SlideShare a Scribd company logo
1 of 21
International Technology Adoption
& Workforce Issues Study
Summary for Middle East
About this Research
CompTIA’s International Technology Adoption and Workforce Issues study was conducted to collect and share information on technology adoption and
workforce trends across several countries. The objectives of this research include:
• Explore business and information technology (IT) priorities among organizations
• Examine the usage of key technologies/solutions and IT services such as security and cloud computing
• Identify which IT skills are most important to employers and if there are any skills gap issues or staffing concerns
• Evaluate professional development practices such as training and certification
The data for this study was collected via a quantitative online survey conducted February 22 to March 23, 2013 among 1,256 IT and business executives
directly involved in setting or executing information technology policies and processes within their organizations. The 10 countries covered in this study
include:
Brazil (n=125); Canada (n=125); France (n=125); Germany (n=131); India (n=125); Japan (n=125); Mexico (n=125); Middle East Subset (Oman, Saudi
Arabia, United Arab Emirates) (n=125); Thailand (n=125); United Kingdom (n=125)
Surveys were localized and translated to allow respondents to participate in their native language. Additionally, precautions were taken to minimize
misinterpretations of questions. However, research has shown, cultural differences exist and can affect responses to certain question types, such as 5-
point satisfaction rating questions. Viewers of this report should keep that in mind when comparing results across countries.
The margin of sampling error at 95% confidence for aggregate results is +/- 2.8 percentage points. Sampling error is larger for subgroups of the data,
such as individual countries where it is +/- 8.9 percentage points. As with any survey, sampling error is only one source of possible error. While non-
sampling error cannot be accurately calculated, precautionary steps were taken in all phases of the survey design, collection and processing of the data
to minimize its influence. Note: because data collection occurred via an online survey, in countries where Internet penetration is lower among
businesses, the non-sampling error could be higher.
CompTIA is responsible for all content contained in this series. Any questions regarding the study should be directed to CompTIA Market Research staff
at research@comptia.org.
CompTIA is a member of the Marketing Research Association (MRA) and adheres to the MRA’s Code of Market Research Ethics and Standards.
Key IT Priorities for Middle Eastern Businesses:
1. IT security
2. Updating aging computers/software
3. Automating business processes through technology
4. Data analytics/big data/business intelligence
5. Network infrastructure
Key Summary Points: Middle East
Key Stats for Middle East
$41,500 GDP per capita (PPP) | world rank: 24th
1.46% GDP growth forecast for 2013
69%
% of Middle Eastern executives expecting 2013
business conditions to be better than 2012
18.8m Total workforce
76% % of workforce employed in the services sector
0.426m Estimate of IT workforce* in core IT occupations
62%
% of Middle Eastern executives expecting to
increase IT staff headcount at their business in
2013
26.96m Internet users | world rank: 16th
27.38m Mobile phone users | world rank: 37th
95%
NET % of Middle Eastern executives indicating IT is
important to the success of their business
6.2% Planned increase in IT spending in 2013 (YOY)
Key Strategic Priorities for Middle Eastern Businesses:
1. Reach new customers
2. Improve staff productivity/capabilities
3. Innovate more effectively
Cybersecurity:
85% of Middle Eastern executives believe the cybersecurity threat level
is increasing. Additionally, 54% of Middle Eastern executives believe
human error is a growing factor in security security incidents: Top
human error related factors include:
1. Lack of security expertise with websites and applications
2. Inadequate resources – not enough IT staff
IT Skills Gaps:
85% of Middle Eastern executives indicate at least some degree of gaps
in IT skills at their business exists. For 52%, the reported skills gaps are
small, while for 33% the gaps are more extensive. Top negative effects
of IT skills gaps at Middle Eastern businesses:
1. Lower staff productivity
2. Poor customer service
IT Training and Certification:
94% of IT staff at Middle Eastern businesses engaged in some type of IT
training during the past 12 months.
1. 81% of Middle Eastern executives believe IT certifications will
increase in importance over the next two years; 18% believe IT
certifications’ importance will remain constant
2. 82% of Middle Eastern executives believe staff holding
certifications are more valuable to the organization and benefit
from having a common foundation of knowledge.
Sources used for above stats: CompTIA, IMF, CIA World Factbook, IDC
*See appendix for definition of core IT occupations
Detailed Findings: Business
and Technology Issues
Strategic Priorities Include Tech Component
Base: 1,244 business and IT executives from Brazil, Canada, France,
Germany, India, Japan, Mexico, Middle East, Thailand and the UK
Source: CompTIA International Technology Adoption and Workforce Issues study
20%
76%
4%
Overall
Middle East
95%
Top Strategic Priorities Among
Middle Eastern Businesses for 2013
NET
Unimportant
NET
Important
Neutral
1. Reach new customers
2. Improve staff productivity/capabilities
3. Innovate more effectively
4. Leverage technology to improve business
operations
5. Manage competitive threats
69% of Middle Eastern executives in this
CompTIA survey say business conditions are
improving and expect 2013 to be better than
2012.
86% expect to increase their expenditure on IT
products and services over the next 12 months.
Importance of Technology to Middle
Eastern Business Success Trends
Upwards
Many Businesses Seek to Improve Their Use of IT
2%
6%
25%
15%
Not at all close
Not that close
Moderately close
Very close
Exactly where
want to be
Degree to Which Middle Eastern
Businesses are “Where They Want
to Be” in Technology Utilization
1. IT security
1. Updating aging computers/software
1. Automating business processes through
technology
1. Data analytics/Big Data/Business
intelligence
2. Network infrastructure
3. Web/online presence
4. Data storage/back-up
5. Virtualization
6. Disaster recovery/business continuity
Top Technology Priorities Over Next 12
Months for Middle Eastern Businesses
Base: 125 Middle Eastern business and IT executives
Source: CompTIA International Technology Adoption and Workforce Issues study
52%
More than Half of Middle Eastern Businesses have
Adopted Cloud Computing to Some Degree
22% 21%
39%
17%18%
20%
40%
22%
Overall
Middle East
Key Hurdles to Cloud Adoption
for Middle Eastern Businesses
Cloud Computing Adoption Stage
Full use
stage
Experi-
mentation
stage
Evalu-
ation or
Investi-
gation
stage
Basic
aware-
ness
stage
50% Slow/unreliable Internet access
48% Security or data loss concerns
40% Challenges in developing staff expertise/
experience with cloud applications/solutions
38% Lack of local cloud service providers
33% Cloud services still unproven/untested
30% Difficulty in integrating/migrating legacy
applications to the cloud
29% Insufficient/unclear ROI
26% Unclear/costly government regulation
Base: 1,252 business and IT executives from Brazil, Canada, France,
Germany, India, Japan, Mexico, Middle East, Thailand and the UK
Source: CompTIA International Technology Adoption and Workforce Issues study
Cybersecurity Risks a Growing Concern
1%
2%
27%
44%
26%
2%
2%
10%
45% 53%
Decreasing
significantly
Decreasing
moderately
No change
Increasing
moderately
Increasing
significantly
Middle East
Overall
Overall, 85% of Middle Eastern
Businesses Believe the Security
Threat Level has Increased during
Past Two Years
1 Rise of social networking
2 Growing criminalization and organization of
hackers motivated by financial gain
1 More reliance on Internet-based
applications, i.e. cloud computing, software-as-
a-service
2 Sophistication of security threats exceeding IT
staff's expertise to thwart them
1 Volume of security threats exceeding capacity
to thwart them
2 Greater interconnectivity of
devices, systems, users
3 Continued use of legacy operating systems, web
browsers, etc.
Top Factors Cited by Middle Eastern
Businesses for Increasing Security Risks
Base: 1,256 business and IT executives from Brazil, Canada, France,
Germany, India, Japan, Mexico, Middle East, Thailand and the UK
Source: CompTIA International Technology Adoption and Workforce Issues study
40%
Human Error is Still a Security Risk Factor
46%
54%
NET increase in human
error as a security risk
factor
NET no change or
decrease in human
error as a security
factor
Top Drivers of Human Error as an
Rising Security Risk FactorAssessment of Human Error as
a Security Risk Factor
1. Lack of security expertise with websites and
applications
1. Inadequate resources - not enough IT staff time
to manage security threats
2. Failure of IT staff to follow security procedures
