SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
For more insight, download the executive summary.
To stay up to date on all of IDG’s finding important for
tech marketers, visit www.idg.com/tools-for-marketers/research.
Source: 2021 IDG Security Priorities Study
Asnapshotofhow
IT security leadersare
prioritizingprojectsand
planninginvestments
inthenext 12 months
Security Priorities
ALookAhead
21%
of security roles
report into the
Board of Directors
Upfrom12%
in2020
Physical security has been added
to the list of responsibilities
among IT security leaders:
Addedinthe
past 3 years
Expecttoaddinthe
next 12 months
No, and do not
expectitto
65% 11% 24%
67%
of companies have
a CISO, CSO, or
Top Security Executive
Upfrom61%
in2020
SMB
50%
Enterprise
84%
SecurityLeadersExecutingTheseProjects
Best practices
(49%)
Compliance/
regulations or
mandates (49%)
Evolving risks
posed by changing
workforce or
business
dynamics (41%)
Addressing
risks that result
from digital
transformation
(38%)
Responding to a
security incident/
breach (35%)
TopFactors
Determining
Security
Spending
Shift
inSecurity
Budgets
Increase
44%
Remain
thesame
54%
Decrease
2%
$123M
ENTERPRISE
$11M
SMB
AverageAnnual
SecurityBudget
UpcomingBudgetPlanstoCombatRisks
ThisYear’s
TopSecurity
Priorities
#1 #2 #3 #4 #5
Be appropriately
prepared to
respond to a
security incident
Improve the
protection of
confidential and
sensitive data
Improve security
awareness among
end users though
training
Upgrade IT and
data security to
boost corporate
resiliency
Reduce
complexity in
IT security
infrastructure
of organizations say
they have added at
least one security tool
in the past 12 months
90% ZeroTrusttechnologies(38%)
SOAR(SecurityOrchestration,AutomationandResponse)(37%)
SASE(SecureAccessServiceEdge)(35%)
Deceptiontechnology(35%)
XDR(ExtendedDetectionandResponse)(34%)
SecurityToolsontheRadarforOrganizations
46%havethesetoolsinuse,upfrom24%in2019
HowareOrganizationsPreppingtoPreventCyberattacks?
of organizations are aware
of what caused their security
incidents in the past year
91%
Enterprise
94%
SMB
89%
Upfrom87%
in2020
38%
rated thevulnerabilities
intheirOT environmentas
agraveorsignificantrisk
Enterprise–21%
SMB–47%
Employeesfallingvictimtophishingattacks
&othernon-malicioususererrors
Unpatchedsoftware
vulnerabilities
Securityvulnerabilitiesat3rdparty
organizationsorindividuals
Misconfigurationofservicesorsystemson
oroffpremises
Unexpectedbusinessriskswhichexposed
avulnerability(pandemic-related,workforce
changes,etc.)
TopCauses
ofSecurityIncidents
#1
#2
#3
#4
#5
average time
passed before
a security event
was detected
5WEEKS
CurrentSecurityIncidents&Vulnerabilities

Mais conteúdo relacionado

Mais procurados

Exploring the Tech Specific Purchase Process
Exploring the Tech Specific Purchase ProcessExploring the Tech Specific Purchase Process
Exploring the Tech Specific Purchase ProcessIDG
 
State of the CIO 2018 Infographic
State of the CIO 2018 InfographicState of the CIO 2018 Infographic
State of the CIO 2018 InfographicIDG
 
Digital Business 2018
Digital Business 2018Digital Business 2018
Digital Business 2018IDG
 
Understanding the Data & Analytics Specific Purchase Process [Infographic]
Understanding the Data & Analytics Specific Purchase Process [Infographic]Understanding the Data & Analytics Specific Purchase Process [Infographic]
Understanding the Data & Analytics Specific Purchase Process [Infographic]IDG
 
CIO COVID-19 Impact Survey, Infographic
CIO COVID-19 Impact Survey, InfographicCIO COVID-19 Impact Survey, Infographic
CIO COVID-19 Impact Survey, InfographicIDG
 
2018 State of the Network
2018 State of the Network2018 State of the Network
2018 State of the NetworkIDG
 
State of the CIO 2018
State of the CIO 2018State of the CIO 2018
State of the CIO 2018IDG
 
