SlideShare a Scribd company logo
1 of 8
Critical Infrastructure Protection Survey
Key Findings
Methodology
• Survey performed by Applied Research
• Surveyed CIP-specific industries
  – All industries from last year
  – Added 8 new industries this year (all on CIP list)
• 3,475 respondents
  – 1,900 SMBs (5 – 499 employees)
  – 1,575 enterprises (>1,000 US, >500 ROW)
• Spoke to person in charge of computers


                                                         2
Key Findings
• Lower awareness & engagement in government CIP programs
• Slightly more ambivalence about government CIP programs
• Organizations feel less prepared
Lower Awareness & Engagement in Government CIP
Programs
• Lower awareness of government CIP programs in their country (36% vs. 55%)
• Less engaged in government CIP programs (37% vs. 56%)
Slightly More Ambivalence About Government CIP
Programs
• More are ‘neutral’ or have ‘no opinion’ about government CIP programs
  (42% vs. 26%)
• Slightly less willing to cooperate (57% vs. 66%)
Organizations Feel Less Prepared
• Slight decrease in their self-assessment of readiness (-8%)
• Self-assessment of safeguards shows decline in readiness (-5 to -10%)
Recommendations: Protecting Critical Infrastructure
• Develop and enforce IT policies, automate all compliance processes
• Adopt a proactive, information-centric approach to protecting information
  and interactions
• Manage systems by implementing secure operating environments
• Protect the infrastructure by securing endpoints, messaging and Web
  environments
• Ensure 24x7 availability
• Develop an information management strategy that includes an information
  retention plan and policies
Recommendations for Government
• Continue to put forth the resources to establish government critical
  infrastructure programs
• Partner with industry associations and private enterprise groups to
  disseminate information to raise awareness of CIP organizations and plans
• Emphasize that security is not enough to stay resilient in the face of today’s
  cyberattacks

More Related Content

What's hot

Federal Risk and Authorization Management Program: Assessment and Recommendat...
Federal Risk and Authorization Management Program: Assessment and Recommendat...Federal Risk and Authorization Management Program: Assessment and Recommendat...
Federal Risk and Authorization Management Program: Assessment and Recommendat...John Gilligan
 
Annual Results and Impact Evaluation Workshop for RBF - Day Eight - IE and HR...
Annual Results and Impact Evaluation Workshop for RBF - Day Eight - IE and HR...Annual Results and Impact Evaluation Workshop for RBF - Day Eight - IE and HR...
Annual Results and Impact Evaluation Workshop for RBF - Day Eight - IE and HR...RBFHealth
 
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...ARC Advisory Group
 
Webinar: Energy Data - The New Profit Lever
Webinar: Energy Data - The New Profit LeverWebinar: Energy Data - The New Profit Lever
Webinar: Energy Data - The New Profit LeverUrjanet
 
Compliance Strategies, Cara Maguire
Compliance Strategies, Cara MaguireCompliance Strategies, Cara Maguire
Compliance Strategies, Cara MaguireOECD Governance
 
TMForum Network Asset Management Survey Report 2014
TMForum Network Asset Management Survey Report 2014TMForum Network Asset Management Survey Report 2014
TMForum Network Asset Management Survey Report 2014Subex
 
Protecting PHi- 1-2016
Protecting PHi-  1-2016Protecting PHi-  1-2016
Protecting PHi- 1-2016Bill Steuer
 
Practical Measures for Measuring Security
Practical Measures for Measuring SecurityPractical Measures for Measuring Security
Practical Measures for Measuring SecurityChris Mullins
 
Clean Energy: Structure and Role of Regulators
Clean Energy: Structure and Role of RegulatorsClean Energy: Structure and Role of Regulators
Clean Energy: Structure and Role of RegulatorsLeonardo ENERGY
 
Inspiring Trust and Transparency: Skyword's Compliance with GDPR [Webinar]
Inspiring Trust and Transparency: Skyword's Compliance with GDPR [Webinar]Inspiring Trust and Transparency: Skyword's Compliance with GDPR [Webinar]
Inspiring Trust and Transparency: Skyword's Compliance with GDPR [Webinar]Skyword Inc.
 
