As Cybercrime Threats Continue to Escalate, 2013 State of Cybercrime Survey from PwC and CSO Finds Companies Aren’t Doing Enough to Defend Themselves
25/10/2013 13:11
Stark reality: respondents still do not understand the extent of threats and how to combat them; survey results point to serious implication to U.S. and global business if senior executives do not take action now
PwC US and CSO magazine released the 2013 State of Cybercrime Survey, which reveals that while cybercrime threats are on the rise, current attempts to counter them remain largely unsuccessful. According to the report, organizations have made little progress in developing ways to defend themselves against both internal and external cyber opponents. Over 500 U.S. executives, security experts, and others from the private and public sectors were surveyed on their views on the state of cybercrime. The survey is a collaborative effort with PwC, CSO magazine, the U.S. Secret Service, the Software Engineering Institute CERT® Program at Carnegie Mellon University, and the FBI.
“The facts are clear: today’s organizations are not taking the necessary steps to mitigate the risk of cybercrime, even in the face of increasingly serious and frequent threats,” said David Burg, PwC principal in the firm’s U.S. Advisory practice focused on cybersecurity. “PwC believes the time is now for organizations to take action. The threat to U.S. business and our nation’s infrastructure is very real. Cybersecurity is a business imperative, and senior executives and Boards need to understand the challenges, educate their employees to raise awareness and increase vigilance, and apply cyber threat intelligence to help abate risks from sophisticated threat actors.”
“Possibly the most alarming theme that came out of this year’s survey results was that U.S. organizations are misjudging the severity of risks they face from cyber attacks from a financial, reputational, and regulatory perspective,” said Bob Bragdon, vp and publisher, CSO. “Organizations have increased their attack surface as a result of doing business in an increasingly interconnected and interdependent business landscape. Cyber threats can come from outside and inside the organization. Public awareness has been largely focused on the more sensational successful cyber espionage attacks from nation-states, but the fact is insiders with malicious intent also pose a great security risk.”
Although the survey did confirm that attacks continue to range from targeted and sophisticated to fairly simple exploits of vulnerabilities created by years of underinvestment in security programs, technologies, and processes, PwC believes the cybersecurity challenge can – and must -- be met. In many cases companies can be successful in mitigating these attacks with a thorough cybersecurity strategy that is aligned to the business strategy and includes vigilant and proactive awareness of the threat environment, a strong asset identification and protection program and is supported by proactive monitoring and enhanced incident response processes. Attacks that are most severe, often from nation-states, should be faced in conjunction with government agencies.
“Insiders continue to be a threat that must be recognized as part of an organization’s enterprise-wide risk assessment. Whether an incident is perpetrated by an employee, contractor, or trusted business partner with malicious intent or without, organizations should implement controls to prevent and detect suspicious activity and take action to consistently respond to the activity,” said Randy Trzeciak, technical manager of the Insider Threat Center at CERT.
For the second year in a row, respondents identified insider crimes (33.73 percent) as likely to cause more damage to an organization than external attacks (31.34 percent). The study found that:
• Seventeen percent of respondents who had suffered an insider attack did not know what the consequences entailed;
• Thirty-three percent of respondents had no formalized insider threat response plan;
• Twice as many respondents indicated “non-malicious insiders” cause more sensitive data loss than malicious inside actors; and
• Of those who did know what the insider threat handling procedures were, the majority reported that the cases were handled in-house, without legal action or law enforcement involvement
“One of the key elements in defending against insider attacks is employee training and awareness,” added Burg. “Insider threat actors often show early warning signs of malicious intent that IT security tools cannot detect, but which employees and managers will notice – and can respond accordingly.”
“The potential threat from insiders cannot be underestimated or dismissed as inconsequential,” said Ed Lowry, Special Agent in Charge, Criminal Investigative Division, U.S. Secret Service. “In the current environment, any business model must include a comprehensive cyber security plan that addresses both physical and IT systems security threats. This plan should include education, training, and awareness of all employees and redundant auditing procedures that will help mitigate a single point of failure vulnerability.”
"We must consistently get past the privacy and liability issues that arise in the private sector reporting cyber intrusions to the government," said FBI Executive Assistant Director Richard McFeely. "When that happens, we have seen recent notable examples of the power of private sector and government coming together to counter our cyber adversaries."
