openPR Logo
Press release

Ponemon and AccessData Study Reveals Majority of Organizations Unable to Effectively Respond to and Resolve a Cyber-Attack

03-13-2014 06:39 PM CET | IT, New Media & Software

Press release from: AccessData Group

DUBAI, United Arab Emirates – 11th March, 2014 – AccessData, the leader in incident resolution solutions, and the Ponemon Institute released new findings focused on the current state of incident response and threat intelligence and how both can be improved to better benefit organizations. The report, Threat Intelligence & Incident Response: A Study of U.S. & EMEA Organizations, sponsored by AccessData, surveyed 1,083 CISOs and security technicians in the United States and EMEA about how their company handles the immediate aftermath of a cyber-attack and what would help their teams more successfully detect and remediate these events.

Startling findings show that the lack of incident detection and investigation puts companies and their CISOs’ jobs at significant risk. In fact, when a CEO and Board of Directors asks a security team for a briefing immediately following an incident, 65% of respondents believe that the briefing would be purposefully modified, filtered or watered down. Additionally, 78% of respondents believe most CISOs would make a “best effort guess” based on limited information, and they would also take action prematurely and report that the problem had been resolved without this actually being the case.

This alarming disconnect results from several critical shortcomings in the current point solution approach to cybersecurity and incident response (IR), namely:

• Lack of timely compromise detection: 86% of respondents say detection of a cyber-attack takes too long;
• Inability of point solutions to prioritize alerts as they come in: 85% say they suffer from a lack of prioritization of incidents;
• Lack of integration between point solutions: 74% say poor or no integration between security products negatively affects response capabilities; and
• An overwhelming number of alerts paralyzing IR efforts: 61% say too many alerts from too many point solutions also hinders investigations.

“When a cyber-attack happens, immediate reaction is needed in the minutes that follow, not hours or days,” said Dr. Larry Ponemon, chairman and founder of the Ponemon Institute. “It’s readily clear from the survey that IR processes need to incorporate powerful, intuitive technology that helps teams act quickly, effectively and with key evidence so their companies’ and clients’ time, resources and money are not lost in the immediate aftermath of the event.”

Further, the respondents also shared growing concerns about the inability to find the root cause of a compromise. While 66% of respondents believe determining root cause of prior incidents enables them to strengthen defenses, 38% of respondents say determining the root cause of a compromise could take a year while an alarming 41% believe they would never be able to identify the root-cause of security events with certainty.

Lastly, integrated threat intelligence – a hugely promising approach to arming CISOs with the latest indicators of compromise (IOC) information and ability to confirm threats – appears to be largely unusable by current security products, with a full 59% of respondents saying they are not able to efficiently and effectively use threat intelligence with their existing security products.

“Today, companies focus primarily on the protective aspect of their information security,” said Craig Carpenter, Chief Cybersecurity Strategist at AccessData. “While protection is obviously important, this research reinforces the critical need for organizations to invest in automated IR technology integrating security, forensics and eDiscovery solutions to facilitate not just incident response, but incident detection, investigation and resolution. CISOs are clearly saying their disparate tool sets are not keeping up with the threats they face. What they need is an incident resolution platform that doesn’t just integrate alerts from myriad point solutions, but makes intelligence actionable and automates significant portions of the IR process, allowing them to focus on the most pressing incidents.”

Additional key findings revealed that current security products make it difficult to import multiple threat intelligence feeds or quickly investigate mobile devices:

• 40% say none of their security products support imported threat intelligence from other sources
• 86% rate the investigation of mobile devices as difficult
• 54% say they are not able to or unsure of how to locate sensitive data such as trade secrets and personally identifiable information (PII) on mobile devices

Additional Resources
• AccessData Ponemon Report
• Ponemon Study blog

Follow us on Twitter at @AccessDataGroup.

About the Ponemon Institute
The Ponemon Institute© is dedicated to advancing responsible information and privacy management practices in business and government. To achieve this objective, the Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations in a variety of industries. For more information, visit www.ponemon.org.

About AccessData
AccessData Group makes the world’s most advanced and intuitive incident resolution solutions. AccessData technology delivers real-time insight, analysis, response and resolution of data incidents, including cyber threats, insider threats, mobile and BYOD risk, GRC (Governance Risk & Compliance) and eDiscovery events. Over 130,000 users in corporations, law enforcement, government agencies, and law firms around the world rely on AccessData software to protect them against the risks present in today’s environment of continuous compromise. http://accessdata.com.

# # #

Product Contact
Geoff Brooks
AccessData Group
Tel: +971 (50) 6527659
Email: gbrooks@accessdata.com

Vivian Gevers
Managing Director
ARM
Tel: +9714 4221260
Email: vivian.gevers@arm.ae

Media Contact:
Colin Saldanha
Procre8
Villa 41, 81D Street, Uptown Mirdiff, PO BOX 78835, Dubai
Tel: +971 (50) 6400762
Email: colin@procre8.biz

This release was published on openPR.

Permanent link to this press release:

Copy
Please set a link in the press area of your homepage to this press release on openPR. openPR disclaims liability for any content contained in this release.

