The security data and survey directory

Security data. Everybody needs it. Lots of companies and organizations are producing it. Here's where to find it.

Page 3 of 3

Survey released in January 2010 reports that, contrary to what many believe, the overall cost of data breaches is increasing, though slowly (up 2 percent over 2008). It also found that breaches caused by malaicious attackers or botnets cost 40 percent more than those caused by negligence or a system problem.

Password Security Survey 2009Conducted by: ElcomSoftSponsored by: UnsponsoredNumber of respondents: About 1,000 security and IT professionals from more than 70 countries.

Up to 77 percent of computer users use a single password to access multiple applications and websites. It also examines password reuse for multiple accounts, passwords written down and use of weak passwords.

Cloud Computing A Transformative Technology with Financial Benefits; Security Concerns, Too: Deloitte PollConducted by: DeloitteSponsored by: UnsponsoredNumber of respondents: More than 750 technology executives ranging from upper management to consultant across multiple industries.

A 2009 webcast-based poll found 60 percent of executives believe cloud computing will benefit enterprise services but 35 percent remain concerned about security and privacy.

The Cost of a Lost LaptopConducted by: Ponemon Institute LLCSponsored by: Intel CorporationNumber of respondents: N/Alost intellectual property and other factors, the average value is an estimated $49,246. In cases examined by the study, 80 percent of that cost was attributed to lost intellectual property.

The 2009 study examined 138 cases involving laptop computers lost by an employee, a temporary worker or contractor. Based on replacement cost,

Why Encrypt? Federal File Transfer ReportConducted by: MeriTalkSponsored by: AxwayNumber of respondents: 200 Federal IT and information security professionals.Note: Registration required.

Comprehensive 2010 survey examines data security at federal agencies. It finds that more than half of employees use personal email, CDs, DVDs, FTP, and USB drives to transfer business files despite known risks. Sixty-two percent of respondents said file transfer security is a top priority, and 80 percent call their agency's secure file transfer policies adequate but only 58 percent say employees are aware of those policies.

Airport Insecurity: The Case of Lost LaptopsConducted by: Ponemon InstituteSponsored by: DellNumber of respondents: 864 business air travelers in the U.S.

2008 survey reports that, on average, 12,255 laptops go missing at U.S. airports each week and 42 percent don't back up the data in their laptop computers. Only one-third of those turned into airport Lost and Found departments are ever reclaimed.

Security of Paper Documents in the WorkplaceConducted by: Ponemon InstituteSponsored by: Alliance for Secure Business InformationNumber of respondents: 819 individuals who work in IT operations, IT security, data protection and compliance in large organizations in a variety of industries.

This 2008 study appears to stand the test of time and has not been replaced by more current research. Eighty percent of respondents said they had one or more data breaches in the past 12 months; of those, 49 percent said one or more of the breaches involved the loss or theft of paper documents. Seventy-one percent of respondents acknowledge an incident in which sensitive or confidential paper documents were lost or misplaced in their organizations.

Software and Application Security

The Building Security In Maturity Model (BSIMM)Respondents: 30 organizations engaged in large-scale software development.Registration required.

A survey-based benchmarking study on software security.

Application Security: It's a Case of Good News/Bad NewsConducted by: BankInfoSecurity.comSponsored by: UnsponsoredNumber of respondents: More than 100 banking/security leaders from financial institutions of all sizes.Registration required.

Survey guages perceived strength of financial institutions' application security programs; 81 percent are only somewhat or not at all confident in the security of third-party applications.

WhiteHat Website Security Statistics ReportMethodology: Through managed monitoring services, analysis of more than 2,000 websites from 350 client organizations

Fall 2010 highlights: Large organizations more likely to have serious vulnerabilities.

Veracode State of Software Security

"Intelligence gleaned from analyzing billions of lines of code submitted to Veracode for independent verification of software security from more than 15 industries".

Compliance & Governance

2010 HIMSS Analytics Report: Security of Patient DataConducted by: HIMSS AnalyticsSponsored by: Kroll Fraud SolutionsNumber of respondents: 250 senior information technology (IT) executives, Chief Security Officers and Health Information Management (HIM) Directors/Managers, Compliance Officers and Privacy Officers.Note: Registration required

A study on the shift to electronic health records (EHRs) over the next several years highlights the inability of healthcare providers to adequately secure data—even in the face of increased regulation of the HIPAA and HITECH acts.

Most Respondents Expect FCPA Violations to Increase in Coming Years Conducted by: DeloitteSponsored by: UnsponsoredNumber of respondents: 1,090 business professionals from the financial services; consumer and industrial products; technology, media and telecom; banking and securities; energy and resources industries and other industries.

2009 survey on the Foreign Corrupt Practices Act (FCPA) finds that 72 percent of respondents expect an increase in FCPA violations in the next two years, but 34 percent have no comprehensive FCPA compliance program in place.

State of Privacy & Data Security ComplianceConducted by: Ponemon Institute LLCSponsored by: SophosNumber of respondents: 528 IT security and compliance practitioners in various sized companies located in the U.S.

2009 survey assesses organizations' regulatory compliance. It finds that a majority do not believe compliance improves security, and 48 percent don't believe they are compliant with all applicable laws and regulatory requirements.

Information Security Spending Survey: 2009 Results (Impact of the Recession)Conducted by: Joint effort between MetroSITE Group and Pacific Crest Securities.Sponsored by: UnsponsoredNumber of respondents: 53 top security professionals worldwide.

