Upload
varunee-wongwichit
View
100
Download
1
Embed Size (px)
Citation preview
Cybersecurity: 3 top trends
Cybersecurity TrendsBy: Varunee Wongwichit
3 TRENDS
ISACA 2015 SURVEY
Companies providing mobile devicesCompanies experiencing physical loss of assets
Factors for End User data breaches
Outdated equipment (government level)
"State's technology is so antiquated that NO ONE uses a State-issued laptop and even high officials routinely end up using their home email accounts to be able to get their work done quickly and effectively," top Clinton aide Ann-Marie Slaughter(June 2013)
Employees using their work issued devices for personal use and vice versa
Only 42% of ISACA survey respondents restrict access to social media
Using those devices on unsecured Wi-Fi
Disgruntled employees could intentionally allow a breach in order to harm the company
Employees can sell critical data to cybercriminals for a fee
The cost of protecting a small companys digital infrastructure can be cost prohibitive
SolutionsTraining programsEducate staff on personal device securityRecognize malware embedded in infected emails (phishing)Require updated passwords on a set schedulePromote employee loyalty
Software and HardwareUp-to-date software Maintenance
Cybersecurity PolicyClear course of actionWi-Fi security Protection of critical data
SECURING THE CLOUDCompanies rely on cloud computing servicesOpportunity for data breachWhich is the best choice?30%5%Public: 88% Private: 63%PrivateCloudOnlyPublicCloudOnlyPublic & Private93% of Respondents Are Using CloudSource : RightScale 2015 State of the Cloud Report
58%
3 Types of cloud computingPublic3rd party cloud services provided over the internet Convenient for individual usersOpportunity for data breach due to lack of personal securityLoss of personal devices
PrivateCloud services are delivered from a business data center to internal usersVersatility and convenience while still assuring management of control and securityCan be cost prohibitive for small businesses Provides real time data analytics HybridPractical for most businessesAllow the enterprise to manage mission-critical data on the private cloud while utilizing the infrastructure of the public cloudSeamless integration between both clouds
Seamless Integration
Workforce
The Talent Gap 45% view the inability to hire and retain expert staffLack of master cyber workforce strategyDemand for qualified workforce outpacing supplySTEM education at all levels
Source: Ponemon Institute Research Report 2015
Barriers for Cyber Security workforce
Lack of entry level positionsDisparity between experience and skill levelCost of education and certificationsNo set business associationSecurity clearanceUnclear path of advancement
Opportunities:
Support cybersecurity competitions and scenario-based testingOffer more internship programsProvide a clear path of advancementApprove security clearances in a timely matterImprove cybersecurity trainingDevelop a market sensitive pay system