Intelligence Driven Cyber Defense Sponsored by Lockheed Martin Independently conducted by Ponemon Institute LLC Publication Date: February 2015 Ponemon Institute© Research Report Intelligence Driven Cyber Defense Ponemon Institute, February 2015 Part 1. Introduction Ponemon Institute is pleased to present the results of Intelligence Driven Cyber Defense sponsored by Lockheed Martin. The purpose of this research is to understand if organizations are improving their ability to reduce the risk of hackers and other cyber criminals. If so, are they adopting new strategies, such as intelligence driven cyber defense, to deal with the rise in frequency and severity of cyber attacks? We surveyed 678 US IT and IT security practitioners who are familiar with their organizations’ defense against cybersecurity attacks and have responsibility in directing cybersecurity activities. Following are the key findings of this study: An intelligence driven cyber defense against hackers and other cyber criminals eludes many organizations. Intelligence driven cyber defense is the ability of an organization to thwart an attacker’s offensive maneuvers while maintaining its defensive position. As shown in Figure 1, respondents rate their ability to launch or implement an intelligence driven cyber defense against hackers and other cyber criminals as below average. The main reasons are the lack of expert personnel and budget. Organizations that succeed in an intelligence driven cyber defense use commercial threat intelligence feeds. Respondents who rate their organizations’ ability to launch or implement an intelligence driven cyber defense as above average rely primarily on commercial threat intelligence feeds (68 percent) followed by collaborative threat intelligence groups, partnerships and forums (37 percent) or dedicated analysts on staff (35 percent). Understanding the attacker’s weak spots is the most important feature of a security intelligence tool. Considered less important are a technology that slows down or even halts the attacker’s computers and technology that uses big data analytics to achieve a strong cybersecurity defense. The greatest cyber threat is inside the organization. The greatest area of potential cybersecurity risk is inside the organization. Thirty-six percent of respondents point to negligent insiders and 25 percent of respondents say malicious insiders are the greatest areas of cybersecurity risk. Cyber attacks target high value intellectual property. Respondents were asked to rank the most negative consequences of a cyber attack. Lost intellectual property, reputation damage and disruption to business process are considered the worst. The types of cyber attacks against their organizations’ networks of most concern are advanced persistent threats (APT), malicious insiders and phishing and social engineering. Ponemon Institute© Research Report Page 1 Part 2. Key findings In this section, we present an analysis of the research findings. The complete audited findings are presented in the appendix of this report. We have organized the paper according to the following themes: § § § Challenges addressing cybersecurity risks Cybersecurity strategies missing the mark Achieving an intelligence driven cyber defense Challenges addressing cybersecurity risks Organizations are not prepared to deal with severe and frequent cyber attacks. As shown in Figure 2, 75 percent of respondents say they see an increase in the severity of cyber attacks experienced by their organizations and 68 percent of respondents say they are more frequent. However, a smaller percentage of respondents (53 percent) say launching a strong offensive against hackers and other cyber criminals is very important to their organizations’ security strategy. An impediment to achieving a strong security posture is a lack of vigilance and budget. Only 46 percent of respondents say their organization is vigilant in monitoring cyber attacks and only 27 percent of respondents believe their security budget is sufficient for mitigating most cyber attacks. Figure 2. Challenges to achieving a strong cyber defense Strongly agree and agree response combined The severity of cyber attacks experienced by my organization is on the rise 75% The frequency of cyber attacks experienced by my organization is on the rise 68% Launching a strong offensive against hackers and other cyber criminals is very important to my organization’s security strategy 53% My organization is vigilant in monitoring cyber attacks 46% My organization’s security budget is sufficient for mitigating most cyber attacks (intrusions) 27% 0% Ponemon Institute© Research Report 10% 20% 30% 40% 50% 60% 70% 80% Page 2 The biggest challenge is preventing a cyber attack. Eighty-five percent of respondents say preventing an attack is very difficult or difficult, as shown in Figure 3. Not as difficult is the ability to isolate (57 percent), to block (56 percent) and detect (46 percent). Figure 3. What is the biggest challenge in dealing with cyber attacks? Very difficult and difficult response combined How difficult are cyber attacks to prevent? 