SlideShare a Scribd company logo
SECURITY

Identify and plug the security skills gap

The business sector accounted for
Incidents by sector
Business

85%

of information security breaches in 2012
Records exposed by sector
Business

60.6%

Government

Government

17.9%

Education

Education

12.0%

Medical

84.7%

Medical

9.5%

12.6%
1.6%
1.1%

THE ISSUE

โ…”

senior IT executives
are concerned about
data privacy and
information breaches

In 2012, more than 267 million
data records were compromised in
2,644 reported incidents - up 117%
over the previous year

There are 50,000
victims of cybercrime
every hour

ATTACK

Hacking was the number
one breach type for the second
consecutive year in 2012

DEFENCE

Most common techniques

How breaches occur

0100101010010101
1000101001001111
01001010100101010100101010010101
0100101010010101
1000101001001111

Hacking
(81%)

Malware
(69%)

Physical
attacks
(10%)

Social
tactics
(7%)

THE SKILLS GAP

!
89% say that having quali๏ฌed

information security staff is a
top priority

92% say staffing issues
contribute to heightened
risk levels

Firewalls

Privilege
misuse
(5%)

?

In 2012, where insiders
were responsible for data
breaches, 56% of incidents
were accidental - the
result of user error and
inadequate training.

Antivirus

Data
encryption

80% believe it is difficult
to ๏ฌnd and hire staff that
๏ฌt all requirements

Intrusion
prevention

Monitoring
technologies

Do you know how to
identify and ๏ฌll the skills
gaps in your organisation?

READY TO STAY SECURE?

In an industry that's constantly
changing, you need to help your
people to stay ahead of the game

As The Chartered Institute for IT,
we're always up-to-date with the
latest trends

ยฉ BCS, The Chartered Institute for IT, is the business name of
The British Computer Society (Registered charity no. 292786) 2013

We can develop your employeesโ€™
skills so they can make decisions
critical to your business

Contact us on
+44 (0) 1793 417755
or visit enterprise.bcs.org
and help your team
meet the demands
of tomorrow.

Sources: โ€˜Data Breach Overview: An Executiveโ€™s Guide to Data Breach Trends in 2012โ€™, mobistealth.com, ๏ฌ‚oridatechonline.com,
siliconrepublic.com, โ€˜Surviving the Technical Security Skills Crisisโ€™ - Forrester Consulting on behalf of IBM,
โ€˜IT Executives Visionโ€™ - IDG Research Services conducted for HP for 2020 (May 12), ISC Global Information Security Workforce Study 2013

More Related Content

What's hot

Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)Arnold Bijlsma
ย 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec
ย 
Most expensive IT Security Incidents
Most expensive IT Security IncidentsMost expensive IT Security Incidents
Most expensive IT Security IncidentsARP
ย 
Mobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityMobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityZimperium
ย 
The Effect Of Lack Of Security On Industry
The Effect Of Lack Of Security On IndustryThe Effect Of Lack Of Security On Industry
The Effect Of Lack Of Security On Industrylilian91
ย 
The effect-of-lack-of-security-on-industry129
The effect-of-lack-of-security-on-industry129The effect-of-lack-of-security-on-industry129
The effect-of-lack-of-security-on-industry129Izwan Hariz
ย 
T.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyT.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyAdam Radly
ย 
State of Application Security: State of Piracy
State of Application Security: State of PiracyState of Application Security: State of Piracy
State of Application Security: State of PiracyIBM Security
ย 
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...ProductNation/iSPIRT
ย 
MobileSecurityInfographic_v3
MobileSecurityInfographic_v3MobileSecurityInfographic_v3
MobileSecurityInfographic_v3Carlos Villafane
ย 

What's hot (12)

Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
ย 
Infosecurity Europe - Infographic
Infosecurity Europe - InfographicInfosecurity Europe - Infographic
Infosecurity Europe - Infographic
ย 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
ย 
Most expensive IT Security Incidents
Most expensive IT Security IncidentsMost expensive IT Security Incidents
Most expensive IT Security Incidents
ย 
Mobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityMobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested Reality
ย 
lack of security
lack of securitylack of security
lack of security
ย 
The Effect Of Lack Of Security On Industry
The Effect Of Lack Of Security On IndustryThe Effect Of Lack Of Security On Industry
The Effect Of Lack Of Security On Industry
ย 
The effect-of-lack-of-security-on-industry129
The effect-of-lack-of-security-on-industry129The effect-of-lack-of-security-on-industry129
The effect-of-lack-of-security-on-industry129
ย 
T.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyT.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirty
ย 
State of Application Security: State of Piracy
State of Application Security: State of PiracyState of Application Security: State of Piracy
State of Application Security: State of Piracy
ย 
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
ย 
MobileSecurityInfographic_v3
MobileSecurityInfographic_v3MobileSecurityInfographic_v3
MobileSecurityInfographic_v3
ย 

