25
Perception gaps in cyber resilience: Where are your blind spots? The hidden costs of shadow IT, cloud, and cyber insurance Sandeep Kumar : Business Resiliency Leader, SIH east

Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

Perception gaps in cyber resilience: Where are your blind spots?

The hidden costs of shadow IT, cloud, and cyber insurance

Sandeep Kumar : Business Resiliency Leader, SIH east

Page 2: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

Forbes Insights conducted a study in partnership with IBM to better

understand how business leaders are working to make their

organizations more secure and resilient by examining how leading

organizations approach business continuity and disaster recovery.

→How their organizations approach cybersecurity, business continuity, and

recovery

→The effects of Shadow IT on their organization’s security and recovery

strategies

→Their coverage and security practices related to cloud service providers

→The role cyber insurance plays in mitigating a multitude of risks

The survey gathered opinions from more than 350 executives across the globe about:

Overview

Page 3: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

MethodologyForbes Insights surveyed 353 executives across the globe about their outlook on cybersecurity and resiliency at their organizations. Respondents are from the following demographic breakdowns.

Title

30%

30%

31%

9%

North America

Europe

Asia-Pacific

Latin America

Africa/Middle East

Region Revenue

25%

27%23%

25%

$500 million - $999.9million$1 billion - $4.9 billion

$5 billion - $9.9 billion

$10 billion or more

Industry

Banking 10%

Telecommunications, media & entertainment

9%

Automotive 7%

Insurance 7%

Healthcare 7%

Energy and utilities 7%

Retail 7%

Chemical and petroleum 6%

Government 6%

Manufacturing, resources & construction

6%

Education 6%

Travel and transportation 5%

Consumer products 4%

Life sciences 4%

Electronics 3%

Financial markets 3%

Aerospace and defense 3%

Other <1%

CIO 17%

CTO 9%

CSO 9%

CISO 8%

COO 6%

CPO 6%

CFO 5%

CEO <1%

Other C-Suite <1%

EVP/SVP/VP of IT Operations 11%

EVP/SVP/VP of Business Continuity 9%

EVP/SVP/VP of Disaster Recovery 8%

EVP/SVP/VP of IT Security Operations 6%

EVP/SVP/VP of IT Architecture 6%

Other EVP/SVP/VP of IT <1%

EVP/SVP/VP of Line of Business <1%

Page 4: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

Who is responsible for cybersecurity (prevention and protection) at your organization? (Select all that apply)

85%

69%62%

47%41%

37%

22%

14%9% 7%

Responsibility for cybersecurity tends to fall on the Chief Information and Security Officers

Chief Information

Officer

Chief Security Officer

Chief Informati

on Security Officer

Head of IT

department

Broadly shared responsibility with a C-level

executive accountable for

policy and budget

Broadly shared responsibility

with one manager

accountable for policy and

budget

Chief Financial Officer

Narrowly shared

responsibility with a C-level

executive accountable for

policy and budget

Narrowly shared

responsibility with one manager

accountable for policy and

budget

Chief Revenue Officer

Page 5: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

Who is responsible for business continuity and disaster recovery during a cyber event in your organization and after a cyber event in your organization?

(Select all that apply)

76% 74%

57% 55% 54%

42%38%

34%

26%

12%1% 0%

69% 69%

53%50%

53%

44%

37% 35%

24%

12%1% 0%

Responsible during a cyber event Responsible after a cyber event

CIOs are most often responsible for continuity and recovery during and after a cyber event

Chief Information

Officer

A team of executives

responsible for cybersecurity and those responsible

for BC/DR

A managed service

provider(s)

