SlideShare ist ein Scribd-Unternehmen logo
1 von 8
State of the CSO
2015
2
Purpose and Methodology
SURVEY SAMPLE
TOTAL
RESPONDENTS
366 Security
Decision-Makers
MARGIN OF ERROR +/- 5.1%
AUDIENCE BASE CSOonline.com
visitors, CSO LinkedIn
Forum members and
email invitations to
audience.
COLLECTION Online Questionnaire
NUMBER OF
QUESTIONS
26 (incl. demographics)
Mitigating risk and keeping an organization
secure continues to be a challenge. CSO’s
annual State of the CSO survey is conducted to
provide a complete overview of the evolving role
of CSOs in today’s business climate, from
security strategy, to metrics, budget and
function ownership.
SURVEY GOAL
SURVEY METHOD
Source: State of the CSO Survey, CSO, 2015
3
Big Breaches = Security Practices Reevaluation
Q. Have recent big name data breaches (such as those experienced by eBay, Neiman Marcus and Target) caused your
organization to reevaluate its information security standards?
49%
44%
7%
Source: State of the CSO Survey, CSO, 2015
Not Reevaluating
Not Sure If They
Are Reevaluating
Reevaluating
4
Most Likely to Directly Report to CEO
Q. To whom do you directly report?
Source: State of the CSO Survey, CSO, 2015
23%
21%
8% 8% 8%
7%
4%
13%
Chief Executive
Officer (CEO)/
President/ Owner/
Partner
Chief Information
Officer (CIO) or
Equivalent
Chief Security
Officer (CSO)
Chief Financial
Officer (CFO) or
Equivalent
Chief Technology
Officer (CTO) or
Equivalent
Chief Operating
Officer (COO) or
Equivalent
Chief Risk Officer
(CRO) or Other
Risk Management
Function
Other
5
Increasing Value in Managing Risk
Q. In the past 12 months, has your organization's senior management placed more, less or the same value on risk
management?
Q. In the next 12 months, how do you expect the value senior management places on risk management to change?
51%
13%
35%
70%
5%
19%
More Value Less Value No Change
Past 12 Months Next 12 Months
Source: State of the CSO Survey, CSO, 2015
6
Source: State of the CSO Survey, CSO, 2015
5%
34%
35%
37%
40%
56%
62%
67%
72%
77%
82%
87%
Other
Sales/Marketing
Supply Chain
Third Party Technology Ecosystem
Loss Prevention
Human Resources
General Counsel/Legal
Physical/Corporate Security
Financial Risk/Insurance
Executive Management
Business Continuity/Disaster Recovery
Information Security
Collaboration Needed for Successful ERM Implementation
Q. Which of the following disciplines, departments or groups are included in your organization’s formal Enterprise Risk
Management process? (base: use a formal ERM process that incorporates multiple types of risk)
6.5
departments on
average involved
in formal ERM
process
7
Satisfaction Decreasing with Security Vendors
Q. In general, how satisfied are you with the quality and relevance of products and services offered by security vendors?
Source: State of the CSO Survey, CSO, 2015
8
Learn More
Source: State of the CSO Survey, CSO, 2015
For more information on this study, contact Sue Yanovitch, VP of
Marketing, at syanovitch@idgenterprise.com.

Weitere ähnliche Inhalte

Was ist angesagt?

State of the CIO 2018 Infographic
State of the CIO 2018 InfographicState of the CIO 2018 Infographic
State of the CIO 2018 InfographicIDG
 
Digital Business 2018
Digital Business 2018Digital Business 2018
Digital Business 2018IDG
 
State of the CIO 2018
State of the CIO 2018State of the CIO 2018
State of the CIO 2018IDG
 
Cleaning up intercompany accounting: Driving efficiency while managing risk
Cleaning up intercompany accounting: Driving efficiency while managing riskCleaning up intercompany accounting: Driving efficiency while managing risk
Cleaning up intercompany accounting: Driving efficiency while managing riskDeloitte United States
 
Boutique Asset Managers: Protect Your Business and Reputation Against Risks
Boutique Asset Managers: Protect Your Business and Reputation Against RisksBoutique Asset Managers: Protect Your Business and Reputation Against Risks
Boutique Asset Managers: Protect Your Business and Reputation Against RisksFIS
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureAccenture Operations
 
