What are IT pros most concerned about heading into 2013? The annual State of the Endpoint Report sponsored by Lumension and conducted by Ponemon Institute reveals APTs and mobile devices pose the biggest security threat to organizations in the coming year. Unfortunately, respondents also demonstrated a disconnect between their identified risk and planned security spend as well as a significant need for improved internal collaboration.
This presentation by Larry Ponemon of the Ponemon Institute and Paul Zimski of Lumension reveals statistics on growing insecurity, IT’s perceived areas of greatest risk for 2013 as well as tactical suggestions for how to improve your endpoint security. Specifically, you will learn:
•IT perspective on today’s Top 3 risks;
•Disconnect between perceived risk and corresponding strategies to combat those threats;
•Tips and tricks on how to best communicate today’s threats and subsequent needed responses up the management chain
The CTO Survey was conducted by Spinverse Ltd. and covers Finnish CTOs’ views on the current innovation environment and its future outlook.
The survey was supported by EK, Sitra and Technology Academy Finland.
The CTO Survey was conducted by Spinverse Ltd. and covers Finnish CTOs’ views on the current innovation environment and its future outlook.
The survey was supported by EK, Sitra and Technology Academy Finland.
Raphael Simon, Sr. Systems Architect at RightScale, led this session at the RightScale User Conference 2010 in Santa Clara.
Session Abstract: Using RightScale's ServerTemplates, it is now possible to define and manage cloud deployments that implement an entire Windows software stack. Such deployments can be automated with monitoring, alerts and auto-scaling to reap all the usual cloud benefits. This session will give you insight into how Windows instances can be dynamically configured using the RightScale Platform and make you better equipped to move your Windows applications to the cloud. We will show how ServerTemplates work with Windows, how to use PowerShell to configure services, and generally discuss the Windows boot and configuration process. The session will also cover challenges that are unique to the Windows platform such as licensing and system updates.
Rafael Saavedra, VP Engineering at RightScale, led this session at the RightScale User Conference 2010 in Santa Clara.
Session Abstract: Just like our customers, RightScale runs in the cloud and requires the best platform to automate operations. As such, RightScale uses RightScale to manage RightScale. Our complete infrastructure – development, testing, staging, and production – consists of servers that are configured, launched and managed by the RightScale Platform. In this talk, we'll present insights into how our different systems are set up and managed through the RightScale dashboard, how we organize the different production deployments, how we roll out major and minor upgrades to our infrastructure, and what best practices we follow during normal and emergency operations.
Cloud Orchestration with RightScale Cloud WorkflowRightScale
Cloud orchestration tools let you automate both provisioning and ongoing operations for your cloud-based applications across all the cloud providers you use. We show you how RightScale Cloud Workflow provides the fine-grained control needed to meet real-world orchestration requirements.
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012Lumension
Review this presentation as we reveal statistics from the 2012 State of the Endpoint survey, sponsored by Lumension® and conducted by Ponemon Institute. Find out about today's growing insecurity, IT's perceived areas of greatest risk for 2012, and the disconnect between risk and planned security strategies. In addition, we will examine the evolving IT risk environment and recommendations to more effectively and cost-efficiently secure your endpoints.
* How organizations are creating a perfect storm for hackers
* The Top 3 new threats to the workplace
* Perceived risks and corresponding strategies to combat today's evolving endpoint environment
Find out about our reliance on productivity tools, but how inadequate collaboration and resource restrictions for security are creating a perfect storm for hackers.
Find out more about past participants...where are they aligned under the corporate umbrella, what their structure is, how many employees they pay, and much more!
The report is based on the survey conducted among attendees of the 2nd annual conference “Enterprise Mobility Day” which was held on October 11th, 2012 by the Center for Enterprise Mobility of I.T.Co and the Russian Union of CIO (SoDIT)
Symantec 2011 Information Retention and eDiscovery Survey Global Key FindingsSymantec
Symantec’s 2011 Information Retention and eDiscovery Survey examines how enterprises manage their ever-growing volumes of electronically stored information and prepare for the eventuality of an eDiscovery request. The survey of legal and IT personnel at 2,000 enterprises worldwide found email is not the primary source of records companies must produce, and more importantly, respondents who employ best practices for records and information management are significantly less at risk of court sanctions or fines.
Taking Services Procurement Beyond Contingent Workers: Opportunities And Chal...Beeline
Andrew Bartels
Principal Analyst, Forrester
Companies who have been using vendor management services (VMS) software for their purchases of contractors and contingent workers are waking up to their opportunities for using similar software for their purchases of other categories of services. Those opportunities are large, with the potential for significant reductions in process costs for buying and managing these servicers, reductions in the cost of these services, and improvements in the performance of suppliers. But the challenges are equally great. Certainly, having the right software tools is critical – standard eProcurement tools won't do the job. Equally important, are the internal and external organizational barriers. Control over services spend is fragmented among many internal stakeholders, so adoption of services procurement needs to move department by department. And most services providers are ill-equipped to take advantage of the efficiencies that client use of service procurement tools could bring to them, so different tactics for supplier adoption and pricing models will be needed compared to what is used today with temporary help agencies. Those that can master these challenges will reap the benefits of cost savings and more capable service providersCompanies who have been using vendor management services (VMS) software for their purchases of contractors and contingent workers are waking up to their opportunities for using similar software for their purchases of other categories of services. Those opportunities are large, with the potential for significant reductions in process costs for buying and managing these servicers, reductions in the cost of these services, and improvements in the performance of suppliers. But the challenges are equally great. Certainly, having the right software tools is critical – standard eProcurement tools won't do the job. Equally important, are the internal and external organizational barriers. Control over services spend is fragmented among many internal stakeholders, so adoption of services procurement needs to move department by department. And most services providers are ill-equipped to take advantage of the efficiencies that client use of service procurement tools could bring to them, so different tactics for supplier adoption and pricing models will be needed compared to what is used today with temporary help agencies. Those that can master these challenges will reap the benefits of cost savings and more capable service providers.
