The Need for Speed: 2013 Incident Response Survey Results
How Organizations Can Respond Faster to Today's New Breed of Cyber-Attacks
See Also: Main Cyber Attack Destinations in 2016
Under the shadow of advanced security threats, only 20% of organizations rate their incident response programs as "very effective." Their biggest gaps: Being able to detect and contain malware, which can also be the precursor to advanced persistent threats.
These are among the main takeaways from the Information Security Media Group 2013 Incident Response Survey, the new study commissioned by FireEye. Register for this webinar for complete survey results and expert analysis on:
- The top security threats for global organizations in 2013;
- Where the largest gaps exist in how organizations detect and respond to these threats;
- How these gaps will be filled in the coming year - by new staff, tools or services?
- What organizations must do to stay ahead of these advanced threats.
From sophisticated new forms of malware to the nation-state and the advanced persistent threat (APT), cybersecurity incidents have evolved at a rapid pace and are disrupting organizations and damaging reputations. But are organizations' incident response programs, personnel and tools evolving to keep up with the new threat landscape?
According to the 2013 Incident Response Survey results, only 20% of organizations rate their incident response programs as "very effective." Their biggest gaps: Being able to detect and contain malware, which can also be the precursor to advanced persistent threats.
Aimed at determining how organizations are prepared to respond to today's new breed of cyber-attacks, the survey also finds many respondents experienced malicious code in the past year, had lost or stolen devices, or were victims of spear phishing, resulting in system downtime, lost or compromised data or financial loss. Only 26 percent of respondents rate their current anti-malware tools as "very effective."
In this session, thought-leaders from FireEye and ISMG will present and analyze responses to key questions, including:
- How are organizations prepared to respond to advanced persistent threats?
- What are the technical challenges that impact the ability for effective incident response?
- How can organizations evolve their incident response plans to address the new threat landscape?
You might also be interested in …