Advanced Threats in Financial Services: A Study of North America & EMEA Sponsored by Arbor Networks Independently conducted by Ponemon Institute LLC Publication Date: May 2015 Ponemon Institute© Research Report Advanced Threats in Financial Services A Study of North America & EMEA1 Ponemon Institute, May 2015 Part 1. Introduction Ponemon Institute is pleased to present the results of Advanced Threats in Financial Services: A Study of North American & EMEA, sponsored by Arbor Networks. In the wake of mega breaches, how are financial services preventing or stopping advanced threats (ATs). Are they able to evaluate and measure the effectiveness of their cybersecurity posture to make informed decisions about their security strategy? Are they making the appropriate investments in technologies and expertise to avoid an AT or DDoS attack? In this research, we define ATs as a type of cyber attack designed to evade an organization’s present technical and process countermeasures. For example, ATs are those that are specifically designed to bypass firewalls, intrusion detection systems and anti-malware programs. We surveyed 844 IT and IT security practitioners in North America and in 14 countries in Europe, Middle East & Africa (EMEA). To ensure a knowledgeable and quality response, only IT practitioners who are familiar with both their companies’ defense against cybersecurity attacks and are responsible for directing cybersecurity activities within their company participated in this study. As shown in Figure 1, respondents worry much more about ATs than DDoS attacks. ATs are considered to occur more frequently than DDoS attacks and more difficult to detect. Key takeaways from this research include the following: § Financial service companies have almost one serious cyber attack per month. Seventy-nine percent of respondents say these cyber attacks were considered an AT and 55 percent say they were DDoS attacks. § The use of shared threat intelligence was more likely to identify DDoS attacks than ATs. Known signatures are more likely to identify ATs. § To deal with ATs and DDoS attacks, companies are most likely to install controls that prevent infiltration followed by incident response procedures. § Financial service companies are faster at detecting and containing DDoS attacks than ATs. To improve time to detect and contain, most companies are integrating threat intelligence into IR function and implementing new forensic security tools. 1 North America includes Canada and the United States. EMEA countries include Denmark, France, Germany, Italy, Netherlands, Poland, Saudi Arabia, South Africa, Spain, Sweden, Switzerland, Turkey, United Arab Emirates and United Kingdom. Ponemon Institute© Research Report Page 1 Part 2. Key findings The complete audited findings are presented in the appendix of this report. We have organized the report according to the following topics: § § § § § The state of ATs and DDoS attacks in financial services How companies deal with advanced threats and denial of service attacks Cyber Kill Chain and advanced threats Budget for advanced threats Industry differences: financial services vs. retail companies The state of ATs and DDoS attacks in financial services Companies have an average of almost one serious cyber attack per month. In the context of this research, cyber attacks refer to all computer-based assaults on an organization’s IT infrastructure, applications, databases and source data. Cyber attacks typically involve malicious software or code that seeks to infiltrate networks or infect endpoint devices. Attack methods may also involve malicious or criminal insiders. Based on the definition above, respondents believe their organization experienced almost seven cyber attacks in the past 12 months. Seventy-nine percent of respondents say they were considered an AT and 55 percent of respondents say it was a denial of service (DDoS) attack. Forensic evidence informed by degradation of application or system performance most often revealed the attack was an AT or DDoS, as shown in Figure 2. Shared intelligence by customer or partner due to lack of available in-house expertise most often determined the attack to be a DDoS. Figure 2. How did you know the attack was an AT or DDoS? 34% 35% Forensic evidence informed by degradation of application or system performance 25% Shared threat intelligence by customer or partner due to lack of available internal resources 36% 23% Known signature of the attacker 13% 20% 17% Gut feel 0% 5% 10% 15% 20% 25% 30% 35% 40% How did you know that the attack was an AT? How did you know that the attack was a DDoS? Ponemon Institute© Research Report Page 2 Companies need to improve their effectiveness in containing ATs and DDoS attacks. While the majority of respondents (58 percent) consider their companies’ IT security function as effective in quickly detecting ATs, they are lagging behind in the ability to contain both ATs and DDoS attacks, as shown in Figure 3. Figure 3. Perceptions about ATs and DDoS Strongly agree and agree responses combined Security technologies and personnel are effective in quickly detecting advance threats 58% Security technologies and personnel are effective in containing advance threats 49% Security technologies and personnel are effective in quickly detecting denial of service attacks 49% Security technologies and personnel are effective in containing denial of service attacks 48% 0% Ponemon Institute© Research Report 10% 20% 30% 40% 50% 60% 70% Page 3 To deal with both types of attacks, most companies installed controls to prevent infiltration. As shown in Figure 4, when asked what steps their companies took