SlideShare a Scribd company logo
Privacy & Data Breach Management
   Benchmarks, Informal Survey, Solutions


        Presentation by Dr. Larry Ponemon
        Webinar sponsored by Co3 Systems
               September 13, 2012
Agenda


•     Benchmark Analysis
•     Cost Benchmarks
•     Informal Influencer Survey
•     Market Need For Breach Management Solutions




9/13/2012                    Ponemon Institute: Private & Confidential Information   2
About Ponemon Institute


•    Ponemon Institute conducts independent research on cyber security, data protection
     and privacy issues.
•    Since our founding 11+ years ago our mission has remained constant, which is to
     enable organizations in both the private and public sectors to have a clearer
     understanding of the practices, enabling technologies and potential threats that will
     affect the security, reliability and integrity of information assets and IT systems.
•    Ponemon Institute research informs organizations on how to improve upon their data
     protection initiatives and enhance their brand and reputation as a trusted enterprise.
•    In addition to research, Ponemon Institute offers independent assessment and
     strategic advisory services on privacy and data protection issues. The Institute also
     conducts workshops and training programs.
•    The Institute is frequently engaged by leading companies to assess their privacy and
     data protection activities in accordance with generally accepted standards and
     practices on a global basis.
•    The Institute also performs customized benchmark studies to help organizations
     identify inherent risk areas and gaps that might otherwise trigger regulatory action.




9/13/2012                         Ponemon Institute: Private & Confidential Information       3
Benchmark Analysis
Analysis is based on Ponemon Institute’s 2012 benchmark on corporate privacy management (n=89 companies)
Background

•      Ponemon Institute has conduct detailed benchmark surveys of corporate privacy
       program activities for the past 10 years (starting in January 2003).
•      Ponemon Institute has conducted more than 500+ separate benchmark studies.
•      A total of 89 large, US-based organizations in various industries participated in
       this 2012 study (fieldwork concluding in August).
•      The primary contact in these organizations was the chief security officer, the chief
       information security officer, the chief privacy officer or another individual who has
       overall responsibility for privacy & data protection.
•      All results were gathered by the researcher. All individual and company-
       identifiable information was removed to protect the confidentiality of responding
       organizations.
•      Caveats – Benchmarks provide descriptive information that may not be
       representative of all corporate privacy initiatives.




    9/13/2012                       Ponemon Institute: Private & Confidential Information      5
Industries
A total of 89 companies participated in this 2012 research
Minimum headcount of participating companies is > 1,000

                                                                                         Financial services
                              2% 4%
                         3%                                                              Health & pharma
                                                      21%
                    6%                                                                   Retail
                                                                                         Public sector
               6%
                                                                                         Industrial
                                                                                         Services
              6%
                                                                                         Consumer products
                                                                 12%
               6%                                                                        Technology & software
                                                                                         Transportation

                    7%                                                                   Energy & utilities
                                                       12%
                                                                                         Communications
                         7%
                                      8%                                                 Education & research
                                                                                         Other




9/13/2012                        Ponemon Institute: Private & Confidential Information                           6
Overall Benchmark Score

The benchmark scores for the 2012 sample of 89 companies are presented in a percentage form.
These scores are compiled from a proprietary instrument containing 130 items presented in seven
(7) sections. Each section is weighted equally for purposes of comparison.

70%
                61%
60%
                                                                                          53%
50%                                   47%
                                                                          42%
40%


30%


20%


10%


 0%
            > 25,000 FTE      5,000 to 25,000 FTE                    < 5,000 FTE         Overall




9/13/2012                        Ponemon Institute: Private & Confidential Information             7
Overall Benchmark Score

The benchmark scores for the 2012 sample of 89 companies are presented in a percentage
form. These scores are compiled from a proprietary instrument containing 130 items presented
in seven (7) sections. Each section is weighted equally for purposes of comparison.

90%
             79%
80%
                                                       70%
70%
                                                                           61%
60%                   56%

50%
                                   42%
40%
                                                                                          33%
                                                                                                     29%
30%

20%

10%

 0%
            Policy%   Com%       Mgmt%             Security%        Compliance%          Choice%   Redress%




9/13/2012                        Ponemon Institute: Private & Confidential Information                        8
Benchmarks on Privacy Policies


             Centralized version control procedures                                                                    49%


            Harmonized approach to global policies                                                             43%


            Acceptable use policies for social media                                                          41%


 Acceptable use policies for mobile devices (BYOD)                                                       38%

                                                       0%          10%            20%           30%     40%          50%        60%

 90%
                                                                                                                             79%
 80%                                                                                                            76%
                                                                                                      71%
                                                                                            68%
 70%                                             63%                          65%
                                    60%                        62%
                        59%
 60%        56%
 50%
 40%
 30%
 20%
 10%
   0%
            2003        2004        2005         2006          2007          2008           2009      2010      2011         2012

9/13/2012                                    Ponemon Institute: Private & Confidential Information                                    9
Benchmarks on Training & Communications

            Mandatory training for all employees                                                                                  41%

  Specialized training for high risk employees                                                                             37%

   Metrics for assessing training effectiveness                                                               30%

       Incident response training for readiness                                                           29%

     Privacy awareness for business partners                                     15%

              Privacy awareness for customers                              12%

                                                   0%      5%      10%       15%       20%        25%    30%        35%     40%     45%

  60%                                                                                                                             56%
                                                                              50%           52%         50%         52%
  50%          46%        47%                       48%         46%
                                      45%

  40%

  30%

  20%

  10%

   0%
              2003        2004        2005          2006        2007          2008         2009         2010        2011         2012


9/13/2012                                      Ponemon Institute: Private & Confidential Information                                      10
Benchmarks on Privacy Program Management

                        Centralized authority                                                                                  35%

             Adequacy of program resources                                                                                   33%

Formal privacy or data governance strategy                                                                          29%

               Data inventory for sensitive PI                                                        21%

            Independent audit or assessment                                                  17%

                                                 0%          5%        10%         15%          20%         25%     30%      35%      40%

