SlideShare ist ein Scribd-Unternehmen logo
1 von 19
International Trends in
Cybersecurity
April 2016
REMINDER: The complete International Trends in Cybersecurity report and 12 country
snapshots can be viewed free of charge at CompTIA.org (with simple registration)
The Importance of IT Security Continues to Grow
6%
18%
49%
27%
3%
18%
43%
35%
NET Lower No Change Moderately
Higher
Significantly
Higher
Today
Two Years
From Now
79%
NET of businesses
expect IT security to
become a higher priority
over the next two years
Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,509
NET Higher: Significantly Higher + Moderately Higher
NET Lower: Significantly Lower + Moderately Lower
International Summary
Satisfaction With Current Security Level
20%
28%
23%
56%
53%
54%
25%
20%
23%
Maturing Economies
Mature Economies
International Summary
NET
Satisfactory
77%
72%
80%
Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,509
Completely
Satisfactory
Mostly
Satisfactory
Adequate/
Unsatisfactory
NET Satisfactory: Completely + Mostly Satisfactory
Adequate/Unsatisfactory: Simply Adequate + Mostly Unsatisfactory + Completely Unsatisfactory
Note: see slide 18 for which countries are categorized
in Mature Economies vs. Maturing Economies.
Top Drivers for Changing IT Security Approach
1. Change in IT operations (e.g. cloud, mobility)
2. Reports of security breaches at other firms
3. Internal security breach or incident
4. Change in business operations or client base
5. Knowledge gained from training or certification
International Summary
1. Change in IT operations (e.g. cloud, mobility)
2. Reports of security breaches at other firms
3. Internal security breach or incident
4. Knowledge gained from training or certification
5. Change in business operations or client base
Mature Economies
Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,509
Maturing Economies
1. Change in IT operations (e.g. cloud, mobility)
2. Change in business operations or client base
3. Internal security breach or incident
4. Knowledge gained from training or certification
5. Reports of security breaches at other firms
Top Factors Impacting IT Security Practices
38%
40%
41%
45%
46%
46%
49%
32%
32%
37%
39%
37%
39%
39%
36%
37%
39%
42%
42%
43%
45%
Volume of security threats
Greater availability of hacking tools
Sophistication of security threats
More reliance on Internet applications
Greater tech interconnectivity
Growing organization of hackers
Rise of social networking
International
Summary
Mature
Economies
Maturing
Economies
Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,509
Top IT Security Concerns
1. Malware (e.g. viruses, worms, trojans)
2. Hacking (e.g. DoS attack)
3. Data loss/leakage
4. Physical security threats (e.g. device theft)
5. Privacy concerns
6. Social engineering/Phishing
7. Intentional abuse by insiders (e.g. staff)
8. Understanding security risks of emerging
areas
9. Regulatory compliance
10. Human error among general staff
Top Serious Concerns
Greatest Growth in Concern
(More Critical Today vs. Two Years Ago)
Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,509
International Summary
1. Data loss/leakage
2. Malware (e.g. viruses, worms, trojans)
3. Hacking (e.g. DoS attack)
4. Social engineering/Phishing
5. Understanding security risks of emerging
areas
6. Privacy concerns
7. Physical security threats (e.g. device theft)
8. Intentional abuse by insiders (e.g. staff)
9. Regulatory compliance
10. Human error among general staff
Mobile Security Incidents
18%
31%
33%
34%
40%
40%
31%
26%
20%
22%
22%
32%
24%
28%
28%
29%
32%
37%
None of the above
Violation of policy on corporate data
Employees disabling security features
Mobile phishing attack
Mobile malware
Lost device
International
Summary
Mature
Economies
Maturing
Economies
Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,509
76% of organizations overall self-report experiencing at least one of these mobile security events
Top 5 Concerns Over Mobile Security Threats
1. Open WiFi networks
2. Mobile-specific viruses or malware
3. USB flash drives
4. Theft or loss of corporate devices
5. Unauthorized apps
International Summary
1. Theft or loss of corporate devices
2. Open WiFi networks
3. Mobile-specific viruses or malware
4. Unauthorized apps
5. Social media
Mature Economies
Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,509
Maturing Economies
1. Open WiFi networks
2. USB flash drives
3. Mobile-specific viruses or malware
4. Theft or loss of corporate devices
5. Unauthorized apps
Experiences With Data Loss
28%
38%
34%
51%
29%
20%
41%
35%
24%
No/Don't know
Yes, probably
Yes, definitely
International Summary Mature Economies Maturing Economies
Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,509 and n=850 who had a loss
Many are aware of their company experiencing some type of loss of confidential data through
carelessness or negligence in the past 12 months
Types of Data Lost
• Employee data
• Financial data
• Customer records
• Intellectual property
Top Areas Where
Managers Plan to
Improve DLP
• Spyware prevention
• Consumer app restriction
• Mobile file encryption
• BYOD restriction
• Device safety policy
enforcement/creation
Self-Reported Occurrence of Security Breaches
27%
64%
9%
35%
58%
7%
22%
69%
9%
None 1-10 breaches > 10 breaches
International
Summary
Mature
Economies
Maturing
Economies
Over the past 12 months
61%
of all firms
experienced at
least one serious
breach
Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,509
73%
of all firms
experienced at least
one breach
Human Element a Major Part of Security Risk
42%
58%
Technology error
Human error
International Summary
Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,200 who had a security incident in the past 12 months
Top Human Error Sources
42% General carelessness
37% Failure to get up to speed on
new threats
37% Lack of expertise with websites
and applications
37% End user failure to follow
policies and procedures
36% Lack of expertise with networks,
servers and other infrastructure
34% IT staff failure to follow policies
and procedures
Human Error Becoming More of a Factor in Security
Breaches and Incidents
13%
19%
68%
13%
30%
57%
13%
23%
64%
NET technology error more of a factor
No change in the allocation
NET human error more of a
factor in security breaches
International Summary Mature Economies Maturing Economies
Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,200 who had a security breach in the past 12 months
NET More of a factor: Significantly More + Moderately More
23%
of organizations
where human
error is now