85% How difficult are cyber attacks to isolate? 57% How difficult are cyber attacks to block? 56% How difficult are cyber attacks to detect? 46% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% The malicious insider is considered the greatest threat. Thirty-seven percent of respondents are most concerned about attacks from malicious insider followed by 26 percent of respondents who say it is criminal syndicates, as shown in Figure 4. Figure 4. What attacker presents the greatest cyber threat to your organization today? 40% 37% 35% 30% 26% 25% 19% 20% 15% 15% 10% 5% 2% 1% Lone wolf hacker Other 0% Malicious insider Criminal syndicates Ponemon Institute© Research Report State sponsored attacker Hacktivists Page 3 The insider risk in the IT environment worries respondents most. As shown in Figure 5, the greatest area of potential cybersecurity risk is inside the organization. Thirty-six percent of respondents point to negligent insiders and 25 percent of respondents say malicious insiders are the greatest areas of cybersecurity risk. Thirty-three percent worry about organizational misalignment and complexity and 30 percent say it is a lack of system connectivity/visibility. Figure 5. Greatest areas of potential cybersecurity risk within the IT environment today Three responses permitted Negligent insiders 36% Organizational misalignment and complexity 33% Lack of system connectivity/visibility 30% Mobile/remote employees 29% Mobile devices such as smart phones 28% Malicious insiders 25% Cloud computing infrastructure and providers 25% Across 3rd party applications 23% 0% 5% 10% 15% 20% 25% 30% 35% 40% Lost intellectual property is the most negative consequence of a cyber attack. Respondents were asked to rank the most negative consequences of a cyber attack. According to Figure 6, lost intellectual property, reputation damage and disruption to business process are considered the most severe consequences. The types of cyber attacks against their organizations’ networks of most concern are advanced persistent threats (APT), malicious insiders and phishing and social engineering. Figure 6. Negative consequences as a result of a cyber attack or intrusion 10 = most severe to 1 = least severe Lost intellectual property (including trade secrets) 9.15 Reputation damage 8.64 Disruption to business process 8.08 Productivity decline 7.22 Damage to critical infrastructure 6.75 Customer turnover 4.55 Regulatory actions or lawsuits 3.97 Lost revenue Stolen or damaged equipment Cost of outside consultants and experts 1.00 Ponemon Institute© Research Report 2.89 2.37 1.99 2.50 4.00 5.50 7.00 8.50 10.00 Page 4 Cybersecurity strategies miss the mark Intuition not logical deduction is often used to determine if an organization is a target. When asked if respondents believe their organization is targeted for attack, 35 percent say no or it is unlikely. According to Figure 7, 35 percent say it is based on intuition or gut feel. One-third of respondents say it is based on logical deduction. However, 32 percent say they do not think they are targeted because they did not receive any warnings or alerts from intelligence sources. Figure 7. How do you know your organization is not targeted? 36% 35% 35% 35% 34% 34% 33% 33% 33% 32% 32% 32% 31% 31% Intuition (gut feel) Logical deduction Did not receive warnings or alerts from intelligence sources Respondents believe live intelligence is key to a strong cybersecurity defense. In the context of this survey, live intelligence refers to the near real time feed of information used to detect, evaluate and prioritize threats to the organization. As shown in Figure 8, 44 percent say such intelligence is essential and 32 percent say it is very important. Figure 8. How important is live intelligence to a strong cybersecurity defense? 50% 45% 44% 40% 32% 35% 30% 25% 20% 15% 15% 9% 10% 5% 0% Essential Very important Ponemon Institute© Research Report Important Not important Page 5 Cyber threat intelligence fails to provide an effective defense. Difficulty disseminating intelligence to key stakeholders in a timely fashion (84 percent of respondents) and a high false positive rate (81 percent) are the biggest problems facing an organization’s use of cyber threat intelligence, as shown in Figure 9. Other negatives are intelligence is too old to be actionable (67 percent), often inaccurate and incomplete (66 percent), activities are too difficult to manage (64 percent), does not integrate with various security technologies (59 percent) and complexity (56 percent). Figure 9. The problems with current cyber threat intelligence Strongly agree and agree response combined Difficult to disseminate threat intelligence to key stakeholders in a timely fashion 84% Has a high false positive rate 81% Often too old to be actionable 67% Often inaccurate or incomplete 66% Threat intelligence activities/process are difficult to manage 64% Does not integrate easily with various security technologies 59% Threat intelligence activities/process are very complex 56% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Cybersecurity