2018 IDG Customer Engagement Study
2018 IDG Customer Engagement Study2018 IDG Customer Engagement Study
2018 IDG Customer Engagement StudyIDG
 
Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides IDG
 
CIO Tech Poll: Tech Priorities 2019
CIO Tech Poll: Tech Priorities 2019CIO Tech Poll: Tech Priorities 2019
CIO Tech Poll: Tech Priorities 2019IDG
 
Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]IDG
 
2020 State of the CIO Research
2020 State of the CIO Research2020 State of the CIO Research
2020 State of the CIO ResearchIDG
 
CIO Tech Poll: Tech Priorities 2018
CIO Tech Poll: Tech Priorities 2018CIO Tech Poll: Tech Priorities 2018
CIO Tech Poll: Tech Priorities 2018IDG
 
CIO COVID Research Infographic
CIO COVID Research InfographicCIO COVID Research Infographic
CIO COVID Research InfographicIDG
 
IDG 2019 Digital Business infographic
IDG 2019 Digital Business infographicIDG 2019 Digital Business infographic
IDG 2019 Digital Business infographicIDG
 
CIO CV-19 Impact Study
CIO CV-19 Impact StudyCIO CV-19 Impact Study
CIO CV-19 Impact StudyIDG
 
2018 Security Priorities
2018 Security Priorities 2018 Security Priorities
2018 Security Priorities IDG
 
2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of CybercrimeIDG
 
2017 Role & Influence of the Technology Decision-Maker
2017 Role & Influence of the Technology Decision-Maker2017 Role & Influence of the Technology Decision-Maker
2017 Role & Influence of the Technology Decision-MakerIDG
 
Foundry Digital Business Research 2021
Foundry Digital Business Research 2021Foundry Digital Business Research 2021
Foundry Digital Business Research 2021IDG
 

Mais procurados (20)

Exploring the Tech Specific Purchase Process
Exploring the Tech Specific Purchase ProcessExploring the Tech Specific Purchase Process
Exploring the Tech Specific Purchase Process
 
State of the CIO 2018 Infographic
State of the CIO 2018 InfographicState of the CIO 2018 Infographic
State of the CIO 2018 Infographic
 
Digital Business 2018
Digital Business 2018Digital Business 2018
Digital Business 2018
 
Understanding the Data & Analytics Specific Purchase Process [Infographic]
Understanding the Data & Analytics Specific Purchase Process [Infographic]Understanding the Data & Analytics Specific Purchase Process [Infographic]
Understanding the Data & Analytics Specific Purchase Process [Infographic]
 
CIO COVID-19 Impact Survey, Infographic
CIO COVID-19 Impact Survey, InfographicCIO COVID-19 Impact Survey, Infographic
CIO COVID-19 Impact Survey, Infographic
 
2018 State of the Network
2018 State of the Network2018 State of the Network
2018 State of the Network
 
State of the CIO 2018
State of the CIO 2018State of the CIO 2018
State of the CIO 2018
 
2018 IDG Customer Engagement Study
2018 IDG Customer Engagement Study2018 IDG Customer Engagement Study
2018 IDG Customer Engagement Study
 
Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides
 
CIO Tech Poll: Tech Priorities 2019
CIO Tech Poll: Tech Priorities 2019CIO Tech Poll: Tech Priorities 2019
CIO Tech Poll: Tech Priorities 2019
 
Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]
 
2020 State of the CIO Research
2020 State of the CIO Research2020 State of the CIO Research
2020 State of the CIO Research
 
CIO Tech Poll: Tech Priorities 2018
CIO Tech Poll: Tech Priorities 2018CIO Tech Poll: Tech Priorities 2018
CIO Tech Poll: Tech Priorities 2018
 
CIO COVID Research Infographic
CIO COVID Research InfographicCIO COVID Research Infographic
CIO COVID Research Infographic
 
IDG 2019 Digital Business infographic
IDG 2019 Digital Business infographicIDG 2019 Digital Business infographic
IDG 2019 Digital Business infographic
 
CIO CV-19 Impact Study
CIO CV-19 Impact StudyCIO CV-19 Impact Study
CIO CV-19 Impact Study
 
