73% - enterprise it world › wp-content › uploads › 2019 › ... · current state future state...

1
Prioritisation remains a challenge for development teams testing application security for fixing high risk vulnerabilities. Web application attacks move up the stack for profit, access, and influence. Attacks double and expose dormant threats in older soſtware. Surge in vulnerabilities shows weaponisation for use in adversarial campaigns and automated tooling. Credential theft hands over the keys to the kingdom: data, applications, and cloud infrastructure targeted. Cryptojacking ‘compute to cash’ criminality catches multiple sectors off-guard and at times accounts for more detections than all other malware combined. of all hostile activity falls into four categories: • web attacks • reconnaissance • service-specific attacks • brute-force attacks 73% Compliance, data protection and privacy regulation creates complexity and opportunity. Cybersecurity insights from the inside Executive Guide to the NTT Security 2019 Global Threat Intelligence Report Insights driven by data Leaders are increasingly savvy about building long-term cybersecurity roadmaps. Maturity is lacking… ambitions outpace preparedness. Cybersecurity is transformed by strategic relationships and the threat landscape continues to evolve… 2018 marked a record year for new vulnerabilities BUT cybersecurity maturity has a way to go. What kind of attacks? Growth in vulnerabilities discovered compared to 2017 Source: CVE Details 2018 Source: WhiteHat Security Time-to-fix vulnerabilities by risk level 2016 2017 2018 0 2,000 8,000 14,000 18,000 16,000 12,000 10,000 6,000 4,000 20,000 5,447 14,714 16,555 Time-to-fix by risk level Critical 129 days 195 days 178 days 216 days 203 days High Medium Low Note All others 27% Web attacks 32% Reconnaissance 16% Service-specific attacks 13% Brute-force attacks 12% Targeted and prepared Although attack targeting increased, there’s enhanced appetite to invest strategically in driving cybersecurity defences. All others 34% 9% 11% 12% 17% 17% 0% 5% 10% 15% 20% 25% 30% 35% 40% Government Education Technology Finance Business and professional services Education Energy and utilities Financial services Healthcare Manufacturing Media and communication Business and professional services Government Technology Travel and transportation 0 1 2 3 4 5 1.21 1.10 1.03 2.07 Current state Future state 1.45 1.67 1.37 1.91 1.31 2.07 1.52 1.78 1.66 1.11 1.82 2.40 1.60 2.81 2.81 3.01 3.10 3.12 3.28 3.38 3.30 3.48 3.51 1.71 1.71 1.30 regulations and legislation business strategy and alignment risk appetite threat profile industry competition culture Factors that influence investment decisions Cybersecurity requires strong leadership and business alignment to drive change Global industry attack targets Global industry maturity levels of all attacks originated from IP addresses within the US and China. • Economic powerhouses’ infrastructure is being used as a launchpad for attacks. • An attack source’s IP address does not always reflect the attacker’s location. 35% US 22% China 13% Japan 6% France 5% The Netherlands 5% All others 49% Where do attacks come from? What does the future hold? How can we help? Global MEA Europe Americas APAC Australia 0 1 2 3 4 5 Current state Future state 1.45 1.85 3.30 3.60 2.90 3.56 3.20 3.41 1.77 1.83 1.42 1.48 1.21 2.35 1.45 1.75 1.64 1.77 Globally, organisations are less than half way to their desired future state. The Americas and Europe both fall significantly behind the global benchmark. In terms of future cybersecurity maturity ambitions, MEA rates the highest, slightly ahead of the Americas. Global Threat Intelligence Report Ambitions outpace preparedness Global attack and incident response data gathered from NTT Security and NTT operating companies and research sources. security clients Cybersecurity Advisory Managed Security Services We formulate processes and policies using empirical evidence and benchmarking to make practical recommendations. We offer consistent services to manage and optimise your security infrastructure. research and development centres 10,000 07 Security Operations Centres 10 trillion logs analysed 6.1+ Subscribe to our Emerging Threat Advisory Service Dimension Data’s Threat and Vulnerability Advisory Service provides you with visibility of vulnerabilities that are being actively exploited across the world, sourced from our real-time threat management platforms. Join the conversation #globalthreatreport Linkedin Dimension Data @Dimensiondata www.dimensiondata.com/globalthreatreport Global maturity levels by region

Upload: others

Post on 30-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 73% - Enterprise IT World › wp-content › uploads › 2019 › ... · Current state Future state 1.45 1.85 3.30 3.60 2.90 3.56 3.20 3.41 1.77 1.83 1.42 1.48 1.21 2.35 1.45 1.75

Prioritisation remains a challenge for development teams

testing application security for fixing high risk vulnerabilities.