and policies
1. Lack of security expertise with
networks, servers and other infrastructure
1. General negligence/carelessness towards
security
1. Failure of staff to get up to speed with new
threats
Base: 125 Middle Eastern business and IT executives
Source: CompTIA International Technology Adoption and Workforce Issues study
Detailed Findings: IT Training
and Certification Issues
Majority of Middle Eastern Businesses Plan to Hire IT Staff in
2013; Most Expect Challenges in Finding Workers
5%
56%
39%
2%
36%
62%
Decrease in IT staff No… Increase in IT staff
Overall
Middle East
15%
85%
NET concerned
about IT labor
quantity or quality
NET not that
concerned about IT
labor quantity or
quality
Concern Over Ability to Hire IT Staff2013 Hiring Intent for IT Staff
Base: 1,252 business and IT executives from Brazil, Canada, France,
Germany, India, Japan, Mexico, Middle East, Thailand and the UK
Source: CompTIA International Technology Adoption and Workforce Issues study
Most Businesses Seek Improvement
on the IT Skills Front
2%
7%
24%
15%
Not at all close
Not that close
Moderately close
Very close
Exactly where
want to be
Assessment of how Close Middle
Eastern Businesses are to Where
They Want to be with the IT Skills
of Their IT Staff
53% Lower staff productivity
36% Poor customer service/customer
engagement
34% Speed to market with new
products or services
34% Ineffective security/defending
against malware
30% Ineffective innovation/new
product development
22% Lower sales/profitability
22% Inability to keep up with
competitors
Top Negative Impacts of IT Skills Gaps
Base: 125 Middle Eastern business and IT executives
Source: CompTIA International Technology Adoption and Workforce Issues study
52%
IT Skills Rating Among Middle Eastern Businesses
1. Customer service
2. Teamwork
3. Project management
4. Strong work ethic
5. Flexibility and adaptability
6. Verbal and written communication skills
7. Motivation/initiative
8. Analytical skills
9. Innovation / Creative problem solving
Top Rated “Soft” IT Skills
1. Networks / Infrastructure
2. Database/information management
3. Help Desk / IT support
4. Customer relationship management
5. Printers, copiers, multifunction devices
6. Storage / data back-up
7. Data analytics / Business intelligence
8. Web design/development
9. Server/data center management
10. Application development/processing
Top Rated IT Skills in Terms of
the Importance of Maintaining a
High Skill Level Among IT staff
Keep in mind, many emerging technologies, such as cloud or mobility, are important to businesses, but it may not yet be the highest
priority to ensure a high level of IT staff expertise. As businesses move along the adoption curve and engage in more advanced uses of
cloud and mobility, staff expertise in those areas increases. Additionally, in some areas such as security, businesses may rely on outside
experts for guidance, so building internal skills could be a lower priority.
Base: 125 Middle Eastern business and IT executives
Source: CompTIA International Technology Adoption and Workforce Issues study
Types of Training/Education Utilized
by IT Staff in Past 12 Months
11%
8%
30%
24%
40%
23%
38%
45%
6%
9%
23%
29%
44%
23%
42%
56%
No training or education
Some other type of training
Webinars / Online presentation
from an instructor or expert
Reading industry news, technical journals, etc.
E-learning / Online self-directed training
Additional college coursework
Attending industry conferences, workshops, etc.
Training course with an instructor /
Classroom instruction
Middle East
Overall
Base: 1,256 business and IT executives from Brazil, Canada, France,
Germany, India, Japan, Mexico, Middle East, Thailand and the UK
Source: CompTIA International Technology Adoption and Workforce Issues study
Policy Towards the Use of IT Certifications
21%
37%
34%
7%
30%
57%
No formal or informal position
towards the use of IT certifications
Informal – not required,
but valued and encouraged
Formal – IT certifications
required for certain IT staff
Middle East
Overall
Base: 1,241 business and IT executives from Brazil, Canada, France,
Germany, India, Japan, Mexico, Middle East, Thailand and the UK
Source: CompTIA International Technology Adoption and Workforce Issues study
Majority of Middle Eastern Businesses Expect IT
Certifications to Increase in Importance
Significant
Increase in
Importance
Increase in
Importance
NET
Decrease
NET Increase
in Importance
No Change
82% “Staff holding IT certifications are more
valuable to the organization”
82% “Teams of staff with IT certifications
benefit from having a common foundation
of knowledge”
78% “The organization is more secure from
malware/hackers”
77% “It’s important to test after training to
confirm knowledge gains”
76% “Staff with IT certifications perform at a
higher level than non-certified staff”
NET Agreement (agree +
strongly agree) to Statements
Expectations for Change in Importance of IT
Certifications Over Next Two Years
Base: 125 Middle Eastern business and IT executives
Source: CompTIA International Technology Adoption and Workforce Issues study
18%
43%
38%
Middle Eastern Businesses are Much More Likely to Agree to
Statements About IT Certifications Than Disagree
9%
8%
8%
3%
7%
7%
2%
18%
17%
15%
20%
15%
9%
17%
73%
74%
76%
77%
78%
82%
82%
Retention is higher among staff with IT
certifications than non-certified staff
Staff with IT certifications have proven expertise
Staff with IT certifications perform at a
higher level than non-certified staff
It’s important to test after training
to confirm knowledge gains
The organization is more secure from malware
and hackers due to staff with IT certifications
Staff holding IT certifications are
more valuable to the organization
Teams of staff with IT certifications benefit from
having a common foundation of knowledge
NET Disagree Neutral NET Agree
Base: 125 Middle Eastern business and IT executives
Source: CompTIA International Technology Adoption and Workforce Issues study
Appendix
U.S. Member Profile
19
Respondent Profile
18%
Information Technology (IT) (e.g. hardware, software, IT
services, consulting, reseller, telecom, distributor)
12% Manufacturing (other than IT related)
11% Professional services (other than IT related)
10% Retail/Wholesale (other than IT related)
6% Healthcare/Medical
6% Financial/Banking/Insurance
2% Media/Publishing/Entertainment
7% Government (federal, state, local)
5%
AMTUC (Agriculture, Mining, Transportation, Utilities,
Construction)
8% Education
3% Hospitality
13% Other industry
Primary Industry
6% 1 – 4 employees
5% 5 – 9
11% 10 – 49
17% 50 – 99
31% 100 – 499
14% 500 – 999
16% 1,000 or more employees
Staff Size
Base: 1,256 business and IT executives from Brazil, Canada, France,
Germany, India, Japan, Mexico, Middle East, Thailand and the UK
14%
Executive Management (CEO, President, Managing Director,
Owner, etc.)
16%
Senior Management – IT function (CIO, CSO, VP of IT-related
function, etc.)
20%
Middle Management – IT function (Director, Manager,
Team Leader etc.)
12% Staff level – IT function
7%
Senior Management – business function (CFO, VP, GM of
business function)
18%
Middle Management – business function (Director,
Manager, Team Leader etc.)
8% Staff level – business function
2% Business Consultant
3% IT Consultant
Job Role
95% Setting or influencing technology-related strategies*
94%
Installing or managing hardware, software, communications
and other technology*
94%
Purchasing or working with vendors, providers or
consultants of technology products and services*
82% Hiring or managing IT staff
Involvement in Tech (NET very + somewhat involved)
*To qualify for the survey, respondents had to be very involved or somewhat involved in
at least two of these areas, with the majority of respondents being very involved.
Note: A mix of industries, company sizes, and job roles
were targeted for this study.
Defining Core IT Occupations
• Computer Support Specialists
• Software Developers, Applications
• Computer Systems Analysts
• Software Developers, Systems Software
• Network and Computer Systems Administrators
• Computer Programmers
• Computer and Information Systems Managers
• Information Security Analysts, Web Dev., and Computer Network Architects
• Computer Occupations, All Other
• Database Administrators
• Computer Hardware Engineers
• Computer and Information Research Scientists
• Computer Support Specialists
For the purposes of this study, core IT occupations include positions related to the list below. In this study, certain
telecommunications occupations were excluded, such as positions responsible for installing or maintaining cellular
towers. Additionally, this study excludes ‘knowledge worker’ type positions, such as technical writer, graphic
designer or business analyst.
comptia.org
Want to know more?
As the voice of the IT industry, CompTIA has hundreds
of tools, market intelligence reports and business
training programs to help IT organizations grow through
education, certification, advocacy and philanthropy.
Check it out at www.comptia.org.
Want to know about our research on the IT workforce?
Visit http://www.comptia.org/research/it-workforce.aspx.

