SlideShare a Scribd company logo
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
IDG COMMUNICATIONS, INC.
QUALITY
MATTERS
IDG Security Priorities Study
2020
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
78%
8%
4%
7%
3%
Purpose and Methodology
Source: IDG Security Priorities Study, 2020
To gain a better understanding of the various security projects organizations are focused on now and in
the coming year. The research also looks at the issues that will demand the most time and strategic
thinking for IT and security teams, with some questions specific to the COVID-19 pandemic.SURVEY GOAL
AUDIENCE BASE
CIO, Computerworld, CSO, InfoWorld,
and Network World site visitors, and email
invitations to audience base.
NUMBER OF
QUESTIONS 34
COLLECTION METHOD
Online questionnaire
522
IT LEADERSHIP
All survey respondents are involved
in IT and/or corporate/physical
security decisions.
Business Mgmt
Technology
19%
Manufacturing 14%
Financial Services 12%
Services (legal, consulting, real estate) 11%
Healthcare 9%
Government/Non-profit 8%
Education 5%
Retail, Wholesale and Distribution 5%
JOB TITLES
TOTAL RESPONDENTS
TOPREPRESENTEDINDUSTRIES
AVERAGE
COMPANY SIZE
12,661
EMPLOYEES
ExecIT/
Security
IT/Security
Pro
IT/
Security
Mgmt.
Other
2
REGION
North America – 73%
APAC – 21%
EMEA – 6%
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
2%
7%
12%
13%
15%
15%
16%
16%
16%
17%
17%
21%
23%
24%
27%
28%
28%
29%
37%
Responding to inquiries from senior mgmt and/or the Board
Addressing issues that arise with security vendor(s)
Cyber threats from inside the organization Insider threats
Addressing security risks associated with disruptive tech
Managing security/addressing risks around mobile devices
Addressing issues that arise with technology (non-security) vendor(s)
Employee retention/hiring skilled & qualified workers
Institutional silos (little to no collaboration to address threats)
Gaining cooperation/buy-in from business leaders/stakeholders
Acceleration of digital transformation initiatives
Security of business operations and/or data hosted in the cloud
Ensuring customer privacy/confidentiality
IT Audit
Shadow IT (IT is not always aware when new tools are implemented)
Cyber threats from outside the organization APTs, DDoS
Meeting governance & compliance regulations
Budgetary constraints/demonstrating ROI
Employee awareness and training issues
Unexpected/underexpected business risks (pandemic, workforce changes, etc.)
Strategic Time Redirected Due to Pandemic
3
Q. What security-related challenges are most often forcing you to redirect your time and focus away from more strategic tasks?
Source: IDG Security Priorities Study, 2020
#1 in 2019
#2 in 2019
#3 in 2019
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
Falling Short in Resources & Strategy
4
Q. In which areas, if any, do you feel your organization is falling short in addressing cyber risk?
Source: IDG Security Priorities Study, 2020
11%
12%
16%
18%
18%
19%
20%
20%
26%
27%
28%
30%
31%
Lack of security during due diligence phase of M&A
Non-routine updates of incident response plan
Lack of security team involvement in vendor and 3rd party management
The complexity of our security environment makes it difficult to retrieve timely,
actionable intelligence from our systems
Poor visibility into IT environment
Lack of security team involvement prior to implementing new technologies
Addressing risks that have arisen from the new work environment brought on by
the pandemic
We struggle to find, acquire, and/or retain the technical or professional expertise
we need
Insufficient communications between security team and lines of business
