欢迎来到报告吧! | 帮助中心 分享价值,成长自我!

报告吧

换一换
首页 报告吧 > 资源分类 > PDF文档下载
 

2018年未来网络趋势报告.pdf

  • 资源ID:22206       资源大小:9.22MB        全文页数:75页
  • 资源格式: PDF        下载积分:20金币 【人民币20元】
快捷下载 游客一键下载
会员登录下载
三方登录下载: 微信开放平台登录 QQ登录  
下载资源需要20金币 【人民币20元】
邮箱/手机:
温馨提示:
用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,下载共享资源
 
友情提示
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,既可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

2018年未来网络趋势报告.pdf

MMC CYBER HANDBOOK 2018 Perspectives on the next wave of cyberCyber risk continues to grow as technology innovation increases and societal dependence on information technology expands. A new and important turning point has been reached in the struggle to manage this complex risk. In the war between cyber attackers and cyber defenders, we have reached what Winston Churchill might call “the end of the beginning. ” Three characteristics mark this phase shift. First, global cybercrime has reached such a high level of sophistication that it represents a mature global business sector illicit to be sure, but one which is continually innovating and getting more efficient. In 2017 we have experienced the widespread use of nation state-caliber attack methods by criminal actors. Powerful self-propagating malware designed to destroy data, hardware and physical systems have caused major business disruption to companies worldwide with an enormous financial price. The number of ransomware attacks has also spiked significantly . More attack incidents have impact extending beyond the initial victims with broad systemic ripple effects. Second, business and economic sectors have high and growing levels of dependency on IT systems, applications and enabling software. Growth in connectivity between digital and physical worlds, and the acceleration in commercial deployment of innovative technologies like Internet of Things (IOT) and Artificial Intelligence (AI) will expand potential avenues for cyberattack and increase risk aggregation effects. These changes will make the next phase of cyber defense even more challenging. The third shift is the rising importance of coordination among institutions governments, regulatory authorities, law enforcement agencies, the legal and audit professions, the non-government policy community , the insurance industry , and others as a critical counter to the global cyber threat. Cyber risk defense can only be effective if these groups share a common understanding of the changing nature of the threat, their importance and increased interconnected nature. Working individually and in concert, these groups can increase our collective cyber resilience. We are beginning to see expectations converge in areas such as increased transparency , higher penalties for failure to maintain a standard of due care in cyber defense, improved incident response, and an emphasis on risk management practices over compliance checklists. It will be vital for this trend to continue in the next phase. Against this backdrop, the 2018 edition of the MMC Cyber handbook provides perspective on the shifting cyber threat environment, emerging global regulatory concepts, and best practices in the journey to cyber resiliency. It features articles from business leaders across Marsh & McLennan Companies as well as experts from Microsoft, Symantec, FireEye and Cyence. We hope the handbook provides insight which will help you understand what it takes to achieve cyber resiliency in the face of this significant and persistent threat. John Drzik President, Global Risk and Digital Marsh & McLennan Companies FOREWORDCONTENTS Threat T rends on Major Attacks in 2017 p. 5 Industries Impacted By Cyberattacks p. 6 Evolution of Cyber Risks: Quantifying Systemic Exposures George Ng and Philip Rosace p. 7 The Dramatically Changing Cyber Threat Landscape in Europe FireEye | Marsh & McLennan Companies p. 10 Asia Pacific A Prime T arget for Cybercrime Wolfram Hedrich, Gerald Wong, and Jaclyn Y eo p. 15 The Equifax Breach And its Impact on Identity Verification Paul Mee and Chris DeBrusk p. 21 Lessons from WannaCrypt and NotPetya Tom