You can edit or delete your press release Ponemon and AccessData Study Reveals Majority of Organizations Unable to Effectively Respond to and Resolve a Cyber-Attack here

News-ID: 283714 • Views: 4197

More Releases from AccessData Group

AccessData and HP Extend Incident Response Services in the Wake of Increased Att …
DUBAI, United Arab Emirates, 9th September, 2014 – AccessData, the leader in incident resolution solutions, today announced an extended collaboration with HP to address the major challenges global organizations face following a major cyber-attack. New offerings through HP’s Digital Investigations Services integrate AccessData’s ResolutionOne Platform to provide advanced threat intelligence and rapid incident response across company networks, endpoints, mobile devices and applications. HP’s Rapid Incident Response (RIR) Services help organizations immediately
AccessData to Introduce ResolutionOne™ Platform, Industry’s First Continuous …
DUBAI, United Arab Emirates, 1st June, 2014 - AccessData, the leader in incident resolution solutions, today announced its participation at Gulf Information Security Expo & Conference (GISEC) 2014, taking place at Dubai World Trade Centre from 9-11 June. The company will be using the event to increase regional awareness of its position as a global leader and pioneer of digital investigations and litigation support technology as well as showcase
AccessData’s InSight™ Platform Accelerates the Speed of Incident Resolution …
DUBAI, United Arab Emirates, 17th March, 2014 - AccessData, the leader in incident resolution solutions, today announced the InSight™ Platform, a revolutionary cybersecurity system enabling enterprises to adeptly manage the rapidly accelerating volume of data incidents caused by cyber-attacks, mobile risk, GRC (Governance Risk & Compliance) and eDiscovery requests. In today’s sophisticated threat landscape, CISOs and IT departments face daunting information security challenges. The detection of critical cyber-attacks takes too long.
AccessData Named 2013 HP AllianceOne Security Partner of the Year
DUBAI, United Arab Emirates, 16th June, 2013 - AccessData, a pioneer of digital and mobile investigations, cyber security and litigation support solutions, today announced that it has been recognized with the HP AllianceOne Partner of the Year Award in the category of security at HP Discover 2013 in Las Vegas. HP AllianceOne Partner of the Year Awards recognize HP business partners’ outstanding accomplishments in the development and delivery of innovative HP-based

All 5 Releases


More Releases for Ponemon

Healthcare Cloud Computing Market to Register Strong Growth at CAGR of 18.0% by …
Marketprognosis.com Publish a New Market Research Report On “Global Healthcare Cloud Computing Market 2019 - 2023” which contains global key player’s survey information and forecast to 2023. Overview of the Global Healthcare Cloud Computing Market: The Global Healthcare Cloud Computing Market is expected to register a CAGR of 18.0% during the forecast period, 2019 to 2023. With the increasing adoption of healthcare informatics, the healthcare information system service providers are significantly implementing the
Healthcare Cloud Computing Market is expected to register a CAGR close to 18.0% …
Marketprognosis.com Publish a New Market Research Report On “Global Healthcare Cloud Computing Market 2018 - 2023” which contains global key player’s survey information and forecast to 2023. Overview of the Global Healthcare Cloud Computing Market: The Global Healthcare Cloud Computing Market is expected to register a CAGR of 18.0% during the forecast period, 2018 to 2023. With the increasing adoption of healthcare informatics, the healthcare information system service providers are significantly implementing the
ESET Welcomes Data Backup and Disaster Recovery Leader StorageCraft to the Techn …
Dubai, United Arab Emirates- 15 April 2015- ESET®, the global leader in proactive digital protection, announced today that StorageCraft®, a leading provider of data backup and disaster recovery solutions, has joined the ESET Technology Alliance. As a result of this relationship, existing ESET customers now have the option to add StorageCraft backup and disaster recovery to their layered security strategy through their existing ESET reseller. A report by the Ponemon Institute*
eSoft Strengthens Cybersecurity With New Enhancements
Broomfield, CO - Cyber attacks against small and medium sized businesses are increasing at an alarming rate and the financial stakes of cyber attacks are enormous. The "2012 Cost of Cyber Crime Study," released by the Ponemon Institute reports that successful cyber attacks against U.S. businesses have increased by 42% since last year. The study further points out that each cleanup from a network system breach cost an average of
Brosix Private Network Feature Combats Growing Corporate Privacy Fears
Brosix’s private network feature is now available to Brosix Enterprise Instant Messenger users to protect company privacy. Brosix’s Private Network feature is just one of the many Brosix Enterprise attributes that are solely available to enterprise customers. The Private Network feature was created to give customers peace of mind when it comes to the growing concern of online privacy, especially when it comes to confidential files and information. The rising cost of
Comodo Introduces 2012 Internet Security
Jersey City, NJ, October 18, 2012 - Comodo (comodo.com), one of the top certificate authorities and Internet security organizations, recently announced the release of its Internet Security 2012 software. Comodo® Internet Security 2012 (CIS 2012) software delivers malware prevention that is unparalleled in the industry and backed by the company's $500 warranty. CIS 2012 guarantees protection of computers against viruses and malware through Comodo's patent pending Default Deny Protection™. Unlike other