SlideShare a Scribd company logo
CIOnet survey on
Cyber Security
The results

Chris Verdonck
EMEA Leader, Deloitte Enterprise Risk Services




Brussels, October 12th 2010
“It's the great irony of our Information Age - the very technologies that
      empower us to create and to build also empower those who would
                               disrupt and destroy.”

                              USA President Barack Obama on "Securing Our Nation's Cyber Infrastructure “




2   UNCLASSIFIED - CIOnet survey on Cyber Security                                                          © 2010
Agenda.




3   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Agenda


     Survey context
     Respondents
     Results




4    UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Survey Context


                                                      Cyber culture is growing faster than
                                                       cyber security, so everything that
                                                       depends on cyber space is at risk

                                                      Information is ubiquitous - Our society
                                                       and economy have become critically
                                                       dependent on digital connectivity and
                                                       services;

                                                      Cyber security threats are continuously
                                                       increasing in complexity and occurrence;
                                                       thus they require more management
                                                       attention;

                                                      CIOnet members were surveyed on 16
                                                       questions regarding cyber security until
                                                       September 26th 2010.

5   UNCLASSIFIED - CIOnet survey on Cyber Security                                      © 2010
Respondents.




6   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Response demographics

                                                                  Countries
                                                      53 respondents from 6 different
                                                       countries;

                                                      Most responses from Belgium
                                                       (35,8%) followed by Italy and UK
                                                       (each 18,8%)



                                                                   Sectors
                                                      Responses spread over different
                                                       sectors

                                                      Most respondents in Financials
                                                       (24,5%), and Industrial &
                                                       Manufacturing (20,7%)


7   UNCLASSIFIED - CIOnet survey on Cyber Security                                  © 2010
Response company types

                                                                Company type
                                                      67.9% of respondents
                                                       representing their company’s
                                                       headquarters.




                                                            Number of employees
                                                      In terms of company size, over
                                                       half of the survey responders has
                                                       more then 1000+ employees.




8   UNCLASSIFIED - CIOnet survey on Cyber Security                                    © 2010
Results.




9   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Cyber liabilities


 Almost 85% responded that
  they analyzed their cyber
  liabilities in a thorough way;

 However there is still
  uncertainty on what
  regulations are applicable. EU
  DPA and ISO 27001 may not
  be enough to comply with;

 Despite that respondents
  indicate to have assessed
  their liabilities, further
  responses in the survey
  indicate a need for stronger
  action.



10   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Applicable legislation


 Over 76% of the survey
  respondents is confident that
  their organization have an
  overview of applicable laws in
  the context of cyber security;

 A large part of them only
  operates in one country, but
  legal aspect with regards to
  cyber security can differ
  greatly between countries.




11   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Theft of trade secrets


 Almost 18% of the
  respondents’ organizations
  have not assessed the risk of
  loosing trade secrets;

 For the respondents that
  claim they have, the question
  is how comprehensive such
  assessment was;

 It is essential to ensure that
  the risks regarding theft of
  trade secrets are frequently
  re-assessed and appropriate
  actions taken to mitigate
  them.



12   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Impact of internal or external cyber attacks

 All respondents indicated their
  organisation could be
  impacted in at least one
  domain;

 Over 81% of respondents
  believes cyber attacks would
  impact the brand and image of
  their organization.
  Stakeholders expect cyber
  security challenges to be
  addressed appropriately;

 Respondents indicate that
  internal attacks are more likely
  to cause critical operation
  disruption, and external
  attacks could affect market
  share more.
13   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Cyber Security threats


 Over 35% of respondents see
  a primary threat in the
  increased complexity of
  identity and access
  management;

 It is interesting to note that
  almost 22% of the
  respondents indicate that
  their current controls are
  struggling to keep pace;

 Inadequate network access
  control and the uptake of
  social networks also raises
  cyber security concerns.
                                                      Other:
                                                      •  User and management awareness of cyber risks,
                                                      •  Unpatched and unsupported legacy applications and systems
                                                      •  Crimeware will be the biggest threat over workstations, mobile operators and
                                                         eventually mobile phones
14   UNCLASSIFIED - CIOnet survey on Cyber Security                                                                          © 2010
Security Staff


 Over 35% of the respondents’
  organizations have no policy
  regarding maintaining a
  security staff;

 There is a risk of critical
  information exposure and
  knowledge drain as people
  rotate in and out of
  organizations;

 The increasingly complexity
  of technology and the cyber
  threats which organizations
  face require adequate
  security staff and skills.



