SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph
STKI 2017 Cyber Ratios
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph
FTE ratios are not trivial – cyber roles map
Cyber
guidance
Cyber
analysts
Infrastructure
development
Service desk
HR
NOC
outsourcing
cyber department
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph
Cyber roles map
Regulations
Top management
cyber risk management
high level policy
awareness
Cyber
guidance
Cyber
analysts
Infrastructure
development
Service desk
HR
analyst - response team,
define siem rules
‫בקרים‬
practical policy
(development, suppliers,
identity)
permission (operations - not policy)
cyber tools: FW, dlp, encryption,
DBMS FW, EPP (AV), deception
cyber related tools: patch
management, networking, hardening,
privileged account management, email
security, data masking, authentication
NOC
outsourcing
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph
IT from Mars, Finance (regulated) from Venus
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 5
Cyber personnel
• Number of employees divided to total number of cyber related IT
personnel for non-regulated orgs (regulations is less than 50% of cyber
budget):
• First level soc personnel not included (mainly soc service in non-
regulated orgs.)
Source: STKI
# employees / #
cyber personnel
Per FTE
65625 percentile
1125Median
179275 percentile
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 6
Cyber personnel: operational/guidance
• Number of operational cyber personnel divided to cyber guidance
personnel for non regulated orgs (regulations is less 50% of cyber
budget):
Source: STKI
# operational / #
guidance
Per FTE
1.5825 percentile
2.00Median
2.7575 percentile
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 7
Cyber personnel
• Number of employees (that use computers) divided to total number of cyber related
IT personnel for regulated orgs (regulations over 50% of cyber budget):
• Cyber personnel include: guidance, cyber analysts, cyber operations, permissions
team
• First level soc personnel not included, insurance agents (not employees) are not
included
Source: STKI
# employees / #
cyber personnel
Per FTE
10625 percentile
133Median
15875 percentile
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 8
Cyber personnel - guidance
• Number of employees (that use computers) divided to total number
of cyber guidance personnel for regulated orgs (regulations over
50% of cyber budget):
Source: STKI
# employees /
# cyber
guidance
Per FTE
33825 percentile
410Median
109575 percentile
Insurance agents (not employees) are not counted but still get service
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 9
Cyber personnel – first level SOC
• Options for first level SOC operations mode:
– In sourcing : 1-2 FTE at work hours, 1 FTE at night. Total is about 6-9 FTE
– In sourcing: 1-2 FTE at work hours, at night - part of NOC. Total is about
3-4 FTE
– Outsourcing mode - 0 FTE.
Source: STKI
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 10
Cyber personnel – cyber analysts
• Number of employees (that use computers) divided to total number of
cyber analysts personnel for regulated orgs (regulations over 50% of
cyber budget):
• Regulated organizations will have minimum 2 cyber analysts (part of
SOC or guidance). External response team might be used when needed.
Source: STKI
# employees / #
cyber analysts
Per FTE
60025 percentile
667Median
100075 percentile
Insurance agents (not employees) are not counted but still get service
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 11
Cyber personnel - operations
• Number of employees (that use computers) divided to total number of cyber
operations personnel for regulated orgs (regulations over 50% of cyber budget):
• Example for cyber operations activities: FW, network security, email security, DBMS
firewall, encryption, authentication, security patches, hardening, etc.
• In many cases part of infrastructure technology teams (networking, sytem, PC, etc).
Source: STKI
# employees / #
cyber operations
Per FTE
21725 percentile
285Median
50075 percentile
Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 12
Cyber personnel – permissions team
• Number of employees (that use computers) divided to total number of
permissions team personnel for regulated orgs (regulations over 50%
of cyber budget):
• Permissions team might be part of service desk, security guidance or
security operations
Source: STKI
# employees / #
permissions team
Per FTE
46525 percentile
600Median
66775 percentile
Insurance agents (not employees) are not counted but still get service

Weitere ähnliche Inhalte

Was ist angesagt?

