Trial by fire* Protected. But under pressure to perform

Similar documents
Trial by fire* Protected. But under pressure to perform

Trial by fire* Advisory Services Security

Changing the game. Key findings from The Global State of Information Security Survey 2013

Changing the game. Key findings from The Global State of Information Security Survey 2013

T A B L E of C O N T E N T S

Innovation and the Future of Tax

DIGITAL OUTLOOK INSURANCE INDUSTRY

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

UK 2015 Cyber Risk Survey Report

Benchmarking Privacy Management and Investments of the Fortune Report on Findings from 2014 Research

7 STEPS TO BUILD A GRC FRAMEWORK FOR BUSINESS RISK MANAGEMENT BUSINESS-DRIVEN SECURITY SOLUTIONS

A New Era In Information Security and Cyber Liability Risk Management. A Survey on Enterprise-wide Cyber Risk Management Practices.

Enterprise Risk Management Perspectives

2007 global economic crime survey

Why CISOs Should Embrace Their Cyber Insurer

Data Protection: The Best Policy for Insurers

2010 State of the CIO SURVEY. Exclusive Research from CIO magazine

Blockchain and Trucking: The Promise and Potential

56 % Annual CFO Survey Report 2015

TRACKING TAX IN YOUR INDUSTRY 4.0 TRANSFORMATION

Cyber Risk Mitigation

ENTERPRISE RISK AND STRATEGIC DECISION MAKING: COMPLEX INTER-RELATIONSHIPS

2016 Risk Practices Survey

CyberMatics SM FAQs. General Questions

2015 EMEA Cyber Impact Report

Strong Board. Strong Bank Risk Survey MAR 2018 RESEARCH. Sponsored by:

Second Quarter Fiscal 2018 Investor Presentation

Middle market companies drive U.S. economic growth kpmg.com/us/midmarketindustry

2018 THE STATE OF RISK OVERSIGHT

GLOBAL ENTERPRISE SURVEY REPORT 2009 PROVIDING A UNIQUE PICTURE OF THE OPPORTUNITIES AND CHALLENGES FACING BUSINESSES ACROSS THE GLOBE

Despite global headwinds, U.S. companies see opportunities abroad

Natural catastrophes: business risks and preparedness A research programme sponsored by Zurich Insurance Group Executive summary March 1st 2013

At the Heart of Cyber Risk Mitigation

First Quarter 2016, Champion Europe and Knights Apparel FAQs

HIPAA SECURITY RISK ANALYSIS

Leasing and SOX Compliance: The Big Picture

2017 MARKET REVIEW AND FORECAST

Global Business and Spending Monitor 2011

Company Overview. February 12, 2018

Fraud Investigation & Dispute Services Corporate misconduct individual consequences

CORPORATE INVESTMENT. for Treasury & Accounting Professionals RESULTS AND ANALYSIS. conducted by

Beazley Financial Institutions

The 2013 Benchmark Survey on VAT/GST

SURVEY OF GOVERNMENT CONTRACTOR SALES EXPECTATIONS

Small business, big risk: Lack of cyber insurance is a serious threat

The Guide to Budgeting for Insider Threat Management

Business Continuity Program Management Benchmarking Report

Risk Management: Assessing and Controlling Risk

The 14 th Annual Transamerica Retirement Survey: The Employer s Perspective

Let s talk: governance

IFRS: The European investors view*

Beyond the General Data Protection Regulation (GDPR)

From Cost to Value: Reframe How You Measure Travel. The Link Between Business Strategy and Travel Cost- Savings. How to Manage Hidden Travel Costs

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

2013 AT&T Business Continuity Study Results U.S. Trend Data

Your Guide to Business Asset Protection

Procurement reporting alignment kpmg.com

Executive summary Managing indirect tax controversy. Dealing with audits and disputes

Protecting Knowledge Assets Case & Method for New CISO Portfolio

Client Risk Solutions Going beyond insurance. Overview

The Risk Assessment Executives Are Begging For. Presentation Overview. Terminology

in collaboration with CIO Gallery September 12, 2012

G20 public trust in tax. A pulse check on public trust and people s views on taxation throughout G20 countries

