+ All Categories
Home > Documents > Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association...

Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association...

Date post: 08-Jan-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
24
July 2013 Leading business advisers Irish Information Security and Cybercrime Survey 2013.
Transcript
Page 1: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

July 2013Leading business advisers

Irish Information Security and Cybercrime Survey 2013.

Page 2: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

2

Contents

Executive summary 3Key observations 4About the survey 5Key findings – the numbers 6Snapshot view 71. Information security 8

1.1 Understanding the information security function 81.2 Effectiveness of this function 91.3 Plans for expansion 101.4 Challenges faced 10

2. Mobile devices and emerging technologies 12

3. Motivation for information security 14

4. Incidents 154.1 Occurrences 154.2 The causes of an information security breach 164.3 The cost 164.4 A proactive approach 18

5. Overall assessment 20Protecting your organisation 21

Page 3: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

3

Now in its second year, this survey has all the hallmark areas which the inaugural survey focused upon but has also explored additional areas including cloud computing, BYOD and regulatory compliance.

Laws and regulations, coupled with the growing need to protect personal, intellectual and proprietary information as well as the reputation of an organisation have reinforced and enhanced the need for investment in information security. Unfortunately, information security is still a long way from integrating with the strategy and objectives of an organisation as evidenced by the increase in the average cost of a large cybercrime incident at €135,000 per incident, as well as the increase in the number of respondents who feel that appropriate measures are not in place to detect incidents of cybercrime in their organisation. In terms of remediation and clean-up costs associated with the incidents experienced by respondents’ organisations, the average cost stood at €29,954 per incident.

A new addition to the 2013 survey was to quantify the financial impact and total cost of cybercrime to businesses in Ireland. On average, instances of cybercrime cost 2.7% of annual turnover. Of most concern perhaps is the 15% of respondents who stated that cybercrime costs more than 10% of their annual turnover. These figures clearly illustrate the impact on Irish organisations as a result of cybercrime, and, more importantly, the lack of proactive planning and defending against such threats.

Of the respondents who experienced serious incidents, 14% reported losses above €250,000 per incident. 67% of respondents indicated that their organisation had not looked at cyber insurance or risk transfer as a mechanism to cover against cyber attacks, business interruptions or data theft/loss. These findings reinforce the need to proactively identify incidents and to keep up with technology advancements as only 40% of serious incidents were identified proactively.

Furthermore, it emphasises that organisations need to strengthen their procedural controls and obtain signed acceptance and adherence to the organisation’s security policies as the survey indicated that only 55% are currently doing so. Whilst this represents an increase from last year, it is still far below industry best practices and could expose organisations to various internal incidents, as well as potential legal implications should they look to prosecute, or dismiss employees or third party personnel.

A well-received addition to this year’s survey was the topic of cloud computing. While 60% of respondents indicated that their organisation uses cloud based services in some form, 39% of the respondents believe that privacy and data protection was the single biggest risk associated with the cloud, and continued to be a barrier for the use of cloud based services and solutions.

A proactive approach to cybercrime is important for organisations to ensure undetected incidents do not cause exponentially greater damage over a sustained or extended period of time. 45% of respondents believe their organisation proactively identified just over 40% of serious incidents, an alarming drop from 58% in 2012. Additionally 44% of respondents regard their information security policy as proactive while 47% consider their policies reactive.

We hope you find this report insightful in benchmarking your organisation’s effort against the ever increasing threat of cybercrime.

Colm McDonnell, Partner, Enterprise Risk Services, Deloitte

Executive summary

Welcome to the second Deloitte Ireland annual survey of CISOs and Information Security Managers in Ireland, conducted in association with EMC.

Page 4: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

4

Organisational strategic awareness and alignmentInformation security is best integrated into the culture of an organisation if the board and senior management are aware of their responsibilities and actively support the process. The survey findings indicated that only 42% of respondents felt that information security is very well understood by the board with 33% of the respondents stating that information security efforts were well aligned with the organisation’s overall strategy.

Organisational drivers for information security42% of respondents indicated that satisfying regulatory requirements was the main driver for investment in information security from senior stakeholders.

