Enterprise Services
Showing results for 
Search instead for 
Do you mean 

Conquer Cyber-crime Challenges by Checking out Conference

Nadhan on ‎12-02-2013 01:05 PM

The 2013 Fourth Annual Cost of Cyber Crime Study details findings that continue to reinforce the vital need to address Security as a board-level concern. After reading this report from the Ponemon Institute, I reviewed various sessions related to Security at HP Discover Barcelona with great interest. Below is a tabulated list of the findings from the study, along with my observations and applicable security sessions. Join me in checking out this conference that enables you to conquer cyber-crime challenges.


Cyber Criminal.png



Key study findings


My observations


Related links    (including HP Discover sessions)


Cyber-crimes continue to be very costly for organizations.

It is important to align business risk and security priorities.


Cyber-crime cost varies by organizational size.

Smaller organizations are more vulnerable.

Just Right IT for SMBs

All industries fall victim to cybercrime, but to different degrees.

The more confidential the data, the higher the risk. Old style concepts are still vital to   national security.

Take a lesson from history on defense-in-depth strategy, DF2153

The most costly cyber-crimes are those caused by malicious insiders,   denial of service and web-based accounts.

Are your employees at home with Information Security?

DF2155 (workforce engagement), DF2146 (DDoS protection)

Cyber-attacks can get costly if not resolved quickly.

It is vital to have the right strategy in place followed by timely execution of proactive and reactive measures.

DF2236 (Answer the So-what CIO question)

Business disruption represents the highest external cost, followed by   the costs associated with information loss.

CIOs  must secure their relationship with their CISOs

Top 5 questions CIOs should ask

Detection and recovery are the most costly internal activities.

Cyber-crime never takes a day off, cyber security shouldn’t either.

TB1988 (Continuous Monitoring)

Activities relating to IT security in the network layer receive the   highest budget allocation.

Weakest links are greatest opportunities for Enterprise Security

Are your apps holding the fort?  

Deployment of security intelligence systems makes a difference. Companies deploying security intelligence   systems experienced a substantially higher ROI at 21 percent than all other   technology categories presented.

Link a chain of security events to kill the intent of the adversary. Using the right tools to proactively   combat cyber-crime challenges is vital to effectively address enterprise   security.


A strong security posture moderates the cost of cyber- attacks.

Compare your IT security posture with over 100 enterprises

DF2148 (Benchmark)

Deployment of enterprise security governance practices moderates the   cost of cyber-crime.

CIOs posing the right questions to their CISOs would be a good start.

DEMO2251 (GRC), DF1995 (Compliance simplified)


The New Style of IT comes across several other sessions related to security at HP Discover, including:


a. Cloud: DT2145


b. Big Data: DT2035, TB1992, DT2142


c. Mobility: DT2331, DF2151, TB1989


d. Case studies: DT1814, BB1881, TB890


How about you? Which of these findings from the HP Ponemon Cyber-Crime study are more in context for your enterprise? What is your approach to dealing with the ones that do apply? How about securing a seat at the conference sessions that matter more to your enterprise?


Team up with HP Technology Expert, E.G.Nadhan


Connect with Nadhan on: Twitter, Facebook, Linkedin and Journey Blog








0 Kudos
About the Author


Nov 29 - Dec 1
Discover 2016 London
Learn how to thrive in a world of digital transformation at our biggest event of the year, Discover 2016 London, November 29 - December 1.
Read more
Each Month in 2016
Software Expert Days - 2016
Join us online to talk directly with our Software experts during online Expert Days. Find information here about past, current, and upcoming Expert Da...
Read more
View all