SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
THE TRUST
GAP
THE VISIBILITY
GAP
TAKE AWAY
Board members are very aware cybersecurity is an issue, but lack
visibility into breach and cyber activity.
59%
BOD
18%
ITSec
WHEN IT COMES TO CYBERSECURITY
WE’RE DOING A GOOD JOB!
54%
23%
18%
High value breaches
reported by IT security
professionals.
Breaches reported by
board members.
Board members unsure if
any breaches had occured.
60%IT security professionals
believe that the
Board DOES NOT
understand the risks
70%Board members
believe they DO
understand the risks
MISMATCHED PERCEPTION
BREEDS MISTRUST.
79%
OF BOARD MEMBERS RATE THEIR OWN
EFFECTIVENESS OF CYBERSECURITY
GOVERNANCE AT A 7/10 OR BETTER
46%
OF IT SECURITY PROFESSIONALS RATE
THE BOARD’S EFFECTIVENESS OF
CYBERSECURITY GOVERNANCE AT A 4.5/10
TAKE AWAY
These issues lead to a breakdown of trust and communciation
between board members and their own IT security professionals.
TARGET’S BREACH
WAS A
WAKE-UP
CALL
BOTH GROUPS AGREE THAT THE TARGET BREACH
HAD A SIGNIFICANT IMPACT ON THE BOARD’S
INVOLVEMENT IN CYBERSECURITY GOVERNANCE.
AGREE
65% 67%
How Fidelis Cybersecurity
can help your organization:
Mitigate Your Risk Now.
SOLUTIONS TO BRIDGE
THE GAP
ADD CYBERSECURITY ADVISOR TO BOARD
EDUCATE THE BOARD
INCREASE TRANSPARENCY AND
COMMUNICATION BETWEEN THE BOARD AND
IT SECURITY PROFESSIONALS
PROACTIVE
DEFENSE
SERVICES
ADVANCED
THREAT
DEFENSE
INCIDENT
RESPONSE
FORENSIC
SERVICES
fidelissecurity.com
SOURCE: CYBERSECURITY GOVERNANCE AND THE BOARD OF DIRECTORS,
CONDUCTED BY PONEMON INSTITUTE, OCT 2014. SAMPLE SIZE: MORE THAN 650
BOARD MEMBERS AND IT SECURITY PROFESSIONALS (MAINLY CIOS, CTOS AND CISOS).
CORPORATE
GOVERNANCE
DAY-TO-DAY
PROTECTION
LACKS
NECESSARY
EXPERTISE
LACKS CONFIDENCE
IN BOARD’S
UNDERSTANDING
RESPONSIBILITY
THE GAP
MEET THE PLAYERS
(BOD) (ITSec)
BOARD OF DIRECTORS IT SECURITY PROFESSIONALS
BOARD OF DIRECTOR’S
KNOWLEDGE
GAP
41%ADMITTED THEY LACKED
EXPERTISE IN CYBERSECURITY
26%SAID THEY HAD MINIMAL OR NO
KNOWLEDGE OF CYBERSECURITY
TAKE AWAY
Lack of knowledge makes it difficult, if not impossible, for board
members to understand and address cybersecurity risks.
SAME TEAM
BOD ITSec
DOWNLOAD OUR WHITEPAPER
To learn more about bridging the gap in your organization:
Follow our cybersecurity discussion on Twitter.
#ExposeTheGap
CYBER
SECURITY101
EXPOSING
THE GAP
BETWEEN BOARDS & CISOs
VISIBILITY
UNDERSTANDING THE