Chief Information

Security Officer

Head of business

continuity/disaster recovery

An IT partner/vendor

Chief Security Officer

Head of IT department

/infrastructu

re

Chief Risk

Officer

Chief Financi

al Officer

Other It's not always clear

Page 6: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

→38% worry that no matter how well they protect their data, systems and

applications, they could still face a cascade of failures from a source beyond

their control

→41% recognize that their organization is more hyperconnected than ever and

that makes recovery more challenging in the face of a cyber event

→Yet, only 42% say that cyber resilience is an integral part of their organization's

digital transformation

→Only 37% believe their top management understands the difference between

mitigating cyber risk versus working toward a more comprehensive,

orchestrated, dynamic cyber-resilience strategy

→Fewer than half say that business continuity/disaster recovery teams and

protocols are an integral part of cyber-resilience planning and practice at their

organization

Planning Cyber Resilience

Page 7: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

Has your organization been impacted by any of the following cyber events in the last three years?(Select all that apply)

40%

21%

16% 16%14% 13% 13% 11% 11%

9% 8% 7% 7% 7%5%

44%

More than half of organizations have experienced at least one cyber event in the last three years; a fifth have been victims of password phishing

Power outage

Password

phishing

Denial-of-

service

Socially engineer

ed malware

Ransomware

Attacks via

unpatched

software

Outage due to human error

Social media cyber

attacks

Identity and

access

Man in the

middle (MITM)

Advanced persistent

threats (APT)

Insider attacks

SQL injection

Crypto-jacking

Cross-site scripting

None of the above

Page 8: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

How did that event(s) change the way your organization plans for business continuity and disaster recovery?(Select all that apply)57%

51%

46%

35% 35%

27% 27% 26%22% 20% 20%

18%

10%

90% of organizations made changes after a cyber event; more than half expanded their continuity teams or purchased cyber security solutions

Expanded our business continuity

and disaster recovery

teams/elevated their status within the organization

Purchased cyber security

solutions

Decentralized our

business continuity

and disaster recovery efforts

Hired experts to

join our business

continuity and disaster

recovery teams

Invested in new cyber

security technolog

ies

Consolidated our business

continuity and disaster

recovery efforts under one executive

Purchased cyber security insuranc

e

Revised our data

governance/manage

ment protocols

Reviewed our

providers and made changes where

necessary

Centralized our business

continuity and disaster

recovery efforts

(Re)designed our systems, practices and processes to

build in resilience

Revised our policies

regarding non-centralized and non-approved

applications

Not changed our plans

Page 9: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

12%

12%

34%

27%

14%1- Not at all confident

2

3

4

5 - Extremely confident

Just 42% are very confident that their organization could recover from a major cyber event without impacting their business

How confident are you that your organization could recover from a major cyber event without impacting your business?

Page 10: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

Three in five execs think security and disaster recovery are independent and don’t work well together

Where do you see impediments to improving your organization's cyber resilience? (Select all that apply)

16%

17%

22%

34%

35%

43%

45%

52%

60%Security and disaster recovery are independent and don't work well together

Lack of clear accountability for business continuity and disaster recovery

Systems not designed for resilience

Lack of in-house expertise

Too little money budgeted to recovery

Business continuity and disaster recovery are not a priority of top management/board

Too much reliance on outside vendors for continuity and recovery

Lack of understanding of risk to ongoing operations from potential cyber event

None of the above

Page 11: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

4%7%

11%

20%

25%

31%

1000 or more

Between 750 and 1000

Between 500 and 750

Between 250 and 500

Between 100 and 250

Less than 100

None

I don't know

Two thirds—68%—retain at least 100 different applications and only 48% are very confident that they are aware of all technologies users rely on

Approximately how many applications does your organization or company retain?

8%

20%

25%

32%

16% 1- Not particularly confident

2

3

4

5 - Extremely confident

How confident are you that your organization is aware of all the technology users rely on to do their jobs?

Shadow IT

Page 12: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

11%

10%

31%

36%

12%1 - Not particularlyaware/responsive

2

3

4

5 - Extremely aware/responsive

Fewer than half believe their organization is adequately aware of shadow IT risks; three quarters use network monitoring to detect unknown devices

How aware and responsive do you believe your organization is when it comes to the potential risks and vulnerabilities of

shadow IT?