DevOps 101+: From collaboration to microservices
DevOps 101+: From collaboration to microservicesDevOps 101+: From collaboration to microservices
DevOps 101+: From collaboration to microservicesDonnie Berkholz
 
Cloud Computing Gets Put to the Test
Cloud Computing Gets Put to the TestCloud Computing Gets Put to the Test
Cloud Computing Gets Put to the TestAvere Systems
 
Israel IT trends and positioning in infrastructure and development (delivery...
Israel IT  trends and positioning in infrastructure and development (delivery...Israel IT  trends and positioning in infrastructure and development (delivery...
Israel IT trends and positioning in infrastructure and development (delivery...Dr. Jimmy Schwarzkopf
 
The intricacies of cloud integration
The intricacies of cloud integrationThe intricacies of cloud integration
The intricacies of cloud integrationMichel de Goede
 
The influence of consumerization on enterprise apps
The influence of consumerization on enterprise appsThe influence of consumerization on enterprise apps
The influence of consumerization on enterprise appsMichel de Goede
 
Accelerating SDLC for Large Public Sector Enterprise Applications
Accelerating SDLC for Large Public Sector Enterprise ApplicationsAccelerating SDLC for Large Public Sector Enterprise Applications
Accelerating SDLC for Large Public Sector Enterprise ApplicationsSplunk
 
Office 365 Monitoring Best Practices
Office 365 Monitoring Best PracticesOffice 365 Monitoring Best Practices
Office 365 Monitoring Best PracticesThousandEyes
 
Money Pitfalls and Failed Expectations: Optimizing Essentials for the Cloud
Money Pitfalls and Failed Expectations: Optimizing Essentials for the CloudMoney Pitfalls and Failed Expectations: Optimizing Essentials for the Cloud
Money Pitfalls and Failed Expectations: Optimizing Essentials for the CloudNicole Maus
 
Online Memory Leak Detection in the Cloud-based Infrastructures
Online Memory Leak Detection in the Cloud-based InfrastructuresOnline Memory Leak Detection in the Cloud-based Infrastructures
Online Memory Leak Detection in the Cloud-based InfrastructuresAnshul Jindal
 
Doing DevOps for Big Data? What You Need to Know About AIOps
Doing DevOps for Big Data? What You Need to Know About AIOpsDoing DevOps for Big Data? What You Need to Know About AIOps
Doing DevOps for Big Data? What You Need to Know About AIOpsDevOps.com
 
Doing DevOps for Big Data? What You Need to Know About AIOps
Doing DevOps for Big Data? What You Need to Know About AIOpsDoing DevOps for Big Data? What You Need to Know About AIOps
Doing DevOps for Big Data? What You Need to Know About AIOpsDevOps.com
 
The Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud WorldThe Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud WorldEnterprise Management Associates
 
How to add security in dataops and devops
How to add security in dataops and devopsHow to add security in dataops and devops
How to add security in dataops and devopsUlf Mattsson
 

Was ist angesagt? (14)

DevOps 101
DevOps 101DevOps 101
DevOps 101
 
DevOps 101+: From collaboration to microservices
DevOps 101+: From collaboration to microservicesDevOps 101+: From collaboration to microservices
DevOps 101+: From collaboration to microservices
 
Cloud Computing Gets Put to the Test
Cloud Computing Gets Put to the TestCloud Computing Gets Put to the Test
Cloud Computing Gets Put to the Test
 
Israel IT trends and positioning in infrastructure and development (delivery...
Israel IT  trends and positioning in infrastructure and development (delivery...Israel IT  trends and positioning in infrastructure and development (delivery...
Israel IT trends and positioning in infrastructure and development (delivery...
 
The intricacies of cloud integration
The intricacies of cloud integrationThe intricacies of cloud integration
The intricacies of cloud integration
 
The influence of consumerization on enterprise apps
The influence of consumerization on enterprise appsThe influence of consumerization on enterprise apps
The influence of consumerization on enterprise apps
 
Accelerating SDLC for Large Public Sector Enterprise Applications
Accelerating SDLC for Large Public Sector Enterprise ApplicationsAccelerating SDLC for Large Public Sector Enterprise Applications
Accelerating SDLC for Large Public Sector Enterprise Applications
 
Office 365 Monitoring Best Practices
Office 365 Monitoring Best PracticesOffice 365 Monitoring Best Practices
Office 365 Monitoring Best Practices
 
Money Pitfalls and Failed Expectations: Optimizing Essentials for the Cloud
Money Pitfalls and Failed Expectations: Optimizing Essentials for the CloudMoney Pitfalls and Failed Expectations: Optimizing Essentials for the Cloud
Money Pitfalls and Failed Expectations: Optimizing Essentials for the Cloud
 
Online Memory Leak Detection in the Cloud-based Infrastructures
Online Memory Leak Detection in the Cloud-based InfrastructuresOnline Memory Leak Detection in the Cloud-based Infrastructures
Online Memory Leak Detection in the Cloud-based Infrastructures
 
Doing DevOps for Big Data? What You Need to Know About AIOps
Doing DevOps for Big Data? What You Need to Know About AIOpsDoing DevOps for Big Data? What You Need to Know About AIOps
Doing DevOps for Big Data? What You Need to Know About AIOps
 
Doing DevOps for Big Data? What You Need to Know About AIOps
Doing DevOps for Big Data? What You Need to Know About AIOpsDoing DevOps for Big Data? What You Need to Know About AIOps
Doing DevOps for Big Data? What You Need to Know About AIOps
 
The Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud WorldThe Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud World
 
How to add security in dataops and devops
How to add security in dataops and devopsHow to add security in dataops and devops
How to add security in dataops and devops
 

Andere mochten auch

Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...
Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...
Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...Einat Shimoni
 
STKI 25th Annual Israel IT Market Study 2017
STKI 25th Annual Israel IT Market Study 2017STKI 25th Annual Israel IT Market Study 2017
STKI 25th Annual Israel IT Market Study 2017Dr. Jimmy Schwarzkopf
 
Dr. Jimmy Schwarzkopf main tent trend presentation 2017
Dr. Jimmy Schwarzkopf main tent trend presentation 2017Dr. Jimmy Schwarzkopf main tent trend presentation 2017
Dr. Jimmy Schwarzkopf main tent trend presentation 2017Dr. Jimmy Schwarzkopf
 
The Algorithm of Magical Customer Experiences
The Algorithm of Magical Customer ExperiencesThe Algorithm of Magical Customer Experiences
The Algorithm of Magical Customer ExperiencesEinat Shimoni
 
Delivery positionnig 2016 v1
Delivery positionnig 2016 v1Delivery positionnig 2016 v1
Delivery positionnig 2016 v1Pini Cohen
 
It delivery 2016 v5
It delivery 2016 v5It delivery 2016 v5
It delivery 2016 v5Pini Cohen
 
Galit feins presentation v7 for summit
Galit feins presentation v7 for summitGalit feins presentation v7 for summit
Galit feins presentation v7 for summitGalit Fein
 
STKI Israeli IT market study 2016 V2
STKI Israeli IT  market study 2016 V2STKI Israeli IT  market study 2016 V2
STKI Israeli IT market study 2016 V2Dr. Jimmy Schwarzkopf
 
Galit fein product positioning
Galit fein product positioningGalit fein product positioning
Galit fein product positioningGalit Fein
 
How does Big data empower marketing?
How does Big data empower marketing?How does Big data empower marketing?
How does Big data empower marketing?Einat Shimoni
 
Bots: from dream to reality
Bots: from dream to realityBots: from dream to reality
Bots: from dream to realityEinat Shimoni
 
