Radware C-Suite Report Final
Radware C-Suite Report Final
and Realities
A View from the C-Suite
2O1 7
EXECUTIVE
APPLICATION &
NETWORK
SECURITY
Findings & Analysis from Radware’s SURVEY
TABLE OF
CONTENTS
01 Executive Summary
2O1 7
Findings & Analysis
from Radware’s
EXECUTIVE
APPLICATION &
NETWORK
SECURITY
SURVEY
EXECUTIVE SUMMARY
Each year, Radware publishes the findings and analysis of our information security industry survey. Designed
for the entire security community, the Global Application & Network Security Report helps in understanding
the threat landscape, potential impact on businesses, levels of preparedness, emerging threats and predictions
for the coming year.1 Complementing that research is Radware’s annual executive survey. In April 2017, we
conducted a global survey of C-suite executives. All respondents represent organizations with at least $250
million (or the equivalent) in annual revenue. Our goal: to understand their greatest challenges, threats and
opportunities when it comes to cyber security.
This year’s research revealed important global trends, as well as intriguing perceptions and nuances among U.S.
and European executives. Among the findings of the 2017 executive survey:
Compared to US executives, European leaders were more likely to report having experienced an attack. Radware
believes this finding is not the result of fewer attacks in the US. Rather, it likely reflects cultural differences in
how front-line security teams report to their C-suite, more stringent reporting requirements in Europe – or some
combination of those factors.
19%
39 %
vs.
vs.
10%
26%
The survey also probed executives on whom they trust more: humans or machines. One-third of execs trust
automated systems more than humans to protect their organization. Twenty-five percent trust humans more, and
another quarter trust both equally. The remainder say that both have their vulnerabilities; they trust neither more than
the other. These perceptions of trust were consistent across regions.
Despite that relatively positive outlook, two-thirds agree that privacy is compromised by current laws related
to information security. Further, 79% think the government should do more to protect consumers’ personal
information—and that is true even among those conceding that more stringent legislation could adversely affect
their day-to-day operations.
There are numerous plausible reasons for the discrepancy between what security teams and C-suite executives are
reporting in Radware’s respective surveys. Radware believes the discrepancy can be explained by these factors:
Culture. US-based cyber-security teams seem less apt to communicate with execs about what they view as
“non-events”—that is, incidents that they successfully mitigated. As a result, US executives could be hearing
about only big, noteworthy incidents. In Europe, cyber-security teams appear to feel a greater obligation to be
transparent with executives.
Regulations and internal procedures. Overall, European companies operate under much stricter
regulations in terms of information security and data privacy. These requirements may encourage more
frequent and comprehensive reporting than is the norm in the US, where the regulatory environment appears to
be shifting to fewer, not more, data privacy protections (more on that later in the report).
BOTS
RESULTS BY REGION 66%
In Europe, executives cited
malware and bots (66%), RANSOMWARE
DDoS 62 %
ransomware (62%) and
advanced persistent threats 54% MALWARE
ADVANCED
and Bots PERSISTENT
(61%) as the top-three most
58%
THREATS
detrimental threats. UK executives 61 %
Radware’s global survey also affirms that executives no longer view cyber threats as discrete, technology-related
risks. The C-suite now understands that cyber threats are business threats that can undermine their ability to
operate and to compete successfully. In particular, executives are concerned about potential impacts of security
threats, including negative customer experience (cited by 39% of respondents), as well as losses to a company’s
brand reputation (36%) and revenue (34%). That marks a slight change from last year’s survey, when executives
reported being most concerned about brand reputation loss (34%), operational loss (31%) and revenue loss (30%).
We also wanted to know how executives would respond if they were to experience a ransom attack. In the 2016
survey, 77% of US and 91% of UK executives who had not experienced a ransom situation said they would not pay
their attackers. Among those who actually had experienced a ransom attack—especially in the UK—the numbers
were different. Last year, 64% of UK executives reported paying up, while 29% did so in the US.
