Toronto
February  25,   2016
2016  Security  Roadshow
The  2016  Scalar  Security  Study
©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   3
Purpose  of  the  Study
§ How  prepared  are  Canadian  
organizations  to  deal  with  cyber  attacks?
§ How  have  cyber  attacks  changed  over  
the  past  year?
§ What  is  the  cost  of  cyber  attacks  to  
Canadian  organizations?
§ What  are  the  most  effective  ways  to  
reduce  cyber  security  risk?
©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   4
Study  Scope
§ 100%  Canadian
§ 654  qualified  responses
§ Security-­savvy  respondents
§ Medium-­to-­large  organization  focused  
(25%  >  $1B  revenue)
§ 18  industries
§ Global  presence
©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   5
Why  Canadian  Data  Matters
§ US  studies  reveal  individual  breach  
costs  in  the  millions
§ Regulatory  landscape
§ Different  cyber  attack  profile  in  Canada
§ Canadian  companies  differ
§ Size
§ Culture
§ Budgets
§ Access  to  resources
©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   6
Only  37%
of  organizations  believe  they  are  winning  
the  cyber  security  war
§ Attacker  sophistication  on  the  rise
§ More  attacks  reported
§ Greater  losses  of  data
§ Traditional  defenses  ineffective
§ Lack  of  advanced  technology
§ Skill  gap  persists
Overall  – Lower  Confidence
©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   7
$7  Million
Over  the  last  12  months,  cyber  security  
compromises  cost  organizations  roughly
§ Average  40  incidents  per  year
§ 51%  reported  lost  sensitive  data
§ Increased  concern  of  cyber  crime
§ Inside  threats  specifically  concerning
§ Targeted  attacks  on  the  rise
§ Severity
§ Sophistication
§ Frequency
Attacks  on  the  Rise
©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.  
Most  Losses  Are  Indirect
Breakdown  of  Losses 2015 2014
Cleanup or  remediation $766,667 $676,023
Lost  user  productivity $950,625 $987,191
Disruption to  normal  operations $1,061,818 $1,101,379
Damage  or  theft  of  IT  assets  and  infrastructure $1,638,663 $1,533,989
Damage  to  reputation $2,647,560 $2,586,941
Total $7,065,332 $6,885,523
§ Within  each  category  15%-­20%  of  
respondents  could  not  estimate  the  cost
©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.  
Intellectual  Property  Losses  and  Competitive  Advantage
36%
33%
31%32%
30%
38%
0%
5%
10%
15%
20%
25%
30%
35%
40%
Yes,  I  believe  it  has  
caused  a  loss  of  
competitive  advantage
No,  it  hasn't  caused  a  
loss  of  competitive  
advantage
Unsure
2015
2014
§ 33%  reported  a  
loss  of  IP  in  the  
past  24  months
§ Criminals  were  
ranked  as  “most  
likely”  to  launch  
an  attack
§ Insider  threats  
ranked  very  
important
©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.  
Intellectual  Property  Losses
59%
43%
33%
30%
19%
7%
65%
46%
30%
33%
15%
8%
0% 10% 20% 30% 40% 50% 60% 70%
Gut  feeling
Appearance  of  copied  products  or  
activities
Emergence  of  new  competition
Soured  deals  or  business  ventures
Compromised  negotiations
Other
2014
2015
§ Average  between  
$5M  and  $6M  
annual  losses
§ Losses  are  
supported  by  
evidence  of  
damage
§ Criminal  activity  
affecting  business  
deals
©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.  
Interesting  Data  on  Advanced  Threats
70%
26%
4%
77%
20%
3%
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
Yes No Unsure
2015
2014
§ 70%  of  threats  
evaded  IDS  or  
AV  systems
§ 82%  of  
respondents  
reported  threats  
that  evaded  AV  
systems
§ Confidence  in  
“No”  response?
©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.  
Interesting  Data  on  Advanced  Threats
80%
65%
49%
48%
46%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90%
Web-­borne  malware  attacks
Rootkits
Advanced  persistent  threats  
(APTs)/targeted  attacks
Spear  phishing
Clickjacking
§ Most  threats  are  
considered  
”advanced”
§ Targeted  attacks  
to  gain  access  to  
data  (loss  of  IP)
§ Users  as  targets
§ High  number  
exploits  >  3  
months  old
©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.  
Interesting  Data  on  Advanced  Threats
38%
54%
8%
0%
10%
20%
30%
40%
50%
60%
Yes No Unsure
62%
Cannot  confirm  that  they  
are  able  to  detect  nor  stop  
advanced  threats
46%
Unsure  how  to  identify  
APTs  as  cause  of  incidents
©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.  
Interesting  Data  on  Advanced  Threats
60%
55%
44%
41%
29%
56%
49%
42%
38%
36%
0% 10% 20% 30% 40% 50% 60% 70%
IT  downtime
Business  interruption
Theft  of  personal  information
Exfiltration  of  classified  or  sensitive  
information
Nothing  happened
2014
2015
§ Overwhelming  
data  that  
supports  losses  
of  data  and  
business  
interruption
§ YET… 29%  
believe  “nothing  
happened”  as  a  
result  of  APTs
©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.  
Beyond  Technology
3.54
3.13
2.18
2.00
1.75
3.94
2.89
1.90
1.67
2.05
0.00 0.50 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50
Insufficient  budget  (money)
Lack  of  clear  leadership
Lack  of  collaboration  with  other  
functions
Lack  of  in-­house  expertise
Insufficient  personnel
2014
2015
§ No  mention  of  
technology  (except  
lack  of  budget)
§ 93%-­95%  rank  
experience  as  
qualifier  for  experts
§ Collaboration  
important  outside  
of  IT  function
©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.  
Beyond  Technology
25%
33%
37%
23%
31%
40%
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
Yes,  fully  aligned Yes,  partially  aligned No,  not  aligned
2015
2014
37%
Of  Security  Strategies  NOT  
aligned  with  the  business
©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   17
§ Less  reliance  on  traditional  tools
§ Leverage  technology  to  achieve  
visibility,  understanding  and  control
§ More  awareness  of  severity  and  
frequency  of  attacks
§ Align  security  strategy  with  business  
objectives
Attributes  of  High  Performers
©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   18
§ High  performing  organizations:
§ More  aware  of  threats
§ Spend  more  on  security
§ Measure  ROI  on  investment
§ Report  more  attacks
§ Suffer  fewer  losses
§ Beyond  the  numbers
Driving  Successful  Outcomes
©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   19
Study  Conclusions
§ Conduct  risk  and  vulnerability  assessments  to  understand  probable  attack  vectors
§ Align  security  strategy  with  business  objectives,  and  secure  sufficient  funding  in  
people,  process  and  technology
§ Invest  in  technologies  that  provide  visibility  understanding  and  control  to  detect  
anomalies  in  your  environment
§ Invest  in  expert  skills  and  specialized  training  for  in-­house  teams;;  or  consider  
leveraging  an  external  3rd  party  security  services  firm
Thank  You