60%
                                                                                                52%
                                                                                  50%
50%                                                                                                          48%
                                                                   46%
                                                                                                                      44%
                         41%                                                                                                       42%
            40%                       39%             40%
40%

30%

20%

10%

 0%
            2003        2004         2005             2006         2007          2008           2009         2010     2011         2012

9/13/2012                                         Ponemon Institute: Private & Confidential Information                                     11
Benchmarks on Data Security

Alignment of privacy and cyber security strategy                                                                                     33%

      Extensive use of encryption for data at rest                                                                                 31%

    Controls over PI data in cloud environments                                                                              29%

      Extensive use of data loss prevention tools                                                                       27%

                          Privileged user visibility                                                            24%

                                                       0%       5%          10%         15%         20%         25%          30%         35%

80%
                                                                                           68%                        68%          70%
70%                                               64%          66%           65%                         66%
                                    59%
60%                    53%
            50%
50%
40%
30%
20%
10%
 0%
            2003       2004         2005         2006          2007          2008          2009          2010         2011         2012

9/13/2012                                        Ponemon Institute: Private & Confidential Information                                         12
Benchmarks on Privacy Compliance & Monitoring

      Compliance monitoring over contract and temporary
                                                                                                                          29%
                                             employees

                    Mock regulatory audits or assessments                                                         25%

            Advanced assessments of marketing compaigns                                                     22%

                                     Board level reporting                                                 21%

Evaluation of information theft upon employee termination                                                  21%

                                                             0%       5%         10%         15%     20%     25%         30%      35%

70%
                                                                                                                  59%          61%
60%                                                                                                  54%
50%                                                           46%                         48%
                                                43%                         45%
             39%        41%        40%
40%

30%

20%

10%

 0%
             2003       2004       2005        2006           2007         2008           2009       2010         2011         2012

9/13/2012                                    Ponemon Institute: Private & Confidential Information                                      13
Benchmarks on Consent & Choice

             Exclusive use of permission-based lists for
                                                                                                                            26%
                           customer/consumer contact

      Testing that customer preferences are honored                                                                  23%


Rigorous monitoring of secondary uses of sensitive PI                                                               22%


       Global harmonization of consumer preferences                                                      18%


                              Readiness for do not track                                                 18%

                                                           0%        5%          10%          15%            20%      25%         30%

40%
            35%                                             34%                                                    35%
35%                    33%                     33%                       32%           33%                                  33%
                                                                                                       30%
30%                                28%
25%
20%
15%
10%
5%
0%
            2003       2004        2005       2006          2007        2008          2009          2010           2011     2012
9/13/2012                                      Ponemon Institute: Private & Confidential Information                                    14
Benchmarks on Redress & Enforcement

                                 Whistle blowing protection                                                                          27%

             Redress process involves the privacy leader                                                                           26%

                                     Escalation procedures                                                                    24%

                   Specific timeline to investigate incidents                                                          21%

Enforcement actions reported to executive management                                                               20%

                                                                0%        5%          10%         15%            20%         25%         30%

40%
                                                                            35%           36%
                                                 33%            34%                                       33%
35%                                  32%                                                                               31%
                        28%                                                                                                         29%
30%         27%
25%
20%
15%
10%
5%
0%
            2003        2004        2005         2006           2007        2008         2009             2010         2011         2012


9/13/2012                                         Ponemon Institute: Private & Confidential Information                                        15
Net change over 10 years

    The benchmark scores for the 2012 sample consists of 89 companies. The benchmark scores
    for the 2003 sample consist of 68 companies. Please note that both samples were matched
    by organizational headcount (size), industry sector and geographic footprint. Certain items in
    the proprietary benchmark instrument were edited or updated over this 10-year period.

    90%
            79%
    80%
                                                           70%
    70%
                                                                              61%
    60%           56%   56%
                                                                 50%
    50%                       46%
                                       42% 40%
                                                                                     39%
    40%
                                                                                            33% 35%
                                                                                                      29% 27%
    30%

    20%

    10%

      0%
            Policy%      Com%           Mgmt%             Security%        Compliance%      Choice%   Redress%
                                                 FY 2012         FY 2003



9/13/2012                           Ponemon Institute: Private & Confidential Information                        16
Cost Benchmarks
Analysis is based on Ponemon Institute’s 2012 benchmark on corporate privacy management (n=265 companies)
Extrapolated cost of privacy programs
$US millions (000,000 omitted)
Analysis is based on Ponemon Institute’s 2012 benchmark on corporate privacy management (n=265 companies)

   This graph reports the average direct and indirect program spending for FY 2012 based on SES quartiles
   from 1 = highest to 4 = lowest. The SES is a metric ranging from -2 (lowest) to +2 (highest) that attempts to
   measure the effectiveness of an organization’s information security posture. The SES was developed by
   Ponemon Institute and his been validated in more than 50 studies conducted over nearly eight (8) years. As
   can be seen, organizations with a higher SES spend more direct and indirect costs on privacy programs.
   While not shown in this graph, the average privacy program cost for our benchmark sample of companies
   totals $5.98 million.
   10.00
     9.00                     8.75

     8.00
     7.00                                                6.39
     6.00
                       4.84                                                               4.61
     5.00
                3.92                                                                                             4.18
     4.00
                                         3.12 3.27                       2.92
     3.00                                                                                          2.53
     2.00                                                                         1.70                    1.65

     1.00
        -
              Quartile 1 (SES 1.1)     Quartile 2 (SES .71)            Quartile 3 (SES .35)      Quartile 4 (SES -.11)
                                         Direct cost        Indirect cost        Total

9/13/2012                               Ponemon Institute: Private & Confidential Information                            18
Extrapolated cost of privacy programs
$US millions (000,000 omitted)
Analysis is based on Ponemon Institute’s 2012 benchmark on corporate privacy management (n=265 companies)

