SlideShare a Scribd company logo
1 of 12
Copyright © 2015 Raytheon Company. All rights reserved.
Customer Success Is Our Mission is a registered trademark of Raytheon Company.
Global Megatrends In
Cybersecurity:
A Survey of 1000 CxOs
Michael K. Daly
Chief Technology Officer
Cybersecurity & Special Missions
March 2015
Megatrends in Cybersecurity
Survey
 Who we asked
 1,006 CIOs, CISOs
 Cross section of industries
 North America, Europe, ME/NA
 What we asked about
 Evolving sources of cybersecurity risks
 Intelligence enabled cybersecurity
 Importance of cybersecurity to the business
 Emerging technologies
 Next-generation of organizational practices
 Winning cybersecurity strategies
 Links:
– Report:
http://www.raytheon.com/news/rtnwcm/groups/gallery/documents/content/rtn_233811.pdf
– Infographic:
http://www.raytheon.com/news/rtnwcm/groups/gallery/documents/content/rtn_233812.pdf
Several Interesting Trends and Factors Emerged
4/20/2015 2
Global Megatrend #1
Cybersecurity will become a C-level priority
and a competitive advantage.
Some organizations are leading the way…
But there is a lot of room for improvement.
4/20/2015 3
Don’t overwhelm business leaders – focus on key metrics that get to the heart of
how cybersecurity impacts the business. “Dwell time” is the metric that works for us.
Global Megatrend #2
Cyber crime and Compliance costs will keep CISOs up at night
There will be significant increases in nation state attacks, cyber
warfare/terrorism, and breaches involving high value information.
But, risks from human factors will improve greatly.
4/20/2015 4
For these sophisticated threats, participate in threat information sharing and conduct
your own cyber analytics and intelligence, specific to your business.
Worsened State
Global Megatrend #3
Insider negligence risks are decreasing
With investments in technologies, training programs and visibility into what
employees are doing in the workplace.
4/20/2015 5
The decline in insider negligence should improve the signal-to-noise ratio to better
identify external threats that have gained access to internal resources.
Risk Impact to Organization in 3 Years
Lack of awareness of cybersecurity practices by 26%
Inability to control employees’ devices and apps by 28%
Employee complacency about cybersecurity by 33%
Inability to know what employees are doing in the workplace by 41%
Big shifts in technology towards big data analytics, forensics
and intelligence-based cyber solutions.
Global Megatrend #4
4/20/2015 6
Shifting technology priorities
Anti-virus and anti-malware by 15%
Encryption for data at rest by 27%
Big data analytics and behavioral profiling by 38%
SIEM and cybersecurity intelligence by 19%
Automated forensics tools by 21%
Top Cyber Threats by 2018
1. Zero-day attacks
2. Mobile malware/targeted attacks
3. Cloud data leakage
4. SQL injection
5. Phishing attacks
Big data analytics efforts are underway in government and in research … it is
unclear (to me) that we’ll see effective commercial products in the next three years.
Global Megatrend #5
The “Internet of Things” is here but organizations are slow to
address its security risks.
With consumers embracing more connected devices, information security
leaders predict that the “Internet of Things” will inspire some of the highest
impacting disruptive technologies in the near future.
4/20/2015 7
Organizations prepared for
the “Internet of Things” world
69% not
prepared
Know what devices are being brought into your enterprise, what data is being
collected, and where that data is going.
http://www.dhs.gov/sites/default/files/publications/IoT%20Final%20Draft%20Report%2011-2014.pdf
Global Megatrend #6
The cyber talent gap will persist.
4/20/2015 8
Mentor, coach and encourage youth to consider a career in cybersecurity by
encouraging your staff to connect with their communities.
Organizations that need more
knowledgeable and
experienced information
security employees
66%
Need
More
Source: Raytheon’s 2014 Millennial Survey
Global Megatrend #7
Despite alarming media headlines over the last year,
cybersecurity postures are expected to improve.
Governments are working to strengthen cyber regulations and information sharing,
coupled with investments in advanced and automated technologies. CISOs are
optimistic about their future cyber posture.
4/20/2015 9
Future state of your organization’s
security posture in 3 years
Will
improve
64%
Stay the same
26%
Will decline
10%
Engage with government to access cyber threat information and assessment services.
(http://www.dhs.gov/sites/default/files/publications/DHS%20Industry%20Resources_0.pdf)
A Bit More on Attack Types
Attacks expected to be less
prevalent in the next 3 years:
 Botnet attacks
 Clickjacking
 MacOS malware/targeted attacks
 Compromised trusted partners
 Attacks on industrial control
systems
4/20/2015 10
Attacks expected to be most
prevalent in the next 3 years:
 Zero day attacks
 Cloud data leakage
 Mobile malware/targeted attacks
 SQL injections
 Critical infrastructure attacks
A Bit More on Tool Importance
4/20/2015 11
Tool Today Future Change
Anti-virus/anti-malware 3.62 3.06 -0.56
Database scanning and monitoring 3.46 3.45 -0.01
Forensics (automated tools) 3.42 4.16 0.74
Identity & access management 3.42 3.49 0.07
ID & credentialing system 3.42 3.26 -0.16
Virtual private network (VPN) 3.39 3.24 -0.15
Threat intelligence feeds 3.38 4.01 0.63
Big data analytics 3.38 4.14 0.76
Data loss prevention (DLP) 3.37 2.99 -0.38
Endpoint and mobile device management 3.37 3.17 -0.2
Intrusion detection & prevention 3.36 3.38 0.02
URL or content filtering 3.36 3.31 -0.05
Access governance systems 3.36 3.55 0.19
Sandboxing or isolation tools 3.31 3.92 0.61
Encryption for data in motion 3.31 4.03 0.72
SIEM and cybersecurity intelligence 3.31 4.05 0.74
Perimeter or location surveillance 3.28 3.36 0.08
Next generation firewalls (NGFW) 3.28 3.93 0.65
Incident response tools 3.27 3.27 0
Configuration & log management 3.25 3.11 -0.14
Encryption for data at rest 3.25 4.13 0.88
Web application firewalls (WAF) 3.23 3.86 0.63
Device anti-theft solutions 3.22 3.14 -0.08
Automated policy generation 3.2 3.29 0.09
Tokenization tools 3.2 3.33 0.13
Tools that maybe aren’t
working as well as we
need:
 AV
 DLP
 MDM
Tools to save our futures:
 Encryption
 Big data analytics
 Intelligence (SIEM & feeds)
 Forensics
Recommendations to CISOs
 Engage your Leadership Team and Board of Directors in a cyber dialog focused on
risk to the business
 Communicate key cyber metrics in ways management can understand. Consider
“dwell time” as the primary metric.
 Participate in cyber threat information sharing communities.
 Leverage analytics and automation technologies by focusing on the indicators of
risk in your business.
 Know what devices (IoT and other BYOD) are being brought into your enterprise,
what data is being collected, and where that data is going.
 Mentor, coach and encourage youth to consider a career in cybersecurity by
encouraging your staff to connect with their communities.
 Engage with your government to access cyber threat information, training, and
assessment services.
(http://www.dhs.gov/sites/default/files/publications/DHS%20Industry%20Resources_0.pdf)
4/20/2015 12
Know that cyber security can be your competitive advantage or your failure.