Burt p. 24 The Mirai DDoS Attack Impacts the Insurance Industry Pascal Millaire p. 27 Time For T ransportation and Logistics To Up Its Cybersecurity Claus Herbolzheimer and Max-Alexander Borreck p. 30 Are Manufacturing Facilities as Secure as Nuclear Power Plants? Claus Herbolzheimer and Richard Hell p. 33 WAKE UP TO THE SHIFTING CYBER THREAT LANDSCAPEPercentage of Respondents at Each Level of GDPR Compliance p. 35 The Growing Waves of Cyber Regulation Paul Mee and James Morgan p. 36 Regulating Cybersecurity in the New Y ork Financial Services Sector Aaron Kleiner p. 40 The Regulatory Environment in Europe is About to Change, and Profoundly FireEye | Marsh & McLennan Companies p. 43 Cybersecurity and the EU General Data Protection Regulation Peter Beshar p. 46 Cyberattacks and Legislation: A Tightrope Walk Jaclyn Y eo p. 49 Cyber Preparedness Across Industries and Regions p. 53 Deploying a Cyber Strategy Five Moves Beyond Regulatory Compliance Paul Mee and James Morgan p. 54 Quantifying Cyber Business Interruption Risk Peter Beshar p. 60 Cybersecurity: The HR Imperative Katherine Jones and Karen Shellenback p. 61 Limiting Cyberattacks with a System Wide Safe Mode Claus Herbolzheimer p. 63 Recognizing the Role of Insurance Wolfram Hedrich, Gerald Wong, and Jaclyn Y eo p. 65 PREPARE FOR EMERGING REGULATIONS CYBER RESILIENCY BEST PRACTICES WAKE UP TO THE SHIFTING CYBER THREAT LANDSCAPETHREAT TRENDS ON MAJOR AT TACKS CLOUD MOBILE Average number of cloud apps used per organization Percentage of data broadly shared Ransomware families Number of detections 463,841 Average ransom amount $1,077 2016 $373 2014 340,665 $294 2015 2016 2014 2015 101 30 30 T otal breaches Breaches with more than 10 million identities exposed Average identities exposed per breach Total identities exposed 1,523 1, 211 1,209 774 841 928 25% 23% 25% 2015 JULDEC 2016 JANJUN 2016 JULDEC BREACHES RANSOMWARE New mobile vulnerabilities 2015 89 463 2016 290 316 2014 178 12 10 BlackBerry iOS Android TOTAL 606 552 200 New Android mobile malware families New Android mobile malware variants 2014 2015 2016 3.6 K 805 K 466 K 927 K In the last 8 years more than 7 .1 BILLION identities have been exposed in data breaches 18 4 46 2.2 K 3.9 K 13 15 11 564 MM 1.1 BN 1.2 BN Source: Symantec 5 MMC CYBER HANDBOOK 2018 INDUSTRIES IMPACTED BY C Y B ER AT TAC K S Percentage of respondents in industry that have been victims of cyberattacks in the past 12 months 25% 26% 25% 22% 17% 19% 15% 15% 14% 14% 13% 9% Retail and Wholesale (N=39) Aviation and Aerospace (N=34) Power and Utilities (N=56) Professional Services (N=136) Infrastructure (N=36) Manufacturing (N=176) Energy (N=88) Marine (N=36) Financial Institutions (N=132) Health Care (N=101) Communications, Media, and Technology (N=104) Automotive (N=46) Source: 2017 Marsh | Microsoft Global Cyber Risk Perception Survey 6 MMC CYBER HANDBOOK 2018C yberattacks have escalated in scale over the last twelve months. The progression of events has demonstrated the interconnectedness of risks and shared reliance on common internet infrastructure, service providers, and technologies. If the T arget, Sony , Home Depot, and JPMorgan Chase data breaches in 2013 and 2014 defined the insureds need to manage their cyber risks and drove demand for cyber insurance, then this years events have proven the need for insurers to quantify and model their exposure accumulations and manage tail risk. These recent events have a different texture and a broader impact/reach than the incidents we have grown accustom to seeing over the past decade. A certain trend towards awareness of systemic risk has emerged among cyber insurance markets and their regulators. Exposure modeling around accumulation EVOLUTION OF CYBER RISKS: QUANTIFYING SYSTEMIC EXPOSURES George Ng and Philip Rosace MMC CYBER HANDBOOK 2018

注意事项

本文(2018年未来网络趋势报告.pdf)为本站会员(2+2)主动上传,报告吧仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知报告吧(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

copyright@ 2017-2022 报告吧 版权所有
经营许可证编号:宁ICP备17002310号 | 增值电信业务经营许可证编号:宁B2-20200018  | 宁公网安备64010602000642号


收起
展开