VidSys Public Safety Solution Sheet
VidSys Public Safety Solution SheetVidSys Public Safety Solution Sheet
VidSys Public Safety Solution SheetVidSys, Inc.
 
Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000
Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000
Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000Mercatus Center
 
Integrating efficiency into healthcare - A life cycle approach
Integrating efficiency into healthcare  - A life cycle approachIntegrating efficiency into healthcare  - A life cycle approach
Integrating efficiency into healthcare - A life cycle approachEstellesc
 
A systems engineering approach to cannabis product development.v1.03 21-19
A systems engineering approach to cannabis product development.v1.03 21-19A systems engineering approach to cannabis product development.v1.03 21-19
A systems engineering approach to cannabis product development.v1.03 21-19Jacklyn R. Green
 

What's hot (20)

Infographic the new era of corporate continuity of operations
Infographic the new era of corporate continuity of operationsInfographic the new era of corporate continuity of operations
Infographic the new era of corporate continuity of operations
 
Federal Risk and Authorization Management Program: Assessment and Recommendat...
Federal Risk and Authorization Management Program: Assessment and Recommendat...Federal Risk and Authorization Management Program: Assessment and Recommendat...
Federal Risk and Authorization Management Program: Assessment and Recommendat...
 
Annual Results and Impact Evaluation Workshop for RBF - Day Eight - IE and HR...
Annual Results and Impact Evaluation Workshop for RBF - Day Eight - IE and HR...Annual Results and Impact Evaluation Workshop for RBF - Day Eight - IE and HR...
Annual Results and Impact Evaluation Workshop for RBF - Day Eight - IE and HR...
 
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
 
Webinar: Energy Data - The New Profit Lever
Webinar: Energy Data - The New Profit LeverWebinar: Energy Data - The New Profit Lever
Webinar: Energy Data - The New Profit Lever
 
Cobit v5 High Level Controls Topology
Cobit v5 High Level Controls TopologyCobit v5 High Level Controls Topology
Cobit v5 High Level Controls Topology
 
Compliance Strategies, Cara Maguire
Compliance Strategies, Cara MaguireCompliance Strategies, Cara Maguire
Compliance Strategies, Cara Maguire
 
TMForum Network Asset Management Survey Report 2014
TMForum Network Asset Management Survey Report 2014TMForum Network Asset Management Survey Report 2014
TMForum Network Asset Management Survey Report 2014
 
Protecting PHi- 1-2016
Protecting PHi-  1-2016Protecting PHi-  1-2016
Protecting PHi- 1-2016
 
Work on Primary Care Spending Measures
Work on Primary Care Spending MeasuresWork on Primary Care Spending Measures
Work on Primary Care Spending Measures
 
The state of open data in Canada & the Open Data Barometer
The state of open data in Canada & the Open Data BarometerThe state of open data in Canada & the Open Data Barometer
The state of open data in Canada & the Open Data Barometer
 
Practical Measures for Measuring Security
Practical Measures for Measuring SecurityPractical Measures for Measuring Security
Practical Measures for Measuring Security
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Clean Energy: Structure and Role of Regulators
Clean Energy: Structure and Role of RegulatorsClean Energy: Structure and Role of Regulators
Clean Energy: Structure and Role of Regulators
 
Horizon Scan 2016 Results Webinar
Horizon Scan 2016 Results WebinarHorizon Scan 2016 Results Webinar
Horizon Scan 2016 Results Webinar
 
Inspiring Trust and Transparency: Skyword's Compliance with GDPR [Webinar]
Inspiring Trust and Transparency: Skyword's Compliance with GDPR [Webinar]Inspiring Trust and Transparency: Skyword's Compliance with GDPR [Webinar]
Inspiring Trust and Transparency: Skyword's Compliance with GDPR [Webinar]
 