to minimize or contain the impact of the AT and DDoS attacks, the most common was to install controls to prevent infiltration and implement incident response procedures (48 percent and 45 percent of respondents, respectively). In the case of reducing the consequences of a DDoS attack, respondents say their company was more likely to install controls to quickly detect and block infiltration (51 percent of respondents). Figure 4. Steps taken to minimize the impact of ATs and DDoS attacks More than one response permitted 48% 46% Installed controls to prevent infiltration 45% 47% Implemented incident response procedures Installed controls to quickly detect and block infiltration 44% Established threat sharing with other companies or government entities 43% 45% Conducted specialized training for IT security team 51% 21% 19% 0% 1% Other 0% 10% 20% 30% 40% 50% 60% Steps taken to minimize or contain the impact of the AT Steps taken to minimize or contain the impact of the DDoS attacked Ponemon Institute© Research Report Page 4 How companies deal with cyber attack incidents How security incidents are investigated. In the context of this study, a security incident is an event that potentially results in adverse consequences to an organization’s network or enterprise system. It also includes events that constitute violations of security policies, standardized procedures, or acceptable use policies by employees and other insiders. On average, SecOps and/or CSIRT teams in the companies represented in this study investigate 226 security incidents each month. The average number of employees in a company responsible for cybersecurity incidents is 19. The events most often considered a security incident are denial of service attacks (99 percent of respondents), targeted attacks that result in the theft of customer data (99 percent of respondents), reported wrongdoing by employees (95 percent of respondents), and lost or stolen devices (90 percent). These incidents are followed by targeted attacks that result in the theft of high-value intellectual properties (88 percent of respondents) and reported wrongdoing by third parties (81 percent of respondents). Figure 5. What is considered a security incident? More than one response permitted Denial of service attack 99% Targeted attack that results in the theft of customer data 99% 95% Reported wrongdoing by employee Lost or stolen device 90% Targeted attack that results in the theft of highvalue intellectual properties 88% Reported wrongdoing by third party 81% Other 3% 0% Ponemon Institute© Research Report 20% 40% 60% 80% 100% 120% Page 5 Companies are faster at detecting denial of service attacks. The majority of organizations use Mean Time to Identify (MTTI) and Mean Time to Contain (MTTC) metrics to determine the effectiveness of their organization’s incident response and containment processes. Sixty-two percent of respondents use the MTTI metric to understand the time it takes to detect that an incident has occurred and 66 percent of respondents say they use the MTTC metric to measure the time it takes for a responder to resolve a situation and ultimately restore service. As shown in Figure 6, the average time to detect an AT attack is almost 98 days. In contrast, the average time to detect a denial of services is approximately 27 days. Once the incident has been detected, the average time to contain an AT attack is approximately 26 days. In contrast, the average time to contain a denial of services is approximately 13 days. Figure 6. The average time to detect and resolve an AT and DDoS extrapolated value Extrapolated value (days) 120 100 98 80 60 40 27 26 13 20 0 MTTI for advanced threats MTTI for denial of service Ponemon Institute© Research Report MTTC for advanced threats MTTC for denial of service Page 6 Steps to improve the time to detect and contain an attack are similar. Forty-two percent of respondents anticipate that the time to detect an incident will improve in the next 12 months. As shown in Figure 7, to achieve this improvement, 74 percent of respondents are integrating threat intelligence into the incident response process and 60 percent are implementing new forensic security tools. Forty percent of respondents anticipate they will improve their effectiveness in containing attacks in the next 12 months. To achieve this improvement, 73 percent are integrating threat intelligence into the incident response function and 60 percent of respondents are implementing new forensic security tools. Other popular steps are to increase security operations staff and to improve their triage process. Figure 7. Steps to improve MTTI & MTTC 74% 73% Integrate threat intelligence into IR function 60% 60% Implement new forensic security tools Increase security operations staff 56% 53% Improve triage process 55% 53% 40% 41% Introduce hunting team to look for attacks 1% 2% Other 0% 10% Steps to improve MTTI Ponemon Institute© Research Report 20% 30% 40% 50% 60% 70% 80% Steps to improve MTTC Page 7 Cyber Kill Chain and dealing with advanced threats The majority of respondents are familiar with the term Cyber Kill Chain. Seventy-eight percent of respondents are familiar with the term and were asked questions regarding their companies’ experience and allocation of resources to this strategy. The term Cyber Kill Chain refers to a life cycle approach that allows information security professionals to proactively remediate and mitigate ATs as part of the organization’s intelligence-driven defense process. This process is organized into the following seven phases: 1. Reconnaissance - Research, identification and selection of targets. 