This year’s findings are similar but slightly more moderate. Among those who have not experienced a ransom
situation, 46% said they would not pay, with about three in ten indicating it would depend on the risk, a new option
this year. Among the few respondents who have experienced a ransom attack, none in the US paid. The eight in
Europe who paid the ransom were evenly split between the UK and Germany, with four paying less than €5,000 and
four paying €5,000 or more.2
GERMANY
19%
UK
RESULTS BY REGION US 23%
In the US, just 6% of executives 6 %
France
reported that their company was 23%
targeted by a ransom attack.
This attack reinforces the learnings from Radware’s 2016-17 Global Application & Network Security Report, which
indicates that crime—ransom in particular—was the top motivation for cyber-attacks in 2016. While we may have
seen a lull in ransom activity, once criminals had a vehicle to extort money from organizations, they immediately
leveraged it and ran a massive, global ransom campaign.
49% 39%
RESULTS BY REGION 36%
Overall, almost half of executives (47%) cited improving information security
as a top-three goal of their digital transformation.
FRANCE
In Europe, information security is the top goal (47%). 47% Information Security
34% 34% Improved Cust. Experience
Business efficiency ranked second (34%), followed Reduced OPEX
In the US, business efficiency surpassed improved security as the number-one priority (50% versus 47%),
with reducing operational expenses (38%) rounding out the top-three goals of digital transformation.
Consider the rise of IoT bots and botnets. Once a futuristic-sounding threat, these methods of attack have proved
to be lethal. The year 2016 brought attacks on Krebs, OVH and Dyn by the IoT botnet known as Mirai. While
Mirai was neither the first nor the most sophisticated IoT botnet, it was highly effective in taking down its targets.
These attacks represented a milestone in IoT botnet and DDoS history—and served as a wake-up call to anyone
responsible for safeguarding networks, systems and data.
This year’s executive survey supports the assertion that security “Attacks and techniques
automation has now reached an inflection point—with about
four in five of the executives reported having already or recently change daily. You need flexible
implemented more reliance on automated solutions.
solutions and the ability to make
A significant portion of executives foresee automation as the adjustments just as frequently
wave of the not-so-distant future. Overall, 38% indicated that
automated security systems—such as machine learning and AI—
to protect the business. Pull
will be the primary resource for maintaining cyber security within those levers to keep pace with
the next two years. In Europe, nearly half of executives (46%)
expressed this view. In that same time period, about one-quarter
ever-changing threats to your
of all executives expect to rely on an even mix of people and applications and networks.”
machines to maintain cyber and network security. That propensity
is nearly the same in the US (27%) versus Europe (21%).
The 2016-2017 Global Application & Network Security Report
GERMANY
53%
featured an op-ed by the CISO of a top-five US carrier, who wrote:
UK
RESULTS BY REGION
46%
In Europe, nearly half of executives (46%) believe that
automated security systems will be the primary resource France
that organizations rely on for maintaining cyber/network 39%
security.
Among European executives, engaging ex- Among executives whose companies already have or are
hackers is not just a hypothetical question; open to engaging hackers, these are the tests they would
it is already common practice. Nearly half of let them perform:
respondents in Europe have already invited
hackers to test their systems for vulnerabilities. Effectiveness of existing
That’s significantly higher than in the US, where network security systems 60%
only 31% of executives say their companies have
engaged hackers for vulnerability testing.
Network Infrastructure 58%
Databases 58%
Globally, those who already have hired hackers or
are open to this practice would let hackers test the Mobile Services 55%
effectiveness of existing network systems, network
infrastructure and databases (see Figure 3). Web Properties 52%
Homeworking
What is behind Europeans’ propensity to work Infrastructures 40%
with ex-hackers? Radware believes it could be
rooted in a perception that hackers are more
Building Access 37%
likely to be agile and creative in identifying Policies and Process 32%
vulnerabilities. For starters, most hackers don’t
complete formal studies in computer engineering. 20% 40% 60% 80% 100%
Nor do they participate in security training
Figure 3. Systems that hackers would test
programs that adhere to a certain methodology.
They think outside the proverbial box and
can therefore help with vulnerability mapping
and forensics. Further, hackers tend to share
At Radware, we have hired former white-hat
information and openly discuss offensive tools hackers, who continue to contribute valuable
and tactics. Most organizations don’t or do so to
a much lesser extent.
experience and perspective to our team.