2018 Security Priorities
2018 Security Priorities 2018 Security Priorities
2018 Security Priorities
 
2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of Cybercrime
 
2017 Role & Influence of the Technology Decision-Maker
2017 Role & Influence of the Technology Decision-Maker2017 Role & Influence of the Technology Decision-Maker
2017 Role & Influence of the Technology Decision-Maker
 
Foundry Digital Business Research 2021
Foundry Digital Business Research 2021Foundry Digital Business Research 2021
Foundry Digital Business Research 2021
 

Semelhante a Final 2021 security_priorities_infographic (1)

R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22IDG
 
Security Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdfSecurity Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdfIDG
 
Cyber Security: Take a Security Leap Forward
Cyber Security: Take a Security Leap ForwardCyber Security: Take a Security Leap Forward
Cyber Security: Take a Security Leap Forwardaccenture
 
State of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfState of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfIDG
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxState of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxIDG
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfIDG
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...SolarWinds
 
Stateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slidesStateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slidesIDG
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsArgyle Executive Forum
 
Finding a Strategic Voice - IBM CISO Study
Finding a Strategic Voice - IBM CISO StudyFinding a Strategic Voice - IBM CISO Study
Finding a Strategic Voice - IBM CISO StudyIBMGovernmentCA
 
Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides IDG
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissEnterprise Mobile
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarLumension
 
IT Leaders Are Increasingly Afraid of Competitive Displacement.pdf
IT Leaders Are Increasingly Afraid of Competitive Displacement.pdfIT Leaders Are Increasingly Afraid of Competitive Displacement.pdf
IT Leaders Are Increasingly Afraid of Competitive Displacement.pdfEnterprise Insider
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Needsimplyme12345
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomIBM Security
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfIDG
 

Semelhante a Final 2021 security_priorities_infographic (1) (20)

R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22
 
Security Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdfSecurity Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdf
 
EMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-Security
 
CIO: 2022 Priorities
CIO: 2022 PrioritiesCIO: 2022 Priorities
CIO: 2022 Priorities
 
Cyber Security: Take a Security Leap Forward
Cyber Security: Take a Security Leap ForwardCyber Security: Take a Security Leap Forward
Cyber Security: Take a Security Leap Forward
 
State of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfState of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdf
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxState of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
Stateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slidesStateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slides
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
 
Finding a Strategic Voice - IBM CISO Study
Finding a Strategic Voice - IBM CISO StudyFinding a Strategic Voice - IBM CISO Study
Finding a Strategic Voice - IBM CISO Study
 
Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint Webinar
 
IT Leaders Are Increasingly Afraid of Competitive Displacement.pdf
IT Leaders Are Increasingly Afraid of Competitive Displacement.pdfIT Leaders Are Increasingly Afraid of Competitive Displacement.pdf
IT Leaders Are Increasingly Afraid of Competitive Displacement.pdf
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 

Mais de IDG

Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfIDG
 
Role and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdfRole and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdfIDG
 
2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdfIDG
 
CIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdfCIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdfIDG
 
R_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdfR_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdfIDG
 
Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022IDG
 
R-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdfR-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdfIDG
 
Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022IDG
 
R_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdfR_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdfIDG
 
Foundry Future of Work Study 2022
Foundry Future of Work Study 2022Foundry Future of Work Study 2022
Foundry Future of Work Study 2022IDG
 
Data & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdfData & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdfIDG
 
NEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfNEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfIDG
 
R if data_analytics_03.08.22
R if data_analytics_03.08.22R if data_analytics_03.08.22
R if data_analytics_03.08.22IDG
 
Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020IDG
 
Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021IDG
 
Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Role & Influence of the Technology Decision-Maker Research 2022Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Role & Influence of the Technology Decision-Maker Research 2022IDG
 
Foundry Customer Engagement Study 2021
Foundry Customer Engagement Study 2021Foundry Customer Engagement Study 2021
Foundry Customer Engagement Study 2021IDG
 
2021 security priorities infographic
2021 security priorities infographic2021 security priorities infographic
2021 security priorities infographicIDG
 

Mais de IDG (18)

Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
Role and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdfRole and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdf
 
2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf
 
CIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdfCIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdf
 
R_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdfR_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdf
 
Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022
 
R-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdfR-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdf
 
Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022
 
R_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdfR_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdf
 
Foundry Future of Work Study 2022
Foundry Future of Work Study 2022Foundry Future of Work Study 2022
Foundry Future of Work Study 2022
 