significantly
more of a factor
Human error is significantly more of a factor among firms in Maturing Economies (27%) vs.
those in Mature Economies (18%) now compared to two years ago
Utilization of Security Assessments and Training
Among Staff
6%
30%
33%
34%
34%
41%
45%
43%
10%
18%
22%
26%
35%
30%
34%
43%
8%
25%
28%
31%
35%
36%
41%
43%
None of the above
Ad hoc security experiments
Formal vulnerability assessments
Online course
Posted security policies
Random security audits
Ongoing security training program
New employee orientation
International
Summary
Mature
Economies
Maturing
Economies
Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,509
92% of companies overall use at least one of these formats to assess or improve security
knowledge among employees
Managers Value IT Security Certifications
80%
17%
3%
NET Valuable
Neutral
NET Not that Valuable
International
Summary
38% Very Valuable 68%
25%6%
NET Valuable Neutral NET Not that Valuable
Mature
Economies
25% Very Valuable
Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,246 managers/executives
NET Valuable: Very Valuable + Valuable
NET Not that Valuable: Not that Valuable + Not at all Valuable
Maturing
Economies
49% Very Valuable
89%
10%1%
99%
NET Important to
managers in Maturing
Economies (72% very
important)
The Importance of Testing After IT Security Training
4%
34%
63%
7%
42%
51%
1%
27%
72%
Not that
Important
Somewhat
Important
Very Important
International
Summary
Mature
Economies
Maturing
Economies
Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,246 managers/executives
96% NET of managers overall believe it is important (very + somewhat) to test
after IT security training to confirm knowledge gains
93%
NET Important to
managers in Mature
Economies (51% very
important)
NET Important: Very Important + Somewhat Important
Security Awareness Levels Among Employees
39%
52%9%
Advanced Basic Low priority
International Summary
Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,509
Top Potential Business Impacts of
Deficiencies in Security
Awareness
39% Unaware of areas where
company may be exposed
39% Incurred costs for (re)training
current workforce
37% Loss of business as a result of
security issues with customer
data
36% Failure to keep up with changes
in regulatory environment
36% Unaware of new trends in
security
Effectiveness of Security Training
Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,392 firms using security training
- “Continual training on new threats.”
- “Regular retraining.”
- “More comprehensive and formalised training.”
- “Keep it up to date.”
- “Regular reviews.”
- “Mandatory training.”
- “More tests of employees’ security understanding.”
- “A more strict regime and more random security audits.”
- “Have a particular person assigned for the training.”
- “More investment in new tech.”
- “More hands-on simulations of real-world breaches.”
- “There should be very strict policies be enforce on proper
training. Proper budgets for training.”
- “Shorter training sessions but more of them.”
- “Tests must be done every three months. Continuous
training.”
Suggestions for Improving Training*
*Sampling of international comments representing common themes
Interna-
tional
Summary
Mature
Economies
Maturing
Economies
NET Effective
(Extremely + Fairly
Effective)
73% 70% 76%
Extremely Effective 23% 22% 25%
Fairly Effective 50% 48% 51%
Moderately Effective 22% 26% 20%
Slightly Effective 4% 4% 3%
Not at all Effective 0% 1% 0%
About This Research
CompTIA’s 2016 International Trends in Cybersecurity was conducted to collect and share information on behaviors, techniques, and
opportunities associated with information technology (IT) security across several countries. The objectives of this research include:
• Evaluate and track changes in IT security practices, policies, threats, breaches, etc. over time
• Identify drivers and inhibitors among IT decision makers when evaluating security tech
• Gain insights into the security issues associated with emerging tech (e.g. cloud computing, mobile solutions)
• Track trends in IT security training and education
The data for this study was collected via a quantitative online survey conducted January 21 to February 18, 2016 among 1,509 IT and business
executives directly involved in setting or executing IT security policies and processes within their organizations. See the Appendix for Respondent
Profile details such as industry, company size, and job role. The 12 countries covered in this study include:
Australia (n=125); Brazil (n=126); Canada (n=125); Germany (n=125); India (n=131); Japan (n=125); Malaysia (n=125); Mexico (n=126): South
Africa (n=125); Thailand (n=125); United Arab Emirates (n=126); United Kingdom (n=125).
Maturing Economies: Brazil, India, Malaysia, Mexico, South Africa, Thailand, UAE (n=884).
Mature Economies: Australia, Canada, Germany, Japan, UK, (n=625).
Surveys were localized and translated to allow respondents to participate in their native language. Additionally, precautions were taken to
minimize misinterpretations of questions. However, research has shown, cultural differences exist and can affect responses to certain question
types, such as 5-point satisfaction rating questions. Viewers of this report should keep that in mind when comparing results across countries.
The margin of sampling error at 95% confidence for aggregate results is +/- 2.5 percentage points. Sampling error is larger for subgroups of the
data. As with any survey, sampling error is only one source of possible error. While non-sampling error cannot be accurately calculated,
precautionary steps were taken in all phases of the survey design, collection and processing of the data to minimize its influence. Note: because
data collection occurred via an online survey, in countries where Internet penetration is lower among businesses, the non-sampling error could
be higher.
More information and all country snapshots are available at CompTIA.org/internationalsecurity. CompTIA is responsible for all content contained
in this report. Any questions regarding the study should be directed to CompTIA Research & Market Intelligence staff at research@comptia.org.
CompTIA is a member of the Marketing Research Association (MRA) and adheres to the MRA’s Code of Market Research Ethics and Standards.
Thank You
Copyright (c) 2016 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
REMINDER: The complete International Trends in Cybersecurity report and 12
country snapshots can be viewed free of charge at CompTIA.org (with simple
registration)