More Related Content

PDF
Executive Summary of the 2016 Scalar Security Study
PDF
The Cyber Security Readiness of Canadian Organizations
PDF
Scalar security study2017_slideshare_rev[1]
PDF
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
PDF
Security Incident Response Readiness Survey
PDF
Embracing Threat Intelligence and Finding ROI in Your Decision
PDF
Scalar cloud study2016_slideshare
PPTX
2018 State of Cyber Resilience Insurance
Executive Summary of the 2016 Scalar Security Study
The Cyber Security Readiness of Canadian Organizations
Scalar security study2017_slideshare_rev[1]
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
Security Incident Response Readiness Survey
Embracing Threat Intelligence and Finding ROI in Your Decision
Scalar cloud study2016_slideshare
2018 State of Cyber Resilience Insurance

What's hot (20)

PDF
Bridging the Gap Between Threat Intelligence and Risk Management
PPTX
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
PDF
Scalar - a brief introduction
PDF
The Measure of Success: Security Metrics to Tell Your Story
PDF
Cyber security: Five leadership issues worthy of board and executive attention
PDF
MP_OneSheet_VulnThreat
PDF
SVB Cybersecurity Impact on Innovation Report - Overview
PPTX
SVB Cybersecurity Impact on Innovation Report
PPTX
Cyber Risk Management in 2017 - Challenges & Recommendations
PDF
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
PDF
How close is your organization to being breached | Safe Security
PPTX
HEMISPHERE SMB Case Study
PDF
How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
PDF
Deliver the ‘Right’ Customer Experience without Compromising Data Security
PDF
State of Endpoint Security: The Buyers Mindset
PDF
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
PDF
Demonstrating Information Security Program Effectiveness
PPTX
4 Cyber Security KPIs
PPTX
Third Annual State of Cyber Resilience SlideShare
Bridging the Gap Between Threat Intelligence and Risk Management
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
Scalar - a brief introduction
The Measure of Success: Security Metrics to Tell Your Story
Cyber security: Five leadership issues worthy of board and executive attention
MP_OneSheet_VulnThreat
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report
Cyber Risk Management in 2017 - Challenges & Recommendations
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
How close is your organization to being breached | Safe Security
HEMISPHERE SMB Case Study
How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
Deliver the ‘Right’ Customer Experience without Compromising Data Security
State of Endpoint Security: The Buyers Mindset
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Demonstrating Information Security Program Effectiveness
4 Cyber Security KPIs
Third Annual State of Cyber Resilience SlideShare
Ad