KNOWLEDGE,
& TRUST GAPS
THE TRUST
GAP
THE VISIBILITY
GAP
TAKE AWAY
Board members are very aware cybersecurity is an issue, but lack
visibility into breach and cyber activity.
59%
BOD
18%
ITSec
WHEN IT COMES TO CYBERSECURITY
WE’RE DOING A GOOD JOB!
54%
23%
18%
High value breaches
reported by IT security
professionals.
Breaches reported by
board members.
Board members unsure if
any breaches had occured.
60%IT security professionals
believe that the
Board DOES NOT
understand the risks
70%Board members
believe they DO
understand the risks
79%
OF BOARD MEMBERS RATE THEIR OWN
EFFECTIVENESS OF CYBERSECURITY
GOVERNANCE AT A 7/10 OR BETTER
46%
OF IT SECURITY PROFESSIONALS RATE
THE BOARD’S EFFECTIVENESS OF
CYBERSECURITY GOVERNANCE AT A 4.5/10
TAKE AWAY
These issues lead to a breakdown of trust and communciation
between board members and their own IT security professionals.
TARGET’S BREACH
WAS A
WAKE-UP
CALL
BOTH GROUPS AGREE THAT THE TARGET BREACH
HAD A SIGNIFICANT IMPACT ON THE BOARD’S
INVOLVEMENT IN CYBERSECURITY GOVERNANCE.
AGREE
65% 67%
How Fidelis Cybersecurity
can help your organization:
Mitigate Your Risk Now.
SOLUTIONS TO BRIDGE
THE GAP
ADD CYBERSECURITY ADVISOR TO BOARD
EDUCATE THE BOARD
INCREASE TRANSPARENCY AND
COMMUNICATION BETWEEN THE BOARD AND
IT SECURITY PROFESSIONALS
PROACTIVE
DEFENSE
SERVICES
ADVANCED
THREAT
DEFENSE
INCIDENT
RESPONSE
FORENSIC
SERVICES
fidelissecurity.com
SOURCE: CYBERSECURITY GOVERNANCE AND THE BOARD OF DIRECTORS,
CONDUCTED BY PONEMON INSTITUTE, OCT 2014. SAMPLE SIZE: MORE THAN 650
BOARD MEMBERS AND IT SECURITY PROFESSIONALS (MAINLY CIOS, CTOS AND CISOS).
CORPORATE
GOVERNANCE
DAY-TO-DAY
PROTECTION
LACKS
NECESSARY
EXPERTISE
LACKS CONFIDENCE
IN BOARD’S
UNDERSTANDING
RESPONSIBILITY
THE GAP
MEET THE PLAYERS
(BOD) (ITSec)
BOARD OF DIRECTORS IT SECURITY PROFESSIONALS
BOARD OF DIRECTOR’S
KNOWLEDGE
GAP
41%ADMITTED THEY LACKED
EXPERTISE IN CYBERSECURITY
26%SAID THEY HAD MINIMAL OR NO
KNOWLEDGE OF CYBERSECURITY
TAKE AWAY
Lack of knowledge makes it difficult, if not impossible, for board
members to understand and address cybersecurity risks.
SAME TEAM
BOD ITSec
DOWNLOAD OUR WHITEPAPER
To learn more about bridging the gap in your organization:
Follow our cybersecurity discussion on Twitter.
#ExposeTheGap
CYBER
SECURITY101
EXPOSING
THE GAP
BETWEEN BOARDS & CISOs
VISIBILITY
UNDERSTANDING THE
KNOWLEDGE,
& TRUST GAPS
MISMATCHED PERCEPTION
BREEDS MISTRUST.