CPA Canada Q Business Monitor

COMPANY OVERVIEW. February 7, 2019

2015 Global Audit Committee Survey. KPMG s Audit Committee Institute. kpmg.com/globalaci

NEW CYBER RULES FOR NEW YORK-BASED BANKING, INSURANCE AND FINANCIAL SERVICE FIRMS HAVE FAR-REACHING EFFECTS

34 th Annual J.P. Morgan Healthcare Conference. Steve Collis, President & CEO Tim Guttman, EVP & CFO

ENTERPRISE RISK MANAGEMENT POLICY FRAMEWORK

Understanding the Cyber Risk Insurance and Remediation Services Marketplace:

Global tax management Japan research report. Global Tax Management. Japan Research Report. Tax Management Consulting Deloitte Tohmatsu Tax Co.

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Prepare for success. 5Insights for executives. Operational transfer pricing: Failure to implement can hinder performance

2018 WELLNESS INDUSTRY TRENDS

Ball State University

The Risk-based Approach to Data Breach Response Meeting mounting expectations for effective, relevant solutions

2016 CIO Agenda: A Nordic Region Perspective

his document contains forward-looking statements concerning Advanced Micro Devices, Inc. (AMD) including AMD's future path, strategy and focus; AMD s

MULTI-ECHELON SUPPLY CHAIN VISIBILITY. CERTIFICATION OF PEOPLE AND MACHINES. SOFTWARE LIFECYCLE MANAGEMENT.

Transaction Advisory Services. Managing capital and transactions for your private business

4.1 Risk Assessment and Treatment Assessing Security Risks

BlackRock Investment Stewardship

Uncovering Supply Chain s Hidden Taxes

Tax Digitalization: Latin America leads the change

Cyber COPE. Transforming Cyber Underwriting by Russ Cohen

Sponsored by. Is Your Data Safe? The 2016 Financial Adviser Cybersecurity Assessment

No More Snake Oil: Why InfoSec Needs Security Guarantees

Telematics Usage- Based Insurance

2018 Small Business Risk Report

The 2018 UK Reputation Dividend Report

Information security management systems

Cyber Risks & Insurance

Global Tax Strategy November 2017

Defining your digital strategy in a disruptive world

Picking Stocks in the Tech Sector

Telematics Usage- Based Insurance

DIMENSIONS. A CPA s Report to the Construction Industry. RECOGNIZE...PRIORITIZE...MITIGATE Managing Risks During Recovery

Managing operational tax risk through technology

CFO OUTLOOK 2018 MIDDLE MARKET

Why your board should take a fresh look at risk oversight: a practical guide for getting started

Transcription:

Key findings from the 2010 Global State of Information Security Survey Automotive Trial by fire* Protected. But under pressure to perform What global executives expect of information security In the middle of the world s worst economic downturn in thirty years October 2009 *connectedthinking

This year, everything is different.

As in almost every industry, automotive executives are cutting costs. Laying off personnel. And reassessing spending priorities. Across the enterprise. Across all functions. Including, of course, information security and privacy protection. Or so we thought it safe to assume. That is, before the results of the 2010 Global Information Security Survey emerged. PricewaterhouseCoopers 3

What the survey reveals is surprising. Security budgets appear to be less vulnerable to cost-cutting as if executives were protecting them. Yet responses also reveal that security is under enormous pressure to perform. This year, moving from 2009 to 2010, may turn out to be a high-stakes coming of age. A litmus test for a multi-year investment. In the function itself. And in a new generation of security leaders. A trial by fire. PricewaterhouseCoopers 4

Agenda 1. Methodology 2. Spending: A decline in growth rate but a manifestly reluctant one 3. Mounting pressure: Impacts of the economic downturn 4. Breaches: More footsteps and fingerprints as visibility increases 5. Current state of the arsenal: New gains will be key this year 6. A crucial year: Security at an important threshold 7. What this means for your business PricewaterhouseCoopers 5