What policies and protections does your organization employ toward shadow IT? (Select all that apply)

33%

34%

67%

71%

74%Network monitoring to detect

unknown devices

Well-publicized guidelines for BYOD, cloud services and third-party

applications

Restricted access to non-sanctioned third-party applications

Users can choose their own devices and a wide range of applications,

minimizing the need for shadow IT

Zero-trust policy for logging into sensitive parts of the network

Shadow IT

Page 13: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

12%

20%

22%

29%

17%1 - Completely disagree

2

3

4

5 - Completely agree

Four out of ten say direct purchasing of SaaS and other non-sanctioned software by individuals and business units makes it impossible to protect all their data, systems and applications

To what extent do you agree with the following statements around planning and maintaining cyber resilience in your organization?

Shadow IT

Direct purchasing of software-as-a-service, personal and business applications and other non-sanctioned software by individuals and business units at our organization makes it impossible to protect all our data, systems and

applications all of the time

Page 14: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

21%

79%

Yes

No

One in five organizations experienced a cyber incident due to non-sanctioned hardware; three in five don’t include shadow IT in threat assessments

Have you or your office or department ever experienced a loss-of data, sales, operations, worktime or reputation-because of a cyber incident or

outage related to non-enterprise, non-sanctioned hardware?

40%

41%

19%Yes, as much as possible for knowncritical applications

No, but it should

No, we protect what matters mostand shadow IT is not consideredcritical

I don't know

Does your organization's threat/risk assessment include shadow IT?

Shadow IT

Page 15: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

Nearly nine in ten executives believe the users themselves are responsible for security of unsupported applications; just 41% say their security team is

Who do you believe should be responsible for security and recovery when it comes to applications that are not directly supported by your organization's IT function?(Select all that apply)

11%

25%

36%

39%

41%

41%

64%

68%

87%The users themselves

Our IT department

The vendors or providers of each application

Our security team

In-house developers who customize applications for your department or functionDisaster recovery teams

The line-of-business manager who sanctioned them

Our cloud service provider(s)

Third-party developers who customize applications for your department or function

Shadow IT

Page 16: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

Hybrid cloud is the most common IT infrastructure; tiering is the most popular means to secure data in the cloud

What type of IT infrastructure does your organization rely on? (Select all that apply)

How does your organization secure data in the cloud?(Select all that apply)

38%

42%

44%

46%

60%

65%

75%Prioritize and tier data based

on accessibility required

We have a regularly updated recovery plan(s) with our cloud

provider(s)

Conduct regular back-up and failover testing with CSP

Monitor access11%

37%

39%

56%

62%Hybrid cloud

Traditional data centers

Public cloud

Private cloud

Multi cloud

Encrypt sensitive data

Zero-trust policy for access

We rely on our CSP's guarantee of security, recovery and continuity.

Cloud Service Providers

Page 17: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

3%9%

44%

31%

13%1 - Not at all confident

2

3

4

5- Extremely confident

Only 45% are confident that cloud service providers can meet service-level agreements in the case of a cyber event

How confident are you that cloud service provider(s) can meet service-level agreements should there be a cyber event?

16%

31%

54%

The cloud service provider wouldcover most costs

Our organization would be on thehook for most costs

Costs would be shared as outlinedin our contract

Not sure

If a cloud provider is responsible for an outage or a breach and service-level agreements are not met, who would bear the cost for recovery,

downtime and any monetary or reputational loss?

Cloud Service Providers

Page 18: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

12%

18%

24%

21%

24% 1 - Completely disagree

2

3

4

5 - Completely agree

45% say their increased reliance on cloud-based systems makes it impossible to protect all their data, systems and applications all of the time

To what extent do you agree with the following statements around planning and maintaining cyber resilience in your organization?

Cloud Service Providers

Our increased reliance on cloud-based systems makes it impossible to protect all our data, systems and applications all of the time

Page 19: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

13%

87%

Yes

No

Not sure

13% have lost data or faced downtime because of an incident with a cloud service provider; 58% of those incidents involved security breaches

Has your organization lost data or faced downtime because of an incident with a cloud service provider?