The Journey to Customer Journeys
The Journey to Customer JourneysThe Journey to Customer Journeys
The Journey to Customer JourneysEinat Shimoni
 
Are bots the future of customer engagement?
Are bots the future of customer engagement?Are bots the future of customer engagement?
Are bots the future of customer engagement?Einat Shimoni
 
What is Data Driven Marketing?
What is Data Driven Marketing?What is Data Driven Marketing?
What is Data Driven Marketing?Einat Shimoni
 
2016 positioning apps_analytics_final
2016 positioning apps_analytics_final2016 positioning apps_analytics_final
2016 positioning apps_analytics_finalEinat Shimoni
 
Improving the Quality and Value of the Laboratory Self-Inspection - Best of A...
Improving the Quality and Value of the Laboratory Self-Inspection - Best of A...Improving the Quality and Value of the Laboratory Self-Inspection - Best of A...
Improving the Quality and Value of the Laboratory Self-Inspection - Best of A...Ola Elgaddar
 
Delivery 2015 pini
Delivery 2015 piniDelivery 2015 pini
Delivery 2015 piniPini Cohen
 
Stki ratios 2015 v1
Stki ratios 2015 v1Stki ratios 2015 v1
Stki ratios 2015 v1Pini Cohen
 
How does the CIO contribute to other CxOs
How does the CIO contribute to other CxOsHow does the CIO contribute to other CxOs
How does the CIO contribute to other CxOsGalit Fein
 
Why are we talking about data?
Why are we talking about data?Why are we talking about data?
Why are we talking about data?Einat Shimoni
 

Andere mochten auch (20)

Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...
Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...
Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...
 
STKI 25th Annual Israel IT Market Study 2017
STKI 25th Annual Israel IT Market Study 2017STKI 25th Annual Israel IT Market Study 2017
STKI 25th Annual Israel IT Market Study 2017
 
Dr. Jimmy Schwarzkopf main tent trend presentation 2017
Dr. Jimmy Schwarzkopf main tent trend presentation 2017Dr. Jimmy Schwarzkopf main tent trend presentation 2017
Dr. Jimmy Schwarzkopf main tent trend presentation 2017
 
The Algorithm of Magical Customer Experiences
The Algorithm of Magical Customer ExperiencesThe Algorithm of Magical Customer Experiences
The Algorithm of Magical Customer Experiences
 
Delivery positionnig 2016 v1
Delivery positionnig 2016 v1Delivery positionnig 2016 v1
Delivery positionnig 2016 v1
 
It delivery 2016 v5
It delivery 2016 v5It delivery 2016 v5
It delivery 2016 v5
 
Galit feins presentation v7 for summit
Galit feins presentation v7 for summitGalit feins presentation v7 for summit
Galit feins presentation v7 for summit
 
STKI Israeli IT market study 2016 V2
STKI Israeli IT  market study 2016 V2STKI Israeli IT  market study 2016 V2
STKI Israeli IT market study 2016 V2
 
Galit fein product positioning
Galit fein product positioningGalit fein product positioning
Galit fein product positioning
 
How does Big data empower marketing?
How does Big data empower marketing?How does Big data empower marketing?
How does Big data empower marketing?
 
Bots: from dream to reality
Bots: from dream to realityBots: from dream to reality
Bots: from dream to reality
 
The Journey to Customer Journeys
The Journey to Customer JourneysThe Journey to Customer Journeys
The Journey to Customer Journeys
 
Are bots the future of customer engagement?
Are bots the future of customer engagement?Are bots the future of customer engagement?
Are bots the future of customer engagement?
 
What is Data Driven Marketing?
What is Data Driven Marketing?What is Data Driven Marketing?
What is Data Driven Marketing?
 