Protecting the reputation of the organisation came second, with 28% of survey respondents indicating that brand/reputation protection was the main driver for investment in information security. Interestingly, none of the respondents indicated investing in information security to gain an edge over competitors.

Mobile and smart devicesOf particular interest was the approach taken towards smartphones and bring your own device (BYOD), where 50% of organisations stated they only support corporate provided devices, with 29% supporting both corporate and employee purchased devices.

Given the escalating malware and attacks targeting smartphone devices, of concern was the 31% of organisations that had no additional security measures deployed on mobile devices (such as encryption, mobile device management solutions, etc.), despite corporate information being stored/processed on the mobile devices.

Response to cybercrime and information security breachesPreparation, and identification of, in addition to responding to incidents are of particular concern to respondents. Results show that only 44% of respondents believe that their organisation proactively identifies incidents and over 40% of the serious incidents encountered were identified proactively. The most common method of breaching security in an organisation is due to hacking, as identified by 19% of respondents.

The survey findings also indicate that 21% of respondents feel that keeping up with technology advancements is the top security initiative for 2013 while only 7% stated that regulatory and legislative compliance is a top initiative for 2013.

40% of respondents stated that their organisation had experienced at least one security breach that they know of in the past 12 months.

Resourcing and internal challengesThe demand for information security professionals continues to grow, with 44% of respondents stating that they are either currently recruiting or plan on taking on additional information security staff over the next one to two years.

42% of respondents felt that current funding for security was adequate, with a further 44% stating that funding was limited, thus impacting on their ability to prevent cyber attacks, or breaches of security.

Just 16% of respondents saw up-skilling existing security personnel as a top initiative.

Key observations

Page 5: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

5

Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.This survey was conducted in the second quarter of 2013. Respondents included information security leaders of multinationals, Irish organisations and subsidiaries. These organisations operate across a range of industries including financial services, public sector, manufacturing, IT, semi-state and insurance.

1. Primary function of the organisation surveyed

21%

9%

9%

7%

11%

5%

2% 5%5%

5%

5%

2%2%

7%

5%

Financial services

IT (hardware/software)

Education

Government

Telecoms/ISP

Manufacturing

Semi-state

Professional services/consultancy

Healthcare

Pharmaceuticals

Food products/beverages

Transport

Insurance

Legal firm

Other

< €5 million

€5 - €25 million

€25 - €100 million

€100 - €250 million

€250 - €500 million

€501 million - €1 billion or more

2. Size of organisation surveyed, in terms of turnove (or annual budget for public sector organisations)

12%

7%

21%

44%

5%

11%

About the survey

Figure 1 - Primary function of the organisation surveyed Figure 2 - Size of organisation surveyed, in terms of turnover (or annual budget for public sector organisations)

Page 6: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

6

63%

Key findings – the numbers

is the average cost per organisation for a security incident over the past year.

€29,954 was the average clean-up and remediation cost to organisations following an incident.

2.7% Cybercrime costs Irish organisations on average 2.7% of their annual turnover.

of respondents believe their organisation is only partially equipped, or do not consider their organisation to have adequate measures to deal with cybercrime.

of respondents rate their organisations’ overall readiness to deal with cybercrime incidents as fair or poor.49%

33% believe measures to detect incidents of cybercrime are either not appropriate or not adequate.

57% of respondents stated that no further actions were taken following an investigation of internal or external incidents.

67% of respondents have not looked into cyber insurance.

BiggeSt dRiveR

The biggest driver for information security investment/sponsorship is meeting regulatory requirements.

76% are of the view that existing policies only partially address or fail to address recent business and technology changes (BYOD, cloud).

30% of respondents believe that evolving technical threats present the biggest challenges in information security.

€135k

Page 7: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

7

The table below illustrates changes in key statistics from last year’s report.

Survey2012

Survey2013

increase/decrease (%)

Percentage of respondents that detected or are aware of breaches in the past 12 months

46% 40% -6%

Respondents planning on recruiting additional personnel for the information security function

24% 44% +20%

Respondents who feel that appropriate measures are not in place to detect incidents of cybercrime in their organisation

3% 23% +20%

Percentage of serious security incidents identified proactively 58% 40% -18%

Snapshot view

Security breaches are becoming more common, and information security leaders feel that the resources that they are currently working with are not sufficient to deal with the rise of cybercrime threats.