More Related Content

What's hot

Report -comp_tia_intl_tech_adoption_workforce_issues_vfinal sflb
Report  -comp_tia_intl_tech_adoption_workforce_issues_vfinal sflbReport  -comp_tia_intl_tech_adoption_workforce_issues_vfinal sflb
Report -comp_tia_intl_tech_adoption_workforce_issues_vfinal sflbYakuzaazero
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey ReportDImension Data
 
Trends in Information Security
Trends in Information SecurityTrends in Information Security
Trends in Information SecurityCompTIA
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019Precisely
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee StudyHiten Sethi
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalSelectedPresentations
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-StudyTam Nguyen
 
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Precisely
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security RisksChris Ross
 
Sharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesSharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesThe Economist Media Businesses
 
Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0isc2-hellenic
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2jmariani14
 
Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Emily Brady
 
New IT Survey: UK
New IT Survey: UKNew IT Survey: UK
New IT Survey: UKSolarWinds
 
SolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds
 
The 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends ReportThe 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends ReportibossCyber
 

What's hot (20)

Report -comp_tia_intl_tech_adoption_workforce_issues_vfinal sflb
Report  -comp_tia_intl_tech_adoption_workforce_issues_vfinal sflbReport  -comp_tia_intl_tech_adoption_workforce_issues_vfinal sflb
Report -comp_tia_intl_tech_adoption_workforce_issues_vfinal sflb
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report
 
Trends in Information Security
Trends in Information SecurityTrends in Information Security
Trends in Information Security
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Unlocking High Fidelity Security
Unlocking High Fidelity SecurityUnlocking High Fidelity Security
Unlocking High Fidelity Security
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee Study
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - final
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study
 
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security Risks
 
EMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-Security
 
Sharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesSharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breaches
 
Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2
 
Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16
 
New IT Survey: UK
New IT Survey: UKNew IT Survey: UK
New IT Survey: UK
 
SolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity Survey
 
2015 IA survey - Protiviti
2015 IA survey - Protiviti2015 IA survey - Protiviti
2015 IA survey - Protiviti
 
The 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends ReportThe 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends Report
 