Quadric exists to increase the contribution of business to society. We are an international team of analysts, consultants and creative professionals helping companies improve performance while becoming better places to work. Using the Quadric@ framework, we help companies drive volume and pricing, influence future trends, guide innovation and integrate acquisitions more effectively.
In today’s Smarter Consumer and their use of technology (internet, mobile, and social) all industries are struggling to better serve and be more relevant to their customers and potential customers. When done well, businesses can 1) Improve loyalty and grow ‘share of wallet’, 2), True differentiation and competitive advantage as consumer’s ‘trusted advisor', 3) Margin improvement through optimized marketing spend, inventory, labor, etc., 4) Real intelligence vs. ‘paid for search positioning’ like Google
Raphael Simon, Sr. Systems Architect at RightScale, led this session at the RightScale User Conference 2010 in Santa Clara.
Session Abstract: Using RightScale's ServerTemplates, it is now possible to define and manage cloud deployments that implement an entire Windows software stack. Such deployments can be automated with monitoring, alerts and auto-scaling to reap all the usual cloud benefits. This session will give you insight into how Windows instances can be dynamically configured using the RightScale Platform and make you better equipped to move your Windows applications to the cloud. We will show how ServerTemplates work with Windows, how to use PowerShell to configure services, and generally discuss the Windows boot and configuration process. The session will also cover challenges that are unique to the Windows platform such as licensing and system updates.
Rafael Saavedra, VP Engineering at RightScale, led this session at the RightScale User Conference 2010 in Santa Clara.
Session Abstract: Just like our customers, RightScale runs in the cloud and requires the best platform to automate operations. As such, RightScale uses RightScale to manage RightScale. Our complete infrastructure – development, testing, staging, and production – consists of servers that are configured, launched and managed by the RightScale Platform. In this talk, we'll present insights into how our different systems are set up and managed through the RightScale dashboard, how we organize the different production deployments, how we roll out major and minor upgrades to our infrastructure, and what best practices we follow during normal and emergency operations.
Cloud Orchestration with RightScale Cloud WorkflowRightScale
Cloud orchestration tools let you automate both provisioning and ongoing operations for your cloud-based applications across all the cloud providers you use. We show you how RightScale Cloud Workflow provides the fine-grained control needed to meet real-world orchestration requirements.
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012Lumension
Review this presentation as we reveal statistics from the 2012 State of the Endpoint survey, sponsored by Lumension® and conducted by Ponemon Institute. Find out about today's growing insecurity, IT's perceived areas of greatest risk for 2012, and the disconnect between risk and planned security strategies. In addition, we will examine the evolving IT risk environment and recommendations to more effectively and cost-efficiently secure your endpoints.
* How organizations are creating a perfect storm for hackers
* The Top 3 new threats to the workplace
* Perceived risks and corresponding strategies to combat today's evolving endpoint environment
Find out about our reliance on productivity tools, but how inadequate collaboration and resource restrictions for security are creating a perfect storm for hackers.
Find out more about past participants...where are they aligned under the corporate umbrella, what their structure is, how many employees they pay, and much more!
The report is based on the survey conducted among attendees of the 2nd annual conference “Enterprise Mobility Day” which was held on October 11th, 2012 by the Center for Enterprise Mobility of I.T.Co and the Russian Union of CIO (SoDIT)
Symantec 2011 Information Retention and eDiscovery Survey Global Key FindingsSymantec
Symantec’s 2011 Information Retention and eDiscovery Survey examines how enterprises manage their ever-growing volumes of electronically stored information and prepare for the eventuality of an eDiscovery request. The survey of legal and IT personnel at 2,000 enterprises worldwide found email is not the primary source of records companies must produce, and more importantly, respondents who employ best practices for records and information management are significantly less at risk of court sanctions or fines.