Page 8: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

8

1.1 Understanding the information security functionOur results show that there is a good level of understanding of information security risks at executive and board level. 42% of those surveyed believed that the executives and boards of their organisations understood these risks and impacts very well or better. 14% of respondents highlighted that they believe that these risks are not well understood. This relatively high level of awareness of the associated risks could be attributed to recent increases in cybercrime, as well as numerous high profile cases.

With this level of understanding in mind, organisations should ideally have their information security efforts aligned with the organisation’s overall risk management programmes. However, the results show there is room for improvement when it comes to aligning the information security risk and the overall business risk. Just 33% of respondents said that their information security efforts were well aligned with the organisation’s overall risk assessment or risk management programme. Although 46% of respondents believe that the security efforts and overall risk assessment were somewhat aligned - just under half of organisations are seeing some success in this department - the majority of organisations should be better aligned with business risk in order to reduce duplication of efforts and costs.

Excellent

Very well

Average

Not so well

Not at all

3. How well do you feel Information Security is understood by executives and the Board?

39%

9%

5%

42%

5%

4. To what levels are Information Security efforts linked with the organisations overall risk assessment or risk management programmes?

Well aligned

33% Somewhat aligned

46% Not effectively aligned

19% Not aligned

2%

Figure 3 - How well do you feel information security is understood by executives and the board?

Figure 4 - to what levels are information security efforts linked with the organisation’s overall risk strategy or risk programmes?

1. Information security

5. In terms of Information Security effectiveness - how effective do you feel your information security activities are?

Good

Average and predominantly reactive

Somewhat effective

Very effective

7%

58%

21%

14%

Page 9: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

9

1.2 effectiveness of the information security functionA large majority (65%) of the information security professionals surveyed believe that their organisations’ information security activities are good or very effective. 21% consider their security activities as average and predominantly reactive. While most respondents consider their respective organisations to be adequately protected, merely 7% consider themselves to be very effective.

A similar picture was painted when respondents were asked to describe their security monitoring strategy. A smaller, but still notable proportion of respondents (44%), stated that their security monitoring strategy is proactive, with a further 47% feeling that their strategy is reactive. This highlights how respondents are relatively satisfied with their security monitoring strategies, but there appears to be room for the information security function to be more proactive than at present.

5. In terms of Information Security effectiveness - how effective do you feel your information security activities are?

Good

Average and predominantly reactive

Somewhat effective

Very effective

7%

58%

21%

14%

Figure 5 - in terms of information security effectiveness - how effective do you feel your information security activities are?

Figure 6 - Would you describe your security monitoring strategy as mostly proactive or reactive?

47% 9%44%

ReactiveProactive No security monitoring strategy

6. Would you describe your security monitoring strategy as mostly proactive or reactive?

Page 10: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

10

1.3 Plans for expansionWhen asked about future plans for additional staff in the information security function, 44% of respondents stated that they are either currently recruiting or plan on taking on additional information security staff over the next one to two years. 16% said they did not know if they would be making any additions to the function.

.

1.4 Challenges facedEvolving technical threats and attacks were cited by 30% of respondents as the biggest challenge in information security. 24% cited employees and their activities and a further 21% indicated that their organisation is not in a position to perform an adequate review of risks prior to the introduction of new technologies. When compared to results from last year’s survey, the significance of employee activities as a security challenge has reduced considerably, from 50% of respondents to 24%. Respondents are more concerned about keeping pace with threats that are presented by new technologies.

Employees

Lack of funding

Lack of understanding at board level

Evolving technical threats

30%

13%

12% Adequate review of risks prior to introduction of new technologies

21%

24%

8. In your opinion, what major barriers/challenges does your organisation face in ensuring information security?

Figure 7 - do you plan to take on additional personnel to join the organisation’s information security team/function?

Figure 8 - in your opinion, what major barriers/challenges does your organisation face in ensuring information security?