2. Weaponization - Coupling a remote access trojan with an exploit into a deliverable payload, typically by means of an automated tool (weaponizer). 3. Delivery - Transmission of the weapon to the targeted environment. 4. Exploitation - After the weapon is delivered to a victim’s host, exploitation triggers the nefarious code. 5. Installation - Installation of a remote access trojan or backdoor on the victim system allowing the adversary to maintain persistence inside the environment. 6. Command & control (C2) - Typically, compromised hosts must beacon outbound to an Internet controller server to establish a C2 channel. Once the C2 channel establishes, intruders have “hands on the keyboard” access inside the target environment. 7. Actions on objectives - After progressing through the first six phases, the intruders take actions to achieve their original objectives such as data exfiltration. Reconnaissance is the most difficult phase to stop or minimize ATs. While the majority of respondents believe it is impossible, very difficult or difficult to deal with ATs in every phase of the kill chain, reconnaissance or the research, identification and selection of targets, according to 92 percent of respondents, is the most challenging (Figure 8). Installation of a remote access Trojan or backdoor on the victim system allowing the adversary to maintain persistence inside the environment is the next most difficult phase. Figure 8. Ability to stop or minimize ATs in seven phases of the Cyber Kill Chain Impossible, very difficult and difficult responses combined Reconnaissance 92% Installation 81% Actions on Objectives 74% Exploitation 73% Weaponization 70% Delivery 70% 66% Command & Control (C2) 0% 10% Ponemon Institute© Research Report 20% 30% 40% 50% 60% 70% 80% 90% 100% Page 8 How much money is allocated for each phase of the Cyber Kill Chain? As shown in Figure 9, while the reconnaissance phase is the most impossible or difficult phase in dealing with ATs, it is also the phase that receives the least amount of resources. Twenty percent of total IT security resources are applied to the exploitation phase when after the weapon is delivered to a victim’s host, exploitation triggers the nefarious code. Eighteen percent of respondents say actions on objective when intruders take actions to achieve their original objectives such as data exfiltration. Figure 9. Percentage of total IT total security resources allocated to each phase Exploitation 20% Actions on Objectives 18% Installation 16% Command & Control (C2) 14% Weaponization 13% Delivery 13% Reconnaissance 2% 0% 5% 10% 15% 20% 25% Extrapolated value Ponemon Institute© Research Report Page 9 How capable are companies in stopping or minimizing each phase of the Cyber Kill Chain? As described above, the most difficult or impossible phase in which to stop ATs is the reconnaissance phase. The result is that only 10 percent of respondents rate their ability to stop or minimize ATs as high (7+ on a scale of 1 = lowest ability and 10 = the highest ability). In contrast, 71 percent of respondents say their ability is highest in the exploitation phase, which receives the most resources. However, 69 percent rate their ability as very high in the delivery phase, which does not receive as much of the available resources. Figure 10. Ability to stop or minimize ATs in each phase On a scale of 1 = lowest ability to 10 = highest ability, percentage of respondents who rated their ability 7+ Exploitation 71% Delivery 69% Actions on Objectives 66% Installation 60% Command & Control (C2) 60% 58% Weaponization Reconnaissance 10% 0% 10% Ponemon Institute© Research Report 20% 30% 40% 50% 60% 70% 80% Page 10 The most promising technology to stop ATs in the Cyber Kill Chain is intelligence about network traffic, according to 71 percent of respondents. Sixty-three percent select technologies that isolate or sandbox malware infections and 49 percent pick technologies that secure information assets as most promising. Considered the least effective in the Cyber Kill Chain are the technologies that simplify the reporting of threats and those that minimize insider threats (including negligence), according to 5 percent of respondents. Figure 11. Most promising technologies in the Cyber Kill Chain Three responses permitted Technologies that provide intelligence about networks and traffic 71% Technologies that isolate or sandbox malware infections 63% Technologies that secure information assets 49% Technologies that provide intelligence about attackers’ motivation and weak spots 41% Technologies that secure the perimeter 36% Technologies that secure endpoints including mobile-connected devices 22% 13% Technologies that simplify the reporting of threats Technologies that minimize insider threats (including negligence) 5% 0% Ponemon Institute© Research Report 10% 20% 30% 40% 50% 60% 70% 80% Page 11 Budget for advanced threats defense Personnel and technologies receive the most budget. Respondents were asked to allocate 100 points to indicate the relative proportion of each area of spending to the 2015 IT security budget for their organization, as shown in Figure 12. Forty points were allocated to technologies followed by 37 points for in-house personnel. This is followed by managed (third party) services (20 points) followed by cash outlays (3 points). Figure 12. Allocation of resources to defend against ATs 45 40 37 40 35 30 25 20 20 15 10 3 5 Technologies In-house personnel Managed (third party) services Other cash outlays According to Table 1, the average total IT budget is approximately $145 million. Eleven percent or approximately $16 million is allocated to IT security activities and