Viewers also liked (20)

PDF
Cyber Security trends and tactics for 2015
PDF
Cloud Perspectives - Ottawa Seminar - Oct 6
PDF
Keys to success and security in the cloud
PPTX
Cyber security presentation
PPTX
Cyber security
PDF
Scalar Case Study: Strong Project Management Helps McMaster University Succes...
PDF
Новые решения для сетей предприятий в области коммутации и маршрутизации.Часть 2
PDF
Cisco's 2016 Annual Security report
PDF
The Lanka Gate Initiative
PDF
ISOC Sri Lanka Way Forward
PPT
HRM RELATED USE OF ICT IN JUDICIARY
PDF
IGF Sri Lanka
PDF
Computer Network Security
PPTX
ION Sri Lanka - DANE: The Future of TLS
PPT
Introduction to ICTA - Org Study Presentation
PPTX
[Challenge:Future] Rallying Youth Against Cyber Crime
PPTX
Scalar Security Roadshow - Vancouver Presentation
PPTX
Scalar Security Roadshow - Calgary Presentation
PDF
Scalar Technical session - Network Functions Virtualization leveraging Brocade
PDF
Scalar customer case study: Rainmaker Entertainment
Cyber Security trends and tactics for 2015
Cloud Perspectives - Ottawa Seminar - Oct 6
Keys to success and security in the cloud
Cyber security presentation
Cyber security
Scalar Case Study: Strong Project Management Helps McMaster University Succes...
Новые решения для сетей предприятий в области коммутации и маршрутизации.Часть 2
Cisco's 2016 Annual Security report
The Lanka Gate Initiative
ISOC Sri Lanka Way Forward
HRM RELATED USE OF ICT IN JUDICIARY
IGF Sri Lanka
Computer Network Security
ION Sri Lanka - DANE: The Future of TLS
Introduction to ICTA - Org Study Presentation
[Challenge:Future] Rallying Youth Against Cyber Crime
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Calgary Presentation
Scalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar customer case study: Rainmaker Entertainment
Ad

Similar to 2016 Scalar Security Study Roadshow (20)

PPTX
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
PPTX
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
PPTX
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
PDF
EndpointSecurityConcerns2014
PPTX
15 Years of Web Security: The Rebellious Teenage Years
PDF
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
PPTX
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
PDF
Passwordless is Possible - How to Remove Passwords and Improve Security
PPTX
Threat Detection as presented at the 2016 DGI Cyber security Conference
PDF
You Can't Stop The Breach Without Prevention And Detection
PPTX
P19 nrss final presentation with audience results_6.26.19
PPTX
Webinar - Bitglass and CyberEdge - Hidden Security Threats
PPTX
Payments Card Fraud Challenges in Digital and Online Sales
PDF
2018 U.S State of Cybercrime
PPTX
ISACA and RSA CSX Presentation from the RSA 2015 Conference
PDF
2014 Digital Marketing Landscape Study: The Power of Digital Experiences
PPTX
SolarWinds Federal Cybersecurity Survey 2016
PDF
2018 State of Cyber Resilience - New York
PDF
2017 Scalar Security Study Summary
PDF
Cyber TPRM - the journey ahead
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
EndpointSecurityConcerns2014
15 Years of Web Security: The Rebellious Teenage Years
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Passwordless is Possible - How to Remove Passwords and Improve Security
Threat Detection as presented at the 2016 DGI Cyber security Conference
You Can't Stop The Breach Without Prevention And Detection
P19 nrss final presentation with audience results_6.26.19
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Payments Card Fraud Challenges in Digital and Online Sales
2018 U.S State of Cybercrime
ISACA and RSA CSX Presentation from the RSA 2015 Conference
2014 Digital Marketing Landscape Study: The Power of Digital Experiences
SolarWinds Federal Cybersecurity Survey 2016
2018 State of Cyber Resilience - New York
2017 Scalar Security Study Summary
Cyber TPRM - the journey ahead

More from Scalar Decisions (18)

