Ponemon Institute© Private & Confidential ReportPage 1 State of the Endpoint Survey Analysis of Global Results Briefing for Lumension October 30, 2009.

Slides:



Advertisements
Similar presentations
© Pearson Prentice Hall 2009
Advertisements

Bodnar/Hopwood AIS 7th Ed1 Chapter 5 u TRANSACTION PROCESSING AND INTERNAL CONTROL PROCESS.
Technology Communications
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Control and Accounting Information Systems
Control and Accounting Information Systems
Enterprise Security A Framework For Tomorrow Christopher P. Buse, CPA, CISA, CISSP Chief Information Security Officer State of Minnesota.
The “New” New Normal: Global Mobility as a Strategic Advisor.
Sponsored by Lumension Ponemon Institute© Private & Confidential Document Page Security Mega Trends Survey Independently conducted by Ponemon Institute.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
What’s Next What We believe Who We Are Cloud Computing Big data Mobility Social Enterprise.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Dr. Julian Lo Consulting Director ITIL v3 Expert
Security Controls – What Works
The New World of Security for Business Travellers Anurag Lal Senior Vice President Strategic Services & Business Development Wi-Fi Business Development.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Controls for Information Security
Affiliated Information Security Collaborative An Affiliated Enterprise Approach to Information Security Deans and Vice Presidents Meeting April 17, 2014.
© 2007 IBM Corporation IBM Global Financing February 2007 An Introduction to IBM Global Financing for Software and Services.
1 Unified Communications Survey Summary Results Market Connections, Inc. June 2007.
© Copyright 2012 Pearson Education. All Rights Reserved. Chapter 10 Fraud & Internal Control ACCOUNTING INFORMATION SYSTEMS The Crossroads of Accounting.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.
[Name / Title] [Date] Effective Threat Protection Strategies.
Chapter 3 Internal Controls.
Using Microsoft Network Access Protection to test Dr.Web anti-virus software The workstations successfully checked by NAP can be used in a corporate network.
IPv6 Survey: Taking the Federal Pulse on IPv6 Summary Results Market Connections, Inc. June 2006.
HSA 171 CAR. 1436/ 7/4  The results of activities of an organization or investment over a given period of time.  Organizational Performance: ◦ A measure.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Ponemon Institute© Private & Confidential DocumentPage 1 Recent Research on Privacy, Trust and Data Protection The Privacy Symposium at Harvard University.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Learning Objectives LO5 Illustrate how business risk analysis is used to assess the risk of material misstatement at the financial statement level and.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
BPK Strategic Planning: Briefing for Denpasar Regional Office Leadership Team Craig Anderson Ahmed Fajarprana August 11-12, 2005.
EDUCAUSE Center for Applied Research The Promise and Performance of Enterprise Systems May 22, 2003 Robert B. Kvavik Senior ECAR Fellow The Promise and.
AREVA T&D Security Focus Group - 09/14/091 Security Focus Group A Vendor & Customer Collaboration EMS Users Conference September 14, 2009 Rich White AREVA.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
The State of Computer & Data Security in Corporations Independent Survey.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Desktop Security: Making Sure Your Office Environment is Secure.
Enterprise Cybersecurity Strategy
Texas Technology Forum The Future of Mobile Technology Trends and Issues July 16, 2009.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Robert Mahowald August 26, 2015 VP, Cloud Software, IDC
Security threats from pervasive broadband access Prof. Jim Norton Chartered Director & Chartered Engineer Senior Policy Adviser e-Business & e-Government.
KMEF CoP Interim Report COMBINED: Functions & Competencies.
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Disaster Unpreparedness June 3, 2013 Underwritten by:
Moving to BYOD Gary Audin 1.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Vodafone Business Cloud
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
US PCSI TREND US PCSI 12 MONTH TREND The US Primary Consumer Sentiment (“Consumer Confidence”) Index (“PCSI”) as measured.
Total Enterprise Mobility Comprehensive Management and Security
Unified Communications Survey Summary Results
Distributed Asset Management Making The Business Case
Presentation transcript:

Ponemon Institute© Private & Confidential ReportPage 1 State of the Endpoint Survey Analysis of Global Results Briefing for Lumension October 30, 2009