effectiveness is static or in decline. Forty-three percent of respondents say their cybersecurity posture remains the same in terms of their effectiveness in combating attacks and intrusions and 24 percent of respondents say their organizations are actually less effective, according to Figure 10. Figure 10. How has your cybersecurity posture changed in the past 12 months? Cyber security posture remains the same in terms of its effectiveness in combating attacks and intrusions 43% Cyber security posture is more effective in combating attacks and intrusions Cyber security posture is less effective in combating attacks and intrusions 33% 24% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% Ponemon Institute© Research Report Page 6 The most serious risks do not receive the most budget. According to Figure 11, while user awareness about cyber threats and the supply chain are considered to have potentially the most impact on an organization’s security posture, they do not seem to receive funding commensurate with the risk they pose. Mobile and cloud security are receiving the most budget. Figure 11. How organizations are allocating budget to address security risks User awareness 25% 4% Supply chain 24% 15% 20% Mobile 34% 18% Cloud 27% 8% 8% Desktops/laptops 5% Perimeter servers 0% 5% 12% 10% 15% Security risk 20% 25% 30% 35% 40% Spending level Budget is considered the most significant barrier to achieving a strong cybersecurity posture. This is followed by insufficient visibility of people and business processes, according to Figure 12. This reinforces the concerns respondents have about the insider threat. Figure 12. Barriers to achieving a stronger cybersecurity posture Two responses permitted Insufficient resources or budget 49% Insufficient visibility of people and business processes 45% Lack of skilled or expert personnel 29% Lack of effective security technology solutions 24% Lack of oversight or governance 18% Complexity of compliance and regulatory requirements 13% Insufficient assessment of cyber security risks 12% 9% Lack of leadership 1% Other 0% Ponemon Institute© Research Report 10% 20% 30% 40% 50% 60% Page 7 An intelligence driven cyber defense An intelligence driven cyber defense against hackers and other cyber criminals eludes many organizations. Intelligence driven cyber defense is the ability of an organization to thwart an attacker’s offensive maneuvers while maintaining its defensive position. Respondents rate their ability to launch or implement an intelligence driven cyber defense against hackers and other cyber criminals as below average. The main reasons are not the availability of enabling technologies but the lack of expert personnel and budget, as shown in Figure 13. Figure 13. Why can’t your organization launch an intelligence driven cyber defense? More than one response permitted Do not have ample expert personnel 65% Lack of resources or budget 64% Not considered a security-related priority 39% Lack of enabling technologies 19% 0% 10% 20% 30% 40% 50% 60% 70% Organizations that succeed in an intelligence driven cyber defense use commercial threat intelligence feeds. Figure 14 reveals that respondents who rate their organizations’ ability to launch or implement an intelligence driven cyber defense as above average rely primarily on commercial threat intelligence feeds (68 percent) followed by collaborative threat intelligence groups, partnerships and forums (37 percent) or dedicated analysts on staff (35 percent). Figure 14. How does your organization gain actionable intelligence about hackers and other cyber criminals? More than one response permitted 68% Commercial threat intelligence feeds Collaborative threat intelligence groups, partnerships, forums 37% Dedicated analysts on staff 35% Other 2% 0% Ponemon Institute© Research Report 10% 20% 30% 40% 50% 60% 70% 80% Page 8 Geo-location is considered important for determining the severity of cyber threats. Seventyfour percent of respondents say it is essential or very important to know the geo-location of the threat. However, only 36 percent say they are very certain or certain about the origin of cyber attacks facing their organization, as shown in Figure 15. Figure 15. The certainty about the geo-location (origin) of cyber attacks 40% 34% 35% 30% 30% 25% 20% 20% 16% 15% 10% 5% 0% Very certain Certain Somewhat certain Not certain Understanding the attacker’s weak spots is the most important feature of a security intelligence tool. Respondents were asked to rate the importance of four features of security intelligence tools that provide offensive capabilities. Figure 16 shows that 72 percent of respondents say understanding the attacker’s weak spots is most important followed by technology that neutralizes attacks before they happen (69 percent). Also important is a technology that slows down or even halts the attacker’s computers (56 percent). Less important is a technology that uses big data analytics to achieve a strong cybersecurity defense (47 percent). Figure 16. Important features of security intelligence tools Just one