SlideShare a Scribd company logo
1 of 9
Download to read offline
Security Priorities Study 2023
Purpose and methodology
Source: Foundry Security Priorities Study, 2023
Survey goal
To gain a better understanding
of the various security projects
organizations are focused on
now and in the coming year. The
research also looks at the issues
that will demand the most time
and strategic thinking for IT
and security teams.
Total respondents: 790
Collection method: Online questionnaire
Number of questions: 35
Region
North America: 49%
EMEA: 18%
APAC: 33%
Average company size: 11,110 employees
IT Leadership: All survey respondents are
involved in IT and/or corporate/physical
security decisions.
Audience base: CIO, Computerworld, CSO,
InfoWorld and Network World site visitors, and
email invitations to audience base
Job titles
Top represented industries
36%
9%
22% 10%
18%
5%
IT/Security pro.
Exec. IT/security
Business
management
Other
2
4%
5%
5%
6%
7%
7%
9%
13%
25%
Telecommunications & Utilities
Services
Education
Retail, Wholesale and Distribution
Government/Nonprofit
Healthcare
Financial Services
Manufacturing
Technology
Mid-level IT
Security
management
3
Engagement with Board of Directors
Question: Does your CSO/CISO/top security executive have regular engagement with the Board of Directors ?
Source: Foundry Security Priorities Study, 2023
26%
22%
30%
7%
15%
Yes, engages multiple times
a month
Yes, engages once a month
Yes, engages once a quarter
Yes engages once a year
Has little to no engagement
with the Board of Directors
85%
of top IT security executives
have engagement with their
Board of Directors
7%
14%
17%
18%
19%
19%
20%
20%
21%
21%
23%
23%
24%
25%
26%
32%
33%
34%
36%
41%
Increase access to senior business leadership
Develop the next generation of security leaders
Improve understanding of potential internal/insider threats
Streamline compliance and privacy efforts
Shorten incident response time
Better leverage the data and analytics we collect
Improve management of third-party risks
Be appropriately prepared for unanticipated/unexpected risks
Respond to new security/privacy regulations
Develop a plan for leveraging AI to improve security effectiveness
Enhance identity and access controls
Balance risk and business opportunity
Improve understanding of external threats
Reduce complexity in IT security infrastructure
Address risks related to OT systems, IoT devices, and/or endpoints other than computers
Improve/increase security awareness among end-users through training
Improve security of our cloud data and systems
Upgrade IT and data security to boost corporate resiliency
Improve the protection of confidential and sensitive data
Be appropriately prepared to respond to a security incident
4
This year’s top security priorities
Question: What are your organizations top security priorities for the coming year?
Source: Foundry Security Priorities Study, 2023
10%
10%
12%
12%
13%
13%
13%
13%
15%
15%
16%
16%
19%
21%
21%
22%
22%
23%
24%
26%
Addressing the security of product(s) we produce
Addressing issues that arise from security vendor(s)
Gaining cooperation/buy-in from business leaders/stakeholders
Preparing for or addressing risks from cyber threats originating inside our organization
Addressing issues that arise from technology (non-security) vendor(s)
Responding to inquiries from senior management and/or the Board of Directors
Security of business operations and/or data hosted in the cloud
Institutional silos (little to no information sharing or collaboration to address threats)
Ensuring customer privacy/confidentiality
Addressing security risks associated with disruptive technologies
Employee retention/hiring skilled & qualified workers
Acceleration of digital transformation initiatives
Addressing the security of our operational technology environment(s)
Shadow IT (IT is not always aware when new technologies are implemented)
Preparing for or addressing risks from cyber threats originating outside our organization
Unanticipated business risks (pandemic, business interruption, workforce changes, etc.)
IT audit
Employee awareness and training issues
Budgetary constraints/demonstrating ROI
Meeting governance & compliance regulations
5
Challenges forcing security leaders to redirect their time
Question: What security-related challenges are most often forcing you to redirect your time and focus away from more strategic tasks?
Source: Foundry Security Priorities Study, 2023
55%
43%
2%
Security budget expectations
Question: Do you expect your organization’s overall security budget to increase, decrease or remain the same in the next 12 months?
Source: Foundry Security Priorities Study, 2023
Increase
Decrease
Remain the same
6
1,000+ 46%
<1,000 63%
1,000+ 50%
<1,000 36%
1,000+ 4%
<1,000 1%
7
Complexity emerges around security investments
69% 52% 49%
agree that understanding which
security tools and solutions fit
best within our company is
becoming more complex
agree that their organization
is more likely to consider a
security solution that uses
Artificial Intelligence (AI)
agree that their responsibilities
include addressing information
security issues outside of my
country or region
Source: Foundry Security Priorities Study, 2023
Question: Please rate your level of agreement with the following statements:
2%
15%
21%
23%
23%
26%
32%
36%
44%
Other
Improving enterprise system visibility
Authentication
Data loss prevention
Incident Response
Real-time risk prediction
Automation – alert and triage
Malware Detection
Threat Detection
8
Leveraging AI in security technologies
Question: In which areas are you leveraging Artificial Intelligence (AI) in your security technologies?
Source: Foundry Security Priorities Study, 2023
67%
are leveraging
Artificial Intelligence
in their security
technologies
1,000+ 79%
<1,000 55%
9
Continue the conversation
● To get results from Foundry research when it happens,
or any other news, follow us on Twitter: @FoundryIDG
● Sign up to receive our monthly marketing newsletter
at www.FoundryCo.com/newsletters/
● Visit us on LinkedIn here: www.linkedin.com/company/foundryidg
Additional ways to stay on top of information from Foundry:
For more information on the research, please contact
your Foundry sales executive or contact us.
For more information on content marketing and lead nurture, explore our
resources on this site under marketing tools. We have additional primary
research, blogs and white papers to make you smarter about tech decision
makers, and targeted products and programs

