SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
2013 Data Protection Maturity Survey Results
This research paper presents the survey findings and discusses the
trends from this year’s Data Protection Maturity survey. We also look
at how organizations can develop a best-practices approach to
data privacy, and look at some trends for the upcoming year.

January 2013
WP-EN-01-21-13
2013 Data Protection Maturity Survey Results

Overview

them, but also about compliance with statutory and

The job of protecting sensitive information has be-

industry regulations related to data privacy.

come more difficult in the last couple years. One
factor is the booming use of mobile devices, which

This research paper presents the survey findings, and

is putting considerable pressure on traditional net-

discusses the trends from this year’s Data Protection

work perimeter defenses. This growth also means

Maturity Survey. We will conclude by looking at how

that priceless corporate data is now as likely to be

organizations can develop a best-practices approach

outside of the corporate firewall as within its pro-

to data protection, and looking at some trends for the

tective reach. In addition, the adversaries intent in

upcoming year.

gaining illicit access to confidential data are growing in number and sophistication. In order to counter these trends, organizations need to develop and
maintain appropriate data protection best practices
that keep them compliant and secure.

In the 2013 results, we saw 6% of respondent organizations categorized as
having Optimal data protection maturity, with 26% classified as Operational,
41% labeled Standardizing, and 27% in
the Ad Hoc group.
In late-2012, Lumension conducted the 2nd annual
worldwide survey of organizational attitudes, policies and programs designed to protect sensitive
information – be it so-called “toxic” customer data
(PII) or valuable organizational intellectual property
(IP). Approximately 300 respondents from around
the globe representing organizations from very
small to 5000+ employees completed the survey,
which examined the challenges faced by organizations trying to protect data under their care today.
We not only asked about the threats they are facing

Changing IT Network Landscape
One cannot be in the IT security arena without having heard – or been impacted by – the “Bring Your
Own Device” (BYOD) or consumerization trends.
In fact, as Gartner states, [u]ser’s increasing attraction to unsupported electronic tools will push
IT organizations to offer new types of support.1 But
the extent to which it has been embraced – and
secured – varies greatly per our respondents.
Last year we saw an even split between those who
estimated the use of personally-owned devices in
the organization at 0 – 20% (46%) and those who
put it at 20 – 100% (45%). This year, we see the
gap reversing and widening somewhat, with more
organizations in the 20 – 100% (46%) than in the 0
– 20% range (42%). In both years we saw roughly 1
in 10 respondents admitting that they did not know
how many personally-owned devices were accessing organizational assets via the network, which
might be indicative of the risks associated with the
lack of comprehensive device visibility.

and how they are going about defending against

1.	 Gartner, Media Tablets and Beyond: The Impact of Mobile Devices on Enterprise Management (Jan-2012)

1
2013 Data Protection Maturity Survey Results
About 30% of organizations are reported to have minimal or no security
policies which address data protection concerns.

ening of access policies. In fact, this combined with
the increased use of personally-owned devices to
access organizational data and other resources,
suggest that organizations need to pay close attention to the changing IT network environment.

What portion of your organization’s regularly
used USB and mobile devices are personally
owned? Please consider flash drives, smartphones, tablets, etc.

Which of the following best describes your
firm’s policy for network access for personal
devices such as smart phones and tablets?
Open access is provided.

8.1%

We accept that personal devices will access corporate data and resources but
we try to educate users on the importance of security.
0 - 20%
42.2%

60 - 80%
9.7%
40 - 60%
13.6%
20 - 40%
11.7%

19.2%

20.1%

We do not currently allow them to access the network but may in the future.

80 - 100%
10.7%

A limited number of higher level employees are allowed to use their personal devices to access our corporate network.
Access for all devices is provided
through a DMZ or other isolated access
controls (e.g. email or web only).

Don’t know
12.0%

19.5%

14.9%

We do not currently allow them to access the network and there are no plans
to provide future access.

15.9%

Don’t know.

2.3%

We continued by looking into how employee-owned
mobile devices were administratively, legally or

And our respondents confirmed this when asked:

technically controlled within the organization. Once

“How are personal mobile devices, such as

again we see a majority of organizations (51%) ei-

phones and tablets, financially and administra-

ther currently blocking device access (31%) or us-

tively managed within your organization?” In 2012,

ing some sort of isolation controls (20%). It is in-

59% of respondents indicated these devices were

teresting to note that only “access with education”

classified as “Corporate Liability” – that is, they

increased – by a little over 6% – from last year’s

are an extension of the corporate network, with a

survey. While none of the other categories dropped

personal-use policy which is strictly defined. How-

significantly, in the aggregate we see a slight loos-

ever, in 2013 this dropped to 52%, with the biggest

2
2013 Data Protection Maturity Survey Results
How are personal mobile devices, such as phones and tablets, financially and administratively
managed whithin your organization?
Other (please specify)

Personal Liability with corporate stipend

Personal Liability

Personal Liability with corporate reimbursement

Corporate Liability

2012 	

2013

0%

10%

20%

30%

40%

50%

60%

70%

increase seen in the “Personal Liability” – without

fidentiality rules (63%) and mobile device policies

reimbursement or stipend. This gives a good indi-

(59%). Interestingly, the customer confidential-

cation of just how far organizations have come in

ity rules response dropped almost 9% from 2012,

embracing the BYOD movement. However, again

while none of the other responses changed appre-

highlighting the need for organizations to pay

ciatively. In fact, much like last year, just under 50%

closer attention to the changing IT environment,

of organizations have set out an explicit statement

there is a dark side to this “Personal Liability” de-

of what rights the company retains to data on per-

vice statistic – it suggests that there is minimal or

sonal devices. Taken as a whole, this suggests that

no access policy, which puts data privacy initia-

employment agreements may not have kept pace

tives at risk.

with the changes in the IT environment – potentially putting confidential or sensitive data at risk.

In order to better understand the data protection
guidelines within organizations today, we asked
about the restrictions included in employee agreements. An overwhelming majority of the respondents indicated that corporate confidentiality (81%)

The average reported security spend
ratio (relative to overall IT budget)
dropped from 6.1% in 2011 to 5.6%
in 2012.

clauses were included, followed by customer con-

3
2013 Data Protection Maturity Survey Results

Increasing Threats Landscape
Respondents were asked whether they had experienced any data security issues during the previous year
– by far the greatest issues were network intrusion by a virus or malware (58%), theft of IT assets such as
laptops (43%) and the accidental loss of data by employees (42%). These were the top-3 in 2012 as well.

Have you experienced any of the following incidents in the past year?
None
Industry- / Company-specific data espionage
Regulatory fines and lawsuits
Cyber attack on mobile platforms
Loss of sensitive data by 3rd party
Deliberate data theft by employees
USB-borne attack
General data theft by criminals
Targeted cyber attacks
Denial of Service (DoS) attacks
Software O/S vulnerability attacked
Accidental data loss by employees
Theft of IT assets (laptops, etc.)
Virus or malware network intrusion

0%

10%

20%

30%

40%

50%

60%

70%

It is interesting to note that the “none” category dropped

demonstrate the multitude of threat vectors and the

by almost 5% from 2012. However, the largest chang-

increasing magnitude and sophistication of attacks.

es from 2012 were seen in following categories:

This has led to an increasing feeling of endpoint in-

»» Virus or malware network intrusion...10% increase

security among IT professionals year on year, which

»» Targeted cyber attacks...7.5% increase

has risen from 59 percent to 67 percent since 2009. 2

»» Theft of IT assets (laptops, etc.)...6% increase
But in fact almost every category increased in some
amount, with only “cyber attack on mobile platforms” decreasing a bit. As such, these results mirror data presented in countless other reports which

The overwhelming perception that no
data protection regulations pertain suggests a fundamental disconnect between the regulatory landscape and our
respondents understanding of it.

