Fatal half-measures in incident response

FREE

Become An Insider

Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CSO, Computerworld, InfoWorld, IT World and Network World Learn more.

According to our tenth annual Global Information Security Survey (GISS), conducted by PricewaterhouseCoopers, many of the 12,052 business and technology execs surveyed reported that their organizations fell victim to a wide selection of breaches.

Those breaches included data exfiltration, mobile attacks, application breaches, network breaches, successful social engineering attacks, and lost or stolen removable storage devices. "One of the things I try convince clients is that while they may not be able to prevent certain breaches, they can certainly learn to respond to breaches more proactively," Dave Shackleford, senior VP, research and CTO at IANS says.

To continue reading, register here to become an Insider. You'll get free access to premium content from CIO, Computerworld, CSO, InfoWorld, and Network World. See more Insider content or sign in.

To continue reading, please begin the free registration process or sign in to your Insider account by entering your email address:
From CIO: 8 Free Online Courses to Grow Your Tech Skills
Join the discussion
Be the first to comment on this article. Our Commenting Policies