Ponemon Institute© Private & Confidential ReportPage 2 About our study The survey was fielded in five countries: US, Germany, Australia & New Zealand (combined), and UK. Project launched in September 2009 and all data was collected in October The survey instrument was developed with input from experts at Lumension. The survey instrument was validated by panel of Ponemon Fellows. A total of 3,009 respondents provided usable surveys, representing a 5.6% response rate for IT security and a 5.3% response rate for IT operations. Country SamplesIT SecurityIT Operations United States (US) Germany (DE) Australia & New Zealand (ANZ) United Kingdom (UK) Total1,4271,582

Ponemon Institute© Private & Confidential ReportPage 3 Attributions about endpoint security

Ponemon Institute© Private & Confidential ReportPage 4 Q1a. My organization has sufficient resources to achieve compliance with data security policies and best practices.

Ponemon Institute© Private & Confidential ReportPage 5 Q1b. My organization’s CEO is a strong supporter of security and data protection efforts.

Ponemon Institute© Private & Confidential ReportPage 6 Q1c. My organization views data security as a strategic initiative across the enterprise.

Ponemon Institute© Private & Confidential ReportPage 7 Q1d. My organization is proactive in managing privacy and data protection risks.

Ponemon Institute© Private & Confidential ReportPage 8 Q1e. Laptops and other mobile data-bearing devices are secure and do not present a significant security risk to our organization’s networks or enterprise systems.

Ponemon Institute© Private & Confidential ReportPage 9 Q2a. Does your organization use the following technologies? Percentage Yes response.

Ponemon Institute© Private & Confidential ReportPage 10 Q2a. Does your organization use the following technologies? Four technologies by country.

Ponemon Institute© Private & Confidential ReportPage 11 Q2a. Does your organization use the following technologies? Four technologies by country.

Ponemon Institute© Private & Confidential ReportPage 12 Q2b. Please state whether the use of this technology will increase over the next 12 to 24 months. Percentage Yes response.

Ponemon Institute© Private & Confidential ReportPage 13 Q3. Approximately how many software agents does your organization typically have installed on each endpoint to perform management, security and/or other operations?

Ponemon Institute© Private & Confidential ReportPage 14 Q3. More than five installed software agents by country.

Ponemon Institute© Private & Confidential ReportPage 15 Q4. On a typical day, how many different or distinct software management consoles does your organization use to manage endpoint operations & security functions?

Ponemon Institute© Private & Confidential ReportPage 16 Q4. More than five distinct management consoles by country.

Ponemon Institute© Private & Confidential ReportPage 17 Q5a. Does your organization allow employees to connect their own computing devices to its network or enterprise systems? Percentage Yes response.

Ponemon Institute© Private & Confidential ReportPage 18 Q5a. Yes response by country.

Ponemon Institute© Private & Confidential ReportPage 19 Q5b. Does your organization subsidize the employee’s purchase and use of their own computing devices (such as laptops, smart phones or PDAs)?

Ponemon Institute© Private & Confidential ReportPage 20 Q5b. Yes response by country.

Ponemon Institute© Private & Confidential ReportPage 21 Q5c. Does your organization have a policy that permits employees to connect their own computing devices to the organization’s network or enterprise systems? Percentage Yes Response.

Ponemon Institute© Private & Confidential ReportPage 22 Q5c. Yes response by country.

Ponemon Institute© Private & Confidential ReportPage 23 Q6. Why does your organization invest in endpoint security solutions? Please select your top three choices.

Ponemon Institute© Private & Confidential ReportPage 24 Q6. Choice = endpoint TCO by country.

Ponemon Institute© Private & Confidential ReportPage 25 Q7a. Do you believe your IT network is more secure now than it was a year ago? Percentage Yes response.

Ponemon Institute© Private & Confidential ReportPage 26 Q7b, If yes, why it is more secure today? Please check all that apply.

Ponemon Institute© Private & Confidential ReportPage 27 Q7b. Choice = Improving control procedures by country.

Ponemon Institute© Private & Confidential ReportPage 28 Q8. Does your organization have one company-wide IT security policy? Percentage Yes response.

Ponemon Institute© Private & Confidential ReportPage 29 Q9. Does your organization’s IT security budget support business objectives and priorities?

Ponemon Institute© Private & Confidential ReportPage 30 Q10a. What statement best describes how IT operations and IT security work together to support planning, communications and information sharing functions?