   This graph reports the average direct and indirect program spending for FY 2012 based on six expenditure
   or spending categories totaling $5.98 million. As can be seen, the two highest spending categories are data
   security ($1.55 million) and program management ($1.50 million). In contrast, the two lowest spending
   categories are redress and enforcement ($.30 million) and policies and procedures ($.60 million). While not
   shown separately, our benchmark sample of companies spend approximately 25% of budget on program
   management activities, which includes all costs associated with data breach incident management.
   $1.80
                                                                            $1.55
   $1.60                                              $1.50
   $1.40
   $1.20                                                                                           $1.14

   $1.00                         $0.90
   $0.80
                 $0.60
   $0.60
   $0.40                                                                                                         $0.30
   $0.20
      $-
               Policies &      Training &         Program              Data security             Compliance    Redress &
              procedures     communication       management                                      monitoring   enforcement




9/13/2012                                Ponemon Institute: Private & Confidential Information                              19
Informal Influencer Survey
Benchmark study of 107 privacy influencers


•     Results in this report are based on Ponemon Institute’s proprietary
      database of privacy practices in US organizations.
•     Examined perceptions about data breach incident response management.
•     Purpose of analysis is to determine the value privacy leaders place on an
      automated tool or system to deal with the data breach incident management
      process.
•     The results indicate that privacy leaders believe automated management
      tools are important to deal with the data breach incident management
      process due to the numerous separate incidents that require ongoing
      tracking.




9/13/2012                    Ponemon Institute: Private & Confidential Information   21
Is there a need to have an automated tool or system
to deal with the data breach incident management
process?
Benchmark question posed to 107 privacy leaders in U.S. based corporations



                                     4%

                         15%



                                                                                        Yes
                                                                                        No
                                                                                        Unsure




                                                         81%




9/13/2012                       Ponemon Institute: Private & Confidential Information            22
Do you have an automated data breach management
tool or system today?
Benchmark question posed to 107 privacy leaders in U.S. based corporations



                               2%




               36%                                                                      No

                                                                                        Yes, homemade

                                                          62%                           Yes, commercial




9/13/2012                       Ponemon Institute: Private & Confidential Information                     23
What is your company’s primary focus for data
breach management issues?
Benchmark question posed to 107 privacy leaders in U.S. based corporations


                                    2%
                             6%


                    10%
                                                                                          US

                                                                                          Global

                                                                                          North America
                                                                      50%
                                                                                          Europe/EU

                                                                                          Latin America

                                                                                          Asia-Pacific
                   31%




9/13/2012                         Ponemon Institute: Private & Confidential Information                   24
Approximately, how many separate incidents
require tracking over a 12-month period?
Benchmark question posed to 107 privacy leaders in U.S. based corporations



    < 40                  9%


21 to 40                                  15%


11 to 20                                                               24%


 5 to 10                                                                                         36%


  2 to 4                    10%


     >2           5%


            0%   5%      10%          15%            20%             25%             30%   35%         40%




9/13/2012                         Ponemon Institute: Private & Confidential Information                      25
Need for a Data Breach Management Tool

•     Ponemon Institute’s tracking study of the cost of privacy programs reveals the
      potential market demand data breach incident management tool for the following
      reasons:
        – Cost effective – TCO of the tool versus labor costs and professional fees
        – A comprehensive and accurate repository of summarized privacy and data
          breach laws reduces research costs and legal services.
        – Benefits SMBs that cannot afford a fully-dedicated privacy staff.
        – Secures (lock-down) sensitive and confidential information concerning data
          breach incidents and events.
        – Avoid redundant or inconsistent operating practices and reduce operational
          complexity.
•     Ponemon Institute’s proprietary benchmarks on corporate privacy spending for larger-
      sized organizations (headcount > 1,000) reveal a substantial spending level for
      program management (which includes incident response) and data security
      measures.



9/13/2012                       Ponemon Institute: Private & Confidential Information   26
Questions?

               Ponemon Institute
                  www.ponemon.org
                   Tel: 231.938.9900
                Toll Free: 800.887.3118
Michigan HQ: 2308 US 31 N. Traverse City, MI 49686 USA
               research@ponemon.org

More Related Content

What's hot

DCD Census Key Findings India 2011-2012
DCD Census Key Findings India 2011-2012DCD Census Key Findings India 2011-2012
DCD Census Key Findings India 2011-2012Anixter
 
Symantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global ResultsSymantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global ResultsSymantec
 
So maximieren Sie den Nutzen von SAP: Business Netzwerke als Schlüssel zum Er...
So maximieren Sie den Nutzen von SAP: Business Netzwerke als Schlüssel zum Er...So maximieren Sie den Nutzen von SAP: Business Netzwerke als Schlüssel zum Er...
So maximieren Sie den Nutzen von SAP: Business Netzwerke als Schlüssel zum Er...
SAP Ariba
 
About Quadric®
About Quadric®About Quadric®
About Quadric®
Michael Sherain
 
Symantec 2011 Information Retention and eDiscovery Survey Global Key Findings
Symantec 2011 Information Retention and eDiscovery Survey Global Key FindingsSymantec 2011 Information Retention and eDiscovery Survey Global Key Findings
Symantec 2011 Information Retention and eDiscovery Survey Global Key Findings
Symantec
 
Csr branding survey - 2010
Csr branding survey  - 2010Csr branding survey  - 2010
Csr branding survey - 2010Rohit Singh
 
CSR Branding Survey 2010
CSR Branding Survey 2010 CSR Branding Survey 2010
CSR Branding Survey 2010
Burson-Marsteller
 

What's hot (7)

DCD Census Key Findings India 2011-2012
DCD Census Key Findings India 2011-2012DCD Census Key Findings India 2011-2012
DCD Census Key Findings India 2011-2012
 
Symantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global ResultsSymantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global Results
 
So maximieren Sie den Nutzen von SAP: Business Netzwerke als Schlüssel zum Er...
So maximieren Sie den Nutzen von SAP: Business Netzwerke als Schlüssel zum Er...So maximieren Sie den Nutzen von SAP: Business Netzwerke als Schlüssel zum Er...
So maximieren Sie den Nutzen von SAP: Business Netzwerke als Schlüssel zum Er...
 