Weitere ähnliche Inhalte

Was ist angesagt?

2017 IT Industry Outlook
2017 IT Industry Outlook 2017 IT Industry Outlook
2017 IT Industry Outlook CompTIA
 
CompTIA: Third Annual Trends in Enterprise Mobility Study for U.S. Companies
CompTIA: Third Annual Trends in Enterprise Mobility Study for U.S. CompaniesCompTIA: Third Annual Trends in Enterprise Mobility Study for U.S. Companies
CompTIA: Third Annual Trends in Enterprise Mobility Study for U.S. CompaniesCompTIA
 
Bridging the gap: cyber security skills
Bridging the gap: cyber security skillsBridging the gap: cyber security skills
Bridging the gap: cyber security skillsIpsos UK
 
4th Annual Trends in Cloud Computing: Business Impact
4th Annual Trends in Cloud Computing: Business Impact4th Annual Trends in Cloud Computing: Business Impact
4th Annual Trends in Cloud Computing: Business ImpactCompTIA
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilienceaccenture
 
The state of cyber resilience in the UK
The state of cyber resilience in the UKThe state of cyber resilience in the UK
The state of cyber resilience in the UKIpsos UK
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Samir Kotarwar
 
State of IT Skills Gap 2014 Summary
State of IT Skills Gap 2014 SummaryState of IT Skills Gap 2014 Summary
State of IT Skills Gap 2014 SummaryCompTIA
 
Vodafone cyber ready barometer 2018
Vodafone cyber ready barometer 2018Vodafone cyber ready barometer 2018
Vodafone cyber ready barometer 2018Martin Finn
 
Connected Futures Cisco Research: IoT Value: Challenges, Breakthroughs, and B...
Connected Futures Cisco Research: IoT Value: Challenges, Breakthroughs, and B...Connected Futures Cisco Research: IoT Value: Challenges, Breakthroughs, and B...
Connected Futures Cisco Research: IoT Value: Challenges, Breakthroughs, and B...Connected Futures
 
forrester-the-iot-heat-map
forrester-the-iot-heat-mapforrester-the-iot-heat-map
forrester-the-iot-heat-mapDennis McCain
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdriveaccenture
 
Accenture Banking Security Index
Accenture Banking Security IndexAccenture Banking Security Index
Accenture Banking Security Indexaccenture
 
Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementCHRIS CLIFFORD
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilienceaccenture
 
Solving the Cyber Security Skills Gap with DCMS
Solving the Cyber Security Skills Gap with DCMSSolving the Cyber Security Skills Gap with DCMS
Solving the Cyber Security Skills Gap with DCMSIpsos UK
 

Was ist angesagt? (20)

2017 IT Industry Outlook
2017 IT Industry Outlook 2017 IT Industry Outlook
2017 IT Industry Outlook
 
CompTIA: Third Annual Trends in Enterprise Mobility Study for U.S. Companies
CompTIA: Third Annual Trends in Enterprise Mobility Study for U.S. CompaniesCompTIA: Third Annual Trends in Enterprise Mobility Study for U.S. Companies
CompTIA: Third Annual Trends in Enterprise Mobility Study for U.S. Companies
 
Bridging the gap: cyber security skills
Bridging the gap: cyber security skillsBridging the gap: cyber security skills
Bridging the gap: cyber security skills
 