Similar to Identify and plug the security skills gap

Data Loss Barometer 2012
Data Loss Barometer 2012Data Loss Barometer 2012
Data Loss Barometer 2012Charmaine Servado
ย 
โ€œThe Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
โ€œThe Impact of Mobile Devices on Information Security: A Survey of IT and Sec...โ€œThe Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
โ€œThe Impact of Mobile Devices on Information Security: A Survey of IT and Sec...Thierry Labro
ย 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistMatthew Rosenquist
ย 
Cyber Security Infographic
Cyber Security InfographicCyber Security Infographic
Cyber Security InfographicBooz Allen Hamilton
ย 
Pluribus vc hgs mkt overview
Pluribus vc hgs mkt overviewPluribus vc hgs mkt overview
Pluribus vc hgs mkt overviewTBJ Investments, LLC
ย 
U S Embassy Event - Todayโ€™S Cyber Threats
U S  Embassy  Event - Todayโ€™S  Cyber  ThreatsU S  Embassy  Event - Todayโ€™S  Cyber  Threats
U S Embassy Event - Todayโ€™S Cyber ThreatsNarinrit Prem-apiwathanokul
ย 
Emerging Risks, BCP & DRP
Emerging Risks, BCP & DRPEmerging Risks, BCP & DRP
Emerging Risks, BCP & DRPJorge Sebastiao
ย 
Information Technology Job Market
Information Technology Job MarketInformation Technology Job Market
Information Technology Job MarketGlenn McKnight
ย 
Information Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFInformation Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFAlexander Goodwin
ย 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistMatthew Rosenquist
ย 
State of IT security 2012
State of IT security 2012State of IT security 2012
State of IT security 2012Arun Bhatia
ย 
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and SystemsSteve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and SystemsIBM India Smarter Computing
ย 
Verizon DBIR 2021
Verizon DBIR 2021Verizon DBIR 2021
Verizon DBIR 2021SOCRadar Inc
ย 
It Job Market Upate Nov 2009
It Job Market Upate Nov 2009It Job Market Upate Nov 2009
It Job Market Upate Nov 2009Glenn McKnight
ย 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
ย 
ICT Security 262112 in Australia.pptx
ICT Security 262112 in Australia.pptxICT Security 262112 in Australia.pptx
ICT Security 262112 in Australia.pptxRPL For Australia
ย 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research TechSci Research
ย 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacySymantec
ย 
Key Cybersecurity trends that defined the threat landscape in 2022
Key Cybersecurity trends that defined the threat landscape in 2022Key Cybersecurity trends that defined the threat landscape in 2022
Key Cybersecurity trends that defined the threat landscape in 2022ProcessIT Global
ย 
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...IDC Italy
ย 

Similar to Identify and plug the security skills gap (20)

Data Loss Barometer 2012
Data Loss Barometer 2012Data Loss Barometer 2012
Data Loss Barometer 2012
ย 
โ€œThe Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
โ€œThe Impact of Mobile Devices on Information Security: A Survey of IT and Sec...โ€œThe Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
โ€œThe Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
ย 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
ย 
Cyber Security Infographic
Cyber Security InfographicCyber Security Infographic
Cyber Security Infographic
ย 
Pluribus vc hgs mkt overview
Pluribus vc hgs mkt overviewPluribus vc hgs mkt overview
Pluribus vc hgs mkt overview
ย 
U S Embassy Event - Todayโ€™S Cyber Threats
U S  Embassy  Event - Todayโ€™S  Cyber  ThreatsU S  Embassy  Event - Todayโ€™S  Cyber  Threats
U S Embassy Event - Todayโ€™S Cyber Threats
ย 
Emerging Risks, BCP & DRP
Emerging Risks, BCP & DRPEmerging Risks, BCP & DRP
Emerging Risks, BCP & DRP
ย 
Information Technology Job Market
Information Technology Job MarketInformation Technology Job Market
Information Technology Job Market
ย 
Information Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFInformation Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDF
ย 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
ย 
State of IT security 2012
State of IT security 2012State of IT security 2012
State of IT security 2012
ย 
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and SystemsSteve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
ย 
Verizon DBIR 2021
Verizon DBIR 2021Verizon DBIR 2021
Verizon DBIR 2021
ย 
It Job Market Upate Nov 2009
It Job Market Upate Nov 2009It Job Market Upate Nov 2009
It Job Market Upate Nov 2009
ย 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
ย 
ICT Security 262112 in Australia.pptx
ICT Security 262112 in Australia.pptxICT Security 262112 in Australia.pptx
ICT Security 262112 in Australia.pptx
ย 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
ย 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data Privacy
ย 
Key Cybersecurity trends that defined the threat landscape in 2022
Key Cybersecurity trends that defined the threat landscape in 2022Key Cybersecurity trends that defined the threat landscape in 2022
Key Cybersecurity trends that defined the threat landscape in 2022
ย 
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
ย 