What was the cause of the incident?*(Select all that apply)

2%

27%

29%

33%

40%

44%

58%Security breach

Physical damage to cloud service provider's facility

System misconfiguration (e.g. permissions set to public)

Human error

I don't know

*Only asked to those who said ‘Yes.’

Failover failure

Power outage

Cloud Service Providers

Page 20: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

44%

56%

Yes

No

Not sure

One third of those impacted by a cyber incident say their cloud provider did not meet service level agreements

Was your firm compensated by the provider for any lost business, downtime, legal fees or any

other financial loss that was the result of a cloud service provider incident?*

36%

33%

29%

2%Yes

No

They were exemptas specified in ourcontract

Did your cloud service provider meet service-level agreements following the incident?*

*Only asked to those who said ‘Yes.’

Cloud Service Providers

Page 21: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

Three-quarters of firms incorporate cloud service providers in their threat and risk assessment

78%

21%

Yes

No

Not sure

Does your organization incorporate cloud service providers in your threat/risk assessment?

Cloud Service Providers

Page 22: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

27%

8%

31%

20%

15%

Yes

Not yet, but we are planning topurchase cyber insurance in thenear futureNo, but we need it

No, and we don't need it

Not sure

Only a quarter of organizations have cyber insurance; three quarters of those say they have it because their risk department determined they should

Does your organization have cyber insurance? What are the most important reasons behind why your organization initiated or will initiate insurance coverage?*

(Select all that apply)

8%

31%

34%

63%

72%Our risk department

determined we should have it

To offset potential costs of a cascading event in a more

connected environment We have experienced one or more

cyber events and recognize the need to minimize our risks and

costsNot sure

Our board of directors mandated coverage

*Only asked to those who said ‘Yes’ or ‘Not yet, but we are planning to

purchase cyber insurance in the near future.’

Cyber Insurance

Page 23: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

Which costs and incidents do you believe are covered by your cyber insurance policy?*

40% 39%32% 27% 24% 21% 18% 15% 14% 14% 13% 11% 11% 11%

31% 32%34% 40% 45%

45%36% 46%

57%

24% 31% 36%

52%37%

16% 17% 26% 21%26%

20%35% 23%

22%

43% 33%

47%

34%

37%

13% 12% 9% 12%5%

14% 11% 16%6%

19% 23%

6%15%

Costs covered in full Costs covered in part

Cost of data

recovery

Four in ten executives believe that the costs of data recovery and managing a crisis are covered in full by their cyber insurance

*Only asked to those who said ‘Yes’ they have cyber insurance.

Cost of managi

ng a crisis

Monetary loss from network

downtime/business

interruption

Legal expenses associated with the release of confidential

information or intellectual

property

Credit monitorin

g for affected

customers

Legal settleme

nts

Cost of forensics

investigation/coordination

with law enforcement

and third-party organizations

Regulatory fines

Cost of cyber

extortion, such as

ransomware

Reputational costs

Events originating

with vendors, service

providers or other third parties that impact your organization

Non-malicious acts by an employee (human

error) that lead to an outage or

breach

Data breach notifications

to customers

and affected parties

Cost of preventing

similar events in

the future

Cyber Insurance

Page 24: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

15%

24%

61%

The ability to underwrite some of the risks associated with a cyberevent

Developing and maintaining a more robust resilience plan thatcovers the lifecycle of critical data and processes

They are both equally important

Other

Only 24% believe that developing and maintaining a more robust resilience plan is more important than the ability to underwrite cyber risk

Which do you believe is most important to minimizing the impact of a cyber event?

Cyber Insurance

Page 25: Perception gaps in cyber resilience: Where are your blind ...public.dhe.ibm.com/software/in/pdf/Cyber_Resiliency_blind_spots.pdf · One in five organizations experienced a cyber incident

Thank you