4th Annual Trends in Cloud Computing: Business Impact
4th Annual Trends in Cloud Computing: Business Impact4th Annual Trends in Cloud Computing: Business Impact
4th Annual Trends in Cloud Computing: Business Impact
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
The state of cyber resilience in the UK
The state of cyber resilience in the UKThe state of cyber resilience in the UK
The state of cyber resilience in the UK
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 
CompTIA 10th Security Study
CompTIA 10th Security StudyCompTIA 10th Security Study
CompTIA 10th Security Study
 
State of IT Skills Gap 2014 Summary
State of IT Skills Gap 2014 SummaryState of IT Skills Gap 2014 Summary
State of IT Skills Gap 2014 Summary
 
Vodafone cyber ready barometer 2018
Vodafone cyber ready barometer 2018Vodafone cyber ready barometer 2018
Vodafone cyber ready barometer 2018
 
Connected Futures Cisco Research: IoT Value: Challenges, Breakthroughs, and B...
Connected Futures Cisco Research: IoT Value: Challenges, Breakthroughs, and B...Connected Futures Cisco Research: IoT Value: Challenges, Breakthroughs, and B...
Connected Futures Cisco Research: IoT Value: Challenges, Breakthroughs, and B...
 
forrester-the-iot-heat-map
forrester-the-iot-heat-mapforrester-the-iot-heat-map
forrester-the-iot-heat-map
 
Financial Impact of BYOD Programs
Financial Impact of BYOD ProgramsFinancial Impact of BYOD Programs
Financial Impact of BYOD Programs
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
 
Accenture Banking Security Index
Accenture Banking Security IndexAccenture Banking Security Index
Accenture Banking Security Index
 
Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk Management
 
Global Threats| Cybersecurity|
Global Threats| Cybersecurity| Global Threats| Cybersecurity|
Global Threats| Cybersecurity|
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
Solving the Cyber Security Skills Gap with DCMS
Solving the Cyber Security Skills Gap with DCMSSolving the Cyber Security Skills Gap with DCMS
Solving the Cyber Security Skills Gap with DCMS
 

Andere mochten auch

CompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security TrendsCompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security TrendsCompTIA
 
Networking Chapter 11
Networking Chapter 11Networking Chapter 11
Networking Chapter 11mlrbrown
 
CompTIA Network+ Lesson
CompTIA Network+ LessonCompTIA Network+ Lesson
CompTIA Network+ LessonPhoenix TS
 
Aξιολόγηση του εκπαιδευτικού έργου
Aξιολόγηση του εκπαιδευτικού έργουAξιολόγηση του εκπαιδευτικού έργου
Aξιολόγηση του εκπαιδευτικού έργουSakis Karakousis
 
Comp tia n+_session_09
Comp tia n+_session_09Comp tia n+_session_09
Comp tia n+_session_09Niit Care
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction Dsunte Wilson
 
CompTIA Network+ Objectives
CompTIA Network+ ObjectivesCompTIA Network+ Objectives
CompTIA Network+ Objectivessombat nirund
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionDsunte Wilson
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primaveraDsunte Wilson
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame RelayDsunte Wilson
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network ServicesDsunte Wilson
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced SwitchingDsunte Wilson
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationDsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS BasicsDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterDsunte Wilson
 

Andere mochten auch (20)

CompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security TrendsCompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security Trends
 
Networking Chapter 11
Networking Chapter 11Networking Chapter 11
Networking Chapter 11
 
PACE-IT: Introduction to IPv4 (part 1) - N10 006
PACE-IT: Introduction to IPv4 (part 1) - N10 006 PACE-IT: Introduction to IPv4 (part 1) - N10 006
PACE-IT: Introduction to IPv4 (part 1) - N10 006
 
CompTIA Network+ Lesson
CompTIA Network+ LessonCompTIA Network+ Lesson
CompTIA Network+ Lesson
 
Aξιολόγηση του εκπαιδευτικού έργου
Aξιολόγηση του εκπαιδευτικού έργουAξιολόγηση του εκπαιδευτικού έργου
Aξιολόγηση του εκπαιδευτικού έργου
 
CompTIA network plus
CompTIA   network plusCompTIA   network plus
CompTIA network plus
 
Internet
InternetInternet
Internet
 
Comp tia n+_session_09
Comp tia n+_session_09Comp tia n+_session_09
Comp tia n+_session_09
 
PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006 PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
 
CompTIA Network+ Objectives
CompTIA Network+ ObjectivesCompTIA Network+ Objectives
CompTIA Network+ Objectives
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
 
CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
 

Ähnlich wie CompTIA International Trends in Cybersecurity

The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019Precisely
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22IDG
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarLumension
 
International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryCompTIA
 
International Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryInternational Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryCompTIA
 
2018 Trends in Cybersecurity: Building Effective Security Teams
2018 Trends in Cybersecurity: Building Effective Security Teams 2018 Trends in Cybersecurity: Building Effective Security Teams
2018 Trends in Cybersecurity: Building Effective Security Teams CompTIA
 
