You are on page 1of 1

The Best Security Defense?

A Good Offense

Organizations Are Constantly Playing Defense

Security
incidents
are on
the
rise

8,640

9,156
SMB
<1,000
employees

Enterprise

3,577

1,000+
employees

2014

Mobile

2015

693
2014

2015

But only

23%

is a leading
cause of
security
incidents.

1.
Top 3
causes of
security
incidents

say securing
mobile devices is a top
priority in the next year.
Mobile
device
exploitation

2.

Embedded
system
exploitation

3.

Consumer
technology
exploitation

Business Execs Finally Come Off the Sidelines

73%

of orgs have senior execs


who proactively communicate
the importance of InfoSec
to the entire organization

49%

54%

36%

have a CSO
in charge of the
security program

have a CISO
in charge of the
security program

of CSOs/CISOs
report directly
to the CEO

The Security Playbook: Frameworks

81%

Most common frameworks


for the Enterprise
1

follow a risk-based
framework/support
structure or guide

ISO 27001

2 NIST Cybersecurity Framework


3 SANs Critical Controls

49%

47%

Adopting
frameworks
has allowed
for better
identification
and prioritizing
of security risks.

Are better able


to quickly detect
and mitigate
security incidents
after adopting
a risk-based
framework.

Calling an Audible: New Technologies


Leveraged in Cybersecurity Strategies
Cloud

Internet of Things

70%

45%

of organizations
use cloud-based security services
to help ensure data security/privacy.

are implementing or plan


to implement a security
strategy for securing IoT
in the next 12 months.

36%

59%

currently have
a security
strategy for
IoT in place.

of enterprise organizations use


cloud-based security for real-time
time monitoring and analytics.

Big Data

65%

of enterprises leverage
big data analytics to
improve cybersecurity

1/
3
1/
3

23%

51%
have in
place

14%
in place, but
outsourced

of those received advanced


warning of cyber incidents
as a result of big data-driven
security capabilities.
of those prevented security
incidents as a result of having
big data-driven security capabilities.

of enterprises say employing big data analytics


to model for and identify information security
incidents is a top priority in the next 12 months.

Whats the biggest


challenge to implementing
big data intiatives?

Too much data


(38% of respondents agree)

Advanced Authentication:
Passcode

the next 12 months


Advanced
Authentication
technologies are
expected to grow,
especially for
mobile devices.

44%

multifactor
authentication

41%
say its a
priority

50%

plan to
implement
smartphone
tokens.

already have
smartphone tokens

Its a Team Effort: Organizations Go on Offense

65%

of organizations
are collaborating with
others in their industry
to improve security.

45%

of boards participate in the


overall security strategy.

In 2015, information
security budgets
were boosted by

24%

Source: The 2016 Global State of Information Security Survey, in partnership with PwC, CIO, and CSO, October 2015

For more information visit


idgenterprise.com/contact-us
IDGenterprise.com/resource-type/research

You might also like