...

Turnaround and transformation in cybersecurity How Canadian businesses are responding to rising cyber-risks

by user

on
Category: Documents
38

views

Report

Comments

Transcript

Turnaround and transformation in cybersecurity How Canadian businesses are responding to rising cyber-risks
www.pwc.com/ca/security
Key findings from
The Global State of
Information Security®
Survey 2016
— Canadian Insights
Turnaround and
transformation in cybersecurity
How Canadian businesses are
responding to rising cyber-risks
By now, the numbers have become numbing. Cybersecurity
incidents are daily news, with reports of escalating impacts
and costs. Beyond the headlines, however, you’ll find
new reasons for optimism. We take a closer look at how
innovative businesses are responding and how Canadian
organizations are doing compared to global peers.
2
Key findings from The Global State of Information Security® Survey 2016
Canadian Insights
Organizations are investing
in core safeguards to better
defend their ecosystems
against evolving threats.
65%
58%
Have an overall information
security strategy
57%
55%
53%
52%
Have employee training and
awareness programs
Have security baselines /
standards for third parties
50%
50%
54%
49%
Have a CISO in charge of
cybersecurity
Conduct threat
assessments
54%
48%
Active monitoring analysis
of security intelligence
Turnaround and transformation in cybersecurity
How Canadian businesses are responding to rising cyber-risks
Overview of key findings
92%
64%
54%
91%
69%
59%
follow a risk-based
cybersecurity framework
use cloud-based
cybersecurity services
63%
59%
65%
59%
collaborate with others to
improve cybersecurity
Have purchased
cybersecurity insurance
leverage Big Data to
improve cybersecurity
3
4
Key findings from The Global State of Information Security® Survey 2016
Canadian Insights
Key figure #1 | Adoption of risk-based frameworks
Key finding #1
The rewards
of risk-based frameworks
92
%
f Canadian companies
o
have adopted a security
framework or a combination
of frameworks
These frameworks help:
•
•
•
•
•
identify and prioritize risks
quickly detect and mitigate threats
understand security gaps
design, monitor and measure progress
communicate better and collaborate on cybersecurity efforts
41%
35%
NIST Cybersecurity
Framework
29%
ISO27001
40%
24%
28%
SANS Critical
Controls
22%
26%
ISF Standard of
Good Practice
17%
18%
Other
8%
8%
None
13%
Do not know
Cloud computing has emerged as a viable cybersecurity tool
with advanced technologies for:
Key finding #2
Harnessing the power
of cloud-enabled cybersecurity
64
%
in Canada use cloud-based
cybersecurity services
Key figure #2 | Adoption of cloud-based
cybersecurity services
51%
56%
Real-time monitoring
and analytics
62%
Advanced
authentication
55%
11%
46%
•
•
•
•
data protection
privacy
network security
identity and access
management
• infrastructure capabilities
to improve intelligence
gathering and threat
modelling,
• better capabilities
to block attacks and
accelerate incident
response
And Canadian companies seem to recognize this with their
increasing adoption of cloud-based cybersecurity services.
Cloud-based security services can filter threats, allowing you
to focus employee time and costs on actually managing the
security issues.
48%
Identity and access
management
46%
47%
Threat intelligence
50%
44%
End-point protection
Turnaround and transformation in cybersecurity
How Canadian businesses are responding to rising cyber-risks
5
Key figure #3 | Benefits of data-driven cybersecurity
Key finding #3
The growing impact of
big data security analytics
54
%
of Canadian companies
leverage big data analytics
for cybersecurity
A data-centric approach to cybersecurity can help
organizations use real-time information to understand and
predict irregular user or network activity, and identify and
respond to cybersecurity risks and incidents quicker.
65%
61%
Better understanding
of external threats
35%
40%
Better visibility into
anomalous network
activity
Key finding #4
48%
49%
41%
41%
Better understanding
of internal threats
Better understanding
of user behaviour
39%
37%
Improved ability to quickly
identify & respond to
security incidents