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Precisely
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryCompTIA
 
International Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryInternational Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryCompTIA
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfIDG
 
International Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryInternational Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryCompTIA
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfIDG
 
International Technology Adoption & Workforce Issues Study - Japan Summary
International Technology Adoption & Workforce Issues Study - Japan SummaryInternational Technology Adoption & Workforce Issues Study - Japan Summary
International Technology Adoption & Workforce Issues Study - Japan SummaryCompTIA
 
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Marcello Marchesini
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSilicon Valley Bank
 
International Technology Adoption & Workforce Issues Study - German Summary
International Technology Adoption & Workforce Issues Study - German SummaryInternational Technology Adoption & Workforce Issues Study - German Summary
International Technology Adoption & Workforce Issues Study - German SummaryCompTIA
 
NEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfNEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfIDG
 

Ähnlich wie CompTIA International Trends in Cybersecurity (20)

The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint Webinar
 
International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian Summary
 
International Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryInternational Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East Summary
 
2018 Trends in Cybersecurity: Building Effective Security Teams
2018 Trends in Cybersecurity: Building Effective Security Teams 2018 Trends in Cybersecurity: Building Effective Security Teams
2018 Trends in Cybersecurity: Building Effective Security Teams
 
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian Summary
 
International Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryInternational Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand Summary
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
International Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryInternational Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK Summary
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
International Technology Adoption & Workforce Issues Study - Japan Summary
International Technology Adoption & Workforce Issues Study - Japan SummaryInternational Technology Adoption & Workforce Issues Study - Japan Summary
International Technology Adoption & Workforce Issues Study - Japan Summary
 
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
International Technology Adoption & Workforce Issues Study - German Summary
International Technology Adoption & Workforce Issues Study - German SummaryInternational Technology Adoption & Workforce Issues Study - German Summary
International Technology Adoption & Workforce Issues Study - German Summary
 
NEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfNEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdf
 

Mehr von CompTIA

CompTIA IT Employment Tracker – December 2021
CompTIA IT Employment Tracker –  December 2021CompTIA IT Employment Tracker –  December 2021
CompTIA IT Employment Tracker – December 2021CompTIA
 
CompTIA IT Employment Tracker – November 2021
CompTIA IT Employment Tracker –  November 2021CompTIA IT Employment Tracker –  November 2021
CompTIA IT Employment Tracker – November 2021CompTIA
 
CompTIA IT Employment Tracker – October 2021
CompTIA IT Employment Tracker –  October 2021CompTIA IT Employment Tracker –  October 2021
CompTIA IT Employment Tracker – October 2021CompTIA
 
CompTIA IT Employment Tracker – September 2021
CompTIA IT Employment Tracker –  September 2021CompTIA IT Employment Tracker –  September 2021
CompTIA IT Employment Tracker – September 2021CompTIA
 
CompTIA IT Employment Tracker – July 2021
CompTIA IT Employment Tracker –  July 2021CompTIA IT Employment Tracker –  July 2021
CompTIA IT Employment Tracker – July 2021CompTIA
 
CompTIA IT Employment Tracker – June 2021
CompTIA IT Employment Tracker –  June 2021CompTIA IT Employment Tracker –  June 2021
CompTIA IT Employment Tracker – June 2021CompTIA
 
Trends in Automation 2021
Trends in Automation 2021Trends in Automation 2021
Trends in Automation 2021CompTIA
 
CompTIA IT Employment Tracker – May 2021
CompTIA IT Employment Tracker –  May 2021CompTIA IT Employment Tracker –  May 2021
CompTIA IT Employment Tracker – May 2021CompTIA
 
CompTIA IT Employment Tracker – April 2021
CompTIA IT Employment Tracker –  April 2021CompTIA IT Employment Tracker –  April 2021
CompTIA IT Employment Tracker – April 2021CompTIA
 
IT Operations and Emerging Technology
IT Operations and Emerging TechnologyIT Operations and Emerging Technology
IT Operations and Emerging TechnologyCompTIA
 
CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021CompTIA
 
Help Desk Trends
Help Desk TrendsHelp Desk Trends
Help Desk TrendsCompTIA
 
CompTIA IT Employment Tracker – February 2021
CompTIA IT Employment Tracker –  February 2021CompTIA IT Employment Tracker –  February 2021
CompTIA IT Employment Tracker – February 2021CompTIA
 
CompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry OutlookCompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry OutlookCompTIA
 
CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021CompTIA
 
CompTIA IT Employment Tracker – November 2020
CompTIA IT Employment Tracker –  November 2020CompTIA IT Employment Tracker –  November 2020
CompTIA IT Employment Tracker – November 2020CompTIA
 
CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020CompTIA
 
CompTIA IT Employment Tracker – September 2020
CompTIA IT Employment Tracker –  September 2020CompTIA IT Employment Tracker –  September 2020
CompTIA IT Employment Tracker – September 2020CompTIA
 
