{"id":8864,"date":"2015-04-21T06:00:02","date_gmt":"2015-04-21T13:00:02","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8864"},"modified":"2022-04-05T21:56:30","modified_gmt":"2022-04-06T04:56:30","slug":"survey-says-cybersecurity-is-board-level-issue","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/04\/survey-says-cybersecurity-is-board-level-issue\/","title":{"rendered":"Survey Says\u2026 Cybersecurity is a Board-Level Issue"},"content":{"rendered":"<p><em>This is the second post in a <\/em><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/ignite-2015-survey\/\" target=\"_blank\" rel=\"noopener\"><em>three-part series<\/em><\/a><em> highlighting the results from a Palo Alto Networks survey of 233 <\/em><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/04\/save-the-date-for-ignite-2016\/\" target=\"_blank\" rel=\"noopener\"><em>Ignite 2015<\/em><\/a><em> attendees at the end of March. The survey uncovered the cybersecurity pain points they face, what keeps them up at night, and what specific concerns they have for their organizations. (<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/04\/survey-says-zero-day-attacks-and-evasive-malware-are-biggest-risks\/\" target=\"_blank\" rel=\"noopener\">Part one<\/a>)<\/em><\/p>\n<p>Cybersecurity is a big deal, and the high-profile data breaches that seem to occur on a weekly basis are elevating the conversation around protection and prevention to new levels. Dialogue about how to address these new and constantly changing threats are now echoing through boardrooms across the globe.<!--more--><\/p>\n<p>Those in the network security trenches are witnessing the impact of this, and they\u2019re seeing firsthand how cyber threats have shifted the focus of their organizations\u2019 leadership. Seventy-five percent of survey respondents agree or strongly agree that their company\u2019s board of directors has taken an active interest in cybersecurity issues.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-3-04102015-01.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:100%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-8865 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-3-04102015-01-500x500.jpg\" alt=\"PAN BLOG IMAGE 3 04102015-01\" width=\"500\" height=\"500\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-3-04102015-01-500x500.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-3-04102015-01-100x100.jpg 100w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-3-04102015-01-230x230.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-3-04102015-01-300x300.jpg 300w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-3-04102015-01-40x40.jpg 40w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-3-04102015-01-32x32.jpg 32w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-3-04102015-01-64x64.jpg 64w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-3-04102015-01-96x96.jpg 96w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-3-04102015-01-128x128.jpg 128w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/04\/PAN-BLOG-IMAGE-3-04102015-01.jpg 1563w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>In fact, it\u2019s no longer just the IT department that\u2019s held responsible for network security; Target\u2019s CEO <a href=\"http:\/\/www.forbes.com\/sites\/ericbasu\/2014\/06\/15\/target-ceo-fired-can-you-be-fired-if-your-company-is-hacked\/\" target=\"_blank\" rel=\"noopener\">lost his job<\/a> after their network was compromised last year. The data indicates that boards of directors are taking these threats seriously and placing a renewed emphasis on preventing attacks and protecting their enterprise networks.<\/p>\n<p>Considering the very real risks that cybercriminals pose to organizations large and small \u2013 and the elevation of the topic to boards of directors level \u2013 detection and remediation are not sufficient strategies. At Ignite, we heard from our customers about the importance of preventing attacks before a malicious actor is able to exfiltrate valuable data.<\/p>\n<p>As Palo Alto Networks emphasized at Ignite this year, we\u2019re taking on cyberattackers and aiming to make the cost of network infiltration higher than the potential rewards. We do this by combining network, cloud and endpoint security into a tightly integrated\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/next-generation-firewall\" target=\"_blank\" rel=\"noopener\">enterprise security platform<\/a>\u00a0that delivers automated prevention against known and unknown threats at every point in the kill chain.<\/p>\n<h3>Join the Conversation<\/h3>\n<p>How much of a priority is cybersecurity at your organization? Share your comments below.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is the second post in a three-part series highlighting the results from a Palo Alto Networks survey of 233 Ignite 2015 attendees at the end of March. The survey uncovered the &hellip;<\/p>\n","protected":false},"author":100,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[89,155,99],"tags":[1152,454,396,1151,388,201],"coauthors":[888],"class_list":["post-8864","post","type-post","status-publish","format-standard","hentry","category-ciociso","category-cybersecurity-2","category-ignite","tag-board-of-directors","tag-enterprise-security-platform","tag-ignite-2015","tag-ignite-2015-survey","tag-kill-chain","tag-survey"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8864","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/100"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8864"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8864\/revisions"}],"predecessor-version":[{"id":8868,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8864\/revisions\/8868"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8864"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8864"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8864"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}