Read Report

 2015
Global Megatrends in Cybersecurity
Sponsored by Raytheon
Independently conducted by Ponemon Institute LLC
Publication Date: February 2015
Ponemon Institute© Research Report
2015 Global Megatrends in Cybersecurity
Ponemon Institute, February 2015
Part 1. Introduction
We are pleased to present the findings of the 2015 Global Megatrends in Cybersecurity
sponsored by Raytheon. The purpose of this research is to understand the big trends or changes
that will impact the security posture of organizations in both the public and private sector in the
next three years. Moreover, the study looks at the next generation of protocols and practices as
the cybersecurity field evolves and matures.
We surveyed 1,006 senior-level information technology and information technology security
leaders (hereafter referred to as respondent) in the US, UK/Europe and Middle East/North Africa
(MENA) who are familiar with their organizations’ cybersecurity strategies.
The research covered a range of trends related to an organization’s ability to protect itself from
cyber threats and attacks. Some of the areas addressed in this report are: the critical disconnect
between CISOs and senior leadership, insider negligence, the Internet of Things, adoption of new
technologies such as big data analytics, predictions of increases in nation state attacks and
advanced persistent threats and the dearth of cyber talent.
Overall direction of cybersecurity posture
As noted in Figure 1, a majority of
respondents believe their
organizations’ cybersecurity posture
will improve. Respondents in MENA
are most positive about improvements
in cyber security and the UK/Europe is
least positive.
According to the findings, the following
reasons are why the cyber security
posture of organizations are projected
to improve over the next three years:
§
§
§
§
§
Cyber intelligence will become
more timely and actionable
More funding will be made
available to invest in people and
technologies
Technologies will become more effective in detecting and responding to cyber threats
More staffing will be available to deal with the increasing frequency of attacks
Employee-related risks will decline
Following are reasons why the cyber security posture of organizations might decline:
§
§
§
§
§
Inability to hire and retain expert staff
Lack of actionable and timely intelligence
Employee-related risks might not be reduced
A lack of funding will prevent appropriate investments in people and technologies
Technologies that address the specific cyber threats to the organization will not be available
Ponemon Institute©: Research Report
Page 1 Part 2. Seven Megatrends in Cybersecurity
Based on the findings of the research, there are seven mega trends that will significantly impact
the cybersecurity posture of organizations in the following areas: disruptive technologies, cyber
crime, cost of compliance, the human factor, organizational and governance factors and enabling
security technologies. Following is a summary of these seven mega trends and implications for
companies.
1. Cybersecurity will become a competitive advantage and a C-level priority. As part of this
study, we asked a panel of cybersecurity experts to predict changes to several normatively
1
important characteristics concerning the role, mission and strategy of security. A total of 110
individuals with bona fide credentials in information security provided their three-year predictions.
In each of the following figures, today’s average results were derived from the survey sample
(n=1,006). An expert panel provided future predictions (n=110).
Figure 2 shows only 25 percent of respondents believe their organization’s C-level views security
as a competitive advantage. However, 59 percent of respondents in the expert panel say C-level
executives will view security as a competitive advantage three years from now.
Figure 2. Do your organization’s senior leadership view cybersecurity as a necessary cost
or a competitive advantage?
80%
75%
70%
59%
60%
50%
41%
40%
25%
30%
20%
10%
0%
Today
Necessary cost
Future (3 years from now)
Competitive advantage
1
The expert panel consisted of individuals with, on average, more than 20 years of experience in IT or
information security leadership. Many of these individuals are Distinguished Fellows of Ponemon Institute.
Ponemon Institute©: Research Report
Page 2 Figure 3 shows only 34 percent of respondents believe their organization’s senior leadership
views security as a strategic priority. Fifty-four percent of the expert panel forecast that C-level
executives will view security as a strategic priority three years from now.
Figure 3. Does senior leadership view cybersecurity as a strategic priority?
66%
70%
60%
54%
46%
50%
40%
34%
30%
20%
10%
0%
Today
Future (3 years from now)
Yes
No or Unsure
Figure 4 shows 22 percent of respondents say their organization’s security leader briefs the board
of directors on cybersecurity strategy. Sixty-six percent of the expert panel forecast that three
years from now the organization’s security leader will regularly brief the board on a recurring
basis.