Data & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdfData & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdf
 
NEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfNEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdf
 
R if data_analytics_03.08.22
R if data_analytics_03.08.22R if data_analytics_03.08.22
R if data_analytics_03.08.22
 
Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020
 
Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021
 
Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Role & Influence of the Technology Decision-Maker Research 2022Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Role & Influence of the Technology Decision-Maker Research 2022
 
Foundry Customer Engagement Study 2021
Foundry Customer Engagement Study 2021Foundry Customer Engagement Study 2021
Foundry Customer Engagement Study 2021
 
2021 security priorities infographic
2021 security priorities infographic2021 security priorities infographic
2021 security priorities infographic
 

Último

Unraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptxUnraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptxelizabethella096
 
Cost-effective tactics for navigating CPC surges
Cost-effective tactics for navigating CPC surgesCost-effective tactics for navigating CPC surges
Cost-effective tactics for navigating CPC surgesPushON Ltd
 
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15SearchNorwich
 
BDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Situation Analysis | Management Company.
Situation Analysis | Management Company.Situation Analysis | Management Company.
Situation Analysis | Management Company.DanielaQuiroz63
 
How to utilize calculated properties in your HubSpot setups
How to utilize calculated properties in your HubSpot setupsHow to utilize calculated properties in your HubSpot setups
How to utilize calculated properties in your HubSpot setupsssuser4571da
 
Defining Marketing for the 21st Century,kotler
Defining Marketing for the 21st Century,kotlerDefining Marketing for the 21st Century,kotler
Defining Marketing for the 21st Century,kotlerAmirNasiruog
 
Call Us ➥9654467111▻Call Girls In Delhi NCR
Call Us ➥9654467111▻Call Girls In Delhi NCRCall Us ➥9654467111▻Call Girls In Delhi NCR
Call Us ➥9654467111▻Call Girls In Delhi NCRSapana Sha
 
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptx
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptxDigital-Marketing-Into-by-Zoraiz-Ahmad.pptx
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptxZACGaming
 
Kraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentationKraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentationtbatkhuu1
 
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
April 2024 - VBOUT Partners Meeting Group
April 2024 - VBOUT Partners Meeting GroupApril 2024 - VBOUT Partners Meeting Group
April 2024 - VBOUT Partners Meeting GroupVbout.com
 
Labour Day Celebrating Workers and Their Contributions.pptx
Labour Day Celebrating Workers and Their Contributions.pptxLabour Day Celebrating Workers and Their Contributions.pptx
Labour Day Celebrating Workers and Their Contributions.pptxelizabethella096
 
Brand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdfBrand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdftbatkhuu1
 
How to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail SuccessHow to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail SuccessAggregage
 

Último (20)

Foundation First - Why Your Website and Content Matters - David Pisarek
Foundation First - Why Your Website and Content Matters - David PisarekFoundation First - Why Your Website and Content Matters - David Pisarek
Foundation First - Why Your Website and Content Matters - David Pisarek
 
Unraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptxUnraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptx
 
Cost-effective tactics for navigating CPC surges
Cost-effective tactics for navigating CPC surgesCost-effective tactics for navigating CPC surges
Cost-effective tactics for navigating CPC surges
 
How to Create a Social Media Plan Like a Pro - Jordan Scheltgen
How to Create a Social Media Plan Like a Pro - Jordan ScheltgenHow to Create a Social Media Plan Like a Pro - Jordan Scheltgen
How to Create a Social Media Plan Like a Pro - Jordan Scheltgen
 
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
 
BDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 144 Noida Escorts >༒8448380779 Escort Service
 
Situation Analysis | Management Company.
Situation Analysis | Management Company.Situation Analysis | Management Company.
Situation Analysis | Management Company.
 