investments. For those companies planning to use the Cyber Kill Chain, respondents say approximately $3.5 million will be spent. Table 1. The average budget for IT, IT security and Cyber Kill Chain 2015 IT budget Extrapolated value $144,900,000 2015 IT security activities and investments (11 percent) $15,939,000 2015 Cyber Kill Chain Activities (22 percent of the IT security budget) $ 3,506,580 Ponemon Institute© Research Report Page 12 Industry differences: financial services vs. retail This research was conducted in both the financial and retail industry sectors. In the retail sector, 675 IT and IT security practitioners participated. These findings are presented in a companion report, Advanced Threats in the Retail Industry: A Study of North America & EMEA IT Security Practitioners. Industry differences emerged that reveal how much more effective financial services companies are in managing and reducing the impact of ATs and DDoS attacks. Financial services are more confident in their ability to contain ATs and DDoS attacks. As shown in Figure 13, financial services are more confident than retail companies in containing both ATs and DDoS attacks. Retail is more confident in containing ATs than DDoS attacks. Figure 13. Effectiveness in containing ATs and DDoS attacks On a scale of 1 = lowest ability to 10 = highest ability percentage of respondents who rated their ability 7+ 70% 64% 63% 60% 50% 44% 40% 31% 30% 20% 10% 0% Effectiveness in containing ATs Retail Ponemon Institute© Research Report Effectiveness in containing DDoS attacks Financial services Page 13 Financial services are more likely to measure the time it takes to detect and contain an AT. As shown in Figure 14, 62 percent of respondents say their organizations use MTTI and 66 percent use MTTC metrics. In contrast, 40 percent of retail companies are not using MTTI and MTTC metrics to determine their effectiveness in responding to incidents. If they do use these measures, they are most likely to measure the time it takes to contain an attack. Figure 14. Time-dependent metrics used to determine incident response effectiveness 70% 60% 62% 66% 58% 53% 50% 40% 40% 28% 30% 20% 5% 10% 5% 0% MTTI MTTC Retail Other We don’t utilize timedependent operational metrics Financial services Financial services are faster to detect and contain an incident. It takes almost twice as long for retail companies to detect if an incident has occurred (196.5 days for retail companies vs. 98.1 for financial services), according to Figure 15. Financial services companies in this study are also faster to contain ATs and DDoS attacks. Figure 15. Time it takes to detect and contain an AT Extrapolated value (days) 196.5 Average MTTI experienced for advanced threats 98.1 39.2 Average MTTI experienced for denial of service 27.2 38.5 Average MTTC experienced for advanced threats 26.1 18.0 Average MTTC experienced for denial of service 12.7 0 Retail Ponemon Institute© Research Report 50 100 150 200 250 Financial services Page 14 Financial services are more optimistic they can reduce the time to detect and contain attacks. According to Figure 16, in the next 12 months respondents in financial services are far more more optimistic that they will improve their ability to detect and contain incidents. Figure 16. Will MTTI and MTTC improve in the next 12 months? Yes response 42% 45% 40% 40% 35% 30% 32% 29% 25% 20% 15% 10% 5% 0% Do you expect MTTI to decrease (improve) over the next 12 months? Retail Do you expect MTTC to decrease (improve) over the next 12 months? Financial services The use of threat intelligence will be used to improve detection. To achieve a reduction in the time to detect an attack, both retail and financial services will integrate intelligence into the incident response time, as revealed in Figure 17. Financial services are more likely to hire security operations staff and introduce new forensic security tools. Figure 17. Steps taken to reduce the time it takes to detect attacks 60% Integrate threat intelligence into IR function 50% 55% Improve triage process Increase security operations staff 41% Implement new forensic security tools 40% 33% Introduce hunting team to look for attacks 56% 60% 40% 1% 1% Other 0% Retail Ponemon Institute© Research Report 74% 10% 20% 30% 40% 50% 60% 70% 80% Financial services Page 15 Threat intelligence is the number one step to reduce the time to contain attacks. In general, According to Figures 17 and 18, financial services are more likely to take steps to detect and contain attacks. This could contribute to the optimism financial services have in their ability to reduce the time to detect and contain attacks. Specifically, 73 percent of respondents in financial services will integrate threat intelligence into the incident response function and 57 percent of respondents in retail companies say they will do so. Again, financial services are more likely to implement new forensic security tools and hire more staff. Figure 18. Steps taken to reduce the time to contain attacks 57% Integrate threat intelligence into IR function 49% 53% Improve triage process Implement new forensic security tools 41% Increase security operations staff 41% Introduce hunting team to look for attacks 35% 41% 60% 53% 0% 2% Other 0% Retail Ponemon Institute© Research Report 73% 10% 20% 30% 40% 50% 60% 70% 80% Financial services Page 16 Part 3. Methods The sampling frame is composed of 20,504 IT and IT security practitioners in North America and in 14 countries in EMEA who are familiar with their companies’ defense against cybersecurity attacks and have responsibility in directing cybersecurity activities within their company. As shown