Figure 4. Does your organization’s security leader brief the board of directors on the
cybersecurity strategy? 90%
78%
80%
66%
70%
60%
50%
34%
40%
30%
22%
20%
10%
0%
Today
Future (3 years from now)
Yes
Ponemon Institute©: Research Report
No or Unsure
Page 3 Figure 5 reports 14 percent of respondents say their organization’s security leader has a direct
reporting relationship with the CEO. In contrast, 30 percent of the expert panel predict that the
security leader will directly report to the organization’s CEO three years from now.
Figure 5. Does your organization’s security leader report directly to the CEO?
100%
86%
90%
80%
70%
70%
60%
50%
40%
30%
30%
20%
14%
10%
0%
Today
Future (3 years from now)
Yes
No or Unsure
Ponemon Institute©: Research Report
Page 4 The following megatrends are presented as a percentage net change between the current state
(e.g., today) and the future state (e.g., 3 years from now). The formula for percentage net change
is defined as:
Percentage net change = {[Current state – Future state] / ½ * [Current state + Future state]}
2. Insider negligence risks are decreasing. Due to investments in technologies, organizations
will gain better control over employees’ insecure devices and apps. Training programs will
increase awareness of cybersecurity practices. A lack of visibility into what employees are doing
in the workplace will become less of a problem in the next three years.
Figure 6 provides the percentage net changes in human factor security risks. Here, a negative
percentage indicates that the security risk rating is expected to increase. A positive percentage
indicates the risk is forecasted to decline.
As noted in this figure, only one attribution (about the inability to enforce compliance with polices)
is expected to worsen over the next three years. According to respondents, the inability to control
employees’ devices and apps, lack of awareness of cybersecurity practices, employee
complacency about cybersecurity and a lack of visibility into what employees are doing in the
workplace will become less of a problem in the next three years. Investments in technologies to
address these threats and better controls over BYOD and BYOC will make these risks more
manageable.
Figure 6. Percentage net changes in human factor megatrends
Consolidated view
Inability to enforce compliance with policies -2%
Contract workers replacing employees
4%
More employees working outside the office
10%
Insufficient staff with knowledge and credentials
25%
Lack of awareness of cybersecurity practices
30%
Inability to control employees' devices and apps
32%
Employee complacency about cybersecurity
40%
Inability to know what employees are doing in
the workplace
-10%
51%
0%
10%
20%
30%
40%
50%
60%
Percentage net change on security risk ratings
Ponemon Institute©: Research Report
Page 5 3. Cyber crime will keep information security leaders up night. There will be significant
increases in the risk of nation state attackers and advanced persistent threats, cyber warfare or
terrorism, data breaches involving high value information and the stealth and sophistication of
cyber attackers. In contrast, there are expected to be slight improvements in mitigating the risk of
hacktivism and malicious or criminal insiders.
Figure 7 provides the percentage net changes in cyber crime mega trends. Here, a negative
percentage indicates that the security risk rating is expected to increase. A positive percentage
indicates that risk is forecasted to decline.
According to respondents, there will be significant increases in the risk of nation state attackers
and advanced persistent threats, cyber warfare or terrorism, data breaches involving high value
information and the stealth and sophistication of cyber attackers. In contrast, there are expected
to be slight improvements in mitigating the risk of hacktivism and malicious or criminal insiders.
Figure 7. Percentage net changes in cyber crime megatrends
Consolidated view
Nation state attackers -37%
Cyber warfare or cyber terrorism
-24%
-15%
Breaches involving high-value information
Stealth and sophistication of cyber attackers
-14%
Zero-day attacks
-13%
Breaches that disrupt business and IT processes
-12%
Breaches that damage critical infrastructure
-11%
Breaches involving large volumes of data
-3%
0%
Emergence of cyber syndicates
Malicious or criminal insiders
2%
Emergence of hacktivism
-45%
3%
-35%
-25%
-15%
-5%
5%
15%
Percentage net change on security risk ratings
Ponemon Institute©: Research Report
Page 6 4. The Internet of Things is here but organizations are slow to address its security risks.
