SlideShare a Scribd company logo
Most are focusing on governance and compliance standards, new tool/initiative
implementation, and tool/initiative evaluation this quarter
While most consider their cybersecurity budget to be adequate, almost a quarter
consider their budget to be stretched
Cybersecurity breaches were common in Q1, with around a third reporting
service disruption due to software supply chain attacks
Over half report an increase in cybersecurity incidents in Q1 compared to the
previous quarter
Endpoint security is the most common focus for implementation/enhancement
One-Minute Insights:
The most common challenge is integrating new tools with legacy technology
Most are satisfied with their current cybersecurity posture and feel confident about
achieving their cybersecurity goals in Q1
Data collection: Feb 14 - Mar 20, 2022 Respondents: 361 tech decision makers whose
role relates to cybersecurity
Cybersecurity is ensuring business continuity by protecting their organization’s digital
assets, including sensitive data, from attack or employee negligence.
Amid rising global tensions at a time when nations are deploying IT armies and enacting
cybersecurity mandates, what is the state of cybersecurity in Q1, 2022?
One-Minute Insights on timely topics are available to Gartner Peer Insights members.
Sign up for access to over 100 more, and new insights each week.
Cybersecurity
Quarterly Benchmarks:
Q1, 2022
Most cybersecurity projects are focused on ensuring
governance and compliance standards in Q1
What cybersecurity projects are you
focusing on this quarter?
Do you feel your cybersecurity budget is
adequate to make progress on your
cybersecurity projects this quarter?
The top cybersecurity projects decision makers are focusing on this quarter are related
to governance and compliance standards (56%), implementing new tools or initiatives
(55%), and evaluating current cybersecurity tools or initiatives (52%).
Regarding their cybersecurity for Q1, 55% feel that their cybersecurity budget is
adequate to achieve those goals.
That leaves 44% feeling that their cybersecurity budget is not adequate. 22% feel their
cybersecurity budget is stretched in Q1.
Ensuring governance and
compliance standards
Implementing new
tools/initiatives
Evaluating current cybersecurity
tools/initiatives
Enabling secure hybrid/flexible
work infrastructure
End-user cybersecurity
training/initiatives
55%
56%
52%
33%
28%
Selling cybersecurity to the business (i.e., convincing business stakeholders and the board
that cybersecurity is a business risk) 26%, Auditing network/assets for known vulnerabilities 25%,
Hiring for cybersecurity roles 24%, Talent management (e.g., upskilling or retaining current team) 24%,
Cultural overhaul (e.g., moving towards a DevSecOps culture) 22%, Researching/exploring emerging
cybersecurity technologies 16%, Addressing ongoing disruption caused by a breach 11%,
Migrating cybersecurity to the cloud 10%, Outsourcing cybersecurity 8%,
Bringing cybersecurity in-house 2%, None of these 0%, Other 0%
n=361
n=361
n=361
Though most are satisfied with the progress made on
their cybersecurity goals in the last quarter, almost a
quarter of decision makers consider their cybersecurity
budget to be stretched
Were you satisfied with the progress
made on your cybersecurity goals in
the last quarter?
feel satisfied with the progress
made on their cybersecurity
goals in the last quarter.
80%
Very
satisfied
Too early to tell
4%
Moderately dissatisfied
35%
7%
9%
45%
Neutral
Moderately
satisfied
0% Very dissatisfied
48%
7% 15% 22% 7%
1%
The budget
provides adequate
coverage
The budget
provides more than
adequate coverage
The budget is
slightly below
what’s required
The budget
is stretched
The budget is
inadequate to
achieve our goals
Not sure
Only 32% report not experiencing a cybersecurity
breach in Q1
Has your organization been affected
by a cybersecurity breach in any of
the following ways this quarter?
The most commonly reported cybersecurity breach in Q1 was malicious activity on the
network that did not affect service (34%).
Almost a third (32%) report that tools used by their organization had been victim to a
software supply chain attack, and they experienced service disruption as a result.
We’ve detected malicious activity
on our network but service has
been unaffected
34%
We use tools that have been
targeted in software supply chain
attacks and our service was
disrupted as a result
32%
No
32%
We use tools that
have been
targeted in
software supply
chain attacks but
we patched
before an issue
was detected
24%
We’ve experienced service
disruption due to malicious
activity on our network
23%
Prefer not
to disclose
9%
n=361
We’ve experienced a ransomware attack 8%, Not sure 2%
n=361
Has the frequency of
cybersecurity incidents at your
organization changed
compared to the last quarter?
of respondents report that
cybersecurity incidents
rose in Q1 compared to the
last quarter.
Over half (51%)
Moderate
increase
Significant increase
Not sure
1%
Significant decrease
47%
4%
1%
2%
44%
Moderate decrease
No change
The most commonly reported cybersecurity measures that decision makers are adding
or enhancing in Q1 are endpoint security (55%), access management (49%) and data