2018 IDG Customer Engagement Study
2018 IDG Customer Engagement Study2018 IDG Customer Engagement Study
2018 IDG Customer Engagement StudyIDG
 
Accenture-2015-Global-Risk-Management-Study-Insurance-Report
Accenture-2015-Global-Risk-Management-Study-Insurance-ReportAccenture-2015-Global-Risk-Management-Study-Insurance-Report
Accenture-2015-Global-Risk-Management-Study-Insurance-ReportTomas Imrich
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseThe Economist Media Businesses
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursSurfWatch Labs
 
CIO Tech Poll: Tech Priorities 2019
CIO Tech Poll: Tech Priorities 2019CIO Tech Poll: Tech Priorities 2019
CIO Tech Poll: Tech Priorities 2019IDG
 
Chief Audit Execs speak out: Cybersecurity & risk management
Chief Audit Execs speak out: Cybersecurity & risk managementChief Audit Execs speak out: Cybersecurity & risk management
Chief Audit Execs speak out: Cybersecurity & risk managementGrant Thornton LLP
 
Building A Global Pharmaceutical Traceability Foundation
Building A Global Pharmaceutical Traceability FoundationBuilding A Global Pharmaceutical Traceability Foundation
Building A Global Pharmaceutical Traceability FoundationSupplyScape
 
6 forrester for loyalty in banking 2017 sausage
6 forrester for loyalty in banking 2017   sausage6 forrester for loyalty in banking 2017   sausage
6 forrester for loyalty in banking 2017 sausageBankir_Ru
 
IDG 2019 Digital Business infographic
IDG 2019 Digital Business infographicIDG 2019 Digital Business infographic
IDG 2019 Digital Business infographicIDG
 

Was ist angesagt? (18)

Changing Tides
Changing TidesChanging Tides
Changing Tides
 
State of the CIO 2018 Infographic
State of the CIO 2018 InfographicState of the CIO 2018 Infographic
State of the CIO 2018 Infographic
 
Digital Business 2018
Digital Business 2018Digital Business 2018
Digital Business 2018
 
State of the CIO 2018
State of the CIO 2018State of the CIO 2018
State of the CIO 2018
 
Cleaning up intercompany accounting: Driving efficiency while managing risk
Cleaning up intercompany accounting: Driving efficiency while managing riskCleaning up intercompany accounting: Driving efficiency while managing risk
Cleaning up intercompany accounting: Driving efficiency while managing risk
 
Boutique Asset Managers: Protect Your Business and Reputation Against Risks
Boutique Asset Managers: Protect Your Business and Reputation Against RisksBoutique Asset Managers: Protect Your Business and Reputation Against Risks
Boutique Asset Managers: Protect Your Business and Reputation Against Risks
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | Accenture
 
2018 IDG Customer Engagement Study
2018 IDG Customer Engagement Study2018 IDG Customer Engagement Study
2018 IDG Customer Engagement Study
 
Accenture-2015-Global-Risk-Management-Study-Insurance-Report
Accenture-2015-Global-Risk-Management-Study-Insurance-ReportAccenture-2015-Global-Risk-Management-Study-Insurance-Report
Accenture-2015-Global-Risk-Management-Study-Insurance-Report
 
2015 IA survey - Protiviti
2015 IA survey - Protiviti2015 IA survey - Protiviti
2015 IA survey - Protiviti
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
 
Charting a Course for the Future [Infographic]
Charting a Course for the Future [Infographic]Charting a Course for the Future [Infographic]
Charting a Course for the Future [Infographic]
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 
CIO Tech Poll: Tech Priorities 2019
CIO Tech Poll: Tech Priorities 2019CIO Tech Poll: Tech Priorities 2019
CIO Tech Poll: Tech Priorities 2019
 
Chief Audit Execs speak out: Cybersecurity & risk management
Chief Audit Execs speak out: Cybersecurity & risk managementChief Audit Execs speak out: Cybersecurity & risk management
Chief Audit Execs speak out: Cybersecurity & risk management
 