The Internet of Things is the expanding network of billions of connected devices that are
permeating our daily lives—from the computers inside our cars to our WiFi enabled appliances,
from wireless medical devices to wearable device.
Because consumers are embracing more connected devices, information security leaders predict
that the Internet of Things will be one of the most significant disruptive technologies in the near
future. Figure 8 shows respondents’ perceptions about preparedness for cybersecurity risks
resulting from the Internet of Things are generally consistent across all three regional samples.
The majority of respondents do not believe they are ready for the impact the Internet of Things
will have on their organizations.
Figure 8. My organization is prepared to deal with potential cybersecurity risks resulting
from the Internet of Things
40%
35%
34%
30%
30%
28%
25%
20%
15%
10%
5%
0%
US
UK/Europe
MENA
Strongly agree and agree responses combined
Ponemon Institute©: Research Report
Page 7 Figure 9 shows the disruptive technologies that will increase or decrease in their risk to an
organization. The Internet of Things risk is projected to increase by 25 percent and follows virtual
currencies (48 percent increase in risk) and big data analytics (32 percent increase in risk).
Figure 9. Percentage net changes in disruptive technology megatrends
Consolidated view
Organization’s acceptance of virtual currencies -48%
Organization’s use of big data analytics
The Internet of Things
Organization’s use of mobile payments
-32%
-25%
-21%
Organization’s use of IT virtualization
Employees’ use of social media in the workplace
3%
11%
Organization’s use of cloud infrastructure
14%
Organization’s use of digital identities
15%
Organization’s use of cloud file sharing tools
Organization’s use of cloud services
Employee-owned mobile devices (BYOD)
Employees’ use of favorite cloud apps (BYOC)
19%
25%
33%
38%
-60%-50%-40%-30%-20%-10% 0% 10% 20% 30% 40% 50%
Percentage net change on security risk ratings
Ponemon Institute©: Research Report
Page 8 5. The cyber talent gap will persist. Figure 10 shows respondents in three regional samples
hold a consistent belief that their organizations need more knowledgeable and experienced
cybersecurity practitioners (i.e., the cyber talent gap).
Figure 10. My organization needs more knowledgeable and experienced cybersecurity
practitioners
80%
70%
67%
66%
65%
US
UK/Europe
MENA
60%
50%
40%
30%
20%
10%
0%
Strongly agree and agree responses combined
Figure 11 lists the factors that respondents believe could hinder or stall improvements in their
organization’s cybersecurity posture in the next 3 years. At 45 percent, the number one factor for
respondents is the inability to hire and retain staff. This is closely followed by a lack of actionable
intelligence (44 percent) and the inability to curtail employee-related security risks (43 percent).
Figure 11. Factors that will hinder improvement over the next 3 years
Consolidated view
Inability to hire and retain expert staff
45%
Lack of actionable intelligence
44%
43%
Inability to minimize employee risk
Lack of funding
34%
Lack of suitable technologies
33%
31%
Increase in complexity
29%
Lack of C-level support
22%
Lack of cybersecurity leadership
19%
Increase in compliance burden
0%
Ponemon Institute©: Research Report
5%
10%
15%
20%
25%
30%
35%
40%
45%
Page 9 50%
6. Big shifts in new technologies towards big data analytics, forensics and intelligencebased cyber solutions. The following technologies will gain the most in importance over the next
3 years: encryption for data at rest, big data analytics, SIEM and cybersecurity intelligence,
automated forensics tools, encryption for data in motion, next generation firewalls, web
application firewalls, threat intelligence feeds and sandboxing or isolation tools.
Figure 12 provides the percentage net changes in importance ratings for 25 enabling security
technologies for the consolidated sample. Here, a positive net change percentage indicates that
the importance of a given technology is projected to increase over the next three years. A
negative percentage indicates the importance of the technology is projected to decrease.
The technologies that achieve the highest percentage net change are: encryption for data at rest,
big data analytics, forensics (automated tools), next generation firewalls, SIEM, threat intelligence
feeds, web application firewalls, sandboxing or isolation tools and encryption for data in motion.
Technologies that are projected to become less important over time include anti-virus tools and
data loss prevention systems.