Section 1 Methodology A worldwide study The Global State of Information Security 2010, a worldwide study by PricewaterhouseCoopers, CIO Magazine and CSO Magazine, was conducted online from April 22 through June 15, 2009. PwC s 11 th year conducting the online survey, 7 th with CIO and CSO Magazines Readers of CIO and CSO Magazines and clients of PwC from 130 countries More than 7,200 responses from CEOs, CFOs, CIOs, CSOs, VPs and directors of IT and security Over 40 questions on topics related to privacy and information security safeguards Thirty-two percent (32%) from companies with revenue of $500 million+ Respondents from the automotive industry total 185 PricewaterhouseCoopers 6

Section 1 Methodology Demographics Automotive respondents by company revenue Don't know 15% Non-profit/ Gov/Edu 1% Small (< $100M US) 24% Automotive respondents by region of employment Middle East & South Africa 2% North America 23% South America 12% Large (> $1B US) 38% Medium ($100M - $1B US) 22% Asia 35% Europe 28% Automotive respondents by title Compliance /Risk / Privacy 6% IT & Security (Other) 18% CISO/CSO/ CIO/CTO 21% IT & Security (Mgmt) 46% CEO, CFO, COO 9% (Numbers reported may not reconcile exactly with raw data due to rounding) PricewaterhouseCoopers 7

Agenda 1. Methodology 2. Spending: A decline in growth rate but a manifestly reluctant one 3. Mounting pressure: Impacts of the economic downturn 4. Breaches: More footsteps and fingerprints as visibility increases 5. Current state of the arsenal: New gains will be key this year 6. A crucial year: Security at an important threshold 7. What this means for your business PricewaterhouseCoopers 8

Section 2 Spending: A decline in growth rate but a manifestly reluctant one This year, there s a new driver of information security spending in the automotive industry and it s bigger than almost every other 50% 45% 40% 46% 42% 39% 38% 35% 30% 30% 25% 20% 15% 10% 5% 0% Business continuity / Disaster recovery Economic downturn Regulatory compliance Internal policy compliance Change Question 32: What business issues or factors are driving your information security spending? (Total does not add up to 100%) PricewaterhouseCoopers 9

Section 2 Spending: A decline in growth rate but a manifestly reluctant one Not surprisingly, spending on security is under pressure Fewer automotive respondents expect spending to increase this year. Compared to last year, security spending overthe next 12 months will Increase 36% 54% But what we find most interesting is that 6 out of 10 (61%) expect spending to either increase or stay the same in spite of dramatic changes in the global auto industry and the worst economic downturn in decades. Stay the same Decrease Don't know 6% 25% 21% 17% 22% 20% -10% 10% 30% 50% 70% 2008 2009 PricewaterhouseCoopers 10

Section 2 Spending: A decline in growth rate but a manifestly reluctant one Is cancelling, deferring or downsizing security-related initiatives important? Absolutely according to more than 8 out of 10 automotive respondents... 90% 80% 83% 82% 70% 60% 50% 40% 30% Yes for initiatives requiring Operating expenditures Yes for initiatives requiring Capital expenditures 20% 10% 0% Question 11: To continue meeting your security objectives in the context of these harsher economic realities, how important are the following strategies? (Respondents who answered Somewhat Important, Important, Very Important or Top Priority ) PricewaterhouseCoopers 11

Section 2 Spending: A decline in growth rate but a manifestly reluctant one but far fewer automotive executives are acting on this and actually deferring or reducing budgets for security initiatives. Has your company deferred security initiatives? Yes For capital expenditures 49% For operating expenditures 36% Has your company reduced budgets for security initiatives? For capital expenditures For operating expenditures Yes 51% 49% PricewaterhouseCoopers 12