in Table 2, 931 respondents completed the survey. Screening removed 87 surveys. The final sample was 844 surveys (or a 4.1 percent response rate). Table 2. Sample response Total sampling frame Total returns Rejected or screened surveys Final sample Freq 20,504 931 87 844 Pct% 100.0% 4.5% 0.4% 4.1% Pie Chart 1 reports the current position or organizational level of the respondents. More than half of respondents (56 percent) reported their current position as supervisory or above. Pie Chart 1. Current position or organizational level 4% 7% 16% Executive/VP Director Manager 35% Supervisor 19% Technician Associate/staff 17% Pie Chart 2 identifies the primary person the respondent or their supervisor reports to. Fifty-nine percent of respondents report to the chief information officer and 19 percent report to the chief information security officer. Pie Chart 2. The primary person you or your supervisor reports to 6% 2% 7% Chief Information Officer Chief Information Security Officer 7% Compliance Officer Chief Technology Officer Chief Risk Officer 19% Ponemon Institute© Research Report 59% Other Page 17 Pie Chart 3 reports the primary financial services industry focus of respondents’ organizations. This chart identifies banking (30 percent) as the largest segment, followed by insurance (20 percent) and brokerage (14 percent). Pie Chart 3. Primary financial service industry focus 6% 2% 8% 30% Banking Insurance Brokerage 9% Payments General services Investment management 10% Financial tech Other 20% 14% According to Pie Chart 4, more than half of the respondents (69 percent) are from organizations with a global headcount of 1,000 or more employees. Pie Chart 4. Worldwide headcount of the organization 6% 7% 11% < 500 24% 500 to 1,000 1,001 to 5,000 5,001 to 25,000 22% 25,001 to 75,000 > 75,000 30% Ponemon Institute© Research Report Page 18 Part 4. Caveats There are inherent limitations to survey research that need to be carefully considered before drawing inferences from findings. The following items are specific limitations that are germane to most web-based surveys. Non-response bias: The current findings are based on a sample of survey returns. We sent surveys to a representative sample of individuals, resulting in a large number of usable returned responses. Despite non-response tests, it is always possible that individuals who did not participate are substantially different in terms of underlying beliefs from those who completed the instrument. Sampling frame bias: The accuracy is based on contact information and the degree to which the list is representative of individuals who are IT or IT security practitioners located in various organizations in North American and EMEA. We also acknowledge that the results may be biased by external events such as media coverage. We also acknowledge bias caused by compensating subjects to complete this research within a specified time period. Self-reported results: The quality of survey research is based on the integrity of confidential responses received from subjects. While certain checks and balances can be incorporated into the survey process, there is always the possibility that a subject did not provide accurate responses. Ponemon Institute© Research Report Page 19 Appendix: Detailed Survey Results The following tables provide the frequency or percentage frequency of responses to all survey questions contained in this study. All survey responses were captured in February 2015. Survey response Sampling frame Total returns Rejected or screened surveys Final sample: Overall (n = 1519) North America (n = 808) and EMEA (n = 711) Response rate Finserv 20,504 931 87 844 4.1% Screening Questions S1. How familiar are you with your organization’s defense against cyber security attacks? Very familiar Familiar Somewhat familiar No knowledge (Stop) Total Finserv 37% 29% 33% 0% 100% S2. Do you have any responsibility in directing cyber security activities within your organization? Yes, full responsibility Yes, some responsibility Yes, minimum responsibility No responsibility (Stop) Total Finserv 21% 65% 14% 0% 100% Part 1. Attributions: Please rate the following statements using the five-point scale provided below each item. Q1a. My organization has security technologies and personnel that are effective in quickly detecting advance threats. Strongly agree Agree Unsure Disagree Strongly disagree Total Finserv 27% 31% 27% 10% 6% 100% Q1b. My organization has security technologies and personnel that are effective in quickly detecting denial of service attacks. Strongly agree Agree Unsure Disagree Strongly disagree Total Finserv 23% 26% 27% 14% 10% 100% Ponemon Institute© Research Report Page 20 Q1c. My organization has security technologies and personnel that are effective in containing advance threats. Strongly agree Agree Unsure Disagree Strongly disagree Total Finserv 23% 26% 28% 13% 10% 100% Q1d. My organization has security technologies and personnel that are effective in containing denial of service attacks. Strongly agree Agree Unsure Disagree Strongly disagree Total Finserv 23% 25% 29% 13% 10% 100% Q1e. The greatest threats to my organization are targeted advanced attacks. Strongly agree Agree Unsure Disagree Strongly disagree Total Finserv 28% 32% 23% 9% 8% 100% Q1f. The greatest threats to my organization are denial of service attacks. Strongly agree Agree Unsure Disagree Strongly disagree Total Finserv 25% 28% 31% 10% 5% 100% Part 2. Incident Experience Q2. How many cyber attacks (see definition) has your organization experienced over the past 12 months? None (skip to Q11) 1 to 2 3 to 4 5 to 6 7 to 8 9 to 10 More than 10 Total Extrapolated value