2.	 Ponemon Institute, 2013 State of the Endpoint (Dec-2012)

4
2013 Data Protection Maturity Survey Results

Evolving Organizational Landscape
At the heart of it, most cyberattacks against an
organization are designed to obtain valuable information, regardless of the type of attack – be it
“standard” malware, phishing expeditions or even
so-called Advanced Persistent Threat (APT) attacks – or the motivations of the attacker, be they
cybercriminals bent on monetary gains, competitors seeking an edge, hacktivists sending a message, or even nation-states or their proxies. And
we’re seeing plenty of attacks, plenty of data
breaches, and plenty of costs associated with
these breaches:

»» According to the Ponemon Institute, 58% of
organizations have more than 25 malware
incidents each month, and another 20% are
unsure how many incidents they’re dealing with.3

»» The data breaches reported in 2012
increased almost 35% over 2011, according to
datalossdb.org. 4

»» The average cost of a data breach was about
$194 per record in 2011; of this, about 70%
were indirect costs such as lost business,
customer churn, etc. 5

»» About 70 – 80% of an organization’s market
value is based on intangible assets such as IP.6

while only about 21% indicated they did not. This
is roughly unchanged from the results we saw in
2012. On the other side, about 77% of our respondents proclaim that data security is a strategic initiative across the enterprise, while only about 12%
suggest it is not. This too is basically unchanged
from the results we saw in 2012. Interestingly, we
see weak correlation between the responses to
these two questions, which might indicate that just
because data security is a strategic initiative does
not mean that our respondents see it being adequately funded. Equally interesting was the drop in
average reported security spend ratio (relative to
overall IT budget) from 6.1% to 5.6% – not a large
decrease, but it does shed a certain light on what
our respondents considered sufficient resources.

How much do you agree with this statement?

“My organization has sufficient resources to
achieve compliance with data security policies and best practices.”
Strongly
Disagree
2.1%
Strongly Agree
Disagree
15.8%
18.8%

Protecting against data breaches requires a commitment from management and of resources. Almost 62% of our respondents indicate that they
have sufficient resources to achieve compliance

Unsure
17.5%

Agree
45.9%

with data security policies and best practices,

3.	 Ponemon Institute, 2013 State of the Endpoint (Dec-2012)
4.	 Based on data retrieved 11-Jan-2013.
5.	 Ponemon Institute, 2011 Cost of Data Breach Study (Mar-2012)
6.	 Ocean Tomo, http://www.oceantomo.com/about/intellectualcapitalequity

5
2013 Data Protection Maturity Survey Results

Uncertain Regulatory Landscape

“Data security is a strategic initiative across
the enterprise.”

The survey looked into compliance with relevant
legal and industry regulations concerning data

Strongly
Disagree
Disagree 2.1%
10.3%
Unsure
10.6%

protection. Data privacy and data breach notification rules have been on the books for some
time now, and the regulatory environment is ever-changing as government and industry grapple

Strongly Agree
35.3%

with these issues.
Indeed, it seems our respondents are uncertain or
unaware about what statutory and industry regula-

Agree
41.8%

tions apply to their organizations. On average, just
over 25% of respondents claimed to be compliant
to any of the regulations, with planned compliance
at just about half that. This means that on average
roughly 60% of respondents did not think any of

But overall, these results bode well for the matu-

these regulations were applicable.

rity of organizational data privacy efforts. In general it seems that those setting and funding or-

Is your organization compliant with the following regulations, or do you plan to be compliant within the next 24 months?

ganizational strategy with respect to these efforts
understand the need for commitment in order to
avoid the top- and bottom-line impacts that arise

currently compliant

from a data breach.

compliance planned

not applicable

UK DPA
FSA (UK)
EC Directive
EU Privacy Directive
PCI DSS
Basel II
HIPAA / HITECH
SOX / GLBA / Red Flag
Data Privacy Laws**
Other (please list)
0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

**Includes State / National data privacy, data protection and/or data breach notification laws.

6
2013 Data Protection Maturity Survey Results
Digging deeper, we find that just over 25% of re-

That notwithstanding, the overwhelming percep-

spondents state their organization are not com-

tion that none of the data privacy regulations per-

pliant with any data protection regulations, while

tain (both individually and in aggregate) suggests

about half of those folks suggest none of them are

a fundamental disconnect between the regulatory

actually applicable. However, as we noted in last

landscape and our respondents understanding of

year’s study, almost all jurisdictions have some

it. Organizations hoping to meet their data protec-

sort of data privacy law that applies, not only to

tion obligations need to understand all the regula-

confidential customer data but employee data as

tions which apply.

well – so these results are hard to understand.
True, the regulatory landscape is changing rapidly.
In 2012 we saw numerous new statutory regulations
coming on line (e.g., the “final rule” for HITECH or
the PDPA in Malaysia) or being pushed through the
legislative process (e.g., the work in the EU on the
GDPR), as well as changes to many industry regulations (such as the recently updated PCI DSS).
That said, most jurisdictions around the world have
some sort of data protection law which applies not
only to customer data but also employee personal
information. In addition, we’re starting to see governments becoming concerned about cyberespionage, at least when it comes to so-called critical
infrastructure; for instance, the recently signed US
National Defense Authorization Act gives the DOD
90 days to establish procedures for defense contractors to disclose cyber breaches.

The biggest threat issues seen in 2012
were: network intrusion by a virus or
malware (58%), theft of IT assets such
as laptops (43%) and the accidental
loss of data by employees (42%).

Rising to the Challenge
So, we see how respondents perceive the rising
threat environment, the evolving organizational
environment and the uncertain regulatory environment. But how are they coming to terms with the
data privacy challenges in light of all this? To find
out, we asked the survey respondents how they
were creating organization-wide data protection
policies, educating employees about these policies, and enforcing them via technical means.

Creating Data Protection Policies
We asked about the policies currently being used
in their organizations. Only 23% of respondents indicated that their organizations adhere to a bestpractice approach of formally developing extensive
security policies in which procedures, guidelines
and technology standards are actively utilized.
Almost twice as many (46%) indicated that they
have multiple security policies covering a majority
of data privacy concerns. Perhaps more worrying
are the 22% and 8% of organizations which have
minimal or no security policies which address data
protection concerns.

7
2013 Data Protection Maturity Survey Results
What type of IT data protection policies exist?
None.

7.8%

A minimal high-level security policy
which address less than 25% of data
protection concerns.

21.8%

A minimal high-level security policy
which address less than 25% of data
protection concerns.

45.8%

Exhaustive, extensive, formally developed security policies, procedures,
guidelines and technology standards are
actively utilized.

23.4%

Other.

Educating Employees
Next we wanted to know the level of data protection
training employees get, which directly impacts their
understanding of the importance of those policies.
Here we see nearly half (49%) of respondents said
that their organizations have formal, ongoing training covering IT security best practices. Although
this is good news, it means that the other half have
either informal or ad hoc training (24%), one-time
training (16%) or no training at all (8%).

1.3%

While these numbers are essentially unchanged
from 2012, we did see a slight increase in both the
middling and none responses, while the sharpest (yet still minor) drop was seen in the minimal
response. None of this is terribly encouraging,
especially in light of the increasing complexity in
organizational IT environments and increasingly

What type of data protection training is offered
at your organization?
Formal, ongoing training covering IT security best practices.

