SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
IDG COMMUNICATIONS, INC.
QUALITY
MATTERS
IDG Security Priorities Study
2020
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
78%
8%
4%
7%
3%
Purpose and Methodology
Source: IDG Security Priorities Study, 2020
To gain a better understanding of the various security projects organizations are focused on now and in
the coming year. The research also looks at the issues that will demand the most time and strategic
thinking for IT and security teams, with some questions specific to the COVID-19 pandemic.SURVEY GOAL
AUDIENCE BASE
CIO, Computerworld, CSO, InfoWorld,
and Network World site visitors, and email
invitations to audience base.
NUMBER OF
QUESTIONS 34
COLLECTION METHOD
Online questionnaire
522
IT LEADERSHIP
All survey respondents are involved
in IT and/or corporate/physical
security decisions.
Business Mgmt
Technology
19%
Manufacturing 14%
Financial Services 12%
Services (legal, consulting, real estate) 11%
Healthcare 9%
Government/Non-profit 8%
Education 5%
Retail, Wholesale and Distribution 5%
JOB TITLES
TOTAL RESPONDENTS
TOPREPRESENTEDINDUSTRIES
AVERAGE
COMPANY SIZE
12,661
EMPLOYEES
ExecIT/
Security
IT/Security
Pro
IT/
Security
Mgmt.
Other
2
REGION
North America – 73%
APAC – 21%
EMEA – 6%
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
2%
7%
12%
13%
15%
15%
16%
16%
16%
17%
17%
21%
23%
24%
27%
28%
28%
29%
37%
Responding to inquiries from senior mgmt and/or the Board
Addressing issues that arise with security vendor(s)
Cyber threats from inside the organization Insider threats
Addressing security risks associated with disruptive tech
Managing security/addressing risks around mobile devices
Addressing issues that arise with technology (non-security) vendor(s)
Employee retention/hiring skilled & qualified workers
Institutional silos (little to no collaboration to address threats)
Gaining cooperation/buy-in from business leaders/stakeholders
Acceleration of digital transformation initiatives
Security of business operations and/or data hosted in the cloud
Ensuring customer privacy/confidentiality
IT Audit
Shadow IT (IT is not always aware when new tools are implemented)
Cyber threats from outside the organization APTs, DDoS
Meeting governance & compliance regulations
Budgetary constraints/demonstrating ROI
Employee awareness and training issues
Unexpected/underexpected business risks (pandemic, workforce changes, etc.)
Strategic Time Redirected Due to Pandemic
3
Q. What security-related challenges are most often forcing you to redirect your time and focus away from more strategic tasks?
Source: IDG Security Priorities Study, 2020
#1 in 2019
#2 in 2019
#3 in 2019
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
Falling Short in Resources & Strategy
4
Q. In which areas, if any, do you feel your organization is falling short in addressing cyber risk?
Source: IDG Security Priorities Study, 2020
11%
12%
16%
18%
18%
19%
20%
20%
26%
27%
28%
30%
31%
Lack of security during due diligence phase of M&A
Non-routine updates of incident response plan
Lack of security team involvement in vendor and 3rd party management
The complexity of our security environment makes it difficult to retrieve timely,
actionable intelligence from our systems
Poor visibility into IT environment
Lack of security team involvement prior to implementing new technologies
Addressing risks that have arisen from the new work environment brought on by
the pandemic
We struggle to find, acquire, and/or retain the technical or professional expertise
we need
Insufficient communications between security team and lines of business
