symantec infographic new final - campanastan...number of incidents reported to us-cert fiscal years...

1
Number of Incidents Reported to US-CERT Fiscal Years 2006 -2012 From Federal Agencies 1 2006 2007 2008 2009 2010 2011 2012 Fiscal Year Number of Incidents 5,000 5,503 0 10,000 11,911 16,843 29,999 41,776 42,854 48,562 15,000 20,000 25,000 30,000 35,000 40,000 45,000 50,000 37% Under Investigation 20% Improper Usage 18% Malicious Code 17% Unauthorized Access 7% Scams, Probes, Attempted Access 0% Denial of Service Incidents Reported to US-CERT FY 2012 - Federal Agencies by Category 1 in As agencies begin to deploy cloud computing, mobile and big initiatives, it’s important to realize that emerg- ing technology is essential to meet growing public sector demand, but they also may expose agencies to increased risks. This infographic explores the exponential growth in cyber attacks, the kinds of attacks facing government agencies, the impact, risks and rewards of emerging technology, and concludes with steps agencies can begin to take to remain secure. As agencies adopt emerging technology and implement cloud, mobile and big data solutions, it is imperative that agency leaders consider the risks and rewards of adoption. To get the conversation started within your agency, here are three risks and three rewards for cloud, mobile and big data. Top 5 CYBER THREATs As Identified by Government IT Professionals 2 Other Threats Identified Include: 2 59% MALWARE 57% PHISHING 43% HACKING 42% SPAM 44% DATA LEAKAGE This infographic demonstrates that agencies are adopting emerging technology and view cloud computing, mobile and big data as essential to transforming government. Yet, these technologies must be implemented safely to mitigate risks. Below are five basic steps to start conversations within your agency on how to remain secure and be proactive against threats while adopting technology. Emerging technology trends are redefining how government delivers services and optimizes business functions. The data below highlights the priority level of these technologies by government agencies, and why they will continue to be a focus to transform government. Collaboration and developing secure information sharing across agencies is essential Obtain real-time awareness to identify threat levels and risks Define clear usage policies for data access and ownership Review and test systems often to assess vulnerabilities Train staff and understand compliance requirements to keep systems secure MOBILE, CLOUD & BIG DATA PRIORITY LEVEL MOBILE, CLOUD & BIG DATA PRIORITY LEVEL 40% 40% 33% 25% 25% 23% DATA BREACHES MISUSE SOCIAL CYBER ESPIONAGE INSIDER MOBILE What Is Your Biggest Security Concern Regarding the Increasingly Mobile Government Workforce? 3 CLOUD MOBILE BIG DATA Priority = Moderate (38%) Priority = Low (39%) Engagement = Talking about it (49%) Priority = High (39%) Engagement = One or more initiatives (70%) RISK VS. REWARD RISK VS. REWARD Engagement = Talking about it (34%) AGENCY ENGAGEMENT ONE OR MORE INITIATIVES TALKING ABOUT IT NO DISCUSSION OR PLANS PRIORITY LEVEL TO AGENCY HIGH MODERATE LOW 39% 39% 22% 26% 38% 36% 27% 34% 39% 70% 22% 8% 17% 49% 39% 30% 41% 29% 58% Infrastructure Vulnerabilities 25% Human Error 17% Device Theft / Compromise Focus CYBER SECURITY RESOURCES: 1 Cybersecurity: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented 2 Cyber Security and Transformational Technologies Market Connections Report: 2012 3 Mobile Phone Results: Symantec Government Symposium 2012 In Review: President Obama’s Cybersecurity Executive Order Digital Government Strategy: Building a 21st Century Platform to Better Serve the American People Visit Symantec’s Page on GovLoop 5 STEPS TO MITIGATING RISKS WITH EMERGING TECHNOLOGY 5 STEPS TO MITIGATING RISKS WITH EMERGING TECHNOLOGY PERCENTAGE OF RESPONDENTS 0 20 40 60 MOBILE CLOUD BIG DATA (over 200 Federal IT Manager) Emerging Technology Priority & Engagement Levels As Reported By Federal IT Managers November 2012 2 Cloud Cloud 1. Cloud failure can com- promise confidential data 2. Increased risk of an un- authorized user obtaining information 3. Insiders can circumvent security and release perti- nent information Risks 1. Improved collaboration and continuity 2. Increased accessibility to information and resources 3. More opportunities for increased business agility Rewards Big Data Big Data 1. Volumes of data expose organizations to more risks and threats 2. As more transactions occur online, it’s challeng- ing to stay ahead of attacks 3. Harder for agencies to be proactive in spotting big data vulnerabilities Risks 1. Identifies relationships, patterns and threats, tradi- tionally not seen 2. Real-time data can stop fraud and attacks faster than ever before 3. Big data can lead to more secure operations and meet compliance requirements Rewards Mobile Mobile 1. Lost or stolen devices can lead to an informa- tion breach 2. Personal and private usage of devices blurs data ownership 3. Increased risks with additional endpoints to manage Risks 1. Facilitates accessibility to data anywhere and any- time 2. Remote employees can connect quickly to shared data 3. Consistent with new methodologies of data collection Rewards

Upload: others

Post on 30-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: symantec infographic new final - Campanastan...Number of Incidents Reported to US-CERT Fiscal Years 2006 -2012 From Federal Agencies 1 Fiscal Year Number of Incidents