48.8%

Informal or ad hoc: reactive, typically
event-driven notices sent to employees.

24.4%

One-time training, typically when the
employee first joins the company.

16.2%

None.

8.2%

Other (please specify)

2.4%

sophisticated threat environment – both, to some
extent, driven by the BYOD trend.

Roughly 1 in 10 respondents admit that
they did not know how many personallyowned devices were accessing organizational assets.

Here again we see that these numbers are in essence unchanged from 2012, with the exception of
the formal category which jumped 7.5% — good
news indeed. The biggest decreases (albeit only
about 4%) were seen in the informal and none categories. All this is encouraging because, as noted
last year, having a detailed data privacy policy is
worth little if employees are unaware of it – or the
implications of violating that policy.

Continued »
8
2013 Data Protection Maturity Survey Results

Enforcing Data Protection Policies

cases these results are basically unchanged from

As IT security professionals know, having a strong

last year; the only area we saw a significant in-

data protection policy and an educated workforce

crease was in the email encryption category, which

are two important legs of a good data security

climbed about 5%.

strategy. The third is having the technical means
to enforce those policies – after all, policies are

Looking forward, we learned that full DLP (36%),

worthless if they are more theory than practice

Mobile Device Management (MDM, at 33%) and

and if security best practice transgressions are not

DLP “lite” and port / device control (26% each) are

halted before they cause any damage.

the top technology plans for the next two years.
This matches with what we learned last year, with

Therefore we asked what data security technolo-

the exception of full DLP – implementation plans

gies are being used in organizations today. Much

for full DLP jumped about 16%, which was by far

like last year, the three most commonly – and rel-

the biggest change we saw year-over-year. On

atively well understood – deployed technologies

the other side of that coin, both full DLP (43%)

were removable media or file encryption (56%),

and DLP “lite” (52%) were also noted as technolo-

port / device control (51%) and whole disk encryp-

gies for which there are no plans, along with DRM

tion (50%). On the other side, the three least com-

(59%) – exactly as seen in 2012, although the

monly deployed technologies were Data Rights

percentage of respondents mentioning full DLP

Management (DRM, at 17%), Data Loss Preven-

dropped by 14%.

tion (DLP) “lite” (22%), and full DLP (22%). In both

Which of the following technologies does your organization currently use, or plan to deploy
within the next 24 months?
currently deployed

plan to deploy

no plans

Removable media or file encryption
Port / Device control
Mobile device management
Whole disk encryption
Email encryption
Application data encryption (e.g. database)
DLP Lite (limited keyword / regex filtering )
Full DLP )Data Loss / Leak Prevention)
DRM (Digital Rights Management)
0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

9
2013 Data Protection Maturity Survey Results
A piecemeal approach to data protection can be worse than none at all as it offers a false sense of security that data is safe. Poorly configured endpoints represent a major source of vulnerabilities and IT teams
will want to ensure that all removable devices that are plugged in are visible and controlled, that all data
is automatically encrypted and that data privacy policies are enforced at a user level.

A View of US Corporate Data Protection Maturity
Formal maturity models, such as Common Capability Maturity® Model Integration (CMMI) from Carnegie-Mellon University and the UK’s Office of Government and Commerce (OGC) Portfolio, Programme

and Project Management Maturity Model (P3M3®) have been developed over time to assess organizational and process maturity.
Lumension developed a simplified Data Protection Maturity Model to analyze the survey data. Within
the model, the survey questions were classified into one of three broad categories: Technical Controls,
Administrative Controls or Organizational Motivation. Effective in-place Technical Controls were the
highest weighted category as these controls best represent pragmatic data protection action beyond
what might simply be unrealized corporate intention. The Model also incorporates some regional dependence accounting for the compliance regulations which vary across the globe. Based on complete
survey responses, each individual response was given a weighted score to create a composite Maturity
Score. The Maturity Scores are represented by the individual diamond-shaped points in the graphic
below. This Maturity Score classifies the respondent organization’s maturity level.

Continued »

10
2013 Data Protection Maturity Survey Results

In 2012, we highlighted results for the UK Data Protection Model. This year, the results for North American respondents are shown. Respondent organizations were categorized into one of four maturity bins:
Optimal (6%), Operational (26%), Standardizing (41%) or Ad Hoc (27%).

Data Protection Maturity - North American Respondents
Maturity Level

Maturity Score vs. Corporate Size

Optimal

Respondent %

Individual Corporate Maturity
Corporate Maturity Trendline

Exhaustive Policies
Robust Technical Controls
Corporate and Financial Priority

6%

Operational
Well Developed Policies
Strong Technical Controls
Strong Organisational Commitment

26%

Standardizing
Partial Technical and Legal Policies
Modest Technical Controls
Moderate Organisational
Commitment

41%

Ad Hoc
No or Few Established Policies
Limited Technical Controls
Weak Organisational Commitment

27%

1-9

10-49

100-499

1000-1999

5000+

Corporate Size

Direct comparison are of course difficult, but there is a striking homogeneity in data protection maturity
across organizations of all sizes within the US in this year’s survey when compared to the much steeper
rise from Ad Hoc for the smallest UK organizations to Operational for the largest UK organizations
based on the 2012 survey.
To view the full survey results or learn about technologies to improve your organization’s data protection
program, please visit www.lumension.com/data-protection-maturity.

Continued »
11
2013 Data Protection Maturity Survey Results

Conclusion

Policy: develop official policies with legal and liable

As the old bromide goes, the only thing that is con-

guidelines for both organization and employees. A

stant is change. IT departments are in the midst of

comprehensive data protection policy should be

some significant changes, driven by both organiza-

put in place to cover all devices no matter whether

tional and end user needs. Increasing use of per-

they are owned by the company or staff. IT policies

sonal devices to access organizational data and

should be regularly reviewed and updated to fortify

increasingly sophisticated attacks from motivated

against ever evolving exploit techniques.

adversaries are just two of these that impact the
protection of sensitive organizational and customer

Training: educate end users and staff regularly

data. In the last year, 58% of our respondents indi-

to ensure awareness of these policies and the

cated that their organization had been infiltrated by

importance of data protection. The approach of

a virus or malware, while another 42% had employ-

simply ensuring that staff, upon commencement

ees accidentally lose data.

of employment, sign-up to a policy which might
have remained unchanged for several years is no

The growth in the BYOD model and the gradual

longer adequate.

erosion of the traditional organizational network
boundary serves to remind us that a best-in-class

Technical control: do not forget low hanging fruit.

approach to data protection should not only fo-

Enforcement starts at a simple level – ensure that

cus on comprehensive administrative policies and

anti-malware software is up-to-date and promptly

pragmatic technical controls, but must also find its

deploy security patches. Investigate encryption

origin in the core of the organization. Indeed, orga-

technologies fundamental to providing protection

nizations must engage on multiple fronts to provide

for your data. Small and mid-market companies

superior data privacy:

may find it easier to implement solutions such as
device control to eliminate additional risk without

Visibility: understand, through surveys and tech-

requiring the effort and overhead of a full DLP so-

nical measures, how consumer devices are being

lution. As financial constraints allow, implement

utilized within the organization. This is needed as

increasingly sophisticated technical controls which

a baseline to understand basic risk and behavior

concentrate on reinforcing the business’ mission

and to recruit executive buy-in for future measures.

and have strategic commitment from above.