Inadequate security training for users (full and part-time employees,
contractors, or outsourced users)
We are not proactive enough when it comes to our security strategy
Security is not always addressed during application development
We are not investing enough resource (budget, people, technologies, etc.) to
address our risks
87%
believe their
organization is
falling short
addressing
cyber risks
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
Despite Pandemic, Security Budgets Grow
5
Q. Will your overall security budget increase, decrease or remain the same in the next 12 months compared to the past 12 months? AND Q. Please estimate your entire organization’s
total annual budget for all information security products, systems, services and/or staff (including both CAPEX and OPEX) in the next 12 months.
Source: IDG Security Priorities Study, 2020
Expected Change in Budgets:
41%
6%
53%
Increase
Remain
the same
Decrease
Average annual
security budget:
$72.7M
Enterprise: $136M
SMB: $5.5M
Up from
$51.8M
in 2019
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
Allocation of Security Budgets
6
Q. With the total equal to 100%, approximately what percent of your annual budget for IT security will be allocated to the following areas over the next 12 months?
Source: IDG Security Priorities Study, 2020
23%
19%
17%
12%
8%
7%
6%
5%
3%
Skilled staff On-premises
Infrastructure and
equipment
(hardware)
On-premises
Tools and
software
(software)
Cloud-based
security solutions
Consulting
services
Cloud-based
security
monitoring
services
Contracted
evaluation
services
External incident
response services
Other (travel,
conferences,
etc.)
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
Increasing Spend on Authentication & Cloud
Data Protection
7
Q: Please describe how your company’s level of spending in the following areas will change over the next 12 months.
Source: IDG Security Priorities Study, 2020
20%
20%
20%
20%
20%
21%
22%
22%
22%
24%
25%
27%
27%
28%
32%
71%
49%
60%
71%
44%
45%
51%
63%
65%
64%
62%
62%
46%
49%
57%
6%
5%
5%
5%
3%
5%
5%
5%
4%
4%
5%
5%
5%
4%
3%
1%
12%
6%
2%
14%
9%
7%
4%
3%
4%
2%
2%
8%
6%
4%
2%
15%
9%
2%
20%
19%
15%
6%
6%
5%
6%
5%
13%
13%
5%
Anti-virus/malware
Container security
Data Loss Prevention (DLP)
Firewalls
Zero trust technologies
Cloud access security brokers (CASBs)
Behavior monitoring & analysis
Endpoint detection and response
Identity management systems
Security education/Awareness training
Application monitoring
Access controls (network, data)
Cloud-based cybersecurity services
Cloud data protection
Authentication (multi-factor/strong authentication, role-based)
Increase Remain the same Decrease This is a new category for our organization Potential new investment area in the future
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
M A T T E R S
8
Continue the Conversation
To get results from IDG research when it happens, or any
other news, follow us on Twitter: @IDGWorld
ADDITIONAL WAYS TO STAY ON TOP OF INFORMATION FROM IDG :
Sign up to receive our monthly marketing
newsletter at www.idg.com/newsletters/
Visit us on LinkedIn here:
www.linkedin.com/company/international-data-group--idg-
To receive a briefing on the full results from this study, or for more information, please
contact your IDG sales executive or contact us.
For more information on content marketing and lead nurture, explore our resources on
this site under marketing tools. We have additional primary research, blogs and white
papers to make you smarter about tech decision makers, and targeted products and
programs to help you reach them!