Weitere ähnliche Inhalte

Was ist angesagt?

Consensus Audit Guidelines 2008
Consensus Audit Guidelines 2008Consensus Audit Guidelines 2008
Consensus Audit Guidelines 2008John Gilligan
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber SecurityLeon Fouche
 
How secure is your enterprise from threats?
How secure is your enterprise from threats? How secure is your enterprise from threats?
How secure is your enterprise from threats? IBM Analytics
 
10 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 202110 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 2021insightscare
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident responseBrian Honan
 
Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018 Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018 Proofpoint
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
2 factor authentication beyond password : enforce advanced security with au...
2  factor  authentication beyond password : enforce advanced security with au...2  factor  authentication beyond password : enforce advanced security with au...
2 factor authentication beyond password : enforce advanced security with au...NetwayClub
 
Best practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingBest practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingwardell henley
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Cybersecurity Toolkit
Cybersecurity ToolkitCybersecurity Toolkit
Cybersecurity ToolkitClaranet UK
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware IBM Security
 
Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeUnintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeDavid Mai, MBA
 
TLS 1.3: Expert Advice to Modernize Your Security and Decryption Practices
TLS 1.3: Expert Advice to Modernize Your Security and Decryption PracticesTLS 1.3: Expert Advice to Modernize Your Security and Decryption Practices
TLS 1.3: Expert Advice to Modernize Your Security and Decryption PracticesEnterprise Management Associates
 
3 Perspectives Around Data Breaches
3 Perspectives Around Data Breaches3 Perspectives Around Data Breaches
3 Perspectives Around Data BreachesSymantec
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessMeg Weber
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideInspiring Women
 

Was ist angesagt? (20)

Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
Consensus Audit Guidelines 2008
Consensus Audit Guidelines 2008Consensus Audit Guidelines 2008
Consensus Audit Guidelines 2008
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
How secure is your enterprise from threats?
How secure is your enterprise from threats? How secure is your enterprise from threats?
How secure is your enterprise from threats?
 
10 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 202110 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 2021
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
 
Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018 Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
2 factor authentication beyond password : enforce advanced security with au...
2  factor  authentication beyond password : enforce advanced security with au...2  factor  authentication beyond password : enforce advanced security with au...
2 factor authentication beyond password : enforce advanced security with au...
 
Best practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingBest practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_training
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Cybersecurity Toolkit
Cybersecurity ToolkitCybersecurity Toolkit
Cybersecurity Toolkit
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeUnintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric Cole
 
TLS 1.3: Expert Advice to Modernize Your Security and Decryption Practices
TLS 1.3: Expert Advice to Modernize Your Security and Decryption PracticesTLS 1.3: Expert Advice to Modernize Your Security and Decryption Practices
TLS 1.3: Expert Advice to Modernize Your Security and Decryption Practices
 
3 Perspectives Around Data Breaches
3 Perspectives Around Data Breaches3 Perspectives Around Data Breaches
3 Perspectives Around Data Breaches
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
CRI Cyber Board Briefing
CRI Cyber Board Briefing CRI Cyber Board Briefing
CRI Cyber Board Briefing
 

Andere mochten auch

THOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime NetworksTHOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime NetworksJohn Bambenek
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Phil Agcaoili
 
Cybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDCybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDPranav Shah
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boardsPaul McGillicuddy
 

Andere mochten auch (6)

THOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime NetworksTHOTCON 0x6: Going Kinetic on Electronic Crime Networks
THOTCON 0x6: Going Kinetic on Electronic Crime Networks
 
Fidelis Cybersecurity Overview
Fidelis Cybersecurity OverviewFidelis Cybersecurity Overview
Fidelis Cybersecurity Overview
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
 
Cybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDCybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoD
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
 

Ähnlich wie Bridging the Cybersecurity Gap

VIPRE --Responding to Cyberattacks
VIPRE --Responding to CyberattacksVIPRE --Responding to Cyberattacks
VIPRE --Responding to CyberattacksAbhishek Sood
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...Symantec
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSilicon Valley Bank
 
Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research CSSaunders
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionRamón Gómez de Olea y Bustinza
 
Cyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attentionCyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attentionRamón Gómez de Olea y Bustinza
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilienceaccenture
 
Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare Accenture Security
 
The State of Cyber Defense Report by Kroll - CY 2023
The State of Cyber Defense Report by Kroll - CY 2023The State of Cyber Defense Report by Kroll - CY 2023
The State of Cyber Defense Report by Kroll - CY 2023Ryan Frunnile
 
20 million cyber attacks per day
20 million cyber attacks per day20 million cyber attacks per day
20 million cyber attacks per dayRob Wilson
 
Healthcare Cybersecurity Survey 2018 - Sirius
Healthcare Cybersecurity Survey 2018 - SiriusHealthcare Cybersecurity Survey 2018 - Sirius
Healthcare Cybersecurity Survey 2018 - SiriusSirius
 