Inadequate security training for users (full and part-time employees,
contractors, or outsourced users)
We are not proactive enough when it comes to our security strategy
Security is not always addressed during application development
We are not investing enough resource (budget, people, technologies, etc.) to
address our risks
87%
believe their
organization is
falling short
addressing
cyber risks
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
Despite Pandemic, Security Budgets Grow
5
Q. Will your overall security budget increase, decrease or remain the same in the next 12 months compared to the past 12 months? AND Q. Please estimate your entire organization’s
total annual budget for all information security products, systems, services and/or staff (including both CAPEX and OPEX) in the next 12 months.
Source: IDG Security Priorities Study, 2020
Expected Change in Budgets:
41%
6%
53%
Increase
Remain
the same
Decrease
Average annual
security budget:
$72.7M
Enterprise: $136M
SMB: $5.5M
Up from
$51.8M
in 2019
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
Allocation of Security Budgets
6
Q. With the total equal to 100%, approximately what percent of your annual budget for IT security will be allocated to the following areas over the next 12 months?
Source: IDG Security Priorities Study, 2020
23%
19%
17%
12%
8%
7%
6%
5%
3%
Skilled staff On-premises
Infrastructure and
equipment
(hardware)
On-premises
Tools and
software
(software)
Cloud-based
security solutions
Consulting
services
Cloud-based
security
monitoring
services
Contracted
evaluation
services
External incident
response services
Other (travel,
conferences,
etc.)
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
Increasing Spend on Authentication & Cloud
Data Protection
7
Q: Please describe how your company’s level of spending in the following areas will change over the next 12 months.
Source: IDG Security Priorities Study, 2020
20%
20%
20%
20%
20%
21%
22%
22%
22%
24%
25%
27%
27%
28%
32%
71%
49%
60%
71%
44%
45%
51%
63%
65%
64%
62%
62%
46%
49%
57%
6%
5%
5%
5%
3%
5%
5%
5%
4%
4%
5%
5%
5%
4%
3%
1%
12%
6%
2%
14%
9%
7%
4%
3%
4%
2%
2%
8%
6%
4%
2%
15%
9%
2%
20%
19%
15%
6%
6%
5%
6%
5%
13%
13%
5%
Anti-virus/malware
Container security
Data Loss Prevention (DLP)
Firewalls
Zero trust technologies
Cloud access security brokers (CASBs)
Behavior monitoring & analysis
Endpoint detection and response
Identity management systems
Security education/Awareness training
Application monitoring
Access controls (network, data)
Cloud-based cybersecurity services
Cloud data protection
Authentication (multi-factor/strong authentication, role-based)
Increase Remain the same Decrease This is a new category for our organization Potential new investment area in the future
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
8
Continue the Conversation
To get results from IDG research when it happens, or any
other news, follow us on Twitter: @IDGWorld
ADDITIONAL WAYS TO STAY ON TOP OF INFORMATION FROM IDG :
Sign up to receive our monthly marketing
newsletter at www.idg.com/newsletters/
Visit us on LinkedIn here:
www.linkedin.com/company/international-data-group--idg-
To receive a briefing on the full results from this study, or for more information, please
contact your IDG sales executive or contact us.
For more information on content marketing and lead nurture, explore our resources on
this site under marketing tools. We have additional primary research, blogs and white
papers to make you smarter about tech decision makers, and targeted products and
programs to help you reach them!