Weitere Àhnliche Inhalte

Was ist angesagt?

CSO Pandemic Impact Survey, 2020
CSO Pandemic Impact Survey, 2020CSO Pandemic Impact Survey, 2020
CSO Pandemic Impact Survey, 2020IDG
 
Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]IDG
 
2018 Global State of Information Security Survey
2018 Global State of Information Security Survey2018 Global State of Information Security Survey
2018 Global State of Information Security SurveyIDG
 
2018 Security Priorities
2018 Security Priorities 2018 Security Priorities
2018 Security Priorities IDG
 
2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of CybercrimeIDG
 
State of the CIO 2018 Infographic
State of the CIO 2018 InfographicState of the CIO 2018 Infographic
State of the CIO 2018 InfographicIDG
 
Digital Business 2018
Digital Business 2018Digital Business 2018
Digital Business 2018IDG
 
CIO COVID-19 Impact Survey, Infographic
CIO COVID-19 Impact Survey, InfographicCIO COVID-19 Impact Survey, Infographic
CIO COVID-19 Impact Survey, InfographicIDG
 
2018 State of the Network
2018 State of the Network2018 State of the Network
2018 State of the NetworkIDG
 
2018 IDG Customer Engagement Study
2018 IDG Customer Engagement Study2018 IDG Customer Engagement Study
2018 IDG Customer Engagement StudyIDG
 
State of the CIO 2018
State of the CIO 2018State of the CIO 2018
State of the CIO 2018IDG
 
CIO Tech Poll: Tech Priorities 2019
CIO Tech Poll: Tech Priorities 2019CIO Tech Poll: Tech Priorities 2019
CIO Tech Poll: Tech Priorities 2019IDG
 
Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides IDG
 
IDG 2019 Digital Business infographic
IDG 2019 Digital Business infographicIDG 2019 Digital Business infographic
IDG 2019 Digital Business infographicIDG
 
2020 State of the CIO Research
2020 State of the CIO Research2020 State of the CIO Research
2020 State of the CIO ResearchIDG
 
CIO COVID Research Infographic
CIO COVID Research InfographicCIO COVID Research Infographic
CIO COVID Research InfographicIDG
 
CIO Tech Poll: Tech Priorities 2018
CIO Tech Poll: Tech Priorities 2018CIO Tech Poll: Tech Priorities 2018
CIO Tech Poll: Tech Priorities 2018IDG
 
CIO CV-19 Impact Study
CIO CV-19 Impact StudyCIO CV-19 Impact Study
CIO CV-19 Impact StudyIDG
 
Foundry Digital Business Research 2021
Foundry Digital Business Research 2021Foundry Digital Business Research 2021
Foundry Digital Business Research 2021IDG
 
Who is the Most Influential Tech Purchase Decision Maker - ITDM or BDM
Who is the Most Influential Tech Purchase Decision Maker - ITDM or BDMWho is the Most Influential Tech Purchase Decision Maker - ITDM or BDM
Who is the Most Influential Tech Purchase Decision Maker - ITDM or BDMRobert Eakin
 

Was ist angesagt? (20)

CSO Pandemic Impact Survey, 2020
CSO Pandemic Impact Survey, 2020CSO Pandemic Impact Survey, 2020
CSO Pandemic Impact Survey, 2020
 
Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]
 
2018 Global State of Information Security Survey
2018 Global State of Information Security Survey2018 Global State of Information Security Survey
2018 Global State of Information Security Survey
 
2018 Security Priorities
2018 Security Priorities 2018 Security Priorities
2018 Security Priorities
 
2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of Cybercrime
 
State of the CIO 2018 Infographic
State of the CIO 2018 InfographicState of the CIO 2018 Infographic
State of the CIO 2018 Infographic
 
Digital Business 2018
Digital Business 2018Digital Business 2018
Digital Business 2018
 
CIO COVID-19 Impact Survey, Infographic
CIO COVID-19 Impact Survey, InfographicCIO COVID-19 Impact Survey, Infographic
CIO COVID-19 Impact Survey, Infographic
 
2018 State of the Network
2018 State of the Network2018 State of the Network
2018 State of the Network
 
2018 IDG Customer Engagement Study
2018 IDG Customer Engagement Study2018 IDG Customer Engagement Study
2018 IDG Customer Engagement Study
 
State of the CIO 2018
State of the CIO 2018State of the CIO 2018
State of the CIO 2018
 
CIO Tech Poll: Tech Priorities 2019
CIO Tech Poll: Tech Priorities 2019CIO Tech Poll: Tech Priorities 2019
CIO Tech Poll: Tech Priorities 2019
 
Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides
 
IDG 2019 Digital Business infographic
IDG 2019 Digital Business infographicIDG 2019 Digital Business infographic
IDG 2019 Digital Business infographic
 