Cultural indoctrination: make data protection core to
the mission of the organization with executive backing. Data protection awareness and understanding
should be as “everyday” as locking the front door.

12
2013 Data Protection Maturity Survey Results

About Lumension Security, Inc.
Lumension Security, Inc., a global leader in endpoint management and security, develops, integrates and markets security
software solutions that help businesses protect their vital information and manage critical risk across network and endpoint
assets. Lumension enables more than 5,100 customers worldwide to achieve optimal security and IT success by delivering a
proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint Protection, Data Protection,
Antivirus and Reporting and Compliance offerings. Lumension
is known for providing world-class customer support and services 24x7, 365 days a year. Headquartered in Scottsdale, Arizona,
Lumension has operations worldwide, including Texas, Florida,
Washington D.C., Ireland, Luxembourg, Singapore, the United
Kingdom, and Australia. Lumension: IT Secured. Success Optimized.™ More information can be found at www.lumension.com.

Lumension, “IT Secured. Success Optimized.”, and the Lumension logo are trademarks or registered trademarks of
Lumension Security, Inc. All other trademarks are the property of their respective owners.

Global Headquarters
8660 East Hartford Drive, Suite 300
Scottsdale, AZ 85255 USA
phone: +1.480.970.1025
fax: +1.480.970.6323

www.lumension.com
Vulnerability Management | Endpoint Protection | Data Protection | Compliance and IT Risk Management

13

Weitere ähnliche Inhalte

Was ist angesagt?

Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...PortalGuard
 
Research insights - state of network security
Research insights - state of network securityResearch insights - state of network security
Research insights - state of network securityMiguel Mello
 
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Edelman
 
2010 report data security survey
2010 report  data security survey2010 report  data security survey
2010 report data security surveyCarlo Del Bo
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Networks
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsOsterman Research, Inc.
 
The TOP 10 tech trends of 2011
The TOP 10 tech trends of 2011The TOP 10 tech trends of 2011
The TOP 10 tech trends of 2011dvasilyev
 
Privacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and ActionPrivacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and ActionEdelman
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
 
The 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends ReportThe 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends ReportibossCyber
 
Compliance With Data Security Policies
Compliance With Data Security PoliciesCompliance With Data Security Policies
Compliance With Data Security PoliciesHongyang Wang
 
7 major changes in big data security in 2021
7 major changes in big data security in 20217 major changes in big data security in 2021
7 major changes in big data security in 2021Antenna Manufacturer Coco
 

Was ist angesagt? (16)

Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...
 
2010 GISS EY
2010 GISS EY2010 GISS EY
2010 GISS EY
 
Research insights - state of network security
Research insights - state of network securityResearch insights - state of network security
Research insights - state of network security
 
IT Security Risks Survey 2014
IT Security Risks Survey 2014IT Security Risks Survey 2014
IT Security Risks Survey 2014
 
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
 
2010 report data security survey
2010 report  data security survey2010 report  data security survey
2010 report data security survey
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
 
Heidi
HeidiHeidi
Heidi
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate Environments
 
The TOP 10 tech trends of 2011
The TOP 10 tech trends of 2011The TOP 10 tech trends of 2011
The TOP 10 tech trends of 2011
 
Privacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and ActionPrivacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and Action
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 
The 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends ReportThe 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends Report
 
Compliance With Data Security Policies
Compliance With Data Security PoliciesCompliance With Data Security Policies
Compliance With Data Security Policies
 
7 major changes in big data security in 2021
7 major changes in big data security in 20217 major changes in big data security in 2021
7 major changes in big data security in 2021
 

Ähnlich wie Data Protection Maturity Survey Results 2013

Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information securityBee_Ware
 
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...Thierry Labro
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2jmariani14
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxtodd581
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxglendar3
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksConstantin Cocioaba
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudSymantec
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxjeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxglendar3
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxtodd581
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020Jessica Graf
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationIJERA Editor
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey ReportDImension Data
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4Meg Weber
 
White Paper: The Age of Data
White Paper: The Age of DataWhite Paper: The Age of Data
White Paper: The Age of DataKim Cook
 

Ähnlich wie Data Protection Maturity Survey Results 2013 (20)

Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information security
 
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security Risks
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an Organization
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report
 
Assessing enterprise readiness for the IoT
Assessing enterprise readiness for the IoTAssessing enterprise readiness for the IoT
Assessing enterprise readiness for the IoT
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4
 
White Paper: The Age of Data
White Paper: The Age of DataWhite Paper: The Age of Data
White Paper: The Age of Data
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 

Mehr von - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Mehr von - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Kürzlich hochgeladen

Uk-NO1 Amil In Karachi Best Amil In Karachi Bangali Baba In Karachi Aamil In ...
Uk-NO1 Amil In Karachi Best Amil In Karachi Bangali Baba In Karachi Aamil In ...Uk-NO1 Amil In Karachi Best Amil In Karachi Bangali Baba In Karachi Aamil In ...
Uk-NO1 Amil In Karachi Best Amil In Karachi Bangali Baba In Karachi Aamil In ...Amil baba
 
Aesthetic Design Inspiration by Slidesgo.pptx
Aesthetic Design Inspiration by Slidesgo.pptxAesthetic Design Inspiration by Slidesgo.pptx
Aesthetic Design Inspiration by Slidesgo.pptxsayemalkadripial4
 
Taken Pilot Episode Story pitch Document
Taken Pilot Episode Story pitch DocumentTaken Pilot Episode Story pitch Document
Taken Pilot Episode Story pitch Documentf4ssvxpz62
 
Flying Avocado Cat Cryptocurrency Created, Coded, Generated and Named by Grok...
Flying Avocado Cat Cryptocurrency Created, Coded, Generated and Named by Grok...Flying Avocado Cat Cryptocurrency Created, Coded, Generated and Named by Grok...
Flying Avocado Cat Cryptocurrency Created, Coded, Generated and Named by Grok...TeslaStakeHolder
 
NO1 Certified Black magic specialist,Expert in Pakistan Amil Baba kala ilam E...
NO1 Certified Black magic specialist,Expert in Pakistan Amil Baba kala ilam E...NO1 Certified Black magic specialist,Expert in Pakistan Amil Baba kala ilam E...
NO1 Certified Black magic specialist,Expert in Pakistan Amil Baba kala ilam E...Amil Baba Dawood bangali
 
Princess Jahan's Tuition Classes, a story for entertainment
Princess Jahan's Tuition Classes, a story for entertainmentPrincess Jahan's Tuition Classes, a story for entertainment
Princess Jahan's Tuition Classes, a story for entertainmentazuremorn
 
ECOLUXE pre-ESPYS Ultimate Sports Lounge 2024
ECOLUXE pre-ESPYS Ultimate Sports Lounge 2024ECOLUXE pre-ESPYS Ultimate Sports Lounge 2024
ECOLUXE pre-ESPYS Ultimate Sports Lounge 2024Durkin Entertainment LLC
 
Statement Of Intent - - Copy.documentfile
Statement Of Intent - - Copy.documentfileStatement Of Intent - - Copy.documentfile
Statement Of Intent - - Copy.documentfilef4ssvxpz62
 
Biswanath Byam Samiti Open Quiz 2022 by Qui9 Grand Finale
Biswanath Byam Samiti Open Quiz 2022 by Qui9 Grand FinaleBiswanath Byam Samiti Open Quiz 2022 by Qui9 Grand Finale
Biswanath Byam Samiti Open Quiz 2022 by Qui9 Grand FinaleQui9 (Ultimate Quizzing)
 