Section 2 Spending: A decline in growth rate but a manifestly reluctant one Among the half or fewer that are taking action, the vast majority are deferring initiatives by less than 12 months or reducing spending by under 20%. Has your company deferred security initiatives? Yes By less than 6 months By 6 to 12 months By 1 year or more For capital expenditures 49% 20% 19% 10% For operating expenditures 36% 14% 18% 4% Has your company reduced budgets for security initiatives? Yes By under 10% By 10% to 19% By 20% or more For capital expenditures 51% 14% 27% 10% For operating expenditures 49% 15% 20% 14% In short, it appears that some automotive executives are reluctant to cut too deeply into security and may, to some extent, be protecting this investment. PricewaterhouseCoopers 13

Agenda 1. Methodology 2. Spending: A decline in growth rate but a manifestly reluctant one 3. Mounting pressure: Impacts of the economic downturn 4. Breaches: More footsteps and fingerprints as visibility increases 5. Current state of the arsenal: New gains will be key this year 6. A crucial year: Security at an important threshold 7. What this means for your business PricewaterhouseCoopers 14

Section 3 Mounting pressure: Impacts of the downturn Although given a reprieve, of sorts, from the budget knife, the information security function is under pressure to perform 70% 60% 50% 40% 59% 55% 50% 50% 49% 41% 30% 20% 10% 0% Regulatory environment has become more complex and burdensome Cost reduction efforts make adequate security more difficult to achieve Because suppliers have been weakened by the downturn, we face additional security risks Risks to the company's data have increased due to employee layoffs Because our business partners have been weakened by the downturn, we face additional security risks Threats to the security of our information assets have increased Question 10: What impacts has the current economic downturn had on your company s security function? (Respondents who answered Agree or Strongly Agree ) PricewaterhouseCoopers 15

Section 3 Mounting pressure: Impacts of the downturn Many auto respondents agree: These impacts are elevating the role and importance of the information security function 70% 60% 50% 40% 59% 59% 55% 50% 50% 49% 41% 30% 20% 10% 0% Regulatory environment has become more complex and burdensome Cost reduction efforts make adequate security more difficult to achieve The increased risk environment has elevated the role and importance of the information security function Because suppliers have been weakened by the downturn, we face additional security risks Risks to the company's data have increased due to employee layoffs Because our business partners have been weakened by the downturn, we face additional security risks Threats to the security of our information assets have increased Question 10: What impacts has the current economic downturn had on your company s security function? (Respondents who answered Agree or Strongly Agree ) PricewaterhouseCoopers 16

Agenda 1. Methodology 2. Spending: A decline in growth rate but a manifestly reluctant one 3. Mounting pressure: Impacts of the economic downturn 4. Breaches: More footsteps and fingerprints as visibility increases 5. Current state of the arsenal: New gains will be key this year 6. A crucial year: Security at an important threshold 7. What this means for your business PricewaterhouseCoopers 17

Section 4 Breaches: More footsteps and fingerprints as visibility increases So, given automotive concerns about the higher risks this year, has the number of incidents increased? Yes. But this is partly and maybe fully due to greater visibility into incidents and their causes and impacts (i.e., a multi-year decline in the number of automotive respondents who don t know the answers to key incident-related questions). Clearly, all the evidence isn t yet on the table. If the downturn-driven, securityrelated risks that automotive respondents are concerned about were fully reflected here, these numbers and the ones on the next three slides would be considerably higher. Number of security incidents 2007 2008 2009 No incidents occurred 16% 26% 17% From 1 to 9 incidents 39% 31% 36% From 10 to 50 incidents 4% 6% 14% More than 50 incidents 2% 3% 9% Don t know 39% 33% 24% PricewaterhouseCoopers 18

Section 4 Breaches: More footsteps and fingerprints as visibility increases The new visibility into incidents also extends to types of security incidents and reveals critical information Better insights into what types of events are occurring yields two discoveries: The impacts to data are actually 90% higher than reported last year. And the exploitation of data is now the leading type of incident. #1 Types of security incidents 2007 2008 2009 Data exploited 19% 13% 25% System exploited 15% 15% 23% Network exploited 26% 20% 23% Device exploited NA 16% 22% Human exploited (Social engineering) 20% 13% 16% Application exploited 14% 16% 12% Unknown 34% 47% 36% (Does not add up to 100%) PricewaterhouseCoopers 19

