SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
WHAT PRICE IT SECURITY?
AT A GLANCE

SECURITY EXPENDITURE

65% say spend on IT security has
increased in last 3 years.

65%

7.77% of IT budget is
dedicated to security

30%

Less than 5% = 30%
5%-10% = 41%
More than 10% = 29%

%

7.77

29%

And this is a common picture across
sector and scale of enterprise

The average increase
in spend is 27%.

41%

27%

AWARENESS OF SECURITY THREATS

Heightened awareness of threat correlates with higher expenditure
Enterprises spending
MORE on IT security than
3 years ago are MORE
concerned about the
threats employees bring:

82%

69%

10%

Enterprises spending MORE
than 10% of their overall IT
budget on security are
MORE concerned than the
lowest spenders (less than
5% of overall budget) about
threats such as:

86%

Employees’ attitude toward
security protocols

Malware
83%

74%

Use of personal cloud storage
such as Dropbox
76%

57%

45%

Use of personally-owned devices
63%

67%

62%

Use of personal cloud storage
such as Dropbox
65%

73%

Malicious external attacks
(not commercially motivated)
63%

45%

Use of mobile devices

57%

Internal threats/attacks

Percentage of spend categories recognising the factor as a threat or major threat

CONFIDENCE IN PROTECTION AGAINST THREATS

Low confidence in protection measures is highest where security
expenditure has increased

58%

of enterprises are
not entirely
conïŹdent of the
controls/protection
they have against
ANY security
threat.

More of those that have
increased spend in the last 3
years say that they are entirely
conïŹdent in some of their
protection measures than
those whose spend has stayed
the same or declined (48% vs
31%).

The threats most enterprises feel least protected
against are:
1. Employees' attitude toward security protocol (only 2% say they
are entirely conïŹdent)
2. Use of personal cloud storage such as Dropbox (10%)
3. Internal threats/attacks (11%)

Survey conducted in March 2013 by Vanson Bourne.
Responses of 100 senior IT decision-makers in UK
commercial enterprises (1000+ employees)

Weitere Àhnliche Inhalte

Was ist angesagt?

MobileSecurityInfographic_v3
MobileSecurityInfographic_v3MobileSecurityInfographic_v3
MobileSecurityInfographic_v3
Carlos Villafane
 
Ch 3 threats and responses
Ch 3 threats and responsesCh 3 threats and responses
Ch 3 threats and responses
Lenny Liu
 

Was ist angesagt? (20)

MobileSecurityInfographic_v3
MobileSecurityInfographic_v3MobileSecurityInfographic_v3
MobileSecurityInfographic_v3
 
Infographic 2014 smart_grid_cybersecurity_survey_smart_modular_technologies_z...
Infographic 2014 smart_grid_cybersecurity_survey_smart_modular_technologies_z...Infographic 2014 smart_grid_cybersecurity_survey_smart_modular_technologies_z...
Infographic 2014 smart_grid_cybersecurity_survey_smart_modular_technologies_z...
 
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
Palo Alto Networks Application Usage and Risk Report - Key Findings for Singa...
 
Mobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityMobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested Reality
 
Joseph Sukhbir, Global Head of Technology Risk at EMI Group - Business Contin...
Joseph Sukhbir, Global Head of Technology Risk at EMI Group - Business Contin...Joseph Sukhbir, Global Head of Technology Risk at EMI Group - Business Contin...
Joseph Sukhbir, Global Head of Technology Risk at EMI Group - Business Contin...
 
Verizon Data Breach Investigations Report (DBIR) 2017
Verizon Data Breach Investigations Report (DBIR) 2017Verizon Data Breach Investigations Report (DBIR) 2017
Verizon Data Breach Investigations Report (DBIR) 2017
 
Infosecurity Europe - Infographic
Infosecurity Europe - InfographicInfosecurity Europe - Infographic
Infosecurity Europe - Infographic
 
4 Facts Every Business Should Know About Phishing
4 Facts Every Business Should Know About Phishing4 Facts Every Business Should Know About Phishing
4 Facts Every Business Should Know About Phishing
 
Get Connected - Cyber Security Workshop, Prof Tim Watson
Get Connected - Cyber Security Workshop, Prof Tim WatsonGet Connected - Cyber Security Workshop, Prof Tim Watson
Get Connected - Cyber Security Workshop, Prof Tim Watson
 