CompTIA IT Employment Tracker – August 2020
CompTIA IT Employment Tracker –  August 2020CompTIA IT Employment Tracker –  August 2020
CompTIA IT Employment Tracker – August 2020CompTIA
 
CompTIA IT Employment Tracker – July 2020
CompTIA IT Employment Tracker –  July 2020CompTIA IT Employment Tracker –  July 2020
CompTIA IT Employment Tracker – July 2020CompTIA
 

Mehr von CompTIA (20)

CompTIA IT Employment Tracker – December 2021
CompTIA IT Employment Tracker –  December 2021CompTIA IT Employment Tracker –  December 2021
CompTIA IT Employment Tracker – December 2021
 
CompTIA IT Employment Tracker – November 2021
CompTIA IT Employment Tracker –  November 2021CompTIA IT Employment Tracker –  November 2021
CompTIA IT Employment Tracker – November 2021
 
CompTIA IT Employment Tracker – October 2021
CompTIA IT Employment Tracker –  October 2021CompTIA IT Employment Tracker –  October 2021
CompTIA IT Employment Tracker – October 2021
 
CompTIA IT Employment Tracker – September 2021
CompTIA IT Employment Tracker –  September 2021CompTIA IT Employment Tracker –  September 2021
CompTIA IT Employment Tracker – September 2021
 
CompTIA IT Employment Tracker – July 2021
CompTIA IT Employment Tracker –  July 2021CompTIA IT Employment Tracker –  July 2021
CompTIA IT Employment Tracker – July 2021
 
CompTIA IT Employment Tracker – June 2021
CompTIA IT Employment Tracker –  June 2021CompTIA IT Employment Tracker –  June 2021
CompTIA IT Employment Tracker – June 2021
 
Trends in Automation 2021
Trends in Automation 2021Trends in Automation 2021
Trends in Automation 2021
 
CompTIA IT Employment Tracker – May 2021
CompTIA IT Employment Tracker –  May 2021CompTIA IT Employment Tracker –  May 2021
CompTIA IT Employment Tracker – May 2021
 
CompTIA IT Employment Tracker – April 2021
CompTIA IT Employment Tracker –  April 2021CompTIA IT Employment Tracker –  April 2021
CompTIA IT Employment Tracker – April 2021
 
IT Operations and Emerging Technology
IT Operations and Emerging TechnologyIT Operations and Emerging Technology
IT Operations and Emerging Technology
 
CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021
 
Help Desk Trends
Help Desk TrendsHelp Desk Trends
Help Desk Trends
 
CompTIA IT Employment Tracker – February 2021
CompTIA IT Employment Tracker –  February 2021CompTIA IT Employment Tracker –  February 2021
CompTIA IT Employment Tracker – February 2021
 
CompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry OutlookCompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry Outlook
 
CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021
 
CompTIA IT Employment Tracker – November 2020
CompTIA IT Employment Tracker –  November 2020CompTIA IT Employment Tracker –  November 2020
CompTIA IT Employment Tracker – November 2020
 
CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020
 
CompTIA IT Employment Tracker – September 2020
CompTIA IT Employment Tracker –  September 2020CompTIA IT Employment Tracker –  September 2020
CompTIA IT Employment Tracker – September 2020
 
CompTIA IT Employment Tracker – August 2020
CompTIA IT Employment Tracker –  August 2020CompTIA IT Employment Tracker –  August 2020
CompTIA IT Employment Tracker – August 2020
 
CompTIA IT Employment Tracker – July 2020
CompTIA IT Employment Tracker –  July 2020CompTIA IT Employment Tracker –  July 2020
CompTIA IT Employment Tracker – July 2020
 