State of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon InstituteState of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon InstituteJeremiah Grossman
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Eoin Keary
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security SecureAuth
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsObserveIT
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxRambilashTudu
 

Ähnlich wie Bridging the Cybersecurity Gap (20)

VIPRE --Responding to Cyberattacks
VIPRE --Responding to CyberattacksVIPRE --Responding to Cyberattacks
VIPRE --Responding to Cyberattacks
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
 
Cyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attentionCyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attention
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare
 
The State of Cyber Defense Report by Kroll - CY 2023
The State of Cyber Defense Report by Kroll - CY 2023The State of Cyber Defense Report by Kroll - CY 2023
The State of Cyber Defense Report by Kroll - CY 2023
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
 
20 million cyber attacks per day
20 million cyber attacks per day20 million cyber attacks per day
20 million cyber attacks per day
 
Healthcare Cybersecurity Survey 2018 - Sirius
Healthcare Cybersecurity Survey 2018 - SiriusHealthcare Cybersecurity Survey 2018 - Sirius
Healthcare Cybersecurity Survey 2018 - Sirius
 
State of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon InstituteState of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon Institute
 
What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computing
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinar
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 

Kürzlich hochgeladen

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Kürzlich hochgeladen (20)

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Bridging the Cybersecurity Gap

  • 1. THE TRUST GAP THE VISIBILITY GAP TAKE AWAY Board members are very aware cybersecurity is an issue, but lack visibility into breach and cyber activity. 59% BOD 18% ITSec WHEN IT COMES TO CYBERSECURITY WE’RE DOING A GOOD JOB! 54% 23% 18% High value breaches reported by IT security professionals. Breaches reported by board members. Board members unsure if any breaches had occured. 60%IT security professionals believe that the Board DOES NOT understand the risks 70%Board members believe they DO understand the risks MISMATCHED PERCEPTION BREEDS MISTRUST. 79% OF BOARD MEMBERS RATE THEIR OWN EFFECTIVENESS OF CYBERSECURITY GOVERNANCE AT A 7/10 OR BETTER 46% OF IT SECURITY PROFESSIONALS RATE THE BOARD’S EFFECTIVENESS OF CYBERSECURITY GOVERNANCE AT A 4.5/10 TAKE AWAY These issues lead to a breakdown of trust and communciation between board members and their own IT security professionals. TARGET’S BREACH WAS A WAKE-UP CALL BOTH GROUPS AGREE THAT THE TARGET BREACH HAD A SIGNIFICANT IMPACT ON THE BOARD’S INVOLVEMENT IN CYBERSECURITY GOVERNANCE. AGREE 65% 67% How Fidelis Cybersecurity can help your organization: Mitigate Your Risk Now. SOLUTIONS TO BRIDGE THE GAP ADD CYBERSECURITY ADVISOR TO BOARD EDUCATE THE BOARD INCREASE TRANSPARENCY AND COMMUNICATION BETWEEN THE BOARD AND IT SECURITY PROFESSIONALS PROACTIVE DEFENSE SERVICES ADVANCED THREAT DEFENSE INCIDENT RESPONSE FORENSIC SERVICES