More Related Content

What's hot

CSO Pandemic Impact Survey, 2020
CSO Pandemic Impact Survey, 2020CSO Pandemic Impact Survey, 2020
CSO Pandemic Impact Survey, 2020
IDG
 
Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]
IDG
 
2018 Global State of Information Security Survey
2018 Global State of Information Security Survey2018 Global State of Information Security Survey
2018 Global State of Information Security Survey
IDG
 
2018 Security Priorities
2018 Security Priorities 2018 Security Priorities
2018 Security Priorities
IDG
 
2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of Cybercrime
IDG
 
State of the CIO 2018 Infographic
State of the CIO 2018 InfographicState of the CIO 2018 Infographic
State of the CIO 2018 Infographic
IDG
 
Digital Business 2018
Digital Business 2018Digital Business 2018
Digital Business 2018
IDG
 
CIO COVID-19 Impact Survey, Infographic
CIO COVID-19 Impact Survey, InfographicCIO COVID-19 Impact Survey, Infographic
CIO COVID-19 Impact Survey, Infographic
IDG
 
2018 State of the Network
2018 State of the Network2018 State of the Network
2018 State of the Network
IDG
 
2018 IDG Customer Engagement Study
2018 IDG Customer Engagement Study2018 IDG Customer Engagement Study
2018 IDG Customer Engagement Study
IDG
 
State of the CIO 2018
State of the CIO 2018State of the CIO 2018
State of the CIO 2018
IDG
 
CIO Tech Poll: Tech Priorities 2019
CIO Tech Poll: Tech Priorities 2019CIO Tech Poll: Tech Priorities 2019
CIO Tech Poll: Tech Priorities 2019
IDG
 
Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides
IDG
 
IDG 2019 Digital Business infographic
IDG 2019 Digital Business infographicIDG 2019 Digital Business infographic
IDG 2019 Digital Business infographic
IDG
 
2020 State of the CIO Research
2020 State of the CIO Research2020 State of the CIO Research
2020 State of the CIO Research
IDG
 
CIO COVID Research Infographic
CIO COVID Research InfographicCIO COVID Research Infographic
CIO COVID Research Infographic
IDG
 
CIO Tech Poll: Tech Priorities 2018
CIO Tech Poll: Tech Priorities 2018CIO Tech Poll: Tech Priorities 2018
CIO Tech Poll: Tech Priorities 2018
IDG
 
CIO CV-19 Impact Study
CIO CV-19 Impact StudyCIO CV-19 Impact Study
CIO CV-19 Impact Study
IDG
 
Foundry Digital Business Research 2021
Foundry Digital Business Research 2021Foundry Digital Business Research 2021
Foundry Digital Business Research 2021
IDG
 
Who is the Most Influential Tech Purchase Decision Maker - ITDM or BDM
Who is the Most Influential Tech Purchase Decision Maker - ITDM or BDMWho is the Most Influential Tech Purchase Decision Maker - ITDM or BDM
Who is the Most Influential Tech Purchase Decision Maker - ITDM or BDM
Robert Eakin
 

What's hot (20)

CSO Pandemic Impact Survey, 2020
CSO Pandemic Impact Survey, 2020CSO Pandemic Impact Survey, 2020
CSO Pandemic Impact Survey, 2020
 
Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]
 
2018 Global State of Information Security Survey
2018 Global State of Information Security Survey2018 Global State of Information Security Survey
2018 Global State of Information Security Survey
 
2018 Security Priorities
2018 Security Priorities 2018 Security Priorities
2018 Security Priorities
 
2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of Cybercrime
 
State of the CIO 2018 Infographic
State of the CIO 2018 InfographicState of the CIO 2018 Infographic
State of the CIO 2018 Infographic
 
Digital Business 2018
Digital Business 2018Digital Business 2018
Digital Business 2018
 
CIO COVID-19 Impact Survey, Infographic
CIO COVID-19 Impact Survey, InfographicCIO COVID-19 Impact Survey, Infographic
CIO COVID-19 Impact Survey, Infographic
 
2018 State of the Network
2018 State of the Network2018 State of the Network
2018 State of the Network
 
2018 IDG Customer Engagement Study
2018 IDG Customer Engagement Study2018 IDG Customer Engagement Study
2018 IDG Customer Engagement Study
 
State of the CIO 2018
State of the CIO 2018State of the CIO 2018
State of the CIO 2018
 
CIO Tech Poll: Tech Priorities 2019
CIO Tech Poll: Tech Priorities 2019CIO Tech Poll: Tech Priorities 2019
CIO Tech Poll: Tech Priorities 2019
 
Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides
 
IDG 2019 Digital Business infographic
IDG 2019 Digital Business infographicIDG 2019 Digital Business infographic
IDG 2019 Digital Business infographic
 
2020 State of the CIO Research
2020 State of the CIO Research2020 State of the CIO Research
2020 State of the CIO Research
 
