Enterprise Services
Showing results for 
Search instead for 
Do you mean 

Conquer Cyber-crime Challenges by Checking out Conference

Nadhan on ‎12-02-2013 01:05 PM

The 2013 Fourth Annual Cost of Cyber Crime Study details findings that continue to reinforce the vital need to address Security as a board-level concern. After reading this report from the Ponemon Institute, I reviewed various sessions related to Security at HP Discover Barcelona with great interest. Below is a tabulated list of the findings from the study, along with my observations and applicable security sessions. Join me in checking out this conference that enables you to conquer cyber-crime challenges.


Cyber Criminal.png



Key study findings


My observations


Related links    (including HP Discover sessions)


Cyber-crimes continue to be very costly for organizations.

It is important to align business risk and security priorities.


Cyber-crime cost varies by organizational size.

Smaller organizations are more vulnerable.

Just Right IT for SMBs

All industries fall victim to cybercrime, but to different degrees.

The more confidential the data, the higher the risk. Old style concepts are still vital to   national security.

Take a lesson from history on defense-in-depth strategy, DF2153

The most costly cyber-crimes are those caused by malicious insiders,   denial of service and web-based accounts.

Are your employees at home with Information Security?

DF2155 (workforce engagement), DF2146 (DDoS protection)

Cyber-attacks can get costly if not resolved quickly.

It is vital to have the right strategy in place followed by timely execution of proactive and reactive measures.

DF2236 (Answer the So-what CIO question)

Business disruption represents the highest external cost, followed by   the costs associated with information loss.

CIOs  must secure their relationship with their CISOs

Top 5 questions CIOs should ask

Detection and recovery are the most costly internal activities.

Cyber-crime never takes a day off, cyber security shouldn’t either.

TB1988 (Continuous Monitoring)

Activities relating to IT security in the network layer receive the   highest budget allocation.

Weakest links are greatest opportunities for Enterprise Security

Are your apps holding the fort?  

Deployment of security intelligence systems makes a difference. Companies deploying security intelligence   systems experienced a substantially higher ROI at 21 percent than all other   technology categories presented.

Link a chain of security events to kill the intent of the adversary. Using the right tools to proactively   combat cyber-crime challenges is vital to effectively address enterprise   security.


A strong security posture moderates the cost of cyber- attacks.

Compare your IT security posture with over 100 enterprises

DF2148 (Benchmark)

Deployment of enterprise security governance practices moderates the   cost of cyber-crime.

CIOs posing the right questions to their CISOs would be a good start.

DEMO2251 (GRC), DF1995 (Compliance simplified)


The New Style of IT comes across several other sessions related to security at HP Discover, including:


a. Cloud: DT2145


b. Big Data: DT2035, TB1992, DT2142


c. Mobility: DT2331, DF2151, TB1989


d. Case studies: DT1814, BB1881, TB890


How about you? Which of these findings from the HP Ponemon Cyber-Crime study are more in context for your enterprise? What is your approach to dealing with the ones that do apply? How about securing a seat at the conference sessions that matter more to your enterprise?


Team up with HP Technology Expert, E.G.Nadhan


Connect with Nadhan on: Twitter, Facebook, Linkedin and Journey Blog








0 Kudos
About the Author


Aug 29 - Sep 1
Boston, MA
HPE Big Data Conference 2016
Attend HPE’s Big Data Conference on August 29 - September 1, 2016 to learn from peers in every industry and hear from Big Data experts and thought lea...
Read more
Sep 13-16
National Harbor, MD
HPE Protect 2016
Protect 2016 is our annual conference on September 13 - 16, 2016, and is the place to meet the world’s top information security talent, discuss new pr...
Read more
View all