Figure 12. Percentage change in importance of enabling security technologies
Consolidated view
Encryption for data at rest
Big data analytics
SIEM and cybersecurity intelligence
Forensics (automated tools)
Encryption for data in motion
Next generation firewalls (NGFW)
Web application firewalls (WAF)
Threat intelligence feeds
Sandboxing or isolation tools
Access governance systems
Tokenization tools
Automated policy generation
Perimeter or location surveillance
Identity & access management
Intrusion detection & prevention
Incident response tools
Database scanning and monitoring
URL or content filtering
Device anti-theft solutions
Configuration & log management
Virtual private network (VPN)
ID & credentialing system
Endpoint and mobile device management
Data loss prevention (DLP)
Anti-virus & anti-malware
-30%
24%
20%
20%
19%
19%
18%
18%
17%
17%
6%
4%
3%
2%
2%
1%
0%
0%
-1%
-2%
-4%
-4%
-5%
-6%
-12%
-17%
-20%
-10%
0%
10%
20%
30%
Percentage net change on importance ratings
Ponemon Institute©: Research Report
Page 10 7. Despite alarming media headlines, cybersecurity postures are expected to improve. As
noted in Figure 13, the majority of respondents say their cybersecurity postures will improve for
the following reasons: cyber intelligence will become more timely and actionable, more funding
will be made available to invest in people and technologies, technologies will become more
effective in detecting and responding to cyber threats, more staffing will be available to deal with
the increasing frequency of attacks and employee-related risks will decline.
Figure 13. Will our organization’s security posture improve, decline or stay at the same
level?
70%
64%
60%
60%
55%
50%
40%
32%
31%
30%
26%
20%
13%
10%
9%
10%
0%
US
UK/Europe
Improve
Ponemon Institute©: Research Report
Stay the same
MENA
Decline
Page 11 Part 3. Country Comparisons
In this section we compare the average megatrend ratings for the countries represented in this
study. Figure 14 provides the summarized average risk rating for six areas of megatrends by
country sample. Each respondent provided a rating on a 5-point scale from 1 = low to 5 = high. A
risk scale was used to rate four mega trend categories – namely, organizational factors, the
human factor, disruptive technologies and cyber crime. Security technologies were rated on
importance and compliance was rated on cost burden. Respondents provided ratings in three
separate samples (US, UK/Europe and MENA) for today and three years from now (future).
As shown below, ratings across country samples vary. The US sample appears to have higher or
more risky ratings on average and the MENA sample has lower or less risky ratings.
The grand mean for both the current state (today) and future state is 3.6, which is significantly
higher than the 5-point scale median of 3.0.
Figure 14. Average megatrend ratings for today and future state by country sample
Panel A: Current State (Today)
Security technologies
Organizational factors
Human factor
Disruptive technologies
Cyber crime
Compliance cost
1.0
2.0
MENA
3.0
UK/Europe
4.0
5.0
US
Panel B: Future State (3 years from now)
Security technologies
Organizational factors
Human factor
Disruptive technologies
Cyber crime
Compliance cost
1.0
2.0
MENA
Ponemon Institute©: Research Report
3.0
UK/Europe
4.0
5.0
US
Page 12 According to the findings, net changes across country samples are generally consistent, with
mixed results for human and organizational factors, respectively. Results suggest that security
technologies will increase in importance and the human factor risk will improve significantly in the
US and UK/Europe over three years. In contrast, organizational factors, disruptive technologies,
cyber crime and compliance costs are all predicted to worsen over time. In the US, organizational
factors will improve slightly.
Figure 15. Percentage net changes between current and future states by country sample
Worsened State
Improved State
17%
17%
14%
Security technologies
-2%
Organizational factors
-20%
2%
-10%
23%
Human factor
43%
-8%
Disruptive technologies -22%
-8%
-10%
-6%
-8%
Cyber crime
-18%
Compliance cost
-10%
-24%
-30%
-20%
-10%
MENA
Ponemon Institute©: Research Report
0%
10%
UK/Europe
20%
30%
40%
50%
US
Page 13 Part 4. Other Megatrends and Findings
Will governance practices evolve to meet cybersecurity challenges? Three years from now,
due in part to the growth of connected mobile devices, respondents believe it will become more
difficult to secure access to data, systems and physical spaces, as shown in Figure 16.
