survey - add iam to improve security

22
Survey Results: IT Security Executives Survey conducted in March 2014 by Courion At companies of 500+ employees, all geographies Polled over 4,000 IT security executives Response rate of 3 percent

Upload: mcollins

Post on 22-May-2015

71 views

Category:

Data & Analytics


0 download

DESCRIPTION

SURVEY: Management of Access Privileges Cited as Critical to Reducing Risk and Increasing Security If you are a Chief Information Security Officer (CISO), chances are you may not be getting much sleep lately according to a recent survey of IT security executives at companies of 500 or more employees. The survey , conducted in March 2014 by Courion, a leading provider of intelligent identity and access management (IAM) solutions, revealed that 78 percent of respondents are anxious about the possibility of a breach at their organization. What’s more, IT security executives are increasingly aware that they are on the front line, maintaining brand equity and protecting customers’ privacy and personal data. 58.8 percent identified “protecting the privacy of our customers” as their primary goal in addressing a significant security breach, and 62.7 percent admitted they most fear “negative publicity affecting the company brand,” should a breach occur within their organization. “Our recent survey confirmed what we’ve been hearing from many customers over the past few years, the role of the senior IT security executive is consistently changing,” said Christopher Zannetos, president and CEO of Courion. “Not only are they thought of as the front line defense for protecting sensitive company and customer information, they also feel responsible for brand image and customer satisfaction. IT security cannot tackle all this alone, however. We believe, and this survey confirmed, that better employee education and management of user access can provide much needed support for the security team.” Respondents cited “managing user access” and “communicating or enforcing company policies” among top security priorities in 2014, but also believe other stakeholders may not consider the careful control of user access an important issue. For example, respondents said that while 95 percent of their IT security team considers preventing security breaches a serious issue, they believe only 45 percent of the employee base feels the same. Indifference at the employee level, lack of knowledge and malicious acts by trusted insiders can present a challenge for IT security, as evidenced by the 2014 Verizon Data Breach Investigations Report, which included “insider misuse” as one of the nine basic patterns that all breaches can be described by. Within this pattern, “privilege abuse” was the top threat action observed in 88 percent of security incidents. This is meaningful, since “Account Monitoring and Control”, “Controlled Access Based on the Need to Know” and “Controlled Use of Administrative Privileges”are three of the Top 20 Critical Security Controls recommended by the SANS Institute, one of the largest sources for information security training and security certification in the world. To learn more about how you can use intelligent identity and access management solutions as part of your security controls, contact 866.Courion or [email protected].

TRANSCRIPT

Page 1: Survey - Add IAM to Improve Security

Survey Results: IT Security Executives

Survey conducted in March 2014 by CourionAt companies of 500+ employees, all geographiesPolled over 4,000 IT security executivesResponse rate of 3 percent

Page 2: Survey - Add IAM to Improve Security

IT Security Executives are Not Getting Much Sleep Lately . . .

Page 3: Survey - Add IAM to Improve Security

78% are Anxious About a Possible Breach . . .

Source: Courion survey of 4,000+ IT security executives conducted in March 2014

Page 4: Survey - Add IAM to Improve Security

With Good Reason: Breaches are on the Rise

Source: Risk Based Security, Open Security Foundation, February 2013

Page 5: Survey - Add IAM to Improve Security

Source: PWC Global State of Information Security Survey, 2014

In Case You Need More Convincing . . .

Page 6: Survey - Add IAM to Improve Security

IT Security Executive Becomes Brand Champion

Page 7: Survey - Add IAM to Improve Security

IT Security Executive: the New Front Line for the Brand

If a breach occurred to your organization, what do you fear most?

Source: Courion survey of 4,000+ IT security executives conducted in March 2014

Page 8: Survey - Add IAM to Improve Security

Aware of Possible Negative Media Fallout from a Breach

Page 9: Survey - Add IAM to Improve Security

They Understand a Breach Could Damage Reputation

Page 10: Survey - Add IAM to Improve Security

And Have a Material Effect on Stock Price

Page 11: Survey - Add IAM to Improve Security

IT Security Executive as Key to Customer Privacy

Page 12: Survey - Add IAM to Improve Security

They Know Job #1 is Protection of Customer Data

What is your #1 goal in addressing a significant security breach?

Source: Courion survey of 4,000+ IT security executives conducted in March 2014

Page 13: Survey - Add IAM to Improve Security

2014 IT Security Priorities:Employee Education + Better Access Management

What do you feel should be the top security priority within your organization in 2014?

Source: Courion survey of 4,000+ IT security executives conducted in March 2014

Page 14: Survey - Add IAM to Improve Security

Research Agrees on Need to Focus on Inside Threat:

Privilege Abuse Cited in 88% of Insider Misuse Cases

Source: Verizon Data Breach Investigatios Report 2014

Top 10 Threat Action Varieties Within Insider Misuse

Page 15: Survey - Add IAM to Improve Security

So While Identity Management is Top of Mind for IT Security

Source: 451 Group

Page 16: Survey - Add IAM to Improve Security

Employee Indifference May be a Challenge

Page 17: Survey - Add IAM to Improve Security

Perhaps Not All Stakeholders Take Security SeriouslyDo you feel each of these stakeholders takes preventing security breaches seriously:

Source: Courion survey of 4,000+ IT security executives conducted in March 2014

Page 18: Survey - Add IAM to Improve Security

Access Privileges Must Be Proactively Controlled,Abandoned Accounts Eliminated

Recommended Controls for Insider & Privilege Misuse - Verizon DBIR 2014

• Know your data and who has access to it• Review user accounts• Watch for data exfiltration• Publish audit results

Source: Verizon Data Breach Investigations Report 2014

Page 19: Survey - Add IAM to Improve Security

So What Can You Do?Make

Identity & Access Managementpart of

Your Security Strategy

mdillon
Can we add another slide to this section, under the SANS info? Maybe the the VISA guidance Sully referenced in the recent webinar: clear SoD, strong passwords, good hygiene, monitor for privelege escalation, etc.
Page 20: Survey - Add IAM to Improve Security

Improve Security with Identity & Access Management

Source: SANS.org

Page 21: Survey - Add IAM to Improve Security

Recommendations for Access Control:

Visa Data Security Alert, August 2013

• Create segregation of duties (SoD) policies betweenpayment and non-payment application access

• Apply access controls lists segmenting public facing andbackend database systems

• Assign strong passwords to prevent application modification

• Implement least privileges and access control listson users and applications

• Limit administrative privileges on users and applications

• Use intelligence to analyze and uncover malicious behavior

Source: VISA Data Security Alert August 2013 http://usa.visa.com/download/merchants/Bulletin__Memory_Parser_Update_082013.pdf

Page 22: Survey - Add IAM to Improve Security

Thank You.

To Learn More:866.Courion

Improve Security with Identity & Access Management