IDG’s fourth annual Security Priorities study aims to gain a better understanding of the various security projects organizations are focused on now and in the coming year.
2020 IDG Role & Influence of the Technology Decision-MakerIDG
IDG’s 2020 Role & Influence of the Technology Decision-Maker Research provides in-depth insight into the influence that IT decision-makers (ITDMs) play in this changing landscape, as well as how the IT purchase process has changed due to the pandemic. The study looks at the types of tech purchases organizations plan to make, who is involved in each stage of the process, and the information sources relied upon in order to make the final purchase decision.
Understanding the Security-Specific Purchase Process [Infographic]IDG
IDG research infographic shares insight into the specific security purchase process, such as the types of purchases being made whether they be additions, upgrades or replacements, the content types and information sources relied upon by security buyers, and who is involved in each stage of the security purchase process.
Understanding the Data & Analytics Specific Purchase Process [Infographic]IDG
This infographic outlines what goes into data & analytics purchases – who’s involved in the process, the content they rely upon and the sources the turn to to stay up-to-date on industry news.
Summary based on IDG's 2021 Security Priorities study which provides insight into the security projects organizations are prioritizing in the coming year.
2020 IDG Role & Influence of the Technology Decision-MakerIDG
IDG’s 2020 Role & Influence of the Technology Decision-Maker Research provides in-depth insight into the influence that IT decision-makers (ITDMs) play in this changing landscape, as well as how the IT purchase process has changed due to the pandemic. The study looks at the types of tech purchases organizations plan to make, who is involved in each stage of the process, and the information sources relied upon in order to make the final purchase decision.
Understanding the Security-Specific Purchase Process [Infographic]IDG
IDG research infographic shares insight into the specific security purchase process, such as the types of purchases being made whether they be additions, upgrades or replacements, the content types and information sources relied upon by security buyers, and who is involved in each stage of the security purchase process.
Understanding the Data & Analytics Specific Purchase Process [Infographic]IDG
This infographic outlines what goes into data & analytics purchases – who’s involved in the process, the content they rely upon and the sources the turn to to stay up-to-date on industry news.
Summary based on IDG's 2021 Security Priorities study which provides insight into the security projects organizations are prioritizing in the coming year.
To get a better understanding of how organizations were prepared from a security perspective and the impact that security leaders expect to be long lasting due to COVID-19.
2018 Global State of Information Security SurveyIDG
The 2018 Global State of Information Security SurveyTM (GSISS) is conducted by PwC, CIO and CSO to understand how security practices and incidents are impacting the broader market.
In its second year, IDG’s 2018 Security Priorities study was conducted to gain a better understanding of organization’s current and future security posture.
This year, CSO partnered with the CERT® Division of Software Engineering Institute at Carnegie Mellon University, U.S. Secret Service and KnowBe4 to evaluate trends in the frequency and impact of cybersecurity incidents
Based on the 2018 State of the CIO research, this infographic provides insights into how IT leaders are leading change efforts and promoting a culture of collaboration.
The 2018 IDG Digital Business research was conducted to gain a better understanding of how organizations are evolving to a digital business model in terms of revising technology strategies, changing organizational structures and processes, and innovating to provide a unique customer experience.
CIO conducted the COVID-19 Impact Study to better understand how organizations were prepared for this past month and beyond, and how IT leaders are responding.
Network World’s State of the Network research is conducted annually to gain a deeper understanding of the network environments within today’s organizations.
The annual IDG Customer Engagement survey looks at the role content consumption plays in the purchase process for major technology products and services, and provides insights for tech marketers to map their engagement touch-points to customers’ information needs.
CIO’s 17th annual “State of the CIO” survey was conducted with the goal of understanding how the CIO role continues to evolve in today’s business climate and to help define the CIO agenda for 2018.
This research reveals the upcoming strategic investment plans of tech leaders. Results from the study are based on 200 heads of IT and examines the growing tech budgets, expected budget allocation for the next 12 months, and the evolving use of emerging vendors.
The 2020 State of the CIO research helps define the CIO agenda for the upcoming year and outlines the responsibilities and challenges facing senior tech leaders.
The CIO Tech Poll: Tech Priorities 2018 study explores the upcoming tech spending plans and budgets for organizations, and outlines the technology areas IT leaders expect their budgets to focus on.
Research to get a better understanding of how organizations were prepared for the pandemic, and how IT priorities and initiatives are shifting due to CV-19.
Foundry's Digital Business research was previously published under the IDG Communications brand. The study outlines the strategies and technologies that organizations are adopting to successfully complete their journey to become a digital business.
