What are steps the C-suite/board can take to reduce the firm's vulnerabilty? ... Support security across silos. % ... 2P
research would not have been possible without the kind co- operation of teachers ... Web, peer-to-peer applications and mobile phones. The HIUTI can be used ...
Dec 12, 2006 - INTRODUCTION A strong national policy framework is essential to support and scale-up Community-Based Disa
Lifespan Research Group, Royal Holloway, University of London ... Joint funding from West London Life Long Learning Network, and the Royal Borough.
The Canadian Agricultural Human Resource Council (CAHRC) ... livestock; producing, cultivating, growing, harvesting ....
Aug 12, 2014 - organisation approaches, infant and parenting programs and social marketing. The strongest finding emergi
Aug 12, 2014 - Lecturer in Criminology. Dr Geir H. Presterudstuen ... The survey that was undertaken for this study of p
electronic literature search, Mubarak Ismail who prepared the graphs on Pages 9 -11 and. Karen Collins who provided advi
So, for the first time, we have included a small number of women who hold Board and executive-level positions in the Civ
that English learners have equitable access to rigorous math learning opportunities and are supported to ... practice ar
Nov 5, 2012 - The world's most innovative companies not only permit failure, but ... Fifty-four percent of the top innov
Isuzu 6BD1T. Type . .... Shoe type Shoe width Operating weight Ground pressure.
18 500 kg 41.2 ... Operating weight is the total weight of the basic machine.
Initiative (FSSI), a pilot project funded from 1996 through 2000 by Chicago's Polk ... based and school-linked services that would broaden support for children's ...
Readers have been reading Oracle Magazine for an average of 4.8 years. ▫ One-
third (32%) of ... 2) PL SQL (94%), 3) Expert Opinions (94%), 4) Advice on using
new database features. (93%), 5) Customer .... Linux Journal. 21%. ♢ InfoWorld.
highest types of cognition over 60% of the time--analyzing, synthesizing, and evaluating data and information. This is s
Developing Leaders Around the World. Providing global leadership ... advancement and service of the church today and tom
Mar 10, 2011 - (Phone:) 202-234-5570 (Fax:) 202-232-8134 ... Associates conducted an online survey of 1,509 American adults from February 8 to. 15, 2011. The survey ... majority (53%) of Americans think that children frequently eat cheap,.
Sincerely,. Holly J. Kaptain Ph.D. Executive Director, CMSi. Page 3 of 55. ASR Intro, Exec Summary & Recommendations
An Abrupt Climate Change Scenario and Its Implications for United. States National Security. October 2003. By Peter Schwartz and Doug Randall. Imagining the ...
because... ...my friends and. neighbors live hereâ. Page 3 of 10. 5WBBEE LC Final Exec Summary [Web].pdf. 5WBBEE LC Fi
The District is currently in Phase 2 of this Study to define future. space planning needs and an analysis of the educati
Mar 10, 2011 - (Phone:) 202-234-5570 (Fax:) 202-232-8134 ... Associates conducted an online survey of 1,509 American adu
responsibility for a £10bn third-party spend across a wide range of divisions. ... Karen was appointed Chair of MediaCom in January 2016, the UK's largest ...... global Director of Cloud & Hosting Services at Vodafone, which she joined in.
'6 Min.ground clearance 360 mm (1'2') 1 380 mm (1'3') 360 mm (12'). H Track ....
Relief Valve Settings. Implement ... Pilot controls.l-iitachi's original shockless
valve and quick .... mule 'L l (14 100 ill-l) (0.20
Cyber-attacks are becoming a threat to the healthâif not the ... to consistently demonstrate success in reducing breac
THE C-SUITE, THE BOARD AND CYBER-DEFENCE
HOW A PROACTIVE C-SUITE CAN REDUCE CYBER-RISK FOR THE ENTERPRISE
Cyber-attacks are becoming a threat to the health—if not the survival—of the enterprise. What can C-suite executives and board members do to protect their firm? Research conducted by The Economist Intelligence Unit (EIU), sponsored by Oracle, shows that certain firms are able to consistently demonstrate success in reducing breaches across all major forms of cyber-attack. Increase in attacks over past two years 42%
Average growth over two years
39%
21.1%
30%
Unsuccessful companies 24% 17%
23%
9%
Successful companies
10%
6%
6% 2%
Hacking
9.8%
18%18%
18%
Ransomware
Public disclosure
Malware
Corporate espionage
Average reduction of
6%
4%
Government espionage
Customer data
53 %
in the rate of growth of major cyber-attacks
Financial theft
What are steps the C-suite/board can take to reduce the firm's vulnerabilty?
