By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data Analytics instagram stories
    Data Analytics Helps Marketers Make the Most of Instagram Stories
    15 Min Read
    analyst,women,looking,at,kpi,data,on,computer,screen
    What to Know Before Recruiting an Analyst to Handle Company Data
    6 Min Read
    AI analytics
    AI-Based Analytics Are Changing the Future of Credit Cards
    6 Min Read
    data overload showing data analytics
    How Does Next-Gen SIEM Prevent Data Overload For Security Analysts?
    8 Min Read
    hire a marketing agency with a background in data analytics
    5 Reasons to Hire a Marketing Agency that Knows Data Analytics
    7 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-23 SmartData Collective. All Rights Reserved.
Reading: Survey Says: Security Risks Never Higher, or More Costly
Share
Notification Show More
Aa
SmartData CollectiveSmartData Collective
Aa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Data Management > Risk Management > Survey Says: Security Risks Never Higher, or More Costly
Risk ManagementSecurity

Survey Says: Security Risks Never Higher, or More Costly

AlexOlesker
Last updated: 2011/10/27 at 12:30 PM
AlexOlesker
4 Min Read
SHARE

In an interview at the HP Protect 2011 conference on Monday, September 12, 2011. Bob Gourley and Tom Reilly, Vice President and General Manger of Enterprise Security at HP, discussed two studies on cyber crime from the Ponemon Institute and Coleman Parks. The median cost to an organization due to cyber attack was $5.9 million a year, 56% more than last year, and  the time it takes to resolve the attack was 18 days with an average price tag of $416,000, a 70% increase. Studies reveal that sentiment towards security has been changing. Only 29% of executives said that they had confidence in their organization’s cybersecurity. What do these startling statistics mean for CTOs, CIOs, and CISOs?

More Read

Myths and Realities of Cloud Security

While the numbers are interesting, Tom Reilly believes that its the year to year trends that really stand out.  A 56% jump in the cost of cyber attacks and a 70% increase in the price of remediation indicate that cyber attacks are more common and more sophisticated. This rise also correlates with the introduction of more cloud and mobile computing in the workplace, which causes an increase in possible attack vectors and vulnerabilities, at least until security catches up to these new developments.

Bob Gourley saw reports on the growing cost of cyber crime as an opportunity to improve. In IT, security professionals are always fighting to justify their budget. Since cyber crime prevention is cheaper than remediation, data like this helps make the case for investing in security to save money. Tom added that, with all of the high-profile cyber attacks in the news this year, not only is security seen as an important corporate issue, but robust security measures can be justified by the impact on brand image of a serious breach.

Bob was less optimistic about the figures on confidence, stating that the 29% who believed in their cyber defenses just don’t know that they’ve already been breached. Those that have experienced large cyber attacks are less confident and understand that they must always be vigilant and constantly improve their security. Tom’s take away was that nobody really knows how secure they are because most corporations can’t measure the effectiveness of their security programs. No company is 100% secure so you have no choice but to assume that you’re already breached.

Since perfect security is impossible especially if an organization wants to take advantage of the cloud and mobility, HP adopted a risk-management approach. They suggest that CTOs, CIOs, and CISOs identify their most valuable data and protect it as best as possible, knowing that other information may be vulnerable. They must also identify their greatest vulnerabilities. Once an organization assumes it has been breached, it needs to gather the security intelligence to understand where and how, then respond correctly to isolate and quarantine the environment for effective remediation.

TAGGED: Bob Gourley
AlexOlesker October 27, 2011
Share This Article
Facebook Twitter Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

smart home data
7 Mind-Blowing Ways Smart Homes Use Data to Save Your Money
Big Data
ai low code frameworks
AI Can Help Accelerate Development with Low-Code Frameworks
Artificial Intelligence
data Analytics instagram stories
Data Analytics Helps Marketers Make the Most of Instagram Stories
Analytics
data breaches
How Hospital Security Breaches Devastate Local Communities
Policy and Governance

Stay Connected

1.2k Followers Like
33.7k Followers Follow
222 Followers Pin

You Might also Like

Myths and Realities of Cloud Security

3 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots
ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?