15   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Cyber Security awareness


 82% of respondents indicate to
  increase cyber security
  awareness through security
  audits. These typically present
  a partial snapshot of the risk
  posture to the stakeholders;

 Furthermore respondents
  indicate specific training and
  awareness initiatives (72%),
  provisions in the disciplinary
  policy (68%), while 56%
  indicate to have been
  implementing a security
  framework that contributed to
  the general awareness.



16   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Preventing legal exposure



 Respondents indicate how
  monitoring and audit of
  compliance is the most
  common action to prevent
  legal exposure (82%);

 Half of the survey candidates
  also monitors and requests
  audit reports from your third
  party business partners as
  some of the risk scope is
  outsourced.



                                                      Other:
                                                      •  Vulnerability assessments and penetration testing;
                                                      •  Defining security controls;
                                                      •  Ensuring good contracting practices.

17   UNCLASSIFIED - CIOnet survey on Cyber Security                                                           © 2010
Assessing vulnerabilities


 About 20% of all
  organizations do not regularly
  assess their biggest
  vulnerabilities, implying they
  do not have a view on the
  most critical cyber risks they
  face;

 Organizations need a
  consolidated risk overview in
  order to define funded actions
  and manage risk
  appropriately.


                                                      Comment:

                                                      •  “It is more a day to day job whereby risks are constantly monitored and
                                                         priorities adapted overtime”



18   UNCLASSIFIED - CIOnet survey on Cyber Security                                                                     © 2010
Incident response


 Over 35% of all organizations
  do not regularly review and
  update their incident
  response plans. Several
  respondents commented
  update action was ongoing;

 As the nature of cyber
  incidents in function of threats
  and vulnerabilities is
  constantly evolving, one can
  debate if yearly updates on
  incident response plans is
  even enough.




19   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Incident communication


 Over 82% of the responding
  organizations are convinced of
  the importance of appropriate
  communication during and after
  a Cyber Security incident;

 In almost 18% of the
  respondents companies,
  inadequate awareness is in
  place regarding the significance
  of controlled incident
  communications with internal
  and external stakeholders.




20   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Business continuity management

 While many respondents
  commented on the limited scope of
  their current business continuity
  plans (BCP), a surprising 76%
  indicated such plans are in place;

 This does conflict with the fact that
  only 50% have a crisis
  communications plan, which is an
  essential part of a continuity
  planning;

 Some respondents referred to their
  third party service agreements, but
  should keep in mind their own
  responsibilities to ensure business
  continuity.



21   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Insurance


 Almost 72% indicates not
  having insurance coverage
  for cyber security incidents.
  Typically expert evidence is
  needed to calculate the
  financial and other damages
  that need to be covered;

 If an insurance policy is in
  place, 83.3% have third party
  damage coverage;

 Of all respondents, less than
  10% is insured for first party
  losses due to cyber security
  incidents.



22   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Final thoughts


 Don’t think of cyber security as merely protecting IT systems as it is
  ultimately about protecting a broader interest of the organization.
  Understand your regulatory context and possible liabilities, and take
  appropriate measures to mitigate the risk to your business;

 Approach cyber security as the ongoing management of continuously
  evolving risk in function of value to the organization, and the likelihood of
  threats and vulnerabilities;

 Ensure adequate and appropriate controls are implemented to coordinate
  and communicate actions in the case of cyber security incidents.

 The increasingly complexity of technology and the cyber threats which
  organizations face require adequate security staff, as well as broad
  awareness and skills;

 Align cyber security with other related activities in the business to create
  leverage and resource efficiencies – e.g. business continuity.