It may also be that Europeans companies are adhering to the philosophy of “Keep your friends close and your
enemies closer.”
RESULTS BY REGION
In Europe, 78% of executives expressed willingness to hire
ex-hackers as part of their internal security team. Only 31% 58%
said their organization would be not very or not at all likely EXTREMELY LIKELY
to do so. In France, 82% of executives said their companies
would be somewhat, very or extremely likely to hire ex-
20%
SOMEWHAT LIKELY
hackers, compared to 78% in Germany and 74% in the UK.
21%
In the US, 63% of executives said their organizations would NOT AT ALL
be somewhat, very or extremely likely to hire ex-hackers; 35%
said they were not very or not at all likely to make these hires.
EUROPE:
COMMITTED TO PRIVACY
100%
2% 9% 1%
18%
2%
Completely
Disagree
80% 22%
Since the mid-1990s, legislation that Somewhat
Disagree
protects the information privacy of
60%
individuals in the EU is primarily based 43% Neither Agree
on EU Directive 95/46/EC: the Data
Nor Disagree
Protection Directive. This legislative 40% 46%
act set out minimum standards on
data protection—offering guiding Somewhat
principles without specific instructions 20% Agree
36%
or harsh penalties for non-compliance. 21%
Each country within the EU has taken Completely
Agree
Directive 95/46/EC and transposed it I feel privacy is compromised by current laws The government should do more to
and legislation related to information security. protect your personal information.
into its own, local data protection laws.
Figure 4. Is privacy compromised by current laws?
Slated to take effect on May 25, 2018, GDPR aims to provide protection concerning the processing of personal data
and the free movement of such data. It represents an entirely new set of regulatory rules and measures to comply
with and implement by any organization that controls or processes any form of personal data. Under the GDPR,
“personal data” is to be interpreted in the wide sense of the term—and pertains to any information relating to an
individual, whether his or her private, professional or public life. Personal data can include anything from a name,
picture, email address, financial details, posts on social networks or even a computer’s IP address.
Not abiding with the GDPR will be met with enforced action including fines of up to €20 million or 4% of the
offending organization’s annual worldwide revenue when facing a breach of the data protection rules. The GDPR
includes provisions that promote accountability and governance that can be audited with non-compliance, leading
to administrative fines of up to €10 million (or 2% of annual worldwide revenue).
Whenever a company wants to trade or do business with one or several of the EU member states, it will have to
prove adequacy. In other words, virtually any company that does business in the EU will need data protection
standards that are equivalent to the EU’s GDPR starting in May 2018. This virtually makes GDPR a global, worldwide
regulation affecting organizations and businesses around the globe—and that is poised to have a huge impact on
the competitiveness of US companies in EU markets.
In France, companies also face a specific law from 1978, Loi Informatique et Libertés, which strictly supervises
the use of personal data and the consolidation/filing of extensive databases containing personal, private data. For
German companies, the shift to the GDPR will likely be less traumatic, as national laws already mandate prompt
and thorough reporting by any organization deemed part of “critical infrastructure.” For companies in the UK, the
road may be a bit rockier as they face massive uncertainty related to Brexit. Initial signs seem to suggest that
most companies will still work to meet GDPR requirements, as those will govern any data that large, UK-based
companies may hold in other EU countries.
Opt-in: ISPs are required to obtain affirmative ‘opt-in’ consent from consumers to use and share sensitive
information. The rules specify categories of information that are considered sensitive, which include precise
geo-location, financial information, health information, children’s information, social security numbers, web
browsing history, app usage history and the content of communications.
Opt-out: ISPs would be allowed to use and share non-sensitive information unless a customer ‘opts-out.’ All
other individually identifiable customer information – for example, email address or service tier information –
would be considered non-sensitive and the use and sharing of that information would be subject to opt-out
consent, consistent with consumer expectations.
Exceptions to consent requirements: Customer consent is inferred for certain purposes specified in the
statute, including the provision of broadband service or billing and collection. For the use of this information,
no additional customer consent is required beyond the creation of the customer-ISP relationship.”3
3 [Link]
RESULTS BY REGION
In Europe, 67% of executives agree that privacy is compromised by current privacy laws and legislation
related to information security.