Taking Services Procurement Beyond Contingent Workers: Opportunities And Chal...Beeline
Andrew Bartels
Principal Analyst, Forrester
Companies who have been using vendor management services (VMS) software for their purchases of contractors and contingent workers are waking up to their opportunities for using similar software for their purchases of other categories of services. Those opportunities are large, with the potential for significant reductions in process costs for buying and managing these servicers, reductions in the cost of these services, and improvements in the performance of suppliers. But the challenges are equally great. Certainly, having the right software tools is critical – standard eProcurement tools won't do the job. Equally important, are the internal and external organizational barriers. Control over services spend is fragmented among many internal stakeholders, so adoption of services procurement needs to move department by department. And most services providers are ill-equipped to take advantage of the efficiencies that client use of service procurement tools could bring to them, so different tactics for supplier adoption and pricing models will be needed compared to what is used today with temporary help agencies. Those that can master these challenges will reap the benefits of cost savings and more capable service providersCompanies who have been using vendor management services (VMS) software for their purchases of contractors and contingent workers are waking up to their opportunities for using similar software for their purchases of other categories of services. Those opportunities are large, with the potential for significant reductions in process costs for buying and managing these servicers, reductions in the cost of these services, and improvements in the performance of suppliers. But the challenges are equally great. Certainly, having the right software tools is critical – standard eProcurement tools won't do the job. Equally important, are the internal and external organizational barriers. Control over services spend is fragmented among many internal stakeholders, so adoption of services procurement needs to move department by department. And most services providers are ill-equipped to take advantage of the efficiencies that client use of service procurement tools could bring to them, so different tactics for supplier adoption and pricing models will be needed compared to what is used today with temporary help agencies. Those that can master these challenges will reap the benefits of cost savings and more capable service providers.
Quadric exists to increase the contribution of business to society. We are an international team of analysts, consultants and creative professionals helping companies improve performance while becoming better places to work. Using the Quadric@ framework, we help companies drive volume and pricing, influence future trends, guide innovation and integrate acquisitions more effectively.
In today’s Smarter Consumer and their use of technology (internet, mobile, and social) all industries are struggling to better serve and be more relevant to their customers and potential customers. When done well, businesses can 1) Improve loyalty and grow ‘share of wallet’, 2), True differentiation and competitive advantage as consumer’s ‘trusted advisor', 3) Margin improvement through optimized marketing spend, inventory, labor, etc., 4) Real intelligence vs. ‘paid for search positioning’ like Google
2012 SMB Disaster Preparedness Survey Global Results May 2012Symantec
The Symantec 2012 SMB Disaster Preparedness Survey discovered that disaster preparedness is closely connected with small- and mid-sized businesses’ (SMBs) adoption of technologies like virtualization, cloud computing, and mobility. The survey also revealed how willing SMBs are to adopt these technologies, often with improved disaster preparedness as a goal, and how the move is paying off for them.
The Lloyd\'s Risk Index, based on a survey of over 500 global business leaders shows a disparity between actual events and their ability to deal with risk. In a year of unprecedented economic and political turmoil are businesses prepared for the risks they face - or do they just think they are?
Similar to Greatest IT Security Risks of 2013: Annual State of the Endpoint Report (20)
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsLumension
Today, everything has to be patched. From desktop and laptop to server and every operating system in between. With compliance, what we have to pay attention to is what’s actually out there on our network – not just what you wish were there.
Servers (Windows, UNIX and Linux)Even Windows-centric environments have at least a few UNIX or Linux servers that need to be secure and patched. Linux and UNIX servers often fulfill critical functions with few and short maintenance windows. These can be a real pain point for admins who specialize in Windows or are managed by an entirely different admin.
Desktops (Windows and Macs)Maybe you are responsible for desktops instead of servers. Again it’s not just a Windows story any more. More and more people are opting for Macs instead of Windows. Watch the vulnerability lists and you’ll see that Macs need patching too.
The kicker though is the 80/20 rule. If at least 80% of the computers on your network are Windows and the remaining 20% are everything else – it’s a safe bet, given the maturity and ease of WSUS, that 20% of your patching effort goes to Windows but 80% of your effort is consumed with patching all the different flavors of UNIX, Linux and your Mac computers. We need one system to manage all our patches and one pane of glass to prove compliance from data center to desktop.
Believe it or not System Center 2012 R2 provides the infrastructure to do just that – it just needs a little help. Last time we showed you how you can patch 3rd party apps on Windows through System Center Update Manager. This time we’ll show you how you can patch non-Windows systems using the new System Center clients for UNIX, Linux and Mac.
2015 Endpoint and Mobile Security Buyers GuideLumension
Mike Rothman, Analyst and President of Securosis, as he dives into an interactive discussion around endpoint security management in 2015.
• Protecting Endpoints: How the attack surface has changed, and the impact to your defense strategy
• Anti-Malware: The best ways to deal with today’s malware and effectively protect your endpoints from attack
• Endpoint Hygiene: Why you can’t forget the importance of ensuring solid management of your endpoint devices
• BYOD and Mobility: The extent that corporate data on smart mobile devices impacts your organization
• The Most Important Buying Considerations in 2015
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationLumension
Security expert Randy Franklin Smith from Ultimate Windows Security, shows you a technical and pragmatic approach to mobile security for iOS and Android. For instance, for iOS-based devices, he talks about:
• System security
• Encryption and data protection
• App Security
• Device controls
Randy also discusses Android-based devices. While Android gets its kernel from Linux, it builds on Linux security in a very specialized way to isolate applications from each other. And learn about iOS and Android mobile device management needs: Password and remote wipe capabilities are obvious but there’s much more to the story. And you’ll hear Randy's list of top-10 things you need to secure and manage on mobile devices in order to protect access to your organization’s network and information.
2014 BYOD and Mobile Security Survey Preliminary ResultsLumension
The preliminary results are in - hear what more than 1,000 members of the Linkedin Infosec Community have to say about BYOD and mobile security challenges including what they are doing to combat mobile device risk and what solutions and security practices really work.