How to utilize calculated properties in your HubSpot setups
How to utilize calculated properties in your HubSpot setupsHow to utilize calculated properties in your HubSpot setups
How to utilize calculated properties in your HubSpot setups
 
Defining Marketing for the 21st Century,kotler
Defining Marketing for the 21st Century,kotlerDefining Marketing for the 21st Century,kotler
Defining Marketing for the 21st Century,kotler
 
Call Us ➥9654467111▻Call Girls In Delhi NCR
Call Us ➥9654467111▻Call Girls In Delhi NCRCall Us ➥9654467111▻Call Girls In Delhi NCR
Call Us ➥9654467111▻Call Girls In Delhi NCR
 
Digital Strategy Master Class - Andrew Rupert
Digital Strategy Master Class - Andrew RupertDigital Strategy Master Class - Andrew Rupert
Digital Strategy Master Class - Andrew Rupert
 
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptx
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptxDigital-Marketing-Into-by-Zoraiz-Ahmad.pptx
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptx
 
Kraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentationKraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentation
 
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
 
April 2024 - VBOUT Partners Meeting Group
April 2024 - VBOUT Partners Meeting GroupApril 2024 - VBOUT Partners Meeting Group
April 2024 - VBOUT Partners Meeting Group
 
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel LeminTurn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
 
Generative AI Master Class - Generative AI, Unleash Creative Opportunity - Pe...
Generative AI Master Class - Generative AI, Unleash Creative Opportunity - Pe...Generative AI Master Class - Generative AI, Unleash Creative Opportunity - Pe...
Generative AI Master Class - Generative AI, Unleash Creative Opportunity - Pe...
 
Labour Day Celebrating Workers and Their Contributions.pptx
Labour Day Celebrating Workers and Their Contributions.pptxLabour Day Celebrating Workers and Their Contributions.pptx
Labour Day Celebrating Workers and Their Contributions.pptx
 
Brand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdfBrand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdf
 
How to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail SuccessHow to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail Success
 

Final 2021 security_priorities_infographic (1)

  • 1. For more insight, download the executive summary. To stay up to date on all of IDG’s finding important for tech marketers, visit www.idg.com/tools-for-marketers/research. Source: 2021 IDG Security Priorities Study Asnapshotofhow IT security leadersare prioritizingprojectsand planninginvestments inthenext 12 months Security Priorities ALookAhead 21% of security roles report into the Board of Directors Upfrom12% in2020 Physical security has been added to the list of responsibilities among IT security leaders: Addedinthe past 3 years Expecttoaddinthe next 12 months No, and do not expectitto 65% 11% 24% 67% of companies have a CISO, CSO, or Top Security Executive Upfrom61% in2020 SMB 50% Enterprise 84% SecurityLeadersExecutingTheseProjects Best practices (49%) Compliance/ regulations or mandates (49%) Evolving risks posed by changing workforce or business dynamics (41%) Addressing risks that result from digital transformation (38%) Responding to a security incident/ breach (35%) TopFactors Determining Security Spending Shift inSecurity Budgets Increase 44% Remain thesame 54% Decrease 2% $123M ENTERPRISE $11M SMB AverageAnnual SecurityBudget UpcomingBudgetPlanstoCombatRisks ThisYear’s TopSecurity Priorities #1 #2 #3 #4 #5 Be appropriately prepared to respond to a security incident Improve the protection of confidential and sensitive data Improve security awareness among end users though training Upgrade IT and data security to boost corporate resiliency Reduce complexity in IT security infrastructure of organizations say they have added at least one security tool in the past 12 months 90% ZeroTrusttechnologies(38%) SOAR(SecurityOrchestration,AutomationandResponse)(37%) SASE(SecureAccessServiceEdge)(35%) Deceptiontechnology(35%) XDR(ExtendedDetectionandResponse)(34%) SecurityToolsontheRadarforOrganizations 46%havethesetoolsinuse,upfrom24%in2019 HowareOrganizationsPreppingtoPreventCyberattacks? of organizations are aware of what caused their security incidents in the past year 91% Enterprise 94% SMB 89% Upfrom87% in2020 38% rated thevulnerabilities intheirOT environmentas agraveorsignificantrisk Enterprise–21% SMB–47% Employeesfallingvictimtophishingattacks &othernon-malicioususererrors Unpatchedsoftware vulnerabilities Securityvulnerabilitiesat3rdparty organizationsorindividuals Misconfigurationofservicesorsystemson oroffpremises Unexpectedbusinessriskswhichexposed avulnerability(pandemic-related,workforce changes,etc.) TopCauses ofSecurityIncidents #1 #2 #3 #4 #5 average time passed before a security event was detected 5WEEKS CurrentSecurityIncidents&Vulnerabilities