About Quadric®
About Quadric®About Quadric®
About Quadric®
 
Symantec 2011 Information Retention and eDiscovery Survey Global Key Findings
Symantec 2011 Information Retention and eDiscovery Survey Global Key FindingsSymantec 2011 Information Retention and eDiscovery Survey Global Key Findings
Symantec 2011 Information Retention and eDiscovery Survey Global Key Findings
 
Csr branding survey - 2010
Csr branding survey  - 2010Csr branding survey  - 2010
Csr branding survey - 2010
 
CSR Branding Survey 2010
CSR Branding Survey 2010 CSR Branding Survey 2010
CSR Branding Survey 2010
 

Viewers also liked

Nagios Conference 2014 - Spenser Reinhardt - Detecting Security Breaches With...
Nagios Conference 2014 - Spenser Reinhardt - Detecting Security Breaches With...Nagios Conference 2014 - Spenser Reinhardt - Detecting Security Breaches With...
Nagios Conference 2014 - Spenser Reinhardt - Detecting Security Breaches With...
Nagios
 
Industrial Control System Security Overview
Industrial Control System Security OverviewIndustrial Control System Security Overview
Industrial Control System Security Overview
pgmaynard
 
Control Systems Basics
Control Systems BasicsControl Systems Basics
Control Systems Basics
John Todora
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Resilient Systems
 
Presentatie inleidende cijfers_#mk12
Presentatie inleidende cijfers_#mk12Presentatie inleidende cijfers_#mk12
Presentatie inleidende cijfers_#mk12
marketingdag2012
 
Addsource introduction
Addsource introduction Addsource introduction
Addsource introduction
David Dovman
 
Cbfps attitude towards risk perception
Cbfps attitude towards risk perceptionCbfps attitude towards risk perception
Cbfps attitude towards risk perceptionSahil Bansal
 
The last part of the analysis will examine the relationship between MPG and o...
The last part of the analysis will examine the relationship between MPG and o...The last part of the analysis will examine the relationship between MPG and o...
The last part of the analysis will examine the relationship between MPG and o...
wamorena lempadi
 
Notable quotations options for the poor
Notable quotations options for the poorNotable quotations options for the poor
Notable quotations options for the poorDenni Domingo
 
งานนำเสนอ1
งานนำเสนอ1งานนำเสนอ1
งานนำเสนอ1surasak2222
 
How To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceHow To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat Intelligence
Resilient Systems
 
SOcial Media Marketing Terms
SOcial Media Marketing TermsSOcial Media Marketing Terms
SOcial Media Marketing Terms
SO! What? SOcial.
 
Guida Introduttiva a You Tube
Guida Introduttiva a You TubeGuida Introduttiva a You Tube
Guida Introduttiva a You Tube
Emanuele Pulli
 
Privacy Communities: How To Build Them And Drive Awareness
Privacy Communities: How To Build Them And Drive AwarenessPrivacy Communities: How To Build Them And Drive Awareness
Privacy Communities: How To Build Them And Drive AwarenessResilient Systems
 
God Store Presentation Slides
God Store Presentation SlidesGod Store Presentation Slides
God Store Presentation Slides
Robert Langius
 

Viewers also liked (20)

Nagios Conference 2014 - Spenser Reinhardt - Detecting Security Breaches With...
Nagios Conference 2014 - Spenser Reinhardt - Detecting Security Breaches With...Nagios Conference 2014 - Spenser Reinhardt - Detecting Security Breaches With...
Nagios Conference 2014 - Spenser Reinhardt - Detecting Security Breaches With...
 
Industrial Control System Security Overview
Industrial Control System Security OverviewIndustrial Control System Security Overview
Industrial Control System Security Overview
 
ICS security
ICS securityICS security
ICS security
 
Control Systems Basics
Control Systems BasicsControl Systems Basics
Control Systems Basics
 
Tutorial
TutorialTutorial
Tutorial
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
Presentatie inleidende cijfers_#mk12
Presentatie inleidende cijfers_#mk12Presentatie inleidende cijfers_#mk12
Presentatie inleidende cijfers_#mk12
 
Addsource introduction
Addsource introduction Addsource introduction
Addsource introduction
 
Cbfps attitude towards risk perception
Cbfps attitude towards risk perceptionCbfps attitude towards risk perception
Cbfps attitude towards risk perception
 
The last part of the analysis will examine the relationship between MPG and o...
The last part of the analysis will examine the relationship between MPG and o...The last part of the analysis will examine the relationship between MPG and o...
The last part of the analysis will examine the relationship between MPG and o...
 
Notable quotations options for the poor
Notable quotations options for the poorNotable quotations options for the poor
Notable quotations options for the poor
 
PI Report
PI ReportPI Report
PI Report
 
งานนำเสนอ1
งานนำเสนอ1งานนำเสนอ1
งานนำเสนอ1
 
How To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceHow To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat Intelligence
 
SOcial Media Marketing Terms
SOcial Media Marketing TermsSOcial Media Marketing Terms
SOcial Media Marketing Terms
 
Wanted & available
Wanted & availableWanted & available
Wanted & available
 
Guida Introduttiva a You Tube
Guida Introduttiva a You TubeGuida Introduttiva a You Tube
Guida Introduttiva a You Tube
 
Privacy Communities: How To Build Them And Drive Awareness
Privacy Communities: How To Build Them And Drive AwarenessPrivacy Communities: How To Build Them And Drive Awareness
Privacy Communities: How To Build Them And Drive Awareness
 
Wanted & available
Wanted & availableWanted & available
Wanted & available
 
God Store Presentation Slides
God Store Presentation SlidesGod Store Presentation Slides
God Store Presentation Slides
 

Similar to Privacy & Data Breach Management

The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
Lumension
 
Enterprise Mobility in Russia 2012 - Survey findings - dec 2012
Enterprise Mobility in Russia 2012 - Survey findings - dec 2012Enterprise Mobility in Russia 2012 - Survey findings - dec 2012
Enterprise Mobility in Russia 2012 - Survey findings - dec 2012
Центр корпоративной мобильности АйТи
 
2009 Payroll Performance Study Demographics
2009 Payroll Performance Study Demographics2009 Payroll Performance Study Demographics
2009 Payroll Performance Study Demographics
fcheek
 