Securing Your Point of Sale Systems: Stopping Malware and Data TheftLumension
Point of Sale (POS) systems have long been the target of financially-motivated crime. And in 2013 the magnitude of cybercrime against POS systems skyrocketed, with 97% of breaches in the retail sector and 47% in the healthcare sector aimed against POS systems. With sensitive financial and personal records getting exposed by the millions, the FBI recently warned that POS systems are under sustained and continued attack.
During this webcast, we will take you into the three critical entry points to POS system attacks. We’ll discuss how the attacks look, the timelines for these breaches, and what proactive security measures you can take to help your organization minimize the risk to your POS systems.
•3 Critical Entry Points to POS System Attacks
•Impacts to an Organization
•Top 3 Security Measures to Minimize Risk
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...Lumension
Thanks to you, the audience at UltimateWindowsSecurity, for the 2014 Survey. It was a great success with over 600 respondents! I appreciate all of you who took the time give me your thoughts.
You’ve provided some great ideas for real training for free™ in the coming year and I’ve learned which topics are most important to you. That’s going to benefit all of us.
In this presentation, we'll present our findings. We’ll talk about the community’s top goals for 2014, which topics you recommended I cover in 2014 and what our community sees as the greatest security concerns for 2014. And we’ll discuss other trends emerging from the data.
Find out about the top trends, such as:
SIEM – What are the top SIEM solutions? What is the UWS community’s top 3 biggest challenges with log/monitoring/security analytics?
Endpoint Security – How widely is application whitelisting being used and what is driving its adoption? Which endpoint security technologies really work and which are just hype?
Mobile Devices – Are employee owned mobile devices supported at your organization? Is your biggest concern with mobile devices malware, data loss, compliance?
The Cloud – How widely are your peers embracing the cloud? Is your organization’s security policy, technology and training keeping up with the move to the cloud?
Advanced Security Topics – What are your peers doing about “big data”? What about endpoints as sensors, and other new security approaches?
This will be a fact-filled and fascinating presentation on where we are and where we are going on a host of different security fronts. Don’t miss it.
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskLumension
Organizations around the world are losing intellectual property and customer data to cyber criminals at mind-boggling rates. How is this happening?
For 5 consecutive years, the annual State of the Endpoint Report, conducted by Ponemon Institute, has surveyed IT practitioners involved in securing endpoints. This year’s report reveals endpoint security risk is more difficult to minimize than ever before. What are IT pros most concerned about heading into 2014? From the proliferation of mobile devices, third party applications, and targeted attacks/APTs, endpoint security risk for 2014 is becoming more of a challenge to manage.
Larry Ponemon of the Ponemon Institute reveals statistics on growing insecurity, IT’s perceived areas of greatest risk for 2014 as well as tactical suggestions for how to improve your endpoint security. Specifically, you will learn:
•IT perspective on the changing threat landscape and today’s Top 5 risks;
•Disconnect between perceived risk and corresponding strategies to combat those threats;
•Tips and tricks on how to best communicate today’s threats and subsequent needed responses up the management chain
Adobe Hacked Again: What Does It Mean for You? Lumension
Last time it was Adobe’s code signing servers. This time it’s 2.9 million (let’s just call it 3) customers’ data and lots and lots of source code – including that of Acrobat. Adobe products already require constant patching but offer no enterprise level solution for patching. In this presentation by Ultimate Windows Security, we’ll present why this will likely lead to more and we’ll look at what we know about this latest Adobe breach.
But more importantly I’ll show what you can do in advance to protect yourself against zero-day exploits in Adobe products and programs. After all this won’t be the last time a software vendor is hacked. In this day and age we have to protect ourselves from the failures of our software providers.
I’ll present 3 ways you can go on the offensive to protect yourself from the constant vulnerabilities discovered in Adobe Reader, Acrobat, Flash and Oracle Java. Here’s what we’ll discuss:
*Alternatives to Adobe and Java
*Different ways to containing vulnerable apps in a sandbox
* Using advanced memory protection technologies to detect and stop buffer overflows and other memory based attacks
Patching and AV only helps you close the window on hacker opportunity. To prevent the window from opening in the first place you have to prevent untrusted code from ever running in the first place. That requires application whitelisting and memory protection against code injection – a growing menace that bypasses controls based on file system and EXE scanning.
That’s why Lumension is sponsoring this event. I think you’ll be interested seeing 2 of their end-point security technologies that will help protect you from the new exploits on their way as a result of this hack as well as the constant stream of exploits discovered every day.
This is going to be a really cool presentation with practical tips that you can apply. Learn how to protect your systems from other software vendor vulnerabilities.
Data Protection Rules are Changing: What Can You Do to Prepare?Lumension
The European Union’s proposed new data protection regulation aims to update Europe’s data protection laws and to provide a more consistent data protection framework across the Continent.
But the new regulation, which replaces the EU’s existing data protection directive and member states’ data protection laws, will put some new demands on organisations holding personal data. Breach disclosure and “the right to be forgotten” will force businesses to update their data protection and retention policies.
