SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
Security Priorities Study 2022
2
Security risks continue
to plague organizations
and direct strategies
Survey purpose and goal: We conducted this research to gain a better understanding of the various security projects organizations
are focused on now and in the coming year. All survey respondents are involved in IT and/or corporate/ physical security decisions.
90%
of security executives believe
their organization is falling
short in addressing cyber risk.
Source: Foundry Security Priorities Study, 2022
3
Here’s where
they feel they’re
falling short
Question: In which areas, if any, do you feel your organization is falling
short in addressing cyber risk?
Source: Foundry Security Priorities Study, 2022
• Difficulty convincing all, or parts
of their organization of the
severity of the risks they face
• Not investing enough resources
to address the risks they face
• Struggle to find, acquire,
and/or retain the technical or
professional expertise they need
• Not proactive enough when it
comes to their security strategy
4
Question: In which areas, if any, do you feel your organization is falling
short in addressing cyber risk?
Source: Foundry Security Priorities Study, 2022
• Meeting governance and
compliance regulations
• Employee awareness
and training issues
• Unanticipated business risks
• Preparing for or addressing risks
from cyberthreats originated
outside of the organization
And they’re
having to redirect
their time due to
challenges
To address obstacles, IT and
security leaders have these
priorities on their roadmap
5
Source: Foundry Security Priorities Study, 2022
82%
report regular or frequent
engagement with the Board
of Directors.
49%
cite being appropriately
prepared to respond to a
security incident as their
number one security priority for
the upcoming year.
45%
are asking current staff to take on
more responsibilities and utilizing
technologies that automate
security priorities in order to
combat security skill shortage.
Budget plans reflect
the necessity at hand Investment increases are
planned in these areas:
• Cloud-based security
services (36%)
• Cloud infrastructure
management technology (35%)
• Application development
security (35%)
• Access controls (35%)
• Cloud data protection (33%)
6
Source: Foundry Security Priorities Study, 2022
Enterprise
$122M
$65M
Small and midsize
$16M
Up from $11K in 2021
Up from $5.5K in 2020
Average annual
security budget
Priorities
It’s clear that the threat of a cyber attack
is top of mind for security leaders
7
Source: Foundry Security Priorities Study, 2022
The number one security
priority this year, be
appropriately prepared to
respond to a security incident,
was also the number one
priority in 2021.
Leaders are taking this seriously as improve/ increase
security awareness among end-users through training
is the #3 security priority for the upcoming year.
87%
are aware of what caused their
security incidents over the past
year, with the number one cause
being non-malicious user error.
Challenges
Security leaders keep having
to redirect their time away
from strategic tasks due to a
larger variety of challenges.
8
Source: Foundry Security Priorities Study, 2022
Security leaders are planning
for greater alignment
82% report regular or frequent
engagement with the
Board of Directors.
54% say that their engagement with the
Board of Directors helps improve
cybersecurity/ security initiatives.
plan to outsource some
security functions.
Investments
As organizations struggle to
attract and retain appropriate
security talent, security
leaders invest in new
practices and technologies
to bring efficiencies.
9
Source: Foundry Security Priorities Study, 2022
How security leaders are addressing
the skills shortage
The majority of
organizations will
evaluate the efficacy
of a security solution
after two months of
use, but before
they’ve implemented
for a year.
45%
are utilizing technologies
that automate security
priorities in order to combat
security skill shortage.
42%
Key takeaway: Security vendors must
stay up to date on the status of their
clients and ensure the tools are meeting
their needs and expectations.

Weitere ähnliche Inhalte

Ähnlich wie Security Priorities 2022 Sample Slides.pdf

2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
patmisasi
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report
Bricata, Inc.
 

Ähnlich wie Security Priorities 2022 Sample Slides.pdf (20)

IDG 2020 Security Priorities Research
IDG 2020 Security Priorities ResearchIDG 2020 Security Priorities Research
IDG 2020 Security Priorities Research
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019
 
Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive era
 
How Will Your Cloud Strategy Impact Your Cyber Strategy?
How Will Your Cloud Strategy Impact Your Cyber Strategy?How Will Your Cloud Strategy Impact Your Cyber Strategy?
How Will Your Cloud Strategy Impact Your Cyber Strategy?
 