2020 State of the CIO Research
2020 State of the CIO Research2020 State of the CIO Research
2020 State of the CIO Research
 
CIO COVID Research Infographic
CIO COVID Research InfographicCIO COVID Research Infographic
CIO COVID Research Infographic
 
CIO Tech Poll: Tech Priorities 2018
CIO Tech Poll: Tech Priorities 2018CIO Tech Poll: Tech Priorities 2018
CIO Tech Poll: Tech Priorities 2018
 
CIO CV-19 Impact Study
CIO CV-19 Impact StudyCIO CV-19 Impact Study
CIO CV-19 Impact Study
 
Foundry Digital Business Research 2021
Foundry Digital Business Research 2021Foundry Digital Business Research 2021
Foundry Digital Business Research 2021
 
Who is the Most Influential Tech Purchase Decision Maker - ITDM or BDM
Who is the Most Influential Tech Purchase Decision Maker - ITDM or BDMWho is the Most Influential Tech Purchase Decision Maker - ITDM or BDM
Who is the Most Influential Tech Purchase Decision Maker - ITDM or BDM
 

Ähnlich wie IDG 2020 Security Priorities Research

InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsVMware Tanzu
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Needsimplyme12345
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfIDG
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfIDG
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...SolarWinds
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsIvanti
 
CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017CompTIA
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Cloudflare
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityRahul Tyagi
 
Cybersecurity report-vol-8
Cybersecurity report-vol-8Cybersecurity report-vol-8
Cybersecurity report-vol-8Mohamed Abdelhakim
 
Level Up Your Skills to Lead IT Projects Successfully
Level Up Your Skills to Lead IT Projects SuccessfullyLevel Up Your Skills to Lead IT Projects Successfully
Level Up Your Skills to Lead IT Projects SuccessfullyKaali Dass PMP, PhD.
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomIBM Security
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryCompTIA
 
NEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfNEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfIDG
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Michael Ofarrell
 
2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdfIDG
 

Ähnlich wie IDG 2020 Security Priorities Research (20)

InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
 
CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
Cyber-attacks
Cyber-attacksCyber-attacks
Cyber-attacks
 
Cybersecurity report-vol-8
Cybersecurity report-vol-8Cybersecurity report-vol-8
Cybersecurity report-vol-8
 
Level Up Your Skills to Lead IT Projects Successfully
Level Up Your Skills to Lead IT Projects SuccessfullyLevel Up Your Skills to Lead IT Projects Successfully
Level Up Your Skills to Lead IT Projects Successfully
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian Summary
 
NEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfNEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdf
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
2017 Cybersecurity Report
2017 Cybersecurity Report 2017 Cybersecurity Report
2017 Cybersecurity Report
 
2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf
 

Mehr von IDG

Role and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdfRole and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdfIDG
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfIDG
 
CIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdfCIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdfIDG
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxState of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxIDG
 
State of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfState of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfIDG
 
R_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdfR_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdfIDG
 
Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022IDG
 
R-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdfR-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdfIDG
 
Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022IDG
 
Security Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdfSecurity Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdfIDG
 
R_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdfR_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdfIDG
 
Foundry Future of Work Study 2022
Foundry Future of Work Study 2022Foundry Future of Work Study 2022
Foundry Future of Work Study 2022IDG
 
Data & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdfData & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdfIDG
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22IDG
 
R if data_analytics_03.08.22
R if data_analytics_03.08.22R if data_analytics_03.08.22
R if data_analytics_03.08.22IDG
 
Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020IDG
 
Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021IDG
 
Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Role & Influence of the Technology Decision-Maker Research 2022Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Role & Influence of the Technology Decision-Maker Research 2022IDG
 
Foundry Customer Engagement Study 2021
Foundry Customer Engagement Study 2021Foundry Customer Engagement Study 2021
Foundry Customer Engagement Study 2021IDG
 
Stateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slidesStateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slidesIDG
 

Mehr von IDG (20)