This presentation will:
- Review the current EU laws, and contrast them with laws in other parts of the world;
- Examine the arguments for strengthening data protection in Europe, and the likely outcomes;
- Look at what security teams should already be doing to put themselves ahead of legislative changes;
- Outline strategies and technologies organisations need to meet current and future data protection requirements
- Help infosecurity teams to explain the changes – and their consequences – to their boards
Java Insecurity: How to Deal with the Constant VulnerabilitiesLumension
Just over a decade ago, the outcry over Microsoft’s security problems reached such a deafening level that it finally got the attention of Bill Gates, who wrote the famous Trustworthy Computing memo. Today, many would say that Microsoft leads the industry in security and vulnerability handling.
Now, it’s Java that’s causing the uproar. But has Oracle learned anything from Microsoft in handling these seemingly ceaseless problems? I’ll start by reviewing the wide-ranging Java security changes Oracle is promising to make. They sound so much like the improvements Microsoft made back with Trustworthy Computing that I’m amazed it hasn’t been done before! We’ll move on to discuss what you can do now to address Java security in your environment.
One of the banes of security with Java is the presence of multiple versions of Java, often on the same computer. Sometimes you really need multiple versions of Java to support applications with version dependencies (crazy, I know). But other times, multiple copies of Java are there “just because.” In this webinar, we’ll talk about the current Java mess and how you can get out of it, including:
Assessment. We’ll discuss ways and tools for cataloging what versions of Java are actually out there on your endpoints.
Identification. We’ll look at methods for identifying which versions are actually required by your users; for instance, I’ll show you how you might use Process Tracking and File Access events in the Windows Security Log to see which Java files are being accessed, by whom, and by which programs.
Disabling. Can you just disable Java? Maybe not for everyone, but what if you could disable it for certain roles within your company that make up 25% – or even 75% – of your workforce? That would be worth it. We’ll explore how you might go about such a measure.
Hardening. We’ll dive into the technical details of hardening Java and reducing your Java attack surface, where possible.
Filtering. Another way to reduce your Java risk is by filtering Java content at your gateway. Again not full coverage control – but what is?
Patching. Then, we’ll delve into the Java patching nightmare. Depending on self-updaters on each endpoint, is could be a recipe for disaster, and I’ll explain why. Basically the only way out of the Java mess is a 3rd party solution that can perform centralized patch management and remediation and that’s where our sponsor, Lumension, will come in.
BYOD & Mobile Security: How to Respond to the Security RisksLumension
Bring Your Own Device (BYOD) is a popular topic in 2013. Trying to understand the security risks and prepare strategies to either adopt, or decide against BYOD for security and data control reasons is the challenge.
The 160,000 member Information Security Community on LinkedIn conducted the survey "BYOD & Mobile Security 2013" to shed some light on the drivers for BYOD, how companies will benefit from BYOD, and how they respond to the security risks associated with this trend. With 1,600 responses, some interesting insights and patterns into BYOD were uncovered.
3 Executive Strategies to Reduce Your IT RiskLumension
Do you want to know how ‘best-of-breed’ enterprises prioritize their IT risk? Join Richard Mason, Vice President & Chief Security Officer at Honeywell, whose team is responsible for global security, during a roundtable discussion with Pat Clawson, Chairman & CEO of Lumension and Roger Grimes, Security Columnist & Author. Uncover strategies beyond traditional antivirus signatures and learn a more holistic approach to effective risk management. Find out ‘how’ and ‘why’ you can make security a prioritized function within your organization.
Join this expert panel webcast to learn how to:
1)Understand your business audiences and evaluate their risk tolerance
2)Leverage reputation management services that are appropriate for your organization
3)Utilize realistic change management to secure prioritized data depositories
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...Lumension
APTs have become a major topic of conversation – and in some cases, a critical threat – among IT security departments. But the technology and motivation behind APTs has changed significantly since the introduction of Stuxnet, continuing to evolve rapidly to avoid detection.
In this special Dark Reading presentation, a leading expert on the origins and directions of APTs will discuss the changing nature of these sophisticated threats – and how you can prepare your enterprise security environment to detect and mitigate these complex and dangerous attacks.
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
1. 2013 State of the Endpoint
Presentation by Dr. Larry Ponemon
December 5, 2012
2. About Ponemon Institute
• Ponemon Institute conducts independent research on cyber security, data
protection and privacy issues.
• Since our founding 11+ years ago our mission has remained constant, which is
to enable organizations in both the private and public sectors to have a clearer
understanding of the practices, enabling technologies and potential threats that
will affect the security, reliability and integrity of information assets and IT
systems.
• Ponemon Institute research informs organizations on how to improve upon their
data protection initiatives and enhance their brand and reputation as a trusted
enterprise.
• In addition to research, Ponemon Institute offers independent assessment and
strategic advisory services on privacy and data protection issues. The Institute
also conducts workshops and training programs.
• The Institute is frequently engaged by leading companies to assess their privacy
and data protection activities in accordance with generally accepted standards
and practices on a global basis.
• The Institute also performs customized benchmark studies to help organizations
identify inherent risk areas and gaps that might otherwise trigger regulatory
action.
12/4/2012 Ponemon Institute: Private & Confidential Information 2
3. Introduction
• Since 2010, Ponemon Institute and Lumension have tracked endpoint risk
in organizations, the resources to address the risk and the technologies
deployed to manage threats.
• This study reveals that the state of endpoint risk is not improving. One of the
top concerns is the proliferation of personally owned mobile devices in the
workplace such as smart phones and iPads.