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworks
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
 
Cyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attentionCyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attention
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security Risks
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
 
2020 IIS global concerns report
2020 IIS global concerns report2020 IIS global concerns report
2020 IIS global concerns report
 
2018 Trends in Cybersecurity: Building Effective Security Teams
2018 Trends in Cybersecurity: Building Effective Security Teams 2018 Trends in Cybersecurity: Building Effective Security Teams
2018 Trends in Cybersecurity: Building Effective Security Teams
 

Mehr von IDG

State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
IDG
 

Mehr von IDG (20)

Role and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdfRole and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdf
 
2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
 
CIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdfCIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdf
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxState of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
 
State of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfState of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdf
 
R_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdfR_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdf
 
Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022
 
R-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdfR-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdf
 
Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022
 
R_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdfR_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdf
 
Foundry Future of Work Study 2022
Foundry Future of Work Study 2022Foundry Future of Work Study 2022
Foundry Future of Work Study 2022
 
Data & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdfData & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdf
 
R if data_analytics_03.08.22
R if data_analytics_03.08.22R if data_analytics_03.08.22
R if data_analytics_03.08.22
 
Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020
 
Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021
 
Foundry Digital Business Research 2021
Foundry Digital Business Research 2021Foundry Digital Business Research 2021
Foundry Digital Business Research 2021
 
Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Role & Influence of the Technology Decision-Maker Research 2022Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Role & Influence of the Technology Decision-Maker Research 2022
 
Foundry Customer Engagement Study 2021
Foundry Customer Engagement Study 2021Foundry Customer Engagement Study 2021
Foundry Customer Engagement Study 2021
 
Stateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slidesStateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slides
 

Kürzlich hochgeladen

4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
Cara Menggugurkan Kandungan 087776558899
 

Kürzlich hochgeladen (20)

The seven principles of persuasion by Dr. Robert Cialdini
The seven principles of persuasion by Dr. Robert CialdiniThe seven principles of persuasion by Dr. Robert Cialdini
The seven principles of persuasion by Dr. Robert Cialdini
 
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptxUnveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
 
SP Search Term Data Optimization Template.pdf
SP Search Term Data Optimization Template.pdfSP Search Term Data Optimization Template.pdf
SP Search Term Data Optimization Template.pdf
 
Alpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptxAlpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptx
 
Aiizennxqc Digital Marketing | SEO & SMM
Aiizennxqc Digital Marketing | SEO & SMMAiizennxqc Digital Marketing | SEO & SMM
Aiizennxqc Digital Marketing | SEO & SMM
 
The Impact Of Social Media Advertising.pdf
The Impact Of Social Media Advertising.pdfThe Impact Of Social Media Advertising.pdf
The Impact Of Social Media Advertising.pdf
 
[Expert Panel] New Google Shopping Ads Strategies Uncovered
[Expert Panel] New Google Shopping Ads Strategies Uncovered[Expert Panel] New Google Shopping Ads Strategies Uncovered
[Expert Panel] New Google Shopping Ads Strategies Uncovered
 
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
 
Instant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best PracticesInstant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best Practices
 
Optimizing Your Marketing with AI-Powered Prompts
Optimizing Your Marketing with AI-Powered PromptsOptimizing Your Marketing with AI-Powered Prompts
Optimizing Your Marketing with AI-Powered Prompts
 
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night ServiceVIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
 
HITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITY
HITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITYHITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITY
HITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITY
 
The Art of sales from fictional characters.
The Art of sales from fictional characters.The Art of sales from fictional characters.
The Art of sales from fictional characters.
 