More from BCS-IT

Careers in software testing
Careers in software testingCareers in software testing
Careers in software testingBCS-IT
ย 
Digital skills from BCS
Digital skills from BCSDigital skills from BCS
Digital skills from BCSBCS-IT
ย 
How to increase the business value of your IT team
How to increase the business value of your IT teamHow to increase the business value of your IT team
How to increase the business value of your IT teamBCS-IT
ย 
ITNOW magazine: June 2014 (sample)
ITNOW magazine: June 2014 (sample)ITNOW magazine: June 2014 (sample)
ITNOW magazine: June 2014 (sample)BCS-IT
ย 
IT Talent Management
IT Talent ManagementIT Talent Management
IT Talent ManagementBCS-IT
ย 
Map your IT career
Map your IT careerMap your IT career
Map your IT careerBCS-IT
ย 
Improve your skills with professional certification
Improve your skills with professional certificationImprove your skills with professional certification
Improve your skills with professional certificationBCS-IT
ย 
International skills and competency framework
International skills and competency frameworkInternational skills and competency framework
International skills and competency frameworkBCS-IT
ย 
Organizational efficiencies
Organizational efficienciesOrganizational efficiencies
Organizational efficienciesBCS-IT
ย 
IT user qualifications (for colleges and trainig centres)
IT user qualifications (for colleges and trainig centres)IT user qualifications (for colleges and trainig centres)
IT user qualifications (for colleges and trainig centres)BCS-IT
ย 
BYOD
BYODBYOD
BYODBCS-IT
ย 
IT Service Management information pack
IT Service Management information packIT Service Management information pack
IT Service Management information packBCS-IT
ย 
Business Analysis
Business AnalysisBusiness Analysis
Business AnalysisBCS-IT
ย 
A countdown to professional success
A countdown to professional successA countdown to professional success
A countdown to professional successBCS-IT
ย 
Big data
Big data Big data
Big data BCS-IT
ย 
Personal Development Plan
Personal Development PlanPersonal Development Plan
Personal Development PlanBCS-IT
ย 
Vocational Qualifications for Digital Skills
Vocational Qualifications for Digital SkillsVocational Qualifications for Digital Skills
Vocational Qualifications for Digital SkillsBCS-IT
ย 
BYOD
BYODBYOD
BYODBCS-IT
ย 

More from BCS-IT (18)

Careers in software testing
Careers in software testingCareers in software testing
Careers in software testing
ย 
Digital skills from BCS
Digital skills from BCSDigital skills from BCS
Digital skills from BCS
ย 
How to increase the business value of your IT team
How to increase the business value of your IT teamHow to increase the business value of your IT team
How to increase the business value of your IT team
ย 
ITNOW magazine: June 2014 (sample)
ITNOW magazine: June 2014 (sample)ITNOW magazine: June 2014 (sample)
ITNOW magazine: June 2014 (sample)
ย 
IT Talent Management
IT Talent ManagementIT Talent Management
IT Talent Management
ย 
Map your IT career
Map your IT careerMap your IT career
Map your IT career
ย 
Improve your skills with professional certification
Improve your skills with professional certificationImprove your skills with professional certification
Improve your skills with professional certification
ย 
International skills and competency framework
International skills and competency frameworkInternational skills and competency framework
International skills and competency framework
ย 
Organizational efficiencies
Organizational efficienciesOrganizational efficiencies
Organizational efficiencies
ย 
IT user qualifications (for colleges and trainig centres)
IT user qualifications (for colleges and trainig centres)IT user qualifications (for colleges and trainig centres)
IT user qualifications (for colleges and trainig centres)
ย 
BYOD
BYODBYOD
BYOD
ย 
IT Service Management information pack
IT Service Management information packIT Service Management information pack
IT Service Management information pack
ย 
Business Analysis
Business AnalysisBusiness Analysis
Business Analysis
ย 
A countdown to professional success
A countdown to professional successA countdown to professional success
A countdown to professional success
ย 
Big data
Big data Big data
Big data
ย 
Personal Development Plan
Personal Development PlanPersonal Development Plan
Personal Development Plan
ย 
Vocational Qualifications for Digital Skills
Vocational Qualifications for Digital SkillsVocational Qualifications for Digital Skills
Vocational Qualifications for Digital Skills
ย 
BYOD
BYODBYOD
BYOD
ย 