fidelissecurity.com SOURCE: CYBERSECURITY GOVERNANCE AND THE BOARD OF DIRECTORS, CONDUCTED BY PONEMON INSTITUTE, OCT 2014. SAMPLE SIZE: MORE THAN 650 BOARD MEMBERS AND IT SECURITY PROFESSIONALS (MAINLY CIOS, CTOS AND CISOS). CORPORATE GOVERNANCE DAY-TO-DAY PROTECTION LACKS NECESSARY EXPERTISE LACKS CONFIDENCE IN BOARD’S UNDERSTANDING RESPONSIBILITY THE GAP MEET THE PLAYERS (BOD) (ITSec) BOARD OF DIRECTORS IT SECURITY PROFESSIONALS BOARD OF DIRECTOR’S KNOWLEDGE GAP 41%ADMITTED THEY LACKED EXPERTISE IN CYBERSECURITY 26%SAID THEY HAD MINIMAL OR NO KNOWLEDGE OF CYBERSECURITY TAKE AWAY Lack of knowledge makes it difficult, if not impossible, for board members to understand and address cybersecurity risks. SAME TEAM BOD ITSec DOWNLOAD OUR WHITEPAPER To learn more about bridging the gap in your organization: Follow our cybersecurity discussion on Twitter. #ExposeTheGap CYBER SECURITY101 EXPOSING THE GAP BETWEEN BOARDS & CISOs VISIBILITY UNDERSTANDING THE KNOWLEDGE, & TRUST GAPS
  • 2. THE TRUST GAP THE VISIBILITY GAP TAKE AWAY Board members are very aware cybersecurity is an issue, but lack visibility into breach and cyber activity. 59% BOD 18% ITSec WHEN IT COMES TO CYBERSECURITY WE’RE DOING A GOOD JOB! 54% 23% 18% High value breaches reported by IT security professionals. Breaches reported by board members. Board members unsure if any breaches had occured. 60%IT security professionals believe that the Board DOES NOT understand the risks 70%Board members believe they DO understand the risks 79% OF BOARD MEMBERS RATE THEIR OWN EFFECTIVENESS OF CYBERSECURITY GOVERNANCE AT A 7/10 OR BETTER 46% OF IT SECURITY PROFESSIONALS RATE THE BOARD’S EFFECTIVENESS OF CYBERSECURITY GOVERNANCE AT A 4.5/10 TAKE AWAY These issues lead to a breakdown of trust and communciation between board members and their own IT security professionals. TARGET’S BREACH WAS A WAKE-UP CALL BOTH GROUPS AGREE THAT THE TARGET BREACH HAD A SIGNIFICANT IMPACT ON THE BOARD’S INVOLVEMENT IN CYBERSECURITY GOVERNANCE. AGREE 65% 67% How Fidelis Cybersecurity can help your organization: Mitigate Your Risk Now. SOLUTIONS TO BRIDGE THE GAP ADD CYBERSECURITY ADVISOR TO BOARD EDUCATE THE BOARD INCREASE TRANSPARENCY AND COMMUNICATION BETWEEN THE BOARD AND IT SECURITY PROFESSIONALS PROACTIVE DEFENSE SERVICES ADVANCED THREAT DEFENSE INCIDENT RESPONSE FORENSIC SERVICES fidelissecurity.com SOURCE: CYBERSECURITY GOVERNANCE AND THE BOARD OF DIRECTORS, CONDUCTED BY PONEMON INSTITUTE, OCT 2014. SAMPLE SIZE: MORE THAN 650 BOARD MEMBERS AND IT SECURITY PROFESSIONALS (MAINLY CIOS, CTOS AND CISOS). CORPORATE GOVERNANCE DAY-TO-DAY PROTECTION LACKS NECESSARY EXPERTISE LACKS CONFIDENCE IN BOARD’S UNDERSTANDING RESPONSIBILITY THE GAP MEET THE PLAYERS (BOD) (ITSec) BOARD OF DIRECTORS IT SECURITY PROFESSIONALS BOARD OF DIRECTOR’S KNOWLEDGE GAP 41%ADMITTED THEY LACKED EXPERTISE IN CYBERSECURITY 26%SAID THEY HAD MINIMAL OR NO KNOWLEDGE OF CYBERSECURITY TAKE AWAY Lack of knowledge makes it difficult, if not impossible, for board members to understand and address cybersecurity risks. SAME TEAM BOD ITSec DOWNLOAD OUR WHITEPAPER To learn more about bridging the gap in your organization: Follow our cybersecurity discussion on Twitter. #ExposeTheGap CYBER SECURITY101 EXPOSING THE GAP BETWEEN BOARDS & CISOs VISIBILITY UNDERSTANDING THE KNOWLEDGE, & TRUST GAPS MISMATCHED PERCEPTION BREEDS MISTRUST.