CIO COVID Research Infographic
CIO COVID Research InfographicCIO COVID Research Infographic
CIO COVID Research Infographic
 
CIO Tech Poll: Tech Priorities 2018
CIO Tech Poll: Tech Priorities 2018CIO Tech Poll: Tech Priorities 2018
CIO Tech Poll: Tech Priorities 2018
 
CIO CV-19 Impact Study
CIO CV-19 Impact StudyCIO CV-19 Impact Study
CIO CV-19 Impact Study
 
Foundry Digital Business Research 2021
Foundry Digital Business Research 2021Foundry Digital Business Research 2021
Foundry Digital Business Research 2021
 
Who is the Most Influential Tech Purchase Decision Maker - ITDM or BDM
Who is the Most Influential Tech Purchase Decision Maker - ITDM or BDMWho is the Most Influential Tech Purchase Decision Maker - ITDM or BDM
Who is the Most Influential Tech Purchase Decision Maker - ITDM or BDM
 

Similar to IDG 2020 Security Priorities Research

InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
VMware Tanzu
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
simplyme12345
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel
CompTIA
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
IDG
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
IDG
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
SolarWinds
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Ivanti
 
CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017
CompTIA
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
Cloudflare
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
International Federation of Accountants
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
Rahul Tyagi
 
Cyber-attacks
Cyber-attacksCyber-attacks
Cybersecurity report-vol-8
Cybersecurity report-vol-8Cybersecurity report-vol-8
Cybersecurity report-vol-8
Mohamed Abdelhakim
 
Level Up Your Skills to Lead IT Projects Successfully
Level Up Your Skills to Lead IT Projects SuccessfullyLevel Up Your Skills to Lead IT Projects Successfully
Level Up Your Skills to Lead IT Projects Successfully
Kaali Dass PMP, PhD.
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
IBM Security
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian Summary
CompTIA
 
NEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfNEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdf
IDG
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
Michael Ofarrell
 
2017 Cybersecurity Report
2017 Cybersecurity Report 2017 Cybersecurity Report
2017 Cybersecurity Report
Scale Venture Partners
 
2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf
IDG
 

Similar to IDG 2020 Security Priorities Research (20)

InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
 
CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
Cyber-attacks
Cyber-attacksCyber-attacks
Cyber-attacks
 
Cybersecurity report-vol-8
Cybersecurity report-vol-8Cybersecurity report-vol-8
Cybersecurity report-vol-8
 
Level Up Your Skills to Lead IT Projects Successfully
Level Up Your Skills to Lead IT Projects SuccessfullyLevel Up Your Skills to Lead IT Projects Successfully
Level Up Your Skills to Lead IT Projects Successfully
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian Summary
 
NEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfNEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdf
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
2017 Cybersecurity Report
2017 Cybersecurity Report 2017 Cybersecurity Report
2017 Cybersecurity Report
 
2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf
 

More from IDG

Role and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdfRole and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdf
IDG
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
IDG
 
CIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdfCIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdf
IDG
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxState of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
IDG
 
State of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfState of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdf
IDG
 
R_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdfR_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdf
IDG
 
Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022
IDG
 
R-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdfR-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdf
IDG
 
Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022
IDG
 
Security Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdfSecurity Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdf
IDG
 
R_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdfR_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdf
IDG
 
Foundry Future of Work Study 2022
Foundry Future of Work Study 2022Foundry Future of Work Study 2022
Foundry Future of Work Study 2022
IDG
 
Data & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdfData & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdf
IDG
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22
IDG
 
R if data_analytics_03.08.22
R if data_analytics_03.08.22R if data_analytics_03.08.22
R if data_analytics_03.08.22
IDG
 
Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020
IDG
 
Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021
IDG
 
Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Role & Influence of the Technology Decision-Maker Research 2022Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Role & Influence of the Technology Decision-Maker Research 2022
IDG
 
Foundry Customer Engagement Study 2021
Foundry Customer Engagement Study 2021Foundry Customer Engagement Study 2021
Foundry Customer Engagement Study 2021
IDG
 
Stateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slidesStateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slides
IDG
 

More from IDG (20)

Role and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdfRole and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdf
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
 
CIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdfCIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdf
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxState of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
 
State of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfState of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdf
 
R_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdfR_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdf
 
Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022
 
R-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdfR-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdf
 
Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022
 
Security Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdfSecurity Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdf
 
R_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdfR_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdf
 
Foundry Future of Work Study 2022
Foundry Future of Work Study 2022Foundry Future of Work Study 2022
Foundry Future of Work Study 2022
 
Data & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdfData & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdf
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22
 
R if data_analytics_03.08.22
R if data_analytics_03.08.22R if data_analytics_03.08.22
R if data_analytics_03.08.22
 
Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020
 
Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021
 
Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Role & Influence of the Technology Decision-Maker Research 2022Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Role & Influence of the Technology Decision-Maker Research 2022
 
Foundry Customer Engagement Study 2021
Foundry Customer Engagement Study 2021Foundry Customer Engagement Study 2021
Foundry Customer Engagement Study 2021
 
Stateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slidesStateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slides
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

IDG 2020 Security Priorities Research

  • 1. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y M A T T E R S IDG COMMUNICATIONS, INC. QUALITY MATTERS IDG Security Priorities Study 2020
  • 2. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y M A T T E R S 78% 8% 4% 7% 3% Purpose and Methodology Source: IDG Security Priorities Study, 2020 To gain a better understanding of the various security projects organizations are focused on now and in the coming year. The research also looks at the issues that will demand the most time and strategic thinking for IT and security teams, with some questions specific to the COVID-19 pandemic.SURVEY GOAL AUDIENCE BASE CIO, Computerworld, CSO, InfoWorld, and Network World site visitors, and email invitations to audience base. NUMBER OF QUESTIONS 34 COLLECTION METHOD Online questionnaire 522 IT LEADERSHIP All survey respondents are involved in IT and/or corporate/physical security decisions. Business Mgmt Technology 19% Manufacturing 14% Financial Services 12% Services (legal, consulting, real estate) 11% Healthcare 9% Government/Non-profit 8% Education 5% Retail, Wholesale and Distribution 5% JOB TITLES TOTAL RESPONDENTS TOPREPRESENTEDINDUSTRIES AVERAGE COMPANY SIZE 12,661 EMPLOYEES ExecIT/ Security IT/Security Pro IT/ Security Mgmt. Other 2 REGION North America – 73% APAC – 21% EMEA – 6%
  • 3. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y M A T T E R S 2% 7% 12% 13% 15% 15% 16% 16% 16% 17% 17% 21% 23% 24% 27% 28% 28% 29% 37% Responding to inquiries from senior mgmt and/or the Board Addressing issues that arise with security vendor(s) Cyber threats from inside the organization Insider threats Addressing security risks associated with disruptive tech Managing security/addressing risks around mobile devices Addressing issues that arise with technology (non-security) vendor(s) Employee retention/hiring skilled & qualified workers Institutional silos (little to no collaboration to address threats) Gaining cooperation/buy-in from business leaders/stakeholders Acceleration of digital transformation initiatives Security of business operations and/or data hosted in the cloud Ensuring customer privacy/confidentiality IT Audit Shadow IT (IT is not always aware when new tools are implemented) Cyber threats from outside the organization APTs, DDoS Meeting governance & compliance regulations Budgetary constraints/demonstrating ROI Employee awareness and training issues Unexpected/underexpected business risks (pandemic, workforce changes, etc.) Strategic Time Redirected Due to Pandemic 3 Q. What security-related challenges are most often forcing you to redirect your time and focus away from more strategic tasks? Source: IDG Security Priorities Study, 2020 #1 in 2019 #2 in 2019 #3 in 2019
