Overview

Cyber breaches are spreading like wild fire globally and in a grim reminder of that, organizations are being pressed towards better breach response preparedness to cut their losses. In the State of Cybersecurity Report 2017, we have raised some pertinent questions related to the changing cybersecurity ecosystem globally and have tried to holistically weave together some thought provoking perspectives on what lies ahead. Some of the questions and related viewpoints that the reader would encounter in the report include:

  • How cyber weapons and exploit kits are getting more sophisticated with widespread availability?
  • How social media is reflecting societal sentiments post major breaches that have become public?
  • How countries around the globe are strengthening their breach notification regulations?
  • How enterprises around the globe are tightening their cyber defenses?
  • How ready are businesses to collaborate with their competitors when it comes to cyber security?
  • How will AI disrupt the asymmetric battleground between attackers and defenders?

139 Organizations
surveyed

11 Countries
covered

3,304 Cyber Defense
Centre incidents
analyzed

189 Malware families analyzed

111 Security products analyzed for vulnerabilities

18 Countries breach notification laws analyzed

This section illustrates the research around the major breaches that happened during 2016. It analyzes the profile of data elements that hackers were after, and takes a look at how social media and sentiments were reflected for the companies and institutions that were breached. Section 1 follows up with the attack analysis and the research findings on the weapons of cyber destruction from our Cyber Defense Centers (CDCs) around the globe. This section also analyzes the vulnerability trends of security products and how breach notification regulations are changing across the globe.

54%

Increase in data records lost
(3376 public breaches analyzed)

Angler 33%

Most observed
exploit kit

This section is borne out of the primary research conducted by Wipro with 139 organizations across North America, Europe, APAC, Middle East and South Asia. The primary research was carried out by direct interviews along with an online survey with key stakeholders such as the CISO or respondents from the CISO organization. The research focused on the current state of defense mechanisms around users (social engineering), endpoints, network, applications, Cloud and mobile environments.

81%

Contextual threat
intelligence is the need
of the hour

59%

Enterprises rank
phishing as number 1
attack on end users

This section is based on the primary research carried out with the CISO organization. It focuses on the readiness of the security organizations to collaborate with the external cybersecurity ecosystem to better manage their risks. The collaboration here would typically be with regulatory bodies and in several instances with competitors in the same business market.

80%

Willing to share black
listed IPs, domains or
IoCs and phishing addresses
(with legal nod)

30%

Haven't participated in
industry cyber attack
simulations

The last section focuses on future disruptions and is largely based on secondary research and viewpoints evolved from within the Cybersecurity CoE. The topics covered range from cyber insurance and its role in risk management, IoT security, drones and cyber security and the changing face of the future cybersecurity analyst.

Good vs Bad Bots

Automation of response
through ML & AI

Drones

Skyjacking of
commercial drones on
the rise after FAA nod

Digital Resources

Risk Based Approach to Data Privacy
Risk based approach to data privacy can help businesses manage global risks, apply, calibrate and enforce controls based on the risk exposure.
Dealing with API Threats: Are you Ready?
APIs have established themselves as an essential part of enterprise architecture. Security plays an important role in API management
Harnessing Risk Intelligence for Effective Business Decision
An effective Risk Intelligence Solution framework can help businesses identify risks near real-time, enabling stakeholders to...