办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书
办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书
办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书zdzoqco
 
Zoom In Game for ice breaking in a training
Zoom In Game for ice breaking in a trainingZoom In Game for ice breaking in a training
Zoom In Game for ice breaking in a trainingRafik ABDI
 
A Spotlight on Darla Leigh Pittman Rodgers: Aaron Rodgers' Mother
A Spotlight on Darla Leigh Pittman Rodgers: Aaron Rodgers' MotherA Spotlight on Darla Leigh Pittman Rodgers: Aaron Rodgers' Mother
A Spotlight on Darla Leigh Pittman Rodgers: Aaron Rodgers' Motherget joys
 
NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...
NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...
NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...Amil Baba Dawood bangali
 
What Life Would Be Like From A Different Perspective (saltyvixenstories.com)
What Life Would Be Like From A Different Perspective (saltyvixenstories.com)What Life Would Be Like From A Different Perspective (saltyvixenstories.com)
What Life Would Be Like From A Different Perspective (saltyvixenstories.com)Salty Vixen Stories & More
 
Fight Scene Storyboard (Action/Adventure Animation)
Fight Scene Storyboard (Action/Adventure Animation)Fight Scene Storyboard (Action/Adventure Animation)
Fight Scene Storyboard (Action/Adventure Animation)finlaygoodall2
 
THE MEDIC, A STORY for entertainment.docx
THE MEDIC, A STORY for entertainment.docxTHE MEDIC, A STORY for entertainment.docx
THE MEDIC, A STORY for entertainment.docxazuremorn
 

Kürzlich hochgeladen (20)

Uk-NO1 Amil In Karachi Best Amil In Karachi Bangali Baba In Karachi Aamil In ...
Uk-NO1 Amil In Karachi Best Amil In Karachi Bangali Baba In Karachi Aamil In ...Uk-NO1 Amil In Karachi Best Amil In Karachi Bangali Baba In Karachi Aamil In ...
Uk-NO1 Amil In Karachi Best Amil In Karachi Bangali Baba In Karachi Aamil In ...
 
Aesthetic Design Inspiration by Slidesgo.pptx
Aesthetic Design Inspiration by Slidesgo.pptxAesthetic Design Inspiration by Slidesgo.pptx
Aesthetic Design Inspiration by Slidesgo.pptx
 
Sincerely, The Friday Club - Farewell Quiz-Finals.pptx
Sincerely, The Friday Club - Farewell Quiz-Finals.pptxSincerely, The Friday Club - Farewell Quiz-Finals.pptx
Sincerely, The Friday Club - Farewell Quiz-Finals.pptx
 
Taken Pilot Episode Story pitch Document
Taken Pilot Episode Story pitch DocumentTaken Pilot Episode Story pitch Document
Taken Pilot Episode Story pitch Document
 
Flying Avocado Cat Cryptocurrency Created, Coded, Generated and Named by Grok...
Flying Avocado Cat Cryptocurrency Created, Coded, Generated and Named by Grok...Flying Avocado Cat Cryptocurrency Created, Coded, Generated and Named by Grok...
Flying Avocado Cat Cryptocurrency Created, Coded, Generated and Named by Grok...
 
Moveable Feast_Travel-Lifestyle-Culture Quiz.pptx
Moveable Feast_Travel-Lifestyle-Culture Quiz.pptxMoveable Feast_Travel-Lifestyle-Culture Quiz.pptx
Moveable Feast_Travel-Lifestyle-Culture Quiz.pptx
 
NO1 Certified Black magic specialist,Expert in Pakistan Amil Baba kala ilam E...
NO1 Certified Black magic specialist,Expert in Pakistan Amil Baba kala ilam E...NO1 Certified Black magic specialist,Expert in Pakistan Amil Baba kala ilam E...
NO1 Certified Black magic specialist,Expert in Pakistan Amil Baba kala ilam E...
 
Princess Jahan's Tuition Classes, a story for entertainment
Princess Jahan's Tuition Classes, a story for entertainmentPrincess Jahan's Tuition Classes, a story for entertainment
Princess Jahan's Tuition Classes, a story for entertainment
 
ECOLUXE pre-ESPYS Ultimate Sports Lounge 2024
ECOLUXE pre-ESPYS Ultimate Sports Lounge 2024ECOLUXE pre-ESPYS Ultimate Sports Lounge 2024
ECOLUXE pre-ESPYS Ultimate Sports Lounge 2024
 
Statement Of Intent - - Copy.documentfile
Statement Of Intent - - Copy.documentfileStatement Of Intent - - Copy.documentfile
Statement Of Intent - - Copy.documentfile
 
S10_E02_How to Pimp Social Media 101.pptx
S10_E02_How to Pimp Social Media 101.pptxS10_E02_How to Pimp Social Media 101.pptx
S10_E02_How to Pimp Social Media 101.pptx
 
Biswanath Byam Samiti Open Quiz 2022 by Qui9 Grand Finale
Biswanath Byam Samiti Open Quiz 2022 by Qui9 Grand FinaleBiswanath Byam Samiti Open Quiz 2022 by Qui9 Grand Finale
Biswanath Byam Samiti Open Quiz 2022 by Qui9 Grand Finale
 
办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书
办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书
办理滑铁卢大学毕业证成绩单|购买加拿大文凭证书
 
Zoom In Game for ice breaking in a training
Zoom In Game for ice breaking in a trainingZoom In Game for ice breaking in a training
Zoom In Game for ice breaking in a training
 
A Spotlight on Darla Leigh Pittman Rodgers: Aaron Rodgers' Mother
A Spotlight on Darla Leigh Pittman Rodgers: Aaron Rodgers' MotherA Spotlight on Darla Leigh Pittman Rodgers: Aaron Rodgers' Mother
A Spotlight on Darla Leigh Pittman Rodgers: Aaron Rodgers' Mother
 
NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...
NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...
NO1 Certified kala ilam Expert In Peshwar Kala Jadu Specialist In Peshwar Kal...
 
What Life Would Be Like From A Different Perspective (saltyvixenstories.com)
What Life Would Be Like From A Different Perspective (saltyvixenstories.com)What Life Would Be Like From A Different Perspective (saltyvixenstories.com)
What Life Would Be Like From A Different Perspective (saltyvixenstories.com)
 
Fight Scene Storyboard (Action/Adventure Animation)
Fight Scene Storyboard (Action/Adventure Animation)Fight Scene Storyboard (Action/Adventure Animation)
Fight Scene Storyboard (Action/Adventure Animation)
 
THE MEDIC, A STORY for entertainment.docx
THE MEDIC, A STORY for entertainment.docxTHE MEDIC, A STORY for entertainment.docx
THE MEDIC, A STORY for entertainment.docx
 
S10_E06-Sincerely,The Friday Club- Prelims Farewell Quiz.pptx
S10_E06-Sincerely,The Friday Club- Prelims Farewell Quiz.pptxS10_E06-Sincerely,The Friday Club- Prelims Farewell Quiz.pptx
S10_E06-Sincerely,The Friday Club- Prelims Farewell Quiz.pptx
 