Yes

Most likely

Current recruiting

No

Unknown

7. Do you plan to take on additional personnel to join the organisation's Information Security team/function?

16% 16%

40%

19%

9%

Page 11: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

11

The reduced significance of employees as a security challenge could be linked to the improved levels of policy education among users. 55% of respondents said that all users in their organisation had provided signed acceptance and adherence to the organisation’s security policies, up from 46% last year. While the percentage of organisations that have had employees sign full acceptance of security policies should be higher than 55%, it appears that steps have been taken to address the significant threats that employee activities present.

.

When asked about the funding received by the information security function to combat threats, 14% believed that there was insufficient or no funding available. 44% stated there was limited funding available.

Figure 9 - Have users provided signed acceptance and adherence to these policies?

Figure 10 - How would you rate the funding made available for information security to combat emerging threats and risks to confidentiality, integrity and availability?

Limited fundingInsufficient funding Adequate funding

44% 42%14%

10. How would you rate the funding made available for Information Security to combat emerging threats and risks to confidentiality, integrity and availability?

Yes

No

Some, but not all

9. Have users provided signed acceptance and adherence to these policies?

19%

26%

55%

Page 12: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

12

Respondents were also asked to what extent mobile devices are supported in their organisations. Remote access to company information via mobile devices brings additional challenges and risks. 79% of respondents said their organisation supports the use of corporate provided mobile devices only, with 31% also permitting the use of employee purchased mobile devices – bring your own device (BYOD). These stats were broadly in line with 2012 statistics, illustrating a continued interest and introduction of BYOD within organisations.

Coinciding with the increased demand for network support of mobile devices, many organisations are implementing additional security procedures for mobile devices. 50% of respondents said that their organisation had implemented specialist technologies to increase mobile security with 17% saying that additional in-house mechanisms had been implemented. It is worth noting that 31% of organisations surveyed had no additional security measures; despite corporate information being stored/processed on the mobile devices.

Corporate provided devices only

Both corporate and employee purchased

Currently piloting a support programme for employee devices

Employee purchased/owned devices only

Unofficially supporting employee owned devices on an ad-hoc basis

Do not know

11. To what extent is your enterprise supporting mobile devices?

50%

5%

29%

2% 9%

5%

No additional technologies are used to secure mobile devices

Current security measures on mobile devices are sufficient

Proprietary or in-house mechanisms such as access control/restrictions are used

Specialist technologies to increase mobile security are being used

50%

2%

17%

31%

12. Are mobile devices utilising additional security measures to protect organisational information?

Figure 11 - to what extent is your enterprise supporting mobile devices?

Figure 12 - Are mobile devices utilising additional security measures to protect organisational information?

2. Mobile devices and emerging technologies

Page 13: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

13

This year respondents were asked to what level cloud services are currently being used within their organisations. For more than half of respondents (53.5%), cloud services appear to have been adopted, albeit mainly on a departmental or specified business units basis. A quarter of respondents (25.5%) stated that while they are not currently using cloud based services, they plan to do so in the next 12 months. Somewhat surprisingly only 7% stated that cloud services are widely used throughout their organisation, and a further 14% stated that they have no plans for cloud services to be used in the short to medium term.

In addition to gauging cloud adoption, our survey looked at the single biggest risk for use of cloud services. Unsurprisingly two fifths of respondents cited privacy and data protection as the number one concern, while a further fifth stated unauthorised data access/disclosure. Of interest, only 9% of respondents cited lack of clarity or reporting, with a further 7% citing the technical security of the cloud environment. In terms of reporting breaches/clarity/disclosure by the cloud provider, only 7% of respondents cited this as their main concern, perhaps illustrating a perceived level of trust in cloud providers.

Not at present - but we plan to use cloud services within the next 12 months

Yes – but currently only a departmental level

Yes – cloud services are widely used throughout our organisation

No – we also have no plans for use of cloud services in the short to medium term

14%

53.5%

7%

25.5% Data disclosure/unauthorised access to organisational information

The risk of cyber attack resulting in the unavailability of services

Vendor “lock-in”, or the inability to easily move to an alternate provider

Privacy and data protection concerns

39.5%

9.3%

4.7%

20.9%

Lack of clarity around governance and reporting

Clarity and reporting of incidents/breaches/disclosure by cloud providers

9.3%

7% Technical security concerns related to the cloud environment

9.3%

11. Which of the following do you consider as the SINGLE biggest risk for use of cloud services by YOUR organisation?Figure 13 - is your organisation actively using cloud based services? Figure 14 - Which of the following do you consider as the single

biggest risk for use of cloud services by your organisation?