More Related Content

What's hot

What's hot (20)

The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
 
Symantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global Results
 
Building securable infrastructures
Building securable infrastructures  Building securable infrastructures
Building securable infrastructures
 
Plan for the Worst; Fight for the Best
Plan for the Worst; Fight for the BestPlan for the Worst; Fight for the Best
Plan for the Worst; Fight for the Best
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security index
 
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out for
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
 
Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking Apps
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...
 
RSA大会2009-2010分析
RSA大会2009-2010分析RSA大会2009-2010分析
RSA大会2009-2010分析
 
Imperva ppt
Imperva pptImperva ppt
Imperva ppt
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformation
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 

Similar to Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs

What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 

Similar to Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs (20)

Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptx
 
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...
Cybersecurity Tips for Leaders in 2023’s Digital Landscape - Shawn Nutley _ P...
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital Future
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint Webinar
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 

More from Argyle Executive Forum

More from Argyle Executive Forum (20)

Rethink App Delivery with Workspace as a Service
Rethink App Delivery with Workspace as a ServiceRethink App Delivery with Workspace as a Service
Rethink App Delivery with Workspace as a Service
 
Become the CEO: An Employee Excitement Survey
Become the CEO: An Employee Excitement SurveyBecome the CEO: An Employee Excitement Survey
Become the CEO: An Employee Excitement Survey
 
Social Support and Total Community
Social Support and Total CommunitySocial Support and Total Community
Social Support and Total Community
 
Marketing to the Power of ONE!
Marketing to the Power of ONE!Marketing to the Power of ONE!
Marketing to the Power of ONE!
 
