State of Cybersecurity: Implications for 2015
An ISACA and RSA Conference Survey
In January 2015, more than 1,500 individuals participated in the survey, with 649 completing it.
Media Inquiries:
Joanne Duffer, ISACA, +1.847.660.5564,
Deborah Oetjen, ISACA, +1.847.660.5566,
- How likely do you think it is that your organization will experience a cyberattack in 2015? (n=766)
 - Very likely………………………………………………………………………..38%
 - Likely……………………………………………………………………………..44%
 - Not very likely…………………………………………………………………....16%
 - Not at all likely…………………………………………………………………….1%
 
- Do you think the incident motivation is: (n=741)
 - Financial gain……………………………………………………………………..33%
 - Intellectual property theft………………………………………………………...19%
 - Theft of classified data……………………………………………………….…..12%
 - Theft of PII……………………………………………………………………..…12%
 - Disruption of service……………………………………………………..……….24%
 
- Has your organization been part of a cybercrime during 2014? (n=717)
 - Yes……………………………………………………………………………..…21%
 - No……………………………………………………………………….………...59%
 - I don’t know………………………………………………………………………20%
 
- In 2014, has your enterprise experienced an increase or decrease in security attacks as compared to 2013? (n=1,498)
 - More attacks………………………………………………………………………77%
 - Fewer attacks…………………………………………………………………...…23%
 
- Were any user credentials stolen during 2014? (n=804)
 - Yes………………………………………………………………………………..17%
 - No…………………………………………………………………………………60%
 - I don’t know………………………………………………………………………23%
 - Do you provide employees with mobile devices? (n=769)
 - Yes………………………………………………………………………………..83%
 - No…………………………………………………………………………………17%
 
- Has your organization experienced physical loss of assets in 2014? (n=759)
 - Yes………………………………………………………………………………..63%
 - No…………………………………………………………………………………37%
 
- What types of assets? (n=535)
 - Workstations……………………………………………………………………...36%
 - Servers…………………………………………………………………………….11%
 - Network devices………………………………………………………………….14%
 - Mobile devices…………………………………………………………………...91%
 
- Which of the following threat actors exploited your enterprise in 2014? (n=636)
 - Cybercriminals……………………………………………………………….…...46%
 - Nation/State………………………………………………………………..……...17%
 - Hacktivists……………………………………………………………………..….20%
 - Hackers……………………………………………………………………..……..40%
 - Malicious insiders………………………………………………………………...29%
 - Nonmalicious insiders………………………………………………..…….…….41%
 
- Which of the following attack types have exploited your enterprise in 2014? (n=704)
 - Hacking attempts…………………………………………………………..……..50%
 - Malware………………………………………………………………………..…66%
 - Social engineering……………………………………………………………..…46%
 - Phishing………………………………………………………………………..….68%
 - Watering hole…………………………………………………………………..…..8%
 - Man-in-the-middle attacks……………………………………………………….11%
 - SQL injections……………………………………………………………………22%
 - Insider theft……………………………………………………………………....25%
 - Loss of mobile devices………………………………………………………...….44%
 
- Are you comfortable with your security team’s ability to detect and respond to incidents? (n=839)
 - Yes………………………………………………………………………………..46%
 - Yes, but only for simple issues…………………………………………………...41%
 - No…………………………………………………………………………………13%
 
- Are you able to fill your open security positions? (n = 939)
 
- Yes…………………………………………………………………………….….65%
 - No…………………………………………………………...…………………….35%
 
- On average, how long does it take you to fill a security position? (n=926)
 - Less than 2weeks…………………………………..…………………………...... 3%
 - 1 month…………………………………………………………………………..13%
 - 2 months………………………………………………………………………….21%
 - 3 months………………………………………………………………………….30%
 - 6 months………………………………………………………………………….23%
 - Cannot fill………………………………………………………………………...10%
 
- On average, how many applicants are qualified? (n=900)
 - Less than 25%...... 52%
 - 20-50%...... 32%
 - 50-75%...... 12%
 - 75-100%...... 4%
 
- For those candidates considered qualified, please rank the following reasons, where 5 is the most prevalent. (n=885)
 
1 / 2 / 3 / 4 / 5
Practical verification (hands-on) / 26% / 14% / 13% / 14% / 33%
Formal education / 36% / 20% / 16% / 14% / 14%
Specific training / 9% / 33% / 30% / 21% / 8%
Certifications / 10% / 20% / 26% / 29% / 15%
Reference/Personal endorsement / 19% / 13% / 15% / 23% / 30%
- Do you feel that certification is valuable? (n=856)
 - Yes……………………………………………………………………………...... 92%
 - No…………………………………………………………………………………..8%
 
- When looking for candidates to fill open security positions, do you require certification? (n=845)
 - Yes…………………………………………………………………………..……69%
 - No…………………………………………………………………………………31%
 
- What is the biggest skill gap you see in today’s security professionals? (n=842)
 - Technical skills…………………………………………………………………...46%
 - Ability to understand the business……………………………………………..…72%
 - Communication…………………………………………………………………...42%
 