Data Protection Maturity Survey Results 2013

  • 1. 2013 Data Protection Maturity Survey Results This research paper presents the survey findings and discusses the trends from this year’s Data Protection Maturity survey. We also look at how organizations can develop a best-practices approach to data privacy, and look at some trends for the upcoming year. January 2013 WP-EN-01-21-13
  • 2. 2013 Data Protection Maturity Survey Results Overview them, but also about compliance with statutory and The job of protecting sensitive information has be- industry regulations related to data privacy. come more difficult in the last couple years. One factor is the booming use of mobile devices, which This research paper presents the survey findings, and is putting considerable pressure on traditional net- discusses the trends from this year’s Data Protection work perimeter defenses. This growth also means Maturity Survey. We will conclude by looking at how that priceless corporate data is now as likely to be organizations can develop a best-practices approach outside of the corporate firewall as within its pro- to data protection, and looking at some trends for the tective reach. In addition, the adversaries intent in upcoming year. gaining illicit access to confidential data are growing in number and sophistication. In order to counter these trends, organizations need to develop and maintain appropriate data protection best practices that keep them compliant and secure. In the 2013 results, we saw 6% of respondent organizations categorized as having Optimal data protection maturity, with 26% classified as Operational, 41% labeled Standardizing, and 27% in the Ad Hoc group. In late-2012, Lumension conducted the 2nd annual worldwide survey of organizational attitudes, policies and programs designed to protect sensitive information – be it so-called “toxic” customer data (PII) or valuable organizational intellectual property (IP). Approximately 300 respondents from around the globe representing organizations from very small to 5000+ employees completed the survey, which examined the challenges faced by organizations trying to protect data under their care today. We not only asked about the threats they are facing Changing IT Network Landscape One cannot be in the IT security arena without having heard – or been impacted by – the “Bring Your Own Device” (BYOD) or consumerization trends. In fact, as Gartner states, [u]ser’s increasing attraction to unsupported electronic tools will push IT organizations to offer new types of support.1 But the extent to which it has been embraced – and secured – varies greatly per our respondents. Last year we saw an even split between those who estimated the use of personally-owned devices in the organization at 0 – 20% (46%) and those who put it at 20 – 100% (45%). This year, we see the gap reversing and widening somewhat, with more organizations in the 20 – 100% (46%) than in the 0 – 20% range (42%). In both years we saw roughly 1 in 10 respondents admitting that they did not know how many personally-owned devices were accessing organizational assets via the network, which might be indicative of the risks associated with the lack of comprehensive device visibility. and how they are going about defending against 1. Gartner, Media Tablets and Beyond: The Impact of Mobile Devices on Enterprise Management (Jan-2012) 1
  • 3. 2013 Data Protection Maturity Survey Results About 30% of organizations are reported to have minimal or no security policies which address data protection concerns. ening of access policies. In fact, this combined with the increased use of personally-owned devices to access organizational data and other resources, suggest that organizations need to pay close attention to the changing IT network environment. What portion of your organization’s regularly used USB and mobile devices are personally owned? Please consider flash drives, smartphones, tablets, etc. Which of the following best describes your firm’s policy for network access for personal devices such as smart phones and tablets? Open access is provided. 8.1% We accept that personal devices will access corporate data and resources but we try to educate users on the importance of security. 0 - 20% 42.2% 60 - 80% 9.7% 40 - 60% 13.6% 20 - 40% 11.7% 19.2% 20.1% We do not currently allow them to access the network but may in the future. 80 - 100% 10.7% A limited number of higher level employees are allowed to use their personal devices to access our corporate network. Access for all devices is provided through a DMZ or other isolated access controls (e.g. email or web only). Don’t know 12.0% 19.5% 14.9% We do not currently allow them to access the network and there are no plans to provide future access. 15.9% Don’t know. 2.3% We continued by looking into how employee-owned mobile devices were administratively, legally or And our respondents confirmed this when asked: technically controlled within the organization. Once “How are personal mobile devices, such as again we see a majority of organizations (51%) ei- phones and tablets, financially and administra- ther currently blocking device access (31%) or us- tively managed within your organization?” In 2012, ing some sort of isolation controls (20%). It is in- 59% of respondents indicated these devices were teresting to note that only “access with education” classified as “Corporate Liability” – that is, they increased – by a little over 6% – from last year’s are an extension of the corporate network, with a survey. While none of the other categories dropped personal-use policy which is strictly defined. How- significantly, in the aggregate we see a slight loos- ever, in 2013 this dropped to 52%, with the biggest 2
  • 4. 2013 Data Protection Maturity Survey Results How are personal mobile devices, such as phones and tablets, financially and administratively managed whithin your organization? Other (please specify) Personal Liability with corporate stipend Personal Liability Personal Liability with corporate reimbursement Corporate Liability 2012 2013 0% 10% 20% 30% 40% 50% 60% 70% increase seen in the “Personal Liability” – without fidentiality rules (63%) and mobile device policies reimbursement or stipend. This gives a good indi- (59%). Interestingly, the customer confidential- cation of just how far organizations have come in ity rules response dropped almost 9% from 2012, embracing the BYOD movement. However, again while none of the other responses changed appre- highlighting the need for organizations to pay ciatively. In fact, much like last year, just under 50% closer attention to the changing IT environment, of organizations have set out an explicit statement there is a dark side to this “Personal Liability” de- of what rights the company retains to data on per- vice statistic – it suggests that there is minimal or sonal devices. Taken as a whole, this suggests that no access policy, which puts data privacy initia- employment agreements may not have kept pace tives at risk. with the changes in the IT environment – potentially putting confidential or sensitive data at risk. In order to better understand the data protection guidelines within organizations today, we asked about the restrictions included in employee agreements. An overwhelming majority of the respondents indicated that corporate confidentiality (81%) The average reported security spend ratio (relative to overall IT budget) dropped from 6.1% in 2011 to 5.6% in 2012. clauses were included, followed by customer con- 3
  • 5. 2013 Data Protection Maturity Survey Results Increasing Threats Landscape Respondents were asked whether they had experienced any data security issues during the previous year – by far the greatest issues were network intrusion by a virus or malware (58%), theft of IT assets such as laptops (43%) and the accidental loss of data by employees (42%). These were the top-3 in 2012 as well. Have you experienced any of the following incidents in the past year? None Industry- / Company-specific data espionage Regulatory fines and lawsuits Cyber attack on mobile platforms Loss of sensitive data by 3rd party Deliberate data theft by employees USB-borne attack General data theft by criminals Targeted cyber attacks Denial of Service (DoS) attacks Software O/S vulnerability attacked Accidental data loss by employees Theft of IT assets (laptops, etc.) Virus or malware network intrusion 0% 10% 20% 30% 40% 50% 60% 70% It is interesting to note that the “none” category dropped demonstrate the multitude of threat vectors and the by almost 5% from 2012. However, the largest chang- increasing magnitude and sophistication of attacks. es from 2012 were seen in following categories: This has led to an increasing feeling of endpoint in- »» Virus or malware network intrusion...10% increase security among IT professionals year on year, which »» Targeted cyber attacks...7.5% increase has risen from 59 percent to 67 percent since 2009. 2 »» Theft of IT assets (laptops, etc.)...6% increase But in fact almost every category increased in some amount, with only “cyber attack on mobile platforms” decreasing a bit. As such, these results mirror data presented in countless other reports which The overwhelming perception that no data protection regulations pertain suggests a fundamental disconnect between the regulatory landscape and our respondents understanding of it. 2. Ponemon Institute, 2013 State of the Endpoint (Dec-2012) 4