security (45%).
Endpoint security is the most common area of focus,
while integrating new tools into legacy systems is the
most frequently cited challenge
Are you focussing on adding or
enhancing any of the following
cybersecurity measures this quarter?
55%
49%
45% 43%
34%
Endpoint
security
Access
management
(including IAM,
PAM, zero trust etc.)
Data security Network
security
Penetration
tests/red
teaming
Disaster recovery 32%, Firewalls (e.g.,
web application firewalls, network
firewalls) 31%, Hardware 13%,
Cybersecurity mesh strategy 11%,
Security event logging/insights (e.g.,
SIEM) 11%, Deception technology 9%,
None of these 3%, Other 1%
n=361
Integrating new tools with legacy
tech/systems
End-user cybersecurity hygiene (i.e.,
poor password practices, failed
phishing tests etc.)
Budget restrictions
Cultural resistance to change within
organizational leadership
Cultural resistance to change
within direct team
Talent gaps (e.g., headcount,
skills gaps)
38%
46%
29%
25%
22%
22%
Increasing frequency of cybersecurity incidents 16%, Bandwidth limitations
(too much work for team to handle) 14%, Government cybersecurity mandates 14%,
Lack of coherent cybersecurity strategy 8%, Rising costs 8%, Supply chain shortages
(e.g., procuring hardware) 8%, Lack of leadership 6%, Attack disruption 4%, None of these 0%, Other 0%
The most commonly cited cybersecurity challenges in Q1 are new tool integration
(46%), end-user cybersecurity hygiene (38%), and budget restrictions (29%).
What are your top cybersecurity challenges this quarter?
Most (72%) feel satisfied with their organization’s current cybersecurity posture.
Most feel satisfied with their current cybersecurity
posture, and confidence is high for achieving
cybersecurity goals this quarter
Are you satisfied with your organization’s
current cybersecurity posture?
18%
65%
7%
Neutral
Moderately satisfied
Very satisfied
9%
1%
Moderately
dissatisfied
Very dissatisfied
feel confident they will achieve
their cybersecurity goals in Q1.
72%
To what extent do you agree with the
following: “I am confident I will achieve
my cybersecurity goals this quarter.”
68%
4% 21% 7% 1%
Agree
Strongly
agree
Neutral Disagree Strongly
disagree
Respondent Breakdown
Region
Company Size
Title
North America 79%
APAC 8%
EMEA 13%
This content, which provides opinions and points of view expressed by users, does not represent the views of Gartner; Gartner
neither endorses it nor makes any warranties about its accuracy or completeness.
Source: Gartner Peer Insights, Cybersecurity Quarterly Benchmarks: Q1, 2022 survey
© 2022 Gartner, Inc. and/or its affiliates. All rights reserved.
10,001+
employees
<1,001
employees
28%
Director
Manager
35%
19%
C-Suite
5,001 - 10,000
employees
VP
1,001 - 5,000
employees
19%
32%
22%
21%
25%
n=361
n=361
n=361
“Progress is made, but
cybersecurity remains
underprioritized as compared
to business initiatives.”
- Director, finance industry,
10,000+ employees
“Everything in cyber security
is challenging. So focus on
talent instead of tools.”
- C-suite, finance industry,
<1,000 employees
“There is an increased impetus and board acceptance for investment
and focus in [cybersecurity] and this is helping to drive
implementation of advanced tools and processes and improving the
overall security posture.”
- C-suite, finance industry, 1,000 - 5000 employees
“Budget is a challenge in terms of tools and staff. End-user
awareness continues to be a challenge.”
- Director, education sector, 5,000 - 10,000 employees
“Leadership is never
proactive and only pays
attention after a
successful breach.”
- Director, education sector,
1,000 - 5,000 employees
“If you have to wait on
human interaction to
isolate and protect, it is
already too late.”
- Director, software industry,
1,000 - 5,000 employees
“Client Identity and Access
Management are huge areas
that our teams will be
focusing on as well as
Identity Proofing.”
- VP, finance industry,
10,000+ employees
“Enhancing the security
culture and posture of our
customers - which causes
potential risk to our
services.”
- C-suite, software industry,
1,000 - 5000 employees
“We have signed up for a tool that provides AI based detection and
blocking. It’s too early to tell, but its initial detections whilst in
transparent mode are promising.”
- C-suite, finance industry, 10,000+ employees
“We feel confident about
our goals this quarter.”
- C-suite, finance industry,
1,000 - 5,000 employees
“[It is] increasingly difficult to hire/retain [cybersecurity] talent.”
“When you wear many hats (cybersecurity being one of them), more
visible projects tend to be pushed forward in priority and mindshare.
It’s important to keep trudging forward with cybersecurity; if you take
your foot off the gas pedal, you open yourself to attacks.”
- Director, software industry, 1,000 - 5,000 employees
- Director, professional services industry, 1,000 - 5,000 employees
“It will be a busy quarter.”
- C-suite, healthcare industry,
1,000 - 5000 employees
Want more insights like this from IT leaders like you?
Click here to explore the revamped, retooled and reimagined
Gartner Peer Insights. You’ll get unprecedented access to verified
reviews, synthesized insights and engaging discussions from a
community of your peers.