Raddon Chart of the Day February 23, 2012
Raddon Chart of the Day February 23, 2012Raddon Chart of the Day February 23, 2012
Raddon Chart of the Day February 23, 2012Raddon Financial Group
 
Eclipse survey 2012 report [final]
Eclipse survey 2012 report [final]Eclipse survey 2012 report [final]
Eclipse survey 2012 report [final]
Ian Skerrett
 
Trends in Enterprise Mobility
Trends in Enterprise MobilityTrends in Enterprise Mobility
Trends in Enterprise Mobility
CompTIA
 
How Mobile Is Your Agency?
How Mobile Is Your Agency?How Mobile Is Your Agency?
How Mobile Is Your Agency?GovLoop
 
Demandware tco webinar final 12122012
Demandware tco webinar final 12122012Demandware tco webinar final 12122012
Demandware tco webinar final 12122012Thomas Roider
 
Kode Kraftz Solution
Kode Kraftz SolutionKode Kraftz Solution
Survey results: The age of unbounded data
Survey results: The age of unbounded dataSurvey results: The age of unbounded data
Survey results: The age of unbounded dataMoxie Insight
 
How Mature is Your Data Protection? 3 Steps to Effective Data Security.
How Mature is Your Data Protection? 3 Steps to Effective Data Security.How Mature is Your Data Protection? 3 Steps to Effective Data Security.
How Mature is Your Data Protection? 3 Steps to Effective Data Security.Lumension
 
Survey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecuritySurvey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise Security
AirTight Networks
 
Raddon Chart of the Day February 21, 2012
Raddon Chart of the Day February 21, 2012Raddon Chart of the Day February 21, 2012
Raddon Chart of the Day February 21, 2012Raddon Financial Group
 
Raddon Chart of the Day August 21, 2012
Raddon Chart of the Day August 21, 2012Raddon Chart of the Day August 21, 2012
Raddon Chart of the Day August 21, 2012Raddon Financial Group
 
FERMA European Risk Management Benchmarking Survey 2012
FERMA European Risk Management Benchmarking Survey 2012FERMA European Risk Management Benchmarking Survey 2012
FERMA European Risk Management Benchmarking Survey 2012
FERMA
 
BYOD Industry Trends and Best Practices - Philly Tech Week
BYOD Industry Trends and Best Practices  -  Philly Tech WeekBYOD Industry Trends and Best Practices  -  Philly Tech Week
BYOD Industry Trends and Best Practices - Philly Tech Week
The Judge Group
 
Share Point Survey Results Fall 2011
Share Point Survey Results Fall 2011Share Point Survey Results Fall 2011
Share Point Survey Results Fall 2011Derek E. Weeks
 
IAB Affiliate Monitor Ad Spend Study fy2011
IAB Affiliate Monitor Ad Spend Study fy2011IAB Affiliate Monitor Ad Spend Study fy2011
IAB Affiliate Monitor Ad Spend Study fy2011IAB Netherlands
 
Marktmonitor Affiliate Marketing 2011
Marktmonitor Affiliate Marketing 2011Marktmonitor Affiliate Marketing 2011
Marktmonitor Affiliate Marketing 2011
Affiliate Dag
 
Collaborating for innovation 2010
Collaborating for innovation 2010Collaborating for innovation 2010
Collaborating for innovation 2010
Koen Klokgieters
 

Similar to Privacy & Data Breach Management (20)

The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2012
 
Enterprise Mobility in Russia 2012 - Survey findings - dec 2012
Enterprise Mobility in Russia 2012 - Survey findings - dec 2012Enterprise Mobility in Russia 2012 - Survey findings - dec 2012
Enterprise Mobility in Russia 2012 - Survey findings - dec 2012
 
2009 Payroll Performance Study Demographics
2009 Payroll Performance Study Demographics2009 Payroll Performance Study Demographics
2009 Payroll Performance Study Demographics
 
Raddon Chart of the Day February 23, 2012
Raddon Chart of the Day February 23, 2012Raddon Chart of the Day February 23, 2012
Raddon Chart of the Day February 23, 2012
 
Eclipse survey 2012 report [final]
Eclipse survey 2012 report [final]Eclipse survey 2012 report [final]
Eclipse survey 2012 report [final]
 
Trends in Enterprise Mobility
Trends in Enterprise MobilityTrends in Enterprise Mobility
Trends in Enterprise Mobility
 
How Mobile Is Your Agency?
How Mobile Is Your Agency?How Mobile Is Your Agency?
How Mobile Is Your Agency?
 
Demandware tco webinar final 12122012
Demandware tco webinar final 12122012Demandware tco webinar final 12122012
Demandware tco webinar final 12122012
 
Kode Kraftz Solution
Kode Kraftz SolutionKode Kraftz Solution
Kode Kraftz Solution
 
Survey results: The age of unbounded data
Survey results: The age of unbounded dataSurvey results: The age of unbounded data
Survey results: The age of unbounded data
 
How Mature is Your Data Protection? 3 Steps to Effective Data Security.
How Mature is Your Data Protection? 3 Steps to Effective Data Security.How Mature is Your Data Protection? 3 Steps to Effective Data Security.
How Mature is Your Data Protection? 3 Steps to Effective Data Security.
 