Role and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdfRole and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdf
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
 
CIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdfCIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdf
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxState of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
 
State of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfState of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdf
 
R_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdfR_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdf
 
Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022
 
R-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdfR-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdf
 
Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022
 
Security Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdfSecurity Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdf
 
R_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdfR_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdf
 
Foundry Future of Work Study 2022
Foundry Future of Work Study 2022Foundry Future of Work Study 2022
Foundry Future of Work Study 2022
 
Data & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdfData & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdf
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22
 
R if data_analytics_03.08.22
R if data_analytics_03.08.22R if data_analytics_03.08.22
R if data_analytics_03.08.22
 
Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020
 
Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021
 
Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Role & Influence of the Technology Decision-Maker Research 2022Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Role & Influence of the Technology Decision-Maker Research 2022
 
Foundry Customer Engagement Study 2021
Foundry Customer Engagement Study 2021Foundry Customer Engagement Study 2021
Foundry Customer Engagement Study 2021
 
Stateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slidesStateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slides
 

KĂŒrzlich hochgeladen

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vĂĄzquez
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

KĂŒrzlich hochgeladen (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

IDG 2020 Security Priorities Research

  • 1. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y M A T T E R S IDG COMMUNICATIONS, INC. QUALITY MATTERS IDG Security Priorities Study 2020
  • 2. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y M A T T E R S 78% 8% 4% 7% 3% Purpose and Methodology Source: IDG Security Priorities Study, 2020 To gain a better understanding of the various security projects organizations are focused on now and in the coming year. The research also looks at the issues that will demand the most time and strategic thinking for IT and security teams, with some questions specific to the COVID-19 pandemic.SURVEY GOAL AUDIENCE BASE CIO, Computerworld, CSO, InfoWorld, and Network World site visitors, and email invitations to audience base. NUMBER OF QUESTIONS 34 COLLECTION METHOD Online questionnaire 522 IT LEADERSHIP All survey respondents are involved in IT and/or corporate/physical security decisions. Business Mgmt Technology 19% Manufacturing 14% Financial Services 12% Services (legal, consulting, real estate) 11% Healthcare 9% Government/Non-profit 8% Education 5% Retail, Wholesale and Distribution 5% JOB TITLES TOTAL RESPONDENTS TOPREPRESENTEDINDUSTRIES AVERAGE COMPANY SIZE 12,661 EMPLOYEES ExecIT/ Security IT/Security Pro IT/ Security Mgmt. Other 2 REGION North America – 73% APAC – 21% EMEA – 6%
  • 3. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y M A T T E R S 2% 7% 12% 13% 15% 15% 16% 16% 16% 17% 17% 21% 23% 24% 27% 28% 28% 29% 37% Responding to inquiries from senior mgmt and/or the Board Addressing issues that arise with security vendor(s) Cyber threats from inside the organization Insider threats Addressing security risks associated with disruptive tech Managing security/addressing risks around mobile devices Addressing issues that arise with technology (non-security) vendor(s) Employee retention/hiring skilled & qualified workers Institutional silos (little to no collaboration to address threats) Gaining cooperation/buy-in from business leaders/stakeholders Acceleration of digital transformation initiatives Security of business operations and/or data hosted in the cloud Ensuring customer privacy/confidentiality IT Audit Shadow IT (IT is not always aware when new tools are implemented) Cyber threats from outside the organization APTs, DDoS Meeting governance & compliance regulations Budgetary constraints/demonstrating ROI Employee awareness and training issues Unexpected/underexpected business risks (pandemic, workforce changes, etc.) Strategic Time Redirected Due to Pandemic 3 Q. What security-related challenges are most often forcing you to redirect your time and focus away from more strategic tasks? Source: IDG Security Priorities Study, 2020 #1 in 2019 #2 in 2019 #3 in 2019