Page 14: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

14

Incident investigation

Log management

Event correlation

Compliance and reporting

45%

2%

5% Demonstrate effectiveness of security programme

19% Not currently looking at advanced technologies

24%

5%

13. What is your primary motivation for adopting or utilising advanced security technologies within your enterprise?

Data protection

Information security training

Security related to technology advancements

Information security regulatory and legislative compliance

7%

10%

21% Identity and access management

10% Cyber-threat programme

12% Bring your own device

9% Data loss prevention solution

12%

19%

14. What is your organisation's top security initiative for 2013?

When asked about the motivation behind investment in advanced security technologies and information security in general, one rationale stood out from the others. 45% of respondents said that their primary motivation for the use of advanced security technologies is compliance and reporting.

However, when the respondents were asked about their organisation’s top security initiative for this year, only 7% chose information security, regulatory and legislative compliance, perhaps indicating a shift from traditional motivations. 21% of respondents said that security related to technological advancements was the top security initiative. The second highest initiative was data protection at 19%. This seems to paint the picture that organisations are becoming more concerned with addressing emerging issues caused by new technologies, rather than simply focusing on regulatory compliance and reporting.

Figure 15 - What is your primary motivation for adopting or utilising advanced security technologies within your enterprise?

Figure 16 - What is your organisation’s top security initiative for 2013?

3. Motivation for information security

Page 15: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

15

This conflicts with the rationale for investment in information security, with 42% of respondents saying that the main reason for investment in information security from senior stakeholders was meeting/satisfying regulatory requirements. There would appear to be a disconnect between traditional motivations for investment in information security and the planned information security initiatives over the short to medium term. Interestingly, none of the respondents indicated that having a competitive edge was a driver for investment in information security.

4.1 Occurrences 40% of respondents stated that their organisation had experienced at least one security breach, which they know of, in the past 12 months. Over a quarter (28%) are unsure of how many security breaches their organisation experienced in the past 12 months. Of the incidents which have been identified by these organisations, 34% have been identified by existing technologies (including reporting and alerts) in the organisation.

1-5

6-10

11-20

0

30%

10%

2% More than 20

7% Do not know

28% No method of identifying these attacks

2%

21%

16. How often did your organisation experience an information security breach in the past 12 months?

Figure 17 - Which of the following is considered the main driver for information security investment/sponsorship from senior stakeholders?

Figure 18 - How often did your organisation experience an information security breach in the past 12 months?

4. Incidents

0%

28% 42%

23%

7%

Meet regulatoryrequirements

Brand/reputationprotection

Competitive edge over competitors

Minimise damages and losses

Customer and partnerconfidence

15. Which of the following is considered the main driver for information security investment/sponsorship from senior stakeholders?

Page 16: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

16

Hacking

19%

Malware

12% Physical attack

5% Social engineering

9% Privilege misuse

0% We have not suffered any breaches

34%

DoS/DDoS

14%

Other

7%

17 . What was the main method/mechanism used by attackers?

We have not had any significant incidents

47%

€200,000-€249,999

5% €150,000-€199,999

7% €100,000-€149,999

5% €50,000-€99,999

2% €20,000-€49,999

10% €5000-€19,999

5% Under €5000

5%

Over €250,000

14%

18 . What was the direct financial impact on your business for the largest incident to occur?

When asked what steps were taken by the organisation following an instance of cybercrime, it is interesting to learn that 26% of respondents said that no follow up actions were taken in light of these incidents. 41% of organisations decided to revise policies/procedures in the wake of instances of cybercrime, while 14% said that incidents lead to their organisation investing in new technologies.

4.2 the causes of an information security breach The most common method of breaching security in respondents’ organisations was hacking, with 19% citing this as the main cause of security breaches in their organisation. Other common methods of attack included Denial of Service (DoS), Distributed Denial of Service (DDoS) and malware.