More Related Content

Similar to Cybersecurity Quarterly Benchmarks Q1 2022

State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
CompTIA
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summarypatmisasi
 
2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary
patmisasi
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
Scalar Decisions
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014Peggy Lawless
 
Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16
Emily Brady
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel
CompTIA
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
Joseph DeFever
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Argyle Executive Forum
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
CynergisTek, Inc.
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
The Economist Media Businesses
 
NEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfNEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdf
IDG
 
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Precisely
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
Silicon Valley Bank
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
Lumension
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland
Accenture Security
 

Similar to Cybersecurity Quarterly Benchmarks Q1 2022 (20)

State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
 
2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014
 
Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
 
NEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfNEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdf
 
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland
 

More from Gartner Peer Insights

Cybersecurity Impacts of the Russian Invasion of Ukraine
Cybersecurity Impacts of the Russian Invasion of UkraineCybersecurity Impacts of the Russian Invasion of Ukraine
Cybersecurity Impacts of the Russian Invasion of Ukraine
Gartner Peer Insights
 
Cybersecurity Impacts of the Russian Invasion of Ukraine
Cybersecurity Impacts of the Russian Invasion of UkraineCybersecurity Impacts of the Russian Invasion of Ukraine
Cybersecurity Impacts of the Russian Invasion of Ukraine
Gartner Peer Insights
 
Enterprise Architecture in 2022
Enterprise Architecture in 2022Enterprise Architecture in 2022
Enterprise Architecture in 2022
Gartner Peer Insights
 
The State of Remote Work Q4 2021
The State of Remote Work Q4 2021The State of Remote Work Q4 2021
The State of Remote Work Q4 2021
Gartner Peer Insights
 
Password in 2022
Password in 2022Password in 2022
Password in 2022
Gartner Peer Insights
 
CIO: 2022 Priorities
CIO: 2022 PrioritiesCIO: 2022 Priorities
CIO: 2022 Priorities
Gartner Peer Insights
 
Tech-Savvy Business Leaders
Tech-Savvy Business LeadersTech-Savvy Business Leaders
Tech-Savvy Business Leaders
Gartner Peer Insights
 

More from Gartner Peer Insights (7)

Cybersecurity Impacts of the Russian Invasion of Ukraine
Cybersecurity Impacts of the Russian Invasion of UkraineCybersecurity Impacts of the Russian Invasion of Ukraine
Cybersecurity Impacts of the Russian Invasion of Ukraine
 
Cybersecurity Impacts of the Russian Invasion of Ukraine
Cybersecurity Impacts of the Russian Invasion of UkraineCybersecurity Impacts of the Russian Invasion of Ukraine
Cybersecurity Impacts of the Russian Invasion of Ukraine
 
Enterprise Architecture in 2022
Enterprise Architecture in 2022Enterprise Architecture in 2022
Enterprise Architecture in 2022
 
The State of Remote Work Q4 2021
The State of Remote Work Q4 2021The State of Remote Work Q4 2021
The State of Remote Work Q4 2021
 
Password in 2022
Password in 2022Password in 2022
Password in 2022
 
CIO: 2022 Priorities
CIO: 2022 PrioritiesCIO: 2022 Priorities
CIO: 2022 Priorities
 
Tech-Savvy Business Leaders
Tech-Savvy Business LeadersTech-Savvy Business Leaders
Tech-Savvy Business Leaders
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

