Vulnerabilities / Threats
3/25/2010
05:04 PM
50%
50%

CEOs Paying Attention To Security, Study Says

CIO is the person most frequently held responsible for data protection, Ponemon survey says

Top-level executives are beginning to grasp the importance of security, according to a study published today.

Eighty-one percent of C-level executives think that investing in a security strategy can greatly reduce or mitigate the risk of data loss or theft, according to the survey of 115 C-level executives in the U.K. conducted by Ponemon Institute and sponsored by IBM.

"In the face of growing security threats, business leaders are finally recognizing that a strong data protection strategy plays a critical role to their bottom line," says Dr. Larry Ponemon, chairman and founder of Ponemon Institute. "Today, C-level executives believe the cost savings from investing in a data protection program is substantially higher than the estimated value of recovering from a breach."

Seventy-seven percent of C-level executives reported that their organizations have experienced a data breach at some point, while all respondents disclosed that they have had their data attacked in the past 12 months. Seventy-six percent think that reducing potential security flaws within business-critical applications is the most important aspect of their data protection programs.

C-level executives believe good data protection practices can support important organizational goals, such as compliance, reputation management, and customer trust. Only a small percentage of the CEOs surveyed, just 18 percent, are very confident that their organizations will not suffer a data breach within the next year.

Executives in the study estimated the average data breach cost per compromised record at about $250. CEOs estimated that cost to be closer to $300 per compromised record.

Three-quarters of respondents reported that one person is considered to be in charge of data protection for their organizations. That person is considered by most to be the CIO -- especially by the CEO.

More than half (51 percent) of C-level executives believe the purpose of data protection programs is to increase brand or marketplace image.

"We are witnessing C-level executives implement security strategies at a much higher rate than ever before," said Daniel Sabbah, general manager of IBM Rational.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-5084
Published: 2015-08-02
The Siemens SIMATIC WinCC Sm@rtClient and Sm@rtClient Lite applications before 01.00.01.00 for Android do not properly store passwords, which allows physically approximate attackers to obtain sensitive information via unspecified vectors.

CVE-2015-5352
Published: 2015-08-02
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time ...

CVE-2015-5537
Published: 2015-08-02
The SSL layer of the HTTPS service in Siemens RuggedCom ROS before 4.2.0 and ROX II does not properly implement CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a different vulnerability than CVE-2014-3566.

CVE-2015-5600
Published: 2015-08-02
The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumptio...

CVE-2015-1009
Published: 2015-07-31
Schneider Electric InduSoft Web Studio before 7.1.3.5 Patch 5 and Wonderware InTouch Machine Edition through 7.1 SP3 Patch 4 use cleartext for project-window password storage, which allows local users to obtain sensitive information by reading a file.

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!