Security Management Trends 2004
Security Management Trends 2004Security Management Trends 2004
Security Management Trends 2004
 
The growing threat to information security: a focus on ISM
The growing threat to information security: a focus on ISMThe growing threat to information security: a focus on ISM
The growing threat to information security: a focus on ISM
 
3 Perspectives Around Data Breaches
3 Perspectives Around Data Breaches3 Perspectives Around Data Breaches
3 Perspectives Around Data Breaches
 
10 Steps to Better Security Incident Detection
10 Steps to Better Security Incident Detection10 Steps to Better Security Incident Detection
10 Steps to Better Security Incident Detection
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
STUDY CYBER SECURITY IN AUSTRALIA
STUDY CYBER SECURITY IN AUSTRALIASTUDY CYBER SECURITY IN AUSTRALIA
STUDY CYBER SECURITY IN AUSTRALIA
 
JP Cybersecurity Awareness Cartoons
JP Cybersecurity Awareness CartoonsJP Cybersecurity Awareness Cartoons
JP Cybersecurity Awareness Cartoons
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
1whitepaper graphics
1whitepaper graphics1whitepaper graphics
1whitepaper graphics
 
Ch 3 threats and responses
Ch 3 threats and responsesCh 3 threats and responses
Ch 3 threats and responses
 
Insights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense ReportInsights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense Report
 

Ähnlich wie Vanson Bourne Infographic: IT Security

Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
IBM Security
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
IBM Security
 
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdftrellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
w2sdvzdjtz
 

Ähnlich wie Vanson Bourne Infographic: IT Security (20)

2018 State of Cyber Reslience in Healthcare
2018 State of Cyber Reslience in Healthcare2018 State of Cyber Reslience in Healthcare
2018 State of Cyber Reslience in Healthcare
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
I Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - ItaliaI Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - Italia
 
EMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-Security
 
Cost of Cybercrime 2017
Cost of Cybercrime 2017Cost of Cybercrime 2017
Cost of Cybercrime 2017
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
2017 cost of cyber crime study accenture
2017 cost of cyber crime study   accenture2017 cost of cyber crime study   accenture
2017 cost of cyber crime study accenture
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Most expensive IT Security Incidents
Most expensive IT Security IncidentsMost expensive IT Security Incidents
Most expensive IT Security Incidents
 
Information Security Career Day Presentation
Information Security Career Day PresentationInformation Security Career Day Presentation
Information Security Career Day Presentation
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber security
 
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdftrellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
 
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School	FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
 
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEXWIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 

Mehr von Vanson Bourne

Mehr von Vanson Bourne (20)

Vanson Bourne Research Report: Big Data
Vanson Bourne Research Report: Big DataVanson Bourne Research Report: Big Data
Vanson Bourne Research Report: Big Data
 
Vanson Bourne Infographic: Big Data
Vanson Bourne Infographic: Big DataVanson Bourne Infographic: Big Data
Vanson Bourne Infographic: Big Data
 
Vanson Bourne Research Report: Wearable Tech
Vanson Bourne Research Report: Wearable TechVanson Bourne Research Report: Wearable Tech
Vanson Bourne Research Report: Wearable Tech
 
Vanson Bourne Infographic: Wearable Tech
Vanson Bourne Infographic: Wearable TechVanson Bourne Infographic: Wearable Tech
Vanson Bourne Infographic: Wearable Tech
 
Vanson Bourne Key Findings: Wearable Tech
Vanson Bourne Key Findings: Wearable Tech Vanson Bourne Key Findings: Wearable Tech
Vanson Bourne Key Findings: Wearable Tech
 
Vanson Bourne Christmas Percents Infographic
Vanson Bourne Christmas Percents InfographicVanson Bourne Christmas Percents Infographic
Vanson Bourne Christmas Percents Infographic
 
Shadow IT 2014: Webcast Slides
Shadow IT 2014: Webcast SlidesShadow IT 2014: Webcast Slides
Shadow IT 2014: Webcast Slides
 
Vanson Bourne Data Summary: Shadow IT - BDMs
Vanson Bourne Data Summary: Shadow IT - BDMsVanson Bourne Data Summary: Shadow IT - BDMs
Vanson Bourne Data Summary: Shadow IT - BDMs
 
