2018年全球信息安全状况®调查(英文版)

返回 相似 举报
2018年全球信息安全状况®调查(英文版)_第1页
第1页 / 共22页
2018年全球信息安全状况®调查(英文版)_第2页
第2页 / 共22页
2018年全球信息安全状况®调查(英文版)_第3页
第3页 / 共22页
2018年全球信息安全状况®调查(英文版)_第4页
第4页 / 共22页
亲,该文档总共22页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述:
Key findings from The Global State of Ination Security® Survey 2018 Strengthening digital society against cyber shocks Cybersecurity and PrivacyTable of contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 How cyber interdependence drives global risk . . . . . . . . . . . . . . . . . 5 Resilience The cyber-shock absorber businesses need . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Next steps for global business leaders . . . . . . . . . . . . . . . . . . . . . . 12 ology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Contacts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Key findings from The Global State of Ination Security ® Survey 2018 © 2017 PwC BMassive cybersecurity breaches have become almost commonplace, regularly grabbing headlines that alarm consumers and leaders. But for all of the attention such incidents have attracted in recent years, many organizations worldwide still struggle to comprehend and manage emerging cyber risks in an increasingly complex digital society. As our reliance on data and interconnectivity swells, developing resilience to withstand cyber shocksthat is, large-scale events with cascading disruptive consequenceshas never been more important. Key findings from The Global State of Ination Security ® Survey 2018 © 2017 PwC 2There have been no reported deaths from cyberattacks and relatively little destruction. 1 But the disruptive power of cyberattacks is increasingly clear, particularly in geopolitical threats. For example, a December 2015 cyberattack in Turkey impacted networks used by the country’s banks, media, and government. 2 Later that month, the first known cyberattack to take down a power grid targeted Ukraine’s power distribution systems, cutting electricity to 230,000 residents. 3 That attack also targeted the country’s phone system, preventing customers from reporting outages and thereby hindering power-restoration efforts. 4 In June 2017, the Petya cyberattack, aimed at Ukrainian computers, disrupted business operations across the globe. Massive data breach risks are raising concerns about the power of cyberattacks to ripple through the global economy. 5 1 The Cipher Brief, Cyber Deterrence Is Working – So Far, July 23, 2017 2 Harvard University Belfer Center for Science and International Affairs, Too Connected To Fail, May 2017 3 Wired, Inside the cunning, unprecedented hack on Ukraine’s power grid, March 3, 2016 4 US Homeland Security Advisory Council, Final Report of the Cybersecurity Subcommittee Part I - Incident Response, June 2016 5 The Wall Street Journal, The Morning Download, Sept. 11, 2017 Anticipated results of a successful cyberattack against automation and/or robotics systems 40 39 Disruption of operations/ manufacturing Loss or compromise of sensitive data 29 Damage to physical property 22 Harm to human life 32 Negative impact to quality of products produced Source PwC, CIO and CSO, The Global State of Ination Security® Survey 2018, October 18, 2017. Base 9,500 respondents Key findings from The Global State of Ination Security ® Survey 2018 © 2017 PwC 3cutives worldwide acknowledge the increasingly high stakes of cyber insecurity. In our 2018 Global State of Ination Security® Survey GSISS, leaders of organizations that
展开阅读全文

copyright@ 2008-2018 大分享文库网 版权所有
经营许可证编号:豫ICP备11013292号-2

客服QQ:1965775022