CSI/FBI 2007, 2009, 2010/11 Key findings.

Slides:



Advertisements
Similar presentations
2 Assessing the Threatscape Addressing compliance requirements Respond, dont just report Youre already a statistic, how do you rebound? Q&A.
Advertisements

2 Assessing the Threatscape Addressing compliance requirements Respond, don’t just report You’re already a statistic, how do you rebound? Q&A.
CSI 2005 Computer Crime Survey Put together by J. Scott, 2006 Using Graphics and Text from the Published CSI/FBI 2005 Crime Survey.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
A Look at the 2004 CSI/FBI Computer Crime and Security Survey Robert Richardson Editorial Director Computer Security Institute How to Use Statistics in.
People Who Change the World Need the Tools to Do it! Holly Ross, Executive Director Security Matters It’s not about the network.
(ISC) Global Workforce Study U.S. Government Results May 7, 2013.
Tool Capitalization & Tracking Survey Institute of Certified Construction industry Financial Professionals June 15, 2015 By Chuck Elyea, CCIFP.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
1 Bakersfield City School District Average Daily Attendance Information.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter Extension 24 Computer Crime and Forensics.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 1 Pages 979 to 983.
Framework Chapter 1 Panko, Corporate Computer and Network Security Copyright 2002 Prentice-Hall.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
Results from the first questionnaire – November 2014 One of first questions we asked pupils was about sexuality and how often they are attracted to others.
Nationwide’s Small Business Owners Survey -- Millennials August 2016 Conducted by Harris Poll.
Presented by: Mike Gerdes Director, Information Security Center of Expertise Cybersecurity State of the Union.
Crime and punishment Joan Garrod Hodder & Stoughton © 2017.
Cybersecurity as a Business Differentiator
BAE systems Research results October 2016
Unlocking the benefits of public cloud IaaS
Information Security Program
Information Security – Current Challenges
Young people, substance misuse and PHE
[Internal Use] for Check Point employees​
Cloud Firewall.
Building A Security Program From The Ground Up
Process Costing CHAPTER 4.
Agricultural Lending and Credit
Data Center Firewall.
Global Estimates on Child Labour ( )
Community Cloud
MCPS Systemwide Safety Programs Department of Facilities Management
Bill Banks | Security Engineer
CSI Survey 2007 Tiffany Gorman
With so many major corporations and people falling victim to cybercrimes and with viruses and malware infecting several computers and networks around.
Andy Hall – Cyber & Tech INSURANCE Specialist
Privacy concerns and sharing data
When Security Games Go Green
Disaster happens; don’t be held hostage
Background Checking: Has the Use of Credit Background Checks Increased
Strong Security for Your Weak Link:
MISSION STRATEGIC DIRECTION
Graduates Total Debt by Gender, 2015, 2016, and 2017
Graduates Total Debt by Gender, 2015 and 2016
IS4550 Security Policies and Implementation
Research Accounting Office
Private and Private-Stated Related Schools
HSBC Commercial Banking
Ransomware and Data breaches in public libraries
Professors’ Changing Views of Digital Learning
Cybercrime and Canadian Businesses
Electronic Presentation by Douglas Cloud Pepperdine University
Entering Debt in Current Dollars
Forensic and Investigative Accounting
FACTORING PUBLIC SENTIMENT ON CYBERCRIME
Shrinking Civic Space:
Information Protection
CCPS Business Resilience Survey 2016
Access Services Customer Satisfaction Survey Summary of Recommended Topics Community Advisory Committee July 9, 2019.
Cybersecurity: Don’t Be Scared; Be Prepared Dean Choudhri, CISSP, CISM, CRISC Assistant Vice President, Cybersecurity and Information Assurance Alloya.
Information Protection
Digital Transformation Barometer 2018
SECURITY IN THE DIGITAL AGE
Computer System Security
2019 AFP Payments Fraud & Control Survey
Protecting Knowledge Assets – Case & Method for New CISO Portfolio
Presentation transcript:

CSI/FBI 2007, 2009, 2010/11 Key findings

2009

2009

2010/2011 Key Findings As was the case last year, this year’s survey covered a midyear-to-midyear period, from July 2009 through June 2010. Malware infection continued to be the most commonly seen attack, with 67.1 percent of respondents reporting it. Respondents reported markedly fewer financial fraud incidents than in previous years, with only 8.7 percent saying they’d seen this type of incident during the covered period. Of the approximately half of respondents who experienced at least one security incident last year, fully 45.6 percent of them reported they’d been the subject of at least one targeted attack. Fewer respondents than ever are willing to share specific information about dollar losses they incurred. Given this result, the report this year does not share specific dollar figures concerning average losses per respondent. It would appear, however, that average losses are very likely down from prior years. Respondents said that regulatory compliance efforts have had a positive effect on their security programs. By and large, respondents did not believe that the activities of malicious insiders accounted for much of their losses due to cybercrime. 59.1 percent believe that no such losses were due to malicious insiders. Only 39.5 percent could say that none of their losses were due to non-malicious insider actions. Slightly over half (51.1 percent) of the group said that their organizations do not use cloud computing. Ten percent, however, say their organizations not only use cloud computing, but have deployed cloud-specific security tools.

Key Findings