number Very important and important response combined Technology that pinpoints the attacker’s weak spots 72% Technology that neutralizes attacks before they happen 69% Technology that slows down or even halts the attacker’s computers 56% Technology that uses big data analytics to achieve a strong cyber security defense 47% 0% Ponemon Institute© Research Report 10% 20% 30% 40% 50% 60% 70% 80% Page 9 The Cyber Kill Chain is viewed as helpful to an organization’s cyber defense. The term Cyber Kill Chain refers to a life cycle approach that allows information security professionals to proactively remediate and mitigate advanced threats as part of the organization’s intelligence driven defense process. Sixty-seven percent of respondents say they are familiar with the term Cyber Kill Chain. Almost all respondents familiar with the term say it is very or somewhat helpful to their organization’s cybersecurity defenses and strategy, according to Figure 17. Figure 17. How helpful is the Cyber Kill Chain to cybersecurity defenses and strategy? 50% 45% 40% 45% 39% 35% 30% 25% 20% 16% 15% 10% 5% 0% Very helpful Somewhat helpful Not helpful Most organizations in this study operate a Security Operations Center (SOC). Sixty-seven percent of respondents say their organization operates a SOC. These organizations are most likely to use a tiered approach to escalating and responding to cyber threats and attacks, as shown in Figure 18. In fact, 53 percent of respondents say they have three or more tiers. While 56 percent of organizations represented in this study operate a fully staffed 24/7/365 schedule, respondents are evenly divided as to whether such staffing is necessary in order to have a strong cyber defense. Figure 18. Utilization of a tiered approach to escalating and responding to cyber threats 40% 36% 35% 30% 30% 23% 25% 20% 15% 11% 10% 5% 0% Yes, 2 tiers Ponemon Institute© Research Report Yes, 3 tiers Yes, more than 3 tiers No Page 10 Technologies that minimize the insider threat are considered most promising. As discussed, insider negligence is a big worry for organizations. Accordingly, 46 percent of respondents would like to have technologies that minimize insider threats, including negligence, according to Figure 19. This is followed by technologies that secure information assets (39 percent) and intelligence about networks and traffic (35 percent). Figure 19. What are the technologies for a strong cybersecurity posture? Two responses permitted Technologies that minimize insider threats (including negligence) 46% 39% Technologies that secure information assets Technologies that provide intelligence about networks and traffic 35% Technologies that simplify the reporting of threats 23% Technologies that provide intelligence about attackers’ motivation and weak spots 23% Technologies that secure endpoints including mobile-connected devices Technologies that isolate or sandbox malware infections Technologies that secure the perimeter 18% 9% 7% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% Ponemon Institute© Research Report Page 11 Part 3. Conclusion The findings of this study reveal that cyber attacks are viewed as becoming more severe and frequent. Unfortunately, the security posture of many companies is not up to the challenge of dealing with cyber threats. Most respondents rate their cybersecurity posture as static or in decline. Following are recommendations to reverse this trend and achieve a more intelligence driven defense process: § Assess and improve the deficiencies in cyber threat intelligence. An intelligence driven cyber defense requires timely, accurate and actionable information. Respondents in organizations that are believed to have a more successful cyber defense rely primarily on commercial threat intelligence feeds. Respondents cite the difficulty in disseminating threat intelligence to key stakeholders in a timely fashion and a high false positive rate as to why cyber threat intelligence fails to provide an effective defense. § Proactive management of cybersecurity risks requires adequate budgets and skilled personnel. Throughout the study, respondents say it is a lack of budget and expertise that are the biggest barriers to a stronger cybersecurity posture. The research also reveals the areas believed to pose the greatest risks, user awareness and supply chain, are underfunded. § Reducing the insider threat should be a priority. According to the findings, the greatest cyber threat is the malicious insider. Further, the greatest areas of potential cybersecurity risk within the IT environment are negligent and malicious insiders. Accordingly, respondents believe technologies that minimize the insider threat, including negligence, are considered most promising. § Intelligence about the attacker’s weak spot would improve an organization’s cybersecurity posture. Seventy-two percent of respondents say understanding the attacker’s weak spots is most important followed by technology that neutralizes attacks before they happen (69 percent). § Consider adopting the Cyber Kill Chain. This life cycle approach allows