  • 4. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y M A T T E R S Falling Short in Resources & Strategy 4 Q. In which areas, if any, do you feel your organization is falling short in addressing cyber risk? Source: IDG Security Priorities Study, 2020 11% 12% 16% 18% 18% 19% 20% 20% 26% 27% 28% 30% 31% Lack of security during due diligence phase of M&A Non-routine updates of incident response plan Lack of security team involvement in vendor and 3rd party management The complexity of our security environment makes it difficult to retrieve timely, actionable intelligence from our systems Poor visibility into IT environment Lack of security team involvement prior to implementing new technologies Addressing risks that have arisen from the new work environment brought on by the pandemic We struggle to find, acquire, and/or retain the technical or professional expertise we need Insufficient communications between security team and lines of business Inadequate security training for users (full and part-time employees, contractors, or outsourced users) We are not proactive enough when it comes to our security strategy Security is not always addressed during application development We are not investing enough resource (budget, people, technologies, etc.) to address our risks 87% believe their organization is falling short addressing cyber risks
  • 5. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y M A T T E R S Despite Pandemic, Security Budgets Grow 5 Q. Will your overall security budget increase, decrease or remain the same in the next 12 months compared to the past 12 months? AND Q. Please estimate your entire organization’s total annual budget for all information security products, systems, services and/or staff (including both CAPEX and OPEX) in the next 12 months. Source: IDG Security Priorities Study, 2020 Expected Change in Budgets: 41% 6% 53% Increase Remain the same Decrease Average annual security budget: $72.7M Enterprise: $136M SMB: $5.5M Up from $51.8M in 2019
  • 6. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y M A T T E R S Allocation of Security Budgets 6 Q. With the total equal to 100%, approximately what percent of your annual budget for IT security will be allocated to the following areas over the next 12 months? Source: IDG Security Priorities Study, 2020 23% 19% 17% 12% 8% 7% 6% 5% 3% Skilled staff On-premises Infrastructure and equipment (hardware) On-premises Tools and software (software) Cloud-based security solutions Consulting services Cloud-based security monitoring services Contracted evaluation services External incident response services Other (travel, conferences, etc.)
  • 7. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y M A T T E R S Increasing Spend on Authentication & Cloud Data Protection 7 Q: Please describe how your company’s level of spending in the following areas will change over the next 12 months. Source: IDG Security Priorities Study, 2020 20% 20% 20% 20% 20% 21% 22% 22% 22% 24% 25% 27% 27% 28% 32% 71% 49% 60% 71% 44% 45% 51% 63% 65% 64% 62% 62% 46% 49% 57% 6% 5% 5% 5% 3% 5% 5% 5% 4% 4% 5% 5% 5% 4% 3% 1% 12% 6% 2% 14% 9% 7% 4% 3% 4% 2% 2% 8% 6% 4% 2% 15% 9% 2% 20% 19% 15% 6% 6% 5% 6% 5% 13% 13% 5% Anti-virus/malware Container security Data Loss Prevention (DLP) Firewalls Zero trust technologies Cloud access security brokers (CASBs) Behavior monitoring & analysis Endpoint detection and response Identity management systems Security education/Awareness training Application monitoring Access controls (network, data) Cloud-based cybersecurity services Cloud data protection Authentication (multi-factor/strong authentication, role-based) Increase Remain the same Decrease This is a new category for our organization Potential new investment area in the future
  • 8. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y M A T T E R S 8 Continue the Conversation To get results from IDG research when it happens, or any other news, follow us on Twitter: @IDGWorld ADDITIONAL WAYS TO STAY ON TOP OF INFORMATION FROM IDG : Sign up to receive our monthly marketing newsletter at www.idg.com/newsletters/ Visit us on LinkedIn here: www.linkedin.com/company/international-data-group--idg- To receive a briefing on the full results from this study, or for more information, please contact your IDG sales executive or contact us. For more information on content marketing and lead nurture, explore our resources on this site under marketing tools. We have additional primary research, blogs and white papers to make you smarter about tech decision makers, and targeted products and programs to help you reach them!