23   UNCLASSIFIED - CIOnet survey on Cyber Security                               © 2010
Thank you.




24   UNCLASSIFIED - CIOnet survey on Cyber Security   © 2010
Contact




                                       Deloitte Enterprise Risk Services
                                       Berkenlaan 8 b
                        B-1831         B-1831 Diegem
       Chris Verdonck                  Belgium
       Partner
                                       Tel: + 32 2 800 24 20
                                       cverdonck@deloitte.com


                                       Member of
                                       Deloitte Touche Tohmatsu




25   UNCLASSIFIED - CIOnet survey on Cyber Security                        © 2010

More Related Content

PDF
20101012 isa larry_clinton
PDF
20101116 deckers
PDF
The Changing Role of the CIO by CIONET Luxembourg Dec. 17th | agenda
PPT
Federal IT Initiatives - BDPA Conference Executive Panel
PDF
White Paper: Mobile Security
PDF
Top 10 leading fraud detection and prevention solution providers
PPTX
Clinton- Cyber IRT Balto 10_2012
PDF
OS17 Brochure
20101012 isa larry_clinton
20101116 deckers
The Changing Role of the CIO by CIONET Luxembourg Dec. 17th | agenda
Federal IT Initiatives - BDPA Conference Executive Panel
White Paper: Mobile Security
Top 10 leading fraud detection and prevention solution providers
Clinton- Cyber IRT Balto 10_2012
OS17 Brochure

What's hot (20)

PDF
Security annual report_mid2010
PPTX
Cybersecurity & the Board of Directors
PDF
Omlis Data Breaches Report - An Inside Perspective
PDF
The Essential Ingredient for Today's Enterprise
PDF
Raise The Cybersecurity Curtain! Be The Voice!
PPTX
Cyber Security - Things you need to know
PDF
Raise The Cybersecurity Curtain. Predictions 2021
PPTX
GCC eGov Cyberwar, Cybercrime Risks and Defences 2010
PPTX
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
PPTX
CCIAOR Cyber Security Forum
PDF
Ten Security Essentials for CIOs
PDF
Norman Broadbent Cybersecurity Report - How should boards respond
PDF
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
PDF
Cybersecurity and The Board
PPTX
THE 5 CHALLENGES
PDF
Protecting Your Business From Cyber Risks
PDF
PDF
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
PDF
NACD Directorship Article - Cyber July:Aug 2015 published
PDF
Spotlight on Technology 2017
Security annual report_mid2010
Cybersecurity & the Board of Directors
Omlis Data Breaches Report - An Inside Perspective
The Essential Ingredient for Today's Enterprise
Raise The Cybersecurity Curtain! Be The Voice!
Cyber Security - Things you need to know
Raise The Cybersecurity Curtain. Predictions 2021
GCC eGov Cyberwar, Cybercrime Risks and Defences 2010
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
CCIAOR Cyber Security Forum
Ten Security Essentials for CIOs
Norman Broadbent Cybersecurity Report - How should boards respond
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Cybersecurity and The Board
THE 5 CHALLENGES
Protecting Your Business From Cyber Risks
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
NACD Directorship Article - Cyber July:Aug 2015 published
Spotlight on Technology 2017
Ad

Viewers also liked (6)

PDF
European IT Services outsourcing market (Chinese)
PPT
Digital Agenda Scoreboard 2013: Italy
PDF
European IT trends 2014 (Japanese)
PDF
European IT trends 2014 (Chinese)
PPTX
European services outsourcing trends
PDF
The future of IT
European IT Services outsourcing market (Chinese)
Digital Agenda Scoreboard 2013: Italy
European IT trends 2014 (Japanese)
European IT trends 2014 (Chinese)
European services outsourcing trends
The future of IT
Ad

Similar to 20101012 CIOnet Cyber Security Final Results (20)

PPTX
SVB Cybersecurity Impact on Innovation Report
PDF
SVB Cybersecurity Impact on Innovation Report - Overview
PDF
Ics white paper report 2017
PDF
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
PPTX
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
PDF
2018 State of Cyber Resilience for Insurance
PDF
Resilience in the Cyber Era
PDF
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
PPTX
A holistic approach to risk management 20210210 w acfe france & cyber rea...
PDF
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
PPTX
Analyzing the WEF’s 2024 Cybersecurity Report- Insights for Tackling Cyber In...
PDF
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
PDF
Heidi
PPTX
State of endpoint risk v3
PPTX
State of endpoint risk v3
PDF
The top challenges to expect in network security in 2019 survey report
PDF
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
PPTX
CompTIA International Trends in Cybersecurity
PPTX
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
PDF
The State of IT Security for 2019
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report - Overview
Ics white paper report 2017
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
2018 State of Cyber Resilience for Insurance
Resilience in the Cyber Era
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
A holistic approach to risk management 20210210 w acfe france & cyber rea...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
Analyzing the WEF’s 2024 Cybersecurity Report- Insights for Tackling Cyber In...
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Heidi
State of endpoint risk v3
State of endpoint risk v3
The top challenges to expect in network security in 2019 survey report
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
CompTIA International Trends in Cybersecurity
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
The State of IT Security for 2019

