how digital transformation has made the ciso …...analysis 57% of enterprises have applications or...

1
© 2017 VMware, Inc. All rights reserved. Identity Management Cloud Access Security Artificial Intelligence In 2013 Target onboarded its first CISO, but today every company over $3B in revenue has a recognized head of information security, as do most companies with more than $300M. 1 Digital transformation has increased the frequency, severity and complexity of cyber security issues. Long viewed as just an IT issue, boards now see CISO's critical in implementing a 360 degree cyber security strategy. RESOURCES 1 http://www.securityinfowatch.com/article/12337447/cso-or-ciso-who-makes-security-policy 2 http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf 3 http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/ 4 http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf 5 https://s3.amazonaws.com/uploads.hipchat.com/41060/2777743/FQtGL19FBdLrVeJ/Cyber-adAPT_Whitepaper_2017.pdf 6 https://www.forescout.com/company/news/press-release/new-survey-finds-that-78-percent-of-it-security-professionals-believe- network-access-control-is-an-essential-function-to-protect-enterprises-from-mobile-device-risks/ 7 https://haystax.com/blog/ebook/insider-attacks-industry-survey/ 8 https://www.sophos.com/medialibrary/pdfs/other/sophossecuritythreatreport2012.pdf, 8 https://www.idgenterprise.com/resource/research/idg-enterprise-cloud-computing-study-2014/ 9 https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/ 10 https://www.symantec.com/about/newsroom/press-releases/2011/symantec_1019_01.pdf 11 https://cybersecurityventures.com/jobs/ 12 https://s3.amazonaws.com/files.technologyreview.com/whitepapers/Cybersecurity-Challenges-Survey-Findings.pdf HOW DIGITAL TRANSFORMATION HAS MADE THE CISO INDISPENSABLE 70% 2017: Automated, actionable monitoring Faster attack detection limits business impact by Artificial intelligence (AI) can monitor, detect and investigate security events faster & more accurately than a human. 5 Deception Technology Detection and Response Honey Pots TOOLS: data breaches and 174M records compromised, data breaches and 6B records compromised Endpoint Security Cloud Security Micro-segmentation TOOLS: 855 2012: A 'walls up' approach 2017: Inside out strategies 2 , 227 due to new malware threats, ransomware, and DDoS attacks. 3 mostly attributed to email service provider phishing attacks. 2 Software Composition Analysis 57% of enterprises have applications or infrastructure 2012: Enabling cloud technology 2017: Enabling IoT running in the cloud, but 52% haven’t implemented controls to mitigate data risk. 8 30B By 2020, there will be connected devices, which means enterprises need security solutions that will both enable IoT innovation, and keep data secure. 9 TOOLS: PROTECTION MONITORING GOVERNANCE INNOVATION STAFFING TOOLS: 58% of IT professionals feel implementing security policies are the best way improve enterprise security, and 2012: Security by policy 96% want unified security policy management. 6 2017: Creating a culture of security 74% 40% 2017: Worldwide shortage Forecasts point to a global shortage of 3.5M cyber security professionals by 2021. 11 of CISOs identify lack of in-house expertise their biggest challenge. 12 Security Awareness Training Incident Response Playbooks 85% of breaches took weeks or more to discover and 92% of security incidents were 2012: Managed 'human' monitoring discovered by a third party. 4 Cross-Training Staff Augmentation Creative Recruiting TOOLS: 57% of respondents lack confidence in their IT security staffs' ability to 2012: Declining confidence respond to new and emerging threats. 10 of organizations feel vulnerable to insider threats and estimate insider breach remediation costs could reach $500,000. 7

Upload: others

Post on 05-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: HOW DIGITAL TRANSFORMATION HAS MADE THE CISO …...Analysis 57% of enterprises have applications or infrastructure 2012: Enabling cloud technology 2017: Enabling IoT running in the

© 2017 VMware, Inc. All rights reserved.

Identity Management

Cloud Access Security

Artificial Intelligence

In 2013 Target onboarded its first CISO, but today every company over $3B inrevenue has a recognized head of information security, as do most companies with more than $300M.1 Digital transformation has increased the frequency, severity and complexity of cyber security issues. Long viewed as just an IT issue, boards now

see CISO's critical in implementing a 360 degree cyber security strategy.

RESOURCES1 http://www.securityinfowatch.com/article/12337447/cso-or-ciso-who-makes-security-policy

2 http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf

3 http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/

4 http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf

5 https://s3.amazonaws.com/uploads.hipchat.com/41060/2777743/FQtGL19FBdLrVeJ/Cyber-adAPT_Whitepaper_2017.pdf

6 https://www.forescout.com/company/news/press-release/new-survey-finds-that-78-percent-of-it-security-professionals-believe-

network-access-control-is-an-essential-function-to-protect-enterprises-from-mobile-device-risks/

7 https://haystax.com/blog/ebook/insider-attacks-industry-survey/

8 https://www.sophos.com/medialibrary/pdfs/other/sophossecuritythreatreport2012.pdf,

8 https://www.idgenterprise.com/resource/research/idg-enterprise-cloud-computing-study-2014/

9 https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/

10 https://www.symantec.com/about/newsroom/press-releases/2011/symantec_1019_01.pdf

11 https://cybersecurityventures.com/jobs/

12 https://s3.amazonaws.com/files.technologyreview.com/whitepapers/Cybersecurity-Challenges-Survey-Findings.pdf

HOW DIGITAL TRANSFORMATIONHAS MADE THE CISO INDISPENSABLE

70%2017: Automated, actionable monitoring

Faster attack detection limits business impact by Artificial intelligence (AI) can monitor, detect and investigate security events faster & more accurately than a human.5

Deception Technology

Detection and Response

Honey Pots

TOOLS:

data breaches and 174M records compromised,

data breaches and 6B records compromised

Endpoint Security

Cloud Security

Micro-segmentation

TOOLS:

8552012: A 'walls up' approach

2017: Inside out strategies

2,227 due to new malware threats, ransomware, and DDoS attacks.3

mostly attributed to email service provider phishing attacks.2

Software Composition Analysis

57% of enterpriseshave applications or infrastructure

2012: Enabling cloud technology

2017: Enabling IoT

running in the cloud, but 52% haven’t implemented controls to mitigate data risk.8

30B

By 2020, there will be connected devices, which means enterprises need security solutions that will both enable IoT innovation, and keep data secure.9

TOOLS:

PROTECTION

MONITORINGGOVERNANCE

INNOVATION

STAFFING

TOOLS:

58% of IT professionals feel implementingsecurity policies are the best way improve enterprise security, and

2012: Security by policy

96% want unified security policy management.6

2017: Creating a culture of security

74%

40%

2017: Worldwide shortage

Forecasts point to a global shortage of 3.5M cyber security professionals by 2021.11

of CISOs identify lack of in-house expertise their biggest challenge.12

Security Awareness Training

Incident Response Playbooks

85% of breaches took weeks ormore to discover and 92% of security incidents were

2012: Managed 'human' monitoring

discovered by a third party.4

Cross-Training

Staff Augmentation

Creative Recruiting

TOOLS:

57% of respondents lackconfidence in their IT security staffs' ability to

2012: Declining confidence

respond to new and emerging threats.10

of organizations feel vulnerable to insider threats and estimate insider breach remediation

costs could reach $500,000.7