71% of UK C-suite Willing to Cover up a Data Breach if they Could Escape Fines Finds nCipher Survey
nCipher Security, the provider of trust, integrity and control for business critical information and applications, reveals UK IT leaders are alarmingly willing to cover up a data breach, with more than 3 in 5 (61%) saying they would do so if it meant they could escape fines.
It is now over a year since the implementation of the EU General Data Protection Regulation (GDPR), which obligates organisations to disclose breaches of personal data within 72 hours of becoming aware, when feasible. However, senior business leaders are more willing than managers or directors to cover up their organisation falling victim to a data breach, with 71% at C-level saying they would do so, compared to 57% of the latter category.
Ahead of the 2019 InfoSecurity Europe conference, nCipher Security surveyed 250 IT decision makers with responsibility over security purchases, revealing attitudes towards data breaches, regulation, security training and emerging technologies.
Investment in security training met by lack of employee engagement
While investment in technology is the biggest driver of security spending over the next 12 months, employee training and education is not far behind, taking up 29% of the average budget. However, despite 83% of businesses providing cyber training to staff at all levels, several factors are highlighted as major challenges to employee engagement.
For example, 66% said that they were hampered by a lack of skilled resource in-house to conduct the training, while the same percentage of respondents were challenged by an unwillingness to change process and behaviours.
In addition, 55% of IT leaders pinpointed a lack of support from the board and wider C-suite as a challenge, as well as a lack of best practice guidelines to work towards and implement (63%). Interestingly, all of these challenges were found to be much more acute within mid-sized companies (250-999 employees).
Emerging technology – a double-edged sword for security
Cloud and Internet of Things (IoT) were revealed to be the emerging technologies most widely seen as a threat to organisations, at 63% and 62% respectively. At the same time, 80% confirmed that they are using these kinds of emerging technologies to “better identify threats to their business”.
This demonstrates that businesses are continuing to push ahead with the adoption of innovative but experimental technology to gain an advantage and maintain relevance in their markets even though they might not have the right skills in place. However, this is tempered by a risk factor and scepticism towards these same technologies that is felt most keenly by those at C-Level within the business, creating an interesting paradox that organisations seem to be struggling to navigate.
ePR and GDPR causing confusion
This sense of risk is exacerbated by a compliance and regulation landscape that is becoming ever more complicated, and indeed costly – 30% of the average cyber security budget is spent on meeting compliance needs. GDPR isn’t the only data regulation for businesses to concern themselves with; later this year it will be complemented by the ePrivacy Regulation (ePR), also enacted by the European Union. While 92% of respondents are aware of the latter, just 32% completely understand how it builds on GDPR and 37% are unaware of how it will affect their organisation.
Clearly, there is much more for IT leaders to do to educate themselves and prepare their business for the impact. If the correct steps towards GDPR compliance have already been taken, businesses will be well on track, however, there needs to be a greater awareness of regulatory nuance and how this will impact the way they collect and use customer data.
Peter Galvin, chief strategy and marketing officer, nCipher Security says:
“Organisations are under a greater obligation than ever to disclose data breaches, particularly when personal information is at risk, but evidently many IT leaders – particularly at C-Level - still feel they can avoid being subject to fines and other punitive measures from regulatory bodies.
“By implementing the right security measures to protect their business critical information and applications up front by using tools such as encryption, investing in training and talent as well as understanding the regulatory landscape, businesses can take steps to avoid a damaging breach in the first place.”
Other key findings include:
Just a quarter (28%) of organisations provide security training when employees join, and this lack of immediate training leaves them at risk
Only 63% of businesses update training and repeat annually, meaning the majority of employees are unaware of the latest threats and how to protect themselves
Over 8 in 10 (83%) have a plan in place if they were to become a victim of a data breach. This figure falls to 73% in businesses employing 1-249 people
C-level respondents are concerned about emerging or future technologies as a threat to their business, much more so than their counterparts at manager and director level. The biggest discrepancy is regarding blockchain, with 71% of the former category seeing it as a threat as opposed to 51% of the latter
77% of organisations have plans in place to revisit or update their business approach to cyber security, based on emerging or future technologies.
- IAM Consultant- OKTA
- upto €90,000 plus benefits
I am looking for an experienced IAM process Manager to help drive forward a series of IAM implementation for a global Manufacturing business, Ideally you will be skilled with Okta and have knowledge of PAM Solutions, You will be responsible for: Driving the design and continuous improvement of complex IAM solutions in close collaboration with business partners Consult on the optimisation of IAM processes and design proper IT-based solutions to meet availability and quality targets Define technical specifications for SW-development (standards, design patterns, test cases, scenarios) and manage the life cycle of designed solutions Actively scan for relevant innovations and new technologies to identify further potential for improving IAM solutions and processes using OKTA Analyse new features of the regular Okta releases We are looking for someone with strong IAM experience as an Architect, Analyst, Technical Engineer, or similar role in the Identity and Security domain Experience with relevant certifications in development/administration, design and configuration of the Okta IAM platforms Familiar with LCM - joiners, movers, leavers, application federation - SAML, OIDC, SCIM and many other IAM terms Good mix of competences in IAM business process and project management concepts and tools e.g., ServiceNow, Jira, PRINCE2, SCRUM (agile)
- SAP Security Consultant
- upto €70,000 plus benefits
I am looking for an experienced SAP Security Consultant. The ideal candidate will have a strong understanding of SAP security concepts and be able to apply them to real-world scenarios. ideally you will also have experience with Securitybridge or Onapsis, or a similar SAP security tool. Your responsibilities will include: Reviewing and auditing SAP security settings and controls Identifying and remediating security vulnerabilities Implementing security best practices Educating users on SAP security Experience experience in SAP security Experience with Securitybridge or Onapsis, or a similar SAP security tool would be very advantageous Strong understanding of SAP security concepts Excellent problem-solving and analytical skills Excellent communication and presentation skills Fluent in French & English
- Post Grad MSc Cyber security - Junior Cyber Risk Analyst wanted. UK
- United Kingdom
- Entry role
The perfect start to your new Cyber Security Career. Post Graduate Cyber Risk Analyst Wanted. Are you are fresh from earning your Cyber Security MSc and eager to start your career in Cyber Security? We are looking for a recent post graduate to join a forward thinking Cyber Security Consultancy for the ideal entry role into Cyber Security. Whilst employed industry experience is not expected, as full training and support will be provided, a history of recent education in Cyber Security / Cyber Risk is essential. We are looking for someone with an inquisitive mind, who is confident to ask the right questions and who isn't afraid to challenge the status quo. Superb communication skills are a must (in person, written and verbal) This is a UK based role that is remote first with monthly travel (1-2 a month) to meet with the team and in time to meet clients. If you aren’t available to travel this isn’t the opportunity. We are unable to provide VISA sponsorship as there will be a requirement to achieve Security clearance If you're adaptable, open to fresh perspectives, and excited to be part of a forward-thinking team and looking for an opportunity to help make a difference in a Cyber consulting role, this opportunity is for you. For more information apply here……
- Microsoft Exchange Contractor | London | OUTSIDE IR35 | SC Cleared
- OUTSIDE IR35
Microsoft Exchange Contractor | London | OUTSIDE IR35 | SC Cleared • We require someone that has experience of migration exchange from windows server 2012 to 2019. • In depth understand of On-Prem exchange server management and deployment. • Experience migrating On-Prem exchange servers from 2012 upwards. • Secure Email Gateway experience essential Due to the nature of the requirement the individual must be commutable to London 2-3 days a week.