The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.

Slides:



Advertisements
Similar presentations
English Arabic Cyber Security: Implications of recent breaches MENOG April 2015.
Advertisements

Rise in cyber attacks at US companies “This threat to our country’s economic and national security, and to companies’ bottom line, is real and it is growing.”
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Security Services Svetlana.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
Chubaka Producciones Presenta :.
2012 JANUARY Sun Mon Tue Wed Thu Fri Sat
P Pathophysiology Calendar. SundayMondayTuesdayWednesdayThursdayFridaySaturday January 2012.
Chicas, este calendario si es pa' nosotras !!!!!.
Get Complete IT Compliance: Reduce Risk and Cost Jonathan CISO, Qualys Seth Automation Specialist, BMC.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Constructing West Midlands Martin Merrix Divisional Manager, Urban Design.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cyber Security: Now and.
Savings and Investment Unit Project Student Name.
Managing Threats in Changing World John DeGroot Lead Architect – Security, RBC Federation of Security Professionals – October 26, 2012.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Class 8 The State of Cybercrime Today- Threads & Solutions.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
The Impact of Privacy on HP’s Customer Relationship Management Solution Mike Overly Vice President, Marketing © 2003 Hewlett-Packard Development Company,
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 Issues Loss or theft of mobile devices Lack of MDM (mobile device management) software Cloud.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
2 Current trend: growing IPO market 52 IPOs since January 2010, raising a total of £6.7 bn Significant international transactions: –March 2010: African.
WORD JUMBLE. Months of the year Word in jumbled form e r r f b u y a Word in jumbled form e r r f b u y a february Click for the answer Next Question.
TransArmorSM A Secure Transaction ManagementSM Solution
DATE POWER 2 INCOME JANUARY 100member X 25.00P2, FEBRUARY 200member X 25.00P5, MARCH 400member X 25.00P10, APRIL 800member.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
2011 Calendar Important Dates/Events/Homework. SunSatFriThursWedTuesMon January
Security: Emerging Threats & Trends Danielle Alvarez, CISO.
HPE NonStop XYGATE Product Updates
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
15 years of Web Security © 2015 WhiteHat Security, Inc. Jeremiah Grossman Founder WhiteHat Security, Inc. The Rebellious Teenage Years.
QUARTERLY PERFORMANCE OF THE MUNICIPAL INFRASTRUCTURE GRANT (MIG) – 2005/06 AND 2006/07 FINANCIAL YEARS Presentation to the Select Committee On Finance.
July 2007 SundayMondayTuesdayWednesdayThursdayFridaySaturday
Friday 22nd April 2016 DS Chris Greatorex SEROCU
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
©2012 Bit9. All Rights Reserved Peter Llorens, PERegional Sales Manager, FL, Caribbean & Latin America Julio GutierrezSales Engineer, FL, Caribbean & Latin.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
DHS Publishes Report Saying Low but Persistent Risk of Cyber Attack on Energy Sector DHS REPORT ON ENERGY CYBERSECURITY April 6, 2016 | Ben Booker Source:
Vodafone Business Cloud
Cybersecurity as a Business Differentiator
Information Security – Current Challenges
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Business At the Speed of Cyber
CYBER CRIME Matthew Purchase.
Andy Hall – Cyber & Tech INSURANCE Specialist
Cyber Security in the Mortgage Industry
Cyber Trends and Market Update
McDonald’s Kalender 2009.
McDonald’s Kalender 2009.
McDonald’s Kalender 2009.
McDonald’s calendar 2007.
Forensic and Investigative Accounting
Teacher name August phone: Enter text here.
Strategic threat assessment
Managing IT Risk in a digital Transformation AGE
February 2007 Note: Source:.
Information Protection
McDonald’s calendar 2007.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Habitat Changes and Fish Migration
Information Protection
2015 January February March April May June July August September
Habitat Changes and Fish Migration
Presentation transcript:

The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb

2 Key Primary Research: Cyber Risk Report 2015 Ponemon Cost of Cyber Crime Study 2014 Zero Day Initiative HP Internal Research

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 3 average time to detect breach 243 days 2014 …March April May June July August September October November December 2015 January February March… of breaches occur at the application layer of breaches are reported by a 3rd party Since 2010, time to resolve and attack has grown Average time bad guys are inside before detection

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 4 Number of seats in the UK sample

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 5 Industry Sector of participants in the UK sample

6 Average cost of cyber crime was £3.56 million per year per organisation Up 17% YoY Range was £0.545m - £14m

7 Average time to resolve a cyber attack was 26 days Average cost of resolution was £256k

8 Average time to contain a malicious insider was 70 days!

9 Business disruption accounted for 47% of external costs

10 Recovery and detection accounted for 54% of internal activity cost

11 Security Intelligence Systems led to average savings in excess of £1.1m per organisation per year

Reduction in cost of cyber crime per org per annum based on enabling tech

13 Enterprise Security Governance Practices reduced average breach costs by £621k per annum

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 14 Research: Top concerns for IT executives 67% 66% 63% 54% Extremely concerned Somewhat concerned Not very concerned Data privacy and information breaches Lack of skilled resources to effectively manage security Risk associated with more consumption of apps/IT services across public, private & hybrid cloud Risk associated with more consumption of apps/IT services Source: HP 20:20 CIO Report, 2012 Focus: Security Breach Management Focus: Security Intelligence Focus: Cloud Security Focus: Integrated GRC

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 15 Worldwide Security Trends & Implications Cyber threat 56% of organizations have been the target of a cyber attack Extended supply chain 44% of all data breach involved third-party mistakes Financial loss $8.6M average cost associated with data breach Cost of protection 8% of total IT budget spent on security Reputation damage 30% market cap reduction due to recent events Source: HP internal data, Forrester Research, Ponemon Institute, Coleman Parkes Research Reactive vs. proactive 60% of enterprises spend more time and money on reactive measures vs. proactive risk mgmt

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 16 Key Finding #1 Well-known attacks are still commonplace.

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 17 Old vulnerabilities still going strong The Zero Day Initiative team coordinated the disclosure and remediation of 400+ new high-severity vulnerabilities in 2014

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 18 Key Finding #2 Misconfigurations are still a significant problem

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 19 Misconfigurations are too common

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 20 Key Finding #3 Newer technologies such as mobile and the Internet of Things introduce new avenues of attack.

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 21 (IoT) devices averaged 25 vulnerabilities per product, indicating expanding attack surface for adversaries 2014 was the year of Point-of-sale (POS) systems targeted malware attacks

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 22 Key Finding #4 Determined adversaries are getting more sophisticated.

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 23 Key Finding #5 Complementary protections fill out coverage.

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 24

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 25 Invest 1 in people and processes

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 26 Align 2 with business

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 27 Build in and share actionable threat intelligence 3

Thank you. 28