2016 positioning apps_analytics_final
2016 positioning apps_analytics_final2016 positioning apps_analytics_final
2016 positioning apps_analytics_final
 
Improving the Quality and Value of the Laboratory Self-Inspection - Best of A...
Improving the Quality and Value of the Laboratory Self-Inspection - Best of A...Improving the Quality and Value of the Laboratory Self-Inspection - Best of A...
Improving the Quality and Value of the Laboratory Self-Inspection - Best of A...
 
Delivery 2015 pini
Delivery 2015 piniDelivery 2015 pini
Delivery 2015 pini
 
Stki ratios 2015 v1
Stki ratios 2015 v1Stki ratios 2015 v1
Stki ratios 2015 v1
 
How does the CIO contribute to other CxOs
How does the CIO contribute to other CxOsHow does the CIO contribute to other CxOs
How does the CIO contribute to other CxOs
 
Why are we talking about data?
Why are we talking about data?Why are we talking about data?
Why are we talking about data?
 

Ähnlich wie Cyber ratios 2017 v1

297727851 getting-to-the-cloud-event-2015
297727851 getting-to-the-cloud-event-2015297727851 getting-to-the-cloud-event-2015
297727851 getting-to-the-cloud-event-2015Inbalraanan
 
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowCompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowInfosec
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...SaraPia5
 
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesThe Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesTestbytes
 
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesThe Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesTestbytes
 
Building a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdfBuilding a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdfTapOffice
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Integrated Security for Software Development and Advanced Penetration Testing...
Integrated Security for Software Development and Advanced Penetration Testing...Integrated Security for Software Development and Advanced Penetration Testing...
Integrated Security for Software Development and Advanced Penetration Testing...Symptai Consulting Limited
 
A Risk Based Approach to Security Detection and Investigation by Kelby Shelton
A Risk Based Approach to Security Detection and Investigation by Kelby SheltonA Risk Based Approach to Security Detection and Investigation by Kelby Shelton
A Risk Based Approach to Security Detection and Investigation by Kelby SheltonJohn Billings CISSP
 
EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)Lora O'Haver
 
Background  A small non-profit organization (SNPO-MC) has rec.docx
Background  A small non-profit organization (SNPO-MC) has rec.docxBackground  A small non-profit organization (SNPO-MC) has rec.docx
Background  A small non-profit organization (SNPO-MC) has rec.docxAMMY30
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
How to analyze text data for AI and ML with Named Entity Recognition
How to analyze text data for AI and ML with Named Entity RecognitionHow to analyze text data for AI and ML with Named Entity Recognition
How to analyze text data for AI and ML with Named Entity RecognitionSkyl.ai
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...IT Governance Ltd
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Be More Secure than your Competition:  MePush Cyber Security for Small BusinessBe More Secure than your Competition:  MePush Cyber Security for Small Business
Be More Secure than your Competition: MePush Cyber Security for Small BusinessArt Ocain
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Doeren Mayhew
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analyticsJim Kaplan CIA CFE
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityRahul Tyagi
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIsSteven Aiello
 
Is Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferIs Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferMAX Technical Training
 

Ähnlich wie Cyber ratios 2017 v1 (20)

297727851 getting-to-the-cloud-event-2015
297727851 getting-to-the-cloud-event-2015297727851 getting-to-the-cloud-event-2015
297727851 getting-to-the-cloud-event-2015
 
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowCompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to know
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
 
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesThe Business Of Information Security In India - Testbytes
The Business Of Information Security In India - Testbytes
 
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesThe Business Of Information Security In India - Testbytes
The Business Of Information Security In India - Testbytes
 
Building a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdfBuilding a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdf
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Integrated Security for Software Development and Advanced Penetration Testing...
Integrated Security for Software Development and Advanced Penetration Testing...Integrated Security for Software Development and Advanced Penetration Testing...
Integrated Security for Software Development and Advanced Penetration Testing...
 