“Cybercrime is an equal opportunity event and an active cyber defense program is imperative for all organizations,” continued Burg. “Today’s business leaders need to step up and take a proactive stand to protect their business ecosystem.”
For the full survey report, please visit: www.pwc.com/cybersecurity.
PwC US and CSO magazine released the 2013 State of Cybercrime Survey, which reveals that while cybercrime threats are on the rise, current attempts to counter them remain largely unsuccessful. According to the report, organizations have made little progress in developing ways to defend themselves against both internal and external cyber opponents. Over 500 U.S. executives, security experts, and others from the private and public sectors were surveyed on their views on the state of cybercrime. The survey is a collaborative effort with PwC, CSO magazine, the U.S. Secret Service, the Software Engineering Institute CERT® Program at Carnegie Mellon University, and the FBI.
“The facts are clear: today’s organizations are not taking the necessary steps to mitigate the risk of cybercrime, even in the face of increasingly serious and frequent threats,” said David Burg, PwC principal in the firm’s U.S. Advisory practice focused on cybersecurity. “PwC believes the time is now for organizations to take action. The threat to U.S. business and our nation’s infrastructure is very real. Cybersecurity is a business imperative, and senior executives and Boards need to understand the challenges, educate their employees to raise awareness and increase vigilance, and apply cyber threat intelligence to help abate risks from sophisticated threat actors.”
“Possibly the most alarming theme that came out of this year’s survey results was that U.S. organizations are misjudging the severity of risks they face from cyber attacks from a financial, reputational, and regulatory perspective,” said Bob Bragdon, vp and publisher, CSO. “Organizations have increased their attack surface as a result of doing business in an increasingly interconnected and interdependent business landscape. Cyber threats can come from outside and inside the organization. Public awareness has been largely focused on the more sensational successful cyber espionage attacks from nation-states, but the fact is insiders with malicious intent also pose a great security risk.”
Although the survey did confirm that attacks continue to range from targeted and sophisticated to fairly simple exploits of vulnerabilities created by years of underinvestment in security programs, technologies, and processes, PwC believes the cybersecurity challenge can – and must -- be met. In many cases companies can be successful in mitigating these attacks with a thorough cybersecurity strategy that is aligned to the business strategy and includes vigilant and proactive awareness of the threat environment, a strong asset identification and protection program and is supported by proactive monitoring and enhanced incident response processes. Attacks that are most severe, often from nation-states, should be faced in conjunction with government agencies.
“Insiders continue to be a threat that must be recognized as part of an organization’s enterprise-wide risk assessment. Whether an incident is perpetrated by an employee, contractor, or trusted business partner with malicious intent or without, organizations should implement controls to prevent and detect suspicious activity and take action to consistently respond to the activity,” said Randy Trzeciak, technical manager of the Insider Threat Center at CERT.
For the second year in a row, respondents identified insider crimes (33.73 percent) as likely to cause more damage to an organization than external attacks (31.34 percent). The study found that:
• Seventeen percent of respondents who had suffered an insider attack did not know what the consequences entailed;
• Thirty-three percent of respondents had no formalized insider threat response plan;
• Twice as many respondents indicated “non-malicious insiders” cause more sensitive data loss than malicious inside actors; and
• Of those who did know what the insider threat handling procedures were, the majority reported that the cases were handled in-house, without legal action or law enforcement involvement
“One of the key elements in defending against insider attacks is employee training and awareness,” added Burg. “Insider threat actors often show early warning signs of malicious intent that IT security tools cannot detect, but which employees and managers will notice – and can respond accordingly.”
“The potential threat from insiders cannot be underestimated or dismissed as inconsequential,” said Ed Lowry, Special Agent in Charge, Criminal Investigative Division, U.S. Secret Service. “In the current environment, any business model must include a comprehensive cyber security plan that addresses both physical and IT systems security threats. This plan should include education, training, and awareness of all employees and redundant auditing procedures that will help mitigate a single point of failure vulnerability.”
"We must consistently get past the privacy and liability issues that arise in the private sector reporting cyber intrusions to the government," said FBI Executive Assistant Director Richard McFeely. "When that happens, we have seen recent notable examples of the power of private sector and government coming together to counter our cyber adversaries."
“Cybercrime is an equal opportunity event and an active cyber defense program is imperative for all organizations,” continued Burg. “Today’s business leaders need to step up and take a proactive stand to protect their business ecosystem.”
For the full survey report, please visit: www.pwc.com/cybersecurity.