Survey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecuritySurvey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise Security
 
Raddon Chart of the Day February 21, 2012
Raddon Chart of the Day February 21, 2012Raddon Chart of the Day February 21, 2012
Raddon Chart of the Day February 21, 2012
 
Raddon Chart of the Day August 21, 2012
Raddon Chart of the Day August 21, 2012Raddon Chart of the Day August 21, 2012
Raddon Chart of the Day August 21, 2012
 
FERMA European Risk Management Benchmarking Survey 2012
FERMA European Risk Management Benchmarking Survey 2012FERMA European Risk Management Benchmarking Survey 2012
FERMA European Risk Management Benchmarking Survey 2012
 
BYOD Industry Trends and Best Practices - Philly Tech Week
BYOD Industry Trends and Best Practices  -  Philly Tech WeekBYOD Industry Trends and Best Practices  -  Philly Tech Week
BYOD Industry Trends and Best Practices - Philly Tech Week
 
Share Point Survey Results Fall 2011
Share Point Survey Results Fall 2011Share Point Survey Results Fall 2011
Share Point Survey Results Fall 2011
 
IAB Affiliate Monitor Ad Spend Study fy2011
IAB Affiliate Monitor Ad Spend Study fy2011IAB Affiliate Monitor Ad Spend Study fy2011
IAB Affiliate Monitor Ad Spend Study fy2011
 
Marktmonitor Affiliate Marketing 2011
Marktmonitor Affiliate Marketing 2011Marktmonitor Affiliate Marketing 2011
Marktmonitor Affiliate Marketing 2011
 
Collaborating for innovation 2010
Collaborating for innovation 2010Collaborating for innovation 2010
Collaborating for innovation 2010
 

More from Resilient Systems

You've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The IncidentYou've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The Incident
Resilient Systems
 
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot SeatData Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Resilient Systems
 
Co3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions WebinarCo3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions Webinar
Resilient Systems
 
By Popular Demand: Co3's Latest and Greatest Features
By Popular Demand: Co3's Latest and Greatest Features By Popular Demand: Co3's Latest and Greatest Features
By Popular Demand: Co3's Latest and Greatest Features
Resilient Systems
 
Are We Breached How to Effectively Assess and Manage Incidents
Are We Breached How to Effectively Assess and Manage Incidents Are We Breached How to Effectively Assess and Manage Incidents
Are We Breached How to Effectively Assess and Manage Incidents
Resilient Systems
 
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
Resilient Systems
 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Resilient Systems
 
How To Build An Incident Response Function
How To Build An Incident Response FunctionHow To Build An Incident Response Function
How To Build An Incident Response Function
Resilient Systems
 
EU Cyber Attacks And The Incident Response Imperative
EU Cyber Attacks And The Incident Response ImperativeEU Cyber Attacks And The Incident Response Imperative
EU Cyber Attacks And The Incident Response Imperative
Resilient Systems
 
Incident Response: How To Prepare
Incident Response: How To PrepareIncident Response: How To Prepare
Incident Response: How To Prepare
Resilient Systems
 
The Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUThe Target Breach - Follow The Money EU
The Target Breach - Follow The Money EU
Resilient Systems
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
Resilient Systems
 
How To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceHow To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat Intelligence
Resilient Systems
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 Days
Resilient Systems
 
How To Stop Target-Like Breaches In Their Tracks
How To Stop Target-Like Breaches In Their TracksHow To Stop Target-Like Breaches In Their Tracks
How To Stop Target-Like Breaches In Their Tracks
Resilient Systems
 
The Target Breach – Follow The Money
The Target Breach – Follow The MoneyThe Target Breach – Follow The Money
The Target Breach – Follow The Money
Resilient Systems
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
Resilient Systems
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It Right
Resilient Systems
 
Treat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance IssueTreat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance Issue
Resilient Systems
 
You're Breached: Information Risk Analysis for Today's Threat Landscape
You're Breached: Information Risk Analysis for Today's Threat LandscapeYou're Breached: Information Risk Analysis for Today's Threat Landscape
You're Breached: Information Risk Analysis for Today's Threat Landscape
Resilient Systems
 

More from Resilient Systems (20)

You've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The IncidentYou've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The Incident
 
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot SeatData Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
 
Co3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions WebinarCo3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions Webinar
 
By Popular Demand: Co3's Latest and Greatest Features
By Popular Demand: Co3's Latest and Greatest Features By Popular Demand: Co3's Latest and Greatest Features
By Popular Demand: Co3's Latest and Greatest Features
 
Are We Breached How to Effectively Assess and Manage Incidents
Are We Breached How to Effectively Assess and Manage Incidents Are We Breached How to Effectively Assess and Manage Incidents
Are We Breached How to Effectively Assess and Manage Incidents
 
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a Panacea
 
How To Build An Incident Response Function
How To Build An Incident Response FunctionHow To Build An Incident Response Function
How To Build An Incident Response Function
 
EU Cyber Attacks And The Incident Response Imperative
EU Cyber Attacks And The Incident Response ImperativeEU Cyber Attacks And The Incident Response Imperative
EU Cyber Attacks And The Incident Response Imperative
 
Incident Response: How To Prepare
Incident Response: How To PrepareIncident Response: How To Prepare
Incident Response: How To Prepare
 
The Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUThe Target Breach - Follow The Money EU
The Target Breach - Follow The Money EU
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
 
How To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceHow To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat Intelligence
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 Days
 
How To Stop Target-Like Breaches In Their Tracks
How To Stop Target-Like Breaches In Their TracksHow To Stop Target-Like Breaches In Their Tracks
How To Stop Target-Like Breaches In Their Tracks
 
The Target Breach – Follow The Money
The Target Breach – Follow The MoneyThe Target Breach – Follow The Money
The Target Breach – Follow The Money
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It Right
 
Treat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance IssueTreat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance Issue
 
You're Breached: Information Risk Analysis for Today's Threat Landscape
You're Breached: Information Risk Analysis for Today's Threat LandscapeYou're Breached: Information Risk Analysis for Today's Threat Landscape
You're Breached: Information Risk Analysis for Today's Threat Landscape
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Privacy & Data Breach Management