More from CIONET (9)

PDF
European services outsourcing trends 2014
PDF
European IT Services Outsourcing market (Japanese)
PDF
Présentation "big data" Philippe Nieuwbourg
PDF
CIONET 2
KEY
Agenda Evento CIOnet - Agenda Digital europea
PDF
Joaquín Reyes-CEPSA
ZIP
Ppt Samuel Ronquillo-Cemex.pptx
PPT
CIOnet Spain Annual Event_Javier Gómez Guillamón
PDF
20090210 Ci Onet Belgium Plans 2009
European services outsourcing trends 2014
European IT Services Outsourcing market (Japanese)
Présentation "big data" Philippe Nieuwbourg
CIONET 2
Agenda Evento CIOnet - Agenda Digital europea
Joaquín Reyes-CEPSA
Ppt Samuel Ronquillo-Cemex.pptx
CIOnet Spain Annual Event_Javier Gómez Guillamón
20090210 Ci Onet Belgium Plans 2009

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PPTX
A Presentation on Artificial Intelligence
PDF
Encapsulation theory and applications.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
Teaching material agriculture food technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
KodekX | Application Modernization Development
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Machine learning based COVID-19 study performance prediction
A Presentation on Artificial Intelligence
Encapsulation theory and applications.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Teaching material agriculture food technology
The AUB Centre for AI in Media Proposal.docx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
MYSQL Presentation for SQL database connectivity
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Review of recent advances in non-invasive hemoglobin estimation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Dropbox Q2 2025 Financial Results & Investor Presentation
Building Integrated photovoltaic BIPV_UPV.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Modernizing your data center with Dell and AMD
Advanced methodologies resolving dimensionality complications for autism neur...
KodekX | Application Modernization Development
Mobile App Security Testing_ A Comprehensive Guide.pdf