4.3 the cost31% of respondents said that the direct financial impact on the business as a result of their largest incident was more than €100,000. 14% reported losses above €250,000. The survey found that the average cost to organisations of the largest cybercrime incident stood at €135,000. This figure is significantly higher than the average figure from 2012, which stood at €41,875 per incident.

Figure 19 - What was the main method/mechanism used by attackers?

Figure 20 - What was the direct financial impact on your business for the largest incident to occur?

Page 17: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

17

In terms of remediation and clean-up costs associated with the largest incidents experienced by respondents’ organisations, the average cost to organisations stood at €29,954. 24% of respondents indicated that the remediation/clean-up costs for the largest incident their organisation experienced was €50,000 or more.

Following demand from our 2012 survey, we included a mechanism for organisations to benchmark the overall cost of cybercrime. Worringly, the cost of cybercrime to organisations is at 2.7% of annual turnover. Particularly alarming was that 15% of respondents stated that cybercrime costs more than 10% of their annual turnover. 56% of respondents were impacted by 1% or less of turnover, which still represents a sizeable loss for many organisations, and should form a driver for security and risk related activities moving forward.

No

Yes

We currently have cyber insurance

We do not feel that cyber insurance is necessary for our organisation

20. Has your organisation looked at cyber insurance as a mechanism to cover against cyber-attacks, business interruptions, data theft, data loss, etc.?

12%

14%

7%

67%

Figure 21 - How much does cybercrime cost your organisation each year?

Figure 22 - Has your organisation looked at cyber insurance as a mechanism to cover against cyber attacks, business interruptions, data theft, data loss, etc.?

2% 7%15%

56%20%

5%-9% of turnover10% or more of turnover

1% or less of turnover2%-3% of turnover

3%-4% of turnover

15. Xxxx

Page 18: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

18

4.4 A proactive approachIt’s more important than ever that organisations take a proactive approach to protecting themselves from cybercrime. In this year’s survey, 45% of respondents believe that their organisation proactively identified just over 40% of the serious incidents which they encountered, compared to 58% from last year. This is a significant decrease, as breaches that go undetected for extended periods of time can cause exponentially greater levels of damage. The risk remains that a large amount of incidents are not being identified prior to impacting on the business. 33% of respondents believed that less than 10% of incidents encountered by their organisation were proactively identified.

.

This mind-set of proactively identifying and handling security incidents and cybercrime is broadly reflected in the prioritisation of cybercrime risk in the organisation. 33% of respondents believe that the risk of cybercrime was prioritised in their organisation, while 39% said that no special steps had been taken to address the threat of cybercrime. 7% of organisations said that they did not view cybercrime as a major risk to their organisation. This reflects the overall awareness of the risk of cybercrime today, and shows that organisations need to become more active in educating themselves about cybercrime threats, how they can prevent and respond to these threats and adopt a proactive approach.

21. In your estimation, what percentage of serious security incidents are identified proactively within your organisation?

40%-49%

25%-39%

10%-24%

More than 50%

33%

12%

17%

5% Less than 10%

33%

Figure 23 - in your estimation, what percentage of serious security incidents are identified proactively within your organisation?

Figure 24 - does your organisation identify cybercrime as a major risk to the organisation?

Preventing cybercrime is a priority

Yes, but no special steps have been taken

Cybercrime is one of many threats

Somewhat

No

22. Does your organisation identify cybercrime as a major risk to the organisation?

28%11%

21%

7%

33%

Page 19: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

19

Most of the organisations surveyed believe that they are in a decent position to deal with cybercrime incidents as they occur. 51% stated that they are in a good or excellent position to deal with cybercrime incidents, while a further 35% say they have a fair level of readiness to deal with incidents. 14% admit that they are in a poor position to handle security incidents.

.

Just over one third (37%) have specialist systems and mechanisms in place to detect incidents of cybercrime, 30% of respondents stated that they only partially have appropriate mechanisms in place. 33% of respondents feel that their organisation does not have adequate measures and systems to detect incidents of cybercrime. With cybercrime incidents increasing internationally, these results illustrate the potential challenges facing Irish organisations in the coming years when dealing with cybercrime.

Figure 25 - What is your assessment as to the overall readiness of your organisation to deal with cybercrime incidents?

Figure 26 - Are appropriate measures and systems in operation to detect incidents of cybercrime?

Poor

Fair

Good

Excellent

23. What is your assessment as to the overall readiness of your organi-sation to deal with cybercrime incidents?

46%

5%14%

35%

Yes - we have specialist systems

Partially - no specialist systems

Current measures are not adequate

Definitely not

24. Are appropriate measures and systems in operation to detect incidents of cybercrime

19%

14%

37%

30%

Page 20: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

20

18% 14%37% 20% 9% 2%

External specialistsInternal resources Current third party providers

Law enforcement personnel

OtherLegal advice/assistance

Figure 125 - What resources has your organisation relied on to respond to incidents occurring in 2012?

Organisations appear to be relying on internal policies, procedures and resources as the primary mechanism to combat the threat of cybercrime, rather than outsourcing to specialists or acquiring new specialist resources.

The top priorities for improving cybercrime readiness in 2013 are introducing new technical controls or systems (20%), up-skilling existing information security personnel (16%) and introducing new procedures and security standards (15%). Linking with specialist resources and expert providers is on the agenda for only 6% of respondents.

For 2013, the top security initiative for organisations was to introduce new procedures and security standards internally, with one quarter of respondents citing this as their top initiative, along with improving current technical controls at 16%.

Taking into account last year’s findings, there appears to be a preference within organisations to improve existing internal awareness and policies along with developing new internal initiatives. While the ability to deal with threats using internal resources is a very positive attribute, it should also be noted that organisations will need to rely on external specialists and as well as investing in new technical systems to combat cybercrime. In an environment where organisations are always playing catch up against cyber criminals and the threats they pose, these specialist systems and experts are important tools in the continuing fight against cybercrime.

Figure 27 - What resources has your organisation relied on to respond to incidents occurring in 2012?

5. Overall assessment

Page 21: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

21

Cybercrime costs. It costs time, money, resources and, most importantly, it costs reputation. Survey findings show that there are varying degrees of readiness and preparation within Irish organisations in terms of defending against cyber attacks.

In order to reduce the risk of cyber attacks, a planned, proactive and sustained approach is of critical importance.

Four key priorities are critical:

PreparePreparing for a cyber attack is a business issue, successful attacks directly impact earnings and assets. Although the technical defences must be built by ‘the IT guys’, a breach of those defences can have far reaching business consequences. Identifying the business risks and deciding how and when cyber issues should be escalated are the starting points in developing an effective, coordinated business response.

• Ensure the right governance structure is in place to enhance and maintain preventative and detective security capabilities.

• Implement training and awareness controls and investigate potential alliances based on technology.

• Ensure consistency in practices of information sharing and incident handling across all departments by effective communication and co-ordination.

AwareWhen threats were relatively slow in developing, organisations could build an effective defense based upon classic detect-and-respond security principles. The speed with which new attacks are now developed, and the complexity of the internet environment, mean that this approach is no longer adequate. Organisations now need to both use dynamic, real-time cyber threat intelligence and to monitor their own vulnerabilities regularly if they are to maintain an effective defence.

• Train and educate users on the use of suitable technical controls so that they are aware of known exploits and attacks.

• Leverage the wealth of threat intelligence that is available to ensure greater awareness of the internal and external threats to your organisation.

• Regularly engage and consult with cyber security leaders to ensure up-to-date cyber threat intelligence.

Protecting your organisation

Prepare

Defence • Communication • Co-ordination • Capability

Aware

External intelligence • Internal intelligence • Consolidation

Respond

Strategic • Communication • Risk assessment • Technical

Defend

Employee • Targeting • Assets and risks • Detection

Page 22: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

22

Respond When a breach occurs the response must be fast, thorough and decisive. Immediate action is required on several fronts. The nature of the breach must be established and the losses and damage understood. Further attacks must be prevented by urgent action, while a longer-term solution is found. Media and external stakeholders must be dealt with. Legal action may be required.

