Discover Performance

HP Software's community for IT leaders // January 2014
Subscribe

Security strategy

Staying ahead of the cybercriminals

HP VP Art Gilliland explains why organizations must get on the same page about what assets to keep under heavy guard.

Start your short list

Security intelligence

Fighting cyber crime with preparation and personnel

Larry Ponemon discusses the nature of today’s sophisticated adversaries and the best practices of organizations that manage to keep the business impact low.

Beat the black hats

Looking forward

The CIO’s 2014 cheat sheet

Experts on mobility, security, cloud, Big Data, and IT leadership tell us what should be top-of-mind in the coming year.

Starting point

CISO insight

KPN Telecom trusts HP’s best-in-class security

Jaya Baloo, CISO, explains why KPN Telecom entrusts HP with the security of its customer data and regards HP as a “best-in-class” partner.

Watch now

x

IT leader assessment

This tool evaluates the correlation between IT attributes and business success and, based on how your answers compare with average scores, will advise you where to invest in IT.

It is based on data HP collected from 650 global companies about a range of IT characteristics (server capacities, approach to information management, security, BYOD, etc.) and how they correlate to revenue gain. This assessment will compare your answers to the average scores in that study.

There are 12 questions that will require an estimated 10 minutes of your time. You'll receive a summary of your rating upon completion.



Let's get started
x

Please select an answer.
x

Analysis:

Your answer:
Your score:
Average score:
Revenue leaders' score:


x

Please select an answer.


x

Results

Your score:
Average score:
Revenue leaders' score:


Get detailed results:

Subscribe

Popular tags

Most read articles

Discover Performance

Archive

Enterprise 20/20

Security 20/20

Preparing today for tomorrow’s threats.

Introduction to Enterprise 20/20

What will a successful enterprise look like in the future?

CIO 20/20

Challenges and opportunities for the CIO of the future.

Dev Center 20/20

How will we organize development centers for the apps that will power our enterprises?

Marketing 20/20

Welcome to a new reality of split-second decisions and marketing by the numbers.

IT Operations 20/20

How can you achieve the data center of the future?

Employee 20/20

What the workforce of 2020 can expect from IT, and what IT can expect from the workforce.

Mobility 20/20

Looking toward the era when everyone — and everything — is connected.

Data Center 20/20

The innovation and revenue engine of the enterprise.

Read more

Events

Ponemon’s 2014 Cost of Cyber Crime study

Security analyst Larry Ponemon discusses his 2014 findings in a series of region-specific webinars covering Europe, the Americas and Asia.

HP Discover 2014

Join thousands of IT execs, engineers, and solution experts to explore IT trends, strategies, and best practices. (Barcelona,
Dec. 2–4)

Discover Performance Weekly

HP Software’s Paul Muller hosts a weekly video digging into the hottest IT issues. Check out the latest episodes.

Security index

32 days

Average time required to resolve a cyber crime in 2013 (compared with 24 days in 2012).1

$11.6 million

Average annualized cost of cyber crime per organization in 2013 (compared with $8.9 million in 2012).1

$2.1 billion

Projected value of the cloud-based security services market in 2013 (rising to $3.1 billion in 2015).2

1"2013 Cost of Cyber Crime Study: United States," Ponemon Institute, October 2013
2"Gartner Press Release: Gartner Says Cloud-Based Security Services Market to Reach $2.1 Billion in 2013," Gartner, Inc., October 2013
 

One question

Q: Why are malicious “insider attacks” so hard to detect and so expensive?

A: We find a lot of organizations don’t think about an inside-out type attack in the same way they think about an outside-in attack, but they could be the same thing. You could have an internal bad guy working with an external bad guy. That combination leads to a very sophisticated, stealthy, and successful attack. The most expensive attacks—the ones that lead to the theft of very, very valuable intellectual property such as a secret formula or defense design documents—often use that structure, where each party alone wouldn’t have the ability to get to the targeted information, so they work in collaboration.

—Larry Ponemon, chairman and founder of the Ponemon Institute, on the Discover Performance blog

HP Security Research blog

Tweets @ HPSecurity