information security professionals to proactively remediate and mitigate advanced threats as part of the organization’s intelligence driven defense process. Respondents in this research believe it is helpful to achieving a more effective cybersecurity defense and strategy. Ponemon Institute© Research Report Page 12 Part 4. Methods The survey instrument was fielded over a nine-day period from November 4, 2014 to November 13, 2014. All analysis was conducted subsequently. A sampling frame composed of 19,818 IT and IT security practitioners located in the United States were selected for participation in this survey. To ensure a knowledgeable respondent, the selected participants are familiar with their organizations’ defense against cybersecurity attacks and have some responsibility in directing cybersecurity activities. As shown in Table 1, 765 respondents completed the survey. Screening removed 94 surveys. The final sample was 671 surveys (or a 3.9 percent response rate). Table 1. Sample response Total sampling frame Total returns Rejected or screened surveys Final sample Freq 19,818 765 94 671 Pct% 100.0% 3.9% 0.5% 3.9% We calculated a margin of error for all statistical survey questions that yielded a proportional or percentage result. Most questions utilized the full sample size of n = 671 qualified respondents. Assuming a confidence level at the 95 percent level, the margin of error for survey questions ranged from ± 1.1 percent to ± 6.3 percent, with an overall average of ± 3.8 percent. Pie chart 1 reports the current position or organization level of respondents. By design, 56 percent of respondents reported their current position is at or above the supervisory level. Pie Chart 1. Current position or organizational level 5% 2%2%2% 17% Vice President Director Manager Supervisor 35% Technician 22% Staff Consultant Other 15% Ponemon Institute© Research Report Page 13 As shown in Pie Chart 2, more than half of the respondents (55 percent) indicated they report to the CIO and 18 percent report to the CISO. Pie Chart 2. Primary person respondent or IT security leader reports to 2% 3% 2%2% 3% 4% Chief Information Officer Chief Information Security Officer Chief Risk Officer 5% Compliance Officer 6% Human Resources VP 55% Chief Security Officer CEO/Executive Committee General Counsel 18% Data Center Management Other Pie Chart 3 reports the primary industry classification of respondents’ organizations. This chart identifies financial services (21 percent) as the largest segment, followed by federal government (18 percent) and healthcare (17 percent). Pie Chart 3. Primary industry classification 6% 4% 21% 8% Financial services Federal government Healthcare 10% Utilities Energy, oil & gas 18% Pharmaceuticals Chemical 16% All others 17% Ponemon Institute© Research Report Page 14 According to Pie Chart 4, more than half (62 percent) of the respondents are from organizations with a global headcount of over 1,000 employees. Pie Chart 4. Worldwide headcount of the organization 7% 8% 11% 12% Less than 100 100 to 500 501 to 1,000 1,001 to 5,000 19% 18% 5,001 to 25,000 25,001 to 75,000 More than 75,000 25% As shown in Figure 20, in addition to having employees in the United States, respondents also indicated their organization has employees in Europe (72 percent), Canada (71 percent), AsiaPacific (68 percent), Latin America (54 percent) and Middle East & Africa (44 percent). Figure 20. Where are participating companies’ employees located? 100% United States Europe 72% Canada 71% 68% Asia-Pacific Latin America 54% Middle East & Africa 44% 0% 20% Ponemon Institute© Research Report 40% 60% 80% 100% 120% Page 15 Part 5. Caveats There are inherent limitations to survey research that need to be carefully considered before drawing inferences from findings. The following items are specific limitations that are germane to most web-based surveys. Non-response bias: The current findings are based on a sample of survey returns. We sent surveys to a representative sample of individuals, resulting in a large number of usable returned responses. Despite non-response tests, it is always possible that individuals who did not participate are substantially different in terms of underlying beliefs from those who completed the instrument. Sampling frame bias: The accuracy is based on contact information and the degree to which the list is representative of individuals who are IT or IT security practitioners located in the United States. We also acknowledge that the results may be biased by external events such as media coverage. We also acknowledge bias caused by compensating subjects to complete this research within a specified time period. Self-reported results: The quality of survey research is based on the integrity of confidential responses received from subjects. While certain checks and balances can be incorporated into the survey process, there is always the possibility that a subject did not provide accurate responses. Ponemon Institute© Research Report Page 16 Appendix: Detailed Survey Results The following tables provide the frequency or percentage