Section 4 Breaches: More footsteps and fingerprints as visibility increases Likely sources of incidents Note that this year, current employees are less likely to be perceived as the source of incidents. But former employees are twice as likely. We expect that as the year continues to unfold, more incidents will be traced to former employees, in line with the higher risks to security associated with layoffs and terminations. Likely source of incidents 2008 2009 Current employee 43% 38% Former employee 13% 27% Hacker 18% 29% (Does not add up to 100%) PricewaterhouseCoopers 20

Section 4 Breaches: More footsteps and fingerprints as visibility increases Business impacts While the full damage report for 2009 is not yet clear, the first signs aren t promising. The reported levels for many key business impacts have increased for example, for financial losses, compromises to brand or reputation and, naturally, loss of shareholder value. But there are two exceptions the two business impacts that are the hardest to identify in a timely manner: intellectual property theft and fraud. Business impacts 2008 2009 Financial losses 32% 41% Brand/reputation compromised 8% 36% Loss of shareholder value 8% 11% Intellectual property theft 40% 33% Fraud 32% 9% (Does not add up to 100%) PricewaterhouseCoopers 21

Agenda 1. Methodology 2. Spending: A decline in growth rate but a manifestly reluctant one 3. Mounting pressure: Impacts of the economic downturn 4. Breaches: More footsteps and fingerprints as visibility increases 5. Current state of the arsenal: New gains will be key this year 6. A crucial year: Security at an important threshold 7. What this means for your business PricewaterhouseCoopers 22

Section 5 Current state of the arsenal: New gains will be key this year Survey results reveal that automotive companies have made strong advances in four critical arenas over the last 12 months 1. Privacy protection 2. People and training Employ a Chief Privacy Officer 19% 34% Employ a CISO 33% 43% Require employees to complete privacy-related training 30% 53% Employ a CSO 29% 42% Conduct privacy assessment internally (i.e., thru internal audit) 37% 55% Have people dedicated to employee security awareness programs 45% 55% Have accurate inventory of locations where data is stored 31% 45% Have people dedicated to monitoring employee use of Internet 46% 56% 0% 20% 40% 60% 2008 2009 0% 20% 40% 60% 2008 2009 PricewaterhouseCoopers 23

Section 5 Current state of the arsenal: New gains will be key this year Each of these areas privacy, people and training, IdM and critical processes are just-in-time gains this year 3. Identity management 4. Critical processes Identity management strategy 39% 50% Link security to privacy or other areas of compliance 39% 56% Identity management solutions Automated account provisioning 28% 30% 39% 41% Integrate physical and infosec personnel 27% 48% Biometrics 17% 32% Established standards for infrastructure deployment 49% 61% 0% 20% 40% 60% 2008 2009 0% 20% 40% 60% 2008 2009 PricewaterhouseCoopers 24

Section 5 Current state of the arsenal: New gains will be key this year Advances in other areas are less dramatic Does this suggest automotive companies are not well positioned to address the unexpected surge in downturn-driven security-related challenges in 2009 on top of the enormous changes occurring in the industry? Not necessarily. Progress always unfolds in fits and starts and a fair view of the readiness of auto companies to address these security-related risks requires acknowledging the gains made over the last several years. A sampling of capabilities 2006 2007 2008 2009 Overall information security strategy 33% 51% 65% 67% Intrusion detection tools 36% 49% 57% 59% Secure disposal of technology hardware 32% 56% 59% 59% PC access control software NA 39% 56% 56% Intrusion prevention tools 29% 47% 59% 60% PricewaterhouseCoopers 25

Agenda 1. Methodology 2. Spending: A decline in growth rate but a manifestly reluctant one 3. Mounting pressure: Impacts of the economic downturn 4. Breaches: More footsteps and fingerprints as visibility increases 5. Current state of the arsenal: New gains will be key this year 6. A crucial year: Security at an important threshold 7. What this means for your business PricewaterhouseCoopers 26

