• Ensure there is a robust cyber resilience and incident response program;
• Pro-actively undertake cyber threat intelligence gathering and ongoing
security analytics;
• Invest in your people to ensure there is high awareness and ownership for
cybersecurity across the organisation.
47
The full study is available at:
http://www.thinkbrg.com/media/publication/828_CSPBS_Report.pdf
Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
Tony Moroney | Managing Director | International Financial Services
Berkeley Research Group, LLC
6 New Street Square, 15th Floor | London, EC4A 3BF
D +44 (0) 20 3597 5167 | M +353 87 2556947 | F +44 (0)20 3808 2784
tmoroney@thinkbrg.com | thinkbrg.com
Faisal Amin | Director | Benchmarking & Strategic Research
Berkeley Research Group, LLC
700 Louisiana Street, Suite 2600 | Houston, TX 77002
D 713.493.2552 | O 713.481.9410 | M 281.788.9573 | F 832.862.2284
famin@thinkbrg.com | thinkbrg.com

More Related Content

What's hot

Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest Keynote
Globus
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee Study
Hiten Sethi
 
The state of incident response
The state of incident responseThe state of incident response
The state of incident response
Abhishek Sood
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance
Accenture Insurance
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
Elliott Franklin
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
William McBorrough
 
2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of Cybercrime
IDG
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & StrategyTony Hauxwell
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security programWilliam Godwin
 
COBIT
COBITCOBIT
Cisco Yıllık Güvenlik Raporu 2015
Cisco Yıllık Güvenlik Raporu 2015Cisco Yıllık Güvenlik Raporu 2015
Cisco Yıllık Güvenlik Raporu 2015
Marketing Türkiye
 
2018 Security Priorities
2018 Security Priorities 2018 Security Priorities
2018 Security Priorities
IDG
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren Li
DaneWarren
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
Scalar Decisions
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primer
EnclaveSecurity
 
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec GroupEXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
Feroot
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
Scalar Decisions
 
Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive era
Luke Farrell
 
Improving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity FrameworkImproving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity Framework
William McBorrough
 

What's hot (20)

Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest Keynote
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee Study
 
The state of incident response
The state of incident responseThe state of incident response
The state of incident response
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of Cybercrime
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
COBIT
COBITCOBIT
COBIT
 
Cisco Yıllık Güvenlik Raporu 2015
Cisco Yıllık Güvenlik Raporu 2015Cisco Yıllık Güvenlik Raporu 2015
Cisco Yıllık Güvenlik Raporu 2015
 
2018 Security Priorities
2018 Security Priorities 2018 Security Priorities
2018 Security Priorities
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren Li
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primer
 
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec GroupEXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive era
 
Improving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity FrameworkImproving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity Framework
 

Viewers also liked

Weak trade
Weak tradeWeak trade
Weak trade
Saxbee Consultants
 
10 IoT Innovators we Follow on Twitter
10 IoT Innovators we Follow on Twitter10 IoT Innovators we Follow on Twitter
10 IoT Innovators we Follow on Twitter
International Finance Corporation
 
Customer Analytics for Financial Services & Insurance
Customer Analytics for Financial Services & InsuranceCustomer Analytics for Financial Services & Insurance
Customer Analytics for Financial Services & Insurance
Clarity Solution Group
 
етапи роботи над проблемою
етапи роботи над проблемоюетапи роботи над проблемою
етапи роботи над проблемою
Юля Яловая
 
MAT101 - BTVN1
MAT101 - BTVN1MAT101 - BTVN1
MAT101 - BTVN1
Yen Dang
 
Different types of mobile apps
Different types of mobile appsDifferent types of mobile apps
Different types of mobile apps
MVM Infotech Co. Ltd.
 