Similar to International Technology Adoption & Workforce Issues Study - Middle East Summary

International Technology Adoption & Workforce Issues Study - German Summary
International Technology Adoption & Workforce Issues Study - German SummaryInternational Technology Adoption & Workforce Issues Study - German Summary
International Technology Adoption & Workforce Issues Study - German SummaryCompTIA
 
CompTIA Brazil Research Summary vfinal
CompTIA  Brazil Research Summary vfinalCompTIA  Brazil Research Summary vfinal
CompTIA Brazil Research Summary vfinalAssespro Nacional
 
State of IT Skills Gap 2014 Summary
State of IT Skills Gap 2014 SummaryState of IT Skills Gap 2014 Summary
State of IT Skills Gap 2014 SummaryCompTIA
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA
 
Clarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdfClarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdfMichelleTartalio
 
CompTIA 2014 IT Trends in Review
CompTIA 2014 IT Trends in ReviewCompTIA 2014 IT Trends in Review
CompTIA 2014 IT Trends in ReviewCompTIA
 
CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017CompTIA
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfIDG
 
PwC Transforming Internal Audit to Drive Digital Value
PwC Transforming Internal Audit to Drive Digital ValuePwC Transforming Internal Audit to Drive Digital Value
PwC Transforming Internal Audit to Drive Digital ValueEileen Chan
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015Capgemini
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowMapR Technologies
 
2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index Insight
 
Data Trends for 2019: Extracting Value from Data
Data Trends for 2019: Extracting Value from DataData Trends for 2019: Extracting Value from Data
Data Trends for 2019: Extracting Value from DataPrecisely
 
New Horizons - 2019 State of IT Training Report
New Horizons - 2019 State of IT Training ReportNew Horizons - 2019 State of IT Training Report
New Horizons - 2019 State of IT Training ReportTynan Fischer
 
Thinking out of the toolbox full deck
Thinking out of the toolbox full deckThinking out of the toolbox full deck
Thinking out of the toolbox full deckSusanna Harper
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016Accenture Operations
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudSymantec
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22IDG
 
IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?Eryk Budi Pratama
 

Similar to International Technology Adoption & Workforce Issues Study - Middle East Summary (20)

International Technology Adoption & Workforce Issues Study - German Summary
International Technology Adoption & Workforce Issues Study - German SummaryInternational Technology Adoption & Workforce Issues Study - German Summary
International Technology Adoption & Workforce Issues Study - German Summary
 
CompTIA Brazil Research Summary vfinal
CompTIA  Brazil Research Summary vfinalCompTIA  Brazil Research Summary vfinal
CompTIA Brazil Research Summary vfinal
 
State of IT Skills Gap 2014 Summary
State of IT Skills Gap 2014 SummaryState of IT Skills Gap 2014 Summary
State of IT Skills Gap 2014 Summary
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
 
Clarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdfClarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdf
 
CompTIA 2014 IT Trends in Review
CompTIA 2014 IT Trends in ReviewCompTIA 2014 IT Trends in Review
CompTIA 2014 IT Trends in Review
 
CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
PwC Transforming Internal Audit to Drive Digital Value
PwC Transforming Internal Audit to Drive Digital ValuePwC Transforming Internal Audit to Drive Digital Value
PwC Transforming Internal Audit to Drive Digital Value
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 
2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index
 
Data Trends for 2019: Extracting Value from Data
Data Trends for 2019: Extracting Value from DataData Trends for 2019: Extracting Value from Data
Data Trends for 2019: Extracting Value from Data
 
New Horizons - 2019 State of IT Training Report
New Horizons - 2019 State of IT Training ReportNew Horizons - 2019 State of IT Training Report
New Horizons - 2019 State of IT Training Report
 
Thinking out of the toolbox full deck
Thinking out of the toolbox full deckThinking out of the toolbox full deck
Thinking out of the toolbox full deck
 
Prevent & Protect
Prevent & ProtectPrevent & Protect
Prevent & Protect
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22
 
IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?
 

More from CompTIA

CompTIA IT Employment Tracker – December 2021
CompTIA IT Employment Tracker –  December 2021CompTIA IT Employment Tracker –  December 2021
CompTIA IT Employment Tracker – December 2021CompTIA
 
CompTIA IT Employment Tracker – November 2021
CompTIA IT Employment Tracker –  November 2021CompTIA IT Employment Tracker –  November 2021
CompTIA IT Employment Tracker – November 2021CompTIA
 
CompTIA IT Employment Tracker – October 2021
CompTIA IT Employment Tracker –  October 2021CompTIA IT Employment Tracker –  October 2021
CompTIA IT Employment Tracker – October 2021CompTIA
 
CompTIA IT Employment Tracker – September 2021
CompTIA IT Employment Tracker –  September 2021CompTIA IT Employment Tracker –  September 2021
CompTIA IT Employment Tracker – September 2021CompTIA
 
CompTIA IT Employment Tracker – July 2021
CompTIA IT Employment Tracker –  July 2021CompTIA IT Employment Tracker –  July 2021
CompTIA IT Employment Tracker – July 2021CompTIA
 
CompTIA IT Employment Tracker – June 2021
CompTIA IT Employment Tracker –  June 2021CompTIA IT Employment Tracker –  June 2021
CompTIA IT Employment Tracker – June 2021CompTIA
 
Trends in Automation 2021
Trends in Automation 2021Trends in Automation 2021
Trends in Automation 2021CompTIA
 
CompTIA IT Employment Tracker – May 2021
CompTIA IT Employment Tracker –  May 2021CompTIA IT Employment Tracker –  May 2021
CompTIA IT Employment Tracker – May 2021CompTIA
 
CompTIA IT Employment Tracker – April 2021
CompTIA IT Employment Tracker –  April 2021CompTIA IT Employment Tracker –  April 2021
CompTIA IT Employment Tracker – April 2021CompTIA
 
IT Operations and Emerging Technology
IT Operations and Emerging TechnologyIT Operations and Emerging Technology
IT Operations and Emerging TechnologyCompTIA
 
CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021CompTIA
 
Help Desk Trends
Help Desk TrendsHelp Desk Trends
Help Desk TrendsCompTIA
 
CompTIA IT Employment Tracker – February 2021
CompTIA IT Employment Tracker –  February 2021CompTIA IT Employment Tracker –  February 2021
CompTIA IT Employment Tracker – February 2021CompTIA
 
CompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry OutlookCompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry OutlookCompTIA
 
CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021CompTIA
 
CompTIA IT Employment Tracker – November 2020
CompTIA IT Employment Tracker –  November 2020CompTIA IT Employment Tracker –  November 2020
CompTIA IT Employment Tracker – November 2020CompTIA
 
CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020CompTIA
 
CompTIA IT Employment Tracker – September 2020
CompTIA IT Employment Tracker –  September 2020CompTIA IT Employment Tracker –  September 2020
CompTIA IT Employment Tracker – September 2020CompTIA
 
CompTIA IT Employment Tracker – August 2020
CompTIA IT Employment Tracker –  August 2020CompTIA IT Employment Tracker –  August 2020
CompTIA IT Employment Tracker – August 2020CompTIA
 
CompTIA IT Employment Tracker – July 2020
CompTIA IT Employment Tracker –  July 2020CompTIA IT Employment Tracker –  July 2020
CompTIA IT Employment Tracker – July 2020CompTIA
 

More from CompTIA (20)

CompTIA IT Employment Tracker – December 2021
CompTIA IT Employment Tracker –  December 2021CompTIA IT Employment Tracker –  December 2021
CompTIA IT Employment Tracker – December 2021
 
CompTIA IT Employment Tracker – November 2021
CompTIA IT Employment Tracker –  November 2021CompTIA IT Employment Tracker –  November 2021
CompTIA IT Employment Tracker – November 2021
 
CompTIA IT Employment Tracker – October 2021
CompTIA IT Employment Tracker –  October 2021CompTIA IT Employment Tracker –  October 2021
CompTIA IT Employment Tracker – October 2021
 
CompTIA IT Employment Tracker – September 2021
CompTIA IT Employment Tracker –  September 2021CompTIA IT Employment Tracker –  September 2021
CompTIA IT Employment Tracker – September 2021
 
CompTIA IT Employment Tracker – July 2021
CompTIA IT Employment Tracker –  July 2021CompTIA IT Employment Tracker –  July 2021
CompTIA IT Employment Tracker – July 2021
 
CompTIA IT Employment Tracker – June 2021
CompTIA IT Employment Tracker –  June 2021CompTIA IT Employment Tracker –  June 2021
CompTIA IT Employment Tracker – June 2021
 
Trends in Automation 2021
Trends in Automation 2021Trends in Automation 2021
Trends in Automation 2021
 
CompTIA IT Employment Tracker – May 2021
CompTIA IT Employment Tracker –  May 2021CompTIA IT Employment Tracker –  May 2021
CompTIA IT Employment Tracker – May 2021
 
CompTIA IT Employment Tracker – April 2021
CompTIA IT Employment Tracker –  April 2021CompTIA IT Employment Tracker –  April 2021
CompTIA IT Employment Tracker – April 2021
 
IT Operations and Emerging Technology
IT Operations and Emerging TechnologyIT Operations and Emerging Technology
IT Operations and Emerging Technology
 
CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021
 
Help Desk Trends
Help Desk TrendsHelp Desk Trends
Help Desk Trends
 
CompTIA IT Employment Tracker – February 2021
CompTIA IT Employment Tracker –  February 2021CompTIA IT Employment Tracker –  February 2021
CompTIA IT Employment Tracker – February 2021
 
CompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry OutlookCompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry Outlook
 
CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021
 
CompTIA IT Employment Tracker – November 2020
CompTIA IT Employment Tracker –  November 2020CompTIA IT Employment Tracker –  November 2020
CompTIA IT Employment Tracker – November 2020
 
CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020
 
CompTIA IT Employment Tracker – September 2020
CompTIA IT Employment Tracker –  September 2020CompTIA IT Employment Tracker –  September 2020
CompTIA IT Employment Tracker – September 2020
 
CompTIA IT Employment Tracker – August 2020
CompTIA IT Employment Tracker –  August 2020CompTIA IT Employment Tracker –  August 2020
CompTIA IT Employment Tracker – August 2020
 
CompTIA IT Employment Tracker – July 2020
CompTIA IT Employment Tracker –  July 2020CompTIA IT Employment Tracker –  July 2020
CompTIA IT Employment Tracker – July 2020
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

