90 likes | 105 Views
How strong is your cyber response? Post COVID-19 has changed how we work, shop, and interact. Lockdowns accelerated the rise of remote work, which was already gaining traction within many industries.
E N D
State of Cybersecurity Report (SOCR) 2020 194 6,500+ Organizations across 35 countries surveyed Wipro CDC incidents analyzed 1.1Million 21 30+ Cyber intelligence alerts analyzed Contributing Partners Security products analyzed for vulnerabilities
Structure of the report MACRO ViewSTATE OF ATTACKS, BREACHES & LAW MICRO ViewSTATE OF CYBER RESILIENCE COVID-19A CYBER PERSPECTIVE MESO ViewSTATE OF COLLABORATION FUTURE ViewFUTURE OF CYBER INDUSTRY ViewSECTOR PERSPECTIVES 01. 02. 03. 04. 05. 06.
State of attacks, breaches & law Black-market data sold belongs to BFSI Sector Cyber Defenders have Weaknesses Analysed countries have strong breach notification laws 41% Analysis of year long intelligence alerts indicates significant activity with stolen data in underground economy. The CVE data indicates that security products continue to show propensity for vulnerabilities for code execution & authorization bypass Breach notification laws were examined for 23 countries across 4 parameters for their stringency 30+ 57%
State of cyber resilience 12% Top Investment Priorities 42% 35% - Security Orchestration and Automation 1 % of IT Budget for Security Organizations struggle to Retain Talent 20% - Zero Trust Architecture 2 Security Budgets are increasing. 14% of organizations were allocated budget more than 12% of IT budget Cyber Talent 42% of the organizations were finding it difficult to retain top quality cyber talent. 14% - Hybrid Cloud Security 3
COVID 19: A cybersecurity perspective Post COVID-19 & Cybersecurity Post COVID-19 Post COVID-19 During COVID-19 During COVID-19 During COVID-19 70% 87% Edge Security Deployment (Remote Patching, Native Edge Controls, Cloud Native Security, DDoS Sinkholes) are expected to accelerate showing radical cybersecurity resilience changes Organizations are prioritizing remote access/VPN enablement Organizations are increasing Device security (EDR, etc..) Organizations want to increase Secure Cloud Migration Organizations are planning for Secure Digital Transformation Organizations are concerned about endpoint hygiene 94% 94% 76%
Best security practices to emulate Adopt Automation in Security Controls Cloud – Deal quickly with over Permissions Cloud Identities Over permissioned 32% 95% Automated Data Discovery and Classification Dangerous delta exists between permissions granted and permissions used for Cloud Identities Consider automated data discovery and classification as the most effective data security control. OT/IOT – Identify & Monitor Organizations stepping up on Industrial asset identification & monitoring 19% 65% 2018 2019
State of collaboration 60%Organizations are increasingly participating in attack simulation exercises to assess preparedness 57%of organizations share only indicators of compromise – malicious IPs, URLs and domains 23%of organizations are not confident of addressing third-party supply chain threats 79% of organizations have Cyber Insurance as partial Risk transfer mechanism 64%of organizations consider reputational risk as the barrier for information sharing among peers
Future of cybersecurity 49% of the cybersecurity patent filings were in the AI/ML, and data science space 7% of the cybersecurity patent filings were in the 5G space. IoT Device Security has received highest seed investments in the past 3 years Payment fraud has received second most seed investment in the past 3 years