Урок 18 для 3 класу - Веб-сторінки та гіперпосилання
 Урок 18 для 3 класу -  Веб-сторінки та гіперпосилання Урок 18 для 3 класу -  Веб-сторінки та гіперпосилання
Урок 18 для 3 класу - Веб-сторінки та гіперпосилання
VsimPPT
 
RUM AND GIN
RUM AND GINRUM AND GIN
RUM AND GIN
Atmuri Guru Sai Ram
 

Viewers also liked (11)

Weak trade
Weak tradeWeak trade
Weak trade
 
10 IoT Innovators we Follow on Twitter
10 IoT Innovators we Follow on Twitter10 IoT Innovators we Follow on Twitter
10 IoT Innovators we Follow on Twitter
 
Presentasi LSK
Presentasi LSKPresentasi LSK
Presentasi LSK
 
Seegmuller Capstone
Seegmuller CapstoneSeegmuller Capstone
Seegmuller Capstone
 
Our Ideality Concept.PDF
Our Ideality Concept.PDFOur Ideality Concept.PDF
Our Ideality Concept.PDF
 
Customer Analytics for Financial Services & Insurance
Customer Analytics for Financial Services & InsuranceCustomer Analytics for Financial Services & Insurance
Customer Analytics for Financial Services & Insurance
 
етапи роботи над проблемою
етапи роботи над проблемоюетапи роботи над проблемою
етапи роботи над проблемою
 
MAT101 - BTVN1
MAT101 - BTVN1MAT101 - BTVN1
MAT101 - BTVN1
 
Different types of mobile apps
Different types of mobile appsDifferent types of mobile apps
Different types of mobile apps
 
Урок 18 для 3 класу - Веб-сторінки та гіперпосилання
 Урок 18 для 3 класу -  Веб-сторінки та гіперпосилання Урок 18 для 3 класу -  Веб-сторінки та гіперпосилання
Урок 18 для 3 класу - Веб-сторінки та гіперпосилання
 
RUM AND GIN
RUM AND GINRUM AND GIN
RUM AND GIN
 

Similar to Cybersecurity Preparedness Benchmark Study_Webex 27 Ocober 2016

Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Health Catalyst
 
Security Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdfSecurity Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdf
IDG
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
Ramón Gómez de Olea y Bustinza
 
Cyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attentionCyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attention
Ramón Gómez de Olea y Bustinza
 
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, EthiopiaPresentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
Oxford Martin Centre, OII, and Computer Science at the University of Oxford
 
2015 IA survey - Protiviti
2015 IA survey - Protiviti2015 IA survey - Protiviti
2015 IA survey - Protiviti
Simone Luca Giargia
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint Webinar
Lumension
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
SurfWatch Labs
 
Make risk and cybersecurity a boardroom agenda
Make risk and cybersecurity a boardroom agendaMake risk and cybersecurity a boardroom agenda
Make risk and cybersecurity a boardroom agenda
Tata Consultancy Services
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
AbuHanifah59
 
Organizational Security: When People are Involved
Organizational Security: When People are InvolvedOrganizational Security: When People are Involved
Organizational Security: When People are Involved
Social Media Performance Group
 
Multi-vocal Review of security orchestration
Multi-vocal Review of security orchestrationMulti-vocal Review of security orchestration
Multi-vocal Review of security orchestration
Chadni Islam
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
harsh arora
 
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Lancope, Inc.
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
IDG
 
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Government Technology and Services Coalition
 
Information security governance
Information security governanceInformation security governance
Information security governance
Koen Maris
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summarypatmisasi
 
CYBER SECURITY audit course report
CYBER SECURITY audit course reportCYBER SECURITY audit course report
CYBER SECURITY audit course report
PDEA's college of engineering, Pune
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworks
Andréanne Clarke
 

Similar to Cybersecurity Preparedness Benchmark Study_Webex 27 Ocober 2016 (20)

Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor Risk
 
Security Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdfSecurity Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdf
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
 
Cyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attentionCyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attention
 
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, EthiopiaPresentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
 