Respondents also believe the complexity of IT operations coupled with the growth of unstructured
data assets will cause a substantial increase in security risks. Another factor that is projected to
increase risk concerns the inability to integrate disparate technologies.
Figure 16. Percentage net change in organizational factor mega trends
Consolidated view
Inability to secure access rights to data, systems
and physical spaces
Complexity of business and IT operations
-20%
-17%
Growth of unstructured data assets
-9%
Inability to integrate disparate technologies
-7%
Inability to integrate necessary data sources for
actionable cyber intelligence
Integration of third parties into internal networks
and applications
-2%
1%
Silos and the lack of collaboration
2%
Lack of cybersecurity leadership
8%
Inability to convince leadership to make
cybersecurity a priority
13%
Lack of funding to support cyber defense
-35%
19%
-25%
-15%
-5%
5%
15%
25%
Percentage net change on security risk ratings
Ponemon Institute©: Research Report
Page 14 The compliance cost burden is predicted to increase. Three years from now, due to the
increase in cyber attacks and cyber terrorism, organizations will be facing the need to invest more
in compliance with mandates on critical infrastructure protection and national cyber defense
strategies. An increase in class action and tort litigation because of the continuation of data
breaches will be another concern for organizations.
Figure 17. Percentage change in compliance cost megatrends
Consolidated view
Mandates on critical infrastructure protection
-41%
National cyber defense strategies
-40%
Class action and tort litigation
-31%
Federal laws regulating data protection and
privacy
-9%
International privacy and data protection laws
-8%
E-Discovery requirements
-4%
State laws regulating data protection and privacy
-1%
Self-regulatory programs (such as ISO 27.001 or
PCI)
0%
Cybersecurity governance
-50%
3%
-40%
-30%
-20%
-10%
0%
10%
Percentage net change on cost ratings
Ponemon Institute©: Research Report
Page 15 What respondents believe is the current state of cybersecurity. Figure 18 provides the
strongly agree and agree response to eight attributions about cybersecurity. As can be seen, 66
percent of respondents believe their organization needs more knowledgeable and experienced
cybersecurity practitioners. Fifty-nine percent believe cyber intelligence activities are necessary
for protecting information assets and IT infrastructure. Slightly less than half (48 percent ) believe
their organization has adequate security technologies. Finally, only 31 percent of respondents
believe their organization is prepared to deal with cybersecurity risks or issues in the Internet of
Things.
Figure 18. The current state of cybersecurity
Strongly agree and Agree responses combined
My organization needs more knowledgeable and
experienced cybersecurity practitioners.
66%
My organization believes cyber intelligence
activities are necessary for protecting information
assets and IT infrastructure.
59%
My organization has adequate security
technologies to protect information assets and IT
infrastructure.
48%
My organization takes appropriate steps to
comply with the leading cybersecurity standards.
47%
My organization has ample resources to ensure
all cybersecurity requirements are met.
47%
My organization consistently follows policies and
procedures that seek to protect information
assets and IT infrastructure.
39%
My organization is investing in big data analytics
for cyber defense.
37%
My organization is prepared to deal with potential
cybersecurity risks resulting from the “Internet of
things”.
31%
0%
10%
20%
30%
40%
50%
60%
70%
Strongly agree and Agree responses combined
Ponemon Institute©: Research Report
Page 16 Why will organizations cybersecurity posture improve? As discussed earlier in the report,
there is general optimism that organizations will rise to the challenge of dealing with cyber threats.
Figure 19 shows the success factors that respondents believe could drive improvement to their
organization’s cybersecurity posture in the next 3 years. The top three choices are: increase in
funding, improvements to cyber intelligence and improvement in enabling security technologies.