  • 6. 2013 Data Protection Maturity Survey Results Evolving Organizational Landscape At the heart of it, most cyberattacks against an organization are designed to obtain valuable information, regardless of the type of attack – be it “standard” malware, phishing expeditions or even so-called Advanced Persistent Threat (APT) attacks – or the motivations of the attacker, be they cybercriminals bent on monetary gains, competitors seeking an edge, hacktivists sending a message, or even nation-states or their proxies. And we’re seeing plenty of attacks, plenty of data breaches, and plenty of costs associated with these breaches: »» According to the Ponemon Institute, 58% of organizations have more than 25 malware incidents each month, and another 20% are unsure how many incidents they’re dealing with.3 »» The data breaches reported in 2012 increased almost 35% over 2011, according to datalossdb.org. 4 »» The average cost of a data breach was about $194 per record in 2011; of this, about 70% were indirect costs such as lost business, customer churn, etc. 5 »» About 70 – 80% of an organization’s market value is based on intangible assets such as IP.6 while only about 21% indicated they did not. This is roughly unchanged from the results we saw in 2012. On the other side, about 77% of our respondents proclaim that data security is a strategic initiative across the enterprise, while only about 12% suggest it is not. This too is basically unchanged from the results we saw in 2012. Interestingly, we see weak correlation between the responses to these two questions, which might indicate that just because data security is a strategic initiative does not mean that our respondents see it being adequately funded. Equally interesting was the drop in average reported security spend ratio (relative to overall IT budget) from 6.1% to 5.6% – not a large decrease, but it does shed a certain light on what our respondents considered sufficient resources. How much do you agree with this statement? “My organization has sufficient resources to achieve compliance with data security policies and best practices.” Strongly Disagree 2.1% Strongly Agree Disagree 15.8% 18.8% Protecting against data breaches requires a commitment from management and of resources. Almost 62% of our respondents indicate that they have sufficient resources to achieve compliance Unsure 17.5% Agree 45.9% with data security policies and best practices, 3. Ponemon Institute, 2013 State of the Endpoint (Dec-2012) 4. Based on data retrieved 11-Jan-2013. 5. Ponemon Institute, 2011 Cost of Data Breach Study (Mar-2012) 6. Ocean Tomo, http://www.oceantomo.com/about/intellectualcapitalequity 5
  • 7. 2013 Data Protection Maturity Survey Results Uncertain Regulatory Landscape “Data security is a strategic initiative across the enterprise.” The survey looked into compliance with relevant legal and industry regulations concerning data Strongly Disagree Disagree 2.1% 10.3% Unsure 10.6% protection. Data privacy and data breach notification rules have been on the books for some time now, and the regulatory environment is ever-changing as government and industry grapple Strongly Agree 35.3% with these issues. Indeed, it seems our respondents are uncertain or unaware about what statutory and industry regula- Agree 41.8% tions apply to their organizations. On average, just over 25% of respondents claimed to be compliant to any of the regulations, with planned compliance at just about half that. This means that on average roughly 60% of respondents did not think any of But overall, these results bode well for the matu- these regulations were applicable. rity of organizational data privacy efforts. In general it seems that those setting and funding or- Is your organization compliant with the following regulations, or do you plan to be compliant within the next 24 months? ganizational strategy with respect to these efforts understand the need for commitment in order to avoid the top- and bottom-line impacts that arise currently compliant from a data breach. compliance planned not applicable UK DPA FSA (UK) EC Directive EU Privacy Directive PCI DSS Basel II HIPAA / HITECH SOX / GLBA / Red Flag Data Privacy Laws** Other (please list) 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% **Includes State / National data privacy, data protection and/or data breach notification laws. 6
  • 8. 2013 Data Protection Maturity Survey Results Digging deeper, we find that just over 25% of re- That notwithstanding, the overwhelming percep- spondents state their organization are not com- tion that none of the data privacy regulations per- pliant with any data protection regulations, while tain (both individually and in aggregate) suggests about half of those folks suggest none of them are a fundamental disconnect between the regulatory actually applicable. However, as we noted in last landscape and our respondents understanding of year’s study, almost all jurisdictions have some it. Organizations hoping to meet their data protec- sort of data privacy law that applies, not only to tion obligations need to understand all the regula- confidential customer data but employee data as tions which apply. well – so these results are hard to understand. True, the regulatory landscape is changing rapidly. In 2012 we saw numerous new statutory regulations coming on line (e.g., the “final rule” for HITECH or the PDPA in Malaysia) or being pushed through the legislative process (e.g., the work in the EU on the GDPR), as well as changes to many industry regulations (such as the recently updated PCI DSS). That said, most jurisdictions around the world have some sort of data protection law which applies not only to customer data but also employee personal information. In addition, we’re starting to see governments becoming concerned about cyberespionage, at least when it comes to so-called critical infrastructure; for instance, the recently signed US National Defense Authorization Act gives the DOD 90 days to establish procedures for defense contractors to disclose cyber breaches. The biggest threat issues seen in 2012 were: network intrusion by a virus or malware (58%), theft of IT assets such as laptops (43%) and the accidental loss of data by employees (42%). Rising to the Challenge So, we see how respondents perceive the rising threat environment, the evolving organizational environment and the uncertain regulatory environment. But how are they coming to terms with the data privacy challenges in light of all this? To find out, we asked the survey respondents how they were creating organization-wide data protection policies, educating employees about these policies, and enforcing them via technical means. Creating Data Protection Policies We asked about the policies currently being used in their organizations. Only 23% of respondents indicated that their organizations adhere to a bestpractice approach of formally developing extensive security policies in which procedures, guidelines and technology standards are actively utilized. Almost twice as many (46%) indicated that they have multiple security policies covering a majority of data privacy concerns. Perhaps more worrying are the 22% and 8% of organizations which have minimal or no security policies which address data protection concerns. 7
  • 9. 2013 Data Protection Maturity Survey Results What type of IT data protection policies exist? None. 7.8% A minimal high-level security policy which address less than 25% of data protection concerns. 21.8% A minimal high-level security policy which address less than 25% of data protection concerns. 45.8% Exhaustive, extensive, formally developed security policies, procedures, guidelines and technology standards are actively utilized. 23.4% Other. Educating Employees Next we wanted to know the level of data protection training employees get, which directly impacts their understanding of the importance of those policies. Here we see nearly half (49%) of respondents said that their organizations have formal, ongoing training covering IT security best practices. Although this is good news, it means that the other half have either informal or ad hoc training (24%), one-time training (16%) or no training at all (8%). 1.3% While these numbers are essentially unchanged from 2012, we did see a slight increase in both the middling and none responses, while the sharpest (yet still minor) drop was seen in the minimal response. None of this is terribly encouraging, especially in light of the increasing complexity in organizational IT environments and increasingly What type of data protection training is offered at your organization? Formal, ongoing training covering IT security best practices. 48.8% Informal or ad hoc: reactive, typically event-driven notices sent to employees. 24.4% One-time training, typically when the employee first joins the company. 16.2% None. 8.2% Other (please specify) 2.4% sophisticated threat environment – both, to some extent, driven by the BYOD trend. Roughly 1 in 10 respondents admit that they did not know how many personallyowned devices were accessing organizational assets. Here again we see that these numbers are in essence unchanged from 2012, with the exception of the formal category which jumped 7.5% — good news indeed. The biggest decreases (albeit only about 4%) were seen in the informal and none categories. All this is encouraging because, as noted last year, having a detailed data privacy policy is worth little if employees are unaware of it – or the implications of violating that policy. Continued » 8