Kürzlich hochgeladen

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

CompTIA International Trends in Cybersecurity

  • 1. International Trends in Cybersecurity April 2016 REMINDER: The complete International Trends in Cybersecurity report and 12 country snapshots can be viewed free of charge at CompTIA.org (with simple registration)
  • 2. The Importance of IT Security Continues to Grow 6% 18% 49% 27% 3% 18% 43% 35% NET Lower No Change Moderately Higher Significantly Higher Today Two Years From Now 79% NET of businesses expect IT security to become a higher priority over the next two years Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,509 NET Higher: Significantly Higher + Moderately Higher NET Lower: Significantly Lower + Moderately Lower International Summary
  • 3. Satisfaction With Current Security Level 20% 28% 23% 56% 53% 54% 25% 20% 23% Maturing Economies Mature Economies International Summary NET Satisfactory 77% 72% 80% Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,509 Completely Satisfactory Mostly Satisfactory Adequate/ Unsatisfactory NET Satisfactory: Completely + Mostly Satisfactory Adequate/Unsatisfactory: Simply Adequate + Mostly Unsatisfactory + Completely Unsatisfactory Note: see slide 18 for which countries are categorized in Mature Economies vs. Maturing Economies.
  • 4. Top Drivers for Changing IT Security Approach 1. Change in IT operations (e.g. cloud, mobility) 2. Reports of security breaches at other firms 3. Internal security breach or incident 4. Change in business operations or client base 5. Knowledge gained from training or certification International Summary 1. Change in IT operations (e.g. cloud, mobility) 2. Reports of security breaches at other firms 3. Internal security breach or incident 4. Knowledge gained from training or certification 5. Change in business operations or client base Mature Economies Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,509 Maturing Economies 1. Change in IT operations (e.g. cloud, mobility) 2. Change in business operations or client base 3. Internal security breach or incident 4. Knowledge gained from training or certification 5. Reports of security breaches at other firms
  • 5. Top Factors Impacting IT Security Practices 38% 40% 41% 45% 46% 46% 49% 32% 32% 37% 39% 37% 39% 39% 36% 37% 39% 42% 42% 43% 45% Volume of security threats Greater availability of hacking tools Sophistication of security threats More reliance on Internet applications Greater tech interconnectivity Growing organization of hackers Rise of social networking International Summary Mature Economies Maturing Economies Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,509
  • 6. Top IT Security Concerns 1. Malware (e.g. viruses, worms, trojans) 2. Hacking (e.g. DoS attack) 3. Data loss/leakage 4. Physical security threats (e.g. device theft) 5. Privacy concerns 6. Social engineering/Phishing 7. Intentional abuse by insiders (e.g. staff) 8. Understanding security risks of emerging areas 9. Regulatory compliance 10. Human error among general staff Top Serious Concerns Greatest Growth in Concern (More Critical Today vs. Two Years Ago) Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,509 International Summary 1. Data loss/leakage 2. Malware (e.g. viruses, worms, trojans) 3. Hacking (e.g. DoS attack) 4. Social engineering/Phishing 5. Understanding security risks of emerging areas 6. Privacy concerns 7. Physical security threats (e.g. device theft) 8. Intentional abuse by insiders (e.g. staff) 9. Regulatory compliance 10. Human error among general staff
  • 7. Mobile Security Incidents 18% 31% 33% 34% 40% 40% 31% 26% 20% 22% 22% 32% 24% 28% 28% 29% 32% 37% None of the above Violation of policy on corporate data Employees disabling security features Mobile phishing attack Mobile malware Lost device International Summary Mature Economies Maturing Economies Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,509 76% of organizations overall self-report experiencing at least one of these mobile security events
  • 8. Top 5 Concerns Over Mobile Security Threats 1. Open WiFi networks 2. Mobile-specific viruses or malware 3. USB flash drives 4. Theft or loss of corporate devices 5. Unauthorized apps International Summary 1. Theft or loss of corporate devices 2. Open WiFi networks 3. Mobile-specific viruses or malware 4. Unauthorized apps 5. Social media Mature Economies Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,509 Maturing Economies 1. Open WiFi networks 2. USB flash drives 3. Mobile-specific viruses or malware 4. Theft or loss of corporate devices 5. Unauthorized apps
  • 9. Experiences With Data Loss 28% 38% 34% 51% 29% 20% 41% 35% 24% No/Don't know Yes, probably Yes, definitely International Summary Mature Economies Maturing Economies Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,509 and n=850 who had a loss Many are aware of their company experiencing some type of loss of confidential data through carelessness or negligence in the past 12 months Types of Data Lost • Employee data • Financial data • Customer records • Intellectual property Top Areas Where Managers Plan to Improve DLP • Spyware prevention • Consumer app restriction • Mobile file encryption • BYOD restriction • Device safety policy enforcement/creation
  • 10. Self-Reported Occurrence of Security Breaches 27% 64% 9% 35% 58% 7% 22% 69% 9% None 1-10 breaches > 10 breaches International Summary Mature Economies Maturing Economies Over the past 12 months 61% of all firms experienced at least one serious breach Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,509 73% of all firms experienced at least one breach
  • 11. Human Element a Major Part of Security Risk 42% 58% Technology error Human error International Summary Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,200 who had a security incident in the past 12 months Top Human Error Sources 42% General carelessness 37% Failure to get up to speed on new threats 37% Lack of expertise with websites and applications 37% End user failure to follow policies and procedures 36% Lack of expertise with networks, servers and other infrastructure 34% IT staff failure to follow policies and procedures
  • 12. Human Error Becoming More of a Factor in Security Breaches and Incidents 13% 19% 68% 13% 30% 57% 13% 23% 64% NET technology error more of a factor No change in the allocation NET human error more of a factor in security breaches International Summary Mature Economies Maturing Economies Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,200 who had a security breach in the past 12 months NET More of a factor: Significantly More + Moderately More 23% of organizations where human error is now significantly more of a factor Human error is significantly more of a factor among firms in Maturing Economies (27%) vs. those in Mature Economies (18%) now compared to two years ago
