SlideShare a Scribd company logo
1 of 9
Download to read offline
Security Priorities Study 2023
Purpose and methodology
Source: Foundry Security Priorities Study, 2023
Survey goal
To gain a better understanding
of the various security projects
organizations are focused on
now and in the coming year. The
research also looks at the issues
that will demand the most time
and strategic thinking for IT
and security teams.
Total respondents: 790
Collection method: Online questionnaire
Number of questions: 35
Region
North America: 49%
EMEA: 18%
APAC: 33%
Average company size: 11,110 employees
IT Leadership: All survey respondents are
involved in IT and/or corporate/physical
security decisions.
Audience base: CIO, Computerworld, CSO,
InfoWorld and Network World site visitors, and
email invitations to audience base
Job titles
Top represented industries
36%
9%
22% 10%
18%
5%
IT/Security pro.
Exec. IT/security
Business
management
Other
2
4%
5%
5%
6%
7%
7%
9%
13%
25%
Telecommunications & Utilities
Services
Education
Retail, Wholesale and Distribution
Government/Nonprofit
Healthcare
Financial Services
Manufacturing
Technology
Mid-level IT
Security
management
3
Security incidents stem from user error & software vulnerabilities
Question: Of the data security incidents your organization experienced in the last year, were any caused by the following:
Source: Foundry Security Priorities Study, 2023
88%
are aware of what
caused their security
incidents in the past year
12%
13%
13%
13%
14%
16%
23%
25%
27%
31%
Malicious trusted user(s) (i.e., an intentional insider attack)
Software supply chain breaches
Stolen credentials
Zero-day vulnerability
Compromised active identities
Unanticipated/unexpected business risks that exposed a vulnerability
(business interruption, workforce model changes, etc.)
Misconfiguration of services or systems either on- or off-premises
Security vulnerabilities at third-party individuals or organizations
Unpatched software vulnerabilities
Non-malicious user error (i.e., fell victim to phishing or non-malicious
violations of security policy(s))
1 2 3 4 5
Be appropriately
prepared to respond
to a security incident
Improve the protection
of confidential and
sensitive data
Upgrade IT and data
security to boost
corporate resiliency
Improve security of
cloud data and systems
Improve/increase
security awareness
among end-users
through training
This year’s top five security priorities
Question: What are your organizations top security priorities for the coming year?
Source: Foundry Security Priorities Study, 2023 4
Top five challenges redirecting the time of security leaders
Question: What security-related challenges are most often forcing you to redirect your time and focus away from more strategic tasks?
Source: Foundry Security Priorities Study, 2023
1 2 3 4 5
Meeting governance
and compliance
regulations
Budgetary constraints/
demonstrating ROI
Employee awareness
and training issues
IT audit Unanticipated business
risks (pandemic,
business interruption,
workforce changes)
5
55%
43%
2%
Security budget expectations
Question: Do you expect your organization’s overall security budget to increase, decrease or remain the same in the next 12 months?
Source: Foundry Security Priorities Study, 2023
Increase
Decrease
Remain the same
6
1,000+ 46%
<1,000 63%
1,000+ 50%
<1,000 36%
1,000+ 4%
<1,000 1%
7
Complexity emerges around security investments
69% 52% 49%
agree that understanding which
security tools and solutions fit
best within our company is
becoming more complex
agree that their organization
is more likely to consider a
security solution that uses
Artificial Intelligence (AI)
agree that their responsibilities
include addressing information
security issues outside of my
country or region
Source: Foundry Security Priorities Study, 2023
Question: Please rate your level of agreement with the following statements:
2%
15%
21%
23%
23%
26%
32%
36%
44%
Other
Improving enterprise system visibility
Authentication
Data loss prevention
Incident Response
Real-time risk prediction
Automation – alert and triage
Malware Detection
Threat Detection
8
Leveraging AI in security technologies
Question: In which areas are you leveraging Artificial Intelligence (AI) in your security technologies?
Source: Foundry Security Priorities Study, 2023
67%
are leveraging
Artificial Intelligence
in their security
technologies
1,000+ 79%
<1,000 55%
9
Continue the conversation
● To get results from Foundry research when it happens,
or any other news, follow us on Twitter: @FoundryIDG
● Sign up to receive our monthly marketing newsletter
at www.FoundryCo.com/newsletters/
● Visit us on LinkedIn here: www.linkedin.com/company/foundryidg
Additional ways to stay on top of information from Foundry:
For more information on the research, please contact
your Foundry sales executive or contact us.
For more information on content marketing and lead nurture, explore our
resources on this site under marketing tools. We have additional primary
research, blogs and white papers to make you smarter about tech decision
makers, and targeted products and programs