2015 IA survey - Protiviti
2015 IA survey - Protiviti2015 IA survey - Protiviti
2015 IA survey - Protiviti
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint Webinar
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 
Make risk and cybersecurity a boardroom agenda
Make risk and cybersecurity a boardroom agendaMake risk and cybersecurity a boardroom agenda
Make risk and cybersecurity a boardroom agenda
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
 
Organizational Security: When People are Involved
Organizational Security: When People are InvolvedOrganizational Security: When People are Involved
Organizational Security: When People are Involved
 
Multi-vocal Review of security orchestration
Multi-vocal Review of security orchestrationMulti-vocal Review of security orchestration
Multi-vocal Review of security orchestration
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
 
Information security governance
Information security governanceInformation security governance
Information security governance
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
 
CYBER SECURITY audit course report
CYBER SECURITY audit course reportCYBER SECURITY audit course report
CYBER SECURITY audit course report
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworks
 

More from Tony Moroney

DIGITITIS - EXISTE UMA CURA?
DIGITITIS - EXISTE UMA CURA?DIGITITIS - EXISTE UMA CURA?
DIGITITIS - EXISTE UMA CURA?
Tony Moroney
 
DIGITITIS - ¿HAY UNA CURA?
DIGITITIS - ¿HAY UNA CURA?DIGITITIS - ¿HAY UNA CURA?
DIGITITIS - ¿HAY UNA CURA?
Tony Moroney
 
Culture - Hard to Build, Easy to Destroy, Or
Culture - Hard to Build, Easy to Destroy, OrCulture - Hard to Build, Easy to Destroy, Or
Culture - Hard to Build, Easy to Destroy, OrTony Moroney
 
Mortgage Market Digital Innovation
Mortgage Market Digital InnovationMortgage Market Digital Innovation
Mortgage Market Digital InnovationTony Moroney
 
Key Risk Indicators - Changing the Reference Points
Key Risk Indicators - Changing the Reference PointsKey Risk Indicators - Changing the Reference Points
Key Risk Indicators - Changing the Reference PointsTony Moroney
 
Achieving Income Growth in a Consumer Regulated Environment - May 2016
Achieving Income Growth in a Consumer Regulated Environment - May 2016Achieving Income Growth in a Consumer Regulated Environment - May 2016
Achieving Income Growth in a Consumer Regulated Environment - May 2016Tony Moroney
 
Learning lessons from regulation changes in the mortgage market
Learning lessons from regulation changes in the mortgage marketLearning lessons from regulation changes in the mortgage market
Learning lessons from regulation changes in the mortgage marketTony Moroney
 
Credit Risk Issues for Lenders - CML Conference Oct 2013
Credit Risk Issues for Lenders - CML Conference Oct 2013Credit Risk Issues for Lenders - CML Conference Oct 2013
Credit Risk Issues for Lenders - CML Conference Oct 2013Tony Moroney
 
Buy to Let and Let to Buy Misuse - CML Conference_19 June 2013
Buy to Let and Let to Buy Misuse - CML Conference_19 June 2013Buy to Let and Let to Buy Misuse - CML Conference_19 June 2013
Buy to Let and Let to Buy Misuse - CML Conference_19 June 2013Tony Moroney
 
Managing Mortgage Arrears - Insights from the USA
Managing Mortgage Arrears - Insights from the USAManaging Mortgage Arrears - Insights from the USA
Managing Mortgage Arrears - Insights from the USATony Moroney
 
Managing Conduct and Behavioural Risk
Managing Conduct and Behavioural RiskManaging Conduct and Behavioural Risk
Managing Conduct and Behavioural RiskTony Moroney
 
The future of mortgage regulation
The future of mortgage regulation   The future of mortgage regulation
The future of mortgage regulation
Tony Moroney
 
Managing conduct and behavioural risk
Managing conduct and behavioural riskManaging conduct and behavioural risk
Managing conduct and behavioural risk
Tony Moroney
 

More from Tony Moroney (13)

DIGITITIS - EXISTE UMA CURA?
DIGITITIS - EXISTE UMA CURA?DIGITITIS - EXISTE UMA CURA?
DIGITITIS - EXISTE UMA CURA?
 