Ponemon Institute© Private & Confidential ReportPage 31 Q10b. Has the level of collaboration improved over the past year? Percentage Yes response.

Ponemon Institute© Private & Confidential ReportPage 32 Q11. What do you perceive to be the main difficulties in managing endpoint operations and security? Please select your top two reasons.

Ponemon Institute© Private & Confidential ReportPage 33 Q12. Does your organization have a PC life cycle management solution (such as asset management, configuration management, patch management or others)? Percentage Yes response.

Ponemon Institute© Private & Confidential ReportPage 34 Q13. Does your organization have an integrated endpoint security suite (vulnerability assessment, DLP, anti-virus, anti-malware or others)? Percentage Yes response.

Ponemon Institute© Private & Confidential ReportPage 35 Q14. What features are important in an integrated endpoint management suite (combining operations and security functions)? Please use the following five-point scale to rate each feature from very important to irrelevant. Each bar is the 1=very important & 2=important response.

Ponemon Institute© Private & Confidential ReportPage 36 Q14. What features are important in an integrated endpoint management suite (combining operations and security functions)? Please use the following five-point scale to rate each feature from very important to irrelevant. Each bar is the 1=very important & 2=important response.

Ponemon Institute© Private & Confidential ReportPage 37 Q15. What do you believe are the most important benefits of an integrated endpoint management suite (combining operations and security functions)? Please select your top three choices.

Ponemon Institute© Private & Confidential ReportPage 38 Q16. Which of the following technologies does your organization currently use?

Ponemon Institute© Private & Confidential ReportPage 39 Q17. During the past year, have any of the following incidents occurred in your organization? Select all that apply.

Ponemon Institute© Private & Confidential ReportPage 40 Q18. In the coming year (2010), which of the following IT security risks are of most concern to you? Please select the top five risks.

Ponemon Institute© Private & Confidential ReportPage 41 Q19b. How do these regulations affect your organization’s endpoint security? Choice = improves endpoint security.

Ponemon Institute© Private & Confidential ReportPage 42 Q19c. Why does compliance improve your organization’s endpoint security? Please check all that apply.

Ponemon Institute© Private & Confidential ReportPage 43 Q20a. On average, how much does it cost your organization to comply with privacy and data security compliance per year? Budget values converted into US$ for comparison purposes.

Ponemon Institute© Private & Confidential ReportPage 44 Q21. How does your organization’s 2009 IT security budget compare to 2008?

Ponemon Institute© Private & Confidential ReportPage 45 Q IT security budget increased from 2008 IT security budget by country?

Ponemon Institute© Private & Confidential ReportPage 46 Q22. How will your organization’s IT security budget for 2010 compare to 2009?

Ponemon Institute© Private & Confidential ReportPage 47 Q IT security budget will increase from 2009 IT security budget by country?

Ponemon Institute© Private & Confidential ReportPage 48 Q23. Approximately what percentage of your overall IT budget is dedicated to each of the following areas?

Ponemon Institute© Private & Confidential ReportPage 49 Organizational Characteristics

Ponemon Institute© Private & Confidential ReportPage 50 Respondent’s organizational levels and reporting lines. D1. What organizational level best describes your current position?ITSITO Vice President/Executive1% Director15%14% Manager/Supervisor27% Associate/Staff23%21% Technician26%29% Contractor7%6% Other2% Total100% D2. Check the Primary Person you or your IT organization reports into within the organization.ITSITO Chief Information Officer43%75% Chief Information Security Officer18%0% Chief Security Officer13%0% Chief Technology Officer9%18% Chief Risk Officer6%2% Compliance/Ethics Officer5%0% Chief Financial Officer3%0% Other (please specify)2%4% Total100%

Ponemon Institute© Private & Confidential ReportPage 51 What industry best describes your organization’s industry focus?

Ponemon Institute© Private & Confidential ReportPage 52 What is the worldwide headcount of your organization? D5. What is the worldwide headcount of your organization?ITSITO Less than 500 people14%15% 500 to 1,000 people20% 1,001 to 5,000 people23% 5,001 to 25,000 people20%19% 25,001 to 75,000 people16%15% More than 75,000 people8% Total100%

Ponemon Institute© Private & Confidential ReportPage 53 Next Steps Ponemon Institute LLC Tel: Toll Free: US 31 N. Traverse City, MI USA