symantec infographic new final - campanastan...number of incidents reported to us-cert fiscal years...
TRANSCRIPT
Number of Incidents Reported to US-CERTFiscal Years 2006 -2012From Federal Agencies1
2006 2007 2008 2009 2010 2011 2012
F i s c a l Y e a r
N u m b e r o f I n c i d e n t s
5,0005,503
0
10,000
11,911
16,843
29,999
41,776 42,854
48,562
15,000
20,000
25,000
30,000
35,000
40,000
45,000
50,000 37%Under Investigation 20%
Improper Usage
18%Malicious Code
17%Unauthorized Access
7%Scams, Probes,
Attempted Access
0%Denial of Service
Incidents Reported to US-CERTFY 2012 - Federal Agencies
by Category1
in
As agencies begin to deploy cloud computing, mobile and big initiatives, it’s important to realize that emerg-ing technology is essential to meet growing public sector demand, but they also may expose agencies to
increased risks. This infographic explores the exponential growth in cyber attacks, the kinds of attacks facing government agencies, the impact, risks and rewards of emerging technology, and concludes with steps
agencies can begin to take to remain secure.
As agencies adopt emerging technology and implement cloud, mobile and big data solutions, it is imperative that agency leaders consider the risks and rewards of adoption. To get the conversation started within your agency, here are three risks and three rewards for cloud, mobile and big data.
Top 5 CYBER THREATsAs Identified by Government IT Professionals2
Other Threats Identified Include:2
59%MALWARE
57%PHISHING
43%HACKING
42%SPAM
44%DATA LEAKAGE
This infographic demonstrates that agencies are adopting emerging technology and view cloud computing, mobile and big data as essential to transforming government. Yet, these technologies must be implemented safely to mitigate risks. Below are five basic steps to start conversations within your agency on how to remain secure and be proactive against threats while adopting technology.
Emerging technology trends are redefining how government delivers services and optimizes business functions. The data below highlights the priority level of these technologies by government agencies, and why they will continue to be a focus to transform government.
Collaboration and developing secure information sharing across agencies is essential
Obtain real-time awareness to identify threat levels and risks
Define clear usage policies for data access and ownership
Review and test systems often to assess vulnerabilities
Train staff and understand compliance requirements to keep systems secure
M O B I L E , C L O U D & B I G D ATA P R I O R I T Y L E V E LM O B I L E , C L O U D & B I G D ATA P R I O R I T Y L E V E L
40%
40%
33%
25%
25%
23%
DATA BREACHES
MISUSE
SOCIAL
CYBER ESPIONAGE
INSIDER
MOBILE
What Is Your Biggest Security Concern Regarding the Increasingly
Mobile Government Workforce?3
C L O U DM O B I L E B I G D ATAPriority = Moderate (38%) Priority = Low (39%)
Engagement = Talking about it (49%)
Priority = High (39%)
Engagement = One or more initiatives (70%)
R I S K V S . R E W A R DR I S K V S . R E W A R D
Engagement = Talking about it (34%)
AGENCY ENGAGEMENTONE OR MORE INITIATIVES
TALKING ABOUT IT
NO DISCUSSION OR PLANS
PRIORITY LEVEL TO AGENCY
HIGH MODERATE LOW
39%39%
22%
26%
38%36%
27%
34%39%
70%22%
8%
17%
49%39%
30%
41%29%
58%InfrastructureVulnerabilities
25%Human Error
17%Device Theft /
Compromise
Focus
CYBER SECURITY
R E S O U R C E S :1 Cybersecurity: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented
2 Cyber Security and Transformational Technologies Market Connections Report: 2012
3 Mobile Phone Results: Symantec Government Symposium 2012
In Review: President Obama’s Cybersecurity Executive Order
Digital Government Strategy: Building a 21st Century Platform to Better Serve the American People
Visit Symantec’s Page on GovLoop
5 STEPS TO MITIGATING RISKS WITH EMERGING TECHNOLOGY5 STEPS TO MITIGATING RISKS WITH EMERGING TECHNOLOGY
PERC
ENTA
GE O
F RE
SPON
DENT
S
0
20
40
60
MOBILE CLOUD BIG DATA
(ove
r 20
0 Fe
dera
l IT
Man
ager
)
Emerging Technology Priority & Engagement LevelsAs Reported By Federal IT ManagersNovember 20122
CloudCloud1 . Cloud failure can com-promise confidential data 2. Increased risk of an un-authorized user obtaining information
3. Insiders can circumvent security and release perti-nent information
Risks1 . Improved collaboration and continuity
2. Increased accessibility to information and resources
3. More opportunities for increased business agility
Rewards
Big DataBig Data1 . Volumes of data expose organizations to more risks and threats
2. As more transactions occur online, it’s challeng-ing to stay ahead of attacks
3. Harder for agencies to be proactive in spotting big data vulnerabilities
Risks1 . Identifies relationships, patterns and threats, tradi-tionally not seen
2. Real-time data can stop fraud and attacks faster than ever before
3. Big data can lead to more secure operations and meet compliance requirements
Rewards
MobileMobile1 . Lost or stolen devices can lead to an informa-tion breach
2. Personal and private usage of devices blurs data ownership
3. Increased risks with additional endpoints to manage
Risks1 . Facilitates accessibility to data anywhere and any-time
2. Remote employees can connect quickly to shared data
3. Consistent with new methodologies of data collection
Rewards