  • 13. Utilization of Security Assessments and Training Among Staff 6% 30% 33% 34% 34% 41% 45% 43% 10% 18% 22% 26% 35% 30% 34% 43% 8% 25% 28% 31% 35% 36% 41% 43% None of the above Ad hoc security experiments Formal vulnerability assessments Online course Posted security policies Random security audits Ongoing security training program New employee orientation International Summary Mature Economies Maturing Economies Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,509 92% of companies overall use at least one of these formats to assess or improve security knowledge among employees
  • 14. Managers Value IT Security Certifications 80% 17% 3% NET Valuable Neutral NET Not that Valuable International Summary 38% Very Valuable 68% 25%6% NET Valuable Neutral NET Not that Valuable Mature Economies 25% Very Valuable Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,246 managers/executives NET Valuable: Very Valuable + Valuable NET Not that Valuable: Not that Valuable + Not at all Valuable Maturing Economies 49% Very Valuable 89% 10%1%
  • 15. 99% NET Important to managers in Maturing Economies (72% very important) The Importance of Testing After IT Security Training 4% 34% 63% 7% 42% 51% 1% 27% 72% Not that Important Somewhat Important Very Important International Summary Mature Economies Maturing Economies Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,246 managers/executives 96% NET of managers overall believe it is important (very + somewhat) to test after IT security training to confirm knowledge gains 93% NET Important to managers in Mature Economies (51% very important) NET Important: Very Important + Somewhat Important
  • 16. Security Awareness Levels Among Employees 39% 52%9% Advanced Basic Low priority International Summary Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,509 Top Potential Business Impacts of Deficiencies in Security Awareness 39% Unaware of areas where company may be exposed 39% Incurred costs for (re)training current workforce 37% Loss of business as a result of security issues with customer data 36% Failure to keep up with changes in regulatory environment 36% Unaware of new trends in security
  • 17. Effectiveness of Security Training Source: CompTIA International Trends in Cybersecurity | Overall results, n=1,392 firms using security training - “Continual training on new threats.” - “Regular retraining.” - “More comprehensive and formalised training.” - “Keep it up to date.” - “Regular reviews.” - “Mandatory training.” - “More tests of employees’ security understanding.” - “A more strict regime and more random security audits.” - “Have a particular person assigned for the training.” - “More investment in new tech.” - “More hands-on simulations of real-world breaches.” - “There should be very strict policies be enforce on proper training. Proper budgets for training.” - “Shorter training sessions but more of them.” - “Tests must be done every three months. Continuous training.” Suggestions for Improving Training* *Sampling of international comments representing common themes Interna- tional Summary Mature Economies Maturing Economies NET Effective (Extremely + Fairly Effective) 73% 70% 76% Extremely Effective 23% 22% 25% Fairly Effective 50% 48% 51% Moderately Effective 22% 26% 20% Slightly Effective 4% 4% 3% Not at all Effective 0% 1% 0%
  • 18. About This Research CompTIA’s 2016 International Trends in Cybersecurity was conducted to collect and share information on behaviors, techniques, and opportunities associated with information technology (IT) security across several countries. The objectives of this research include: • Evaluate and track changes in IT security practices, policies, threats, breaches, etc. over time • Identify drivers and inhibitors among IT decision makers when evaluating security tech • Gain insights into the security issues associated with emerging tech (e.g. cloud computing, mobile solutions) • Track trends in IT security training and education The data for this study was collected via a quantitative online survey conducted January 21 to February 18, 2016 among 1,509 IT and business executives directly involved in setting or executing IT security policies and processes within their organizations. See the Appendix for Respondent Profile details such as industry, company size, and job role. The 12 countries covered in this study include: Australia (n=125); Brazil (n=126); Canada (n=125); Germany (n=125); India (n=131); Japan (n=125); Malaysia (n=125); Mexico (n=126): South Africa (n=125); Thailand (n=125); United Arab Emirates (n=126); United Kingdom (n=125). Maturing Economies: Brazil, India, Malaysia, Mexico, South Africa, Thailand, UAE (n=884). Mature Economies: Australia, Canada, Germany, Japan, UK, (n=625). Surveys were localized and translated to allow respondents to participate in their native language. Additionally, precautions were taken to minimize misinterpretations of questions. However, research has shown, cultural differences exist and can affect responses to certain question types, such as 5-point satisfaction rating questions. Viewers of this report should keep that in mind when comparing results across countries. The margin of sampling error at 95% confidence for aggregate results is +/- 2.5 percentage points. Sampling error is larger for subgroups of the data. As with any survey, sampling error is only one source of possible error. While non-sampling error cannot be accurately calculated, precautionary steps were taken in all phases of the survey design, collection and processing of the data to minimize its influence. Note: because data collection occurred via an online survey, in countries where Internet penetration is lower among businesses, the non-sampling error could be higher. More information and all country snapshots are available at CompTIA.org/internationalsecurity. CompTIA is responsible for all content contained in this report. Any questions regarding the study should be directed to CompTIA Research & Market Intelligence staff at research@comptia.org. CompTIA is a member of the Marketing Research Association (MRA) and adheres to the MRA’s Code of Market Research Ethics and Standards.
  • 19. Thank You Copyright (c) 2016 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org REMINDER: The complete International Trends in Cybersecurity report and 12 country snapshots can be viewed free of charge at CompTIA.org (with simple registration)