International Technology Adoption & Workforce Issues Study - Middle East Summary

  • 1. International Technology Adoption & Workforce Issues Study Summary for Middle East
  • 2. About this Research CompTIA’s International Technology Adoption and Workforce Issues study was conducted to collect and share information on technology adoption and workforce trends across several countries. The objectives of this research include: • Explore business and information technology (IT) priorities among organizations • Examine the usage of key technologies/solutions and IT services such as security and cloud computing • Identify which IT skills are most important to employers and if there are any skills gap issues or staffing concerns • Evaluate professional development practices such as training and certification The data for this study was collected via a quantitative online survey conducted February 22 to March 23, 2013 among 1,256 IT and business executives directly involved in setting or executing information technology policies and processes within their organizations. The 10 countries covered in this study include: Brazil (n=125); Canada (n=125); France (n=125); Germany (n=131); India (n=125); Japan (n=125); Mexico (n=125); Middle East Subset (Oman, Saudi Arabia, United Arab Emirates) (n=125); Thailand (n=125); United Kingdom (n=125) Surveys were localized and translated to allow respondents to participate in their native language. Additionally, precautions were taken to minimize misinterpretations of questions. However, research has shown, cultural differences exist and can affect responses to certain question types, such as 5- point satisfaction rating questions. Viewers of this report should keep that in mind when comparing results across countries. The margin of sampling error at 95% confidence for aggregate results is +/- 2.8 percentage points. Sampling error is larger for subgroups of the data, such as individual countries where it is +/- 8.9 percentage points. As with any survey, sampling error is only one source of possible error. While non- sampling error cannot be accurately calculated, precautionary steps were taken in all phases of the survey design, collection and processing of the data to minimize its influence. Note: because data collection occurred via an online survey, in countries where Internet penetration is lower among businesses, the non-sampling error could be higher. CompTIA is responsible for all content contained in this series. Any questions regarding the study should be directed to CompTIA Market Research staff at research@comptia.org. CompTIA is a member of the Marketing Research Association (MRA) and adheres to the MRA’s Code of Market Research Ethics and Standards.
  • 3. Key IT Priorities for Middle Eastern Businesses: 1. IT security 2. Updating aging computers/software 3. Automating business processes through technology 4. Data analytics/big data/business intelligence 5. Network infrastructure Key Summary Points: Middle East Key Stats for Middle East $41,500 GDP per capita (PPP) | world rank: 24th 1.46% GDP growth forecast for 2013 69% % of Middle Eastern executives expecting 2013 business conditions to be better than 2012 18.8m Total workforce 76% % of workforce employed in the services sector 0.426m Estimate of IT workforce* in core IT occupations 62% % of Middle Eastern executives expecting to increase IT staff headcount at their business in 2013 26.96m Internet users | world rank: 16th 27.38m Mobile phone users | world rank: 37th 95% NET % of Middle Eastern executives indicating IT is important to the success of their business 6.2% Planned increase in IT spending in 2013 (YOY) Key Strategic Priorities for Middle Eastern Businesses: 1. Reach new customers 2. Improve staff productivity/capabilities 3. Innovate more effectively Cybersecurity: 85% of Middle Eastern executives believe the cybersecurity threat level is increasing. Additionally, 54% of Middle Eastern executives believe human error is a growing factor in security security incidents: Top human error related factors include: 1. Lack of security expertise with websites and applications 2. Inadequate resources – not enough IT staff IT Skills Gaps: 85% of Middle Eastern executives indicate at least some degree of gaps in IT skills at their business exists. For 52%, the reported skills gaps are small, while for 33% the gaps are more extensive. Top negative effects of IT skills gaps at Middle Eastern businesses: 1. Lower staff productivity 2. Poor customer service IT Training and Certification: 94% of IT staff at Middle Eastern businesses engaged in some type of IT training during the past 12 months. 1. 81% of Middle Eastern executives believe IT certifications will increase in importance over the next two years; 18% believe IT certifications’ importance will remain constant 2. 82% of Middle Eastern executives believe staff holding certifications are more valuable to the organization and benefit from having a common foundation of knowledge. Sources used for above stats: CompTIA, IMF, CIA World Factbook, IDC *See appendix for definition of core IT occupations
  • 5. Strategic Priorities Include Tech Component Base: 1,244 business and IT executives from Brazil, Canada, France, Germany, India, Japan, Mexico, Middle East, Thailand and the UK Source: CompTIA International Technology Adoption and Workforce Issues study 20% 76% 4% Overall Middle East 95% Top Strategic Priorities Among Middle Eastern Businesses for 2013 NET Unimportant NET Important Neutral 1. Reach new customers 2. Improve staff productivity/capabilities 3. Innovate more effectively 4. Leverage technology to improve business operations 5. Manage competitive threats 69% of Middle Eastern executives in this CompTIA survey say business conditions are improving and expect 2013 to be better than 2012. 86% expect to increase their expenditure on IT products and services over the next 12 months. Importance of Technology to Middle Eastern Business Success Trends Upwards
  • 6. Many Businesses Seek to Improve Their Use of IT 2% 6% 25% 15% Not at all close Not that close Moderately close Very close Exactly where want to be Degree to Which Middle Eastern Businesses are “Where They Want to Be” in Technology Utilization 1. IT security 1. Updating aging computers/software 1. Automating business processes through technology 1. Data analytics/Big Data/Business intelligence 2. Network infrastructure 3. Web/online presence 4. Data storage/back-up 5. Virtualization 6. Disaster recovery/business continuity Top Technology Priorities Over Next 12 Months for Middle Eastern Businesses Base: 125 Middle Eastern business and IT executives Source: CompTIA International Technology Adoption and Workforce Issues study 52%
  • 7. More than Half of Middle Eastern Businesses have Adopted Cloud Computing to Some Degree 22% 21% 39% 17%18% 20% 40% 22% Overall Middle East Key Hurdles to Cloud Adoption for Middle Eastern Businesses Cloud Computing Adoption Stage Full use stage Experi- mentation stage Evalu- ation or Investi- gation stage Basic aware- ness stage 50% Slow/unreliable Internet access 48% Security or data loss concerns 40% Challenges in developing staff expertise/ experience with cloud applications/solutions 38% Lack of local cloud service providers 33% Cloud services still unproven/untested 30% Difficulty in integrating/migrating legacy applications to the cloud 29% Insufficient/unclear ROI 26% Unclear/costly government regulation Base: 1,252 business and IT executives from Brazil, Canada, France, Germany, India, Japan, Mexico, Middle East, Thailand and the UK Source: CompTIA International Technology Adoption and Workforce Issues study
  • 8. Cybersecurity Risks a Growing Concern 1% 2% 27% 44% 26% 2% 2% 10% 45% 53% Decreasing significantly Decreasing moderately No change Increasing moderately Increasing significantly Middle East Overall Overall, 85% of Middle Eastern Businesses Believe the Security Threat Level has Increased during Past Two Years 1 Rise of social networking 2 Growing criminalization and organization of hackers motivated by financial gain 1 More reliance on Internet-based applications, i.e. cloud computing, software-as- a-service 2 Sophistication of security threats exceeding IT staff's expertise to thwart them 1 Volume of security threats exceeding capacity to thwart them 2 Greater interconnectivity of devices, systems, users 3 Continued use of legacy operating systems, web browsers, etc. Top Factors Cited by Middle Eastern Businesses for Increasing Security Risks Base: 1,256 business and IT executives from Brazil, Canada, France, Germany, India, Japan, Mexico, Middle East, Thailand and the UK Source: CompTIA International Technology Adoption and Workforce Issues study 40%
  • 9. Human Error is Still a Security Risk Factor 46% 54% NET increase in human error as a security risk factor NET no change or decrease in human error as a security factor Top Drivers of Human Error as an Rising Security Risk FactorAssessment of Human Error as a Security Risk Factor 1. Lack of security expertise with websites and applications 1. Inadequate resources - not enough IT staff time to manage security threats 2. Failure of IT staff to follow security procedures and policies 1. Lack of security expertise with networks, servers and other infrastructure 1. General negligence/carelessness towards security 1. Failure of staff to get up to speed with new threats Base: 125 Middle Eastern business and IT executives Source: CompTIA International Technology Adoption and Workforce Issues study
