22
2017 THALES DATA THREAT REPORT Trends in Encryption and Data Security MEXICO AND BRAZIL EDITION

2017 THALES DATA THREAT REPORT · fines and highest data breach rates in the world, it security spending priorities (rates of top 3 selection) even with “ ley federal de protecciÓn

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 2017 THALES DATA THREAT REPORT · fines and highest data breach rates in the world, it security spending priorities (rates of top 3 selection) even with “ ley federal de protecciÓn

www.thales-esecurity.com

2017 THALES DATA THREAT REPORTTrends in Encryption and Data Security

MEXICO AND BRAZIL EDITION

Page 2: 2017 THALES DATA THREAT REPORT · fines and highest data breach rates in the world, it security spending priorities (rates of top 3 selection) even with “ ley federal de protecciÓn

2017 THALES DATA THREAT REPORTTRENDS IN ENCRYPTION AND DATA PROTECTION

U.S.

MEXICO

U.K.GERMANY

JAPAN

AUSTRALIABRAZIL

1,100+ SENIOR IT SECURITY EXECUTIVES SURVEYED GLOBALLY | 100 MEXICO | 500 U.S. | 100 BRAZIL, GERMANY, JAPAN, AUSTRALIA, U.K.

Copyright 2017 Thales

RESPONDENTS ORGANIZATIONS (MEXICO)100% - $3.8B MEX+74% - $9.5B MEX+54% - $19B MEX+

Page 3: 2017 THALES DATA THREAT REPORT · fines and highest data breach rates in the world, it security spending priorities (rates of top 3 selection) even with “ ley federal de protecciÓn

GARRET BEKKER – PRINCIPAL ANALYST, INFORMATION SECURITY

THE BIG DISCONNECT

“OUR 2017 REPORT FINDS A SITUATION WHERE SPENDING ON IT SECURITY IS SHARPLY INCREASED IN MEXICO – YET DATA BREACHES ARE ALSO UP

SIGNIFICANTLY.”

“FUNDAMENTAL IT SECURITY STRATEGIES ARE ALSO NOT KEEPING UP WITHTHE PACE OF TECHNICAL CHANGE. 75% OF MEXICAN RESPONDENTS

INDICATED THAT NEW TECHNOLOGIES ARE DEPLOYED BEFORE DATA SECURITY IS IN PLACE”

“CLEARLY, THERE’S STILL A BIG DISCONNECT.”

Page 4: 2017 THALES DATA THREAT REPORT · fines and highest data breach rates in the world, it security spending priorities (rates of top 3 selection) even with “ ley federal de protecciÓn

OF MEXICAN RESPONDENTS FELT THEIR ORGANIZATIONS WERE VULNERABLE TO DATA THREATS90%WERE VERY OR EXTREMELY VULNERABLE –MORE THAN 3X THE 10% RATE IN 2016 31%

Page 5: 2017 THALES DATA THREAT REPORT · fines and highest data breach rates in the world, it security spending priorities (rates of top 3 selection) even with “ ley federal de protecciÓn

VULNERABILITYTO DATA THREATS

GLOBAL

VULNERABLE VERY/EXTREMELY VULNERABLE

VERY OR EXTREMELY

VULNERABLE

SOMEWHAT OR MORE

VULNERABLE

16%

84%

UNITEDSTATES

REGIONAL

UNITEDKINGDOM

20% 31%45%JAPAN MEXICOGERMANY

90%95%84%

23% 19%

77%

49%

91%

BRAZIL AUSTRALIA

29%

90% 83%

88% 30%

Page 6: 2017 THALES DATA THREAT REPORT · fines and highest data breach rates in the world, it security spending priorities (rates of top 3 selection) even with “ ley federal de protecciÓn

E X P E C T T H E I R S P E N D I N G O N D AT A

S E C U R I T Y T O I N C R E AS E

UP FROM 65% IN 2016

79%78%H AVE E X P E R I E N C E D

A D AT A B R E AC H

• HIGHEST RATE MEASURED• 34% IN THE LAST YEAR –

UP FROM 10% IN 2016• 19% WERE BREACHED

BOTH THIS YEAR AND PREVIOUSLY

Page 7: 2017 THALES DATA THREAT REPORT · fines and highest data breach rates in the world, it security spending priorities (rates of top 3 selection) even with “ ley federal de protecciÓn