Who is the Most Influential Tech Purchase Decision Maker - ITDM or BDMRobert Eakin
Both ITDMs and BDMs play a crucial role in technology purchases. Spiceworks' latest research sheds light on these tech purchase superheroes. Find out 'how' and 'when' these roles have the greatest influence on technology purchases for their organizations.
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsVMware Tanzu
Companies going through digital transformation initiatives need their IT organizations to support an increased business tempo. While DevOps practices have helped IT increase their pace to keep up with market dynamics, security teams still need to follow suit.
InfoSec practitioners must modernize their practices to realize efficiencies in some of their most burdensome processes, like patching, credential management, and compliance.
By embracing a ‘secure by default’ posture security teams can position themselves as enabling innovation rather than hindering it.
Join Pivotal’s Justin Smith and guest speaker, Fernando Montenegro from 451 Research, in a conversation about how security can enable innovation while maintaining best security practices. They will examine best practices and cultural shifts that are required to be secure by default, as well as the role processes and platforms play in this transition.
SPEAKERS:
Guest Speaker: Fernando Montenegro, Senior Analyst, Information Security, 451 Research
Justin Smith, Chief Security Officer for Product, Pivotal
Jared Ruckle, Product Marketing Manager, Pivotal
Security of the future - Adapting Approaches to What We Needsimplyme12345
This presentation covers three main areas whereby current security approaches and practices are reviewed and discussed in terms of current needs in the digital disruption space.
To get a better understanding of how organizations were prepared from a security perspective and the impact that security leaders expect to be long lasting due to COVID-19.
2018 Global State of Information Security SurveyIDG
The 2018 Global State of Information Security SurveyTM (GSISS) is conducted by PwC, CIO and CSO to understand how security practices and incidents are impacting the broader market.
In its second year, IDG’s 2018 Security Priorities study was conducted to gain a better understanding of organization’s current and future security posture.
This year, CSO partnered with the CERT® Division of Software Engineering Institute at Carnegie Mellon University, U.S. Secret Service and KnowBe4 to evaluate trends in the frequency and impact of cybersecurity incidents
Based on the 2018 State of the CIO research, this infographic provides insights into how IT leaders are leading change efforts and promoting a culture of collaboration.
The 2018 IDG Digital Business research was conducted to gain a better understanding of how organizations are evolving to a digital business model in terms of revising technology strategies, changing organizational structures and processes, and innovating to provide a unique customer experience.
CIO conducted the COVID-19 Impact Study to better understand how organizations were prepared for this past month and beyond, and how IT leaders are responding.
Network World’s State of the Network research is conducted annually to gain a deeper understanding of the network environments within today’s organizations.
The annual IDG Customer Engagement survey looks at the role content consumption plays in the purchase process for major technology products and services, and provides insights for tech marketers to map their engagement touch-points to customers’ information needs.
CIO’s 17th annual “State of the CIO” survey was conducted with the goal of understanding how the CIO role continues to evolve in today’s business climate and to help define the CIO agenda for 2018.
This research reveals the upcoming strategic investment plans of tech leaders. Results from the study are based on 200 heads of IT and examines the growing tech budgets, expected budget allocation for the next 12 months, and the evolving use of emerging vendors.
The 2020 State of the CIO research helps define the CIO agenda for the upcoming year and outlines the responsibilities and challenges facing senior tech leaders.
The CIO Tech Poll: Tech Priorities 2018 study explores the upcoming tech spending plans and budgets for organizations, and outlines the technology areas IT leaders expect their budgets to focus on.
Research to get a better understanding of how organizations were prepared for the pandemic, and how IT priorities and initiatives are shifting due to CV-19.
Foundry's Digital Business research was previously published under the IDG Communications brand. The study outlines the strategies and technologies that organizations are adopting to successfully complete their journey to become a digital business.
Who is the Most Influential Tech Purchase Decision Maker - ITDM or BDMRobert Eakin
Both ITDMs and BDMs play a crucial role in technology purchases. Spiceworks' latest research sheds light on these tech purchase superheroes. Find out 'how' and 'when' these roles have the greatest influence on technology purchases for their organizations.
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsVMware Tanzu
Companies going through digital transformation initiatives need their IT organizations to support an increased business tempo. While DevOps practices have helped IT increase their pace to keep up with market dynamics, security teams still need to follow suit.
InfoSec practitioners must modernize their practices to realize efficiencies in some of their most burdensome processes, like patching, credential management, and compliance.