frequency of responses to all survey questions contained in this study. All survey responses were captured from November 4, 2014 to November 13, 2014. Survey response Total sampling frame Total returns Rejected or screened surveys Response rate Freq 19,818 765 94 671 Part 1. Screening questions S1. How familiar are you with your organization’s defense against cybersecurity attacks? Very familiar Familiar Somewhat familiar No knowledge (Stop) Total Pct% 50% 32% 18% 0% 100% S2. Do you have any responsibility in directing cybersecurity activities within your organization? Yes, full responsibility Yes, some responsibility Yes, minimum responsibility No responsibility (Stop) Total Pct% 32% 44% 24% 0% 100% Part 2. Priorities Q1a. How familiar are you with the term Cyber Kill Chain? Very familiar Familiar Not familiar No knowledge Total Pct% 27% 40% 18% 15% 100% Q1b. [Those selecting very familiar or familiar], How helpful is the Cyber Kill Chain to your organization’s cybersecurity defenses and strategy? Very helpful Somewhat helpful Not helpful Total Pct% 39% 45% 16% 100% Q2a. Does your organization operate a Security Operations Center (SOC)? Yes No Total Pct% 67% 33% 100% Ponemon Institute© Research Report Pct% 100.0% 3.9% 0.5% 3.4% Page 17 Q2b. If yes [Q2a], does your organization’s SOC utilize a tiered approach to escalating and responding to cyber threats and attacks? Yes, 2 tiers Yes, 3 tiers Yes, more than 3 tiers No Total Q2c. If yes [Q2a], what best describes your SOC’s operating schedule. Our organization’s SOC operates a fully staffed 24/7/365 schedule Our organization’s SOC has teams that have on-call staff to work off hours Total Pct% 11% 30% 23% 36% 100% Pct% 56% 44% 100% Q2d. If yes [Q2a], In your opinion, is a SOC schedule that is 24/7/365 and fully staffed necessary to have a strong cyber defense? Yes No Total Pct% 50% 50% 100% Q2e. If yes [Q2a], Is your organization’s SOC operated by a managed security services provider (MSSP)? Yes, fully outsourced Yes, partially outsourced No Total Pct% 28% 33% 39% 100% Q3a. Please rate your organization’s ability to launch or implement an intelligence driven cyber defense against hackers and other cyber criminals? Please use the following 10point scale. 1 or 2 3 or 4 5 or 6 7 or 8 9 or 10 Total Extrapolated value Pct% 31% 24% 10% 15% 20% 100% 4.9 Q3b. If your rating is below 5, what are the main reasons why your organization is not fully capable of launching an intelligence driven cyber defense? Do not have ample expert personnel Lack of resources or budget Not considered a security-related priority Lack of enabling technologies Total Pct% 65% 64% 39% 19% 187% Ponemon Institute© Research Report Page 18 Q3c. If your rating is above 5, how does your organization gain actionable intelligence about hackers and other cyber criminals? Please check all that apply. Commercial threat intelligence feeds Collaborative threat intelligence groups, partnerships, forums Dedicated analysts on staff Other (please specify) Total Q4. Please rank each one of the following five (5) cybersecurity objectives in terms of a business priority within your organization from 5 = highest priority to 1 = lowest priority. Compliance Confidentiality Interoperability Integrity Availability Q5. What types of cyber attacks against your organization’s networks cause the greatest concern? Please select the top four (4) choices only. Advanced persistent threats (APT) Malicious insiders Phishing and social engineering Compromised/stolen credentials Denial of service (DoS) Malware Man-in-the-middle attack Server side injection (SSI) Registration spamming Root kits Web scrapping Clickjacking Botnets Watering hole attacks Cross-site scripting SQL and code injection Contact form or comment spam Total Ponemon Institute© Research Report Pct% 68% 37% 35% 2% 142% Average rank 4.65 4.07 3.36 2.14 1.98 Rank order 1 2 3 4 5 Pct% 54% 53% 48% 44% 36% 33% 28% 25% 19% 14% 10% 9% 8% 6% 5% 5% 3% 400% Page 19 Q6. Please rank each one of the following ten (10) negative consequences that your organization might have experienced as a result of a cyber attack or intrusion, from 10 = most severe to 1 = least severe. Lost intellectual property (including trade secrets) Reputation damage Disruption to business process Productivity decline Damage to critical infrastructure Customer turnover Regulatory actions or lawsuits Lost revenue Stolen or damaged equipment Cost of outside consultants and experts Q7. Please rate the following statements about security posture using the five-point scale provided below each item. Q7a. My organization is vigilant in monitoring cyber attacks. Q7b. My organization’s security budget is sufficient for mitigating most cyber attacks (intrusions). Q7c. The severity of cyber attacks experienced by my organization is on the rise. Q7d. The frequency of cyber attacks experienced by my organization is on the rise. Q7e. Launching a strong offensive against hackers and other cyber criminals is very important to my organization’s security strategy. Q8. Please rate the following statements about threat intelligence