More Related Content

Similar to Security Priorities Sample Slides 2023.pdf

2021 IDG Security Priorities Study
2021 IDG Security Priorities Study2021 IDG Security Priorities Study
2021 IDG Security Priorities StudyIDG
 
IDG 2020 Security Priorities Research
IDG 2020 Security Priorities ResearchIDG 2020 Security Priorities Research
IDG 2020 Security Priorities ResearchIDG
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2jmariani14
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summarypatmisasi
 
Network Security Risks and Challenges for Enterprises
Network Security Risks and Challenges for EnterprisesNetwork Security Risks and Challenges for Enterprises
Network Security Risks and Challenges for EnterprisesSandeep Yadav
 
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Microsoft
 
How Will Your Cloud Strategy Impact Your Cyber Strategy?
How Will Your Cloud Strategy Impact Your Cyber Strategy?How Will Your Cloud Strategy Impact Your Cyber Strategy?
How Will Your Cloud Strategy Impact Your Cyber Strategy?BMC Software
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019Precisely
 
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Precisely
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security RisksChris Ross
 
The 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends ReportThe 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends ReportibossCyber
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionInfo-Tech Research Group
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarLumension
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...SolarWinds
 
CompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security TrendsCompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security TrendsCompTIA
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdfJose R
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 

Similar to Security Priorities Sample Slides 2023.pdf (20)

2021 IDG Security Priorities Study
2021 IDG Security Priorities Study2021 IDG Security Priorities Study
2021 IDG Security Priorities Study
 
IDG 2020 Security Priorities Research
IDG 2020 Security Priorities ResearchIDG 2020 Security Priorities Research
IDG 2020 Security Priorities Research
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
 
Network Security Risks and Challenges for Enterprises
Network Security Risks and Challenges for EnterprisesNetwork Security Risks and Challenges for Enterprises
Network Security Risks and Challenges for Enterprises
 
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
 
How Will Your Cloud Strategy Impact Your Cyber Strategy?
How Will Your Cloud Strategy Impact Your Cyber Strategy?How Will Your Cloud Strategy Impact Your Cyber Strategy?
How Will Your Cloud Strategy Impact Your Cyber Strategy?
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019
 
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
 
Organizational Security: When People are Involved
Organizational Security: When People are InvolvedOrganizational Security: When People are Involved
Organizational Security: When People are Involved
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security Risks
 
The 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends ReportThe 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends Report
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
EMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-Security
 
Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection Solution
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint Webinar
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
CompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security TrendsCompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security Trends
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 

More from IDG

Role and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdfRole and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdfIDG
 
2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdfIDG
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfIDG
 
CIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdfCIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdfIDG
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxState of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxIDG
 
State of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfState of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfIDG
 
R_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdfR_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdfIDG
 
Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022IDG
 
R-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdfR-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdfIDG
 
Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022IDG
 
R_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdfR_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdfIDG
 
Foundry Future of Work Study 2022
Foundry Future of Work Study 2022Foundry Future of Work Study 2022
Foundry Future of Work Study 2022IDG
 
Data & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdfData & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdfIDG
 
R if data_analytics_03.08.22
R if data_analytics_03.08.22R if data_analytics_03.08.22
R if data_analytics_03.08.22IDG
 
Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020IDG
 
Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021IDG
 
Foundry Digital Business Research 2021
Foundry Digital Business Research 2021Foundry Digital Business Research 2021
Foundry Digital Business Research 2021IDG
 
Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Role & Influence of the Technology Decision-Maker Research 2022Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Role & Influence of the Technology Decision-Maker Research 2022IDG
 
Foundry Customer Engagement Study 2021
Foundry Customer Engagement Study 2021Foundry Customer Engagement Study 2021
Foundry Customer Engagement Study 2021IDG
 
Stateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slidesStateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slidesIDG
 

More from IDG (20)

Role and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdfRole and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdf
 
2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
 
CIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdfCIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdf
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxState of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
 
State of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfState of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdf
 
R_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdfR_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdf
 
Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022
 
R-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdfR-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdf
 
Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022
 
R_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdfR_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdf
 
Foundry Future of Work Study 2022
Foundry Future of Work Study 2022Foundry Future of Work Study 2022
Foundry Future of Work Study 2022
 
Data & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdfData & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdf
 
R if data_analytics_03.08.22
R if data_analytics_03.08.22R if data_analytics_03.08.22
R if data_analytics_03.08.22
 
Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020
 
Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021
 
Foundry Digital Business Research 2021
Foundry Digital Business Research 2021Foundry Digital Business Research 2021
Foundry Digital Business Research 2021
 
Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Role & Influence of the Technology Decision-Maker Research 2022Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Role & Influence of the Technology Decision-Maker Research 2022
 
Foundry Customer Engagement Study 2021
Foundry Customer Engagement Study 2021Foundry Customer Engagement Study 2021
Foundry Customer Engagement Study 2021
 
Stateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slidesStateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slides
 

Recently uploaded

Aryabhata I, II of mathematics of both.pptx
Aryabhata I, II of mathematics of both.pptxAryabhata I, II of mathematics of both.pptx
Aryabhata I, II of mathematics of both.pptxtegevi9289
 
The Science of Landing Page Messaging.pdf
The Science of Landing Page Messaging.pdfThe Science of Landing Page Messaging.pdf
The Science of Landing Page Messaging.pdfVWO
 
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Social Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdfSocial Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdfSocial Samosa
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...aditipandeya
 
Kraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentationKraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentationtbatkhuu1
 
Situation Analysis | Management Company.
Situation Analysis | Management Company.Situation Analysis | Management Company.
Situation Analysis | Management Company.DanielaQuiroz63
 
Uncover Insightful User Journey Secrets Using GA4 Reports
Uncover Insightful User Journey Secrets Using GA4 ReportsUncover Insightful User Journey Secrets Using GA4 Reports
Uncover Insightful User Journey Secrets Using GA4 ReportsVWO
 
Unraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptxUnraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptxelizabethella096
 
Brand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdfBrand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdftbatkhuu1
 
Publuu Demo Presentation Brochure Online
Publuu Demo Presentation Brochure OnlinePubluu Demo Presentation Brochure Online
Publuu Demo Presentation Brochure OnlinePubluu
 
Google 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
Google 3rd-Party Cookie Deprecation [Update] + 5 Best StrategiesGoogle 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
Google 3rd-Party Cookie Deprecation [Update] + 5 Best StrategiesSearch Engine Journal
 
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024Richard Ingilby
 
What is Google Search Console and What is it provide?
What is Google Search Console and What is it provide?What is Google Search Console and What is it provide?
What is Google Search Console and What is it provide?riteshhsociall
 
How to utilize calculated properties in your HubSpot setups
How to utilize calculated properties in your HubSpot setupsHow to utilize calculated properties in your HubSpot setups
How to utilize calculated properties in your HubSpot setupsssuser4571da
 