The 9th May Incident in Pakistan A Turning Point in History.pptx
The 9th May Incident in Pakistan A Turning Point in History.pptxThe 9th May Incident in Pakistan A Turning Point in History.pptx
The 9th May Incident in Pakistan A Turning Point in History.pptx
 
Distribution Ad Platform_ The Role of Distribution Ad Network.pdf
Distribution Ad Platform_ The Role of  Distribution Ad Network.pdfDistribution Ad Platform_ The Role of  Distribution Ad Network.pdf
Distribution Ad Platform_ The Role of Distribution Ad Network.pdf
 
Gain potential customers through Lead Generation
Gain potential customers through Lead GenerationGain potential customers through Lead Generation
Gain potential customers through Lead Generation
 
HOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATION
HOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATIONHOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATION
HOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATION
 
Cartona.pptx. Marketing how to present your project very well , discussed a...
Cartona.pptx.   Marketing how to present your project very well , discussed a...Cartona.pptx.   Marketing how to present your project very well , discussed a...
Cartona.pptx. Marketing how to present your project very well , discussed a...
 
Elevating Your Digital Presence by Evitha.pdf
Elevating Your Digital Presence by Evitha.pdfElevating Your Digital Presence by Evitha.pdf
Elevating Your Digital Presence by Evitha.pdf
 
Social Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh BendaySocial Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh Benday
 

Security Priorities 2022 Sample Slides.pdf

  • 2. 2 Security risks continue to plague organizations and direct strategies Survey purpose and goal: We conducted this research to gain a better understanding of the various security projects organizations are focused on now and in the coming year. All survey respondents are involved in IT and/or corporate/ physical security decisions. 90% of security executives believe their organization is falling short in addressing cyber risk. Source: Foundry Security Priorities Study, 2022
  • 3. 3 Here’s where they feel they’re falling short Question: In which areas, if any, do you feel your organization is falling short in addressing cyber risk? Source: Foundry Security Priorities Study, 2022 • Difficulty convincing all, or parts of their organization of the severity of the risks they face • Not investing enough resources to address the risks they face • Struggle to find, acquire, and/or retain the technical or professional expertise they need • Not proactive enough when it comes to their security strategy
  • 4. 4 Question: In which areas, if any, do you feel your organization is falling short in addressing cyber risk? Source: Foundry Security Priorities Study, 2022 • Meeting governance and compliance regulations • Employee awareness and training issues • Unanticipated business risks • Preparing for or addressing risks from cyberthreats originated outside of the organization And they’re having to redirect their time due to challenges
  • 5. To address obstacles, IT and security leaders have these priorities on their roadmap 5 Source: Foundry Security Priorities Study, 2022 82% report regular or frequent engagement with the Board of Directors. 49% cite being appropriately prepared to respond to a security incident as their number one security priority for the upcoming year. 45% are asking current staff to take on more responsibilities and utilizing technologies that automate security priorities in order to combat security skill shortage.
  • 6. Budget plans reflect the necessity at hand Investment increases are planned in these areas: • Cloud-based security services (36%) • Cloud infrastructure management technology (35%) • Application development security (35%) • Access controls (35%) • Cloud data protection (33%) 6 Source: Foundry Security Priorities Study, 2022 Enterprise $122M $65M Small and midsize $16M Up from $11K in 2021 Up from $5.5K in 2020 Average annual security budget
  • 7. Priorities It’s clear that the threat of a cyber attack is top of mind for security leaders 7 Source: Foundry Security Priorities Study, 2022 The number one security priority this year, be appropriately prepared to respond to a security incident, was also the number one priority in 2021. Leaders are taking this seriously as improve/ increase security awareness among end-users through training is the #3 security priority for the upcoming year. 87% are aware of what caused their security incidents over the past year, with the number one cause being non-malicious user error.
  • 8. Challenges Security leaders keep having to redirect their time away from strategic tasks due to a larger variety of challenges. 8 Source: Foundry Security Priorities Study, 2022 Security leaders are planning for greater alignment 82% report regular or frequent engagement with the Board of Directors. 54% say that their engagement with the Board of Directors helps improve cybersecurity/ security initiatives.
  • 9. plan to outsource some security functions. Investments As organizations struggle to attract and retain appropriate security talent, security leaders invest in new practices and technologies to bring efficiencies. 9 Source: Foundry Security Priorities Study, 2022 How security leaders are addressing the skills shortage The majority of organizations will evaluate the efficacy of a security solution after two months of use, but before they’ve implemented for a year. 45% are utilizing technologies that automate security priorities in order to combat security skill shortage. 42% Key takeaway: Security vendors must stay up to date on the status of their clients and ensure the tools are meeting their needs and expectations.