DIGITITIS - ¿HAY UNA CURA?
DIGITITIS - ¿HAY UNA CURA?DIGITITIS - ¿HAY UNA CURA?
DIGITITIS - ¿HAY UNA CURA?
 
Culture - Hard to Build, Easy to Destroy, Or
Culture - Hard to Build, Easy to Destroy, OrCulture - Hard to Build, Easy to Destroy, Or
Culture - Hard to Build, Easy to Destroy, Or
 
Mortgage Market Digital Innovation
Mortgage Market Digital InnovationMortgage Market Digital Innovation
Mortgage Market Digital Innovation
 
Key Risk Indicators - Changing the Reference Points
Key Risk Indicators - Changing the Reference PointsKey Risk Indicators - Changing the Reference Points
Key Risk Indicators - Changing the Reference Points
 
Achieving Income Growth in a Consumer Regulated Environment - May 2016
Achieving Income Growth in a Consumer Regulated Environment - May 2016Achieving Income Growth in a Consumer Regulated Environment - May 2016
Achieving Income Growth in a Consumer Regulated Environment - May 2016
 
Learning lessons from regulation changes in the mortgage market
Learning lessons from regulation changes in the mortgage marketLearning lessons from regulation changes in the mortgage market
Learning lessons from regulation changes in the mortgage market
 
Credit Risk Issues for Lenders - CML Conference Oct 2013
Credit Risk Issues for Lenders - CML Conference Oct 2013Credit Risk Issues for Lenders - CML Conference Oct 2013
Credit Risk Issues for Lenders - CML Conference Oct 2013
 
Buy to Let and Let to Buy Misuse - CML Conference_19 June 2013
Buy to Let and Let to Buy Misuse - CML Conference_19 June 2013Buy to Let and Let to Buy Misuse - CML Conference_19 June 2013
Buy to Let and Let to Buy Misuse - CML Conference_19 June 2013
 
Managing Mortgage Arrears - Insights from the USA
Managing Mortgage Arrears - Insights from the USAManaging Mortgage Arrears - Insights from the USA
Managing Mortgage Arrears - Insights from the USA
 
Managing Conduct and Behavioural Risk
Managing Conduct and Behavioural RiskManaging Conduct and Behavioural Risk
Managing Conduct and Behavioural Risk
 
The future of mortgage regulation
The future of mortgage regulation   The future of mortgage regulation
The future of mortgage regulation
 
Managing conduct and behavioural risk
Managing conduct and behavioural riskManaging conduct and behavioural risk
Managing conduct and behavioural risk
 