A bad breach response can cause great damage to reputation and shareholder value. It may also heighten the risk of further attacks.• Outline a clear set of guidelines defining the strategy which should be taken

upon combating a breach in security.• Ensure you have the ability to rapidly respond to an incident in order to limit

any adverse impact on your organisation.• Analyse the anatomy of the cyber attack to determine the root cause and

recommend remedial activities and other associated responses.

defendIn order to adequately defend your organisation against successful cyber attacks, continual investment and enhancement of current processes and security components are required. Security is a “point in time” assessment, which needs to be managed and continually developed in order to stay current and up to date with emerging threats and attacks.

• Continue to invest in enhancing and maintaining controls that protect your digital assets against cybercrime.

• Consistently improve the information sharing processes, and where possible automate the controls and practices to deal with the changing cyber security threat landscape.

• Constantly set targets and test systems to ensure ongoing defense.• Learn from prior incidents or events, and ensure that “lessons learned”

continue to drive new practices to further enhance the security capabilities of your organisation.

Learn more

At Deloitte, we are committed to supporting CIOs and Information Security Managers against the omnipresent threat of cybercrime attacks. We provide timely and valuable thought leadership to assist them in their role of preventing attacks.

See below for some of our most recent publications:

Identifying the business risks and deciding how and when cyber issues should be escalated are the starting points in developing an effective, coordinated business response.

2012 Deloitte – NASCIO Cybersecurity Study

2013 TMT Global Security Study

IT risks and security challenges – Deloitte article series from Wall Street Journal

2012 Deloitte Ireland CIO Survey

Page 23: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

“ Information security is still a long way from integrating with the strategy and objectives of an organisation as evidenced by the increase in the average cost of a large cybercrime incident at €135,000 per incident.

Colm McDonnell, Partner, Enterprise Risk Services, Deloitte

Page 24: Irish Information Security and Cybercrime Survey 2013 · 2019-10-27 · Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey.

For more information on the deloitte irish information Security and Cybercrime Survey, in association with eMC, please contact:

ContactsFor more details please contact:

DublinDeloitte & ToucheDeloitte & Touche HouseEarlsfort Terrace Dublin 2 T: +353 1 417 2200 F: +353 1 417 2300

CorkDeloitte & ToucheNo.6 Lapp’s QuayCorkT: +353 21 490 7000 F: +353 21 490 7001

LimerickDeloitte & ToucheDeloitte & Touche HouseCharlotte Quay Limerick T: +353 61 435500 F: +353 61 418310

www.deloitte.com/ie

Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see www.deloitte.com/ie/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. Deloitte provides audit, tax, consulting, and financial advisory services to public and private clients spanning multiple industries. With a globally connected network of member firms in more than 150 countries, Deloitte brings world-class capabilities and high-quality service to clients, delivering the insights they need to address their most complex business challenges. Deloitte has in the region of 200,000 professionals, all committed to becoming the standard of excellence. This publication contains general information only, and none of Deloitte Touche Tohmatsu Limited, Deloitte Global Services Limited, Deloitte Global Services Holdings Limited, the Deloitte Touche Tohmatsu Verein, any of their member firms, or any of the foregoing’s affiliates (collectively the “Deloitte Network”) are, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This publication is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your finances or your business. Before making any decision or taking any action that may affect your finances or your business, you should consult a qualified professional adviser. No entity in the Deloitte Network shall be responsible for any loss whatsoever sustained by any person who relies on this publication. © 2013 Deloitte & Touche. All rights reserved

Ireland

Best Workplaces 2012

in association with

About eMC

EMC Corporation, the IT multinational that employs over 3,000 people in Ireland, is a global leader in enabling businesses and service providers to transform their operations and deliver IT as a service. Fundamental to this transformation is cloud computing. Through innovative products and services, EMC accelerates the journey to cloud computing, helping IT departments to store, manage, protect and analyse their most valuable asset - information - in a more agile, trusted and cost-efficient way. Additional information about EMC can be found at www.EMC.com

Jason WardDirector for Ireland, Scotland and UK North, EMCT: 1800 932362 E: [email protected]

Colm McDonnellPartner, Enterprise Risk Services,Deloitte T: +353 1 417 2348 E: [email protected]

Jared CarstensenManagerEnterprise Risk Services,Deloitte T: +353 1 417 5700 E: [email protected]


Recommended