using the five-point scale provided below each item. Q8a. My organization’s cyber threat intelligence is often too old (out of date) to be actionable Q8b. My organization’s cyber threat intelligence is often inaccurate or incomplete Q8c. My organization’s cyber threat intelligence activities or process is very complex Q8d. My organization’s cyber threat intelligence activities or process is difficult to manage Q8e. My organization’s cyber threat intelligence has a high false positive rate Q8f. It is difficult to disseminate threat cyber intelligence to key stakeholders in a timely fashion Q8g. My organization’s cyber threat intelligence does not integrate easily with various security technologies Ponemon Institute© Research Report Average rank 9.15 8.64 8.08 7.22 6.75 4.55 3.97 2.89 2.37 1.99 Strongly agree Rank order 1 2 3 4 5 6 7 8 9 10 Agree Unsure Disagree Strongly disagree 21% 25% 21% 21% 12% 12% 15% 24% 27% 22% 42% 33% 15% 6% 4% 38% 30% 19% 6% 7% 23% 30% 23% 14% 10% Strongly agree Agree Unsure Disagree Strongly disagree 36% 31% 13% 10% 10% 33% 33% 14% 11% 9% 27% 29% 18% 15% 11% 31% 33% 22% 12% 2% 45% 36% 11% 5% 3% 49% 35% 6% 6% 4% 30% 29% 23% 12% 6% Page 20 Q9. What statement best describes changes to your organization’s cybersecurity posture over the past 12 months? Our organization’s cybersecurity posture is more effective in combating attacks and intrusions. Our organization’s cybersecurity posture is less effective in combating attacks and intrusions. Our organization’s cybersecurity posture remains the same in terms of its effectiveness in combating attacks and intrusions. Total Q10a. The following table contains 6 factors that can impact an organization’s security posture. Please allocate the security risk inherent in each one of the 6 factors as experienced by your organization. Note that the sum of your risk allocation must equal 100 points. User awareness Desktops/laptops Mobile Cloud Perimeter servers Supply chain Total points Q10b. Please allocate the security budget or spending level for each one of the 6 factors as experienced by your organization. Note that the sum of your allocation must equal 100 points. User awareness Desktops/laptops Mobile Cloud Perimeter services Supply chain Total points Ponemon Institute© Research Report Pct% 33% 24% 43% 100% Points 25 8 20 18 5 24 100 Points 4 8 34 27 12 15 100 Page 21 Q11. What do you see as the most significant barriers to achieving a strong cybersecurity posture within your organization today? Please choose only your top two choices. Insufficient resources or budget Insufficient visibility of people and business processes Lack of skilled or expert personnel Lack of effective security technology solutions Lack of oversight or governance Complexity of compliance and regulatory requirements Insufficient assessment of cybersecurity risks Lack of leadership Other (please specify) Total Q12. Where are you seeing the greatest areas of potential cybersecurity risk within your IT environment today? Please choose only your top three choices. Negligent insiders Organizational misalignment and complexity Lack of system connectivity/visibility Mobile/remote employees Mobile devices such as smart phones Cloud computing infrastructure and providers Malicious insiders rd Across 3 party applications Removable media (USB sticks) and/or media (CDs, DVDs) Desktop or laptop computers Data centers The server environment Network infrastructure environment (gateway to endpoint) Within operating systems Virtual computing environments (servers, endpoints) Total Ponemon Institute© Research Report Pct% 49% 45% 29% 24% 18% 13% 12% 9% 1% 200% Pct% 36% 33% 30% 29% 28% 25% 25% 23% 18% 15% 12% 9% 7% 5% 5% 300% Page 22 Q13. What are the most promising technologies in general? Please choose only your top two choices. Technologies that minimize insider threats (including negligence) Technologies that secure information assets Technologies that provide intelligence about networks and traffic Technologies that provide intelligence about attackers’ motivation and weak spots Technologies that simplify the reporting of threats Technologies that secure endpoints including mobile-connected devices Technologies that isolate or sandbox malware infections Technologies that secure the perimeter Total Q14. What cyber defenses does your organization deploy to protect your organization from attacks or intrusions? Please rate each one of the following defenses in terms of its importance in preventing or quickly detecting cyber attacks using the following 5-point scale. Select 5 (not applicable) if your organization does not deploy or implement the given defense. 