  • 4. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y M A T T E R S Falling Short in Resources & Strategy 4 Q. In which areas, if any, do you feel your organization is falling short in addressing cyber risk? Source: IDG Security Priorities Study, 2020 11% 12% 16% 18% 18% 19% 20% 20% 26% 27% 28% 30% 31% Lack of security during due diligence phase of M&A Non-routine updates of incident response plan Lack of security team involvement in vendor and 3rd party management The complexity of our security environment makes it difficult to retrieve timely, actionable intelligence from our systems Poor visibility into IT environment Lack of security team involvement prior to implementing new technologies Addressing risks that have arisen from the new work environment brought on by the pandemic We struggle to find, acquire, and/or retain the technical or professional expertise we need Insufficient communications between security team and lines of business Inadequate security training for users (full and part-time employees, contractors, or outsourced users) We are not proactive enough when it comes to our security strategy Security is not always addressed during application development We are not investing enough resource (budget, people, technologies, etc.) to address our risks 87% believe their organization is falling short addressing cyber risks
  • 5. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y M A T T E R S Despite Pandemic, Security Budgets Grow 5 Q. Will your overall security budget increase, decrease or remain the same in the next 12 months compared to the past 12 months? AND Q. Please estimate your entire organization’s total annual budget for all information security products, systems, services and/or staff (including both CAPEX and OPEX) in the next 12 months. Source: IDG Security Priorities Study, 2020 Expected Change in Budgets: 41% 6% 53% Increase Remain the same Decrease Average annual security budget: $72.7M Enterprise: $136M SMB: $5.5M Up from $51.8M in 2019
  • 6. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y M A T T E R S Allocation of Security Budgets 6 Q. With the total equal to 100%, approximately what percent of your annual budget for IT security will be allocated to the following areas over the next 12 months? Source: IDG Security Priorities Study, 2020 23% 19% 17% 12% 8% 7% 6% 5% 3% Skilled staff On-premises Infrastructure and equipment (hardware) On-premises Tools and software (software) Cloud-based security solutions Consulting services Cloud-based security monitoring services Contracted evaluation services External incident response services Other (travel, conferences, etc.)
  • 7. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y M A T T E R S Increasing Spend on Authentication & Cloud Data Protection 7 Q: Please describe how your company’s level of spending in the following areas will change over the next 12 months. Source: IDG Security Priorities Study, 2020 20% 20% 20% 20% 20% 21% 22% 22% 22% 24% 25% 27% 27% 28% 32% 71% 49% 60% 71% 44% 45% 51% 63% 65% 64% 62% 62% 46% 49% 57% 6% 5% 5% 5% 3% 5% 5% 5% 4% 4% 5% 5% 5% 4% 3% 1% 12% 6% 2% 14% 9% 7% 4% 3% 4% 2% 2% 8% 6% 4% 2% 15% 9% 2% 20% 19% 15% 6% 6% 5% 6% 5% 13% 13% 5% Anti-virus/malware Container security Data Loss Prevention (DLP) Firewalls Zero trust technologies Cloud access security brokers (CASBs) Behavior monitoring & analysis Endpoint detection and response Identity management systems Security education/Awareness training Application monitoring Access controls (network, data) Cloud-based cybersecurity services Cloud data protection Authentication (multi-factor/strong authentication, role-based) Increase Remain the same Decrease This is a new category for our organization Potential new investment area in the future
  • 8. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y M A T T E R S 8 Continue the Conversation To get results from IDG research when it happens, or any other news, follow us on Twitter: @IDGWorld ADDITIONAL WAYS TO STAY ON TOP OF INFORMATION FROM IDG : Sign up to receive our monthly marketing newsletter at www.idg.com/newsletters/ Visit us on LinkedIn here: www.linkedin.com/company/international-data-group--idg- To receive a briefing on the full results from this study, or for more information, please contact your IDG sales executive or contact us. For more information on content marketing and lead nurture, explore our resources on this site under marketing tools. We have additional primary research, blogs and white papers to make you smarter about tech decision makers, and targeted products and programs to help you reach them!