Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.

Slides:



Advertisements
Similar presentations
2014 IT Salary Survey: BI/Analytics Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Advertisements

2014 IT Salary Survey: Government Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
InformationWeek 2014 State of the Data Center Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
InformationWeek Next-Generation IT Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
2013 InformationWeek 500 Executive Survey Research Findings Innovation That Gets Results September 2013 © 2013 Property of UBM Tech; All Rights Reserved.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
InformationWeek 2014 Mobile Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
MSIA Introduction to Information Systems Security Training and Policy Week 1 Live Session Presentation.
2014 State of Storage Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
InformationWeek 2014 Hybrid Cloud Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
(ISC) Global Information Security Workforce Study (GISWS) Results U.S. Federal Government.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Vulnerability and Configuration Management Best Practices for State and Local Governments Jonathan Trull, CISO, Qualys, Inc.
2014 Analytics, BI, and Information Management Research Findings © 2013 Property of UBM Tech; All Rights Reserved.
2014 IT Salary Survey: Application Development Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
2014 IT Salary Survey: Healthcare Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
2014 State of Unified Communications Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
InformationWeek 2014 Backup Technologies Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
InformationWeek 2014 Enterprise Project Management Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
2014 IT Salary Survey: Banking Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
2014 US IT Salary Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
InformationWeek 2014 State of Database Technology Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
2014 IT Salary Survey: Networking Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
2014 IT Salary Survey: Insurance Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Sam Cook April 18, Overview What is penetration testing? Performing a penetration test Styles of penetration testing Tools of the trade.
2014 IT Salary Survey: Security Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
2014 IT Salary Survey: Executives Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
(ISC) Global Workforce Study U.S. Government Results May 7, 2013.
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
Study Results Advanced Persistent Threat Awareness.
IPv6 Survey: Taking the Federal Pulse on IPv6 Summary Results Market Connections, Inc. June 2006.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
InformationWeek 2014 Strategic CIO Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Measuring Web Site Performance Are companies making the leap?
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
©2002 South-Western Chapter 8 Version 6e1 chapter Marketing Research 8 8.
1602: Current Trends in Risk Management for Life Insurance Companies LOOKING BACK…focused on the future.
Copyright Security-Assessment.com 2004 Vulnerability Management Explained By Peter Benson.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Science Fair Research Plan
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Copying distribution or use of the contents of this document is prohibited without written authorization from SafeHarbor Technology Corporation. Maximizing.
ClearView Value-adding Services for Non-Profit Operations Management Transparency for Understanding, Visibility for Decisions N OT F OR P ROFIT S ERVICES.
SHRM Thought Leaders Conference Scottsdale, AZ October 5-6, 2009.
HP World September 2002 Scott S. Blake, CISSP Vice President, Information Security BindView Corporation Vulnerability Assessment and Action.
Measuring Business Impact National Fund for Workforce Solutions June 11, 2013.
Optometrist Salary Study Methodology 2 Key Findings 3 Profile of Practice 5 Salary/Revenue and Expectations13 Respondent Profile22 Appendix A: Current.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
2014 IT Budget Outlook Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Marketing Research Sample Report Outline Stephan Sorger NOT A TEMPLATE: PLEASE DO NOT TAKE THIS PPT, CROSS OUT SHISEIDO, AND ENTER.
Parent Survey Results Autumn Term – Supporting Learning at home/Helping Parents to learn.
OCTAVE By Matt White. OCTAVE  OCTAVE® (Operationally Critical Threat, Asset, and Vulnerability Evaluation) is a risk-based strategic assessment and planning.
1 Current Trends in Enterprise IT Network Security Key Takeaways Based on 100 Survey Responses © 2016 Lumeta Corporation.
Why SIEM – Why Security Intelligence??
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
BAE systems Research results October 2016
Deployment Planning Services
Learn about Office 365 Secure Score - actionable security analytics
Real-time protection for web sites and web apps against ATTACKS
Data Security Team 1.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Measuring What Matters
Prevention, Intelligence
Resulting in increased training revenue
Cybersecurity Simplified: Ransomware
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved

You're likely swimming in security data, but what are the best tools and practices for analyzing it all? How can you use data to uncover compromises or targeted attacks? The answer is threat intelligence, which we define as the collection and analysis of information about existing and emerging threats to information assets -- it's used to inform decisions on how best to respond to and mitigate these threats. Among the 397 respondents to our InformationWeek and Dark Reading Threat Intelligence Survey, 85% say this intel plays some role in their IT security strategies. Among the 337 respondents using threat intelligence: >> 75% cite vulnerabilities exploited when asked what they attempt to identify through data analysis; 58% try to pinpoint the source of attacks. >> 61% consider their programs a good value for the money; 12% say their program is "worth its weight in gold." >> 51% subscribe to two or more third-party security intelligence feeds; 10% leverage five or more. >> 22% run ad hoc queries against their data on a daily basis vs. 14% who check in only monthly. That's a long time in this age of fast-moving events. Want more? Visit InformationWeek ReportsInformationWeek Reports Executive Summary v © 2014 Property of UBM Tech; All Rights Reserved

Threat intelligence plays role for 85% of respondents © 2014 Property of UBM Tech; All Rights Reserved

Most use log management and SIEM for threat intelligence © 2014 Property of UBM Tech; All Rights Reserved

Cloud: not a popular place for log management/SIEM © 2014 Property of UBM Tech; All Rights Reserved

Data-feed configuration simplicity: split decision © 2014 Property of UBM Tech; All Rights Reserved

Rule-set configuration: a little easier © 2014 Property of UBM Tech; All Rights Reserved

Too few realize benefits of threat intelligence analysis © 2014 Property of UBM Tech; All Rights Reserved

Network traffic logs commonly used © 2014 Property of UBM Tech; All Rights Reserved

One-third aren’t using third-party feeds © 2014 Property of UBM Tech; All Rights Reserved

About half run ad hoc queries at least weekly © 2014 Property of UBM Tech; All Rights Reserved

How threat level affects data query frequency © 2014 Property of UBM Tech; All Rights Reserved

Most looking for exploited vulnerabilities, attacked assets © 2014 Property of UBM Tech; All Rights Reserved

Few say analysis doesn’t improve risk assessments © 2014 Property of UBM Tech; All Rights Reserved

Defenses change based on threat intelligence © 2014 Property of UBM Tech; All Rights Reserved

Threat intelligence analysis speeds breach discovery © 2014 Property of UBM Tech; All Rights Reserved

Half say threat intelligence uncovered an APT © 2014 Property of UBM Tech; All Rights Reserved

Threat intelligence is a smart investment, say 73% © 2014 Property of UBM Tech; All Rights Reserved

Only one-quarter built their own security analytics © 2014 Property of UBM Tech; All Rights Reserved

Specialized training: not yet the norm © 2014 Property of UBM Tech; All Rights Reserved

IT staff highly represented in survey respondents © 2014 Property of UBM Tech; All Rights Reserved

Surveyed companies revenue spread © 2014 Property of UBM Tech; All Rights Reserved

Surveyed companies industry spread © 2014 Property of UBM Tech; All Rights Reserved

Surveyed companies lean toward midsize businesses © 2014 Property of UBM Tech; All Rights Reserved

Survey Name Dark Reading Threat Intelligence Survey Survey Date June 2014 Region North America Number of Respondents 397 Purpose To examine the impact threat intelligence has on IT security strategy. Methodology Dark Reading, in partnership with InformationWeek, surveyed business technology decision-makers at North American companies. The survey was conducted online, and respondents were recruited via an invitation containing an embedded link to the survey. The invitation was sent to qualified Dark Reading and InformationWeek subscribers. Want more? Visit InformationWeek ReportsInformationWeek Reports Research Synopsis © 2014 Property of UBM Tech; All Rights Reserved