About Us | Contact Us
View Cart

Conference Statistics

By Dan Hadaway | Friday, November 21, 2014 - Leave a Comment

The 13 Unlucky Stats Tell the Story!


The Indiana Bankers’ Association Conference is once again a hit!
Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . .


Dan's Talk

Well, the IBA’s IT Security and Risk Management Conference is over!  The dust has settled.  I’ve found my notes, and I’d just like to share some of the more interesting statistics I wrote down during the many EXCELLENT talks.  I did not track where the statistics were coming from, so let’s just credit them to the conference.

First, by way of summary, let’s start out with what I think is the best quote from the conference:

“While the federal government has put your Board of Directors in charge of Information Security, they’ve also put the information security people in charge of customer education.”

– Dan Hadaway

Okay, I know, I know, I’m quoting myself.  But this way I don’t get in trouble for misquoting anybody and as far as I’m concerned, what I said above summarizes the major takeaways from the conference, and both takeaways were delivered on morning one, and then reinforced throughout the conference.

So enough with the quotes, here are the statistics:

  1. 40% of Americans have received breach notices.  This is up from 10% two years ago.
  2. 51% of banks have seen the number of security incidents in their institutions increase over the past year, while 27% feel they have stayed the same.
  3. 50% of bankers believe that a lack of customer education causes security breaches.
  4. 6% of those same bankers felt their own customer education program was “superior.”
  5. 97% of mobile fraud is on Android devices.
  6. 20% of people don’t know the answers to their own challenge questions.
  7. 31% of breaches result from weak passwords.
  8. 66% of consumers think their bank is in charge of their security.
  9. 60% of world wide breach victims are American citizens.
  10. Exploit of 20% of known vulnerabilities would allow complete control of a system (root access)
  11. We’re only using 10% of our “information security capabilities” on average.
  12. 69% of people in banks “misuse the system” daily.  17% never.
  13. 94% of incidents are reported at “exfiltration.”  In other words, we are not aware of incidents until AFTER the damage is done.

If I were to re-write that last statistic, I would rewrite it like this:

  • 6% of incidents occur on institutions with a well-established, mature Incident Management Process.

Original article by Dan Hadaway CRISC CISA CISM. Founder and Managing Partner, infotex

“Dan’s New Leaf” is a “fun blog to inspire thought in the area of IT Governance.”

 


same_strip_012513


 

Latest News
    Today we present a special BONUS awareness poster for YOUR customers (and users).  This update to the April 2022 Awareness Poster takes some cues from the Dan’s New Leaf article: Why Local? Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the […]
    Awareness is 9/11’s of the battle, if we use it! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . One of my old college buddies hates banks.  He was turned down for a loan a long time ago and just can’t let go.  I actually […]
    PRESS RELEASE – FOR IMMEDIATE RELEASE SERVICE NEWS Dateline: Dayton, IN, June 22, 2022 We are proud to announce that infotex will now be supporting Endpoint Detection and Response (XDR/MDR)! We can manage/monitor solutions you already have or offer one as part of our service while still maintaining a segregated response posture. In recent years […]
    Over 85 percent of surveyed companies report having no  centralized monitoring of networked industrial devices… An article review. If you are involved in IT within your organization, you’re probably aware of the importance of being able to monitor relevant activity from your networked devices, especially if your organization is involved in healthcare, finance, or government.  […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around […]
    We always strive to bring you the best content that we possibly can. Your opinion on any content, presentation, service, or anything else you have received from us is important! Please click the button below to let us know how we are doing!  
    What to Expect in an Annual Information Security Report to the Board Webinar-Movie Information security ranks as a top risk to financial institutions, both in terms of likelihood and overall impact. It is important that boards receive annual comprehensive reporting from management about the information security risks and incidents, and the actions taken to address […]
    The Five Precepts of IT Vendor Management Webinar-Movie We’re going back to basics on Vendor Management. This webinar will give you a training tool to help out that new person that is starting to take on the gargantuan task that is Vendor Management.
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around […]
    The joint cybersecurity advisory includes the 15 most exploited vulnerabilities reported in 2021… An article review.  While a lot of attention is focused on previously undisclosed or “zero day” attacks, some of the most likely attack vectors are vulnerabilities that have been widely known for weeks or even months.  That’s according to a new joint […]