Discover Performance

HP Software's community for IT leaders // January 2014
Subscribe

Security strategy

Staying ahead of the cybercriminals

HP VP Art Gilliland explains why organizations must get on the same page about what assets to keep under heavy guard.

Start your short list

Security intelligence

Fighting cyber crime with preparation and personnel

Larry Ponemon discusses the nature of today’s sophisticated adversaries and the best practices of organizations that manage to keep the business impact low.

Beat the black hats

Looking forward

The CIO’s 2014 cheat sheet

Experts on mobility, security, cloud, Big Data, and IT leadership tell us what should be top-of-mind in the coming year.

Starting point

CISO insight

KPN Telecom trusts HP’s best-in-class security

Jaya Baloo, CISO, explains why KPN Telecom entrusts HP with the security of its customer data and regards HP as a “best-in-class” partner.

Watch now

x

IT leader assessment

This tool evaluates the correlation between IT attributes and business success and, based on how your answers compare with average scores, will advise you where to invest in IT.

It is based on data HP collected from 650 global companies about a range of IT characteristics (server capacities, approach to information management, security, BYOD, etc.) and how they correlate to revenue gain. This assessment will compare your answers to the average scores in that study.

There are 12 questions that will require an estimated 10 minutes of your time. You'll receive a summary of your rating upon completion.



Let's get started
x

Please select an answer.
x

Analysis:

Your answer:
Your score:
Average score:
Revenue leaders' score:


x

Please select an answer.


x

Results

Your score:
Average score:
Revenue leaders' score:


Get detailed results:

Popular tags

Most read articles

Discover Performance

Archive

Events

Discover Las Vegas 2014

Register for HP’s premier event for inspiration from industry leaders, the HP inside scoop, and a deep dive into tomorrow’s enterprise IT trends.

Security index

32 days

Average time required to resolve a cyber crime in 2013 (compared with 24 days in 2012).1

$11.6 million

Average annualized cost of cyber crime per organization in 2013 (compared with $8.9 million in 2012).1

$2.1 billion

Projected value of the cloud-based security services market in 2013 (rising to $3.1 billion in 2015).2

1"2013 Cost of Cyber Crime Study: United States," Ponemon Institute, October 2013
2"Gartner Press Release: Gartner Says Cloud-Based Security Services Market to Reach $2.1 Billion in 2013," Gartner, Inc., October 2013
 

One question

Q: Why are malicious “insider attacks” so hard to detect and so expensive?

A: We find a lot of organizations don’t think about an inside-out type attack in the same way they think about an outside-in attack, but they could be the same thing. You could have an internal bad guy working with an external bad guy. That combination leads to a very sophisticated, stealthy, and successful attack. The most expensive attacks—the ones that lead to the theft of very, very valuable intellectual property such as a secret formula or defense design documents—often use that structure, where each party alone wouldn’t have the ability to get to the targeted information, so they work in collaboration.

—Larry Ponemon, chairman and founder of the Ponemon Institute, on the Discover Performance blog

HP Security Research Blog

Tweets @ HPSecurity