2016年全球信息安全状况调查 - 网络安全领域的转变和转型_en_201603_第1页
2016年全球信息安全状况调查 - 网络安全领域的转变和转型_en_201603_第2页
2016年全球信息安全状况调查 - 网络安全领域的转变和转型_en_201603_第3页
2016年全球信息安全状况调查 - 网络安全领域的转变和转型_en_201603_第4页
2016年全球信息安全状况调查 - 网络安全领域的转变和转型_en_201603_第5页
已阅读5页,还剩27页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、/gsissTurnaround and transformationin cybersecurityKey findings from The Global State of Information Security Survey2016Turnaround and transformation in cybersecurity: Key findings from The Global State of Information Security Survey 2016Table of contentsGlobal responses to rising risks2R

2、eclaiming cybersecurity through innovationThe rewards of risk-based frameworksHarnessing the power of cloud-enabled cybersecurity The big impact of Big DataReplacingpasswords with advanced authentication Gearing up for the Internet of ThingsGoing mobile with paymentsPartnering up to sharpen security

3、 intelligence445689121315What cant be protected can beuredThe evolving involvement of executives and the BoardBoards are more involved in cybersecurityDue diligence of cybersecurity in M&As181921Fit for the future of cybersecurity22Appendix A: Responding to rising cyber-risks24Methodology27PwC cyber

4、security and privacy contacts by country28iPwCGlobal responses to risingrisksThe numbers have become numbing.Year after year, cyberattacks continue to escalate in frequency, severity and impact. Prevention and detection methods have proved largely38%Increase in detected information security incident

5、sineffective agat increasingly adeptassaults, and many organizationsdont know what to do, or dont have the resources to combat highly skilled and aggressive cybercriminals.“Many executives are declaring cyber as the risk that will define our generation,” said Dennis Chesley, Global Risk Consulting L

6、eader for PwC.22Turnaround and transformation in cybersecurity: Key findings from The Global State of Information Security Survey 2016At the same time, technologicalchange continues to disrupt how organizations compete and create value in ways that often alteroperating models. Some of todays most si

7、gnificant business trends the explosion of data analytics, the digitization of business functions and a blending of service offerings across industries, to name a few have expanded the use of technologies and data, and that is creating more risk than ever before.Forward-leaning business leadersalso

8、are rethinking their cybersecurity practices and focusing on a nexusof innovative technologies that can reduce these risks and improve business performance. If there is one unifying element among these technologies, it is cloud computing. The cloud is central to todays interconnected digital ecosyst

9、em for individuals, businesses and governments. Furthermore, itis the platform that is enabling organizations of all sizes to leverage and link cloud-based cybersecurity tools, Big Data analytics and advanced authentication. The cloud also is the conduit that underpnew technology platforms like the

10、Internet of Things (IoT) and mobile payment systems.essential. Thats why many aremoving toward a more collaborative approach to cybersecurity, onein which intelligence on threats and response techniques are shared with external partners in the public and private sectors.Internally, businesses are ex

11、pandingthe roles of key executives and Boards of Directors to allow for enhanced communication of cyberthreat information and help build better-prepared, moreresilient cybersecurity capabilities. They also are implementing awareness programs to help educate employees and executives about cybersecuri

12、ty fundamentals and human vulnerabilities like spearIn addition, many executives seeover-regulation as a prime long-term disruptive trend in their industries. Other government impacts, including nation-state use of state- directed capital to fund and execute cyberattacks, have increasinglyserious im

13、plications for cybersecurity.phishing, which remaa verysuccessful attack technique.Simply put, cloud computing hashad a towering impact on technology innovation in the past decadeand is likely to continue to do so. Research firm IDC predicts that spending on public cloud computing will soar to nearl

14、y $70 billion this year, and that the number of new cloud-based solutions will triple over the next four to fiveyears.1Another notable measure ofprogress is a willingness to invest in cybersecurity. This year, respondents to The Global State of Information Security Survey 2016 reported they have boo

15、sted information security spending significantly, and many are gearing up to tackle the cybersecurity juggernaut head on. (For details on incidents, impacts and costs, seeAppendix A). In this report, well show you how innovative businesses are going about this challenge,and how these efforts connect

16、 and intersect in ways that enable them to implement an integrated approach to protecting assets, reputationand competitive advantages.Together, these issues illustrate whycybersecurity risks have become top of mind for leaders in business and government. “Many executives are declaring cyber as the

17、riskthat will define our generation,” said Dennis Chesley, Global Risk Consulting Leader for PwC. “Asa result, businesses are taking an enterprise-wide business-oriented view of this important risk area.”Technology alone wont turnaround the state of cybersecurity, however. Smart organizations have a

18、lways known that the human side of the security equation is equally1 IDC, Public Cloud Computing to Reach Nearly $70 billion in 2015 Worldwide, According to IDC, July 21, 20153PwCReclaiming cybersecurity through innovationThe rewards of risk-based frameworksAn effective cybersecurity program starts