PPTX
La transformation numérique de Scalar
PDF
Digital Transformation
PDF
Résumé de l’étude sur la sécurité de Scalar 2016
PDF
Optimize IT Infrastructure
PPTX
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
PDF
Web scale with-nutanix_rev
PDF
Scalar Security Roadshow April 2015
PDF
Cloudforms Workshop
PDF
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
PDF
PDF
Hyperconverged Infrastructure: The Leading Edge of Virtualization
PDF
The road to clustered data ontap.
PDF
Where Technology Meets Medicine: SickKids High Performance Computing Data Centre
PDF
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
PDF
Scalar Security Roadshow - Toronto Presentation
PDF
Scalar Security Roadshow - Ottawa Presentation
PDF
Sheridan College: Scalar Customer Case Study
PDF
City of Airdrie: Scalar Customer Case Study
La transformation numérique de Scalar
Digital Transformation
Résumé de l’étude sur la sécurité de Scalar 2016
Optimize IT Infrastructure
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Web scale with-nutanix_rev
Scalar Security Roadshow April 2015
Cloudforms Workshop
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Hyperconverged Infrastructure: The Leading Edge of Virtualization
The road to clustered data ontap.
Where Technology Meets Medicine: SickKids High Performance Computing Data Centre
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Ottawa Presentation
Sheridan College: Scalar Customer Case Study
City of Airdrie: Scalar Customer Case Study

Recently uploaded (20)

PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
The AI Revolution in Customer Service - 2025
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PPTX
Build automations faster and more reliably with UiPath ScreenPlay
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PPTX
Training Program for knowledge in solar cell and solar industry
PPTX
Microsoft User Copilot Training Slide Deck
PDF
SaaS reusability assessment using machine learning techniques
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
The AI Revolution in Customer Service - 2025
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
LMS bot: enhanced learning management systems for improved student learning e...
Build Real-Time ML Apps with Python, Feast & NoSQL
Data Virtualization in Action: Scaling APIs and Apps with FME
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
A symptom-driven medical diagnosis support model based on machine learning te...
Lung cancer patients survival prediction using outlier detection and optimize...
NewMind AI Weekly Chronicles – August ’25 Week IV
Connector Corner: Transform Unstructured Documents with Agentic Automation
Build automations faster and more reliably with UiPath ScreenPlay
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
Basics of Cloud Computing - Cloud Ecosystem
Training Program for knowledge in solar cell and solar industry
Microsoft User Copilot Training Slide Deck
SaaS reusability assessment using machine learning techniques
giants, standing on the shoulders of - by Daniel Stenberg
Rapid Prototyping: A lecture on prototyping techniques for interface design

