InformationWeek 2014 Strategic Security Survey Research
Findings 2014 Property of UBM Tech; All Rights Reserved
Slide 2 > 58% see an infected personal device connecting to
the corporate network as a top endpoint security concern, making it
the No. 1 response, ahead of phishing and lost devices. >>
56% say cyber-criminals pose the greatest threat to their
organizations this year, the top answer, ahead of authorized users
and employees at 49%. >> 31% conduct their own audits of
cloud providers. >> 23% have experienced a security breach or
espionage in the past year. Respondent breakdown: 41% have 5,000 or
more employees; 30% are over 10,000. Government, financial
services, and education are well-represented. Want more? Visit
InformationWeek ReportsInformationWeek Reports Executive Summary v
2014 Property of UBM Tech; All Rights Reserved">
Enterprises outsource everything from server hosting to
application development. Why not security? Look for this year to
mark the start of a new era in information security, where
organizations that can afford to build sophisticated analysis teams
-- able to incorporate device context into security events data in
a high-volume information steam -- do so, and those that can't hire
specialized providers. "Managing the complexity of security"
reclaimed the No. 1 spot among 10 challenges facing the 536
respondents to our InformationWeek 2014 Strategic Security Survey,
all from organizations with 100 or more employees. More stats:
>> 58% see an infected personal device connecting to the
corporate network as a top endpoint security concern, making it the
No. 1 response, ahead of phishing and lost devices. >> 56%
say cyber-criminals pose the greatest threat to their organizations
this year, the top answer, ahead of authorized users and employees
at 49%. >> 31% conduct their own audits of cloud providers.
>> 23% have experienced a security breach or espionage in the
past year. Respondent breakdown: 41% have 5,000 or more employees;
30% are over 10,000. Government, financial services, and education
are well-represented. Want more? Visit InformationWeek
ReportsInformationWeek Reports Executive Summary v 2014 Property of
UBM Tech; All Rights Reserved
Slide 3
Biggest challenges: managing complexity, enforcing policies
2014 Property of UBM Tech; All Rights Reserved
Slide 4
Vulnerability is largely unchanged 2014 Property of UBM Tech;
All Rights Reserved
Slide 5
Most feel threats are getting more sophisticated 2014 Property
of UBM Tech; All Rights Reserved
Slide 6
Most have not experienced security breach 2014 Property of UBM
Tech; All Rights Reserved
Slide 7
Most common breach: Malware 2014 Property of UBM Tech; All
Rights Reserved
Slide 8
Network/business apps most common victims 2014 Property of UBM
Tech; All Rights Reserved
Slide 9
Top breach/espionage threats: Cyber-criminals, employees 2014
Property of UBM Tech; All Rights Reserved
Slide 10
Most use firewalls, email security tools 2014 Property of UBM
Tech; All Rights Reserved
Slide 11
Firewalls considered most valuable 2014 Property of UBM Tech;
All Rights Reserved
Slide 12
Most require strong passwords
Slide 13
Strong passwords, training valued most 2014 Property of UBM
Tech; All Rights Reserved
Slide 14
Best way to manage vulnerabilities 2014 Property of UBM Tech;
All Rights Reserved
Slide 15
Best way to achieve regulatory compliance 2014 Property of UBM
Tech; All Rights Reserved
Slide 16
Who sets security policy? 2014 Property of UBM Tech; All Rights
Reserved
Slide 17
Security budget 2014 Property of UBM Tech; All Rights
Reserved
Slide 18
Security spending relatively consistent 2014 Property of UBM
Tech; All Rights Reserved
Slide 19
How valuable are security investments? 2014 Property of UBM
Tech; All Rights Reserved
Slide 20
Half consider mobile a minor security threat 2014 Property of
UBM Tech; All Rights Reserved
Slide 21
MDM software used? 2014 Property of UBM Tech; All Rights
Reserved
Slide 22
Top endpoint security concern: personal devices 2014 Property
of UBM Tech; All Rights Reserved
Slide 23
Top cloud concerns: leaks, defects 2014 Property of UBM Tech;
All Rights Reserved
Slide 24
Who does cloud risk assessments? 2014 Property of UBM Tech; All
Rights Reserved
Slide 25
Who has SIEM systems? 2014 Property of UBM Tech; All Rights
Reserved
Slide 26
Who has big data security analytics system? 2014 Property of
UBM Tech; All Rights Reserved
Slide 27
Top security analytics: Hadoop 2014 Property of UBM Tech; All
Rights Reserved
Slide 28
Big data analytics focus on endpoint, web activity 2014
Property of UBM Tech; All Rights Reserved
Slide 29
Who gets big data security info? 2014 Property of UBM Tech; All
Rights Reserved
Slide 30
Most have security operations team 2014 Property of UBM Tech;
All Rights Reserved
Slide 31
Who has insurance policy? 2014 Property of UBM Tech; All Rights
Reserved
Slide 32
How is insurance need determined? 2014 Property of UBM Tech;
All Rights Reserved
Slide 33
Most have not been directly targeted 2014 Property of UBM Tech;
All Rights Reserved
Slide 34
Subscribe to threat service? 2014 Property of UBM Tech; All
Rights Reserved
Slide 35
Security staffing 2014 Property of UBM Tech; All Rights
Reserved
Slide 36
Security skills shortage: little change expected 2014 Property
of UBM Tech; All Rights Reserved
Slide 37
Respondents job titles 2014 Property of UBM Tech; All Rights
Reserved
Slide 38
Industries represented 2014 Property of UBM Tech; All Rights
Reserved
Slide 39
Respondents company revenues 2014 Property of UBM Tech; All
Rights Reserved
Slide 40
Respondents company sizes 2014 Property of UBM Tech; All Rights
Reserved
Slide 41
Survey Name InformationWeek 2014 Strategic Security Survey
Survey Date April 2014 Region North America Number of Respondents
536 at organizations with 100 or more employees Purpose To
comprehensively assess the current state of security programs,
where organizations are focusing their security efforts, and how IT
is adapting to current threats and trends. Methodology
InformationWeek surveyed business technology decision-makers at
North American organizations with 100 or more employees. The survey
was conducted online, and respondents were recruited via an email
invitation containing an embedded link to the survey. The email
invitation was sent to qualified InformationWeek and Dark Reading
subscribers. Want more? Visit InformationWeek
ReportsInformationWeek Reports Research Synopsis 2014 Property of
UBM Tech; All Rights Reserved