Finserv 9% 7% 12% 27% 16% 19% 10% 100% 6.58 Ponemon Institute© Research Report Page 21 Q3. Do you consider any of the above attacks an advanced threat (AT)? Yes No (skip to Q7) Total Finserv 79% 21% 100% Q4. How did you know that the attack was an AT? Forensic evidence Shared threat intelligence Known signature of the attacker Gut feel Other (please specify) Total Finserv 34% 25% 23% 20% 0% 102% Q5. What steps did your organization take to minimize or contain the impact of the AT? Implemented incident response procedures Conducted specialized training for IT security team Installed controls to prevent infiltration Installed controls to quickly detect and block infiltration Established threat sharing with other companies or government entities Other (please specify) Total Finserv 45% 21% 48% 44% 43% 0% 201% Q6. Using the following 10-point scale from 1 = low to 10 = high, please rate your organization’s effectiveness in containing ATs? 1 or 2 3 or 4 5 or 6 7 or 8 9 or 10 Total Extrapolated value Finserv 5% 8% 25% 36% 27% 100% 6.97 Q7. Do you consider any of the cyber attacks (indicated in Q2) a denial of service (DDoS)? Yes No (skip to Q11) Total Finserv 55% 45% 100% Q8. How did you know that the attack was a DDoS? Forensic evidence informed by degradation of application or system performance Shared threat intelligence by customer or partner due to lack of available internal resources Known signature of the attacker Gut feel Other (please specify) Total Ponemon Institute© Research Report Finserv 35% 36% 13% 17% 0% 100% Page 22 Q9. What steps did your organization take to minimize or contain the impact of the DDoS attack? Implemented incident response procedures Conducted specialized training for IT security team Installed controls to prevent infiltration Installed controls to quickly detect and block infiltration Established threat sharing with other companies or government entities Other (please specify) Total Finserv 47% 19% 46% 51% 45% 1% 209% Q10. Using the following 10-point scale from 1 = low to 10 = high, please rate your organization’s effectiveness in containing DDoS attacks? 1 or 2 3 or 4 5 or 6 7 or 8 9 or 10 Total Extrapolated value Finserv 8% 9% 20% 35% 29% 100% 6.87 Q11. What is the full-time equivalent headcount of employees in your organization who are responsible for cyber security incident investigation, analysis and management? Less than 5 5 to 10 11 to 15 16 to 20 21 to 25 26 to 30 More than 30 Total Extrapolated value Finserv 12% 15% 14% 18% 12% 3% 26% 100% 18.79 Q12. From the list below, please select all the events or issues that your organization would consider a security incident? Lost or stolen device Reported wrongdoing by employee Reported wrongdoing by third party Targeted attack that results in the theft of customer data Targeted attack that results in the theft of high-value intellectual properties Denial of service attack Other (please specify) None of the above Total Finserv 90% 95% 81% 99% 88% 99% 3% 0% 554% Ponemon Institute© Research Report Page 23 Q13. Approximately, how many security incidents are investigated by your organization’s SecOps and/or CSIRT team each month? Less than 10 10 to 25 26 to 50 51 to 100 101 to 250 251 to 500 More than 500 Total Extrapolated value Finserv 0% 1% 16% 27% 21% 18% 17% 100% 225.75 Q14. What organizational group or “team” is responsible for incident investigation, analysis and management? Security operations team (SecOps) Cyber security incident response team (CSIRT) Both (shared responsibility) Other (please specify) Total Finserv 38% 49% 11% 2% 100% Q15. What time-dependent metrics does your organization use to determine the effectiveness of your organization’s incident response process? MTTI MTTC Other (please specify) We don’t utilize time-dependent operational metrics (skip to Q20) Finserv 62% 66% 5% 28% Q16. Approximately, what is an average MTTI experienced by your organization in recent incidents? Your best guess is welcome. Q16a. For advanced threats: Less than 30 minutes 31 to 60 minutes 1 to 4 hours 5 to 8 hours 1 to 2 days 3 to 7 days 1 to 4 weeks 1 to 3 months 4 to 6 months 7 to 12 months 1 to 2 years More than two years Total Extrapolated days Finserv 0% 0% 1% 3% 4% 12% 16% 28% 16% 9% 6% 0% 96% 98.08 Ponemon Institute© Research Report Page 24 Q16b. For denial of services: Less than 30 minutes 31 to 60 minutes 1 to 4 hours 5 to 8 hours 1 to 2 days 3 to 7 days 1 to 4 weeks 1 to 3 months 4 to 6 months 7 to 12 months 1 to 2 years More than two years Total Extrapolated days Finserv 7% 5% 10% 19% 13% 15% 16% 8% 8% 1% 1% 0% 102% 27.24 Q17a. Do you expect MTTI to decrease (improve) over the next 12 months? Yes No Total Finserv 42% 58% 100% Q17b. If yes, in percentage terms, how much of a decrease in MTTI do you anticipate? Less than 5% 5% to 10% 11% to 25% 26% to 50% 51% to 75% 76% to 100% Total Extrapolated value Finserv 7% 33% 40% 14% 6% 0% 100% 19% Q17c. If yes, what steps is your organization taking to reduce MTTI? Increase security operations staff Improve triage process Introduce hunting team to look for attacks Integrate threat intelligence into IR function Implement new forensic security tools Other (please specify) Total Finserv 56% 55% 40% 74% 60% 1% 285% Ponemon Institute© Research Report Page 25 Q18. Approximately, what is an average MTTC experienced by your organization in recent incidents? Your best guess is welcome. Q18a. For advanced threats: Less than 30 minutes 31 to 60 minutes 1 to 4 hours 5 to 8 hours 1 to 2 days 3 to 7 days 1 to 4 weeks 1 to 3 months 4 to 6 months 7 to 12 months 1 to 2 years More than two years Total Extrapolated value Finserv 4% 10% 9% 15% 17% 16% 12% 8% 8% 1% 1% 0% 