2016 Scalar Security Study Roadshow

  • 1. Toronto February  25,   2016 2016  Security  Roadshow
  • 2. The  2016  Scalar  Security  Study
  • 3. ©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   3 Purpose  of  the  Study § How  prepared  are  Canadian   organizations  to  deal  with  cyber  attacks? § How  have  cyber  attacks  changed  over   the  past  year? § What  is  the  cost  of  cyber  attacks  to   Canadian  organizations? § What  are  the  most  effective  ways  to   reduce  cyber  security  risk?
  • 4. ©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   4 Study  Scope § 100%  Canadian § 654  qualified  responses § Security-­savvy  respondents § Medium-­to-­large  organization  focused   (25%  >  $1B  revenue) § 18  industries § Global  presence
  • 5. ©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   5 Why  Canadian  Data  Matters § US  studies  reveal  individual  breach   costs  in  the  millions § Regulatory  landscape § Different  cyber  attack  profile  in  Canada § Canadian  companies  differ § Size § Culture § Budgets § Access  to  resources
  • 6. ©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   6 Only  37% of  organizations  believe  they  are  winning   the  cyber  security  war § Attacker  sophistication  on  the  rise § More  attacks  reported § Greater  losses  of  data § Traditional  defenses  ineffective § Lack  of  advanced  technology § Skill  gap  persists Overall  – Lower  Confidence
  • 7. ©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   7 $7  Million Over  the  last  12  months,  cyber  security   compromises  cost  organizations  roughly § Average  40  incidents  per  year § 51%  reported  lost  sensitive  data § Increased  concern  of  cyber  crime § Inside  threats  specifically  concerning § Targeted  attacks  on  the  rise § Severity § Sophistication § Frequency Attacks  on  the  Rise
  • 8. ©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   Most  Losses  Are  Indirect Breakdown  of  Losses 2015 2014 Cleanup or  remediation $766,667 $676,023 Lost  user  productivity $950,625 $987,191 Disruption to  normal  operations $1,061,818 $1,101,379 Damage  or  theft  of  IT  assets  and  infrastructure $1,638,663 $1,533,989 Damage  to  reputation $2,647,560 $2,586,941 Total $7,065,332 $6,885,523 § Within  each  category  15%-­20%  of   respondents  could  not  estimate  the  cost
  • 9. ©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   Intellectual  Property  Losses  and  Competitive  Advantage 36% 33% 31%32% 30% 38% 0% 5% 10% 15% 20% 25% 30% 35% 40% Yes,  I  believe  it  has   caused  a  loss  of   competitive  advantage No,  it  hasn't  caused  a   loss  of  competitive   advantage Unsure 2015 2014 § 33%  reported  a   loss  of  IP  in  the   past  24  months § Criminals  were   ranked  as  “most   likely”  to  launch   an  attack § Insider  threats   ranked  very   important
  • 10. ©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   Intellectual  Property  Losses 59% 43% 33% 30% 19% 7% 65% 46% 30% 33% 15% 8% 0% 10% 20% 30% 40% 50% 60% 70% Gut  feeling Appearance  of  copied  products  or   activities Emergence  of  new  competition Soured  deals  or  business  ventures Compromised  negotiations Other 2014 2015 § Average  between   $5M  and  $6M   annual  losses § Losses  are   supported  by   evidence  of   damage § Criminal  activity   affecting  business   deals
  • 11. ©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   Interesting  Data  on  Advanced  Threats 70% 26% 4% 77% 20% 3% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Yes No Unsure 2015 2014 § 70%  of  threats   evaded  IDS  or   AV  systems § 82%  of   respondents   reported  threats   that  evaded  AV   systems § Confidence  in   “No”  response?
  • 12. ©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   Interesting  Data  on  Advanced  Threats 80% 65% 49% 48% 46% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Web-­borne  malware  attacks Rootkits Advanced  persistent  threats   (APTs)/targeted  attacks Spear  phishing Clickjacking § Most  threats  are   considered   ”advanced” § Targeted  attacks   to  gain  access  to   data  (loss  of  IP) § Users  as  targets § High  number   exploits  >  3   months  old
  • 13. ©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   Interesting  Data  on  Advanced  Threats 38% 54% 8% 0% 10% 20% 30% 40% 50% 60% Yes No Unsure 62% Cannot  confirm  that  they   are  able  to  detect  nor  stop   advanced  threats 46% Unsure  how  to  identify   APTs  as  cause  of  incidents
  • 14. ©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   Interesting  Data  on  Advanced  Threats 60% 55% 44% 41% 29% 56% 49% 42% 38% 36% 0% 10% 20% 30% 40% 50% 60% 70% IT  downtime Business  interruption Theft  of  personal  information Exfiltration  of  classified  or  sensitive   information Nothing  happened 2014 2015 § Overwhelming   data  that   supports  losses   of  data  and   business   interruption § YET… 29%   believe  “nothing   happened”  as  a   result  of  APTs
  • 15. ©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   Beyond  Technology 3.54 3.13 2.18 2.00 1.75 3.94 2.89 1.90 1.67 2.05 0.00 0.50 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 Insufficient  budget  (money) Lack  of  clear  leadership Lack  of  collaboration  with  other   functions Lack  of  in-­house  expertise Insufficient  personnel 2014 2015 § No  mention  of   technology  (except   lack  of  budget) § 93%-­95%  rank   experience  as   qualifier  for  experts § Collaboration   important  outside   of  IT  function
  • 16. ©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   Beyond  Technology 25% 33% 37% 23% 31% 40% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Yes,  fully  aligned Yes,  partially  aligned No,  not  aligned 2015 2014 37% Of  Security  Strategies  NOT   aligned  with  the  business
  • 17. ©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   17 § Less  reliance  on  traditional  tools § Leverage  technology  to  achieve   visibility,  understanding  and  control § More  awareness  of  severity  and   frequency  of  attacks § Align  security  strategy  with  business   objectives Attributes  of  High  Performers
  • 18. ©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   18 § High  performing  organizations: § More  aware  of  threats § Spend  more  on  security § Measure  ROI  on  investment § Report  more  attacks § Suffer  fewer  losses § Beyond  the  numbers Driving  Successful  Outcomes
  • 19. ©  2016  Scalar  Decisions  Inc.  Not  for  distribution  outside  of  intended  audience.   19 Study  Conclusions § Conduct  risk  and  vulnerability  assessments  to  understand  probable  attack  vectors § Align  security  strategy  with  business  objectives,  and  secure  sufficient  funding  in   people,  process  and  technology § Invest  in  technologies  that  provide  visibility  understanding  and  control  to  detect   anomalies  in  your  environment § Invest  in  expert  skills  and  specialized  training  for  in-­house  teams;;  or  consider   leveraging  an  external  3rd  party  security  services  firm