VidSys Public Safety Solution Sheet
VidSys Public Safety Solution SheetVidSys Public Safety Solution Sheet
VidSys Public Safety Solution Sheet
 
Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000
Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000
Ellig Mc Tigue Richardson Outcome Based Scrutiny 2000
 
Integrating efficiency into healthcare - A life cycle approach
Integrating efficiency into healthcare  - A life cycle approachIntegrating efficiency into healthcare  - A life cycle approach
Integrating efficiency into healthcare - A life cycle approach
 
A systems engineering approach to cannabis product development.v1.03 21-19
A systems engineering approach to cannabis product development.v1.03 21-19A systems engineering approach to cannabis product development.v1.03 21-19
A systems engineering approach to cannabis product development.v1.03 21-19
 

Viewers also liked

Simple webapps with nginx, uwsgi emperor and bottle
Simple webapps with nginx, uwsgi emperor and bottleSimple webapps with nginx, uwsgi emperor and bottle
Simple webapps with nginx, uwsgi emperor and bottleJordi Soucheiron
 
EuroPython 2014 - How we switched our 800+ projects from Apache to uWSGI
EuroPython 2014 - How we switched our 800+ projects from Apache to uWSGIEuroPython 2014 - How we switched our 800+ projects from Apache to uWSGI
EuroPython 2014 - How we switched our 800+ projects from Apache to uWSGIMax Tepkeev
 
uWSGI - Swiss army knife for your Python web apps
uWSGI - Swiss army knife for your Python web appsuWSGI - Swiss army knife for your Python web apps
uWSGI - Swiss army knife for your Python web appsTomislav Raseta
 
Getting Started with ASP.net Core 1.0
Getting Started with ASP.net Core 1.0Getting Started with ASP.net Core 1.0
Getting Started with ASP.net Core 1.0joescars
 
An Introduction to OAuth 2
An Introduction to OAuth 2An Introduction to OAuth 2
An Introduction to OAuth 2Aaron Parecki
 
Scalable Django Architecture
Scalable Django ArchitectureScalable Django Architecture
Scalable Django ArchitectureRami Sayar
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
containerd and CRI
containerd and CRIcontainerd and CRI
containerd and CRIDocker, Inc.
 

Viewers also liked (10)

Simple webapps with nginx, uwsgi emperor and bottle
Simple webapps with nginx, uwsgi emperor and bottleSimple webapps with nginx, uwsgi emperor and bottle
Simple webapps with nginx, uwsgi emperor and bottle
 
EuroPython 2014 - How we switched our 800+ projects from Apache to uWSGI
EuroPython 2014 - How we switched our 800+ projects from Apache to uWSGIEuroPython 2014 - How we switched our 800+ projects from Apache to uWSGI
EuroPython 2014 - How we switched our 800+ projects from Apache to uWSGI
 
uWSGI - Swiss army knife for your Python web apps
uWSGI - Swiss army knife for your Python web appsuWSGI - Swiss army knife for your Python web apps
uWSGI - Swiss army knife for your Python web apps
 
Getting Started with ASP.net Core 1.0
Getting Started with ASP.net Core 1.0Getting Started with ASP.net Core 1.0
Getting Started with ASP.net Core 1.0
 
nginx入門
nginx入門nginx入門
nginx入門
 
An Introduction to OAuth 2
An Introduction to OAuth 2An Introduction to OAuth 2
An Introduction to OAuth 2
 
Scalable Django Architecture
Scalable Django ArchitectureScalable Django Architecture
Scalable Django Architecture
 
ASP.NET Core 1.0 Overview
ASP.NET Core 1.0 OverviewASP.NET Core 1.0 Overview
ASP.NET Core 1.0 Overview
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
containerd and CRI
containerd and CRIcontainerd and CRI
containerd and CRI
 

Similar to Symantec 2011 CIP Survey Global Results

Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseGeorge Goodall
 
Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1jmariani14
 
ILRI program outline: Impact at Scale
ILRI program outline: Impact at ScaleILRI program outline: Impact at Scale
ILRI program outline: Impact at ScaleILRI
 
Moving to the Cloud: Modernizing Data Architecture in Healthcare
Moving to the Cloud: Modernizing Data Architecture in HealthcareMoving to the Cloud: Modernizing Data Architecture in Healthcare
Moving to the Cloud: Modernizing Data Architecture in HealthcarePerficient, Inc.
 