1 = Very important, 2 = Important, 3 = Somewhat important, 4 = Not important, 5 = Not applicable Security intelligence systems including SIEM Identity and authentication systems Anti-virus/anti-malware Content aware firewalls including next generation firewalls (NGFW) Secure network gateways including virtual private networks (VPN) Anti-DoS/DDoS (Denial of Services) Intrusion prevention systems (IPS) Intrusion detection systems (IDS) Endpoint security systems Web application firewalls (WAF) Enterprise encryption for data at rest Enterprise encryption for data in motion Secure coding in the development of new applications Mobile device management Other crypto technologies including tokenization Data loss prevention systems ID credentialing including biometrics Ponemon Institute© Research Report Pct% 46% 39% 35% 23% 23% 18% 9% 7% 200% Very important Important Somewhat Important Not important Irrelevant 40% 41% 30% 32% 26% 33% 12% 17% 23% 10% 15% 11% 6% 1% 3% 32% 29% 21% 10% 8% 28% 31% 26% 26% 21% 23% 23% 23% 29% 23% 27% 25% 30% 25% 25% 24% 32% 25% 30% 25% 26% 23% 33% 31% 6% 11% 12% 13% 16% 19% 10% 12% 5% 10% 5% 11% 7% 10% 9% 10% 25% 18% 18% 24% 40% 30% 8% 23% 9% 5% 21% 18% 20% 20% 20% 16% 39% 23% 44% 12% 21% 12% 8% 18% 8% Page 23 Q15. Who is most responsible for defining your organization’s cybersecurity strategy? Chief information officer (CIO) Chief information security officer (CISO) No one person or function has overall responsibility Chief technology officer (CTO) Outside managed service provider (MSSP) Chief security officer (CSO) Business unit management Chief executive officer (CEO) Chief risk officer (CRO) Data center management Corporate compliance or legal department Website development leader/manager Total Please rate your answer using a four-point scale. Q16a. In your opinion, how difficult are cyber attacks to detect? Q16b. In your opinion, how difficult are cyber attacks to block? Q16c. In your opinion, how difficult are cyber attacks to prevent? Q16d. In your opinion, how difficult are cyber attacks to isolate? Pct% 35% 25% 15% 7% 4% 3% 3% 2% 2% 2% 2% 0% 100% Very difficult Not difficult Easy 21% 25% 42% 12% 32% 24% 40% 4% 45% 40% 11% 4% 31% 26% 40% 3% Q17. Using the following 10-point scale, please rate the overall effectiveness of your organization’s ability to use intelligence to reduce risk or mitigates attacks. 1 or 2 3 or 4 5 or 6 7 or 8 9 or 10 Total Extrapolated value Pct% 7% 20% 41% 19% 13% 100% 5.72 Q18a. Do you believe your organization is presently targeted for attack? Yes with certainty Yes, very likely Yes, likely Somewhat likely Unlikely No Total Pct% 11% 20% 18% 16% 5% 30% 100% Ponemon Institute© Research Report Difficult Page 24 Q18b. If no, how do you know your organization is not targeted? Logical deduction Did not receive warnings or alerts from intelligence sources Intuition (gut feel) Total Pct% 33% 32% 35% 100% Q19. In your opinion, how important is geolocation for determining the severity of cyber threats to your organization? Essential Very important Important Not important Irrelevant Total Pct% 39% 35% 16% 8% 2% 100% Q20. How certain are you about the geolocation (origin) of cyber attacks posed against your organization? Very certain Certain Somewhat certain Not certain Total Pct% 16% 20% 30% 34% 100% Q21. What attacker presents the greatest cyber threat to your organization today? Please select only one choice. Malicious insider Criminal syndicates State sponsored attacker Hacktivists Lone wolf hacker Other (please specify) Total Pct% 37% 26% 19% 15% 2% 1% 100% Q22. In your opinion, how important is live intelligence to achieving a strong cybersecurity defense? Essential Very important Important Not important Irrelevant Total Pct% 44% 32% 15% 9% 0% 100% Ponemon Institute© Research Report Page 25 Part 3. Your role and organization D1. What organizational level best describes your current position? Senior Executive Vice President Director Manager Supervisor Technician Staff Consultant Contractor Total Pct% 1% 2% 17% 22% 15% 35% 5% 2% 1% 100% D2. Check the Primary Person you or your IT security leader reports to within the organization. CEO/Executive Committee Chief Financial Officer General Counsel Chief Information Officer Chief Information Security Officer Compliance Officer Human Resources VP Chief Security Officer Data Center Management Chief Risk Officer Other Total Pct% 2% 1% 2% 55% 18% 5% 4% 3% 2% 6% 2% 100% D3. What industry best describes your organization’s industry focus (stratified list)? Utilities Energy, oil & gas Pharmaceuticals Healthcare Financial services Chemical Federal government (various departments) All others Total Pct% 16% 10% 8% 17% 21% 6% 18% 4% 100% D4. Where are your employees located? United States Canada Europe Asia-Pacific Middle East & Africa Latin America (including Mexico) Pct% 100% 71% 72% 68% 44% 54% Ponemon Institute© Research Report Page 26 D5. What is the worldwide headcount of your organization? Less than 100 100 to 500 501 to 1,000 1,001 to 5,000 5,001 to 25,000 25,001 to 75,000 More than 75,000 Total Pct% 7% 11% 19% 25% 18% 12% 8% 100% Ponemon Institute Advancing Responsible Information Management Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations. As a member of the Council of American Survey Research Organizations (CASRO), we uphold strict data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or company identifiable information in our business research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions. Ponemon Institute© Research Report Page 27
© Copyright 2026 Paperzz