NlChamber
NlChamber
Homepage > News > News from members > EY Global Information Security Survey

EY Global Information Security Survey

82% of companies don’t know if their security systems work. The best prevention are systematic reminders of the company’s basic security rules.

  • 87% of organizations surveyed operate with limited cybersecurity and resilience 
  • 77% currently work with basic cybersecurity protections and are seeking to move toward fine-tuning capabilities 
  • Mostly big companies are planning to invest in cyber security
2018_GISS_ENG

Prague, 26 October – The newest EY Global Information Security Survey (GISS) shows that compnies are increasing their interest in cybersecurity; however, most organizations don’t know if their security systems work. The survey finds that the riskiest vulnerabilities are careless/unaware employees and outdated security controls.

However, the survey found that 8% of respondents feel that their information security function fully meets their needs currently with 78% and 65% of larger and smaller organizations respectively saying their information security function is at least partially meeting their needs. The survey finds that 87% of organizations operate with a limited budget to provide for the level of cybersecurity and resilience they require and that 55% of organizations don’t make the protection of the organization an integral part of their overall business strategy and execution plans. Surprisingly, larger organizations are more likely to fall short on this point than smaller organizations (58% versus 54%). However, cybersecurity budgets are on the rise with larger companies being more likely to have increased budgets this year (63%) and next year (67%) than smaller companies (50% and 66%, respectively). 

EY_GISS_1

A majority of organizations (77%) are now seeking to move beyond basic cybersecurity protections toward fine-tuning their capabilities using advanced technologies like artificial intelligence, robotic process automation and analytics among others. These organizations are continuing to work on their cybersecurity essentials, but they are also rethinking their cybersecurity framework and architecture to support the business more effectively and efficiently. 

“We should always be thinking about the basics of security hygiene. We need to remember that the best prevention against extensive damage is the regular updating of systems and applications and the ongoing identification and correction of organisational vulnerabilities,” says Petr Plecháček, Associate Partner, Cybersecurity Department at EY Czech Republic.

Cybersecurity are among the priorities of companies‘ strategy

All the organizations surveyed are going through digital transformation projects and are increasing their spending on emerging technologies. The study reveals cloud computing (52%), cybersecurity analytics (38%) and mobile computing (33%) as the highest priorities for cybersecurity investment in emerging technologies this year. 

“Organizations today are increasingly investing in emerging technologies as part of their digital transformation programs, and while these have created multiple new possibilities, they also create new vulnerabilities and threats. Organizations should be aware that building a level of trust with customers is critical to the success of their transformation programs. To build this trust cybersecurity needs to be embedded in the DNA of the organization starting with making it an integral part of the business strategy,” says Petr Plecháček.

The riskiest vulnerabilities are careless or unaware employees

Organizations concede that they would be unlikely to step up their cybersecurity practices or spend more money unless they suffered some sort of breach or incident that caused very negative impacts. The survey finds that the riskiest vulnerabilities are careless/unaware employees (34%), outdated security controls (26%), unauthorized access (13%) and related to cloud-computing use (10%). “It’s easy to say that users are the weakest link in the system since they’re limited in their defensive capabilities because cyberattack techniques are ever trickier and more sophisticated. Security managers need to work proactively to spread awareness of cyber threats and create an environment that combines traditional and modern technologies with pragmatic practices to ensure organisational cybersecurity,” says Petr Plecháček.

Only 8% say their security functions fully meet their needs and 38% of respondents are unlikely to detect a sophisticated breach, whereas less than 10% believe they have mature security systems. However, many organizations (82%) are unclear about whether they are successfully identifying breaches and incidents. Among organizations that have been hit by an incident over the past year, less than a third (31%) say the compromise was discovered by their security center.

Cybersecurity does not fully influence organizations’ strategic plans, the person responsible not a board member

Organizations are now convinced that looking after cyber risk and building in cybersecurity from the start is imperative to success in the digital era. The survey finds, only 18% of organizations saying that information security fully influences business strategy plans on a regular basis while 60% of organizations say that the person directly responsible for information security is not a board member. However, 70% of all organizations (73% and 68% of the larger and smaller organizations, respectively) say their senior leadership has a comprehensive understanding of security or is taking positive steps to improve their understanding. 

Petr Plecháček says: “We strongly believe that in the future digital trust will be the bedrock on which business value will be created. To achieve that, organizations must move beyond thinking in siloes about cybersecurity as an IT issue and implement security-by-design. This will increase cyber resilience to give organizations the confidence to seize emerging opportunities and manage cyber risks.” 

For more information and to download the report, visit ey.com/giss.

EY_GISS_2
Print page Print page       Send link to e-mail Send link to this page to e-mail