A Risk Based Approach to Security Detection and Investigation by Kelby Shelton
A Risk Based Approach to Security Detection and Investigation by Kelby SheltonA Risk Based Approach to Security Detection and Investigation by Kelby Shelton
A Risk Based Approach to Security Detection and Investigation by Kelby Shelton
 
EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)
 
Background  A small non-profit organization (SNPO-MC) has rec.docx
Background  A small non-profit organization (SNPO-MC) has rec.docxBackground  A small non-profit organization (SNPO-MC) has rec.docx
Background  A small non-profit organization (SNPO-MC) has rec.docx
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How to analyze text data for AI and ML with Named Entity Recognition
How to analyze text data for AI and ML with Named Entity RecognitionHow to analyze text data for AI and ML with Named Entity Recognition
How to analyze text data for AI and ML with Named Entity Recognition
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Be More Secure than your Competition:  MePush Cyber Security for Small BusinessBe More Secure than your Competition:  MePush Cyber Security for Small Business
Be More Secure than your Competition: MePush Cyber Security for Small Business
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analytics
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe Security
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
 
Is Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferIs Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson Helfer
 

Mehr von Pini Cohen

Cto 2021 markets v2
Cto 2021 markets v2Cto 2021 markets v2
Cto 2021 markets v2Pini Cohen
 
Workato integrators corrections stki Israeli VAS market research 2020 v1
Workato integrators corrections stki Israeli VAS  market research 2020 v1Workato integrators corrections stki Israeli VAS  market research 2020 v1
Workato integrators corrections stki Israeli VAS market research 2020 v1Pini Cohen
 
It procurement 2019 v3
It procurement 2019 v3It procurement 2019 v3
It procurement 2019 v3Pini Cohen
 
STKI summit CTO presentation 2019
STKI summit CTO presentation 2019STKI summit CTO presentation 2019
STKI summit CTO presentation 2019Pini Cohen
 
STKI IT Delivery staffing ratios 2018 v3
STKI IT Delivery staffing ratios 2018 v3STKI IT Delivery staffing ratios 2018 v3
STKI IT Delivery staffing ratios 2018 v3Pini Cohen
 
Stkisummi18 i taa_s_cybergov_long_version_v2
Stkisummi18 i taa_s_cybergov_long_version_v2Stkisummi18 i taa_s_cybergov_long_version_v2
Stkisummi18 i taa_s_cybergov_long_version_v2Pini Cohen
 
Dev trends 18_q1
Dev trends 18_q1Dev trends 18_q1
Dev trends 18_q1Pini Cohen
 
Stkisummi18 i taa_s_cybergov_long_version_v1
Stkisummi18 i taa_s_cybergov_long_version_v1Stkisummi18 i taa_s_cybergov_long_version_v1
Stkisummi18 i taa_s_cybergov_long_version_v1Pini Cohen
 
Delivery positionnig 2017 v2
Delivery positionnig 2017   v2Delivery positionnig 2017   v2
Delivery positionnig 2017 v2Pini Cohen
 
IT procurement cloud (and other) recommandations
IT procurement cloud (and other) recommandationsIT procurement cloud (and other) recommandations
IT procurement cloud (and other) recommandationsPini Cohen
 
IT procurement v2
IT procurement v2IT procurement v2
IT procurement v2Pini Cohen
 
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trendsSTKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trendsPini Cohen
 
STKI staffing ratios ratios 2014
STKI staffing ratios ratios 2014STKI staffing ratios ratios 2014
STKI staffing ratios ratios 2014Pini Cohen
 
STKI Summit 2014 - Trends and Positioning - Delivery domain
STKI Summit 2014 - Trends and Positioning - Delivery domain STKI Summit 2014 - Trends and Positioning - Delivery domain
STKI Summit 2014 - Trends and Positioning - Delivery domain Pini Cohen
 
STKI Summit 2014 - How does CIO deliver?
STKI Summit 2014 - How does CIO deliver?STKI Summit 2014 - How does CIO deliver?
STKI Summit 2014 - How does CIO deliver?Pini Cohen
 