101% 26.06 Q18b. For denial of services: Less than 30 minutes 31 to 60 minutes 1 to 4 hours 5 to 8 hours 1 to 2 days 3 to 7 days 1 to 4 weeks 1 to 3 months 4 to 6 months 7 to 12 months 1 to 2 years More than two years Total Extrapolated value Finserv 6% 10% 14% 25% 16% 11% 9% 7% 3% 0% 0% 0% 100% 12.75 Q19a. Do you expect MTTC to decrease (improve) over the next 12 months? Yes No Total Finserv 40% 60% 100% Q19b. If yes, in percentage terms, how much of a decrease in MTTC do you anticipate? Less than 5% 5% to 10% 11% to 25% 26% to 50% 51% to 75% 76% to 100% Total Extrapolated value Finserv 28% 40% 26% 5% 1% 0% 100% 11% Ponemon Institute© Research Report Page 26 Q19c. If yes, what steps is your organization taking to reduce MTTC? Increase security operations staff Improve triage process Introduce hunting team to look for attacks Integrate threat intelligence into IR function Implement new forensic security tools Other (please specify) Total Finserv 53% 53% 41% 73% 60% 2% 281% Part 3. Cyber Kill Chain Q20. How familiar are you with the term Cyber Kill Chain? Very familiar Familiar Not familiar No knowledge (skip to Q29) Total Finserv 37% 29% 12% 23% 100% Q21a. In your opinion, how difficult is it to stop or minimize advanced threats during the Reconnaissance phase of the kill chain? Impossible Very difficult Difficult Not difficult Easy Total Finserv 41% 29% 22% 6% 3% 100% Q21b. Approximately, what percent of your organization’s total security resources will go to stopping or minimizing advanced threats during the Reconnaissance phase of the cyber kill chain? 0% 1% to 5% 6% to 10% 11% to 20% 21% to 30% 31% to 50% 51% to 75% 76% to 100% Total Extrapolated value Finserv 60% 18% 17% 2% 1% 0% 0% 0% 99% 2% Q21c. Using the 10-point scale, please rate your organization's ability to stop or minimize advance threats during the Reconnaissance phase of the kill chain. 1 or 2 (low) 3 or 4 5 or 6 7 or 8 9 or 10 (high) Total Extrapolated value Finserv 61% 21% 9% 5% 5% 100% 2.92 Ponemon Institute© Research Report Page 27 Q22a. In your opinion, how difficult is it to stop or minimize advance threats during the Weaponization phase of the kill chain? Impossible Very difficult Difficult Not difficult Easy Total Finserv 13% 30% 27% 25% 5% 100% Q22b. Approximately, what percent of your organization’s total security resources will go to stopping or minimizing advanced threats during the Weaponization phase of the cyber kill chain? 0% 1% to 5% 6% to 10% 11% to 20% 21% to 30% 31% to 50% 51% to 75% 76% to 100% Total Extrapolated value Finserv 5% 15% 29% 35% 12% 4% 1% 0% 100% 13% Q22c. Using the 10-point scale, please rate your organization's ability to stop or minimize advance threats during the Weaponization phase of the kill chain. 1 or 2 (low) 3 or 4 5 or 6 7 or 8 9 or 10 (high) Total Extrapolated value Finserv 7% 12% 23% 25% 33% 100% 6.80 Q23a. In your opinion, how difficult is it to stop or minimize advance threats during the Delivery phase of the kill chain? Impossible Very difficult Difficult Not difficult Easy Total Finserv 5% 28% 37% 25% 5% 100% Ponemon Institute© Research Report Page 28 Q23b. Approximately, what percent of your organization’s total security resources will go to stopping or minimizing advanced threats during the Delivery phase of the cyber kill chain? 0% 2% to 5% 6% to 10% 11% to 20% 21% to 30% 31% to 50% 51% to 75% 76% to 100% Total Extrapolated value Finserv 5% 15% 29% 35% 12% 4% 1% 0% 100% 13% Q23c. Using the 10-point scale, please rate your organization's ability to stop or minimize advance threats during the Delivery phase of the kill chain. 1 or 2 (low) 3 or 4 5 or 6 7 or 8 9 or 10 (high) Total Extrapolated value Finserv 0% 9% 22% 25% 44% 100% 7.55 Q24a. In your opinion, how difficult is it to stop or minimize advance threats during the Exploitation phase of the kill chain? Impossible Very difficult Difficult Not difficult Easy Total Finserv 9% 30% 34% 25% 2% 100% Q24b. Approximately, what percent of your organization’s total security resources will go to stopping or minimizing advanced threats during the Exploitation phase of the cyber kill chain? 0% 1% to 5% 6% to 10% 11% to 20% 21% to 30% 31% to 50% 51% to 75% 76% to 100% Total Extrapolated value Finserv 1% 8% 14% 32% 30% 15% 0% 0% 100% 20% Ponemon Institute© Research Report Page 29 Q24c. Using the 10-point scale, please rate your organization's ability to stop or minimize advance threats during the Exploitation phase of the kill chain. 1 or 2 (low) 3 or 4 5 or 6 7 or 8 9 or 10 (high) Total Extrapolated value Finserv 0% 8% 20% 29% 42% 100% 7.60 Q25a. In your opinion, how difficult is it to stop or minimize advance threats during the Installation phase of the kill chain? Impossible Very difficult Difficult Not difficult Easy Total Finserv 12% 34% 35% 18% 0% 100% Q25b. Approximately, what percent of your organization’s total security resources will go to stopping or minimizing advanced threats during the Installation phase of the cyber kill chain? 0% 1% to 5% 6% to 10% 11% to 20% 21% to 30% 31% to 50% 51% to 75% 76% to 100% Total Extrapolated value Finserv 5% 23% 13% 27% 21% 11% 0% 0% 100% 16% Q25c. Using the 10-point scale, please rate your organization's ability to stop or minimize advance threats during the Installation phase of the kill chain. 1 or 2 (low) 3 or 4 5 or 6 7 or 8 9 or 10 (high) Total Extrapolated value Finserv 2% 10% 29% 40% 20% 100% 6.78 Q26a. In your opinion, how difficult is it to stop or minimize advance threats during the Command & Control (C2) phase of the kill chain? Impossible Very difficult Difficult Not difficult Easy Total Finserv 2% 25% 39% 31% 3% 100% Ponemon Institute© Research Report Page 30 Q26b. Approximately, what percent of your organization’s total security resources will go to stopping or minimizing advanced threats during the Command & Control (C2) phase of the cyber kill chain? 