identify and plug the security skills gap

1
THE SKILLS GAP © BCS, The Chartered Institute for IT, is the business name of The British Computer Society (Registered charity no. 292786) 2013 Sources: ‘Data Breach Overview: An Executive’s Guide to Data Breach Trends in 2012’, mobistealth.com, floridatechonline.com, siliconrepublic.com, ‘Surviving the Technical Security Skills Crisis’ - Forrester Consulting on behalf of IBM, ‘IT Executives Vision’ - IDG Research Services conducted for HP for 2020 (May 12), ISC Global Information Security Workforce Study 2013 THE ISSUE ? In 2012 , more than 267 million data records were compromised in 2,644 reported incidents - up 117% over the previous year In 2012 , where insiders were responsible for data breaches, 56% of incidents were accidental - the result of user error and inadequate training . There are 50,000 victims of cybercrime every hour 89% say that having qualified information security staff is a top priority 80% believe it is difficult to find and hire staff that fit all requirements 92% say staffing issues contribute to heightened risk levels Do you know how to identify and fill the skills gaps in your organisation? SECURITY Identify and plug the security skills gap ! ATTACK How breaches occur Social tactics (7%) Privilege misuse (5%) Physical attacks (10%) Malware (69%) Hacking (81%) In an industry that's constantly changing, you need to help your people to stay ahead of the game As The Chartered Institute for IT, we're always up-to-date with the latest trends We can develop your employees’ skills so they can make decisions critical to your business READY TO STAY SECURE? Contact us on +44 (0) 1793 417755 or visit enterprise.bcs.org and help your team meet the demands of tomorrow. DEFENCE Most common techniques Intrusion prevention Monitoring technologies Data encryption Antivirus Firewalls 001111 001111 01 001111 00 010101 0 0 senior IT executives are concerned about data privacy and information breaches Hacking was the number one breach type for the second consecutive year in 2012 The business sector accounted for Incidents by sector Records exposed by sector Business 60.6% 84.7% 12.6% 1.6% 1.1% 17.9% 12.0% 9.5% Government Education Medical Business Government Education Medical of information security breaches in 2012 85%

Post on 18-Oct-2014

207 views

Category:

Business


0 download

DESCRIPTION

Infographic that looks at the key security issues, how breaches occor and the most comment defence techniques.

TRANSCRIPT

Page 1: Identify and plug the security skills gap

THE SKILLS GAP

© BCS, The Chartered Institute for IT, is the business name of The British Computer Society (Registered charity no. 292786) 2013

Sources: ‘Data Breach Overview: An Executive’s Guide to Data Breach Trends in 2012’, mobistealth.com, floridatechonline.com, siliconrepublic.com, ‘Surviving the Technical Security Skills Crisis’ - Forrester Consulting on behalf of IBM, ‘IT Executives Vision’ - IDG Research Services conducted for HP for 2020 (May 12), ISC Global Information Security Workforce Study 2013

THE ISSUE

?

In 2012, more than 267 million

data records were compromised in

2,644 reported incidents - up 117% over the previous year

In 2012, where insiders

were responsible for data

breaches, 56% of incidents

were accidental - the

result of user error and

inadequate training.

There are 50,000

victims of cybercrime

every hour

89% say that having qualified information security sta� is a top priority

80% believe it is di�cult to find and hire sta� that fit all requirements

92% say sta�ng issues contribute to heightened risk levels

Do you know how to identify and fill the skills gaps in your organisation?

SECURITYIdentify and plug the security skills gap

!

ATTACKHow breaches occur

Socialtactics(7%)

Privilegemisuse(5%)

Physicalattacks(10%)

Malware(69%)

Hacking(81%)

In an industry that's constantly changing, you need to help your people to stay ahead of the game

As The Chartered Institute for IT, we're always up-to-date with the latest trends

We can develop your employees’ skills so they can make decisions critical to your business

READY TO STAY SECURE?Contact us on

+44 (0) 1793 417755or visit enterprise.bcs.org

and help your teammeet the demands

of tomorrow.

DEFENCEMost common techniques

Intrusionprevention

Monitoringtechnologies

Dataencryption

AntivirusFirewalls

10001010010011111000101001001111

010010101001010110001010010011111000101001001111010010101001010101001010100101010100101010010101

senior IT executives are concerned about data privacy and information breaches

Hacking was the number

one breach type for the second

consecutive year in 2012⅔

The business sector accounted for

Incidents by sector Records exposed by sector

Business 60.6% 84.7%

12.6%

1.6%

1.1%

17.9%

12.0%

9.5%

Government

Education

Medical

Business

Government

Education

Medical

of information security breaches in 201285%