Ey Cybersecurity Regained Preparing To Face Cyber Attacks PDF
Ey Cybersecurity Regained Preparing To Face Cyber Attacks PDF
Ey Cybersecurity Regained Preparing To Face Cyber Attacks PDF
regained:
preparing to face
cyber attacks
20th Global Information Security Survey
2017–18
B 20th Global Information Security Survey 2017-18
Contents
Welcome 01
Section 1: Confront your cyber threats 02
Welcome
Welcome to the 20th EY Global Information Security Survey (GISS) exploring the
most important cybersecurity issues facing organizations today.
Two decades after EY first began publishing annual surveys detailing organizations’
concerns about cybersecurity — and their efforts to confront these concerns — the
imperative for a collaborative and coherent response to the changed threats could
hardly be more pressing. In our conversations with organizations of all shapes and
Paul van Kessel sizes, it is clear cybersecurity is a priority issue from board level down. But in a
EY Global Advisory complex and evolving landscape, it can be difficult to see the wood for the trees:
Cybersecurity Leader the cybersecurity threat is often well-camouflaged, hidden in plain sight.
This year, we are delighted that nearly 1,200 organizations were able to
participate in the survey. We have analyzed the responses of the CIOs, CISOs and
other executives of these organizations, identifying strengths and weaknesses with
the aim of generating insight from which we can all benefit. The GISS-report also
draws on our own extensive experience of working with clients globally to improve
their cybersecurity resilience.
However, despite the risks, there is good news too. Organizations that confront the
cybersecurity challenge will regain a sense of order: it is not possible to repel every
threat, but resilient organizations know how to protect themselves, how to detect
a problem when it occurs, and how to react quickly and effectively when trouble
strikes.
Working together, we can regain cybersecurity. With that in mind, we would like to
thank clients for taking the time to complete the survey: let us continue to share
our knowledge in order to build a safer world for us all.
2 20th Global Information Security Survey 2017-18
Section
1
20th Global Information Security Survey 2017-18 3
Nowadays, all organizations are digital by default. Not every This year alone, in the UK the ransomware attack WannaCry
organization delivers its products and services primarily through affected a significant part of the National Health Service (NHS);3
digital channels, but all operate with the cultures, technology in France, a breach of the Presidential campaign of Emmanuel
and processes of the internet era. Moreover, in the connected Macron threatened to throw the election into chaos;4 in the
and convergent world delivered by the Internet of Things (IoT), US, Yahoo disclosed that a breach saw 3 billion user accounts
the digital landscape is vast, with every asset owned or used compromised,5 while in India an attack paralyzed the biggest
by the organization representing another node in the network. container port in Mumbai.6
No wonder the World Economic Forum now rates a large-scale At the same time, it has never been more difficult for
breach of cybersecurity as one of the five most serious risks organizations to map the digital environment in which they
facing the world today.1 The scale of the threat is expanding operate, or their interactions with it. Every organization’s
drastically: by 2021, the global cost of cybersecurity technology infrastructure is both bespoke and complex,
breaches will reach US$6 trillion by some estimates, double spanning networks consisting of tools and technologies that
the total for 2015.2 may be on-premises or in the cloud. In addition, it is becoming
more difficult to define an ”organization.” This is due to the
Cyber attackers can be either indiscriminate or highly targeted, proliferation of devices belonging to employees, customers and
attacking large and small organizations in both the public suppliers (including laptops, tablets, mobile phones and more)
and private sector. They are well camouflaged: exposing with access to the organization’s systems that blur the security
the attackers requires cybersecurity defenses that identify perimeter. Organizations must think of themselves as having long
the threat, even when it adopts the colors of its immediate and trailing tentacles in every direction.
environment. Organizations do not always manage this.
1
”Global Risks Report 2017”, World Economic Forum, 11 January 2017.
2
”Cybercrime Report 2017 Edition”, Cybersecurity Ventures, 19 October 2017.
3
”Investigation: WannaCry cyber attack and the NHS”, National Audit Office, 27 October 2017.
4
“Hackers hit Macron campaign with ‘massive’ attack,” Financial Times, 6 May 2017.
5
“All 3 billion Yahoo Accounts Were Affected by 2013 Attack,” The New York Times, 3 October 2017.
6
“Petya cyber attack: India is worst affected in Asia, Ukraine on top globally,” The Indian Express, 29 June 2017.
4 20th Global Information Security Survey 2017-18
Connected devices add to the complexity. The IoT is not a Nor is it only data and privacy that are vulnerable. The IoT
collection of passive items; rather it is network of connected and exposes organizations’ operational technologies to attackers,
inter-connected devices that actively and constantly interact. The offering them an opportunity to shut down or subvert industrial
convergence of these networks with what were once separate controls systems, for example. The threat may even be to life:
and self-contained — and therefore more manageable — systems imagine the attacker with the ability to turn off life support
represents fundamental change. systems in hospitals or take control of connected cars on
the road.
The stakes could hardly be higher. Organizations that fall prey
to a cyber attack are at risk of substantial reputational loss Mounting threat levels require a more robust response and this
as well as the direct costs of a breach, estimated to average year’s GISS reveals that many organizations continue to increase
US$3.62m by the Ponemon Institute.7 There is also the potential their spending on cybersecurity. Seventy percent say they
for damaging confrontations with authorities and regulators. The require up to 25% more funding, and the rest require even more
European Union’s General Data Protection Regulation (GDPR), than this. However, only 12% expect to receive an increase of
due to come into force in 2018, gives regulators powers to fine more than 25%.
organizations up to 2% of their global annual turnover for failures
relating to a breach, and 4% if an organization significantly
mismanages a response.8
59%
of respondents this year say their budgets
increased over the last 12 months.
87%
say they need up to 50% more budget.
12%
expect an increase of more than 25%
in their cybersecurity budget.
7
”2017 Cost of Data Breach Study”, The Ponemon Institute, June 2017.
8
”GDPR Portal: Site Overview”, European Union, October 2017.
20th Global Information Security Survey 2017-18 5
4%
the organization’s cybersecurity budget. This is higher than
the figure reported last year, which is concerning given the
reality that harm is generally being done by an attack even it is
not immediately obvious. The breach may be a test attack that
exposes vulnerability or a diversion designed to take attention
away from another more damaging threat; alternatively, the
attacker may simply be biding their time before capitalizing on
the breach. Organizations should assume all attacks are harmful
4%
and conclude that where harm has not been identified, this is Only
only because it has not yet been discovered.
Section
2
20th Global Information Security Survey 2017-18 7
The first step for organizations seeking to enhance their Moreover, the range of potential attacks — and attackers — is
cybersecurity ability is to develop a better understanding of wide and becoming more so by the day. Organizations may
the nature of the threat to them. It will not be possible to build feel more confident about confronting the types of attack
greater cybersecurity resilience into the organization without that have become familiar in recent years, but still lack the
first identifying the potential causes of harm and how they capability to deal with more advanced, targeted assaults; they
might manifest themselves. Situational awareness is crucial may not even be aware of attack methods that are emerging.
— what are the threats and what do they mean for you and To be cyber resilient, however, organizations must increase
your organization? their understanding rapidly — it is likely that they will face all of
these categories of attack at one time or another, and possibly
simultaneously.
Typical Unsophisticated attackers, Sophisticated attackers such Sophisticated attackers such as organized
threat actors such as disgruntled insiders, as organized crime groups, crime groups, industrial espionage teams,
business competitors, industrial espionage teams, cyber terrorists and nation states
hacktivists and some cyber terrorists and
organized crime groups nation states
Examples • U
npatched vulnerability on • S
pear phishing attacks • E
xploiting vulnerabilities on “smart”
a website, exploited using using custom malware devices to gain access to data
a freely available exploit kit and/or control systems
• ” Zero-day” vulnerabilities
• G
eneric malware delivered exploited using • L
everaging security gaps created with
through a phishing custom-built exploit code the convergence of personal and corporate
campaign, enabling remote devices into one network
• R
ogue employees “planted”
access to an endpoint
to undertake deep • U
sing advanced techniques to avoid
• D
istributed Denial of reconnaissance/espionage detection and/or bypass defenses
Service (DDoS) attack for
• V
endors/suppliers
hire with a basic random
exploited as a way to gain
demand
access to ultimate target
organization
8 20th Global Information Security Survey 2017-18
All organizations must assume that the worst could happen others. In that attack, Mirai targeted unprotected webcams, but it
— there is no excuse for assuming otherwise. There have been has also used CCTV camera networks, and in theory could target
too many well-known and worldwide attacks for complacency any “smart” — that is internet-connected — device. In this case,
to be acceptable. failure to understand or anticipate the threat left organizations
complacent about ensuring that factory-setting passwords on all
Take the Petya ransomware attack that so badly affected network-connected smart devices had been updated.
organizations around the world in late June of 2017, affecting
tens of thousands of public and private sector enterprises. With so many disparate threats — and perpetrators that could be
The vendor had previously released a patch for the exploited anyone from a rogue employer to a terrorist group or a nation
weakness — organizations that did not apply this update, perhaps state — organizations must be vigilant across the board and be
because they did not understand the threat to them, were left well acquainted with their own threat landscape. All the more so
wide open to the attack. since attackers have easy access to malware and sophisticated
tools — and can even hire cyber-criminals — online.
The Mirai attack, by contrast, is more sophisticated and
underlines the broader vulnerabilities that organizations must
understand and address. One such attack on the Dyn DNS
provider last year brought much of the internet to a standstill,
disrupting organizations including Twitter and Spotify9 amongst
100 100
90 90
80 80
70 70
64%
57% 60% 64%
60 55% 60
53% 51% 52%
50 44% 48% 50 46% 44% 51%
51% 52% 44% 45%
46% 41%
40 34% 44% 40 41% 39% 43%
33% 42%
32%
30 34% 34%
37% 30 39% 34% 41%
30%
32% 28% 31% 33%
20 20 27% 25%
10 10
0 2013 2014 2015 2016 2017 0 2013 2014 2015 2016 2017
year year
9
“Internet outage takes down Twitter, Netflix, Paypal and many more of the web’s most visited websites,” The Independent, 21 October 2016.
20th Global Information Security Survey 2017-18 9
The previous chart shows how careless or unaware employees are still seen as an
increasing risk, while interestingly unauthorized access has greatly reduced as a Understand the
perceived risk.
problem to address
Employees and criminal syndicates are seen as the greatest immediate threats.
For many organizations, the most obvious point of weakness will come from an the right challenge
employee who is careless or fails to heed the cybersecurity guidelines.
The story of St. Helena provides a neat
Organizations are also increasingly fearful about the vulnerabilities within new metaphor for where some organizations
channels and tools. For example, 77% of survey respondents worry about poor are still going wrong with their
user awareness and behavior exposing them to risk via a mobile device; the loss of cybersecurity efforts. A remote island in
such a device, and the potential for loss of information and an identity breach, are a the South Atlantic Ocean, St. Helena has
concern for 50%. long been accessible only by long and
difficult sea journeys, so its inhabitants
The IoT meanwhile is the source of a broad range of threats that many organizations
were delighted when a US$370m project
are now struggling to better understand. The next chart outlines some of the issues
to build a landing strip was completed in
around IoT integration.
2016. Sadly, commercial airlines initially
refused to use the runway, which has been
built on the edge of a near-vertical 1,000
foot cliff, between two rocky outcrops that
Obstacles slowing down adoption funnel a fierce wind. Pilots warned it was
too dangerous to attempt a safe landing.
of IoT devices (multiple answers possible) The problem here is that those behind the
project focused on the wrong problem: the
51% lack of a runway on the island. What they
Lack of skilled resources
56% should have thought about was the lack of
41% a safe place to land a plane.
Budget constraints
61%
The read-across to cybersecurity is
32%
Lack of executive awareness or support that while all organizations discuss
32%
cybersecurity in their boardrooms, often
36% making huge investments, it is not always
Management of governance issues
28% clear which problem they’re solving.
30% Are they focused on just adding more
Lack of quality controls
30% cybersecurity technology or on solving
28% the lack of cyber resilience?
Privacy concerns of employees
19%
Clearly, the latter should be the target,
14% but to get there, the organization needs
Other
6% to understand the relationship between
2017 2016 cyber resilience and the objectives of the
business, as well as the nature of the risks
it is facing and the status of the current
safeguards. It must also assess how much
risk it is prepared to take, and define an
acceptable loss. Only when these steps
have been taken can the organization
make targeted and cost-effective
investments in cybersecurity.
Section
3
20th Global Information Security Survey 2017-18 11
75%
of respondents rate the maturity of their
35%
describe their data protection policies as
ad-hoc or non-existent.
vulnerability identification as very low
to moderate.
12% 38%
11001010110010101
11001010110010101
01011PASSWORD101
11001010110010101
11001010110010101
11001010110010101
5 Resilient
and scalable 2 Strategic
and innovative
Helps minimize the impact of Embedded in strategic
disruptions and keeps pace decision-making and benefits from
with business growth: and adopts ongoing innovation
4 3
• Risk and security culture
Intelligent • Training and awareness Risk
and agile focused
Situationally aware and Driven by well-governed
intelligence-driven risk alignment, risk awareness
cybersecurity function that and risk prioritization:
enables timely threat
identification and response:
• Cyber threat intelligence • Governance
• Threat and vulnerability • Cyber risk management
management and appetite
• Identity and access • Policies and standards
management • Metrics and reporting
• Security operations and
• Third-party risk management (TPRM)
managed services
• Regulatory awareness
• Technology architecture
48%
cybersecurity practices into active defense — a deliberately
planned and continuously executed campaign that aims to
identify and remove hidden attackers and defeat likely threat
scenarios targeting the organization’s most critical assets. Active
defense represents a crucial step forward as organizations of respondents do not have a SOC.
seek to counter advanced attackers, and can be thought of as a
strategy encompassing at least four stages:
2 Defining normal
Since active defense depends on tools such as anomaly
analysis, it is important for organizations to understand
how their networks normally operate. Cybersecurity
57%
do not have, or only have an informal, threat
intelligence program.
analytics tools use machine learning to define the “normal”
and artificial intelligence to recognize potential malicious
activity more quickly and accurately.
20th Global Information Security Survey 2017-18 15
12%
Reputational damage is very likely. The legal liabilities of
building owners to their tenants in such events have yet to be
fully explored. In a building such as a hospital, people’s lives
could even be in danger.
feel it is very likely they would detect
Despite these risks, however, many organizations are only just
a sophisticated cyber attack.
beginning to get to grips with the cybersecurity implications
of their physical estate. Doing so is not straightforward:
many of the operational technologies installed in business sit
outside the IT function, where cybersecurity is more likely
to be front of mind; connections have often been added
piecemeal over many years, adding internet functionality to
historic systems bit by bit, with no single function or individual
maintaining an overview of the entire building; and much of
the connectivity added in years gone by will have had little
or no security built in.
63%
of organizations still have
the cybersecurity function
89%
say their cybersecurity function
does not fully meet their
reporting into IT. organization’s needs.
50% 24%
only
36%
cyber attackers able to take control of a vehicle through
poorly protected connectivity could hardly be more serious.
An attacker has the ability to put the lives of the inhabitants of
the vehicle, and other road users, at risk — even to weaponize
of Boards have sufficient knowledge the vehicle in order to deliberately target others.
of information security to fully
evaluate the effectiveness of the Yet connected care technologies, like many other aspects
risks the organisation is facing and of operational technologies and IoT applications, are being
the measures the organisation is developed. The maturity of taking cyber risks and their
taking. mitigation into account is growing. The innovators who have
done such good work across so many areas of automotive
technology need to further increase their practical experience
of confronting cyber threats.
Section
4
20th Global Information Security Survey 2017-18 19
Emergency service:
responding to an attack
Organizations are wise to operate on the basis that it will only be a matter of time before they suffer an attack
that successfully breaches their defenses. Having a cyber breach response plan (CBRP) that will automatically
kick in when the breach is identified represents an organization’s best chance of minimizing the impact. But a
CBRP must span the entire organization and it must be led by someone with the experience and knowledge to
manage the organization’s operational and strategic response. The CBRP framework will span:
Compliance Insurance
What are the organization’s duties for reporting the breach Does the organization have cyber insurance and is this
to the appropriate authorities, including law enforcement incident covered? In which case, what can be claimed?
agencies if necessary, and how will these be discharged?
43%
plan. It is required to provide guidance to every
function of the organization involved in the response,
set a level of understanding about what information is
critical for senior leaders to know — as well as when and
how to express it — and underpin the precision and the of respondents do not have an agreed
speed of the organization’s continuous reaction as the communications strategy or plan in place
breach continues to unfold — possibly over days, weeks in the event of a significant attack.
or even months.
56%
— 17% of respondents say they would not notify
all customers, even if a breach affected customer
information; 10% would not even notify customers
impacted. As the European Union’s General Data
Protection Regulation looms large, such positions will say they would make a public statement
not be justifiable. to the media within a month of a breach
compromising data.
Overall, while 69% of respondents have some form
of formal incident response capability; only 8% say
describe their plan as robust and spanning third parties
and law enforcement.
20th Global Information Security Survey 2017-18 21
There are good reasons for this. In the virtual environment of the cloud, there are no constraints on users from physical limits and
infrastructure is easily adapted and scaled. Connecting IT to OT can drive end-to-end processes that transform productivity in
every area of the organization.
Equally, however, these themes pose major cybersecurity headaches. With organizations maintaining virtual structures composed
of multiple entities, no configuration can be more secure than its weakest link — and there are ever more links to protect. An attack
on one link, moreover, rapidly becomes an attack on the entire organization.
Organizations must now understand this reality and take steps to mitigate the risks posed. In particular, the concept of zoning is
crucial here: inevitably, in a large network of connected systems, some areas will be more vulnerable than others, and some will
contain more valuable assets and systems; identifying and then protecting these zones with enhanced security must then be a
priority.
The aim is to build firebreaks between different areas of the network — to ensure that convergence within the organization does not
provide convenience for cyber attackers. The fact that an attacker is able to penetrate one zone should not mean that access to all
other zones becomes straightforward — and particularly that there is no additional risk of compromise for high-value areas.
22 20th Global Information Security Survey 2017-18
Section
5
20th Global Information Security Survey 2017-18 23
Conclusion
In previous editions of this survey, the need to structure cybersecurity resilience around the principles of detect, protect and react
has been highlighted. These imperatives are more important than ever: organizations that understand the threat landscape and have
strong defenses in place will stand a greater chance of repelling attacks and identifying those attackers that do get through; those
with the ability to fight back will limit the damage attackers can do by acting quickly.
It may be helpful to think about cybersecurity in the context of crisis management. As the chart demonstrates, organizations
confronted by major events or incidents must manage peaks of pressure as the problems ramp up stress levels and trigger a
full-blown crisis.11
Crisis
Stress
Normality
Time
11
”Report on Cyber Crisis Cooperation and Management”, European Union Agency for Network and Information Security, November 2014.
24 20th Global Information Security Survey 2017-18
Common attacks Organizations need • Establish governance and organization — understand key business drivers
to be able to prevent and obtain senior management support for a robust cybersecurity program;
these types of attacks establish roles and responsibilities; agree strategy, develop policies and
through good basic standards; enable reporting.
cybersecurity.
• Identify what matters most — map business objectives/products/services to
supporting people, processes, technology and data infrastructure, and rank by
criticality to your business. This includes the ecosystem/supply chain in which
you operate: both third parties who supply you and those that you supply.
• Understand the threats — understand who might want to attack you, why, and
how they might carry out an attack; focus your efforts on how to respond to
the most likely threats.
• D
efine your risk appetite — understand what the most likely cyber attacks
could cost your business through simplified cyber risk quantification coupled
with a cyber risk management framework, which forms part of your overall
operational risk management processes; set your risk appetite and reporting
mechanisms to ensure you operate within it.
• F
ocus on education and awareness — establish an education and awareness
program, ensuring all employees, contractors and third parties can identify a
cyber attack and are aware of the role they play in defending your business.
• Implement basic protections — secure your business at the technology level by
deploying basic protections including secure configuration, patch management,
firewalls, anti-malware, removable media controls, remote access controls,
and encryption; establish a Vulnerability Management (VM) program which
manages vulnerabilities from identification through to remediation; establish
an effective Identity and Access Management (IAM) program to control access
to your information; focus on data protection and privacy (technical and
compliance) as well as managing third parties who have access to/control of
your data.
20th Global Information Security Survey 2017-18 25
Emerging attacks Organizations need • Build security into the development life cycle — ensure cyber risk is considered
to understand the in all new products, services, business ventures, etc., completing risk
emerging threats assessments as required and managing within agreed risk appetite.
and how they should
• Enhance threat monitoring — use forward-looking threat intelligence to identify
impact strategic
and track emerging threats.
decision-making,
while making focused
investment in
cybersecurity controls.
Understanding the threat landscape — detecting the potential the puzzle. Such a breach, whether a compromise of data or
risks on the horizon — is the groundwork of good cybersecurity. an attack on an organization’s controls systems, will almost
It enables organizations to limit the time they spend outside certainly represent a full-blown crisis. But organizations able
normality, to understand when and why they have moved to act calmly, employing a well-thought-out and tested cyber
into stress, and therefore to pre-empt the development of threat breach response plan in which everyone understands
a full-on crisis. their responsibilities, will be able to de-escalate the crisis
much more quickly.
Fighting back — protecting the organization from cyber risk —
builds on this groundwork. It gives the organization the skills and By pulling these strands of cybersecurity together, organizations
confidence to deal with stress and crisis more effectively, with will move toward greater resilience, even in the face of the
tools and processes that provide a framework for responding significant and increasing risk posed by diverse and often
to attackers. sophisticated cyber attackers. The tools and technologies
required to meet the threat are already available and many
The ability to respond to an attack — to react quickly and organizations have developed innovative policies and processes
effectively when a breach does occur — is the final piece in to make best use of them. Now this best practice must become
standard for all organizations.
26 20th Global Information Security Survey 2017-18
Section
6
20th Global Information Security Survey 2017-18 27
Survey methodology
EY’s 20th Global Information Security Survey captures the responses of nearly 1,200 C-suite leaders and information security and
IT executives/managers, representing many of the world’s largest and most recognized global organizations. The research was
conducted between June-September 2017.
Respondents by area
EMEIA 41%
Japan 7%
Americas 37%
Asia-Pacific 17%
28 20th Global Information Security Survey 2017-18
Less than 500 30% Less than 1 Million 4% Aerospace & Defense 1%
Automotive &
501–1,000 11% 1 Million–5 Million 5% 6%
Transportation
Banking &
1,001–2,000 12% 5 Million–10 Million 3% 14%
Capital Markets
Consumer
3,001–4,000 5% 50 million–100 million 6% 12%
Products & Retail
Diversified
4,001–5,000 5% 100 million–500 million 18% 6%
Industrial Products
Government
5,001–8,000 7% 500 million–1 billion 12% 7%
& Public Sector
Professional
75,001–100,000 1% 3%
Firms & Services
Telecommunications 4%
Other 8%
20th Global Information Security Survey 2017-18 29
Is your
business fit for
a digital world?
Digital creates opportunities
and risks across the value chain.
Discover how looking at digital
from every angle can help grow
and protect your business.
ey.com/digital #BetterQuestions
Advertisement
Paul van Kessel +31 88 40 71271 [email protected] EY refers to the global organization, and may refer to one or more, of
the member firms of Ernst & Young Global Limited, each of which is
David Remnitz +1 212 773 1311 [email protected] a separate legal entity. Ernst & Young Global Limited, a UK company
limited by guarantee, does not provide services to clients. For more
Americas information about our organization, please visit ey.com.
Bob Sydow +1 513 612 1592 [email protected] About EY’s Advisory Services
Brian Loughman +1 212 773 5343 [email protected] EY Advisory believes a better working world means helping clients
solve big, complex industry issues and capitalize on opportunities to
EMEIA grow, optimize and protect their businesses.
Mike Maddison +44 20 7951 3100 [email protected] A global mindset, diversity and collaborative culture inspires EY
consultants to ask better questions, create innovative answers and
Jim McCurry +44 20 795 15386 [email protected] realize long-lasting results.
Asia-Pacific The better the question. The better the answer. The better the world
works.
Richard Watson +61 2 9276 9926 [email protected]
© 2017 EYGM Limited.
Chris Fordham +852 2846 9008 [email protected] All Rights Reserved.
In line with EY’s commitment to minimize its impact on the environment, this
document has been printed on paper with a high recycled content.
This material has been prepared for general informational purposes only and is not intended
to be relied upon as accounting, tax or other professional advice. Please refer to your
advisors for specific advice.
ey.com/giss