trends in cybersecurity

12
Cybersecurity Trends BY: VARUNEE WONGWICHIT

Upload: varunee-wongwichit

Post on 09-Apr-2017

100 views

Category:

Documents


1 download

TRANSCRIPT

Cybersecurity: 3 top trends

Cybersecurity TrendsBy: Varunee Wongwichit

3 TRENDS

ISACA 2015 SURVEY

Companies providing mobile devicesCompanies experiencing physical loss of assets

Factors for End User data breaches

Outdated equipment (government level)

"State's technology is so antiquated that NO ONE uses a State-issued laptop and even high officials routinely end up using their home email accounts to be able to get their work done quickly and effectively," top Clinton aide Ann-Marie Slaughter(June 2013)

Employees using their work issued devices for personal use and vice versa

Only 42% of ISACA survey respondents restrict access to social media

Using those devices on unsecured Wi-Fi

Disgruntled employees could intentionally allow a breach in order to harm the company

Employees can sell critical data to cybercriminals for a fee

The cost of protecting a small companys digital infrastructure can be cost prohibitive

SolutionsTraining programsEducate staff on personal device securityRecognize malware embedded in infected emails (phishing)Require updated passwords on a set schedulePromote employee loyalty

Software and HardwareUp-to-date software Maintenance

Cybersecurity PolicyClear course of actionWi-Fi security Protection of critical data

SECURING THE CLOUDCompanies rely on cloud computing servicesOpportunity for data breachWhich is the best choice?30%5%Public: 88% Private: 63%PrivateCloudOnlyPublicCloudOnlyPublic & Private93% of Respondents Are Using CloudSource : RightScale 2015 State of the Cloud Report

58%

3 Types of cloud computingPublic3rd party cloud services provided over the internet Convenient for individual usersOpportunity for data breach due to lack of personal securityLoss of personal devices

PrivateCloud services are delivered from a business data center to internal usersVersatility and convenience while still assuring management of control and securityCan be cost prohibitive for small businesses Provides real time data analytics HybridPractical for most businessesAllow the enterprise to manage mission-critical data on the private cloud while utilizing the infrastructure of the public cloudSeamless integration between both clouds

Seamless Integration

Workforce

The Talent Gap 45% view the inability to hire and retain expert staffLack of master cyber workforce strategyDemand for qualified workforce outpacing supplySTEM education at all levels

Source: Ponemon Institute Research Report 2015

Barriers for Cyber Security workforce

Lack of entry level positionsDisparity between experience and skill levelCost of education and certificationsNo set business associationSecurity clearanceUnclear path of advancement

Opportunities:

Support cybersecurity competitions and scenario-based testingOffer more internship programsProvide a clear path of advancementApprove security clearances in a timely matterImprove cybersecurity trainingDevelop a market sensitive pay system