Cybersecurity Preparedness Benchmark Study_Webex 27 Ocober 2016

  • 2. 2Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study National Cybersecurity Awareness Month (NCSAM) • This October is the 13th annual National Cyber Security Awareness Month • As the month comes to a close we hope you will continue to promote a safer, more secure and more trusted internet all year long • BRG is a proud NCSAM Champion and we encourage everyone to support the 6th anniversary of STOP. THINK. CONNECT.™ NCSAM initiative • More information can be found @ https://staysafeonline.org/
  • 3. 3Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study BRG Overview Over 1,000 professionals in 37 offices
  • 4. 4Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study Study Background Why the need for cybersecurity benchmarking? • Financial and non-financial consequences of a successful cyber attack • Governance and Technology • Gain understanding how other peers implement Information Security • Study results from two different points of view: – overall results across all participants to provide a thorough and balanced view of the current state of Cybersecurity – an individual assessment for each participant where individual answers are discussed and compared against other study respondents
  • 5. 5 Study Background Target group: Executive Management and Board of Directors from different sectors Survey: 103 Questions, approximately 60 minutes. Online questionnaire; select phone interviews Timeline: Q1 and Q2 2016 Results: Q3 2016 Participants received: Anonymized evaluation of participant data including indication of their individual answers Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
  • 6. 6 Objectives Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
  • 7. 7 Country of Origin Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
  • 8. 8 Study Participants Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study Primary Industry of Organization Title or Level in Organization Total Employees with Average FTE IT Employees
  • 9. 9 Strategic Insights Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
  • 10. 10 Who does the CISO/CSO report to? Growing Importance of CISO Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study 54% of organizations report an Information Security Officer is in place
  • 11. 11 How would you rate your organization’s information security culture? Security Culture Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study CISO 73% of organizations have a formal cybersecurity training and awareness program
  • 12. 12 Rate the effectiveness of your organization’s cyber security program Cybersecurity Effectiveness Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study CISO 80% of organizations report that senior managers approach information security as an enterprise risk-management issue
  • 13. 13 How would you rate your organization’s cyber security incident response capabilities? Incident Response Capability Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study CISO 60% of organizations inform governments and regulators of cybersecurity breaches
  • 14. 14 What strategic initiatives has your organization adopted in its security program? Strategic Initiatives Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study 90% of organizations do not have a cybersecurity strategy for the Internet of Things
  • 15. 15 Board and Executive Leadership Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
  • 16. 16 Areas in which the Board of Directors actively participate: Board Engagement Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study CISO 55% of organizations report that the Board of Directors actively participate in overall cybersecurity strategy
  • 17. 17 Areas board participation has helped improve your organization’s information security program: Board Influence Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
  • 18. 18 How does the board oversee cyber security-related issues? Board Oversight Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
  • 19. 19 How would you rate the organizational leadership support for cybersecurity? Rate senior management focus on information security Leadership Support & Focus Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
  • 20. 20 How do you measure the effectiveness of the organization’s cyber security program? Feedback Mechanisms Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study 69% of organizations rely on auditors, both internal and external as a measure of their cybersecurity effectiveness
  • 21. 21 Managing Security Risk Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
  • 22. 22 Has your organization performed a cyber risk appetite assessment? Has your organization performed a cyber threat assessment? Cybersecurity Risk Assessments Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study CISO CISO 47% of organizations do not believe that leadership has a functional understanding of their network security
  • 23. Are there formal security and operational procedures documented? 23 Documented Procedures Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study 91% of organizations document their cybersecurity policies and procedures
  • 24. 24 Areas for improvement and awareness programs? Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study Improvement & Awareness
  • 25. 25 How often does executive management receive periodical briefings on the state of your organization’s network security system? Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study Executive Briefings 30% of executive management receive a briefing once every six months or less
  • 26. 26 Systems and Controls Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
  • 27. Which information security standard and best practice does your organization follow? 27Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study Security Standards 37% of organizations used ISO27001, with financial services at 43%
  • 28. Security controls and business continuity plans are tested on a regular basis? 28Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study Controls Testing
  • 29. How often are the security controls of the enterprise systems and interconnected systems reviewed? 29Berkeley Research Group - Cybersecurity Preparedness Benchmark Study System Reviews 24% of organizations do not routinely test security controls and business continuity plans on a regular basis