• Malware attacks are increasing and are having a significant impact on IT
operating expenses. Advanced persistent threats and hactivism pose the
biggest headache to IT security pros.
12/4/2012 Ponemon Institute: Private & Confidential Information 3
4. Methods
A random sampling frame of 17,744 IT and IT security practitioners located in all regions
of the United States were selected as participants to this survey. As shown below, 923
respondents completed the survey. Screening removed 178 surveys and an additional 74
surveys that failed reliability checks were removed. The final sample was 671 surveys
(or a 3.8 percent response rate).
Sample response FY 2012 FY 2011 FY 2010
Total sampling frame 17,744 18,988 11,890
Total returns 923 911 782
Rejected surveys 74 80 65
Screened surveys 178 143 153
Final sample 671 688 564
Response Rate 3.8% 3.6% 4.7%
12/4/2012 Ponemon Institute: Private & Confidential Information 4
5. Distribution of respondents according to
primary industry classification
2%
2% 2%
3% Financial Services
3% 20%
Health & pharmaceuticals
3%
Public Sector
4% Retailing
Services
5% Technology & software
Hospitality
Industrial
5% 12%
Education & research
Energy
5% Consumer products
Communications
Entertainment & media
7% 10% Agriculture
Defense
8% 9% Transportation
12/4/2012 Ponemon Institute: Private & Confidential Information 5
6. What organizational level best describes
your current position?
3% 3%
7% 19%
Director
Manager
Supervisor
Technician
23%
Staff
Contractor
26% Other
19%
12/4/2012 Ponemon Institute: Private & Confidential Information 6
7. The primary person you or the IT
security leader reports to within the
organization
3% 1%
4%
6%
Chief Information Officer
9% Chief Information Security Officer
Chief Risk Officer
Compliance Officer
54%
Chief Security Officer
23% General Counsel
Chief Financial Officer
12/4/2012 Ponemon Institute: Private & Confidential Information 7
8. Worldwide headcount
4% 7%
19%
16% Less than 500 people
500 to 1,000 people
1,001 to 5,000 people
5,001 to 25,000 people
25,001 to 75,000 people
21% More than 75,000 people
33%
12/4/2012 Ponemon Institute: Private & Confidential Information 8
11. IT security risks considered to be on the rise
Three choices permitted in 2010 and 5 choices permitted in 2011 and 2012
73%
Mobile devices 48%
9%
67%
Across 3rd party applications 56%
45%
53%
Mobile/remote employees 49%
44%
45%
Our PC desktop/laptop 41%
44%
44%
Negligent insider risk * 43%
41%
Cloud computing infrastructure & providers 43%
18%
39%
Removable media and/or media (CDs, DVDs) 42%
10%
0% 10% 20% 30% 40% 50% 60% 70% 80%
* This choice was not available for all fiscal years
FY 2012 FY 2011 FY 2010
12/4/2012 Ponemon Institute: Private & Confidential Information 11
12. IT security risks believed to be
decreasing or staying the same
Three choices permitted in 2010 and 5 choices permitted in 2011
and 2012
36%
Lack of organizational alignment * 39%
25%
Lack of system connectivity/visibility * 29%
19%
Virtual computing environments 28%
20%
19%
Our server environment 29%
32%
15%
Malicious insider risk * 16%
10%
Network infrastructure environment 14%
11%
8%
Within operating systems 10%
11%
6%
Our data centers 12%
14%
0% 5% 10% 15% 20% 25% 30% 35% 40% 45%
* This choice was not available for all fiscal years
FY 2012 FY 2011 FY 2010
12/4/2012 Ponemon Institute: Private & Confidential Information 12
13. Is your IT network more secure now
than it was a year ago?