Stki summit2013 ratios
Stki summit2013 ratiosStki summit2013 ratios
Stki summit2013 ratiosPini Cohen
 
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 finalStki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 finalPini Cohen
 
Big data 2012 v1
Big data 2012 v1Big data 2012 v1
Big data 2012 v1Pini Cohen
 
Teaching IT one trick or two
Teaching IT one trick or twoTeaching IT one trick or two
Teaching IT one trick or twoPini Cohen
 
Cmdb intro 2012 v1
Cmdb intro 2012 v1Cmdb intro 2012 v1
Cmdb intro 2012 v1Pini Cohen
 

Mehr von Pini Cohen (20)

Cto 2021 markets v2
Cto 2021 markets v2Cto 2021 markets v2
Cto 2021 markets v2
 
Workato integrators corrections stki Israeli VAS market research 2020 v1
Workato integrators corrections stki Israeli VAS  market research 2020 v1Workato integrators corrections stki Israeli VAS  market research 2020 v1
Workato integrators corrections stki Israeli VAS market research 2020 v1
 
It procurement 2019 v3
It procurement 2019 v3It procurement 2019 v3
It procurement 2019 v3
 
STKI summit CTO presentation 2019
STKI summit CTO presentation 2019STKI summit CTO presentation 2019
STKI summit CTO presentation 2019
 
STKI IT Delivery staffing ratios 2018 v3
STKI IT Delivery staffing ratios 2018 v3STKI IT Delivery staffing ratios 2018 v3
STKI IT Delivery staffing ratios 2018 v3
 
Stkisummi18 i taa_s_cybergov_long_version_v2
Stkisummi18 i taa_s_cybergov_long_version_v2Stkisummi18 i taa_s_cybergov_long_version_v2
Stkisummi18 i taa_s_cybergov_long_version_v2
 
Dev trends 18_q1
Dev trends 18_q1Dev trends 18_q1
Dev trends 18_q1
 
Stkisummi18 i taa_s_cybergov_long_version_v1
Stkisummi18 i taa_s_cybergov_long_version_v1Stkisummi18 i taa_s_cybergov_long_version_v1
Stkisummi18 i taa_s_cybergov_long_version_v1
 
Delivery positionnig 2017 v2
Delivery positionnig 2017   v2Delivery positionnig 2017   v2
Delivery positionnig 2017 v2
 
IT procurement cloud (and other) recommandations
IT procurement cloud (and other) recommandationsIT procurement cloud (and other) recommandations
IT procurement cloud (and other) recommandations
 
IT procurement v2
IT procurement v2IT procurement v2
IT procurement v2
 
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trendsSTKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
STKI Summit 2014 Infra Trends - How CIO Deliver - complete infra trends
 
STKI staffing ratios ratios 2014
STKI staffing ratios ratios 2014STKI staffing ratios ratios 2014
STKI staffing ratios ratios 2014
 
STKI Summit 2014 - Trends and Positioning - Delivery domain
STKI Summit 2014 - Trends and Positioning - Delivery domain STKI Summit 2014 - Trends and Positioning - Delivery domain
STKI Summit 2014 - Trends and Positioning - Delivery domain
 
STKI Summit 2014 - How does CIO deliver?
STKI Summit 2014 - How does CIO deliver?STKI Summit 2014 - How does CIO deliver?
STKI Summit 2014 - How does CIO deliver?
 
