際際滷

際際滷Share a Scribd company logo
EXTRACTING VALUE FROM

INFORMATION CHAOS
WHY GOOD GOVERNANCE MAKES GOOD SENSE

BYOD [BRING YOUR OWN DEVICE]
6 OUT OF 10
EMPLOYEES
AGES 18-35
USE A PERSONAL
DEVICE FOR WORK

SECURITY BREACHES

75M

CYBERCRIME COSTS

US $1 TRILLION
PER YEAR

24B

MALWARE
SAMPLES
in

2012

CONNECTED
DEVICES
by

2020

DATA PROLIFERATION

THE AVERAGE CORPORATE
WORKER SENDS & RECEIVES

112

SOCIAL MEDIA RISK

EMAILS
PER DAY

PRIVACY REGULATIONS

2

3

COMPANIES
are at

RISK
from

SOCIAL

MEDIA

PASS

****

1

DOWNTIME

WORKER
RECEIVES

$380B

65

3

AVERAGE COST

TERABYTES
of

$5,000

COUNTRIES HAVE
THEIR OWN DATA
PROTECTION
LAWS

INFORMATION
PER YEAR

A MINUTE

FOR DOWNTIME

INCIDENTS

COST OF DISASTERS

in

2011

9.6 MILLION
PETABYTES:

business-related information
processed by the worlds computer
servers per year

BUSINESS GOVERNANCE AND
MANAGEMENT OF ENTERPRISE IT
Download a complimentary copy of COBIT 5 today or learn more at
www.isaca.org/cobit

SOURCES
http://www.isaca.org/About-ISACA/Press-room/News-Releases/2011/Pages/ISACA-Survey-Bring-Your-Own-Device-Trend-Heightens-Online-Holiday-Shopping-Risk.aspx
http://www.gsma.com/articles/gsma-announces-the-business-impact-of-connected-devices-could-be-worth-us-4-5-trillion-in-2020/22536
http://blogs.mcafee.com/mcafee-labs/mcafee-q4-threats-report-shows-malware-surpassed-75-million-samples-in-2011
http://www.radicati.com/?p=6904
http://ucsdnews.ucsd.edu/newsrel/general/04-05BusinessInformation.asp
http://www.informationweek.com/thebrainyard/news/community_management_development/231602379
http://www.un.org/en/development/desa/news/ecosoc/cybersecurity-demands-global-approach.html
http://www.mofo.com/privacy--data-security-services/
http://www.time.com/time/world/article/0,8599,2108354,00.html
http://www.eweek.com/c/a/IT-Infrastructure/Unplanned-IT-Downtime-Can-Cost-5K-Per-Minute-Report-549007/
Ad

Recommended

David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
Starttech Ventures
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Starttech Ventures
Digital disruption survival guide
Digital disruption survival guide
Sigortam.net
Global Business Impact of COBIT 5
Global Business Impact of COBIT 5
ISACA
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017
ISACA
Cyber Security Protection
Cyber Security Protection
Mark Cook
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
PaloAltoNetworks
Cybersecurity Skills Crisis
Cybersecurity Skills Crisis
ISACA
The Future Tech Workforce is Her
The Future Tech Workforce is Her
ISACA
Nombres de dominio de internet
Joha Paguay
CompTIA Perks
CompTIA Perks
CompTIA
Office365 education transformation collaboration using office 365
Office365 education transformation collaboration using office 365
Sachin. Jung
Safe Tech. 亠仆亳 舒仍亠仄弍亠亞: "仆亠仆亠-弍舒仆从亳仆亞. 舒从 亟亠仍舒 舒弍仂 从仍亳亠仆舒 弍亠亰...
Safe Tech. 亠仆亳 舒仍亠仄弍亠亞: "仆亠仆亠-弍舒仆从亳仆亞. 舒从 亟亠仍舒 舒弍仂 从仍亳亠仆舒 弍亠亰...
Expolink
Useful Video Conferencing Tools
Useful Video Conferencing Tools
Nupur Singh
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
UL Transaction Security
Assessing Your security
Assessing Your security
Legal Services National Technology Assistance Project (LSNTAP)
Data, data slides
Data, data slides
MAGNUS1_MILLIONS
Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15
James Fisher
Term assignment
Term assignment
Jenny Shimbashi
Byod final (2)
Byod final (2)
BrendaGraycon
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
Fuji Xerox Asia Pacific
08 pdf show-239
08 pdf show-239
#TheFraudTube
Corporate Data Goes Mobile
Corporate Data Goes Mobile
NetApp
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
Net at Work
BYOD
BYOD
Neeraj Muduli
Vulnerability Areas Hackers Scan For When Choosing Their Next Victim
Vulnerability Areas Hackers Scan For When Choosing Their Next Victim
Ben Bruno
L123
L123
Btyy121
How To Do BYOD Right
How To Do BYOD Right
RapidScale
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business
Strategic Information Management Through Data Classification
Strategic Information Management Through Data Classification
Booz Allen Hamilton

More Related Content

Viewers also liked (6)

The Future Tech Workforce is Her
The Future Tech Workforce is Her
ISACA
Nombres de dominio de internet
Joha Paguay
CompTIA Perks
CompTIA Perks
CompTIA
Office365 education transformation collaboration using office 365
Office365 education transformation collaboration using office 365
Sachin. Jung
Safe Tech. 亠仆亳 舒仍亠仄弍亠亞: "仆亠仆亠-弍舒仆从亳仆亞. 舒从 亟亠仍舒 舒弍仂 从仍亳亠仆舒 弍亠亰...
Safe Tech. 亠仆亳 舒仍亠仄弍亠亞: "仆亠仆亠-弍舒仆从亳仆亞. 舒从 亟亠仍舒 舒弍仂 从仍亳亠仆舒 弍亠亰...
Expolink
Useful Video Conferencing Tools
Useful Video Conferencing Tools
Nupur Singh
The Future Tech Workforce is Her
The Future Tech Workforce is Her
ISACA
Nombres de dominio de internet
Joha Paguay
CompTIA Perks
CompTIA Perks
CompTIA
Office365 education transformation collaboration using office 365
Office365 education transformation collaboration using office 365
Sachin. Jung
Safe Tech. 亠仆亳 舒仍亠仄弍亠亞: "仆亠仆亠-弍舒仆从亳仆亞. 舒从 亟亠仍舒 舒弍仂 从仍亳亠仆舒 弍亠亰...
Safe Tech. 亠仆亳 舒仍亠仄弍亠亞: "仆亠仆亠-弍舒仆从亳仆亞. 舒从 亟亠仍舒 舒弍仂 从仍亳亠仆舒 弍亠亰...
Expolink
Useful Video Conferencing Tools
Useful Video Conferencing Tools
Nupur Singh

Similar to COBIT 5 Infographic: Extracting Value From Information Chaos (20)

Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
UL Transaction Security
Assessing Your security
Assessing Your security
Legal Services National Technology Assistance Project (LSNTAP)
Data, data slides
Data, data slides
MAGNUS1_MILLIONS
Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15
James Fisher
Term assignment
Term assignment
Jenny Shimbashi
Byod final (2)
Byod final (2)
BrendaGraycon
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
Fuji Xerox Asia Pacific
08 pdf show-239
08 pdf show-239
#TheFraudTube
Corporate Data Goes Mobile
Corporate Data Goes Mobile
NetApp
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
Net at Work
BYOD
BYOD
Neeraj Muduli
Vulnerability Areas Hackers Scan For When Choosing Their Next Victim
Vulnerability Areas Hackers Scan For When Choosing Their Next Victim
Ben Bruno
L123
L123
Btyy121
How To Do BYOD Right
How To Do BYOD Right
RapidScale
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business
Strategic Information Management Through Data Classification
Strategic Information Management Through Data Classification
Booz Allen Hamilton
Leveraging byod
Leveraging byod
ManageEngine
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
Lou Milrad
IT Consumerization iPading the Enterprise or BYO Malware?
IT Consumerization iPading the Enterprise or BYO Malware?
Barry Caplin
How secure is your company's information?
How secure is your company's information?
eLeaP
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
UL Transaction Security
Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15
James Fisher
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
Fuji Xerox Asia Pacific
Corporate Data Goes Mobile
Corporate Data Goes Mobile
NetApp
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
Net at Work
Vulnerability Areas Hackers Scan For When Choosing Their Next Victim
Vulnerability Areas Hackers Scan For When Choosing Their Next Victim
Ben Bruno
How To Do BYOD Right
How To Do BYOD Right
RapidScale
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business
Strategic Information Management Through Data Classification
Strategic Information Management Through Data Classification
Booz Allen Hamilton
Leveraging byod
Leveraging byod
ManageEngine
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
10 Legal Challenges in Creating a BYOD Policy - Lou Milrad
Lou Milrad
IT Consumerization iPading the Enterprise or BYO Malware?
IT Consumerization iPading the Enterprise or BYO Malware?
Barry Caplin
How secure is your company's information?
How secure is your company's information?
eLeaP
Ad

Recently uploaded (20)

cost of capital under invetment for MBAall
cost of capital under invetment for MBAall
NARESH GUDURU
Pendant Lights That Reflect Your Style and Transform Your Living Space
Pendant Lights That Reflect Your Style and Transform Your Living Space
neslightingofficial
Power of the Many Masterclasses - 2nd draft .pptx
Power of the Many Masterclasses - 2nd draft .pptx
AlexBausch2
The Key Cultural Role of Punes Shivsrushti
The Key Cultural Role of Punes Shivsrushti
kapoorgita1991
Rushi Manche | Blockchain Tech Company Co-Founder
Rushi Manche | Blockchain Tech Company Co-Founder
Rushi Manche
BMGI India Addressing Strategic, Innovative, and Operational Problems at Core...
BMGI India Addressing Strategic, Innovative, and Operational Problems at Core...
Naresh Raisinghani
AX to Dynamics 365 Finance and Operations in USA.pdf
AX to Dynamics 365 Finance and Operations in USA.pdf
Trident information system
IT Companies in Magarpatta: A Thriving Hub of Technology and Innovation
IT Companies in Magarpatta: A Thriving Hub of Technology and Innovation
prernarathi90
Company Profile [Popular Group of Industries]
Company Profile [Popular Group of Industries]
irtizashirazi
International Business, 4th Edition- Alan M. Rugman.pdf
International Business, 4th Edition- Alan M. Rugman.pdf
GamingwithUBAID
S4F02 Col11 Management Accounting in SAP S/4HANA for SAP ERP CO Professionals
S4F02 Col11 Management Accounting in SAP S/4HANA for SAP ERP CO Professionals
Libreria ERP
smidmart industrial Automation Ones Stop Solution
smidmart industrial Automation Ones Stop Solution
smidmart
Enhancing Customer Engagement in Direct Selling Through AI Segmentation
Enhancing Customer Engagement in Direct Selling Through AI Segmentation
Epixel MLM Software
SACRS_Spring Mag 2025 Graceada Article.pdf
SACRS_Spring Mag 2025 Graceada Article.pdf
matthieu81
Indias Leading Mining Fleet Management Companies Revolutionizing Mining
Indias Leading Mining Fleet Management Companies Revolutionizing Mining
Naaraayani Minerals Pvt.Ltd
Shivsrushti - A Living Chronicle of Maharashtras History
Shivsrushti - A Living Chronicle of Maharashtras History
Raj Kumble
Book - Behavioral finance and wealth management(1).pdf
Book - Behavioral finance and wealth management(1).pdf
GamingwithUBAID
Webinar: Why Odoo is a game-changer for Service Companies
Webinar: Why Odoo is a game-changer for Service Companies
dear digital
Chapter 1 Introduction to Accountin1.6 plusone class first chapter (1) (1).pptx
Chapter 1 Introduction to Accountin1.6 plusone class first chapter (1) (1).pptx
dilshap23
Ian McAllister - Respected Photographer And Writer
Ian McAllister - Respected Photographer And Writer
Ian McAllister
cost of capital under invetment for MBAall
cost of capital under invetment for MBAall
NARESH GUDURU
Pendant Lights That Reflect Your Style and Transform Your Living Space
Pendant Lights That Reflect Your Style and Transform Your Living Space
neslightingofficial
Power of the Many Masterclasses - 2nd draft .pptx
Power of the Many Masterclasses - 2nd draft .pptx
AlexBausch2
The Key Cultural Role of Punes Shivsrushti
The Key Cultural Role of Punes Shivsrushti
kapoorgita1991
Rushi Manche | Blockchain Tech Company Co-Founder
Rushi Manche | Blockchain Tech Company Co-Founder
Rushi Manche
BMGI India Addressing Strategic, Innovative, and Operational Problems at Core...
BMGI India Addressing Strategic, Innovative, and Operational Problems at Core...
Naresh Raisinghani
AX to Dynamics 365 Finance and Operations in USA.pdf
AX to Dynamics 365 Finance and Operations in USA.pdf
Trident information system
IT Companies in Magarpatta: A Thriving Hub of Technology and Innovation
IT Companies in Magarpatta: A Thriving Hub of Technology and Innovation
prernarathi90
Company Profile [Popular Group of Industries]
Company Profile [Popular Group of Industries]
irtizashirazi
International Business, 4th Edition- Alan M. Rugman.pdf
International Business, 4th Edition- Alan M. Rugman.pdf
GamingwithUBAID
S4F02 Col11 Management Accounting in SAP S/4HANA for SAP ERP CO Professionals
S4F02 Col11 Management Accounting in SAP S/4HANA for SAP ERP CO Professionals
Libreria ERP
smidmart industrial Automation Ones Stop Solution
smidmart industrial Automation Ones Stop Solution
smidmart
Enhancing Customer Engagement in Direct Selling Through AI Segmentation
Enhancing Customer Engagement in Direct Selling Through AI Segmentation
Epixel MLM Software
SACRS_Spring Mag 2025 Graceada Article.pdf
SACRS_Spring Mag 2025 Graceada Article.pdf
matthieu81
Indias Leading Mining Fleet Management Companies Revolutionizing Mining
Indias Leading Mining Fleet Management Companies Revolutionizing Mining
Naaraayani Minerals Pvt.Ltd
Shivsrushti - A Living Chronicle of Maharashtras History
Shivsrushti - A Living Chronicle of Maharashtras History
Raj Kumble
Book - Behavioral finance and wealth management(1).pdf
Book - Behavioral finance and wealth management(1).pdf
GamingwithUBAID
Webinar: Why Odoo is a game-changer for Service Companies
Webinar: Why Odoo is a game-changer for Service Companies
dear digital
Chapter 1 Introduction to Accountin1.6 plusone class first chapter (1) (1).pptx
Chapter 1 Introduction to Accountin1.6 plusone class first chapter (1) (1).pptx
dilshap23
Ian McAllister - Respected Photographer And Writer
Ian McAllister - Respected Photographer And Writer
Ian McAllister
Ad

COBIT 5 Infographic: Extracting Value From Information Chaos

  • 1. EXTRACTING VALUE FROM INFORMATION CHAOS WHY GOOD GOVERNANCE MAKES GOOD SENSE BYOD [BRING YOUR OWN DEVICE] 6 OUT OF 10 EMPLOYEES AGES 18-35 USE A PERSONAL DEVICE FOR WORK SECURITY BREACHES 75M CYBERCRIME COSTS US $1 TRILLION PER YEAR 24B MALWARE SAMPLES in 2012 CONNECTED DEVICES by 2020 DATA PROLIFERATION THE AVERAGE CORPORATE WORKER SENDS & RECEIVES 112 SOCIAL MEDIA RISK EMAILS PER DAY PRIVACY REGULATIONS 2 3 COMPANIES are at RISK from SOCIAL MEDIA PASS **** 1 DOWNTIME WORKER RECEIVES $380B 65 3 AVERAGE COST TERABYTES of $5,000 COUNTRIES HAVE THEIR OWN DATA PROTECTION LAWS INFORMATION PER YEAR A MINUTE FOR DOWNTIME INCIDENTS COST OF DISASTERS in 2011 9.6 MILLION PETABYTES: business-related information processed by the worlds computer servers per year BUSINESS GOVERNANCE AND MANAGEMENT OF ENTERPRISE IT Download a complimentary copy of COBIT 5 today or learn more at www.isaca.org/cobit SOURCES http://www.isaca.org/About-ISACA/Press-room/News-Releases/2011/Pages/ISACA-Survey-Bring-Your-Own-Device-Trend-Heightens-Online-Holiday-Shopping-Risk.aspx http://www.gsma.com/articles/gsma-announces-the-business-impact-of-connected-devices-could-be-worth-us-4-5-trillion-in-2020/22536 http://blogs.mcafee.com/mcafee-labs/mcafee-q4-threats-report-shows-malware-surpassed-75-million-samples-in-2011 http://www.radicati.com/?p=6904 http://ucsdnews.ucsd.edu/newsrel/general/04-05BusinessInformation.asp http://www.informationweek.com/thebrainyard/news/community_management_development/231602379 http://www.un.org/en/development/desa/news/ecosoc/cybersecurity-demands-global-approach.html http://www.mofo.com/privacy--data-security-services/ http://www.time.com/time/world/article/0,8599,2108354,00.html http://www.eweek.com/c/a/IT-Infrastructure/Unplanned-IT-Downtime-Can-Cost-5K-Per-Minute-Report-549007/