50%
46%
45%
41%
40%
36% 36%
35% 33% 34%
30% 28%
25%
25%
21%
20%
15%
10%
5%
0%
FY 2012 FY 2011 FY 2010
Yes No Unsure
12/4/2012 Ponemon Institute: Private & Confidential Information 13
14. IT security risks of most concern since 2010
More than three choices permitted in 2010 and 3 choices permitted in
2011 and 2012
47%
Increased use of mobile platforms * 36%
36%
Advanced persistent threats 24%
24%
22%
Intrusions and data loss within virtual
23%
environments
13%
0% 10% 20% 30% 40% 50%
* This choice was not available for all fiscal years
FY 2012 FY 2011 FY 2010
12/4/2012 Ponemon Institute: Private & Confidential Information 14
15. IT security risks that have declined or
stayed the same
More than three choices permitted in 2010 and 3 choices
permitted in 2011 and 2012
15%
Negligent insider risk 28%
50%
30%
Growing volume of malware 29%
61%
28%
Use of insecure cloud computing resources 31%
49%
30%
Insufficient budget resources 32%
47%
31%
Increasingly sophisticated & targeted cyber attackers 26%
40%
12%
Malicious insider risk 11%
19%
6%
Inability to measure policy compliance * 12%
Insufficient collaboration among IT & business operations 13%
16%
*
Lack of integration between endpoint operations & 18%
17%
security technologies 20%
12%
Lack of an organizational wide security strategy * 13%
0% 20% 40% 60% 80%
* This choice was not available for all fiscal years
FY 2012 FY 2011 FY 2010*
12/4/2012 Ponemon Institute: Private & Confidential Information 15
17. Mobile devices pose a significant security risk
Strongly agree and agree response combined
90%
80%
80%
74%
70%
60%
50%
40%
30%
20%
10%
0%
FY 2012 FY 2011
12/4/2012 Ponemon Institute: Private & Confidential Information 17
18. Technologies expected to increase in
the next 12 to 24 months
Substantial increase and increase response combined
75%
Mobile devices / smart phones
70%
63%
Use of 3rd party cloud computing infrastructure
56%
61%
Virtualized environments
52%
53%
Use of internal cloud computing infrastructure
35%
Security event and incident management *
45%
Social media / Web 2.0 *
72%
0% 10% 20% 30% 40% 50% 60% 70% 80%
This choice was not available for FY 2012
FY 2012 FY 2011
12/4/2012 Ponemon Institute: Private & Confidential Information 18
19. Important mobile device management
features
Three choices permitted
70%
Provisioning and access policy management
62%
65%
Virus and malware detection or prevention
55%
44%
Encryption and other data loss technologies
49%
43%
Asset tracking
47%
39%
Anti-theft features
42%
38%
Remote wipe capability
41%
1%
Other
3%
0% 10% 20% 30% 40% 50% 60% 70% 80%
FY 2012 FY 2011
12/4/2012 Ponemon Institute: Private & Confidential Information 19
20. Personal mobile device use in the
workplace
40%
35% 34%
30% 29%
28%
25% 23%
20%
20% 18%
16%
15% 13%
10%
7% 7%
5% 3%
2%
0%
None 1 to 25% 26 to 50% 51 to 75% More than 75% Cannot determine
FY 2012 FY 2011
12/4/2012 Ponemon Institute: Private & Confidential Information 20
21. Security policy for employee owned
devices
50%
46%
45%
40% 39%
35%
30% 29%
25%
21% 21%
20% 19%
15% 13% 12%
10%
5%
0%
No No, but we plan to Yes, we secure them Yes, we use stricter
similar to corporate devices standards than we do for
corporate devices
FY 2012 FY 2011
12/4/2012 Ponemon Institute: Private & Confidential Information 21
22. Most vulnerable third-party applications
Three choices permitted
55%
Google Docs 47%
46%
55%
Adobe 50%
54%
44%
Microsoft OS/applications 49%
57%
40%
General 3rd party apps outside of Microsoft 46%
58%
30%
Apple/Mac OS 24%
15%
28%
Apple apps 20%
14%
18%
VMware 20%
17%
15%
Oracle applications 22%
10%
11%
WinZip 16%
19%
3%
Mozilla Firefox 6%
2%
0%
Other 1%
4%
0% 10% 20% 30% 40% 50% 60% 70%
FY 2012 FY 2011 FY 2010
12/4/2012 Ponemon Institute: Private & Confidential Information 22
24. Monthly malware attempts or incidents
50%
45% 43%
40%
35% 35%
35% 32%
30% 27%
25% 23%
21% 20%
20%
15% 13%
11% 11%
10% 9% 9%
6%
5% 2% 3%
0%
Less than 5 5 to 10 11 to 25 26 to 50 More than 50 Not sure
FY 2012 FY 2011 FY 2010
12/4/2012 Ponemon Institute: Private & Confidential Information 24
25. Changes in malware incidents over the
past year
40%
37%
35%
31%
30%
26%
25% 25%
25%
22% 22%
21%
20%
18%
17%
15%
15% 14%
10% 9%
8% 8%
5%
0%
Yes, major increase Yes, but only slight increase No, they stayed the same No, they have decreased Not sure
FY 2012 FY 2011 FY 2010
12/4/2012 Ponemon Institute: Private & Confidential Information 25
26. Most frequent and annoying incidents
More than one choice permitted
General malware 86%
2%
Web-borne malware attacks 79%
3%
Rootkits 65%
4%
Botnet attacks 55%
8%
Advanced persistent threats / Targeted attacks* 54%
25%
Spyware 45%
0%
Clickjacking 43%
7%
Hacktivism 41%
15%
Zero day attacks 31%
13%
SQL injection 29%
12%
Exploit existing software vulnerability < 3 months 28%
5%
Exploitexisting software vulnerability > 3 months 26%
6%
Other 5%
0%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
*Termed Targeted Attacks in the 2011 survey
Which incidents are you seeing frequently in your organization’s IT networks?
Which one incident represents your biggest headache?