More Related Content

Similar to Security Priorities Sample Slides 2023.pdf

International Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryInternational Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East Summary
CompTIA
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
nooralmousa
 
International Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryInternational Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India Summary
CompTIA
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 

Similar to Security Priorities Sample Slides 2023.pdf (20)

The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
2018 Security Priorities
2018 Security Priorities 2018 Security Priorities
2018 Security Priorities
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
IDG 2020 Security Priorities Research
IDG 2020 Security Priorities ResearchIDG 2020 Security Priorities Research
IDG 2020 Security Priorities Research
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
 
International Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryInternational Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East Summary
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee Study
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
International Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryInternational Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India Summary
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 

More from IDG

State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
IDG
 

More from IDG (20)

Role and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdfRole and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdf
 
2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
 
CIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdfCIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdf
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxState of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
 
State of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfState of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdf
 
R_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdfR_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdf
 
Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022
 
R-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdfR-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdf
 
Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022
 
R_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdfR_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdf
 
Foundry Future of Work Study 2022
Foundry Future of Work Study 2022Foundry Future of Work Study 2022
Foundry Future of Work Study 2022
 
Data & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdfData & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdf
 
R if data_analytics_03.08.22
R if data_analytics_03.08.22R if data_analytics_03.08.22
R if data_analytics_03.08.22
 
Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020
 
Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021
 
Foundry Digital Business Research 2021
Foundry Digital Business Research 2021Foundry Digital Business Research 2021
Foundry Digital Business Research 2021
 
Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Role & Influence of the Technology Decision-Maker Research 2022Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Role & Influence of the Technology Decision-Maker Research 2022
 
Foundry Customer Engagement Study 2021
Foundry Customer Engagement Study 2021Foundry Customer Engagement Study 2021
Foundry Customer Engagement Study 2021
 
Stateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slidesStateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slides
 

Recently uploaded

INCOME TAXATION- CHAPTER 13-A ADDITIONAL CLAIMABLE COMPENSATION EXPENSE
INCOME TAXATION- CHAPTER 13-A ADDITIONAL CLAIMABLE COMPENSATION EXPENSEINCOME TAXATION- CHAPTER 13-A ADDITIONAL CLAIMABLE COMPENSATION EXPENSE
INCOME TAXATION- CHAPTER 13-A ADDITIONAL CLAIMABLE COMPENSATION EXPENSE
RicaAbellanosa
 
Mastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to SuccessMastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to Success
Abdulsamad Lukman
 
JUST CALL 9952100763 CALL GIRLS & ESCORT SERVICE AVAILABLE
JUST CALL 9952100763 CALL GIRLS & ESCORT SERVICE AVAILABLEJUST CALL 9952100763 CALL GIRLS & ESCORT SERVICE AVAILABLE
JUST CALL 9952100763 CALL GIRLS & ESCORT SERVICE AVAILABLE
myheartstone59
 
Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...
Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...
Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...
ahmedjiabur940
 
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (20)

Killer Packaging__Published in PrintAction
Killer Packaging__Published in PrintActionKiller Packaging__Published in PrintAction
Killer Packaging__Published in PrintAction
 
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night ServiceVIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
 
