DETAILED Global CYBERSECURITY SURVEY Summary RESULTS

Slides:



Advertisements
Similar presentations
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security Controls – What Works
Information Security Policies and Standards
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Physical and Cyber Attacks1. 2 Inspirational Quote Country in which there are precipitous cliffs with torrents running between, deep natural hollows,
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Network security policy: best practices
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
New Data Regulation Law 201 CMR TJX Video.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Chapter 6 of the Executive Guide manual Technology.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
In the Crossfire International Cooperation and Computer Crime Stewart Baker.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Development of a Clean Room/Highly Restricted Zone June 12, 2012 Thomas Garrubba - CVS Caremark; Manager, Technical Assessments Group ©2011 The Shared.
February 2, 2016 | Chicago NFA Cybersecurity Workshop.
SY0-401 COMPTIA Security+ Certification Exam Vcepracticetest.com.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
CompTIA Security+ Certification Exam SY
Safeguarding CDI - compliance with DFARS
Blackboard Security System
Managing Compliance for All Departments
Securing Network Servers
New A.M. Best Cyber Questionnaire
ISSeG Integrated Site Security for Grids WP2 - Methodology
Cybersecurity - What’s Next? June 2017
Demystifying cybersecurity: Best practices to help strengthen your program Chris Candela Senior Consultant Business Consulting Services Charles Schwab.
The Internal Audit Role in assessing Cybersecurity
Data Compromises: A Tax Practitioners “Nightmare”
Cybersecurity Policies & Procedures ICA
Lecture 14: Business Information Systems - ICT Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Privacy and Security in the Employment Relationship
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Joe, Larry, Josh, Susan, Mary, & Ken
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
I have many checklists: how do I get started with cyber security?
Red Flags Rule An Introduction County College of Morris
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
County HIPAA Review All Rights Reserved 2002.
12 STEPS TO A GDPR AWARE NETWORK
Information Security Awareness
How to Mitigate the Consequences What are the Countermeasures?
Cybercrime and Canadian Businesses
IS4680 Security Auditing for Compliance
PLANNING A SECURE BASELINE INSTALLATION
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Technology Solutions Cybersecurity Report to the KCTCS Board of Regents March 14, 2019.
Introduction to the PACS Security
In the attack index…what number is your Company?
UDTSecure TM.
Anatomy of a Common Cyber Attack
Protecting Knowledge Assets – Case & Method for New CISO Portfolio
Presentation transcript:

DETAILED Global CYBERSECURITY SURVEY Summary RESULTS October 2017

Source: 2017 AMCC Cybersecurity Survey Q2: What Is the Number of Employees at Your Firm? Percent of firms in each employee range Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q3: What Is the Number of Office Locations at the Following? Percent of firms in each office location Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q4: What Is the Total Number of Data Centers? Percent of firms in each number Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q5: What Are Your Assets Under Management as of 12/31/2016?* Percent of firms *Assets only include open-end fund assets (e.g. no hedge funds, ETFs, separate accounts, etc.) Note: 33 firms did not report their assets. Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q6: Does Your Firm’s Information Security Program Receive Direct Financial Support from a Parent Company? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q7: Does Your Firm’s Information Security Program Receive Direct Staffing Support from a Parent Company? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q8: What Is the Approximate Percentage of the Information Technology Budget Spent on Cybersecurity? Percent of firms in each category Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q9: What Is Your Title? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q10: What Is the Number of Dedicated Information Security Full Time Internal Employees? Percent of firms in each category Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q11: What Is the Number of Partially Dedicated Information Security Full Time Internal Employees? Percent of firms in each category Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q12: What Is the Number of Information Security Consultants/Contractors? Percent of firms in each category Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q13: Functions (Primary Responsibility) Covered by Headcount in 2015: Percent of firms in each category Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q13: Functions (Primary Responsibility) Covered by Headcount in 2016: Percent of firms in each category Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q13: Functions (Primary Responsibility) Covered by Headcount in 2017: Percent of firms in each category Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q14: Does Your Firm Have a CISO? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q15: To Whom Does Your CISO Report? Percent of firms in each category Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q16: Does Your Firm Require IS Staff to Have Certain Certifications? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q17: If You Answered YES to Your Firm Requiring IS staff to Have Certain Certifications, Check All That Apply: Percent of firms in each category Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q18: Does Your Firm Require Employee Passwords of at Least 8 Characters?   Percent of firms in each year           *Due to a different wording of the question in 2016, the option of “Consider” is not applicable. Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q18: What Is the Minimum Password Length Your Firm Requires for Non-Admin Accounts?     Percent of firms in each category         Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q19: Does Your Firm Require Employee Passwords Longer Than 8 Characters? Percent of firms in each category *Due to a different wording of the question in 2016, the option of “Consider” is not applicable. Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q19: What Is the Minimum Password Length Your Firm Requires for Administrative Accounts? Percent of firms in each category *Due to a different wording of the question in 2016, the option of “Consider” is not applicable. Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q20: Does Your Firm Require Employees to Select Complex (Alpha + Numeric + Special Character) Passwords? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q21: How Often Does Your Firm Require Employees to Change Passwords? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q22: Has Your Firm Implemented the New NIST Password Standard (NIST-800-63 Series)? Percent of firms in 2017 Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q23: Does Your Firm Require Dual-Factor Authentication (Single Factor Plus Software or Hardware Token Code or Smart Code) for All Employee Logins? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q24: Does Your Firm Require Dual-Factor Authentication for Employee Remote Login? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q25: Does Your Firm Require Multi-Factor Authentication for Administrative Access Where Feasible, Even When Accessing Internally? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q26: Does Your Firm Require Multi-Factor Authentication for Clients? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q27: Does Your Firm Offer Two-Step Authentication (Single Factor Plus a Code Sent to User Out-of-Band) for Shareholders/Investors? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q28: Does Your Firm Use Risk-Based Authentication for Shareholders/Investors? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q29: Does Your Firm Use Third-Party Services for Identity Proofing? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q30: Does Your Firm Prohibit Employees the Ability to Install Desktop Software Themselves? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q31: Does Your Firm Control Data Storage on USB Devices for Employees? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q32: Does Your Firm Use Personal Firewalls on Desktops? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q33: Does Your Firm Use Personal Firewalls on Laptops? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q34: Does Your Firm Encrypt Laptop Hard Drives? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q35: Does Your Firm Use Host Intrusion Prevention on Desktops? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q36: Does Your Firm Use Host Intrusion Detection on Desktops? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q37: Does Your Firm Use Intrusion Detection at Your Internet Connection? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q38: Does Your Firm Use Intrusion Detection at Your Email Gateway? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q39: Does Your Firm Use Internal Anomaly Detection Systems to Detect Malicious Internal Activity? Percent of firms in 2017 Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q40: Does Your Firm Enforce the Use of TLS for Internet Facing Communications? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q41: Does Your Firm Use Next Generation Firewall Technology? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q42: Does Your Firm Use a Network Access Control System? Percent of firms in each 2017 Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q43: Does Your Firm Use a Proxy Capability? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q44: Has Your Firm Modeled Its Program Against a Security Framework? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q45: Does Your Firm Conduct Periodic Risk Assessments to Identify Cybersecurity Threats, Vulnerabilities, and Potential Business Consequences? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q46: If You Answered Yes to Your Firm Conducting Periodic Risk Assessments to Identify Cybersecurity Threats, Vulnerabilities, and Potential Business Consequences, What Type of Assessment(s) Were Conducted? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q47: If You Answered Yes to Your Firm Conducting Periodic Risk Assessments to Identify Cybersecurity Threats, Vulnerabilities, and Potential Business Consequences, How Frequent Are the Assessments? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q48: Does Your Firm Require All Employees to Undergo Information Security Training? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q49: If You Answered YES or YES FOR SOME EMPLOYEES to Your Firm Requiring Employees to Undergo Information Security Training, How Frequent Is the Training? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q50: Does Your Firm Conduct Fake Phishing Tests to Test Employee Awareness of Phishing? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q51: Does Your Firm Require All Employees to Sign an Annual Affirmation That They Have Read and Understand the Firm’s Information Security Policy? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q52: Does Your Firm Allow the Use of Cloud Based File Sharing Applications? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q52: Does Your Firm Allow the Use of Cloud Based File Sharing Applications? Percent of firms in 2017 Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q53: Does Your Firm Require Employees to Take a “Clean” Device(s) When Travelling Abroad? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q54: Does Your Firm Require Employees to Take a “Clean + Hardened” Device(s) When Travelling Abroad? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q55: Does Your Firm Conduct a Periodic Inventory of All Physical Devices, Software, and Applications? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q56: Does Your Firm Have a “Bring Your Own Device” Policy? Percent of firms in 2017 Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q57: If You Answered Yes to Your Firm Having a “Bring Your Own Device” Policy, Who In the Organization Is Included in Formulating Policy (Check All That Apply)? Percent of firms in 2017 Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q58: Does Your Firm Manage Access to Employee Owned Devices? Percent of firms in 2017 Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q59: Does Your Firm Conduct Periodic Table Top Exercises to Prepare Staff Responding to a Cyber Event? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q60: If You Answered Yes to 59, How Frequent Are Table Top Exercises Conducted? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q61: Does Your Firm Have a Detailed Written Incident Response Plan? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q62: Does Your Firm Have a Clear Escalation Procedure for Reporting Cyber Events? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q63: Is Your Firm a Member of FS-ISAC? Percent of firms in 2017 Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q64: Does Your Firm Have Cyber Insurance? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q65: If You Answered Yes to 64, What Is the Approximate Amount of Coverage? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q66: Does Your Firm Prohibit Personal Email Access (e.g. Gmail, Yahoo!, Etc.)? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q67: Does Your Firm Prohibit Access to Social Media Platforms? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q68: If You Answered Yes Or Yes for Some Staff to Your Firm Prohibiting Access to Social Media Platforms, Which Platforms Are Prohibited? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q69: If You Answered No, No But Considering, or Yes for Some Staff to Your Firm Prohibiting Access to Social Media Platforms, Does Your Firm Have a Policy Restricting What May Be Posted? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q70: Does Your Firm Maintain an Environment for Testing and Development for Software and Applications That Is Separate From Its Business Environment? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q71: Does Your Firm Require Cybersecurity Risk Assessments of Third-Party Service Providers with Access to the Firm’s Networks, Customer Data, and Other Sensitive Information? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q72: Does Your Firm Deploy Any Metrics to Assess the Effectiveness of Its IT Security? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q73: Does Your Firm Air Gap Backups? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q74: Please Indicate All IT Functions That Your Firm Outsources Percent of firms in 2015 Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q74: Please Indicate All IT Functions That Your Firm Outsources Percent of firms in 2016 Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q74: Please Indicate All IT Functions That Your Firm Outsources Percent of firms in 2017 Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q75: Does Your Firm Encrypt Offsite Backup Media Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q76: Does Your Firm Encrypt Mobile Devices Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q77: Does Your Firm Encrypt Internal File Shares Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q78: Does Your Firm Encrypt External File Shares (E.G. Cloud) Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q79: Does Your Firm Encrypt Internal Databases Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q80: Does Your Firm Use a Storage Service Provider? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q81: If You Answered Yes to Your Firm Using a Storage Service Provider, Does the SSP Encrypt Your Data? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q82: Does Your Firm Utilize Digital Rights Management for Document Protection? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q83: Does Your Firm Encrypt Email? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q84: Does Your Firm Encrypt Internal Data in Motion? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q85: Does Your Firm Encrypt Data at Rest? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q86: For Outsourced Data Management That Includes Key Management, Who Manages the Keys? Percent of firms in 2017 Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q87: Does Your Firm Use a Password Vault/One Time Password for Administrative Access? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q88: Does Your Firm Require Multi-Factor Authentication to Elevate Privilege? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q89: Does Your Firm Monitor Administrative Access at the Key Stroke Level? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q90: Does Your Firm Require Administrators to Attend Special Cybersecurity Access Training? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q91: Does Your Firm Allow Employees to Have Administrative Access on Their Laptops? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q92: Does Your Firm Collect and Store Retail Shareholder Data? Percent of firms in each year Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q93: Please Indicate the Level of Concern of Each of the Following Categories of Data for Your Firm (1=highest, 6=lowest) Percent of firms in 2015 Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q93: Please Indicate the Level of Concern of Each of the Following Categories of Data for Your Firm (1=highest, 6=lowest) Percent of firms in 2016 Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q93: Please Indicate the Level of Concern of Each of the Following Categories of Data for Your Firm (1=highest, 6=lowest) Percent of firms in 2017 Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q94: Which of the Following Pieces of Information Do You Prepare for Board of Directors? Percent of firms in 2017 Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q95: Which Countries Cybersecurity Guidelines or Standards Impact the Security Program of Your Firm? Percent of firms in 2017 Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Q96: Which Agencies Currently Regulate Your Organization? Percent of firms in 2017 Source: 2017 AMCC Cybersecurity Survey

Source: 2017 AMCC Cybersecurity Survey Contact Peter G. Salmon Senior Director Operations & Technology ICI Global 1401 H Street, NW Washington, DC 20005 202-326-5869 salmon@ici.org Source: 2017 AMCC Cybersecurity Survey