12/4/2012 Ponemon Institute: Private & Confidential Information 26
27. IT operating costs increase due to malware
50%
45% 43%
41% 40%
40%
35% 32%
30% 28% 29%
25%
21% 22%
20%
15% 14% 14%
10% 8% 8%
5%
0%
Very significant Significant Some significance None
FY 2012 FY 2011 FY 2010
12/4/2012 Ponemon Institute: Private & Confidential Information 27
29. IT security budget changes from last year
60%
56%
50% 48%
40%
29%
30%
25%
20%
12% 11%
10% 9%
10%
0%
Increase Stay the same Decrease Unsure
FY 2012 FY 2011
12/4/2012 Ponemon Institute: Private & Confidential Information 29
30. Collaboration between IT operations and IT security
60%
50% 48%
46%
41% 40%
40%
30%
20%
13% 12%
10%
0%
Collaboration is excellent Collaboration is adequate, but can Collaboration is poor or non-existent
be improved
FY 2012 FY 2011
12/4/2012 Ponemon Institute: Private & Confidential Information 30
31. Admin privileges allowed
45%
41%
40%
40%
35%
30%
25%
20% 19%
15%
10%
5%
0%
No Yes, to part of the user environment Yes, to the entire user environment
12/4/2012 Ponemon Institute: Private & Confidential Information 31
32. Greatest challenges in meeting federal
compliance regulations
Two choices permitted
Lack of resources 75%
Increasing audit burden 73%
Explaining issues and requirements to management 15%
Inconsistent reporting 11%
Manual data collection 9%
None of the above 12%
0% 10% 20% 30% 40% 50% 60% 70% 80%
12/4/2012 Ponemon Institute: Private & Confidential Information 32
33. Impact of external compliance
requirements on IT security function
Two choices permitted
More personnel and funding for meeting compliance
56%
initiatives
More funding for purchasing security technologies 53%
Better understanding of organizational IT risk 24%
Improved control procedures 20%
Requirements to update or create new policies 12%
Requirements to update or create new training
10%
procedures
Formal audits to ensure policy enforcement 9%
None of the above 13%
0% 10% 20% 30% 40% 50% 60%
12/4/2012 Ponemon Institute: Private & Confidential Information 33
35. Technologies in use or to be invested in
over the next 12 months
More than one choice permitted
60%
55% 55%
49%
50% 47%
45%
42%
40% 38%
34%
30%
20%
10%
0%
Application control firewall Application Endpoint management and SEIM
control/whitelisting security suite
Current use of technology Expected increase in use of technology
12/4/2012 Ponemon Institute: Private & Confidential Information 35
36. Most effective tools for reducing IT risk
Fiscal years 2012 and 2011 limited to 5 choices
46%
Privilege management *
45%
Vulnerability assessment * 55%
70%
40%
Security event and incident management * 43%
40%
Endpoint management & security suites/platforms 41%
48%
39%
Endpoint firewall 43% FY 2012
59%
37% FY 2011
Device control 44%
57% FY 2010
37%
Application control firewall 42%
52%
36%
Application control/whitelisting 37%
44%
33%
Anti-virus & anti-malware 40%
57%
0% 10% 20% 30% 40% 50% 60% 70% 80%
* This choice not available for all fiscal years
12/4/2012 Ponemon Institute: Private & Confidential Information 36
37. Reasons for migrating to Windows 8
Two choices permitted
Efficiency and user productivity gains 43%
Improvements in security 38%
Improvements in speed and performance 37%
Stability of the operating system 33%
Interoperability issues with other systems 31%
Improvements in vendor support 19%
0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50%
12/4/2012 Ponemon Institute: Private & Confidential Information 37
39. The existence and enforcement of cloud
security policies
50%
45%
45%
40% 41%
40%
36%
35%
30%
25% 24%
20%
15% 14%
10%
5%
0%
Yes No Unsure
Does your organization have a centralized cloud security policy?
Do you enforce employees’ use of private clouds?
12/4/2012 Ponemon Institute: Private & Confidential Information 39
40. Conclusion & Recommendations
• Create acceptable use policies for personally owned devices in the
workplace.
• Conduct risk assessments and consider the use of an integrated endpoint
security suite that includes vulnerability assessment, device control, anti-
virus and anti-malware.
• Establish governance practices for privileged users at the device level to
define acceptable use of mobile, BYOD and corporate-owned asset as well
as limit the installation of third-party applications.
• Ensure that policies and procedures clearly state the importance of
protecting sensitive and confidential information stored in the cloud.
• To better address the difficulties in managing the endpoint risk, collaboration
between IT operations and IT security should be improved to achieve a
better allocation of resources and the creation of strategies to address risks
associated with hacktivism, BYOD, third-party applications and cloud
computing.
12/4/2012 Ponemon Institute: Private & Confidential Information 40
41. Caveats
• There are inherent limitations to survey research that need to be carefully considered
before drawing inferences from findings. The following items are specific limitations
that are germane to most web-based surveys.
• Non-response bias: The current findings are based on a sample of survey returns.
We sent surveys to a representative sample of individuals, resulting in a large number
of usable returned responses. Despite non-response tests, it is always possible that
individuals who did not participate are substantially different in terms of underlying
beliefs from those who completed the instrument.
• Sampling-frame bias: The accuracy is based on contact information and the degree
to which the list is representative of individuals who are IT or IT security practitioners.
We also acknowledge that the results may be biased by external events such as
media coverage. We also acknowledge bias caused by compensating subjects to
complete this research within a holdout period.
• Self-reported results: The quality of survey research is based on the integrity of
confidential responses received from subjects. While certain checks and balances
can be incorporated into the survey process, there is always the possibility that a
subject did not provide a truthful response.
12/4/2012 Ponemon Institute: Private & Confidential Information 41
42. Questions?
Ponemon Institute
www.ponemon.org
Tel: 231.938.9900
Toll Free: 800.887.3118
Michigan HQ: 2308 US 31 N. Traverse City, MI 49686 USA
research@ponemon.org