Stki summit2013 ratios
Stki summit2013 ratiosStki summit2013 ratios
Stki summit2013 ratios
 
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 finalStki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
 
Big data 2012 v1
Big data 2012 v1Big data 2012 v1
Big data 2012 v1
 
Teaching IT one trick or two
Teaching IT one trick or twoTeaching IT one trick or two
Teaching IT one trick or two
 
Cmdb intro 2012 v1
Cmdb intro 2012 v1Cmdb intro 2012 v1
Cmdb intro 2012 v1
 

Kürzlich hochgeladen

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Kürzlich hochgeladen (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Cyber ratios 2017 v1

  • 1. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph STKI 2017 Cyber Ratios
  • 2. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph FTE ratios are not trivial – cyber roles map Cyber guidance Cyber analysts Infrastructure development Service desk HR NOC outsourcing cyber department
  • 3. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph Cyber roles map Regulations Top management cyber risk management high level policy awareness Cyber guidance Cyber analysts Infrastructure development Service desk HR analyst - response team, define siem rules ‫בקרים‬ practical policy (development, suppliers, identity) permission (operations - not policy) cyber tools: FW, dlp, encryption, DBMS FW, EPP (AV), deception cyber related tools: patch management, networking, hardening, privileged account management, email security, data masking, authentication NOC outsourcing
  • 4. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph IT from Mars, Finance (regulated) from Venus
  • 5. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 5 Cyber personnel • Number of employees divided to total number of cyber related IT personnel for non-regulated orgs (regulations is less than 50% of cyber budget): • First level soc personnel not included (mainly soc service in non- regulated orgs.) Source: STKI # employees / # cyber personnel Per FTE 65625 percentile 1125Median 179275 percentile
  • 6. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 6 Cyber personnel: operational/guidance • Number of operational cyber personnel divided to cyber guidance personnel for non regulated orgs (regulations is less 50% of cyber budget): Source: STKI # operational / # guidance Per FTE 1.5825 percentile 2.00Median 2.7575 percentile
  • 7. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 7 Cyber personnel • Number of employees (that use computers) divided to total number of cyber related IT personnel for regulated orgs (regulations over 50% of cyber budget): • Cyber personnel include: guidance, cyber analysts, cyber operations, permissions team • First level soc personnel not included, insurance agents (not employees) are not included Source: STKI # employees / # cyber personnel Per FTE 10625 percentile 133Median 15875 percentile
  • 8. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 8 Cyber personnel - guidance • Number of employees (that use computers) divided to total number of cyber guidance personnel for regulated orgs (regulations over 50% of cyber budget): Source: STKI # employees / # cyber guidance Per FTE 33825 percentile 410Median 109575 percentile Insurance agents (not employees) are not counted but still get service
  • 9. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 9 Cyber personnel – first level SOC • Options for first level SOC operations mode: – In sourcing : 1-2 FTE at work hours, 1 FTE at night. Total is about 6-9 FTE – In sourcing: 1-2 FTE at work hours, at night - part of NOC. Total is about 3-4 FTE – Outsourcing mode - 0 FTE. Source: STKI
  • 10. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 10 Cyber personnel – cyber analysts • Number of employees (that use computers) divided to total number of cyber analysts personnel for regulated orgs (regulations over 50% of cyber budget): • Regulated organizations will have minimum 2 cyber analysts (part of SOC or guidance). External response team might be used when needed. Source: STKI # employees / # cyber analysts Per FTE 60025 percentile 667Median 100075 percentile Insurance agents (not employees) are not counted but still get service
  • 11. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 11 Cyber personnel - operations • Number of employees (that use computers) divided to total number of cyber operations personnel for regulated orgs (regulations over 50% of cyber budget): • Example for cyber operations activities: FW, network security, email security, DBMS firewall, encryption, authentication, security patches, hardening, etc. • In many cases part of infrastructure technology teams (networking, sytem, PC, etc). Source: STKI # employees / # cyber operations Per FTE 21725 percentile 285Median 50075 percentile
  • 12. Pini Cohen’s work Copyright@2016. Do not remove source or attribution from any slide or graph 12 Cyber personnel – permissions team • Number of employees (that use computers) divided to total number of permissions team personnel for regulated orgs (regulations over 50% of cyber budget): • Permissions team might be part of service desk, security guidance or security operations Source: STKI # employees / # permissions team Per FTE 46525 percentile 600Median 66775 percentile Insurance agents (not employees) are not counted but still get service