Cybersecurity Quarterly Benchmarks Q1 2022

  • 1. Most are focusing on governance and compliance standards, new tool/initiative implementation, and tool/initiative evaluation this quarter While most consider their cybersecurity budget to be adequate, almost a quarter consider their budget to be stretched Cybersecurity breaches were common in Q1, with around a third reporting service disruption due to software supply chain attacks Over half report an increase in cybersecurity incidents in Q1 compared to the previous quarter Endpoint security is the most common focus for implementation/enhancement One-Minute Insights: The most common challenge is integrating new tools with legacy technology Most are satisfied with their current cybersecurity posture and feel confident about achieving their cybersecurity goals in Q1 Data collection: Feb 14 - Mar 20, 2022 Respondents: 361 tech decision makers whose role relates to cybersecurity Cybersecurity is ensuring business continuity by protecting their organization’s digital assets, including sensitive data, from attack or employee negligence. Amid rising global tensions at a time when nations are deploying IT armies and enacting cybersecurity mandates, what is the state of cybersecurity in Q1, 2022? One-Minute Insights on timely topics are available to Gartner Peer Insights members. Sign up for access to over 100 more, and new insights each week. Cybersecurity Quarterly Benchmarks: Q1, 2022 Most cybersecurity projects are focused on ensuring governance and compliance standards in Q1 What cybersecurity projects are you focusing on this quarter? Do you feel your cybersecurity budget is adequate to make progress on your cybersecurity projects this quarter? The top cybersecurity projects decision makers are focusing on this quarter are related to governance and compliance standards (56%), implementing new tools or initiatives (55%), and evaluating current cybersecurity tools or initiatives (52%). Regarding their cybersecurity for Q1, 55% feel that their cybersecurity budget is adequate to achieve those goals. That leaves 44% feeling that their cybersecurity budget is not adequate. 22% feel their cybersecurity budget is stretched in Q1. Ensuring governance and compliance standards Implementing new tools/initiatives Evaluating current cybersecurity tools/initiatives Enabling secure hybrid/flexible work infrastructure End-user cybersecurity training/initiatives 55% 56% 52% 33% 28% Selling cybersecurity to the business (i.e., convincing business stakeholders and the board that cybersecurity is a business risk) 26%, Auditing network/assets for known vulnerabilities 25%, Hiring for cybersecurity roles 24%, Talent management (e.g., upskilling or retaining current team) 24%, Cultural overhaul (e.g., moving towards a DevSecOps culture) 22%, Researching/exploring emerging cybersecurity technologies 16%, Addressing ongoing disruption caused by a breach 11%, Migrating cybersecurity to the cloud 10%, Outsourcing cybersecurity 8%, Bringing cybersecurity in-house 2%, None of these 0%, Other 0% n=361 n=361 n=361 Though most are satisfied with the progress made on their cybersecurity goals in the last quarter, almost a quarter of decision makers consider their cybersecurity budget to be stretched Were you satisfied with the progress made on your cybersecurity goals in the last quarter? feel satisfied with the progress made on their cybersecurity goals in the last quarter. 80% Very satisfied Too early to tell 4% Moderately dissatisfied 35% 7% 9% 45% Neutral Moderately satisfied 0% Very dissatisfied 48% 7% 15% 22% 7% 1% The budget provides adequate coverage The budget provides more than adequate coverage The budget is slightly below what’s required The budget is stretched The budget is inadequate to achieve our goals Not sure Only 32% report not experiencing a cybersecurity breach in Q1 Has your organization been affected by a cybersecurity breach in any of the following ways this quarter? The most commonly reported cybersecurity breach in Q1 was malicious activity on the network that did not affect service (34%). Almost a third (32%) report that tools used by their organization had been victim to a software supply chain attack, and they experienced service disruption as a result. We’ve detected malicious activity on our network but service has been unaffected 34% We use tools that have been targeted in software supply chain attacks and our service was disrupted as a result 32% No 32% We use tools that have been targeted in software supply chain attacks but we patched before an issue was detected 24% We’ve experienced service disruption due to malicious activity on our network 23% Prefer not to disclose 9% n=361 We’ve experienced a ransomware attack 8%, Not sure 2% n=361 Has the frequency of cybersecurity incidents at your organization changed compared to the last quarter? of respondents report that cybersecurity incidents rose in Q1 compared to the last quarter. Over half (51%) Moderate increase Significant increase Not sure 1% Significant decrease 47% 4% 1% 2% 44% Moderate decrease No change The most commonly reported cybersecurity measures that decision makers are adding or enhancing in Q1 are endpoint security (55%), access management (49%) and data security (45%). Endpoint security is the most common area of focus, while integrating new tools into legacy systems is the most frequently cited challenge Are you focussing on adding or enhancing any of the following cybersecurity measures this quarter? 