In the US, the finding was similar, with 66% indicating that current laws are putting privacy at risk
and 75% looking to government to do more.
4 [Link]
Globally, more than half of the executives surveyed reported a preference for managing cyber security internally.
About one-third (32%) say they count on a security provider (such as their ISP or carrier), while 14% lean on a
dedicated security vendor.
RESULTS BY REGION
In Europe, 51% of companies manage security within their own
organization. UK companies are particularly keen on internal management
(71% compared to 33% in France and 47% in Germany). Across all
three European countries, 49% opt either for management by their ISP/
carrier (39%) or management by a dedicated security provider (10%).
Interestingly, companies in France are most likely to opt for third-party
management (cited by 55% of executives).
In the US, more than half of companies (54%) manage their own security.
A smaller share (26%) lean on their ISP or carrier, while a comparatively
larger percentage (19%) count on a dedicated security vendor.
After probing executives on the composition of their security teams, we found that most rely either on proven
technical talents within their organization (42%) or third-party experts with long track records in IT (36%). Just 5%
count on white-hat hackers, while 12% use some combination of all three types of resources. Compared to just 1%
of European companies, about one in ten US corporations has no in-house security team.
Can the organization make the necessary investments in obtaining and maintaining security expertise?
Do the organization have sufficient resources and knowledge not only to operate the security solutions but also
to stay on top of new and emerging threats?
Since most IT infrastructures combine on-premise and cloud-based systems, in-house management require a
patchwork of security solutions. Is the organization prepared for the burden of managing multiple solutions?
How will the organization ensure that its approach is continuously adaptive? Without capabilities, such as
machine learning, virtually any in-house security solution is obsolete as soon as it is deployed.
How sophisticated is the ISP/carrier’s security infrastructure? Can it keep the organization up and running even
during a large or complex attack? Will it offer the organization a mitigation service, or does it “blackhole” or cut
off all traffic while under attack? Make sure to understand how this practice might inadvertently affect multiple
customers’ systems.
How well does the ISP/carrier know the organization’s applications? Without a detailed understanding, it may
not be able to protect against DDoS attacks.
How many organizations is the ISP/carrier supporting, and how can each organization be certain it will receive
the support it needs?
Can that vendor protect the organization’s unique network infrastructure? If the organization operates
with a hybrid network, ensure that the vendor can protect both the organization’s physical and cloud
infrastructure versus having to look for different solutions that do not deliver complete visibility across the
entire network’s security.
Will the vendor offer the organization a “personal” connection? Will they take the time to understand
the organization’s system architecture and provide a solution and payment structure that meets the
organization’s needs?
What are the regulatory considerations? Does the organization face a mandate not to move its data out of
the country?
These considerations can help any organization as it navigates increasingly complex and fast-changing security
threats. As this research from Radware shows, cyber security is top of mind for executives around the globe.
Effective security management is, and will continue be, a key C-suite priority.
Radware encourages you to join our community and follow us on: Facebook, Google+, LinkedIn, Radware Blog,
SlideShare, Twitter, YouTube, Radware Connect app for iPhone® and our security center [Link] that
provides a comprehensive analysis on DDoS attack tools, trends and threats.
LEARN MORE
To learn more about how Radware’s integrated application delivery & security solutions can enable you to get the most
of your business and IT investments, email us at info@[Link] or go to [Link].
This document is provided for information purposes only. This document is not warranted to be error-free, nor subject to any other warranties or conditions,
whether expressed orally or implied in law. Radware specifically disclaims any liability with respect to this document and no contractual obligations are formed
either directly or indirectly by this document. The technologies, functionalities, services, or processes described herein are subject to change without notice.
©2017 Radware Ltd. All rights reserved. Radware and all other Radware product and service names are registered trademarks or trademarks of Radware in the U.S. and other
countries. All other trademarks and names are property of their respective owners. The Radware products and solutions mentioned in this document are protected by trademarks,
patents and pending patent applications. For more details please see: [Link]
EXECUTIVE
APPLICATION &
NETWORK
SECURITY
SURVEY