19、with a strategy and a foundation based on risks. So it was encouraging to find that the vast majority of organizations have adopted a security framework, or more often an amalgam of frameworksoften with very productive results.Risk-based frameworks also canhelp businesses design, measure and monitor

20、 goals toward an improved cybersecurity program that centers around the safety and security of client and organizational information. The Canadian Imperial Bank of Commerce (CIBC), fortance, has developed ascorecard based on framework controls that it uses to measure the maturity of its security pro

21、gram, accordingto Joe LoBianco, vice president of information security for the Toronto- based bank. “If we didnt have that framework providing the structure, progress would be difficult to measure year over year,” he said.91%The two most frequently implementedguidelines are ISO 27001 and the USHave

22、adopted a risk-based cybersecurity frameworkNationaltitute of Standards andTechnology (NIST) CybersecurityFramework. These guidelines enable organizations to identify and prioritize risks, gauge the maturity of their cybersecurity practices and better communicate internally and externally.Benefits o

23、f security frameworks49%Better able to identify & prioritize security risks47%Better able to quickly detect & mitigate security incidents45%Sensitive data is more secure37%Better understand security gaps & how to improve themImproved internal & external collaboration& communications32%4Turnaround an

24、d transformation in cybersecurity: Key findings from The Global State of Information Security Survey 201669%Harnessing the powerof cloud-enabled cybersecurityCloud computing has emerged as a sophisticated tool for cybersecurity safeguards in recent years ascloud providers steadily invested in advanc

25、ed technologies for data protection, privacy, network security and identity and access management. Many also haveadded capabilities that enable them to improve intelligence gathering and threat modeling, better block attacks, enhance collective learning and accelerate incident response.task because

26、cloud providers havemassive processing horsepower necessary to quickly sift through a huge volume of threat and event data, he said. In addition, cloud providers are likely to have internal expertisein building algorithms for analytics, which is a difficult skill set for most corporations to develop

27、 and grow.Another example of adoption ofcloud-based cybersecurity comes from Steelcase, the Grand Rapids, MI-based office furniture company.Steelcase employs a range ofcloud-based managed services that include advanced authentication, penetration and vulnerability testing, security alert analysis an

28、d network behavior analysis, according to Stuart Berman, IT security architectUse cloud-based cybersecurity servicesIts no wonder, then, that most surveyrespondents said they use cloud- based security services to help protect sensitive data and strengthen privacy. And they entrust a broadening range

29、 of critical services to the cloud, including real-time monitoring and analytics, advanced authentication and identity and access management.Adoption of cloud-based cybersecurity services56%55%Fortance, Global Payments, a48%worldwide provider of paymenttechnology services based in Atlanta, leverages

30、 private cloud managed services to handle threat monitoring and incident response. “We use a cloud-based solution that aggregates all of our alerts and threat information, and the solution then filters out events or alerts that are either considered not a security threat or are a false positive,” sa

31、id Guido Sacchi, the companys executive vice president and CIO. “It then communicatesevents that our Security Operations Center SOC needs to investigate.” The cloud is ideal for this type of47%44%Real-time monitoring & analyticsAdvanced authenticationIdentity & access managementThreat intelligenceEn

32、d-point protection5PwCand innovation fellow. These cloudservices have helped the company build a security program that is capable as well as cost-effective. “The use of cloud-based managed security services, which require very deep and specific technical expertise, allows our full-time security empl

33、oyees to focus on identifying and managing security problems, rather than building and maintaining deep technical knowledge. That enables us to better manage costs based on risks,” Berman said.The synergies of cloud and DevOpsWeb-based companies are enhancing and automating their cybersecurity progr

34、ams through the adoption of DevOps, a software development model that promotes close collaboration between application developers and IT operations. This agile approach is particularly beneficial for companies that have thousands of active applications, as well as those that deploy code updates very

35、 frequently. Streaming media provider Netflix, for example, employs DevOps to automate tasks like identifying changes in configurations across dozens of cloud services accounts.2When aligned with cloud-enabled services, DevOps can deliver powerfulenhancements to cybersecurity programs. Heres what th

36、e fusion of DevOps and cloud-based cybersecurity could look like: When an intruder modifies application code, automated analytics and monitoring software identifies the breach, terminates connections and alerts developers. Cybersecurity engineers then pinpoint changes made by adversaries and repair

37、the code. The system can then reroute all user traffic to the updated version and automaticallyissue a patch for all other vulnerable applications across the enterprise.The big impactof Big DataA growing number of organizations are leveraging Big Data analytics to model and monitor for cybersecurity

38、 threats, respond to incidents, and audit and review data to understand how it is used, by whom and when.behavior for suspicious activity.But Big Data analytics typicallyrequires an enormous commitment to computing resources and software expertise. Companies like Global Payments address these challe