Recently uploaded (20)

Aryabhata I, II of mathematics of both.pptx
Aryabhata I, II of mathematics of both.pptxAryabhata I, II of mathematics of both.pptx
Aryabhata I, II of mathematics of both.pptx
 
The Science of Landing Page Messaging.pdf
The Science of Landing Page Messaging.pdfThe Science of Landing Page Messaging.pdf
The Science of Landing Page Messaging.pdf
 
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
 
Social Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdfSocial Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdf
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
 
Kraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentationKraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentation
 
How to Create a Social Media Plan Like a Pro - Jordan Scheltgen
How to Create a Social Media Plan Like a Pro - Jordan ScheltgenHow to Create a Social Media Plan Like a Pro - Jordan Scheltgen
How to Create a Social Media Plan Like a Pro - Jordan Scheltgen
 
Situation Analysis | Management Company.
Situation Analysis | Management Company.Situation Analysis | Management Company.
Situation Analysis | Management Company.
 
Uncover Insightful User Journey Secrets Using GA4 Reports
Uncover Insightful User Journey Secrets Using GA4 ReportsUncover Insightful User Journey Secrets Using GA4 Reports
Uncover Insightful User Journey Secrets Using GA4 Reports
 
Creator Influencer Strategy Master Class - Corinne Rose Guirgis
Creator Influencer Strategy Master Class - Corinne Rose GuirgisCreator Influencer Strategy Master Class - Corinne Rose Guirgis
Creator Influencer Strategy Master Class - Corinne Rose Guirgis
 
Unraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptxUnraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptx
 
The Future of Brands on LinkedIn - Alison Kaltman
The Future of Brands on LinkedIn - Alison KaltmanThe Future of Brands on LinkedIn - Alison Kaltman
The Future of Brands on LinkedIn - Alison Kaltman
 
Brand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdfBrand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdf
 
Publuu Demo Presentation Brochure Online
Publuu Demo Presentation Brochure OnlinePubluu Demo Presentation Brochure Online
Publuu Demo Presentation Brochure Online
 
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel LeminTurn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
 
Google 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
Google 3rd-Party Cookie Deprecation [Update] + 5 Best StrategiesGoogle 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
Google 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
 
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
Moving beyond multi-touch attribution - DigiMarCon CanWest 2024
 
What is Google Search Console and What is it provide?
What is Google Search Console and What is it provide?What is Google Search Console and What is it provide?
What is Google Search Console and What is it provide?
 
Foundation First - Why Your Website and Content Matters - David Pisarek
Foundation First - Why Your Website and Content Matters - David PisarekFoundation First - Why Your Website and Content Matters - David Pisarek
Foundation First - Why Your Website and Content Matters - David Pisarek
 
How to utilize calculated properties in your HubSpot setups
How to utilize calculated properties in your HubSpot setupsHow to utilize calculated properties in your HubSpot setups
How to utilize calculated properties in your HubSpot setups
 