INCOME TAXATION- CHAPTER 13-A ADDITIONAL CLAIMABLE COMPENSATION EXPENSE
INCOME TAXATION- CHAPTER 13-A ADDITIONAL CLAIMABLE COMPENSATION EXPENSEINCOME TAXATION- CHAPTER 13-A ADDITIONAL CLAIMABLE COMPENSATION EXPENSE
INCOME TAXATION- CHAPTER 13-A ADDITIONAL CLAIMABLE COMPENSATION EXPENSE
 
HOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATION
HOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATIONHOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATION
HOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATION
 
Distribution Ad Platform_ The Role of Distribution Ad Network.pdf
Distribution Ad Platform_ The Role of  Distribution Ad Network.pdfDistribution Ad Platform_ The Role of  Distribution Ad Network.pdf
Distribution Ad Platform_ The Role of Distribution Ad Network.pdf
 
Instant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best PracticesInstant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best Practices
 
Global Trends in Market Reserch & Insights - Ray Poynter - May 2023.pdf
Global Trends in Market Reserch & Insights - Ray Poynter - May 2023.pdfGlobal Trends in Market Reserch & Insights - Ray Poynter - May 2023.pdf
Global Trends in Market Reserch & Insights - Ray Poynter - May 2023.pdf
 
HITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITY
HITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITYHITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITY
HITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITY
 
Mastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to SuccessMastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to Success
 
Taprank - Boost your Google reviews with personalized NFC cards
Taprank - Boost your Google reviews with personalized NFC cardsTaprank - Boost your Google reviews with personalized NFC cards
Taprank - Boost your Google reviews with personalized NFC cards
 
JUST CALL 9952100763 CALL GIRLS & ESCORT SERVICE AVAILABLE
JUST CALL 9952100763 CALL GIRLS & ESCORT SERVICE AVAILABLEJUST CALL 9952100763 CALL GIRLS & ESCORT SERVICE AVAILABLE
JUST CALL 9952100763 CALL GIRLS & ESCORT SERVICE AVAILABLE
 
Elevate Your Brand with Billion Broadcaster's Horizontal Lift Advertising
Elevate Your Brand with Billion Broadcaster's Horizontal Lift AdvertisingElevate Your Brand with Billion Broadcaster's Horizontal Lift Advertising
Elevate Your Brand with Billion Broadcaster's Horizontal Lift Advertising
 
Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...
Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...
Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...
 
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
 
Personal Brand Exploration Selk_Ingrid_DMBS_PB1_2024-01.pptx
Personal Brand Exploration Selk_Ingrid_DMBS_PB1_2024-01.pptxPersonal Brand Exploration Selk_Ingrid_DMBS_PB1_2024-01.pptx
Personal Brand Exploration Selk_Ingrid_DMBS_PB1_2024-01.pptx
 
Social Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh BendaySocial Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh Benday
 
Alpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptxAlpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptx
 
[Expert Panel] New Google Shopping Ads Strategies Uncovered
[Expert Panel] New Google Shopping Ads Strategies Uncovered[Expert Panel] New Google Shopping Ads Strategies Uncovered
[Expert Panel] New Google Shopping Ads Strategies Uncovered
 
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdfMicro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
 
Iranian Strikes on Israel Assessing the Impact and Implications.pptx
Iranian Strikes on Israel  Assessing the Impact and Implications.pptxIranian Strikes on Israel  Assessing the Impact and Implications.pptx
Iranian Strikes on Israel Assessing the Impact and Implications.pptx
 