39、nges by using a cloud-based solutionto analyze the aggregated system log data because the cloud can better handle the heavy computing demands of such analysis.59%“Data analytics is an area that wereinvesting in right now,” said LoBianco of CIBC. “I think its going to be a significant growth area for

40、 us in the security space, one that will change how we do our work the most.”A data-driven approach can shiftsecurity away from perimeter-based defenses and enable organizations to put real-time information to use in ways that can help predict security incidents. Data-driven cybersecurity enables co

41、mpanies to better understand anomalous network activity and more quickly identify and respond to security incidents. It also can be effective in reducing or quickly detecting employee security incidents by monitoring theirData analytics also can be combinedwith existing security information and even

42、t management (SIEM) technologies to generate a more customizable and extensive view of network activity. CIBC is testing a new analytics-based threat detection and monitoring system to augment traditional rule-based SIEM, according to LoBianco. “This will essentially take data that weLeverage Big Da

43、ta analytics for security2 Netflix, Announcing Security Monkey-AWS Security Configuration and Monitoring, June 30, 20146Turnaround and transformation in cybersecurity: Key findings from The Global State of Information Security Survey 2016Benefits of data-driven cybersecurity61%49%41%40%39%Better und

44、erstanding of external threatsBetter understanding of internal threatsBetter understanding of user behaviorBetter visibility into anomalous network activityImproved ability to quickly identify & respond to security incidentscollect for SIEM, as well as someadditional data, and provide a more open-en

45、ded and exploratory capability that will support ourSecurity Operations Center in threatdetection and monitoring,” he said.the data analysis solution looksfor patterns around the employee access entitlements and then identifies unwanted access.unknown network performanceissues. “Data analytics can h

46、elp you find the needle in the haystack, and the needle in the haystack is not only the security needle, sometimes its a performance needle,” Berman said. “Thats what Big Data analysis is really good at: Finding patterns you didnt know existed and not necessarily answering questions you have but ans

47、wering questions you didnt have.”This kind of wide-open view canhelp companies improve systems in unexpected ways. Steelcase,Other organizations are exploringthe use of data analytics for identity and access management to monitor employee usage patterns and flag outliers. In this scenario,fortance,

48、deployed analytics tomonitor for advanced persistentthreats andider risks, but it alsofound that Big Data helped identify“Data analytics is an area that were investing in right now,” said Joe LoBianco of CIBC. “I think its going to be a significant growth area for us in the security space, one that

49、will change how we doour work the most.”7PwCReplacing passwordswith advanced authenticationIn an era in which passwords are generally considered inadequate, at best, its easy to understand why many organizations are turning to advanced authentication to helpmanageaccess and improve trust among custo

50、mers and business partners.Banks, in particular, are moving awayfrom traditional passwords for both clients and employees. LoBiancoof CIBC says one-time passwords sent to a clients mobile phone have proved popular with users and have enabled the bank to enhance its data security while trimming suppo

51、rt desk costs. CIBC is also using two-factor authentication for employeeswithprivileged access to networks and data. Many employees already have strong- authentication tokens for remote access, and the bank is leveragingthe same token for privileged access wherever possible, he said.91%Use advanced

52、authenticationAs noted above, many organizations areembracing advanced authenticationas a cloud service. The reason is pretty apparent, considering that many high- profile hacks begin with compromised credentials. “If youre counting on passwords for security, youve got a problem,” said Berman of Ste

53、elcase, which uses a combination of one-time passwords and hardware tokens with cloud-based authentication platforms.Other businesses are developing andimplementing more advanced on- premises authentication technologies such as biometrics. USAA, the San Antonio, TX-based financial servicesandurance

54、firm that caters tomilitary veterans and service members,has implemented facial and voice recognition and fingerprint scanning for customer access to mobile apps.3 Biometrics has enabled USAA to enhance security andcustomer service, reduce help desk calls and improve ease of use for customers.Benefi

55、ts of advanced authentication50%Improved customer/business partner confidenceecurity & privacyAnother approach is hardware-basedauthentication. Tech giant Google has developed a USB device called Security Key that provides highly secure two-factor authentication for its Google for Work applications.

56、4 Using the FIDO Alliances Universal 2nd Factor (U2F) standard, the Security Key transmits an encrypted signature rather than a verification code to help ensure that credentials cannot be phished. To authenticate, users simply tap the Security Key, a method that is faster than requesting and enterin

57、g an authentication code.45%Enhanced fraud protection/reduced fraud44%More secure online transactions39%Improved customer experience38%Improved regulatory compliance3 SecureID News, Biometrics secure next generation of mobile banking apps, July 7, 20154 Google, The key for working smarter, faster, and more securely, April 21, 20158Turnaround and transformation in cybersecurity: Key findings from The Global State of Information Security Survey

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论