Security Priorities Sample Slides 2023.pdf

  • 2. Purpose and methodology Source: Foundry Security Priorities Study, 2023 Survey goal To gain a better understanding of the various security projects organizations are focused on now and in the coming year. The research also looks at the issues that will demand the most time and strategic thinking for IT and security teams. Total respondents: 790 Collection method: Online questionnaire Number of questions: 35 Region North America: 49% EMEA: 18% APAC: 33% Average company size: 11,110 employees IT Leadership: All survey respondents are involved in IT and/or corporate/physical security decisions. Audience base: CIO, Computerworld, CSO, InfoWorld and Network World site visitors, and email invitations to audience base Job titles Top represented industries 36% 9% 22% 10% 18% 5% IT/Security pro. Exec. IT/security Business management Other 2 4% 5% 5% 6% 7% 7% 9% 13% 25% Telecommunications & Utilities Services Education Retail, Wholesale and Distribution Government/Nonprofit Healthcare Financial Services Manufacturing Technology Mid-level IT Security management
  • 3. 3 Engagement with Board of Directors Question: Does your CSO/CISO/top security executive have regular engagement with the Board of Directors ? Source: Foundry Security Priorities Study, 2023 26% 22% 30% 7% 15% Yes, engages multiple times a month Yes, engages once a month Yes, engages once a quarter Yes engages once a year Has little to no engagement with the Board of Directors 85% of top IT security executives have engagement with their Board of Directors
  • 4. 7% 14% 17% 18% 19% 19% 20% 20% 21% 21% 23% 23% 24% 25% 26% 32% 33% 34% 36% 41% Increase access to senior business leadership Develop the next generation of security leaders Improve understanding of potential internal/insider threats Streamline compliance and privacy efforts Shorten incident response time Better leverage the data and analytics we collect Improve management of third-party risks Be appropriately prepared for unanticipated/unexpected risks Respond to new security/privacy regulations Develop a plan for leveraging AI to improve security effectiveness Enhance identity and access controls Balance risk and business opportunity Improve understanding of external threats Reduce complexity in IT security infrastructure Address risks related to OT systems, IoT devices, and/or endpoints other than computers Improve/increase security awareness among end-users through training Improve security of our cloud data and systems Upgrade IT and data security to boost corporate resiliency Improve the protection of confidential and sensitive data Be appropriately prepared to respond to a security incident 4 This year’s top security priorities Question: What are your organizations top security priorities for the coming year? Source: Foundry Security Priorities Study, 2023
  • 5. 10% 10% 12% 12% 13% 13% 13% 13% 15% 15% 16% 16% 19% 21% 21% 22% 22% 23% 24% 26% Addressing the security of product(s) we produce Addressing issues that arise from security vendor(s) Gaining cooperation/buy-in from business leaders/stakeholders Preparing for or addressing risks from cyber threats originating inside our organization Addressing issues that arise from technology (non-security) vendor(s) Responding to inquiries from senior management and/or the Board of Directors Security of business operations and/or data hosted in the cloud Institutional silos (little to no information sharing or collaboration to address threats) Ensuring customer privacy/confidentiality Addressing security risks associated with disruptive technologies Employee retention/hiring skilled & qualified workers Acceleration of digital transformation initiatives Addressing the security of our operational technology environment(s) Shadow IT (IT is not always aware when new technologies are implemented) Preparing for or addressing risks from cyber threats originating outside our organization Unanticipated business risks (pandemic, business interruption, workforce changes, etc.) IT audit Employee awareness and training issues Budgetary constraints/demonstrating ROI Meeting governance & compliance regulations 5 Challenges forcing security leaders to redirect their time Question: What security-related challenges are most often forcing you to redirect your time and focus away from more strategic tasks? Source: Foundry Security Priorities Study, 2023
  • 6. 55% 43% 2% Security budget expectations Question: Do you expect your organization’s overall security budget to increase, decrease or remain the same in the next 12 months? Source: Foundry Security Priorities Study, 2023 Increase Decrease Remain the same 6 1,000+ 46% <1,000 63% 1,000+ 50% <1,000 36% 1,000+ 4% <1,000 1%
  • 7. 7 Complexity emerges around security investments 69% 52% 49% agree that understanding which security tools and solutions fit best within our company is becoming more complex agree that their organization is more likely to consider a security solution that uses Artificial Intelligence (AI) agree that their responsibilities include addressing information security issues outside of my country or region Source: Foundry Security Priorities Study, 2023 Question: Please rate your level of agreement with the following statements:
  • 8. 2% 15% 21% 23% 23% 26% 32% 36% 44% Other Improving enterprise system visibility Authentication Data loss prevention Incident Response Real-time risk prediction Automation – alert and triage Malware Detection Threat Detection 8 Leveraging AI in security technologies Question: In which areas are you leveraging Artificial Intelligence (AI) in your security technologies? Source: Foundry Security Priorities Study, 2023 67% are leveraging Artificial Intelligence in their security technologies 1,000+ 79% <1,000 55%
  • 9. 9 Continue the conversation ● To get results from Foundry research when it happens, or any other news, follow us on Twitter: @FoundryIDG ● Sign up to receive our monthly marketing newsletter at www.FoundryCo.com/newsletters/ ● Visit us on LinkedIn here: www.linkedin.com/company/foundryidg Additional ways to stay on top of information from Foundry: For more information on the research, please contact your Foundry sales executive or contact us. For more information on content marketing and lead nurture, explore our resources on this site under marketing tools. We have additional primary research, blogs and white papers to make you smarter about tech decision makers, and targeted products and programs