  • 1. Privacy & Data Breach Management Benchmarks, Informal Survey, Solutions Presentation by Dr. Larry Ponemon Webinar sponsored by Co3 Systems September 13, 2012
  • 2. Agenda • Benchmark Analysis • Cost Benchmarks • Informal Influencer Survey • Market Need For Breach Management Solutions 9/13/2012 Ponemon Institute: Private & Confidential Information 2
  • 3. About Ponemon Institute • Ponemon Institute conducts independent research on cyber security, data protection and privacy issues. • Since our founding 11+ years ago our mission has remained constant, which is to enable organizations in both the private and public sectors to have a clearer understanding of the practices, enabling technologies and potential threats that will affect the security, reliability and integrity of information assets and IT systems. • Ponemon Institute research informs organizations on how to improve upon their data protection initiatives and enhance their brand and reputation as a trusted enterprise. • In addition to research, Ponemon Institute offers independent assessment and strategic advisory services on privacy and data protection issues. The Institute also conducts workshops and training programs. • The Institute is frequently engaged by leading companies to assess their privacy and data protection activities in accordance with generally accepted standards and practices on a global basis. • The Institute also performs customized benchmark studies to help organizations identify inherent risk areas and gaps that might otherwise trigger regulatory action. 9/13/2012 Ponemon Institute: Private & Confidential Information 3
  • 4. Benchmark Analysis Analysis is based on Ponemon Institute’s 2012 benchmark on corporate privacy management (n=89 companies)
  • 5. Background • Ponemon Institute has conduct detailed benchmark surveys of corporate privacy program activities for the past 10 years (starting in January 2003). • Ponemon Institute has conducted more than 500+ separate benchmark studies. • A total of 89 large, US-based organizations in various industries participated in this 2012 study (fieldwork concluding in August). • The primary contact in these organizations was the chief security officer, the chief information security officer, the chief privacy officer or another individual who has overall responsibility for privacy & data protection. • All results were gathered by the researcher. All individual and company- identifiable information was removed to protect the confidentiality of responding organizations. • Caveats – Benchmarks provide descriptive information that may not be representative of all corporate privacy initiatives. 9/13/2012 Ponemon Institute: Private & Confidential Information 5
  • 6. Industries A total of 89 companies participated in this 2012 research Minimum headcount of participating companies is > 1,000 Financial services 2% 4% 3% Health & pharma 21% 6% Retail Public sector 6% Industrial Services 6% Consumer products 12% 6% Technology & software Transportation 7% Energy & utilities 12% Communications 7% 8% Education & research Other 9/13/2012 Ponemon Institute: Private & Confidential Information 6
  • 7. Overall Benchmark Score The benchmark scores for the 2012 sample of 89 companies are presented in a percentage form. These scores are compiled from a proprietary instrument containing 130 items presented in seven (7) sections. Each section is weighted equally for purposes of comparison. 70% 61% 60% 53% 50% 47% 42% 40% 30% 20% 10% 0% > 25,000 FTE 5,000 to 25,000 FTE < 5,000 FTE Overall 9/13/2012 Ponemon Institute: Private & Confidential Information 7
  • 8. Overall Benchmark Score The benchmark scores for the 2012 sample of 89 companies are presented in a percentage form. These scores are compiled from a proprietary instrument containing 130 items presented in seven (7) sections. Each section is weighted equally for purposes of comparison. 90% 79% 80% 70% 70% 61% 60% 56% 50% 42% 40% 33% 29% 30% 20% 10% 0% Policy% Com% Mgmt% Security% Compliance% Choice% Redress% 9/13/2012 Ponemon Institute: Private & Confidential Information 8
  • 9. Benchmarks on Privacy Policies Centralized version control procedures 49% Harmonized approach to global policies 43% Acceptable use policies for social media 41% Acceptable use policies for mobile devices (BYOD) 38% 0% 10% 20% 30% 40% 50% 60% 90% 79% 80% 76% 71% 68% 70% 63% 65% 60% 62% 59% 60% 56% 50% 40% 30% 20% 10% 0% 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 9/13/2012 Ponemon Institute: Private & Confidential Information 9
  • 10. Benchmarks on Training & Communications Mandatory training for all employees 41% Specialized training for high risk employees 37% Metrics for assessing training effectiveness 30% Incident response training for readiness 29% Privacy awareness for business partners 15% Privacy awareness for customers 12% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 60% 56% 50% 52% 50% 52% 50% 46% 47% 48% 46% 45% 40% 30% 20% 10% 0% 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 9/13/2012 Ponemon Institute: Private & Confidential Information 10
  • 11. Benchmarks on Privacy Program Management Centralized authority 35% Adequacy of program resources 33% Formal privacy or data governance strategy 29% Data inventory for sensitive PI 21% Independent audit or assessment 17% 0% 5% 10% 15% 20% 25% 30% 35% 40% 60% 52% 50% 50% 48% 46% 44% 41% 42% 40% 39% 40% 40% 30% 20% 10% 0% 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 9/13/2012 Ponemon Institute: Private & Confidential Information 11
  • 12. Benchmarks on Data Security Alignment of privacy and cyber security strategy 33% Extensive use of encryption for data at rest 31% Controls over PI data in cloud environments 29% Extensive use of data loss prevention tools 27% Privileged user visibility 24% 0% 5% 10% 15% 20% 25% 30% 35% 80% 68% 68% 70% 70% 64% 66% 65% 66% 59% 60% 53% 50% 50% 40% 30% 20% 10% 0% 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 9/13/2012 Ponemon Institute: Private & Confidential Information 12
  • 13. Benchmarks on Privacy Compliance & Monitoring Compliance monitoring over contract and temporary 29% employees Mock regulatory audits or assessments 25% Advanced assessments of marketing compaigns 22% Board level reporting 21% Evaluation of information theft upon employee termination 21% 0% 5% 10% 15% 20% 25% 30% 35% 70% 59% 61% 60% 54% 50% 46% 48% 43% 45% 39% 41% 40% 40% 30% 20% 10% 0% 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 9/13/2012 Ponemon Institute: Private & Confidential Information 13