Security Architecture
Security ArchitectureSecurity Architecture
Security ArchitecturePriyank Hada
 
2 growth, concept and design
2 growth, concept and design2 growth, concept and design
2 growth, concept and designsakshi garg
 
Jisc's cyber security posture survey - how secure are you?
Jisc's cyber security posture survey - how secure are you?Jisc's cyber security posture survey - how secure are you?
Jisc's cyber security posture survey - how secure are you?Jisc
 
Creating a culture for data use: It takes a system strengthening approach
 Creating a culture for data use: It takes asystem strengthening approach Creating a culture for data use: It takes asystem strengthening approach
Creating a culture for data use: It takes a system strengthening approachGolam Kibria Madhurza
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickJacqueline Fick
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to Leaderaccenture
 
The Roadmap to Becoming a Top Performing Organization in Managing IT Operations
The Roadmap to Becoming a Top Performing Organization in Managing IT OperationsThe Roadmap to Becoming a Top Performing Organization in Managing IT Operations
The Roadmap to Becoming a Top Performing Organization in Managing IT OperationsDigital Enterprise Journal
 
Is Your Agency Data Challenged?
Is Your Agency Data Challenged?Is Your Agency Data Challenged?
Is Your Agency Data Challenged?DLT Solutions
 
2012 Information Retention and eDiscovery Survey Global Results
2012 Information Retention and eDiscovery Survey Global Results2012 Information Retention and eDiscovery Survey Global Results
2012 Information Retention and eDiscovery Survey Global ResultsSymantec
 
inSupply Overview Presentation
inSupply Overview PresentationinSupply Overview Presentation
inSupply Overview PresentationinSupply
 
IT Governance Presentation by omaha 2008
IT Governance Presentation by  omaha 2008IT Governance Presentation by  omaha 2008
IT Governance Presentation by omaha 2008ssusera19f45
 
IT governance in the public sector: a conceptual model
IT governance in the public sector: a conceptual modelIT governance in the public sector: a conceptual model
IT governance in the public sector: a conceptual modelRiri Kusumarani
 
Monitoring & Evaluation of National Adaptation: Key challenges and emerging s...
Monitoring & Evaluation of National Adaptation: Key challenges and emerging s...Monitoring & Evaluation of National Adaptation: Key challenges and emerging s...
Monitoring & Evaluation of National Adaptation: Key challenges and emerging s...NAP Global Network
 
Canada’s innovation agenda apr 13, 2017
Canada’s innovation agenda apr 13, 2017Canada’s innovation agenda apr 13, 2017
Canada’s innovation agenda apr 13, 2017Karim Keshavjee
 

Similar to Symantec 2011 CIP Survey Global Results (20)

Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
 
Benchmarking IT Agility Final Report
Benchmarking IT Agility Final ReportBenchmarking IT Agility Final Report
Benchmarking IT Agility Final Report
 
Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1
 
ILRI program outline: Impact at Scale
ILRI program outline: Impact at ScaleILRI program outline: Impact at Scale
ILRI program outline: Impact at Scale
 
Moving to the Cloud: Modernizing Data Architecture in Healthcare
Moving to the Cloud: Modernizing Data Architecture in HealthcareMoving to the Cloud: Modernizing Data Architecture in Healthcare
Moving to the Cloud: Modernizing Data Architecture in Healthcare
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
2 growth, concept and design
2 growth, concept and design2 growth, concept and design
2 growth, concept and design
 
Jisc's cyber security posture survey - how secure are you?
Jisc's cyber security posture survey - how secure are you?Jisc's cyber security posture survey - how secure are you?
Jisc's cyber security posture survey - how secure are you?
 