The New Era of Engagement Marketing
The New Era of Engagement MarketingThe New Era of Engagement Marketing
The New Era of Engagement Marketing
 
Re-Think App Delivery with Workspace as a Service
Re-Think App Delivery with Workspace as a ServiceRe-Think App Delivery with Workspace as a Service
Re-Think App Delivery with Workspace as a Service
 
Delighting Customers with Information Technology
Delighting Customers with Information TechnologyDelighting Customers with Information Technology
Delighting Customers with Information Technology
 
Top 12 Threats to Enterprise
Top 12 Threats to EnterpriseTop 12 Threats to Enterprise
Top 12 Threats to Enterprise
 
9.35am presentation - john landy
9.35am   presentation - john landy9.35am   presentation - john landy
9.35am presentation - john landy
 
Keeping a Seat at the Table: Remaining Relevant
Keeping a Seat at the Table: Remaining RelevantKeeping a Seat at the Table: Remaining Relevant
Keeping a Seat at the Table: Remaining Relevant
 
Succession Matters: Effective Succession Management Planning
Succession Matters: Effective Succession Management PlanningSuccession Matters: Effective Succession Management Planning
Succession Matters: Effective Succession Management Planning
 
It's a Balancing Act
It's a Balancing ActIt's a Balancing Act
It's a Balancing Act
 
Getting to the Heart of your Customer
Getting to the Heart of your CustomerGetting to the Heart of your Customer
Getting to the Heart of your Customer
 
9.35am robert humphrey
9.35am robert humphrey9.35am robert humphrey
9.35am robert humphrey
 
Cloud Securiy: A Vendor Risk Management Perspective
Cloud Securiy: A Vendor Risk Management PerspectiveCloud Securiy: A Vendor Risk Management Perspective
Cloud Securiy: A Vendor Risk Management Perspective
 
Deliver any app to any device in 60 minutes
Deliver any app to any device in 60 minutesDeliver any app to any device in 60 minutes
Deliver any app to any device in 60 minutes
 
Enabling Opportunity to Transform Company Culture
Enabling Opportunity to Transform Company CultureEnabling Opportunity to Transform Company Culture
Enabling Opportunity to Transform Company Culture
 
The Future of Work
The Future of WorkThe Future of Work
The Future of Work
 
The Challenge of Information Self-Service
The Challenge of Information Self-ServiceThe Challenge of Information Self-Service
The Challenge of Information Self-Service
 
The Role of the General Counsel in the Boardroom
The Role of the General Counsel in the BoardroomThe Role of the General Counsel in the Boardroom
The Role of the General Counsel in the Boardroom
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 

Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs

  • 1. Copyright © 2015 Raytheon Company. All rights reserved. Customer Success Is Our Mission is a registered trademark of Raytheon Company. Global Megatrends In Cybersecurity: A Survey of 1000 CxOs Michael K. Daly Chief Technology Officer Cybersecurity & Special Missions March 2015
  • 2. Megatrends in Cybersecurity Survey  Who we asked  1,006 CIOs, CISOs  Cross section of industries  North America, Europe, ME/NA  What we asked about  Evolving sources of cybersecurity risks  Intelligence enabled cybersecurity  Importance of cybersecurity to the business  Emerging technologies  Next-generation of organizational practices  Winning cybersecurity strategies  Links: – Report: http://www.raytheon.com/news/rtnwcm/groups/gallery/documents/content/rtn_233811.pdf – Infographic: http://www.raytheon.com/news/rtnwcm/groups/gallery/documents/content/rtn_233812.pdf Several Interesting Trends and Factors Emerged 4/20/2015 2
  • 3. Global Megatrend #1 Cybersecurity will become a C-level priority and a competitive advantage. Some organizations are leading the way… But there is a lot of room for improvement. 4/20/2015 3 Don’t overwhelm business leaders – focus on key metrics that get to the heart of how cybersecurity impacts the business. “Dwell time” is the metric that works for us.
  • 4. Global Megatrend #2 Cyber crime and Compliance costs will keep CISOs up at night There will be significant increases in nation state attacks, cyber warfare/terrorism, and breaches involving high value information. But, risks from human factors will improve greatly. 4/20/2015 4 For these sophisticated threats, participate in threat information sharing and conduct your own cyber analytics and intelligence, specific to your business. Worsened State
  • 5. Global Megatrend #3 Insider negligence risks are decreasing With investments in technologies, training programs and visibility into what employees are doing in the workplace. 4/20/2015 5 The decline in insider negligence should improve the signal-to-noise ratio to better identify external threats that have gained access to internal resources. Risk Impact to Organization in 3 Years Lack of awareness of cybersecurity practices by 26% Inability to control employees’ devices and apps by 28% Employee complacency about cybersecurity by 33% Inability to know what employees are doing in the workplace by 41%
  • 6. Big shifts in technology towards big data analytics, forensics and intelligence-based cyber solutions. Global Megatrend #4 4/20/2015 6 Shifting technology priorities Anti-virus and anti-malware by 15% Encryption for data at rest by 27% Big data analytics and behavioral profiling by 38% SIEM and cybersecurity intelligence by 19% Automated forensics tools by 21% Top Cyber Threats by 2018 1. Zero-day attacks 2. Mobile malware/targeted attacks 3. Cloud data leakage 4. SQL injection 5. Phishing attacks Big data analytics efforts are underway in government and in research … it is unclear (to me) that we’ll see effective commercial products in the next three years.
  • 7. Global Megatrend #5 The “Internet of Things” is here but organizations are slow to address its security risks. With consumers embracing more connected devices, information security leaders predict that the “Internet of Things” will inspire some of the highest impacting disruptive technologies in the near future. 4/20/2015 7 Organizations prepared for the “Internet of Things” world 69% not prepared Know what devices are being brought into your enterprise, what data is being collected, and where that data is going. http://www.dhs.gov/sites/default/files/publications/IoT%20Final%20Draft%20Report%2011-2014.pdf
  • 8. Global Megatrend #6 The cyber talent gap will persist. 4/20/2015 8 Mentor, coach and encourage youth to consider a career in cybersecurity by encouraging your staff to connect with their communities. Organizations that need more knowledgeable and experienced information security employees 66% Need More Source: Raytheon’s 2014 Millennial Survey
  • 9. Global Megatrend #7 Despite alarming media headlines over the last year, cybersecurity postures are expected to improve. Governments are working to strengthen cyber regulations and information sharing, coupled with investments in advanced and automated technologies. CISOs are optimistic about their future cyber posture. 4/20/2015 9 Future state of your organization’s security posture in 3 years Will improve 64% Stay the same 26% Will decline 10% Engage with government to access cyber threat information and assessment services. (http://www.dhs.gov/sites/default/files/publications/DHS%20Industry%20Resources_0.pdf)
  • 10. A Bit More on Attack Types Attacks expected to be less prevalent in the next 3 years:  Botnet attacks  Clickjacking  MacOS malware/targeted attacks  Compromised trusted partners  Attacks on industrial control systems 4/20/2015 10 Attacks expected to be most prevalent in the next 3 years:  Zero day attacks  Cloud data leakage  Mobile malware/targeted attacks  SQL injections  Critical infrastructure attacks
  • 11. A Bit More on Tool Importance 4/20/2015 11 Tool Today Future Change Anti-virus/anti-malware 3.62 3.06 -0.56 Database scanning and monitoring 3.46 3.45 -0.01 Forensics (automated tools) 3.42 4.16 0.74 Identity & access management 3.42 3.49 0.07 ID & credentialing system 3.42 3.26 -0.16 Virtual private network (VPN) 3.39 3.24 -0.15 Threat intelligence feeds 3.38 4.01 0.63 Big data analytics 3.38 4.14 0.76 Data loss prevention (DLP) 3.37 2.99 -0.38 Endpoint and mobile device management 3.37 3.17 -0.2 Intrusion detection & prevention 3.36 3.38 0.02 URL or content filtering 3.36 3.31 -0.05 Access governance systems 3.36 3.55 0.19 Sandboxing or isolation tools 3.31 3.92 0.61 Encryption for data in motion 3.31 4.03 0.72 SIEM and cybersecurity intelligence 3.31 4.05 0.74 Perimeter or location surveillance 3.28 3.36 0.08 Next generation firewalls (NGFW) 3.28 3.93 0.65 Incident response tools 3.27 3.27 0 Configuration & log management 3.25 3.11 -0.14 Encryption for data at rest 3.25 4.13 0.88 Web application firewalls (WAF) 3.23 3.86 0.63 Device anti-theft solutions 3.22 3.14 -0.08 Automated policy generation 3.2 3.29 0.09 Tokenization tools 3.2 3.33 0.13 Tools that maybe aren’t working as well as we need:  AV  DLP  MDM Tools to save our futures:  Encryption  Big data analytics  Intelligence (SIEM & feeds)  Forensics
  • 12. Recommendations to CISOs  Engage your Leadership Team and Board of Directors in a cyber dialog focused on risk to the business  Communicate key cyber metrics in ways management can understand. Consider “dwell time” as the primary metric.  Participate in cyber threat information sharing communities.  Leverage analytics and automation technologies by focusing on the indicators of risk in your business.  Know what devices (IoT and other BYOD) are being brought into your enterprise, what data is being collected, and where that data is going.  Mentor, coach and encourage youth to consider a career in cybersecurity by encouraging your staff to connect with their communities.  Engage with your government to access cyber threat information, training, and assessment services. (http://www.dhs.gov/sites/default/files/publications/DHS%20Industry%20Resources_0.pdf) 4/20/2015 12 Know that cyber security can be your competitive advantage or your failure.