55% 49% 45% 43% 34% Endpoint security Access management (including IAM, PAM, zero trust etc.) Data security Network security Penetration tests/red teaming Disaster recovery 32%, Firewalls (e.g., web application firewalls, network firewalls) 31%, Hardware 13%, Cybersecurity mesh strategy 11%, Security event logging/insights (e.g., SIEM) 11%, Deception technology 9%, None of these 3%, Other 1% n=361 Integrating new tools with legacy tech/systems End-user cybersecurity hygiene (i.e., poor password practices, failed phishing tests etc.) Budget restrictions Cultural resistance to change within organizational leadership Cultural resistance to change within direct team Talent gaps (e.g., headcount, skills gaps) 38% 46% 29% 25% 22% 22% Increasing frequency of cybersecurity incidents 16%, Bandwidth limitations (too much work for team to handle) 14%, Government cybersecurity mandates 14%, Lack of coherent cybersecurity strategy 8%, Rising costs 8%, Supply chain shortages (e.g., procuring hardware) 8%, Lack of leadership 6%, Attack disruption 4%, None of these 0%, Other 0% The most commonly cited cybersecurity challenges in Q1 are new tool integration (46%), end-user cybersecurity hygiene (38%), and budget restrictions (29%). What are your top cybersecurity challenges this quarter? Most (72%) feel satisfied with their organization’s current cybersecurity posture. Most feel satisfied with their current cybersecurity posture, and confidence is high for achieving cybersecurity goals this quarter Are you satisfied with your organization’s current cybersecurity posture? 18% 65% 7% Neutral Moderately satisfied Very satisfied 9% 1% Moderately dissatisfied Very dissatisfied feel confident they will achieve their cybersecurity goals in Q1. 72% To what extent do you agree with the following: “I am confident I will achieve my cybersecurity goals this quarter.” 68% 4% 21% 7% 1% Agree Strongly agree Neutral Disagree Strongly disagree Respondent Breakdown Region Company Size Title North America 79% APAC 8% EMEA 13% This content, which provides opinions and points of view expressed by users, does not represent the views of Gartner; Gartner neither endorses it nor makes any warranties about its accuracy or completeness. Source: Gartner Peer Insights, Cybersecurity Quarterly Benchmarks: Q1, 2022 survey © 2022 Gartner, Inc. and/or its affiliates. All rights reserved. 10,001+ employees <1,001 employees 28% Director Manager 35% 19% C-Suite 5,001 - 10,000 employees VP 1,001 - 5,000 employees 19% 32% 22% 21% 25% n=361 n=361 n=361 “Progress is made, but cybersecurity remains underprioritized as compared to business initiatives.” - Director, finance industry, 10,000+ employees “Everything in cyber security is challenging. So focus on talent instead of tools.” - C-suite, finance industry, <1,000 employees “There is an increased impetus and board acceptance for investment and focus in [cybersecurity] and this is helping to drive implementation of advanced tools and processes and improving the overall security posture.” - C-suite, finance industry, 1,000 - 5000 employees “Budget is a challenge in terms of tools and staff. End-user awareness continues to be a challenge.” - Director, education sector, 5,000 - 10,000 employees “Leadership is never proactive and only pays attention after a successful breach.” - Director, education sector, 1,000 - 5,000 employees “If you have to wait on human interaction to isolate and protect, it is already too late.” - Director, software industry, 1,000 - 5,000 employees “Client Identity and Access Management are huge areas that our teams will be focusing on as well as Identity Proofing.” - VP, finance industry, 10,000+ employees “Enhancing the security culture and posture of our customers - which causes potential risk to our services.” - C-suite, software industry, 1,000 - 5000 employees “We have signed up for a tool that provides AI based detection and blocking. It’s too early to tell, but its initial detections whilst in transparent mode are promising.” - C-suite, finance industry, 10,000+ employees “We feel confident about our goals this quarter.” - C-suite, finance industry, 1,000 - 5,000 employees “[It is] increasingly difficult to hire/retain [cybersecurity] talent.” “When you wear many hats (cybersecurity being one of them), more visible projects tend to be pushed forward in priority and mindshare. It’s important to keep trudging forward with cybersecurity; if you take your foot off the gas pedal, you open yourself to attacks.” - Director, software industry, 1,000 - 5,000 employees - Director, professional services industry, 1,000 - 5,000 employees “It will be a busy quarter.” - C-suite, healthcare industry, 1,000 - 5000 employees Want more insights like this from IT leaders like you? Click here to explore the revamped, retooled and reimagined Gartner Peer Insights. You’ll get unprecedented access to verified reviews, synthesized insights and engaging discussions from a community of your peers.