Vanson Bourne Data Summary: Shadow IT - IT Decision-Makers
Vanson Bourne Data Summary: Shadow IT - IT Decision-MakersVanson Bourne Data Summary: Shadow IT - IT Decision-Makers
Vanson Bourne Data Summary: Shadow IT - IT Decision-Makers
 
Vanson Bourne Case Study: CA Technologies
Vanson Bourne Case Study: CA TechnologiesVanson Bourne Case Study: CA Technologies
Vanson Bourne Case Study: CA Technologies
 
Vanson Bourne Case Study: IBM
Vanson Bourne Case Study: IBMVanson Bourne Case Study: IBM
Vanson Bourne Case Study: IBM
 
Vanson Bourne Case Study: Progress Software
Vanson Bourne Case Study: Progress SoftwareVanson Bourne Case Study: Progress Software
Vanson Bourne Case Study: Progress Software
 
Vanson Bourne Case Study: Spreckley Partners
Vanson Bourne Case Study: Spreckley PartnersVanson Bourne Case Study: Spreckley Partners
Vanson Bourne Case Study: Spreckley Partners
 
Vanson Bourne Case Study: Success Factors
Vanson Bourne Case Study: Success FactorsVanson Bourne Case Study: Success Factors
Vanson Bourne Case Study: Success Factors
 
Vanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTTVanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTT
 
Vanson Bourne Case Study: Porter Novelli
Vanson Bourne Case Study: Porter NovelliVanson Bourne Case Study: Porter Novelli
Vanson Bourne Case Study: Porter Novelli
 
Vanson Bourne Infographic: Mobile Strategy
Vanson Bourne Infographic: Mobile StrategyVanson Bourne Infographic: Mobile Strategy
Vanson Bourne Infographic: Mobile Strategy
 
Vanson Bourne White Paper: Market Research
Vanson Bourne White Paper: Market ResearchVanson Bourne White Paper: Market Research
Vanson Bourne White Paper: Market Research
 
Vanson Bourne Full Research Report: Directions in Tech Marketing
Vanson Bourne Full Research Report: Directions in Tech MarketingVanson Bourne Full Research Report: Directions in Tech Marketing
Vanson Bourne Full Research Report: Directions in Tech Marketing
 
Vanson Bourne Research Insight: Tech Marketing
Vanson Bourne Research Insight: Tech MarketingVanson Bourne Research Insight: Tech Marketing
Vanson Bourne Research Insight: Tech Marketing
 

KĂŒrzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

KĂŒrzlich hochgeladen (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Vanson Bourne Infographic: IT Security

  • 1. WHAT PRICE IT SECURITY? AT A GLANCE SECURITY EXPENDITURE 65% say spend on IT security has increased in last 3 years. 65% 7.77% of IT budget is dedicated to security 30% Less than 5% = 30% 5%-10% = 41% More than 10% = 29% % 7.77 29% And this is a common picture across sector and scale of enterprise The average increase in spend is 27%. 41% 27% AWARENESS OF SECURITY THREATS Heightened awareness of threat correlates with higher expenditure Enterprises spending MORE on IT security than 3 years ago are MORE concerned about the threats employees bring: 82% 69% 10% Enterprises spending MORE than 10% of their overall IT budget on security are MORE concerned than the lowest spenders (less than 5% of overall budget) about threats such as: 86% Employees’ attitude toward security protocols Malware 83% 74% Use of personal cloud storage such as Dropbox 76% 57% 45% Use of personally-owned devices 63% 67% 62% Use of personal cloud storage such as Dropbox 65% 73% Malicious external attacks (not commercially motivated) 63% 45% Use of mobile devices 57% Internal threats/attacks Percentage of spend categories recognising the factor as a threat or major threat CONFIDENCE IN PROTECTION AGAINST THREATS Low confidence in protection measures is highest where security expenditure has increased 58% of enterprises are not entirely conïŹdent of the controls/protection they have against ANY security threat. More of those that have increased spend in the last 3 years say that they are entirely conïŹdent in some of their protection measures than those whose spend has stayed the same or declined (48% vs 31%). The threats most enterprises feel least protected against are: 1. Employees' attitude toward security protocol (only 2% say they are entirely conïŹdent) 2. Use of personal cloud storage such as Dropbox (10%) 3. Internal threats/attacks (11%) Survey conducted in March 2013 by Vanson Bourne. Responses of 100 senior IT decision-makers in UK commercial enterprises (1000+ employees)