  • 10. Detailed Findings: IT Training and Certification Issues
  • 11. Majority of Middle Eastern Businesses Plan to Hire IT Staff in 2013; Most Expect Challenges in Finding Workers 5% 56% 39% 2% 36% 62% Decrease in IT staff No… Increase in IT staff Overall Middle East 15% 85% NET concerned about IT labor quantity or quality NET not that concerned about IT labor quantity or quality Concern Over Ability to Hire IT Staff2013 Hiring Intent for IT Staff Base: 1,252 business and IT executives from Brazil, Canada, France, Germany, India, Japan, Mexico, Middle East, Thailand and the UK Source: CompTIA International Technology Adoption and Workforce Issues study
  • 12. Most Businesses Seek Improvement on the IT Skills Front 2% 7% 24% 15% Not at all close Not that close Moderately close Very close Exactly where want to be Assessment of how Close Middle Eastern Businesses are to Where They Want to be with the IT Skills of Their IT Staff 53% Lower staff productivity 36% Poor customer service/customer engagement 34% Speed to market with new products or services 34% Ineffective security/defending against malware 30% Ineffective innovation/new product development 22% Lower sales/profitability 22% Inability to keep up with competitors Top Negative Impacts of IT Skills Gaps Base: 125 Middle Eastern business and IT executives Source: CompTIA International Technology Adoption and Workforce Issues study 52%
  • 13. IT Skills Rating Among Middle Eastern Businesses 1. Customer service 2. Teamwork 3. Project management 4. Strong work ethic 5. Flexibility and adaptability 6. Verbal and written communication skills 7. Motivation/initiative 8. Analytical skills 9. Innovation / Creative problem solving Top Rated “Soft” IT Skills 1. Networks / Infrastructure 2. Database/information management 3. Help Desk / IT support 4. Customer relationship management 5. Printers, copiers, multifunction devices 6. Storage / data back-up 7. Data analytics / Business intelligence 8. Web design/development 9. Server/data center management 10. Application development/processing Top Rated IT Skills in Terms of the Importance of Maintaining a High Skill Level Among IT staff Keep in mind, many emerging technologies, such as cloud or mobility, are important to businesses, but it may not yet be the highest priority to ensure a high level of IT staff expertise. As businesses move along the adoption curve and engage in more advanced uses of cloud and mobility, staff expertise in those areas increases. Additionally, in some areas such as security, businesses may rely on outside experts for guidance, so building internal skills could be a lower priority. Base: 125 Middle Eastern business and IT executives Source: CompTIA International Technology Adoption and Workforce Issues study
  • 14. Types of Training/Education Utilized by IT Staff in Past 12 Months 11% 8% 30% 24% 40% 23% 38% 45% 6% 9% 23% 29% 44% 23% 42% 56% No training or education Some other type of training Webinars / Online presentation from an instructor or expert Reading industry news, technical journals, etc. E-learning / Online self-directed training Additional college coursework Attending industry conferences, workshops, etc. Training course with an instructor / Classroom instruction Middle East Overall Base: 1,256 business and IT executives from Brazil, Canada, France, Germany, India, Japan, Mexico, Middle East, Thailand and the UK Source: CompTIA International Technology Adoption and Workforce Issues study
  • 15. Policy Towards the Use of IT Certifications 21% 37% 34% 7% 30% 57% No formal or informal position towards the use of IT certifications Informal – not required, but valued and encouraged Formal – IT certifications required for certain IT staff Middle East Overall Base: 1,241 business and IT executives from Brazil, Canada, France, Germany, India, Japan, Mexico, Middle East, Thailand and the UK Source: CompTIA International Technology Adoption and Workforce Issues study
  • 16. Majority of Middle Eastern Businesses Expect IT Certifications to Increase in Importance Significant Increase in Importance Increase in Importance NET Decrease NET Increase in Importance No Change 82% “Staff holding IT certifications are more valuable to the organization” 82% “Teams of staff with IT certifications benefit from having a common foundation of knowledge” 78% “The organization is more secure from malware/hackers” 77% “It’s important to test after training to confirm knowledge gains” 76% “Staff with IT certifications perform at a higher level than non-certified staff” NET Agreement (agree + strongly agree) to Statements Expectations for Change in Importance of IT Certifications Over Next Two Years Base: 125 Middle Eastern business and IT executives Source: CompTIA International Technology Adoption and Workforce Issues study 18% 43% 38%
  • 17. Middle Eastern Businesses are Much More Likely to Agree to Statements About IT Certifications Than Disagree 9% 8% 8% 3% 7% 7% 2% 18% 17% 15% 20% 15% 9% 17% 73% 74% 76% 77% 78% 82% 82% Retention is higher among staff with IT certifications than non-certified staff Staff with IT certifications have proven expertise Staff with IT certifications perform at a higher level than non-certified staff It’s important to test after training to confirm knowledge gains The organization is more secure from malware and hackers due to staff with IT certifications Staff holding IT certifications are more valuable to the organization Teams of staff with IT certifications benefit from having a common foundation of knowledge NET Disagree Neutral NET Agree Base: 125 Middle Eastern business and IT executives Source: CompTIA International Technology Adoption and Workforce Issues study
  • 19. U.S. Member Profile 19 Respondent Profile 18% Information Technology (IT) (e.g. hardware, software, IT services, consulting, reseller, telecom, distributor) 12% Manufacturing (other than IT related) 11% Professional services (other than IT related) 10% Retail/Wholesale (other than IT related) 6% Healthcare/Medical 6% Financial/Banking/Insurance 2% Media/Publishing/Entertainment 7% Government (federal, state, local) 5% AMTUC (Agriculture, Mining, Transportation, Utilities, Construction) 8% Education 3% Hospitality 13% Other industry Primary Industry 6% 1 – 4 employees 5% 5 – 9 11% 10 – 49 17% 50 – 99 31% 100 – 499 14% 500 – 999 16% 1,000 or more employees Staff Size Base: 1,256 business and IT executives from Brazil, Canada, France, Germany, India, Japan, Mexico, Middle East, Thailand and the UK 14% Executive Management (CEO, President, Managing Director, Owner, etc.) 16% Senior Management – IT function (CIO, CSO, VP of IT-related function, etc.) 20% Middle Management – IT function (Director, Manager, Team Leader etc.) 12% Staff level – IT function 7% Senior Management – business function (CFO, VP, GM of business function) 18% Middle Management – business function (Director, Manager, Team Leader etc.) 8% Staff level – business function 2% Business Consultant 3% IT Consultant Job Role 95% Setting or influencing technology-related strategies* 94% Installing or managing hardware, software, communications and other technology* 94% Purchasing or working with vendors, providers or consultants of technology products and services* 82% Hiring or managing IT staff Involvement in Tech (NET very + somewhat involved) *To qualify for the survey, respondents had to be very involved or somewhat involved in at least two of these areas, with the majority of respondents being very involved. Note: A mix of industries, company sizes, and job roles were targeted for this study.
  • 20. Defining Core IT Occupations • Computer Support Specialists • Software Developers, Applications • Computer Systems Analysts • Software Developers, Systems Software • Network and Computer Systems Administrators • Computer Programmers • Computer and Information Systems Managers • Information Security Analysts, Web Dev., and Computer Network Architects • Computer Occupations, All Other • Database Administrators • Computer Hardware Engineers • Computer and Information Research Scientists • Computer Support Specialists For the purposes of this study, core IT occupations include positions related to the list below. In this study, certain telecommunications occupations were excluded, such as positions responsible for installing or maintaining cellular towers. Additionally, this study excludes ‘knowledge worker’ type positions, such as technical writer, graphic designer or business analyst.
  • 21. comptia.org Want to know more? As the voice of the IT industry, CompTIA has hundreds of tools, market intelligence reports and business training programs to help IT organizations grow through education, certification, advocacy and philanthropy. Check it out at www.comptia.org. Want to know about our research on the IT workforce? Visit http://www.comptia.org/research/it-workforce.aspx.