TOP DRIVERS FOR IT SECURITY SPENDING

DATA BREACH PREVENTION A LOWER PRIORITY IN SPITE OF

FINES AND HIGHEST DATA BREACH RATES IN THE WORLD,

IT SECURITY SPENDING PRIORITIES (RATES OF TOP 3 SELECTION)

EVEN WITH “LEY FEDERAL DE PROTECCIÓN DE DATOS PERSONALES EN POSESIÓN DE LOS PARTICULARES” IN PLACE – PREVENTING DATA BREACHES

IS ONLY THE THIRD HIGHEST PRIORITY

47% IT SECURITY BEST PRACTICES

42% INCREASED CLOUD USE

40% DATA BREACH PENALTIES

37% REPUTATION AND BRAND PROTECTION

30% EXECUTIVE DIRECTIVE

25% COMPLIANCE REQUIREMENTS

24% PARTNER AND PROSPECT REQUIREMENTS

24% COMPETITIVE/STRATEGIC CONCERNS

18% PREVIOUS DATA BREACH

$ 23M+MXN

78%FINES UP TO

320,000 TIMES MEXICO CITY

MINIMUM WAGE(LFPDPPP)

HIGHEST RATE OF DATA BREACHES

MEASURED

Page 8: 2017 THALES DATA THREAT REPORT · fines and highest data breach rates in the world, it security spending priorities (rates of top 3 selection) even with “ ley federal de protecciÓn

INCREASING SPENDING THE MOST WHERE DEFENSES OFTEN FAIL TO PROTECT DATA

IT SECURITY DEFENSE SPENDING INCREASES

NETWORK

ANALYSIS AND CORRELATIONDATA IN MOTION

END POINT AND MOBILE

67%

61%

64%

60%

44%DATA AT REST

BELIEVE NETWORK SECURITY VERY/ EXTREMELY EFFECTIVE AT PROTECTING DATA

91%+14% FROM 2016

BELIEVE ENDPOINT PROTECTION VERY/EXTREMELY EFFECTIVE AT PROTECTING DATA

77%+15% FROM 2016

…organizations keep spending on the same solutions that worked for them in the past but aren’t necessarily the most effective at stopping modern breaches”

Garrett Bekker, 451 Research

… spending on securing internal networks from external threats is less and less effective – and relevant – as both the data and the people accessing it are increasingly external.”

Page 9: 2017 THALES DATA THREAT REPORT · fines and highest data breach rates in the world, it security spending priorities (rates of top 3 selection) even with “ ley federal de protecciÓn

DATA PRIVACY AND SOVEREIGNTY IMPACTING ENTERPRISES WORLDWIDE

79% - MEXICO72% - GLOBAL

Impacted by Data Privacy and Data Sovereignty

ADDRESSING REQUIREMENTS BY:

“Data privacy has become a hot topic in light of concerns about government snooping, and not surprisingly a host of new privacy laws and regulations are in the process of being revised or enacted around the world, such as GDPR in Europe and LFPDPPP in Mexico.”

Garrett BekkerPrincipal Analyst

451 Research

MEXICO

GLOBAL

TOKENIZING DATA

LOCAL HOSTING & CLOUD

60%74%

31%51%

ENCRYPTING DATA

MIGRATING DATA

TOKENIZING DATA

LOCAL HOSTING & CLOUD

40%64%

26%36%

ENCRYPTING DATA

MIGRATING DATA

Page 10: 2017 THALES DATA THREAT REPORT · fines and highest data breach rates in the world, it security spending priorities (rates of top 3 selection) even with “ ley federal de protecciÓn