- Which of the following security roles does your organization employ? (n=838)
 - CISO………………………………………………………………………………55%
 - Technical Director/Deputy CISO………………………………………………...27%
 - Information Assurance Manager/Information Systems Security Manager……..53%
 - Security Consultant……………………………………………………………….51%
 - Security Administrator…………………………………………………………...52%
 - Security Architect………………………………………………………………...49%
 - Security Engineer (network, information, application)…………………………..52%
 - Security Software Developer……………………………………………………..17%
 - Malware Analyst………………………………………………………………….19%
 - Incident Handler/Responder……………………………………………………...40%
 - Security Auditor…………………………………………………………………..44%
 - Research & Development (i.e., capabilities development)…...…………………..13%
 - Risk/Vulnerability Analyst……………………………………………………….43%
 - Reverse Engineer………………………………………………………………...... 7%
 - Penetration Tester………………………………………………………………...34%
 - Governance Manager……………………………………………………………..29%
 - Compliance Manager…………………………………………………………..…46%
 - Computer Crime Investigator/Forensics Expert………………………………….24%
 
- Where does security report to in your organization? (n=621)
 - CEO……………………………………………………………………………….20%
 - CIO………………………………………………………………………………..60%
 - CFO………………………………………………………………………………...6%
 - Audit………………………………………………….…………………………….4%
 - Board of Directors………………………………………………………………...11%
 
- How will the security budget change in 2015? (n=845)
 - Increase…………………………………………………………………………...56%
 - Decrease…………………………………………………………………………..11%
 - Stay the same……………………………………………………………………..33%
 
- How much did your organization spend on continuing education opportunities for security professionals (e.g., training, conferences, etc.)? (n=834)
 - Greater than $1,000…………………..…………………………………………..19%
 - $1,001-$4,999…………………………………………………………………….23%
 - $5,000-$9,999…………………………………………………………………….21%
 - $10,000-$19,999………………………………………………………………….11%
 - Greater than $20,000……………..……………………………………………….25%
 
- How concerned is your organization with Internet of Things (IoT) in the workplace? (n=741)
 
Very Concerned / Concerned / Not Very Concerned / Not Concerned
19% / 45% / 27% / 9%
- Do you restrict access to social media in your organization? (n=718)
 - Yes………………………………………………………………………………..58%
 - No…………………………………………………………………………………42%
 
- Does your company have a security awareness program? (n=858)
 - Yes………………………………………………………………………………..87%
 - No…………………………………………………………………………………13%
 
- Do you test security controls? (n=846)
 - No…………………………………………………………………………………..5%
 - No, but we’re planning to do so……………………………………………………8%
 - No, but we’re developing tests……………………………………………………..4%
 - Periodically (at least annually)……………………………………………………51%
 - Routinely (at least quarterly)……………………………………………………...32%
 
- Is your board of directors concerned with security? (n=710)
 - Yes………………………………………………………………………………..79%
 - No…………………………………………………………………………………10%
 - Don’t know……………………………………………………………………….12%
 
- Does the organization’s executive team support security? (n=705)
 - Yes………………………………………………………………………………..87%
 - No…………………………………………………………………………………13%
 
- How is the support demonstrated? (n=649)
 - Enforcing security policy………………………………………………………....71%
 - Providing security with appropriate funding……………………………………..63%
 - Following good security practices themselves……………………………………41%
 - Mandating security awareness training…………………………………………...56%
 
DEMOGRAPHICS
In which region do you reside? (n=1,548)
- Asia……………………………………………………………………………………14%
 - Latin America…………………………………………………………………………..6%
 - Europe/Africa………………………………………………………………………….32%
 - North America……………………………………………………………..…………..44%
 - Oceania………………………………………………………………………………….4%
 
In which of the following industries are you employed? (n=1,459)
- Aerospace…………………………………………………………………………….…1%
 - Education/Student……………………………………………………………….………2%
 - Financial/Banking………………………………………………………………….…..23%
 - Government/Military—National/State/Local………………………………………….11%
 - Health Care/Medical…………………………………………………………………….5%
 - Insurance………………………………………………………………………….…..…4%
 - Legal/Law/Real Estate…………………………………………………………….…….1%
 - Manufacturing/Engineering……………………………………………………….…….6%
 - Mining/Construction/Petroleum/Agriculture……………………………………….…...3%
 - Pharmaceutical…………………………………………………………………………..1%
 - Public Accounting………………………………………………………………………1%
 - Retail/Wholesale/Distribution…………………………………………………………..3%
 - Technology Services/Consulting……………………………………………...……….29%
 - Telecommunications/Communications…………………………………………………7%
 - Transportation…………………………………………………………………………..2%
 - Utilities………………………………………………………………………………….2%
 
What is your main area of responsibility? (n=1,537)
- Information/Cybersecurity Management……………………………………..………..50%
 - Information/Cybersecurity Practitioner………………………………………………..16%
 - Risk Management……………………………………………………………………...13%
 - IT………………………………………………………………………………………11%
 - Other…………………………………………………………………………………...10%
 
How many people are employed within your enterprise? (n=1,536)
- 1-99…………………………………………………………………………………….15%
 - 100-249………………………………………………………………………………….7%
 - 250-499………………………………………………………………………………….6%
 - 500-999………………………………………………………………………………….8%
 - 1,000-4,999…………………………………………………………………………….22%
 - Greater than 5,000…………………….……………………………………….………41%
 
Note: Due to rounding to the nearest whole number, responses may not add up to 100%.