Key figure #4 | Authentication technologies in place
Replacing passwords
with advanced authentication
61%
63%
Software tokens
Many Canadian organizations are turning to advanced
authentication to improve trust among customers and business
partners. The reason is apparent—many high-profile hacks
begin with compromised credentials. Use of such passwordless authentication and apps will require that organizations
rethink their approach to identity management, and design
authentication solutions that reflect the risk of access method
or transaction in the level of authentication.
59%
61%
Hardware tokens
60%
61%
Cryptographic keys
42%
Biometrics
(fingerprints, etc.)
59%
57%
53%
Multifactor
authentication
48%
50%
Smartphone tokens
46%
50%
National IDs and
ePassports
Other
18%
22%
6
Key findings from The Global State of Information Security® Survey 2016
Canadian Insights
Key figure #5 | Benefits of external collaboration
Key finding #5
Partnering to
sharpen security intelligence
63
%
in Canada collaborate to
improve cybersecurity and
reduce cyber-risks
Over the past three years, the number of organizations
that embrace external collaboration has steadily increased.
And those that do work with others cite clear benefits.
Organizations that don’t collaborate often cite the lack of an
information-sharing framework, as well as incompatible data
formats and platforms. Another weakness: updates aren’t
communicated at network speed.
Key finding #6
What can’t be protected
can be insured
59
%
f Canadian respondents
o
said that they’ve purchased
some form of cybersecurity
insurance.
Information sharing and advanced cybersecurity
technologies won’t stop all cyberattacks. By now it seems
clear that technically adept adversaries will always find new
ways to circumvent cybersecurity safeguards. That’s why
many businesses are purchasing cybersecurity insurance to
help mitigate the financial impact of cyber incidents when
they do occur.
62% 56%
40% 46%
46% 42%
Share and receive
information from
peers
Share and receive
information from
ISACs
Improved threat
intelligence and
awareness
42% 40%
42% 37%
Share and receive
information and
government
Share and receive
information from law
enforcement
Key figure #6 | Incident-related losses covered by
cybersecurity insurance
50%
47%
Personally identifiable
information
Payment card data
Damage to brand
reputation
Incident response
37%
41%
36%
36%
28%
31%
Turnaround and transformation in cybersecurity
How Canadian businesses are responding to rising cyber-risks
Key finding #7
The evolving involvement
of top executives
The roles and responsibilities of the top cybersecurity
executive have expanded in recent years. Today’s chief
information security officer (CISO) is a business manager
who needs to have expertise not only in security but also in
risk management, corporate governance and overall business
objectives. Just as the top cybersecurity executive has become
more involved in a wider range of activities, so too has the
board of directors.
Key figure #7 | Board participation
in information security
25%
50%
40%
46%
Security
budget
38%
40%
42%
45%
Overall security
stategy
25%
37%
36%
41%
Security
policies
16%
36%
30%
Security
technologies
37%
25%
34%
25%
32%
Review of security
and privacy risks
2014
2015
2014
2015
7
The adoption of innovative cybersecurity
safeguards discussed above will help organizations
better defend against today’s known vulnerabilities
and threats. But as technologies evolve and
adversaries sharpen their skills, how can businesses
anticipate the risks of tomorrow?
For a deeper discussion on cybersecurity,
please contact:
Sajith (Saj) Nair, Partner
+1 416 815 5185
[email protected]
Richard Wilson, Partner
+1 416 941 8374
[email protected]
David Craig, Partner
+1 416 814 5812
[email protected]
Lori-Ann Beausoleil, Partner
+1 416 687 8617
[email protected]
www.pwc.com/ca/security
© 2015 PricewaterhouseCoopers LLP, an Ontario limited liability
partnership. All rights reserved.
PwC refers to the Canadian member firm, and may sometimes refer to
the PwC network. Each member firm is a separate legal entity. Please see
www.pwc.com/structure for further details. 4967-02
Fly UP