Security Priorities Sample Slides 2023.pdf

  • 2. Purpose and methodology Source: Foundry Security Priorities Study, 2023 Survey goal To gain a better understanding of the various security projects organizations are focused on now and in the coming year. The research also looks at the issues that will demand the most time and strategic thinking for IT and security teams. Total respondents: 790 Collection method: Online questionnaire Number of questions: 35 Region North America: 49% EMEA: 18% APAC: 33% Average company size: 11,110 employees IT Leadership: All survey respondents are involved in IT and/or corporate/physical security decisions. Audience base: CIO, Computerworld, CSO, InfoWorld and Network World site visitors, and email invitations to audience base Job titles Top represented industries 36% 9% 22% 10% 18% 5% IT/Security pro. Exec. IT/security Business management Other 2 4% 5% 5% 6% 7% 7% 9% 13% 25% Telecommunications & Utilities Services Education Retail, Wholesale and Distribution Government/Nonprofit Healthcare Financial Services Manufacturing Technology Mid-level IT Security management
  • 3. 3 Security incidents stem from user error & software vulnerabilities Question: Of the data security incidents your organization experienced in the last year, were any caused by the following: Source: Foundry Security Priorities Study, 2023 88% are aware of what caused their security incidents in the past year 12% 13% 13% 13% 14% 16% 23% 25% 27% 31% Malicious trusted user(s) (i.e., an intentional insider attack) Software supply chain breaches Stolen credentials Zero-day vulnerability Compromised active identities Unanticipated/unexpected business risks that exposed a vulnerability (business interruption, workforce model changes, etc.) Misconfiguration of services or systems either on- or off-premises Security vulnerabilities at third-party individuals or organizations Unpatched software vulnerabilities Non-malicious user error (i.e., fell victim to phishing or non-malicious violations of security policy(s))
  • 4. 1 2 3 4 5 Be appropriately prepared to respond to a security incident Improve the protection of confidential and sensitive data Upgrade IT and data security to boost corporate resiliency Improve security of cloud data and systems Improve/increase security awareness among end-users through training This year’s top five security priorities Question: What are your organizations top security priorities for the coming year? Source: Foundry Security Priorities Study, 2023 4
  • 5. Top five challenges redirecting the time of security leaders Question: What security-related challenges are most often forcing you to redirect your time and focus away from more strategic tasks? Source: Foundry Security Priorities Study, 2023 1 2 3 4 5 Meeting governance and compliance regulations Budgetary constraints/ demonstrating ROI Employee awareness and training issues IT audit Unanticipated business risks (pandemic, business interruption, workforce changes) 5
  • 6. 55% 43% 2% Security budget expectations Question: Do you expect your organization’s overall security budget to increase, decrease or remain the same in the next 12 months? Source: Foundry Security Priorities Study, 2023 Increase Decrease Remain the same 6 1,000+ 46% <1,000 63% 1,000+ 50% <1,000 36% 1,000+ 4% <1,000 1%
  • 7. 7 Complexity emerges around security investments 69% 52% 49% agree that understanding which security tools and solutions fit best within our company is becoming more complex agree that their organization is more likely to consider a security solution that uses Artificial Intelligence (AI) agree that their responsibilities include addressing information security issues outside of my country or region Source: Foundry Security Priorities Study, 2023 Question: Please rate your level of agreement with the following statements:
  • 8. 2% 15% 21% 23% 23% 26% 32% 36% 44% Other Improving enterprise system visibility Authentication Data loss prevention Incident Response Real-time risk prediction Automation – alert and triage Malware Detection Threat Detection 8 Leveraging AI in security technologies Question: In which areas are you leveraging Artificial Intelligence (AI) in your security technologies? Source: Foundry Security Priorities Study, 2023 67% are leveraging Artificial Intelligence in their security technologies 1,000+ 79% <1,000 55%
  • 9. 9 Continue the conversation ● To get results from Foundry research when it happens, or any other news, follow us on Twitter: @FoundryIDG ● Sign up to receive our monthly marketing newsletter at www.FoundryCo.com/newsletters/ ● Visit us on LinkedIn here: www.linkedin.com/company/foundryidg Additional ways to stay on top of information from Foundry: For more information on the research, please contact your Foundry sales executive or contact us. For more information on content marketing and lead nurture, explore our resources on this site under marketing tools. We have additional primary research, blogs and white papers to make you smarter about tech decision makers, and targeted products and programs