By embracing a ‘secure by default’ posture security teams can position themselves as enabling innovation rather than hindering it.
Join Pivotal’s Justin Smith and guest speaker, Fernando Montenegro from 451 Research, in a conversation about how security can enable innovation while maintaining best security practices. They will examine best practices and cultural shifts that are required to be secure by default, as well as the role processes and platforms play in this transition.
SPEAKERS:
Guest Speaker: Fernando Montenegro, Senior Analyst, Information Security, 451 Research
Justin Smith, Chief Security Officer for Product, Pivotal
Jared Ruckle, Product Marketing Manager, Pivotal
Security of the future - Adapting Approaches to What We Needsimplyme12345
This presentation covers three main areas whereby current security approaches and practices are reviewed and discussed in terms of current needs in the digital disruption space.
CompTIA - IT Security Sales Practices in the Channel CompTIA
This presentation provides a review of how IT firms approach the sale of IT security products and services. It details the types of security services they are offering, their outlook on security growth prospects and their involvement in areas such as security-as-a-service or managed security services.
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...SolarWinds
Join SolarWinds® CISO, Tim Brown, and Group Vice President, Brandon Shopp for a webinar to review and discuss our most recent Public Sector Cybersecurity Survey results, including significant differences across public sector market segments and how confident the respondents were in their teams’ ability to keep up with evolving threats.
Hear how security pros are responding and adapting to increased attacks and breaches, including facilitating more comprehensive cyber threat management strategies and best practices and the increasing investments and resource utilization to mitigate these challenges. Listen to the webinar, based on the Cybersecurity Resource Allocation & Efficacy (CRAE) Index study for Q1 2021, from CyberRisk Alliance Business Intelligence to hear the panel of experts:
•Review survey results from CRAE Index’s Q1 global research study;
•Discuss the latest trends on proactive and reactive cybersecurity; and
•Hear insights on what lies ahead.
Given the breadth and pace of innovation, all signs point to a widening skills gap. This will put further pressure on organizations of all sizes to rethink their workforce strategies. While the notion of a skills gap is a seemingly straightforward concept, below the surface, there are many nuances to the story. This CompTIA research report explores these issues, setting the stage for approaches to tackling the IT skills gap.
Why Zero Trust Architecture Will Become the New Normal in 2021Cloudflare
The COVID-19 pandemic brought changes no IT team was ready for: employees were sent home, customer interaction models changed, and cloud transformation efforts abruptly accelerated. Cloudflare recently commissioned Forrester Consulting to explore the impact of 2020 disruptions on security strategy and operations among companies of all sizes. To do so, they surveyed 317 global security decision makers from around the world.
Join our guest Forrester VP, Principal Analyst, Chase Cunningham, and Cloudflare Go-To-Market Leader, Brian Parks, for an in-depth discussion of the survey results, followed by practical guidance for next year’s planning.
How close is your organization to being breached | Safe SecurityRahul Tyagi
Traditional methods are certainly limited in
their capabilities and this is easily proven by
the multitude of breaches businesses were a
victim of, across the globe. The 2020 Q3 Data
Breach QuickView Report revealed that the
number of records exposed in 2020 has
increased to 36 billion globally. The report
stated that there were 2,953 publicly
reported breaches in the first three quarters
of 2020 itself! 2020 is already named the
“worst year on record” by the end of Q2 in
terms of the total number of records
exposed. With the growing sophistication of
cyber-attacks and global damages related
to cybercrime reaching $6 trillion by 2021, we
need a solution that simplifies
cybersecurity.
To know more about breach probability visit : www.safe.security
In today’s digital economy and customer-driven marketplace, IT plays a crucial role to meet the demands of our customers. Every company is a software company, and IT is an integral part of the organization to enable business capabilities, new business models. This speech will focus on skills needed for the digital age, Technology trends in the industry, and skills required to lead next generation project management.
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomIBM Security
View on-demand: http://bit.ly/1OLCGgd
Cybersecurity incidents have significant impact beyond the IT organization, representing a significant risk to ongoing business continuity and reputation, and requiring heightened engagement across the entire executive team. Common wisdom is that security leaders need to speak in ways the business will understand, but what does that really mean? And how does the business side of an organization view security? To answer these questions, IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, Human Resource executives, Chief Compliance Officers and Legal Counsel.
View this webinar to hear Diana Kelley, Executive Security Advisor in IBM Security, and Carl Nordman, Functional Research Lead for CFO and Cybersecurity in the IBM Institute for Business Value, discuss findings from the 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite."