Web application attacks move up the stack for profit, access, and influence. Attacks double and expose dormant threats

in older software.

Surge in vulnerabilities shows weaponisation for use in adversarial campaigns and automated tooling.

Credential theft hands over the keys to the kingdom: data, applications, and

cloud infrastructure targeted.

Cryptojacking ‘compute to cash’ criminality catches

multiple sectors off-guard and at times accounts for more detections than all other

malware combined.

of all hostile activity falls into four categories:• web attacks• reconnaissance• service-specific attacks• brute-force attacks

73%

Compliance, data protection and privacy regulation creates

complexity and opportunity.

Cybersecurity insights from the inside

Executive Guide to the NTT Security 2019 Global Threat Intelligence Report

Insights driven by data

Leaders are increasingly savvy

about building long-term cybersecurity roadmaps.

Maturity is lacking… ambitions outpace

preparedness.

Cybersecurity is transformed by strategic

relationships and the threat landscape continues to evolve…

2018 marked a record year for new vulnerabilities BUT cybersecurity maturity has a way to go.

What kind of attacks?

Growth in vulnerabilities discovered compared to 2017Source: CVE Details 2018 Source: WhiteHat Security

Time-to-fix vulnerabilities by risk level

2016 2017 20180

2,000

8,000

14,000

18,000

16,000

12,000

10,000

6,000

4,000

20,000

5,447

14,714

16,555

Time-to-fix by risk level

Critical 129days

195days

178days

216days

203days

High

Medium

Low

Note

All others27%

Web attacks32%

Reconnaissance16%Service-specific

attacks13%

Brute-forceattacks12%

Targeted and prepared

Although attack targeting increased, there’s enhanced appetite to invest strategically in driving cybersecurity defences.

All others 34%

9%

11%

12%

17%

17%

0% 5% 10% 15% 20% 25% 30% 35% 40%

Government

Education

Technology

Finance

Business and professional services

Education

Energy and utilities

Financial services

Healthcare

Manufacturing

Media and communication

Business and professional services

Government

Technology

Travel and transportation

0 1 2 3 4 5

1.21

1.10

1.03 2.07Current state

Future state

1.45 1.67

1.37 1.91

1.31 2.07

1.52 1.78

1.66

1.11

1.82

2.40

1.60 2.81

2.81

3.01

3.10

3.12

3.28

3.38

3.30

3.48

3.51

1.71

1.71 1.30

regulations and

legislation

business strategy and

alignment

risk appetite

threat profile industry competition culture

Factors that influence investment decisions

Cybersecurity requires strong leadership and business alignment to drive change

Global industry attack targets Global industry maturity levels

of all attacks originated from IP addresses within the US and China.

• Economic powerhouses’ infrastructure is being used as a launchpad for attacks.

• An attack source’s IP address does not always reflect the attacker’s location.

35% US22%

China13%

Japan6%

France5%

The Netherlands5%

All others49%

Where do attacks come from?

What does the future hold?

How can we help?

Global

MEA

Europe

Americas

APAC

Australia

0 1 2 3 4 5

Current state

Future state

1.45 1.85 3.30

3.60

2.90

3.56

3.20

3.41

1.77 1.83

1.42 1.48

1.21 2.35

1.45 1.75

1.64 1.77

Globally, organisations are less than half way to their desired future state. The Americas and Europe both fall significantly behind the global benchmark.

In terms of future cybersecurity maturity ambitions, MEA rates the highest, slightly ahead of the Americas.

Global Threat Intelligence Report

Ambitions outpace preparedness

Global attack and incident response data gathered from NTT Security and NTT operating companies and research sources.

security clients

Cybersecurity Advisory

Managed Security Services

We formulate processes and policies using empirical evidence and benchmarking to

make practical recommendations.

We offer consistent services to manage and optimise your security

infrastructure.

research and development centres

10,000

07

Security Operations Centres10

trillion logs analysed6.1+

Subscribe to our Emerging Threat Advisory Service

Dimension Data’s Threat and Vulnerability Advisory Service provides you with visibility of vulnerabilities that are being actively exploited across the

world, sourced from our real-time threat management platforms.

Join the conversation

#globalthreatreport

Linkedin Dimension Data

@Dimensiondata

www.dimensiondata.com/globalthreatreport

Global maturity levels by region