Editor's Notes

  1. Q5. Your organization likely has many strategic priorities. Among the following, how do you rate each in terms of its priority to your organization over the next 12 months? |Q7. Next, please think specifically about the strategic role of technology to your organization. Overall, how important or unimportant is technology to the success of your organization?(This graph displays the Importance today, compared to two years ago)
  2. Q11. When considering your overall experience with the information technology (IT) in use at your organization, such as the technology products and services mentioned previously, how close or how far is your current experience to your ideal experience? |Q8 – Q9. Among the following possible information technology (IT) initiatives, how do you rate each in terms of its priority to your organization over the next 12 months?(15 total options presented)
  3. Q12. Getting back to the topic of cloud computing, how do you characterize your organization’s current use of cloud computing technologies, which may include public or private clouds, as well as IaaS, PaaS or SaaS? |Q13. What factors do you think are most likely to inhibit or slow your organization’s adoption or expansion of using cloud computing services?
  4. Q31. Getting back to the topic of information security, thinking about all the different types of security threats to your organization such as viruses, hacking, phishing and so on, how do you view the trend in the security threat level? Compared to two years ago, do you think the security threat level is increasing, decreasing, or staying about the same? |Q32. Among the following, what do you think are the key factors potentially contributing to concerns about cybersecurity today?
  5. Q33. The cause of many security incidents/breaches may entail a range of factors including shortcomings in the use of technology (e.g. anti-virus software or firewalls), human error or shortcoming in security policies. Thinking specifically about human error, how, if at all has this factor changed at your organization over the past two years? |Q34. You indicated that human error was at least moderately more of a factor in your organization’s security incidents/breaches. Which of the following reasons are the most significant causes?(n=53 who cited that human error was now moderately or significantly more of a factor)
  6. Q16.How, if at all, did the number of dedicated IT staff and/or staff that work on IT change at your organization last year? And, what is your expectation for change during 2013? (This graph answers the latter, i.e. for 2013) |Q24.Looking ahead over the next two years to any new hires your organization may make in any area of IT, such as the aforementioned specialties, how concerned or unconcerned are you about your ability to hire workers with the right set of skills, expertise and experience?
  7. Q17. Next, please think about the overall level of skill and expertise among your IT staff and/or those responsible for IT at your company. What is your assessment of the IT skills gap, if any, between what your organization needs from IT and the IT skills staff possess? |Q18. For the IT skills gaps at your organization today, what areas of the business have potentially been affected due to insufficient skill or expertise in any area of information technology?
  8. Q20. Going into further detail on the topic of IT skills, below are a list of items that relate to managing, implementing, troubleshooting or optimizing IT infrastructure and endpoints. Please indicate the items most important to your organization in terms of ensuring high levels of staff expertise and minimizing skills gaps.Q21.And for these areas that relate to managing, implementing, troubleshooting or optimizing databases and information management, please indicate the items most important to your organization in terms of ensuring high levels of staff expertise and minimizing skills gaps.Q22. For these areas as they relate to application development, software and web technologies, please indicate the same. |Q23.Lastly, on the soft skills (or non-technical skills) side, what items, if any, are of most importance to your organization in terms of ensuring high levels of staff expertise and minimizing skills gaps?
  9. Q25. Going into a bit more detail on the topic of training, which of the following, if any, has your organization utilized in the past 12 months for IT staff professional development and/or to address any IT skills gaps?
  10. 8% Don’t know – Overall5% Don’t know – Middle EastQ26. Next, there are many types of IT certifications and credentials which often accompany training and professional development for IT workers. Certifications are designed to confirm expertise in some technical area and are typically earned by passing an exam or other assessment; sometimes contingent on attending training classes. Examples of common IT industry certifications include:A+ or Security+ (CompTIA)CCNP (Cisco Certified Network Professional)CISSP (Certified Information Systems Security Professional)MCITP (Microsoft Certified IT Professional)PMP (Project Management Professional)How, if at all, does your organization use IT certifications?
  11. Q27. Based on your organization’s experience with IT staff that have IT certifications and those that do not, how much do you agree or disagree with the following statements? |Q31. Getting back to the topic of information security, thinking about all the different types of security threats to your organization such as viruses, hacking, phishing and so on, how do you view the trend in the security threat level? Compared to two years ago, do you think the security threat level is increasing, decreasing, or staying about the same?
  12. Q27. Based on your organization’s experience with IT staff that have IT certifications and those that do not, how much do you agree or disagree with the following statements?
  13. Q1-Q4