Governance, compliance, mobility and identity and access management will continue to receive funding, according to a 2009 survey. IT security spending is primarily being driven by compliance, followed by threat reduction and brand protection.

Business Continuity & Disaster Recovery

2009: More Than Half of Americans Surveyed Are Not Worried About Swine FluConducted by: Harris InteractiveSponsored by: Deloitte Center for Health Solutions Number of respondents: 1,010 U.S. adults.

2009 survey reports that 52 percent of Americans don't believe the H1N1 virus will have a major impact in the United States; 41 percent do not plan to get vaccinated. It also examines who plans to get vaccinated, and if they know where to get vaccinated.

The National Campus Safety and Security Project SurveyConducted by: The National Association of College and University Business OfficersSponsored by: Funded in part by the Lilly Endowment.Number of respondents: 342 institutions.

Roughly 15 percent of repondents do not currently have an emergency preparedness plan that at least meets the standards set by the National Fire Protection Association; of those, 40 percent are near completion of one. Survey looks at many factors including use of security cameras and other technologies, emergency communication plans and business continuity.

Social Networking

Outbound Email and Data Loss Prevention in Today's Enterprise, 2010 Conducted by: OstermanSponsored by: ProofpointNumber of respondents: 261 responses from companies with 1,000 or more employees.Note: Registration required

Managing the risks of outbound e-mail, blog postings, social media, mobile devices, etc. is the focus of this survey. One quarter of U.S. companies investigated the leakage of confidential, sensitive or private information via a blog or message board posting; 24 percent disciplined an employee for such a breach in the last year. One fifth investigated a similar breach involving a social networking site.

Social Insecurity: What Millions of Online Users Don't Know Can Hurt ThemConducted by: Consumer Reports National Research CenterSponsored by: UnsponsoredNumber of respondents: 2,000 online U.S. households.

Twice as many U.S. households now use social networks than did last year, and, in many cases, are exposing themselves to new risks. A 2010 study found 40 percent posted their full birth date, exposing themselves to identity theft, while 26 percent posted their children's photos and names, potentially exposing them to predators. Also, one quarter didn't use Facebook's privacy controls at a time when 9 percent of social network users experienced malware infections, scams, identity theft or harassment.

Social Networking or Reputational Risk: 2009 Ethics & Workplace Survey Conducted by: Opinion ResearchSponsored by: Deloitte LLPNumber of respondents: 2,008 employed adults and 500 business executives.

Many companies are using social networking to build their businesses, however, it can also hurt companies. A survey finds 58 percent of executives believe the reputational risk of social networking makes it a boardroom issue but only 15 percent are taking it to that level.

60 Percent of Facebook Users Consider Quitting over PrivacyConducted by: SophosSponsored by: UnsponsoredNumber of respondents: 1,588 Facebook users.

Concerns over privacy settings and sharing private information have prompted nearly two thirds of Facebook users to consider leaving the social networking service and 16 percent more say they have already stopped.

Virtualization, Web 2.0 & Cloud Computing

2010 State of Virtualization Security SurveyConducted by: Prism MicrosystemsSponsored by: UnsponsoredNumber of respondents: 302 IT professionals across multiple industries and company sizes.

Survey examines adoption of virtualization and corresponding security concerns and controls. For example, 58 percent of respondents are highly concerned over the potential for Hypervisor to create a single point of entry into multiple machines while 19 percent have no security solutions or strategies in place to secure their virtual environment.

7th Annual Survey: Network and System AdministratorsConducted by: Amplitude Research Sponsored by: VanDyke SoftwareNumber of respondents: 353 network or system administrators.

This U.S.-based survey conducted in April 2010 examines budget and staffing changes, what keeps admins up at night, and the adoption of cloud computing.

IT Skills, Salary and Benefits

7th Annual Survey: Network and System AdministratorsConducted by: Amplitude Research Sponsored by: VanDyke SoftwareNumber of respondents: 353 network or system administrators.

This U.S.-based survey conducted in April 2010 examines budget and staffing changes, what keeps admins up at night, and the adoption of cloud computing.

2010 Security Clearance Jobs Compensation Survey ResultsConducted by: DiceSponsored by: UnsponsoredNumber of respondents: 3,633 security-cleared professionals.

2010 survey finds average annual compensation in the DC area for security-cleared IT workers is $97,821; professionals earn more than $100,000 with intelligence agency-issued clearances.

IT Professional Salary Survey ReportsConducted by: Foote PartnersSponsored by: UnsponsoredNumber of respondents: 1,980 employers (99,400 IT professionals).Cost: $75 and up

2010 survey of IT salary and bonuses for 130 IT positions or for any of 27 IT job families or customized by individual jobs and cities.

2010 IT Salary + Skills Pay Survey ReportsConducted by: Foote PartnersSponsored by: UnsponsoredNumber of respondents: 2,000 employers (99,400 IT workers).Cost: $700 and up

Organized by IT categories, this quartely report examines the total cash compensation of thousands of IT workers in 65 US cities.

2010 IT Security Salary & Skills Pay SurveyConducted by: Foote PartnersSponsored by: UnsponsoredNumber of respondents: Varies by title and area.Cost: $800 and up

A drilldown of IT security-specific earnings from professionals in 65 US cities based on salary, bonuses and certifications pay.

| 1 2 3 Page
Insider: How a good CSO confronts inevitable bad news
You Might Like
Join the discussion
Be the first to comment on this article. Our Commenting Policies