COMPLEXITY AND SKILL SHORTAGESTOP BARRIERS TO DATA SECURITY DEPLOYMENT

LACK OF STAFF TO MANAGE

LACK OF ORGANIZATIONAL BUY IN

46%

48%

39%

31%

40%

COMPLEXITY

POTENTIAL PERFORMANCE IMPACTS

LACK OF PERCEIVED NEED

PERCEIVED BARRIERS TO ADOPTING DATA SECURITY

“…The lack of skilled security staff has been a consistent theme in 451’s research efforts the past few years, and in conjunction with complexity, makes a strong case for data security functionality delivered as a service”

Garrett Bekker451 Research

PERCEPTION OF COMPLEXITY

UNIVERSALLY THE TOP BARRIER

PERCEIVE COMPLEXITY AS THE TOP BARRIER TO ADOPTION DATA SECURITY SOLUTIONS

48%-2% FROM 2016GLOBAL – 50%

30% LACK OF BUDGET

Page 11: 2017 THALES DATA THREAT REPORT · fines and highest data breach rates in the world, it security spending priorities (rates of top 3 selection) even with “ ley federal de protecciÓn

75%OF ORGANIZATIONS SURVEYED ARE DEPLOYING NEW TECHNOLOGIES IN

ADVANCE OF HAVING APPROPRIATE LEVELS OF DATA SECURITY IN PLACE

99%WILL USE SENSITIVE DATA IN AT

LEAST ONE OF THESE ADVANCED TECHNOLOGY ENVIRONMENTS

39%

15%

42%

63%

22%

45%

60%

61%

BLOCKCHAIN

CONTAINERS

BIG DATA

IOT

PAAS

MOBILE

IAAS

SAASRATES OF SENSITIVE DATA USE BY ENVIRONMENT TYPE

Page 12: 2017 THALES DATA THREAT REPORT · fines and highest data breach rates in the world, it security spending priorities (rates of top 3 selection) even with “ ley federal de protecciÓn

ENTERPRISE CONCERNS WITH CLOUD/SAAS ENVIRONMENTS

78% – MEXICO SECURITY BREACHES/ ATTACKS AT CSP59% – GLOBAL

75% – MEXICO57% – GLOBAL

SHARED INFRASTRUCTURE VULNERABILITIES

64% – MEXICO LACK OF DATA LOCATION CONTROL55% – GLOBAL

69% – MEXICO LACK OF DATA PRIVACY POLICY / SLA52% – GLOBAL

81% – MEXICO CLOUD PRIVILEGED USER ABUSE/THREATS53% – GLOBAL

66% – MEXICO MEETING COMPLIANCE REQUIREMENTS47% – GLOBAL

76% – MEXICO CUSTODIANSHIP OF ENCRYPTION KEYS51% – GLOBAL

63% – JAPAN LACK OF VISIBILITY INTO SECURITY PRACTICES50% – GLOBAL

CONCERNS WITH SENSITIVE DATA IN CLOUD ENVIRONMENTS

ARE ALSO HIGH, WITH OVER HALF OF RESPONDENTS LISTING THEM AS ENVIRONMENTS WHERE THEY ARE CONCERNED ABOUT USING SENSITIVE DATA

57% PAAS

56% SAAS

56% IAAS

THREATS - RATES OF VERY OR EXTREMELY CONCERNED

Page 13: 2017 THALES DATA THREAT REPORT · fines and highest data breach rates in the world, it security spending priorities (rates of top 3 selection) even with “ ley federal de protecciÓn

WHAT CAN CSPS AND SAAS PROVIDERS DOTO INCREASE ENTERPRISE CLOUD ADOPTION IN MEXICO?

SUPPORT FOR CLOUD HSMSDATA ENCRYPTION IN THE CLOUD WITH ENTERPRISEPREMISE KEY CONTROL

CONSISTENTLY THE FIRST OR SECOND CHOICE THAT WOULD INCREASE ENTERPRISE USE OF CLOUD WORLDWIDE IS ENCRYPTION WITH ENTERPRISE PREMISE KEY CONTROL

64%MEXICO

61%GLOBAL

DATA ENCRYPTION IN THE CLOUD WITH CSP KEY

CONTROL

SLA AGREEMENTS AND LIABILITY TERMS FOR

DATA BREACHES

56%MEXICO

49%GLOBAL

48%MEXICO

42%GLOBAL

50%MEXICO

51%GLOBAL

66% 61% 62% 50% 49%

U.S. BRAZIL U.K. GERMANY JAPAN

Page 14: 2017 THALES DATA THREAT REPORT · fines and highest data breach rates in the world, it security spending priorities (rates of top 3 selection) even with “ ley federal de protecciÓn