  • 10. 2013 Data Protection Maturity Survey Results Enforcing Data Protection Policies cases these results are basically unchanged from As IT security professionals know, having a strong last year; the only area we saw a significant in- data protection policy and an educated workforce crease was in the email encryption category, which are two important legs of a good data security climbed about 5%. strategy. The third is having the technical means to enforce those policies – after all, policies are Looking forward, we learned that full DLP (36%), worthless if they are more theory than practice Mobile Device Management (MDM, at 33%) and and if security best practice transgressions are not DLP “lite” and port / device control (26% each) are halted before they cause any damage. the top technology plans for the next two years. This matches with what we learned last year, with Therefore we asked what data security technolo- the exception of full DLP – implementation plans gies are being used in organizations today. Much for full DLP jumped about 16%, which was by far like last year, the three most commonly – and rel- the biggest change we saw year-over-year. On atively well understood – deployed technologies the other side of that coin, both full DLP (43%) were removable media or file encryption (56%), and DLP “lite” (52%) were also noted as technolo- port / device control (51%) and whole disk encryp- gies for which there are no plans, along with DRM tion (50%). On the other side, the three least com- (59%) – exactly as seen in 2012, although the monly deployed technologies were Data Rights percentage of respondents mentioning full DLP Management (DRM, at 17%), Data Loss Preven- dropped by 14%. tion (DLP) “lite” (22%), and full DLP (22%). In both Which of the following technologies does your organization currently use, or plan to deploy within the next 24 months? currently deployed plan to deploy no plans Removable media or file encryption Port / Device control Mobile device management Whole disk encryption Email encryption Application data encryption (e.g. database) DLP Lite (limited keyword / regex filtering ) Full DLP )Data Loss / Leak Prevention) DRM (Digital Rights Management) 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 9
  • 11. 2013 Data Protection Maturity Survey Results A piecemeal approach to data protection can be worse than none at all as it offers a false sense of security that data is safe. Poorly configured endpoints represent a major source of vulnerabilities and IT teams will want to ensure that all removable devices that are plugged in are visible and controlled, that all data is automatically encrypted and that data privacy policies are enforced at a user level. A View of US Corporate Data Protection Maturity Formal maturity models, such as Common Capability Maturity® Model Integration (CMMI) from Carnegie-Mellon University and the UK’s Office of Government and Commerce (OGC) Portfolio, Programme and Project Management Maturity Model (P3M3®) have been developed over time to assess organizational and process maturity. Lumension developed a simplified Data Protection Maturity Model to analyze the survey data. Within the model, the survey questions were classified into one of three broad categories: Technical Controls, Administrative Controls or Organizational Motivation. Effective in-place Technical Controls were the highest weighted category as these controls best represent pragmatic data protection action beyond what might simply be unrealized corporate intention. The Model also incorporates some regional dependence accounting for the compliance regulations which vary across the globe. Based on complete survey responses, each individual response was given a weighted score to create a composite Maturity Score. The Maturity Scores are represented by the individual diamond-shaped points in the graphic below. This Maturity Score classifies the respondent organization’s maturity level. Continued » 10
  • 12. 2013 Data Protection Maturity Survey Results In 2012, we highlighted results for the UK Data Protection Model. This year, the results for North American respondents are shown. Respondent organizations were categorized into one of four maturity bins: Optimal (6%), Operational (26%), Standardizing (41%) or Ad Hoc (27%). Data Protection Maturity - North American Respondents Maturity Level Maturity Score vs. Corporate Size Optimal Respondent % Individual Corporate Maturity Corporate Maturity Trendline Exhaustive Policies Robust Technical Controls Corporate and Financial Priority 6% Operational Well Developed Policies Strong Technical Controls Strong Organisational Commitment 26% Standardizing Partial Technical and Legal Policies Modest Technical Controls Moderate Organisational Commitment 41% Ad Hoc No or Few Established Policies Limited Technical Controls Weak Organisational Commitment 27% 1-9 10-49 100-499 1000-1999 5000+ Corporate Size Direct comparison are of course difficult, but there is a striking homogeneity in data protection maturity across organizations of all sizes within the US in this year’s survey when compared to the much steeper rise from Ad Hoc for the smallest UK organizations to Operational for the largest UK organizations based on the 2012 survey. To view the full survey results or learn about technologies to improve your organization’s data protection program, please visit www.lumension.com/data-protection-maturity. Continued » 11
  • 13. 2013 Data Protection Maturity Survey Results Conclusion Policy: develop official policies with legal and liable As the old bromide goes, the only thing that is con- guidelines for both organization and employees. A stant is change. IT departments are in the midst of comprehensive data protection policy should be some significant changes, driven by both organiza- put in place to cover all devices no matter whether tional and end user needs. Increasing use of per- they are owned by the company or staff. IT policies sonal devices to access organizational data and should be regularly reviewed and updated to fortify increasingly sophisticated attacks from motivated against ever evolving exploit techniques. adversaries are just two of these that impact the protection of sensitive organizational and customer Training: educate end users and staff regularly data. In the last year, 58% of our respondents indi- to ensure awareness of these policies and the cated that their organization had been infiltrated by importance of data protection. The approach of a virus or malware, while another 42% had employ- simply ensuring that staff, upon commencement ees accidentally lose data. of employment, sign-up to a policy which might have remained unchanged for several years is no The growth in the BYOD model and the gradual longer adequate. erosion of the traditional organizational network boundary serves to remind us that a best-in-class Technical control: do not forget low hanging fruit. approach to data protection should not only fo- Enforcement starts at a simple level – ensure that cus on comprehensive administrative policies and anti-malware software is up-to-date and promptly pragmatic technical controls, but must also find its deploy security patches. Investigate encryption origin in the core of the organization. Indeed, orga- technologies fundamental to providing protection nizations must engage on multiple fronts to provide for your data. Small and mid-market companies superior data privacy: may find it easier to implement solutions such as device control to eliminate additional risk without Visibility: understand, through surveys and tech- requiring the effort and overhead of a full DLP so- nical measures, how consumer devices are being lution. As financial constraints allow, implement utilized within the organization. This is needed as increasingly sophisticated technical controls which a baseline to understand basic risk and behavior concentrate on reinforcing the business’ mission and to recruit executive buy-in for future measures. and have strategic commitment from above. Cultural indoctrination: make data protection core to the mission of the organization with executive backing. Data protection awareness and understanding should be as “everyday” as locking the front door. 12
  • 14. 2013 Data Protection Maturity Survey Results About Lumension Security, Inc. Lumension Security, Inc., a global leader in endpoint management and security, develops, integrates and markets security software solutions that help businesses protect their vital information and manage critical risk across network and endpoint assets. Lumension enables more than 5,100 customers worldwide to achieve optimal security and IT success by delivering a proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint Protection, Data Protection, Antivirus and Reporting and Compliance offerings. Lumension is known for providing world-class customer support and services 24x7, 365 days a year. Headquartered in Scottsdale, Arizona, Lumension has operations worldwide, including Texas, Florida, Washington D.C., Ireland, Luxembourg, Singapore, the United Kingdom, and Australia. Lumension: IT Secured. Success Optimized.™ More information can be found at www.lumension.com. Lumension, “IT Secured. Success Optimized.”, and the Lumension logo are trademarks or registered trademarks of Lumension Security, Inc. All other trademarks are the property of their respective owners. Global Headquarters 8660 East Hartford Drive, Suite 300 Scottsdale, AZ 85255 USA phone: +1.480.970.1025 fax: +1.480.970.6323 www.lumension.com Vulnerability Management | Endpoint Protection | Data Protection | Compliance and IT Risk Management 13