Number of Incidents Reported to US-CERTFiscal Years 2006 -2012From Federal Agencies1

2006 2007 2008 2009 2010 2011 2012

F i s c a l Y e a r

N u m b e r o f I n c i d e n t s

5,0005,503

0

10,000

11,911

16,843

29,999

41,776 42,854

48,562

15,000

20,000

25,000

30,000

35,000

40,000

45,000

50,000 37%Under Investigation 20%

Improper Usage

18%Malicious Code

17%Unauthorized Access

7%Scams, Probes,

Attempted Access

0%Denial of Service

Incidents Reported to US-CERTFY 2012 - Federal Agencies

by Category1

in

As agencies begin to deploy cloud computing, mobile and big initiatives, it’s important to realize that emerg-ing technology is essential to meet growing public sector demand, but they also may expose agencies to

increased risks. This infographic explores the exponential growth in cyber attacks, the kinds of attacks facing government agencies, the impact, risks and rewards of emerging technology, and concludes with steps

agencies can begin to take to remain secure.

As agencies adopt emerging technology and implement cloud, mobile and big data solutions, it is imperative that agency leaders consider the risks and rewards of adoption. To get the conversation started within your agency, here are three risks and three rewards for cloud, mobile and big data.

Top 5 CYBER THREATsAs Identified by Government IT Professionals2

Other Threats Identified Include:2

59%MALWARE

57%PHISHING

43%HACKING

42%SPAM

44%DATA LEAKAGE

This infographic demonstrates that agencies are adopting emerging technology and view cloud computing, mobile and big data as essential to transforming government. Yet, these technologies must be implemented safely to mitigate risks. Below are five basic steps to start conversations within your agency on how to remain secure and be proactive against threats while adopting technology.

Emerging technology trends are redefining how government delivers services and optimizes business functions. The data below highlights the priority level of these technologies by government agencies, and why they will continue to be a focus to transform government.

Collaboration and developing secure information sharing across agencies is essential

Obtain real-time awareness to identify threat levels and risks

Define clear usage policies for data access and ownership

Review and test systems often to assess vulnerabilities

Train staff and understand compliance requirements to keep systems secure

M O B I L E , C L O U D & B I G D ATA P R I O R I T Y L E V E LM O B I L E , C L O U D & B I G D ATA P R I O R I T Y L E V E L

40%

40%

33%

25%

25%

23%

DATA BREACHES

MISUSE

SOCIAL

CYBER ESPIONAGE

INSIDER

MOBILE

What Is Your Biggest Security Concern Regarding the Increasingly

Mobile Government Workforce?3

C L O U DM O B I L E B I G D ATAPriority = Moderate (38%) Priority = Low (39%)

Engagement = Talking about it (49%)

Priority = High (39%)

Engagement = One or more initiatives (70%)

R I S K V S . R E W A R DR I S K V S . R E W A R D

Engagement = Talking about it (34%)

AGENCY ENGAGEMENTONE OR MORE INITIATIVES

TALKING ABOUT IT

NO DISCUSSION OR PLANS

PRIORITY LEVEL TO AGENCY

HIGH MODERATE LOW

39%39%

22%

26%

38%36%

27%

34%39%

70%22%

8%

17%

49%39%

30%

41%29%

58%InfrastructureVulnerabilities

25%Human Error

17%Device Theft /

Compromise

Focus

CYBER SECURITY

R E S O U R C E S :1 Cybersecurity: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented

2 Cyber Security and Transformational Technologies Market Connections Report: 2012

3 Mobile Phone Results: Symantec Government Symposium 2012

In Review: President Obama’s Cybersecurity Executive Order

Digital Government Strategy: Building a 21st Century Platform to Better Serve the American People

Visit Symantec’s Page on GovLoop

5 STEPS TO MITIGATING RISKS WITH EMERGING TECHNOLOGY5 STEPS TO MITIGATING RISKS WITH EMERGING TECHNOLOGY

PERC

ENTA

GE O

F RE

SPON

DENT

S

0

20

40

60

MOBILE CLOUD BIG DATA

(ove

r 20

0 Fe

dera

l IT

Man

ager

)

Emerging Technology Priority & Engagement LevelsAs Reported By Federal IT ManagersNovember 20122

CloudCloud1 . Cloud failure can com-promise confidential data 2. Increased risk of an un-authorized user obtaining information

3. Insiders can circumvent security and release perti-nent information

Risks1 . Improved collaboration and continuity

2. Increased accessibility to information and resources

3. More opportunities for increased business agility

Rewards

Big DataBig Data1 . Volumes of data expose organizations to more risks and threats

2. As more transactions occur online, it’s challeng-ing to stay ahead of attacks

3. Harder for agencies to be proactive in spotting big data vulnerabilities

Risks1 . Identifies relationships, patterns and threats, tradi-tionally not seen

2. Real-time data can stop fraud and attacks faster than ever before

3. Big data can lead to more secure operations and meet compliance requirements

Rewards

MobileMobile1 . Lost or stolen devices can lead to an informa-tion breach

2. Personal and private usage of devices blurs data ownership

3. Increased risks with additional endpoints to manage

Risks1 . Facilitates accessibility to data anywhere and any-time

2. Remote employees can connect quickly to shared data

3. Consistent with new methodologies of data collection

Rewards