  • 30. How often are self-assessments conducted? 30Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study Self-assessments 30% of organizations do not routinely undertake self- assessments CISO
  • 31. How often are external security assessments conducted? 31Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study External Assessments CISO
  • 32. What steps has your organization taken in order to obtain assurances from external service providers and vendors that their security meets standards? 32Berkeley Research Group - Cybersecurity Preparedness Benchmark Study External Service Providers & VendorsCISO 63% of organizations have ensured external service providers and vendor contracts include provisions for security
  • 33. 33 Governance and Reporting Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
  • 34. Rate your organization’s cyber security risk management program 34Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study Risk Management Effectiveness 42% of organizations somewhat agree that cybersecurity risks are being considered in business decision making 7% of organizations strongly agree that cybersecurity risks are being considered in business decision making
  • 35. Rate your organization’s cyber security Information Governance capabilities 35Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study Information Governance Capabilities 56% of organizations rate their Information Governance capabilities as ‘slightly’ or ‘somewhat effective’
  • 36. Rate your company’s information security governance maturity level 36Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study IS Governance Maturity CISO
  • 37. Rate your company’s IT risk management maturity level 37 IT Risk Management Maturity Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study CISOCISO
  • 38. Rate your company’s cloud computing maturity level 38 Cloud Computing Maturity Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study 57% of organizations do not allow use of public cloud services
  • 39. 39 Does the organization incident response plan outline regulatory and governmental notification protocols for breaches? Regulatory & Government Reporting Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study 57% of organizations are required by regulatory and government agencies to disclose system breaches
  • 40. 40 Breaches and Incidents Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
  • 41. What type of breaches did your organization experience? 41 Type of Cybersecurity Breaches Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study 51% of organizations do not believe they are well equipped to handle a breach 46% of organizations report having experienced a cybersecurity breach
  • 42. 45% of organizations report current employees as the most likely source of cybersecurity breach incidents 42 What was the estimated source of data breach incidents? Sources of Breaches Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
  • 43. Type of staff-related incidents the organization experienced? 43 Staff-related Incidents Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study
  • 44. 44Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study Key Observations Despite a strong focus on cybersecurity culture, many organizations do not believe their cybersecurity programs are fully effective 45% of respondents reported that they needed to improve security awareness and training Current employees are the likely cause behind most cybersecurity breaches Respondents reported that current employees were the likely source of 45% of data breach incidents, followed by 22% of incidents caused by hackers and 13% by former employees Viruses and malicious software are the most common breaches. Respondents reported that infections from viruses or malicious software accounted for 39% of all data breaches, followed by system failures or data corruption accounting for 35% of breaches
  • 45. 45Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study Key Observations Most organizations do not have strategies for the emerging fields of the Internet of Things or Big Data 90% of respondents do not have a cybersecurity strategy for the Internet of Things, and 86% do not have a strategy for Big Data Organizations lack confidence in their cybersecurity incident response capability 65% of respondents reported having a formal cyber incident response plan, and 60% incorporated regulatory and government notification protocols for breaches. However, when asked if their organization was well equipped to handle a cyber breach, 51% of respondents were neutral or disagreed Organizations anticipate an increase in information security budgets 54% of respondents reported that they expected an increase in their 2016 cybersecurity budget. However, 48% of respondents reported they were neutral or disagreed when asked if leadership allocated adequate budget for cybersecurity efforts
  • 46. 46Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study Recommendations • Review and approve the cyber risk appetite and tolerance at board level; • Ensure the board has sufficient cybersecurity expertise and/or access to such expertise; • Build cybersecurity in to all activities and develop enterprise-wide cyber risk management strategies and procedures; • Incorporate cybersecurity within business strategy and risk management frameworks; • Develop procedures to identify and manage cyber risks associated with outside vendors, suppliers, customers, utilities, and other external organizations and service providers; • Undertake testing to include the potential for multiple attacks and the impact of interruptions on critical infrastructure; • Ensure there is a robust cyber resilience and incident response program; • Pro-actively undertake cyber threat intelligence gathering and ongoing security analytics; • Invest in your people to ensure there is high awareness and ownership for cybersecurity across the organisation.
  • 47. 47 The full study is available at: http://www.thinkbrg.com/media/publication/828_CSPBS_Report.pdf Berkeley Research Group - Cybersecurity Preparedness Benchmarking Study Tony Moroney | Managing Director | International Financial Services Berkeley Research Group, LLC 6 New Street Square, 15th Floor | London, EC4A 3BF D +44 (0) 20 3597 5167 | M +353 87 2556947 | F +44 (0)20 3808 2784 tmoroney@thinkbrg.com | thinkbrg.com Faisal Amin | Director | Benchmarking & Strategic Research Berkeley Research Group, LLC 700 Louisiana Street, Suite 2600 | Houston, TX 77002 D 713.493.2552 | O 713.481.9410 | M 281.788.9573 | F 832.862.2284 famin@thinkbrg.com | thinkbrg.com