BIG DATA – TOP DATA SECURITY CONCERNS AND STATS

TOP 5 CONCERNS

36% MEXICO

47% MEXICO

42% MEXICO

46% MEXICO

34% MEXICO

44% GLOBALSECURITY OF REPORTS THAT MAY INCLUDE

SENSITIVE DATA

45% GLOBALSENSITIVE DATA MAY RESIDE ANYWHERE

35% GLOBAL

PRIVACY VIOLATIONS - DATA ORIGINATES IN MANY

COUNTRIES

36% GLOBAL

PRIVILEGED USER ACCESS TO

PROTECTED DATA

31% GLOBALLACK OF EFFECTIVE ACCESS

CONTROLS

USING ENCRYPTION TO PROTECT DATA

IN BIG DATA ENVIRONMENTS TODAY

40%

VERY CONCERNED ABOUT SENSITIVE

INFORMATION IN BIG DATA WITHOUT DATA SECURITY CONTROLS

USING SENSITIVE INFORMATION IN BIG

DATA ENVIRONMENTS

MEXICO

36% GLOBAL

39% MEXICO

47% GLOBAL

49% MEXICO

44% GLOBAL

Page 15: 2017 THALES DATA THREAT REPORT · fines and highest data breach rates in the world, it security spending priorities (rates of top 3 selection) even with “ ley federal de protecciÓn

ENTERPRISES IN MEXICO HAVE HIGH IOT ADOPTIONUSE OF SENSITIVE DATA A CONCERN

TOP 5 DATA SECURITY CONCERNS FOR IOT

28% - IOT ATTACK OPSIMPACT

32% - PRIVACY VIOLATIONSFROM IOT DATA

30% - IDENTIFYING WHICHDATA IS SENSITIVE

46% - PROTECTING SENSITIVE DATA GENERATED BY IOT

37% - PRIVILEGED USER ACCESSTO IOT DEVICES

95%ADOPTING IOT TECHNOLOGIES

27%USING SENSITIVE

DATA IN IOT

32%VERY CONCERNED ABOUT

SENSITIVE DATA IN IOT

TOP 5 CONTROLS NEEDED TO INCREASE IOT ADOPTION

51% - ANTI-MALWARE FOR DEVICES

58% - IOT NETWORK ISOLATION

67% SECURE ID ANDAUTHENTICATION

57% - ENCYPTION OF DATA

52% - ANOMALY DETECTION/BEHAVIORAL ANALYSIS

Page 16: 2017 THALES DATA THREAT REPORT · fines and highest data breach rates in the world, it security spending priorities (rates of top 3 selection) even with “ ley federal de protecciÓn

TOP SECURITY CONTROLS NEEDEDTO INCREASE CONTAINER ADOPTION AND USE IN MEXICO

SECURITY THE TOP BARRIER TO CONTAINER DEPLOYMENT

47%

46%

ENCRYPTION

38%

37%

37%

55%

VULNERABILITY SCANNING

ANTI-MALWARE

MONITORING TOOLS FOR CONTAINERS

DIGITAL SIGNATURE IMAGE VALIDATION

42%

ENCRYPTION

36%

31%

45%

53%

VULNERABILITY SCANNING

ANTI-MALWARE

MONITORING TOOLS FOR CONTAINERS

DIGITAL SIGNATURE IMAGE VALIDATION

MEXICO

GLOBAL

97%PLAN TO DEPLOY

CONTAINER TECHNOLOGY BY

END OF 2017

Page 17: 2017 THALES DATA THREAT REPORT · fines and highest data breach rates in the world, it security spending priorities (rates of top 3 selection) even with “ ley federal de protecciÓn