  • 14. Benchmarks on Consent & Choice Exclusive use of permission-based lists for 26% customer/consumer contact Testing that customer preferences are honored 23% Rigorous monitoring of secondary uses of sensitive PI 22% Global harmonization of consumer preferences 18% Readiness for do not track 18% 0% 5% 10% 15% 20% 25% 30% 40% 35% 34% 35% 35% 33% 33% 32% 33% 33% 30% 30% 28% 25% 20% 15% 10% 5% 0% 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 9/13/2012 Ponemon Institute: Private & Confidential Information 14
  • 15. Benchmarks on Redress & Enforcement Whistle blowing protection 27% Redress process involves the privacy leader 26% Escalation procedures 24% Specific timeline to investigate incidents 21% Enforcement actions reported to executive management 20% 0% 5% 10% 15% 20% 25% 30% 40% 35% 36% 33% 34% 33% 35% 32% 31% 28% 29% 30% 27% 25% 20% 15% 10% 5% 0% 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 9/13/2012 Ponemon Institute: Private & Confidential Information 15
  • 16. Net change over 10 years The benchmark scores for the 2012 sample consists of 89 companies. The benchmark scores for the 2003 sample consist of 68 companies. Please note that both samples were matched by organizational headcount (size), industry sector and geographic footprint. Certain items in the proprietary benchmark instrument were edited or updated over this 10-year period. 90% 79% 80% 70% 70% 61% 60% 56% 56% 50% 50% 46% 42% 40% 39% 40% 33% 35% 29% 27% 30% 20% 10% 0% Policy% Com% Mgmt% Security% Compliance% Choice% Redress% FY 2012 FY 2003 9/13/2012 Ponemon Institute: Private & Confidential Information 16
  • 17. Cost Benchmarks Analysis is based on Ponemon Institute’s 2012 benchmark on corporate privacy management (n=265 companies)
  • 18. Extrapolated cost of privacy programs $US millions (000,000 omitted) Analysis is based on Ponemon Institute’s 2012 benchmark on corporate privacy management (n=265 companies) This graph reports the average direct and indirect program spending for FY 2012 based on SES quartiles from 1 = highest to 4 = lowest. The SES is a metric ranging from -2 (lowest) to +2 (highest) that attempts to measure the effectiveness of an organization’s information security posture. The SES was developed by Ponemon Institute and his been validated in more than 50 studies conducted over nearly eight (8) years. As can be seen, organizations with a higher SES spend more direct and indirect costs on privacy programs. While not shown in this graph, the average privacy program cost for our benchmark sample of companies totals $5.98 million. 10.00 9.00 8.75 8.00 7.00 6.39 6.00 4.84 4.61 5.00 3.92 4.18 4.00 3.12 3.27 2.92 3.00 2.53 2.00 1.70 1.65 1.00 - Quartile 1 (SES 1.1) Quartile 2 (SES .71) Quartile 3 (SES .35) Quartile 4 (SES -.11) Direct cost Indirect cost Total 9/13/2012 Ponemon Institute: Private & Confidential Information 18
  • 19. Extrapolated cost of privacy programs $US millions (000,000 omitted) Analysis is based on Ponemon Institute’s 2012 benchmark on corporate privacy management (n=265 companies) This graph reports the average direct and indirect program spending for FY 2012 based on six expenditure or spending categories totaling $5.98 million. As can be seen, the two highest spending categories are data security ($1.55 million) and program management ($1.50 million). In contrast, the two lowest spending categories are redress and enforcement ($.30 million) and policies and procedures ($.60 million). While not shown separately, our benchmark sample of companies spend approximately 25% of budget on program management activities, which includes all costs associated with data breach incident management. $1.80 $1.55 $1.60 $1.50 $1.40 $1.20 $1.14 $1.00 $0.90 $0.80 $0.60 $0.60 $0.40 $0.30 $0.20 $- Policies & Training & Program Data security Compliance Redress & procedures communication management monitoring enforcement 9/13/2012 Ponemon Institute: Private & Confidential Information 19
  • 21. Benchmark study of 107 privacy influencers • Results in this report are based on Ponemon Institute’s proprietary database of privacy practices in US organizations. • Examined perceptions about data breach incident response management. • Purpose of analysis is to determine the value privacy leaders place on an automated tool or system to deal with the data breach incident management process. • The results indicate that privacy leaders believe automated management tools are important to deal with the data breach incident management process due to the numerous separate incidents that require ongoing tracking. 9/13/2012 Ponemon Institute: Private & Confidential Information 21
  • 22. Is there a need to have an automated tool or system to deal with the data breach incident management process? Benchmark question posed to 107 privacy leaders in U.S. based corporations 4% 15% Yes No Unsure 81% 9/13/2012 Ponemon Institute: Private & Confidential Information 22
  • 23. Do you have an automated data breach management tool or system today? Benchmark question posed to 107 privacy leaders in U.S. based corporations 2% 36% No Yes, homemade 62% Yes, commercial 9/13/2012 Ponemon Institute: Private & Confidential Information 23
  • 24. What is your company’s primary focus for data breach management issues? Benchmark question posed to 107 privacy leaders in U.S. based corporations 2% 6% 10% US Global North America 50% Europe/EU Latin America Asia-Pacific 31% 9/13/2012 Ponemon Institute: Private & Confidential Information 24
  • 25. Approximately, how many separate incidents require tracking over a 12-month period? Benchmark question posed to 107 privacy leaders in U.S. based corporations < 40 9% 21 to 40 15% 11 to 20 24% 5 to 10 36% 2 to 4 10% >2 5% 0% 5% 10% 15% 20% 25% 30% 35% 40% 9/13/2012 Ponemon Institute: Private & Confidential Information 25
  • 26. Need for a Data Breach Management Tool • Ponemon Institute’s tracking study of the cost of privacy programs reveals the potential market demand data breach incident management tool for the following reasons: – Cost effective – TCO of the tool versus labor costs and professional fees – A comprehensive and accurate repository of summarized privacy and data breach laws reduces research costs and legal services. – Benefits SMBs that cannot afford a fully-dedicated privacy staff. – Secures (lock-down) sensitive and confidential information concerning data breach incidents and events. – Avoid redundant or inconsistent operating practices and reduce operational complexity. • Ponemon Institute’s proprietary benchmarks on corporate privacy spending for larger- sized organizations (headcount > 1,000) reveal a substantial spending level for program management (which includes incident response) and data security measures. 9/13/2012 Ponemon Institute: Private & Confidential Information 26
  • 27. Questions? Ponemon Institute www.ponemon.org Tel: 231.938.9900 Toll Free: 800.887.3118 Michigan HQ: 2308 US 31 N. Traverse City, MI 49686 USA research@ponemon.org