Journey through Enterprise IT Services
In Journey through Enterprise IT Services, Nadhan, HP Distinguished Technologist, explores the IT Services industry, and discusses technology trends in simplified terms.

Conquer Cyber-crime Challenges by Checking out Conference

The 2013 Fourth Annual Cost of Cyber Crime Study details findings that continue to reinforce the vital need to address Security as a board-level concern. After reading this report from the Ponemon Institute, I reviewed various sessions related to Security at HP Discover Barcelona with great interest. Below is a tabulated list of the findings from the study, along with my observations and applicable security sessions. Join me in checking out this conference that enables you to conquer cyber-crime challenges.

 

Cyber Criminal.png

     

  

Key study findings

  
  

My observations

  
  

Related links    (including HP Discover sessions)

  

Cyber-crimes continue to be very costly for organizations.

It is important to align business risk and security priorities.

DT1996

Cyber-crime cost varies by organizational size.

Smaller organizations are more vulnerable.

Just Right IT for SMBs

All industries fall victim to cybercrime, but to different degrees.

The more confidential the data, the higher the risk. Old style concepts are still vital to   national security.

Take a lesson from history on defense-in-depth strategy, DF2153

The most costly cyber-crimes are those caused by malicious insiders,   denial of service and web-based accounts.

Are your employees at home with Information Security?

DF2155 (workforce engagement), DF2146 (DDoS protection)

Cyber-attacks can get costly if not resolved quickly.

It is vital to have the right strategy in place followed by timely execution of proactive and reactive measures.

DF2236 (Answer the So-what CIO question)

Business disruption represents the highest external cost, followed by   the costs associated with information loss.

CIOs  must secure their relationship with their CISOs

Top 5 questions CIOs should ask

Detection and recovery are the most costly internal activities.

Cyber-crime never takes a day off, cyber security shouldn’t either.

TB1988 (Continuous Monitoring)

Activities relating to IT security in the network layer receive the   highest budget allocation.

Weakest links are greatest opportunities for Enterprise Security

Are your apps holding the fort?  

Deployment of security intelligence systems makes a difference. Companies deploying security intelligence   systems experienced a substantially higher ROI at 21 percent than all other   technology categories presented.

Link a chain of security events to kill the intent of the adversary. Using the right tools to proactively   combat cyber-crime challenges is vital to effectively address enterprise   security.

DEMO2652

A strong security posture moderates the cost of cyber- attacks.

Compare your IT security posture with over 100 enterprises

DF2148 (Benchmark)

Deployment of enterprise security governance practices moderates the   cost of cyber-crime.

CIOs posing the right questions to their CISOs would be a good start.

DEMO2251 (GRC), DF1995 (Compliance simplified)

 

The New Style of IT comes across several other sessions related to security at HP Discover, including:

 

a. Cloud: DT2145

 

b. Big Data: DT2035, TB1992, DT2142

 

c. Mobility: DT2331, DF2151, TB1989

 

d. Case studies: DT1814, BB1881, TB890

 

How about you? Which of these findings from the HP Ponemon Cyber-Crime study are more in context for your enterprise? What is your approach to dealing with the ones that do apply? How about securing a seat at the conference sessions that matter more to your enterprise?

 

Team up with HP Technology Expert, E.G.Nadhan

 

Connect with Nadhan on: Twitter, Facebook, Linkedin and Journey Blog

 

References

 

 

 

discover13_LithiumCommunities_banner_650x160.png

 

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the community guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
About the Author


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation