

About CSI:
Computer Security Institute (CSI) is the leading membership organization and provider of education for the information security community. CSI serves the needs of security professionals worldwide through conferences, educational events, research and publications, blogs, podcasts and awareness tools.
CSI 2009 was held October 24-30 ,2009 in Washington,D.C .
CSI 2010 will be held October 25-29,2010 in Washington,D.C.
CSI Computer Crime and Security Survey 2009
This survey marks the 14th annual edition of the CSI Computer Crime and Security Survey, making it the longest-running project of its kind in the security industry.
Several new questions were added to the CSI survey this year, but the survey continues to describe what kinds of attacks respondents' organizations experienced and how much security incidents cost those organizations. The survey includes information about targeted attacks, incident response and the impacts of both malicious and non-malicious insiders. It contains details about respondents' security programs, including budgeting, policies implemented, tools used, satisfaction with security tools and budgets, degree of outsourcing, use of metrics and effects of compliance requirements.
Also new this year, the comprehensive edition of the survey compares CSI's findings to those of the Verizon Business RISK Team Data Breach Investigations Report, the Ponemon Institute's Cost of a Data Breach report and the Symantec Global Internet Threat Report.
Respondents reported big jumps in incidence of password sniffing, financial fraud, and malware infection.
One-third of respondents' organizations were fraudulently represented as the sender of a phishing message.
Average losses due to security incidents are down again this year (from $289,000 per respondent to $234,244 per respondent), though they are still above 2006 figures.
Twenty-five percent of respondents felt that over 60 percent of their financial losses were due to non-malicious actions by insiders.
Respondents were satisfied, though not overjoyed, with all security technologies.
Most respondents felt their investment in end-user security awareness training was inadequate, but most felt their investments in other components of their security program were adequate.
When asked what actions were taken following a security incident, 22 percent of respondents stated that they notified individuals whose personal information was breached and 17 percent stated that theyprovided new security services to users or customers.
When asked what security solutions ranked highest on their wishlists, many respondents named tools that would improve their visibility—better log management, security information and event management, security data visualization, security dashboards and the like.
Respondents generally said that regulatory compliance efforts have had a positive effect on their organization's security programs.
This year's survey results are based on the responses of 443 information security and information technology professionals in United States corporations, government agencies, financial institutions, educational institutions, medical institutions and other organizations. Their responses cover the security incidents they experienced and security measures they practiced from the period of July 2008 to June 2009.
 