1
2
Adopt a proactive data defence strategy
Comparative engagement of the board
Top priority of the C-suite/board in successful companies 32%
Supporting a proactive security strategy
Recruit security personnel Ensure financial support
Balance security with productivity Collaborate with external entities Support security across silos Security crisis management
22%
17%
Building security culture Security programme oversight
Provide C-suite/board support of the strategy
11%
9%
9% 8% 6% 4% 4%
This is not the passive, ‘firewall perimeter’ defence. Instead, a proactive strategy that mobilises the workforce, engages customers and suppliers, and anticipates potential threats.
46%
C-suite/board feels it gets sufficient information
21% 33%
13% 45%
C-suite/board has necessary expertise in data security
14% Standing board committee on data security
27%
Security factored into board strategic decisions
Why is the C-suite/board so critical? Because defence is no longer an “IT project” – it is a multi-point strategy that requires the authority of the C-suite/board to make it work.
SPONSORED BY
Firms with higher growth in cyber-attacks (+21.1%) Firms with lower growth in cyber-attacks (+9.8%)
EXECUTIVE SUMMARY | PAGE 1
THE C-SUITE, THE BOARD AND CYBER-DEFENCE
HOW A PROACTIVE C-SUITE CAN REDUCE CYBER-RISK FOR THE ENTERPRISE What are steps the C-suite/board can take to reduce the firm's vulnerabilty?
3
4
Break down the silos and
build common standards
Level of success in breaking down silos*
36%
Less successful
Get the workforce engaged
Comparative employee involvement Our employees support our security programmes
72%
54% 73%
Our employees comply with our security policies
More successful
Our employees receive sufficient security training
Successful firms are almost twice as likely to have been successful in breaking down organisational barriers to security. This allows them to build a common security standard and promote it across the organisation.
42% 62% 28% 51%
Employees are the largest source of breaches. Engaging them—through training, communication and incentives—is a priority. It takes the C-suite and the board of directors to make this happen.
*% of respondents who said they were successful + very successful breaking down silos.
5
Centralise management of security operations
We can train and
repurpose our existing
personnel in security
61% 81%
More successful firms
Companies with lower breach rates have centralised their security, allowing common standards, controlled detection and concentration of expertise. It can also lower costs.
Grow your own people as security experts
Comparative employee involvement
Firms with centralised/hybrid management of data security
Less successful firms
6
23% Less successful firms
54% More successful firms
All companies face the global shortage of qualified security personnel. The successful companies are those that meet the challenge by training up their existing personnel and building their expertise in-house.
SPONSORED BY
Firms with higher growth in cyber-attacks (+21.1%) Firms with lower growth in cyber-attacks (+9.8%)
EXECUTIVE SUMMARY | PAGE 2
THE C-SUITE, THE BOARD AND CYBER-DEFENCE
HOW A PROACTIVE C-SUITE CAN REDUCE CYBER-RISK FOR THE ENTERPRISE What are steps the C-suite/board can take to reduce the firm's vulnerabilty?
7
8
Engage third-party experts where necessary
How important are third-party vendors in providing the following security services? (Important and very important)
69%
25%
20%
19%
Conducting independent security audits
% answering data security budget as sufficient
53%
48%
39%
Providing early warning/alerts
Provide the funding
that is needed
Less successful firms
Conducting independent probes and tests
67%
More successful firms
Cyber-attacks increased by 38% in 2015, yet most security budgets are increasing by less than 10%.
Third-party security vendors add three elements to successful security: • Source of scarce expertise • Independent view for monitoring and audits • “Lateral vision” and early warning in emerging cyber-threats. Successful firms engage them at more than twice the rate of unsuccessful ones.
Only the C-suite/board can make the decision to allocate scarce budget and resources to their cyber-defences.
Companies that execute this strategy with the backing of the C-suite/board are also more confident in their current security situation and in their future defence against cyber-attack. They have confidence in their current capacity to fight cyber-crime.
36% 50%
They rate themselves highly against their peers.
They have much higher levels of confidence in their future ability to meet the challenge of cyber-attacks.
Firms rating themselves leaders in cyber-security
% answering confident or very confident
26% 56%
41%
67%
SPONSORED BY
Firms with higher growth in cyber-attacks (+21.1%) Firms with lower growth in cyber-attacks (+9.8%)