This webinar will cover an overview of the study findings, including:
C-Suite views of the risks and actors - Is the C-Suite view aligned with security reality?
IT and business alignment / collaboration- Who's engaged and who's not?
The tone from the top on external collaboration and sharing of incident information
Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
International Technology Adoption & Workforce Issues Study - Brazilian SummaryCompTIA
86% of Brazilian executives indicate at least some degree of gaps in IT skills at their business exists. 88% of Brazilian executives believe the cybersecurity threat level is increasing. Find out more on how companies are adopting new technology and how it's impacting their workforce.
Discussion of information Security risks in current business and technology environments.
presented to ISSA Ireland conference attendees in Dublin on 12 May 2011.
Foundry's 2022 Customer Engagement study provides insight into the content types and vendor engagement preferences of IT decision-makers as organizations advance their use of technology to improve customer experiences and streamline processes.
This research was conducted to better understand partner marketing efforts within the technology industry, associated benefits and challenges, and budgetary trends with the goal of providing actionable advice for partner marketers regarding those marketing efforts.
Foundry research study to better understand the workplace impact of the pandemic over the past two years and how organizations are planning to move forward, especially as it relates to remote and hybrid work.
Foundry's Partner Marketing research was previously released under the IDG Communications brand. The study provides insight into the benefits and challenges of partner marketing, and the partner initiatives that companies have in place.
Foundry's Data & Analytics research was previously published under the IDG Communications brand. This study provides insight into the data-driven initiatives IT decision-makers (ITDMs) have on their radar, challenges associated with their data strategy, and the tools and solutions they plan to invest in to assist their goals.
Foundry Role & Influence of the Technology Decision-Maker Research 2022IDG
Foundry's Role & Influence research was previously released under the IDG Communications brand. The study outlines the tech purchases that are likely to be made, who's involved in these decisions, and the information sources they rely on.
Foundry's Customer Engagement study was previously released under the IDG Communications brand. The study provides insight into the various types and volume of content tech buyers consume throughout their buying journey, and also helps tech vendors understand ITDMs' engagement preferences when it comes to vendor follow-up and maintaining relationships.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
1. I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
IDG COMMUNICATIONS, INC.
QUALITY
MATTERS
IDG Security Priorities Study
2020
2. I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
78%
8%
4%
7%
3%
Purpose and Methodology
Source: IDG Security Priorities Study, 2020
To gain a better understanding of the various security projects organizations are focused on now and in
the coming year. The research also looks at the issues that will demand the most time and strategic
thinking for IT and security teams, with some questions specific to the COVID-19 pandemic.SURVEY GOAL
AUDIENCE BASE
CIO, Computerworld, CSO, InfoWorld,
and Network World site visitors, and email
invitations to audience base.
NUMBER OF
QUESTIONS 34
COLLECTION METHOD
Online questionnaire
522
IT LEADERSHIP
All survey respondents are involved
in IT and/or corporate/physical
security decisions.
Business Mgmt
Technology
19%
Manufacturing 14%
Financial Services 12%
Services (legal, consulting, real estate) 11%
Healthcare 9%
Government/Non-profit 8%
Education 5%
Retail, Wholesale and Distribution 5%
JOB TITLES
TOTAL RESPONDENTS
TOPREPRESENTEDINDUSTRIES
AVERAGE
COMPANY SIZE
12,661
EMPLOYEES
ExecIT/
Security
IT/Security
Pro
IT/
Security
Mgmt.
Other
2
REGION
North America – 73%
APAC – 21%
EMEA – 6%
3. I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
2%
7%
12%
13%
15%
15%
16%
16%
16%
17%
17%
21%
23%
24%
27%
28%
28%
29%
37%
Responding to inquiries from senior mgmt and/or the Board
Addressing issues that arise with security vendor(s)
Cyber threats from inside the organization Insider threats
Addressing security risks associated with disruptive tech
Managing security/addressing risks around mobile devices
Addressing issues that arise with technology (non-security) vendor(s)
Employee retention/hiring skilled & qualified workers
Institutional silos (little to no collaboration to address threats)
Gaining cooperation/buy-in from business leaders/stakeholders
Acceleration of digital transformation initiatives
Security of business operations and/or data hosted in the cloud
Ensuring customer privacy/confidentiality
IT Audit
Shadow IT (IT is not always aware when new tools are implemented)
Cyber threats from outside the organization APTs, DDoS
Meeting governance & compliance regulations
Budgetary constraints/demonstrating ROI
Employee awareness and training issues
Unexpected/underexpected business risks (pandemic, workforce changes, etc.)