Figure 19. Factors that will drive improvement over the next 3 years
Consolidated view
Increase in funding
47%
Cyber intelligence improvements
47%
Improvement in technologies
41%
Improvement in staffing
40%
Ability to minimize employee-related risk
36%
Improvement in threat sharing
23%
Reduction in complexity
21%
Cybersecurity leadership
19%
Increase in C-level support
16%
Reduction in compliance burden
10%
0%
Ponemon Institute©: Research Report
5%
10% 15% 20% 25% 30% 35% 40% 45% 50%
Page 17 Figure 20 lists in descending order of importance what respondents believe will be the most
prevalent types of cyber threats over the next 3 years. The top five choices are: zero day attacks,
data leakage in the cloud, mobile malware/targeted attacks, SQL injection and phishing attacks.
Figure 20. What respondents believe will be the most prevalent cyber threats or attacks
over the next three years
Consolidated view
Zero day attacks
49%
Cloud data leakage
41%
Mobile malware/targeted attacks
38%
SQL injection
37%
Phishing attacks
36%
Critical infrastructure attacks
35%
Watering hole attacks
29%
Compromised supply chain
25%
Insider threats
23%
DDoS
23%
Rootkits
22%
BYOD data theft
13%
Cross-site scripting
12%
Compromised trusted partners
10%
Compromised MSSPs/SaaS providers
10%
MacOS malware/targeted attacks
10%
Botnet attacks
9%
Linux malware/targeted attacks
8%
Clickjacking
8%
Attacks against control systems
7%
0%
Ponemon Institute©: Research Report
10%
20%
30%
40%
50%
60%
Page 18 Part 4. Conclusion
Many information security professionals believe the next three years will determine if
organizations can win the cyber war. Understanding the big trends that will impact the security
posture of organizations will help organizations make smarter decisions about their investments
in people, processes and technologies to achieve success.
To gain this understanding, we turned to information security leaders throughout the world to
identify the most important trends for the next three years. Based on the findings, following are
recommendations and observations:
§
Prepare to deal with external threats such as nation state attackers, cyber warfare or cyber
terrorism. With the negligence insider risk decreasing, more resources should be allocated to
dealing with an increasing sophisticated and stealthy cyber criminal.
§
Establish regular cyber training and awareness programs. These programs are critical in
making employees and contractors the first line of defense against malicious or criminal
activity.
§
Develop a strategy to deal with the risks created by the Internet of Things. Conduct a security
impact assessment on how the Internet of Things will impact your organization’s security
posture.
§
Be aware of the growing adoption of virtual currencies that will pose new risks to both
organizations and customers.
§
Understand how to use big data analytics effectively. Big data analytics will have both a
negative and positive impact on organizations. The negative will be the vast amounts of
sensitive and confidential data that will have to be protected. The positive will be the
availability of analytics that will be helpful in detecting and blocking cyber attacks.
§
Go back to school and recruit experts in cybersecurity. A key differentiator among
organizations will be the ability to hire and retain knowledgeable and experienced
cybersecurity practitioners.
§
Invest in the tried and true technologies because they will become more important. These
include encryption for data at rest and in motion, SIEM and cybersecurity technologies and
firewalls.
§
While leadership for cybersecurity initiatives will improve other governance issues will
become more troublesome. These are the inability to secure access rights to data, systems
and physical spaces, complexity of business and IT operations, the growth of unstructured
data assets and the inability to integrate disparate technologies.
§
Prepare to deal with an increasing litigious environment due to class action and tort litigation.
The compliance cost burden will increase for organizations due to mandates on critical
infrastructure protection.
Ponemon Institute©: Research Report
Page 19 Part 5. Methods
A random sampling frame of 27,125 senior-level IT and IT security practitioners located in the
United States, Europe and MENA were selected as participants to this survey. All respondents
2
were screened to ensure they had bona fide credentials in cybersecurity or related disciplines.
When asked what best describes their role in managing security risk, 58 percent of respondents
said they set priorities, 57 percent said they manage budgets, 63 percent select vendors and
contractors, 43 percent determine the organization’s security strategy and 46 percent evaluate
program performance.
By design, 97 percent of respondents are at supervisory or executive levels. The organizational
level of respondents is as follows: C-level (8 percent), Director (32 percent), Vice President (13
percent), Senior Executive (10 percent), Manager (34 percent) and Other (3 percent). The
department or function where respondents are located within the organization is as follows: Chief
Information Officer (51 percent), Chief Technology Officer (8 percent), CEO/President (7 percent),
Chief Security Officer (6 percent), Chief Risk Officer (6 percent), Chief Financial Officer (5
percent), General Counsel (5 percent), Compliance Officer (4 percent), Business Owner (3
percent) and Other (5 percent).
