Big Data Cybersecurity Analytics, conducted by Ponemon Institute and sponsored by Cloudera, provides more evidence that the use of big data analytics is very important to ensuring a strong cybersecurity posture. Dr. Larry Ponemon and Rocky DeStefano, Cloudera’s cybersecurity subject matter expert, will participate in a webinar on October 11 to discuss key findings from the research.
Following are key findings from the research.
• Organizations are 2.25X more likely to identify a security incident within hours or minutes when they are a heavy user of big data cybersecurity analytics.
• Eighty-one percent of respondents say demand for big data for cybersecurity analytics has significantly increased over the past 12 months.
• Heavy users of big data analytics have a higher level of confidence in their ability to detect cyber incidents than light users. With respect to 11 common cyber threats, the biggest gaps between heavy and light users concern the organization’s ability to detect advanced malware/ransomware, compromised devices (e.g., credential theft), zero day attacks and malicious insiders. The smallest gaps in detection between heavy and light users concern denial of services, web-based attacks and spear phishing/social engineering.
• Companies represented in this research are allocating an average of $14.50 million to IT security in fiscal year 2016 and an average of $2.32 million (16 percent) of this budget is allocated to analytics tools.
We hope you will join us for a unique perspective on the state of big data cybersecurity analytics.
Ponemon Institute is pleased to present the findings of Global Trends in Identity Governance & Access Management, sponsored by Micro Focus. The purpose of this study is to understand companies’ ability to protect access to sensitive and confidential information and what they believe is necessary to improve the protection. All participants in this study are involved in providing end users access to information resources in their organizations. Some of the trends discussed in the report are:
1. Employees are frustrated with access rights processes, and IT security is considered a bottleneck.
2. Responding to requests for access is considered slow.
3. Control over access management is decentralized.
4. Certain technologies are considered an important part of meeting identity governance and access management requirements.
5. A single-factor authentication approach is no longer effective.
6. Integration of machine learning within identity governance solutions is critical (64 percent of respondents).
7. The most difficult access policies to implement are those for enforcing access policies in a consistent fashion across all information resources in the organization.
8. End users have more access than they should.
9. Migration to Mobile First and mobile platforms has affected access management approaches.
10. New threats created by disruptive technologies will reduce organizations’ ability to mitigate governance and access management risks.
11. The ability to manage access in the Internet of Things (IoT) is a concern.
12. Effective identity governance and access management across the enterprise is achievable.