Section 6 A crucial year: Security at an important threshold This is a key moment In short, this year, the automotive information security function and its leaders are encountering a powerful combination of factors: 2009 1. The greatest economic turmoil in decades at a time of enormous industry upheaval 2. High levels of executive concerns about risks and the impact of the downturn on the company and the supply chain 3. Breach-related evidence that doesn t necessarily reveal the full picture of these impacts and downturn-related consequences. 4. A multi-year investment for better or worse in the building blocks of an effective privacy and information security program that, whether or not it has reached critical mass, has yet to show a compelling ROI. Enormous pressure (and opportunity) to deliver concrete, measurable business value now, not just later. PricewaterhouseCoopers 27 Slide 27

Agenda 1. Methodology 2. Spending: A decline in growth rate but a manifestly reluctant one 3. Mounting pressure: Impacts of the economic downturn 4. Breaches: More footsteps and fingerprints as visibility increases 5. Current state of the arsenal: New gains will be key this year 6. A crucial year: Security at an important threshold 7. What this means for your business PricewaterhouseCoopers 28

Section 7 What this means for your business So how are automotive executives trying to tighten the alignment of security s contribution with the business? They re looking hardest at and placing their highest expectations on initiatives that (1) address the big risks first, (2) safeguard the underlying data, (3) pull this portfolio of multi-year investments together (strategy), (4) reduce cost, and (5) increase efficiency. 100% 95% 90% 85% 80% 75% 70% 65% 60% 55% 50% 93% 92% Prioritizing security investments based on risk Strenthening the focus on data protection 87% 87% 87% 86% 85% Strengthening the company's GRC program Reducing, mitigating or transferring major risks Refocusing on core of existing strategy Extracting indirect security benefits from cost reduction efforts Accelerating the adoption of securityrelated automation technologies to increase efficiencies and reduce cost Question 11: To continue meeting your security objectives in the context of these harsher economic realities, how important are the following strategies? (Respondents who answered Somewhat Important, Important, Very Important or Top Priority ) (Total does not add up to 100%) PricewaterhouseCoopers 29

Section 7 What this means for your business After years in the limelight, data protection is now in the spotlight at arguably the most critical time While data protection capabilities are uneven not just across the industry, but within many companies as well advances in the past year are worth noting. Data Loss Prevention (DLP): Industry respondents who say their organization has a DLP capability leapt this year from 25% to 39%. In addition, 79% consider pursuing more complete configuration of DLP tools to be important which suggests the adoption rate will spike again this year. Classification: The industry also continues to make steady advances in prioritizing data and information assets according to their risk level from 17% in 2008 to 31% today. Protection, disclosure and destruction: To protect data, however, you also have to have a clear rule book. This year s responses reveal that only 1 out of every 2 automotive respondents say that their organization s security policies address the protection, disclosure and destruction of data. PricewaterhouseCoopers 30

Section 7 What this means for your business The crucial importance of a having a clear strategy In order to prioritize security investments, especially in today s economy, IT and security leaders must follow a principles-based approach to managing risk and reward in order to secure investments. It is not enough to justify security investments merely as a defensive response to uncertainty in the business environment or the threat of regulation. Instead, decision-makers must align security with drivers that are reshaping the auto business drivers such as rapid innovation and the embrace of new business models. Linking risk and reward requires a clear strategy. If your security leaders understand the greatest sources of value creation across the organization, assign clear accountability for risk management and performance management, and are able to quantify the rewards associated with the risks, your information security function will play a critical role in determining how your company will weather the challenges ahead. PricewaterhouseCoopers 31

2009 PricewaterhouseCoopers LLP. All rights reserved. PricewaterhouseCoopers refers to PricewaterhouseCoopers LLP, a Delaware limited liability partnership, or, as the context requires, the PricewaterhouseCoopers global network or other member firms of the network, each of which is a separate and independent legal entity. *connectedthinking is trademark of PricewaterhouseCoopers LLP (US).