0% 1% to 5% 6% to 10% 11% to 20% 21% to 30% 31% to 50% 51% to 75% 76% to 100% Total Extrapolated value Finserv 4% 18% 33% 18% 17% 10% 0% 0% 100% 14% Q26c. Using the 10-point scale, please rate your organization's ability to stop or minimize advance threats during the Command & Control (C2) phase of the kill chain. 1 or 2 (low) 3 or 4 5 or 6 7 or 8 9 or 10 (high) Total Extrapolated value Finserv 2% 10% 29% 40% 20% 100% 6.78 Q27a. In your opinion, how difficult is it to stop or minimize advance threats during the Actions on Objectives phase of the kill chain? Impossible Very difficult Difficult Not difficult Easy Total Finserv 0% 35% 39% 23% 3% 100% Q27b. Approximately, what percent of your organization’s total security resources will go to stopping or minimizing advanced threats during the Actions on Objectives phase of the cyber kill chain? 0% 1% to 5% 6% to 10% 11% to 20% 21% to 30% 31% to 50% 51% to 75% 76% to 100% Total Extrapolated value Finserv 0% 12% 22% 28% 29% 11% 0% 0% 101% 18% Ponemon Institute© Research Report Page 31 Q27c. Using the 10-point scale, please rate your organization's ability to stop or minimize advance threats during the Actions on Objectives phase of the kill chain. 1 or 2 (low) 3 or 4 5 or 6 7 or 8 9 or 10 (high) Total Extrapolated value Q28. What are the most promising technologies to stopping or minimizing advance threats during the seven phases of the kill chain? Please choose only your top three choices. Technologies that secure the perimeter Technologies that provide intelligence about networks and traffic Technologies that provide intelligence about attackers’ motivation and weak spots Technologies that simplify the reporting of threats Technologies that secure endpoints including mobile-connected devices Technologies that minimize insider threats (including negligence) Technologies that secure information assets Technologies that isolate or sandbox malware infections Total Finserv 5% 12% 17% 34% 32% 100% 7.02 Finserv 36% 71% 41% 13% 22% 5% 49% 63% 300% Part 4. Budget Questions Q29. Approximately, what is the dollar range that best describes your organization’s IT budget for 2015? < $1 million $1 to 5 million $6 to $10 million $11 to $50 million $51 to $100 million $101 to $250 million $251 to $500 million > $500 million Total Extrapolated value ($millions) Finserv 0% 1% 4% 17% 33% 28% 15% 2% 100% 144.90 Q30. Approximately, what percentage of the 2015 IT budget will go to IT security activities and investments? 0% 1% to 5% 6% to 10% 11% to 20% 21% to 30% 31% to 50% 51% to 75% 76% to 100% Total Extrapolated value Finserv 0% 22% 32% 38% 9% 0% 0% 0% 100% 11% Ponemon Institute© Research Report Page 32 Q31. Approximately, what percentage of the 2015 IT security budget will go to kill chain-related activities? 0% 1% to 5% 6% to 10% 11% to 20% 21% to 30% 31% to 50% 51% to 75% 76% to 100% Total Extrapolated value Q32. The following table contains 4 budget or spending areas. Please allocate points to indicate the relative proportion of each area to the 2015 IT security budget for your organization. Note that the sum of your allocation must equal 100 points. Technologies In-house personnel Managed (third party) services Other cash outlays Total Finserv 12% 10% 9% 27% 21% 8% 8% 5% 100% 22% Finserv 40 37 20 3 100 Part 5. Role & Organizational Characteristics D1. What best describes your position or organizational level? Executive/VP Director Manager Supervisor Technician Associate/staff Consultant/contractor Other (please specify) Total Finserv 4% 16% 19% 17% 35% 7% 0% 0% 100% D2. Check the primary person you or your supervisor reports to within your organization. Business owner CEO/President Chief Financial Officer Chief Information Officer Compliance Officer Chief Privacy Officer Director of Internal Audit General Counsel Chief Technology Officer Human Resources VP Chief Information Security Officer Chief Risk Officer Other (please specify) Total Finserv 0% 1% 0% 59% 7% 0% 1% 0% 7% 0% 19% 6% 0% 100% Ponemon Institute© Research Report Page 33 D3 (retail). What best describes your company’s primary retail industry focus? Conventional retailer (stores) Franchises Internet retailer (websites) Combination Retail tech Other (please specify) Total D3 (financial services). What best describes your company’s primary FS industry focus? Banking Investment management Brokerage Insurance Payments Financial tech General services Other (please specify) Total D4. What is the worldwide headcount of your organization? < 500 500 to 1,000 1,001 to 5,000 5,001 to 25,000 25,001 to 75,000 > 75,000 Total Countries Canada Denmark France Germany Italy Netherlands Poland Saudi Arabia South Africa Spain Sweden Switzerland Turkey United Arab Emirates United Kingdom United States Total Ponemon Institute© Research Report Finserv 0% 0% 0% 0% 0% 0% 0% Finserv 30% 8% 14% 20% 10% 6% 9% 2% 100% 0% Finserv 7% 24% 30% 22% 11% 6% 100% NA cluster 120 0 0 0 0 0 0 0 0 0 0 0 0 0 0 688 808 Page 34 EMEA cluster 0 14 87 146 51 68 36 40 7 59 9 9 17 18 150 0 711 Ponemon Institute Advancing Responsible Information Management Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations. As a member of the Council of American Survey Research Organizations (CASRO), we uphold strict data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or company identifiable information in our business research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions. Ponemon Institute© Research Report Page 35
© Copyright 2024