trends in encryption and data security thales data threat report. trends in encryption and data...
TRANSCRIPT
www.thales-esecurity.com
2018 THALES DATA THREAT REPORT
Trends in Encryption and Data Security
GLOBAL EDITION
2018 THALES DATA THREAT REPORTNOW IN ITS SIXTH YEAR
1,200+ SENIOR IT SECURITY EXECUTIVES SURVEYED GLOBALLY | 500 U.S. TOTAL
Copyright 2018 Thales
U.S.U.K.
GERMANY
JAPAN
INDIA
SWEDENNETHERLANDS
KOREA
IT’S 2018 - CHANGE HOW YOU PROTECT YOUR DATA.OR BE BREACHED. AGAIN.
67%breached globally
71%breached in the US
BREACHED IN THE LAST YEAR
Global Breaches US Breaches
2018
2017
2016
breachedboth in thelast yearandpreviously
Up from
11% last year
15%
BREACHED EVER
36% 46%
26% 24%
21% 20%
BREACHED …. AGAIN!
DIGITAL TRANSFORMATION WITHOUT DATA SECURITYIT’S LIKE DRIVING OFF A CLIFF!
HEADLONG ADOPTION COMPOUNDS THE PROBLEM
94% use digital transformation technologies with sensitive data(cloud, big data, IoT, containers, blockchain and mobile payments)
42% use more than 50 SaaS applications
99%use Big
Data
94%implement
IoT
91%working on or
usingmobile payments
53% use3 or more PaaS environments
57% use3 or more IaaS vendors
GROUNDHOG DAY: TIMES HAVE CHANGEDSECURITY STRATEGIES HAVE NOT
IT Security pros know data at rest security is most effective at protecting sensitive information–but aren’t prioritizing increased spending
Rated Effective Spending Increase
Endpoint & mobileAnalysis & correlation
Data at rest Data in motionNetwork
74%50%
64%57%
77%40%
75%48%
75%48%
DEPLOYING TO THE CLOUDDATA SECURITY REQUIRED
Top Cloud Security Concerns(rates of very/extremely concerned)
64%
62%58%
58%57%
54%
Attacks at the Service Provider
Lack of control over location of data
Security of my organization’sdata in the cloud
Managing Encryption Keys acrossmultiple cloud environments
Custodianship of encryption keysMeeting compliance requirements
Encryption The top IT security control needed to expand cloud adoption
44% 42% 41%34%
Encryption of Detailed ITcloud data with and Physical
Enterprise premises key management and storage
Security information
Encryption ofcloud data
with CSP key management and storage
HSMs on premises or in
the cloud
What are enterprises doing about the problem today?
Implementing CASB
46%
Enabling encryption
services offeredby the CSP
51%
Deploying orusing a BYOK
solution
40%
EVERYBODY IS USING BIG DATASENSITIVE DATA USE COMPOUNDS PROBLEMS
99% of enterprises now use big data
45% are using sensitive datawithin big data environments today
Top concerns for sensitive data within big data environments
Data may be anywhere
Security of reports
Privacy Violations
Lack of native security frameworks
Privileged user access
34%
33%
30%
27%
What’s needed to speedBig Data adoption?
36%35%
32% 31%
Improved System levelmonitoring and encryption
reporting and accesscontrols
Encryption ofdata thatenablesanalysis
Compliance certifications
Stronger userauthentication
38%
30%
MOBILE PAYMENTS ON THE RISEENCYRPTION REQUIRED
91% Using or planning to use mobile payments
37% are using sensitive data with mobile applications
Encryption a key tool enablingsafe use of mobile payments
Encryption establishes secureidentity with digital birthcertificates for devices
Encryption protectsdata-in-transit
Encryption protects dataon devices
Encryption and access controls help organizations meetcompliance requirements forback end data stores
already in production
41% 24%
In pilot or testing
26%
evaluating
Top concerns with mobile payments41% 39% 37% 36% 35%
PII data Payment cardinformation
W eakauthentication
Fraudsters – newaccount fraud
Fraudsters –account takeover
ENCRYPTION – A KEYSTONE TECHNOLOGYFOR PROTECTING DATA
Privacy Requirements: Encryption the top tool needed to meet newPrivacy requirements like GDPR
44%
35%
38%
48%
41%
Cloud: The top tool for more cloud use
Secure Identity needed to drive Big Data Adoption
Big Data: Encryption needed to drive Big Data Adoption
IoT: Encryption the top tool to increase ability to use IoT
Containers: Encryption drives Container usage
42%
Encryption tools top the plan for data security related spending to be purchased in the next year
Global tools US tools
45%43%
42%
Tokenization
Encryption with BYOK
Hardware Security Modules
44%43%
41%
Encryption needed to drive the adoption of the technologies needed for digital transformation