Strategic Time Redirected Due to Pandemic
3
Q. What security-related challenges are most often forcing you to redirect your time and focus away from more strategic tasks?
Source: IDG Security Priorities Study, 2020
#1 in 2019
#2 in 2019
#3 in 2019
4. I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
Falling Short in Resources & Strategy
4
Q. In which areas, if any, do you feel your organization is falling short in addressing cyber risk?
Source: IDG Security Priorities Study, 2020
11%
12%
16%
18%
18%
19%
20%
20%
26%
27%
28%
30%
31%
Lack of security during due diligence phase of M&A
Non-routine updates of incident response plan
Lack of security team involvement in vendor and 3rd party management
The complexity of our security environment makes it difficult to retrieve timely,
actionable intelligence from our systems
Poor visibility into IT environment
Lack of security team involvement prior to implementing new technologies
Addressing risks that have arisen from the new work environment brought on by
the pandemic
We struggle to find, acquire, and/or retain the technical or professional expertise
we need
Insufficient communications between security team and lines of business
Inadequate security training for users (full and part-time employees,
contractors, or outsourced users)
We are not proactive enough when it comes to our security strategy
Security is not always addressed during application development
We are not investing enough resource (budget, people, technologies, etc.) to
address our risks
87%
believe their
organization is
falling short
addressing
cyber risks
5. I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
Despite Pandemic, Security Budgets Grow
5
Q. Will your overall security budget increase, decrease or remain the same in the next 12 months compared to the past 12 months? AND Q. Please estimate your entire organization’s
total annual budget for all information security products, systems, services and/or staff (including both CAPEX and OPEX) in the next 12 months.
Source: IDG Security Priorities Study, 2020
Expected Change in Budgets:
41%
6%
53%
Increase
Remain
the same
Decrease
Average annual
security budget:
$72.7M
Enterprise: $136M
SMB: $5.5M
Up from
$51.8M
in 2019
6. I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
Allocation of Security Budgets
6
Q. With the total equal to 100%, approximately what percent of your annual budget for IT security will be allocated to the following areas over the next 12 months?
Source: IDG Security Priorities Study, 2020
23%
19%
17%
12%
8%
7%
6%
5%
3%
Skilled staff On-premises
Infrastructure and
equipment
(hardware)
On-premises
Tools and
software
(software)
Cloud-based
security solutions
Consulting
services
Cloud-based
security
monitoring
services
Contracted
evaluation
services
External incident
response services
Other (travel,
conferences,
etc.)
7. I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
Increasing Spend on Authentication & Cloud
Data Protection
7
Q: Please describe how your company’s level of spending in the following areas will change over the next 12 months.
Source: IDG Security Priorities Study, 2020
20%
20%
20%
20%
20%
21%
22%
22%
22%
24%
25%
27%
27%
28%
32%
71%
49%
60%
71%
44%
45%
51%
63%
65%
64%
62%
62%
46%
49%
57%
6%
5%
5%
5%
3%
5%
5%
5%
4%
4%
5%
5%
5%
4%
3%
1%
12%
6%
2%
14%
9%
7%
4%
3%
4%
2%
2%
8%
6%
4%
2%
15%
9%
2%
20%
19%
15%
6%
6%
5%
6%
5%
13%
13%
5%
Anti-virus/malware
Container security
Data Loss Prevention (DLP)
Firewalls
Zero trust technologies
Cloud access security brokers (CASBs)
Behavior monitoring & analysis
Endpoint detection and response
Identity management systems
Security education/Awareness training
Application monitoring
Access controls (network, data)
Cloud-based cybersecurity services
Cloud data protection
Authentication (multi-factor/strong authentication, role-based)
Increase Remain the same Decrease This is a new category for our organization Potential new investment area in the future
8. I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
8
Continue the Conversation
To get results from IDG research when it happens, or any
other news, follow us on Twitter: @IDGWorld
ADDITIONAL WAYS TO STAY ON TOP OF INFORMATION FROM IDG :
Sign up to receive our monthly marketing
newsletter at www.idg.com/newsletters/
Visit us on LinkedIn here:
www.linkedin.com/company/international-data-group--idg-
To receive a briefing on the full results from this study, or for more information, please
contact your IDG sales executive or contact us.
For more information on content marketing and lead nurture, explore our resources on
this site under marketing tools. We have additional primary research, blogs and white
papers to make you smarter about tech decision makers, and targeted products and
programs to help you reach them!