Recently uploaded

Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corp.
ย 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxCynthia Clay
ย 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...Khaled Al Awadi
ย 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiaFalcon Invoice Discounting
ย 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfSam H
ย 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementBojamma2
ย 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographerofm712785
ย 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomyOperational Excellence Consulting
ย 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdfDerekIwanaka1
ย 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdcreerey
ย 
Hyundai capital 2024 1quarter Earnings release
Hyundai capital 2024 1quarter Earnings releaseHyundai capital 2024 1quarter Earnings release
Hyundai capital 2024 1quarter Earnings releaseirhcs
ย 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdftjcomstrang
ย 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...PaulBryant58
ย 
G-Mica Wood Chip Particle board Table Design
G-Mica Wood Chip Particle board Table DesignG-Mica Wood Chip Particle board Table Design
G-Mica Wood Chip Particle board Table Designgmicaprelamdigital
ย 
New Product Development.kjiy7ggbfdsddggo9lo
New Product Development.kjiy7ggbfdsddggo9loNew Product Development.kjiy7ggbfdsddggo9lo
New Product Development.kjiy7ggbfdsddggo9logalbokkahewagenitash
ย 
IPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best ServiceIPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best ServiceDragon Dream Bar
ย 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...BBPMedia1
ย 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small businessBen Wann
ย 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxWorkforce Group
ย 

Recently uploaded (20)

Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024
ย 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
ย 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
ย 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
ย 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
ย 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
ย 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ย 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
ย 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
ย 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
ย 
Hyundai capital 2024 1quarter Earnings release
Hyundai capital 2024 1quarter Earnings releaseHyundai capital 2024 1quarter Earnings release
Hyundai capital 2024 1quarter Earnings release
ย 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
ย 
Communicative rationality and the evolution of business ethics: corporate soc...
Communicative rationality and the evolution of business ethics: corporate soc...Communicative rationality and the evolution of business ethics: corporate soc...
Communicative rationality and the evolution of business ethics: corporate soc...
ย 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
ย 
G-Mica Wood Chip Particle board Table Design
G-Mica Wood Chip Particle board Table DesignG-Mica Wood Chip Particle board Table Design
G-Mica Wood Chip Particle board Table Design
ย 
New Product Development.kjiy7ggbfdsddggo9lo
New Product Development.kjiy7ggbfdsddggo9loNew Product Development.kjiy7ggbfdsddggo9lo
New Product Development.kjiy7ggbfdsddggo9lo
ย 
IPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best ServiceIPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best Service
ย 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
ย 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
ย 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
ย 

Identify and plug the security skills gap

  • 1. SECURITY Identify and plug the security skills gap The business sector accounted for Incidents by sector Business 85% of information security breaches in 2012 Records exposed by sector Business 60.6% Government Government 17.9% Education Education 12.0% Medical 84.7% Medical 9.5% 12.6% 1.6% 1.1% THE ISSUE โ…” senior IT executives are concerned about data privacy and information breaches In 2012, more than 267 million data records were compromised in 2,644 reported incidents - up 117% over the previous year There are 50,000 victims of cybercrime every hour ATTACK Hacking was the number one breach type for the second consecutive year in 2012 DEFENCE Most common techniques How breaches occur 0100101010010101 1000101001001111 01001010100101010100101010010101 0100101010010101 1000101001001111 Hacking (81%) Malware (69%) Physical attacks (10%) Social tactics (7%) THE SKILLS GAP ! 89% say that having quali๏ฌed information security staff is a top priority 92% say staffing issues contribute to heightened risk levels Firewalls Privilege misuse (5%) ? In 2012, where insiders were responsible for data breaches, 56% of incidents were accidental - the result of user error and inadequate training. Antivirus Data encryption 80% believe it is difficult to ๏ฌnd and hire staff that ๏ฌt all requirements Intrusion prevention Monitoring technologies Do you know how to identify and ๏ฌll the skills gaps in your organisation? READY TO STAY SECURE? In an industry that's constantly changing, you need to help your people to stay ahead of the game As The Chartered Institute for IT, we're always up-to-date with the latest trends ยฉ BCS, The Chartered Institute for IT, is the business name of The British Computer Society (Registered charity no. 292786) 2013 We can develop your employeesโ€™ skills so they can make decisions critical to your business Contact us on +44 (0) 1793 417755 or visit enterprise.bcs.org and help your team meet the demands of tomorrow. Sources: โ€˜Data Breach Overview: An Executiveโ€™s Guide to Data Breach Trends in 2012โ€™, mobistealth.com, ๏ฌ‚oridatechonline.com, siliconrepublic.com, โ€˜Surviving the Technical Security Skills Crisisโ€™ - Forrester Consulting on behalf of IBM, โ€˜IT Executives Visionโ€™ - IDG Research Services conducted for HP for 2020 (May 12), ISC Global Information Security Workforce Study 2013