20101012 CIOnet Cyber Security Final Results

  • 1. CIOnet survey on Cyber Security The results Chris Verdonck EMEA Leader, Deloitte Enterprise Risk Services Brussels, October 12th 2010
  • 2. “It's the great irony of our Information Age - the very technologies that empower us to create and to build also empower those who would disrupt and destroy.” USA President Barack Obama on "Securing Our Nation's Cyber Infrastructure “ 2 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 3. Agenda. 3 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 4. Agenda  Survey context  Respondents  Results 4 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 5. Survey Context Cyber culture is growing faster than cyber security, so everything that depends on cyber space is at risk  Information is ubiquitous - Our society and economy have become critically dependent on digital connectivity and services;  Cyber security threats are continuously increasing in complexity and occurrence; thus they require more management attention;  CIOnet members were surveyed on 16 questions regarding cyber security until September 26th 2010. 5 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 6. Respondents. 6 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 7. Response demographics Countries  53 respondents from 6 different countries;  Most responses from Belgium (35,8%) followed by Italy and UK (each 18,8%) Sectors  Responses spread over different sectors  Most respondents in Financials (24,5%), and Industrial & Manufacturing (20,7%) 7 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 8. Response company types Company type  67.9% of respondents representing their company’s headquarters. Number of employees  In terms of company size, over half of the survey responders has more then 1000+ employees. 8 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 9. Results. 9 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 10. Cyber liabilities  Almost 85% responded that they analyzed their cyber liabilities in a thorough way;  However there is still uncertainty on what regulations are applicable. EU DPA and ISO 27001 may not be enough to comply with;  Despite that respondents indicate to have assessed their liabilities, further responses in the survey indicate a need for stronger action. 10 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 11. Applicable legislation  Over 76% of the survey respondents is confident that their organization have an overview of applicable laws in the context of cyber security;  A large part of them only operates in one country, but legal aspect with regards to cyber security can differ greatly between countries. 11 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 12. Theft of trade secrets  Almost 18% of the respondents’ organizations have not assessed the risk of loosing trade secrets;  For the respondents that claim they have, the question is how comprehensive such assessment was;  It is essential to ensure that the risks regarding theft of trade secrets are frequently re-assessed and appropriate actions taken to mitigate them. 12 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 13. Impact of internal or external cyber attacks  All respondents indicated their organisation could be impacted in at least one domain;  Over 81% of respondents believes cyber attacks would impact the brand and image of their organization. Stakeholders expect cyber security challenges to be addressed appropriately;  Respondents indicate that internal attacks are more likely to cause critical operation disruption, and external attacks could affect market share more. 13 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 14. Cyber Security threats  Over 35% of respondents see a primary threat in the increased complexity of identity and access management;  It is interesting to note that almost 22% of the respondents indicate that their current controls are struggling to keep pace;  Inadequate network access control and the uptake of social networks also raises cyber security concerns. Other: •  User and management awareness of cyber risks, •  Unpatched and unsupported legacy applications and systems •  Crimeware will be the biggest threat over workstations, mobile operators and eventually mobile phones 14 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 15. Security Staff  Over 35% of the respondents’ organizations have no policy regarding maintaining a security staff;  There is a risk of critical information exposure and knowledge drain as people rotate in and out of organizations;  The increasingly complexity of technology and the cyber threats which organizations face require adequate security staff and skills. 15 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 16. Cyber Security awareness  82% of respondents indicate to increase cyber security awareness through security audits. These typically present a partial snapshot of the risk posture to the stakeholders;  Furthermore respondents indicate specific training and awareness initiatives (72%), provisions in the disciplinary policy (68%), while 56% indicate to have been implementing a security framework that contributed to the general awareness. 16 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 17. Preventing legal exposure  Respondents indicate how monitoring and audit of compliance is the most common action to prevent legal exposure (82%);  Half of the survey candidates also monitors and requests audit reports from your third party business partners as some of the risk scope is outsourced. Other: •  Vulnerability assessments and penetration testing; •  Defining security controls; •  Ensuring good contracting practices. 17 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 18. Assessing vulnerabilities  About 20% of all organizations do not regularly assess their biggest vulnerabilities, implying they do not have a view on the most critical cyber risks they face;  Organizations need a consolidated risk overview in order to define funded actions and manage risk appropriately. Comment: •  “It is more a day to day job whereby risks are constantly monitored and priorities adapted overtime” 18 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 19. Incident response  Over 35% of all organizations do not regularly review and update their incident response plans. Several respondents commented update action was ongoing;  As the nature of cyber incidents in function of threats and vulnerabilities is constantly evolving, one can debate if yearly updates on incident response plans is even enough. 19 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 20. Incident communication  Over 82% of the responding organizations are convinced of the importance of appropriate communication during and after a Cyber Security incident;  In almost 18% of the respondents companies, inadequate awareness is in place regarding the significance of controlled incident communications with internal and external stakeholders. 20 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 21. Business continuity management  While many respondents commented on the limited scope of their current business continuity plans (BCP), a surprising 76% indicated such plans are in place;  This does conflict with the fact that only 50% have a crisis communications plan, which is an essential part of a continuity planning;  Some respondents referred to their third party service agreements, but should keep in mind their own responsibilities to ensure business continuity. 21 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 22. Insurance  Almost 72% indicates not having insurance coverage for cyber security incidents. Typically expert evidence is needed to calculate the financial and other damages that need to be covered;  If an insurance policy is in place, 83.3% have third party damage coverage;  Of all respondents, less than 10% is insured for first party losses due to cyber security incidents. 22 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 23. Final thoughts  Don’t think of cyber security as merely protecting IT systems as it is ultimately about protecting a broader interest of the organization. Understand your regulatory context and possible liabilities, and take appropriate measures to mitigate the risk to your business;  Approach cyber security as the ongoing management of continuously evolving risk in function of value to the organization, and the likelihood of threats and vulnerabilities;  Ensure adequate and appropriate controls are implemented to coordinate and communicate actions in the case of cyber security incidents.  The increasingly complexity of technology and the cyber threats which organizations face require adequate security staff, as well as broad awareness and skills;  Align cyber security with other related activities in the business to create leverage and resource efficiencies – e.g. business continuity. 23 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 24. Thank you. 24 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010
  • 25. Contact Deloitte Enterprise Risk Services Berkenlaan 8 b B-1831 B-1831 Diegem Chris Verdonck Belgium Partner Tel: + 32 2 800 24 20 cverdonck@deloitte.com Member of Deloitte Touche Tohmatsu 25 UNCLASSIFIED - CIOnet survey on Cyber Security © 2010