ENCRYPTION ENABLES DIGITAL TRANSFORMATIONA KEY TOOL REQUIRED FOR ADVANCED TECHNOLOGY ADOPTION

ENCRYPTION ENABLES FURTHER ADOPTION OF CLOUD

CLOUD DATA ENCRYPTION IN THE CLOUD WITH ENTERPRISE PREMISE KEY CONTROL

64% 61%

ENCRYPTION OFFSETS TOP SECURITY CONCERNS

BIG DATASENSITIVE DATA EVERYWHERE

SECURITY OF REPORTSPRIVILEGED USER ACCESS

36%47%46%

IOT DATA ENCRYPTION57%SECURE DIGITAL IDENTITY

(AN ENCRYPTION TECHNOLOGY)67%

CONTAINERS

MEXICO GLOBAL

ENCRYPTION A TOP CONTROL NEEDED TO ENABLE GREATER ADOPTION

GLOBAL45%44%36%

THE TOP TECHNOLOGY NEEDED TO EXPAND USAGE56%55%

GLOBAL

GLOBAL53%MEXICO55%

MEXICO

MEXICO

Page 18: 2017 THALES DATA THREAT REPORT · fines and highest data breach rates in the world, it security spending priorities (rates of top 3 selection) even with “ ley federal de protecciÓn

BEST PRACTICE RECOMMENDATIONSGARRETT BEKKER, 451 RESEARCH

Cloud and SaaS break legacy IT Security models – Data security with encryption and access controls across environments is required.Service-based solutions and platforms that include automation are preferred for reduced costs and simplicity.

Get a better handle on the location of sensitive data, particularly for Cloud, Big Data, Containers and IoT

Global and industry regulations can be demanding, but agencies should consider moving beyond compliance to greater use of encryption and BYOK, especially for cloud and other advanced technology environments.

Encryption and access control

Don’t just check off the compliance box

Discover and classify

Re-prioritize your IT security tool set

Encryption needs to move beyond laptops and desktops.Data center: File and application level encryption and access controlsCloud: Encrypt and manage keys locally, BYOK enables safe SaaS, PaaS and IaaSBig Data: Encryption and access control within the environmentContainers: Encrypt and control access to data both within containers and underlying data storage locationsIoT: Use secure device ID and authentication, as well as encryption of data at rest on devices, back end systems and in transit to limit data threats

Page 19: 2017 THALES DATA THREAT REPORT · fines and highest data breach rates in the world, it security spending priorities (rates of top 3 selection) even with “ ley federal de protecciÓn

OUR SPONSORS

Page 20: 2017 THALES DATA THREAT REPORT · fines and highest data breach rates in the world, it security spending priorities (rates of top 3 selection) even with “ ley federal de protecciÓn

ABOUT THALES E-SECURITY

Instilling trust across the data landscapeOur powerful technology platform provides advanced data security for more servers, applications, and environments than any other security alternative

What we doThales e-Security provides companies everything they need to protect and manage their data and scale easily to new environments and requirements—encryption, advanced key management, tokenization, authorization, privileged user control, and HSMs.

Our customersOur customers include 19 of the world’s 20 largest banks, four of the world’s five largest oil companies, 27 NATO country members and 15 of the Fortune 25.

Page 21: 2017 THALES DATA THREAT REPORT · fines and highest data breach rates in the world, it security spending priorities (rates of top 3 selection) even with “ ley federal de protecciÓn

Data Protection Platform

Key Management Encryption

Our solutions protect data while eliminating complexity, inefficiency and cost

DATA PROTECTIONHARDWARE

DATA PROTECTIONSOFTWARE

CustomerRecords

DB/ File Encryption

Secure Analytics

Big Data

PII

ApplicationEncryption

PCI,PHI

TokenizationData Masking

Internet of

Things

Public KeyInfra (PKI)

Use Cases

CloudMigration

Cloud Security

Payment related apps

TransactionSecurity

ScriptDevelopmen

t

Code Signing

Page 22: 2017 THALES DATA THREAT REPORT · fines and highest data breach rates in the world, it security spending priorities (rates of top 3 selection) even with “ ley federal de protecciÓn

www.thales-esecurity.com

2017 THALES DATA THREAT REPORTTrends in Encryption and Data Security

MEXICO AND BRAZIL EDITION