As shown in Table 1, a consolidated total of 1,125 respondents completed the survey. Screening
and failed reliability checks resulted in the removal of 119 surveys. The final sample was 1,006
surveys (or a 3.7 percent overall response rate).
Table 1. Survey Response
US
Total sampling frame
Total survey returns
Rejected or screened surveys
Final sample
Response rate
UK/Europe
MENA
Consolidated
11,550
9,790
5,785
27,125
467
455
203
1125
46
52
21
119
421
403
182
1006
3.6%
4.1%
3.1%
3.7%
2
When asked what best describes their job-related role in managing security risk, 58 percent of respondents
said they set priorities, 57 percent said they manage budgets, 63 percent said they select vendors and
contractors, 43 percent determine the organization’s security strategy and 46 percent evaluate program
performance.
Ponemon Institute©: Research Report
Page 20 Pie Chart 1 reports the industry segments of respondents’ organizations. This chart identifies
financial services (15 percent) as the largest segment, followed by industrial (12 percent) and
public sector (11 percent).
Pie Chart 1. Industry distribution of respondents’ organizations
3%
3%
3%
2%
3% 3%
15%
3%
3%
12%
4%
5%
11%
5%
6%
9%
Financial services
Industrial
Public sector
Services
Health & pharmaceutical
Energy & utilities
Technology
Hospitality & leisure
Software
Consumer products
Retail, store
Other
Retail, Internet
Transportation
Communications
Education & research
Agriculture & food services
10%
Pie chart 2 shows 42 percent of respondents are from organizations with a worldwide headcount
of more than 5,000 employees.
Pie Chart 2. Worldwide headcount of the organization
9%
14%
12%
< 100
100 to 500
20%
501 to 5,000
5,001 to 10,000
10,001 to 25,000
22%
> 25,000
24%
Ponemon Institute©: Research Report
Page 21 Part 6. Caveats
There are inherent limitations to survey research that need to be carefully considered before
drawing inferences from findings. The following items are specific limitations that are germane to
most web-based surveys.
Non-response bias: The current findings are based on a sample of survey returns. We sent
surveys to a representative sample of individuals, resulting in a large number of usable returned
responses. Despite non-response tests, it is always possible that individuals who did not
participate are substantially different in terms of underlying beliefs from those who completed the
instrument.
Sampling-frame bias: The accuracy is based on contact information and the degree to which the
list is representative of individuals who are IT or IT security practitioners. We also acknowledge
that the results may be biased by external events such as media coverage. We also acknowledge
bias caused by compensating subjects to complete this research within a holdout period.
Self-reported results: The quality of survey research is based on the integrity of confidential
responses received from subjects. While certain checks and balances can be incorporated into
the survey process, there is always the possibility that a subject did not provide a truthful
response.
Please contact research@ponemon.org or call us at 800.877.3118 if you have any questions.
Ponemon Institute
Advancing Responsible Information Management
Ponemon Institute is dedicated to independent research and education that advances responsible
information and privacy management practices within business and government. Our mission is to conduct
high quality, empirical studies on critical issues affecting the management and security of sensitive
information about people and organizations.
As a member of the Council of American Survey Research Organizations (CASRO), we uphold strict
data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable
information from individuals (or company identifiable information in our business research). Furthermore, we
have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper
questions.
Copyright © 2015, Raytheon Company, Ponemon Institute, LLC. All rights reserved. No parts
of
this material may be reproduced in any form without the written permission of Raytheon or
the
Ponemon Institute, LLC.
Permission has been obtained from the copyright co-owner, Raytheon
to publish this
reproduction, which is the same in all material respects, as the original unless
approved as
changed. No parts of this document may be reproduced, stored in any retrieval
system, or
transmitted in any form, or by any means electronic, mechanical, photocopying,
recording, or
otherwise, without prior written permission of Raytheon or the Ponemon Institute,
LLC.
Ponemon Institute©: Research Report
Page 22