Image

Image

Image

- 95 percent of respondents in the retail sector stated their organization could detect a breach within a month or less despite the fact that nearly half (48 percent) of participants said their breach detection products are just partially integrated.
- 87 percent of financial IT pros said they could remove an unauthorized device from the corporate network within minutes or hours. But almost as many respondents said they could automatically discover at most 80 percent of assets.
- A majority (78 percent) of respondents working in the federal government answered they could detect new network devices within hours, but 52 percent said they didn't know how long the detection process would actually take.
Image

"These results show that most security professionals are assuming they are doing the right things to secure their environments, but lack real world data to back up their assumptions. This highlights the importance of testing security controls to ensure they are functioning as expected. It’s not enough to install security tools throughout the environment. You must test the policies and procedures to be confident the controls in place will stop or detect real-world intrusions."In fact, close to half of energy respondents lacked a basic understanding of how long it takes for them to detect unauthorized software, receive an alert from vulnerability scanning systems following a discovery, or get a notice that a system failed to log properly at 59 percent, 52 percent, and 40 percent, respectively. Even so, at least three-quarters of respondents said every one of those processes would take only hours. Additionally, 44 percent of energy sector respondents said less than 80 percent of patches succeed in a typical patch cycle. That makes Tim Erlin, director of IT security and risk strategist for Tripwire, feel IT professionals in the energy sector have a long way to go in securing their organization's environments:
"The energy sector has made significant improvements in securing their slice of the nation’s critical infrastructure, but broader adoption of security best practices is still lacking. While dedicated security staff is intimately familiar with the deployed capabilities and gaps, IT at large is often working on assumptions of protection."For more information regarding Tripwire's 2016 Breach Detection Study, click here.