Creating a culture for data use: It takes a system strengthening approach
 Creating a culture for data use: It takes asystem strengthening approach Creating a culture for data use: It takes asystem strengthening approach
Creating a culture for data use: It takes a system strengthening approach
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to Leader
 
The Roadmap to Becoming a Top Performing Organization in Managing IT Operations
The Roadmap to Becoming a Top Performing Organization in Managing IT OperationsThe Roadmap to Becoming a Top Performing Organization in Managing IT Operations
The Roadmap to Becoming a Top Performing Organization in Managing IT Operations
 
Is Your Agency Data Challenged?
Is Your Agency Data Challenged?Is Your Agency Data Challenged?
Is Your Agency Data Challenged?
 
2012 Information Retention and eDiscovery Survey Global Results
2012 Information Retention and eDiscovery Survey Global Results2012 Information Retention and eDiscovery Survey Global Results
2012 Information Retention and eDiscovery Survey Global Results
 
inSupply Overview Presentation
inSupply Overview PresentationinSupply Overview Presentation
inSupply Overview Presentation
 
IT Governance Presentation by omaha 2008
IT Governance Presentation by  omaha 2008IT Governance Presentation by  omaha 2008
IT Governance Presentation by omaha 2008
 
Enterprise Agile Adoption
Enterprise Agile AdoptionEnterprise Agile Adoption
Enterprise Agile Adoption
 
IT governance in the public sector: a conceptual model
IT governance in the public sector: a conceptual modelIT governance in the public sector: a conceptual model
IT governance in the public sector: a conceptual model
 
Monitoring & Evaluation of National Adaptation: Key challenges and emerging s...
Monitoring & Evaluation of National Adaptation: Key challenges and emerging s...Monitoring & Evaluation of National Adaptation: Key challenges and emerging s...
Monitoring & Evaluation of National Adaptation: Key challenges and emerging s...
 
Canada’s innovation agenda apr 13, 2017
Canada’s innovation agenda apr 13, 2017Canada’s innovation agenda apr 13, 2017
Canada’s innovation agenda apr 13, 2017
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Symantec 2011 CIP Survey Global Results

  • 2. Methodology • Survey performed by Applied Research • Surveyed CIP-specific industries – All industries from last year – Added 8 new industries this year (all on CIP list) • 3,475 respondents – 1,900 SMBs (5 – 499 employees) – 1,575 enterprises (>1,000 US, >500 ROW) • Spoke to person in charge of computers 2
  • 3. Key Findings • Lower awareness & engagement in government CIP programs • Slightly more ambivalence about government CIP programs • Organizations feel less prepared
  • 4. Lower Awareness & Engagement in Government CIP Programs • Lower awareness of government CIP programs in their country (36% vs. 55%) • Less engaged in government CIP programs (37% vs. 56%)
  • 5. Slightly More Ambivalence About Government CIP Programs • More are ‘neutral’ or have ‘no opinion’ about government CIP programs (42% vs. 26%) • Slightly less willing to cooperate (57% vs. 66%)
  • 6. Organizations Feel Less Prepared • Slight decrease in their self-assessment of readiness (-8%) • Self-assessment of safeguards shows decline in readiness (-5 to -10%)
  • 7. Recommendations: Protecting Critical Infrastructure • Develop and enforce IT policies, automate all compliance processes • Adopt a proactive, information-centric approach to protecting information and interactions • Manage systems by implementing secure operating environments • Protect the infrastructure by securing endpoints, messaging and Web environments • Ensure 24x7 availability • Develop an information management strategy that includes an information retention plan and policies
  • 8. Recommendations for Government • Continue to put forth the resources to establish government critical infrastructure programs • Partner with industry associations and private enterprise groups to disseminate information to raise awareness of CIP organizations and plans • Emphasize that security is not enough to stay resilient in the face of today’s cyberattacks