Building A Global Pharmaceutical Traceability Foundation
Building A Global Pharmaceutical Traceability FoundationBuilding A Global Pharmaceutical Traceability Foundation
Building A Global Pharmaceutical Traceability Foundation
 
6 forrester for loyalty in banking 2017 sausage
6 forrester for loyalty in banking 2017   sausage6 forrester for loyalty in banking 2017   sausage
6 forrester for loyalty in banking 2017 sausage
 
IDG 2019 Digital Business infographic
IDG 2019 Digital Business infographicIDG 2019 Digital Business infographic
IDG 2019 Digital Business infographic
 

Ähnlich wie State of the CSO 2015

Impacts cloud remote_workforce
Impacts cloud remote_workforceImpacts cloud remote_workforce
Impacts cloud remote_workforceRodrigo Varas
 
Bain brief management_tools_2015
Bain brief management_tools_2015Bain brief management_tools_2015
Bain brief management_tools_2015Ying wei (Joe) Chou
 
Bain brief management_tools_2015
Bain brief management_tools_2015Bain brief management_tools_2015
Bain brief management_tools_2015Yogesh Bhat
 
Oct 2017 Measurement Hour: Highlights from the Summit on the Future of Measur...
Oct 2017 Measurement Hour: Highlights from the Summit on the Future of Measur...Oct 2017 Measurement Hour: Highlights from the Summit on the Future of Measur...
Oct 2017 Measurement Hour: Highlights from the Summit on the Future of Measur...Paine Publishing
 
Forrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardForrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardSecurityScorecard
 
Lets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNixLets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNixFixNix Inc.,
 
Infosys Amplifying Human Potential
Infosys Amplifying Human PotentialInfosys Amplifying Human Potential
Infosys Amplifying Human PotentialInfosys
 
CAEs speak out: Cybersecurity seen as key threat to growth
CAEs speak out: Cybersecurity seen as key threat to growthCAEs speak out: Cybersecurity seen as key threat to growth
CAEs speak out: Cybersecurity seen as key threat to growthGrant Thornton LLP
 
Learn with the Flow: Digital Adoption Tactics That Drive Digital Transformati...
Learn with the Flow: Digital Adoption Tactics That Drive Digital Transformati...Learn with the Flow: Digital Adoption Tactics That Drive Digital Transformati...
Learn with the Flow: Digital Adoption Tactics That Drive Digital Transformati...Aggregage
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015Capgemini
 
Emergence of the Chief Risk Officer function
Emergence of the Chief Risk Officer functionEmergence of the Chief Risk Officer function
Emergence of the Chief Risk Officer functionMichel Rochette
 
GRC Risk Management_1-Pager
GRC Risk Management_1-PagerGRC Risk Management_1-Pager
GRC Risk Management_1-PagerSalman Akorede
 
Achieving Results With Talent Mobility: Case Studies and Lessons
Achieving Results With Talent Mobility: Case Studies and LessonsAchieving Results With Talent Mobility: Case Studies and Lessons
Achieving Results With Talent Mobility: Case Studies and LessonsHuman Capital Media
 
Transforming the Modern PMO- Harnessing AI-Driven Strategic Portfolio Managem...
Transforming the Modern PMO- Harnessing AI-Driven Strategic Portfolio Managem...Transforming the Modern PMO- Harnessing AI-Driven Strategic Portfolio Managem...
Transforming the Modern PMO- Harnessing AI-Driven Strategic Portfolio Managem...OnePlan Solutions
 
State of Data Governance in 2021
State of Data Governance in 2021State of Data Governance in 2021
State of Data Governance in 2021DATAVERSITY
 
Business Analytics and Audit Analytics.pptx
Business Analytics and Audit Analytics.pptxBusiness Analytics and Audit Analytics.pptx
Business Analytics and Audit Analytics.pptxpaul young cpa, cga
 

Ähnlich wie State of the CSO 2015 (20)

Impacts cloud remote_workforce
Impacts cloud remote_workforceImpacts cloud remote_workforce
Impacts cloud remote_workforce
 
Bain brief management_tools_2015
Bain brief management_tools_2015Bain brief management_tools_2015
Bain brief management_tools_2015
 
Bain brief management_tools_2015
Bain brief management_tools_2015Bain brief management_tools_2015
Bain brief management_tools_2015
 
Brian Solis
Brian SolisBrian Solis
Brian Solis
 
Brian Solis
Brian SolisBrian Solis
Brian Solis
 
Oct 2017 Measurement Hour: Highlights from the Summit on the Future of Measur...
Oct 2017 Measurement Hour: Highlights from the Summit on the Future of Measur...Oct 2017 Measurement Hour: Highlights from the Summit on the Future of Measur...
Oct 2017 Measurement Hour: Highlights from the Summit on the Future of Measur...
 
Forrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardForrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the Standard
 
Lets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNixLets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNix
 
Infosys Amplifying Human Potential
Infosys Amplifying Human PotentialInfosys Amplifying Human Potential
Infosys Amplifying Human Potential
 
CAEs speak out: Cybersecurity seen as key threat to growth
CAEs speak out: Cybersecurity seen as key threat to growthCAEs speak out: Cybersecurity seen as key threat to growth
CAEs speak out: Cybersecurity seen as key threat to growth
 
Learn with the Flow: Digital Adoption Tactics That Drive Digital Transformati...
Learn with the Flow: Digital Adoption Tactics That Drive Digital Transformati...Learn with the Flow: Digital Adoption Tactics That Drive Digital Transformati...
Learn with the Flow: Digital Adoption Tactics That Drive Digital Transformati...
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
Analytics in the boardroom
Analytics in the boardroomAnalytics in the boardroom
Analytics in the boardroom
 
Emergence of the Chief Risk Officer function
Emergence of the Chief Risk Officer functionEmergence of the Chief Risk Officer function
Emergence of the Chief Risk Officer function
 
GRC Risk Management_1-Pager
GRC Risk Management_1-PagerGRC Risk Management_1-Pager
GRC Risk Management_1-Pager
 
Broken links
Broken linksBroken links
Broken links
 
Achieving Results With Talent Mobility: Case Studies and Lessons
Achieving Results With Talent Mobility: Case Studies and LessonsAchieving Results With Talent Mobility: Case Studies and Lessons
Achieving Results With Talent Mobility: Case Studies and Lessons
 
Transforming the Modern PMO- Harnessing AI-Driven Strategic Portfolio Managem...
Transforming the Modern PMO- Harnessing AI-Driven Strategic Portfolio Managem...Transforming the Modern PMO- Harnessing AI-Driven Strategic Portfolio Managem...
Transforming the Modern PMO- Harnessing AI-Driven Strategic Portfolio Managem...
 
State of Data Governance in 2021
State of Data Governance in 2021State of Data Governance in 2021
State of Data Governance in 2021
 
Business Analytics and Audit Analytics.pptx
Business Analytics and Audit Analytics.pptxBusiness Analytics and Audit Analytics.pptx
Business Analytics and Audit Analytics.pptx
 

Mehr von IDG

Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfIDG
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfIDG
 
Role and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdfRole and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdfIDG
 
2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdfIDG
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfIDG
 
CIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdfCIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdfIDG
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxState of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxIDG
 
State of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfState of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfIDG
 
R_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdfR_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdfIDG
 
Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022IDG
 
R-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdfR-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdfIDG
 
Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022IDG
 
Security Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdfSecurity Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdfIDG
 
R_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdfR_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdfIDG
 
Foundry Future of Work Study 2022
Foundry Future of Work Study 2022Foundry Future of Work Study 2022
Foundry Future of Work Study 2022IDG
 
Data & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdfData & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdfIDG
 
NEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfNEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfIDG
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22IDG
 
R if data_analytics_03.08.22
R if data_analytics_03.08.22R if data_analytics_03.08.22
R if data_analytics_03.08.22IDG
 
Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020IDG
 

Mehr von IDG (20)

Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
Role and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdfRole and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdf
 
2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
 
CIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdfCIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdf
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxState of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
 
State of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfState of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdf
 
R_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdfR_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdf
 
Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022
 
R-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdfR-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdf
 
Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022
 
Security Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdfSecurity Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdf
 
R_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdfR_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdf
 
Foundry Future of Work Study 2022
Foundry Future of Work Study 2022Foundry Future of Work Study 2022
Foundry Future of Work Study 2022
 
Data & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdfData & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdf
 
NEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfNEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdf
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22
 
R if data_analytics_03.08.22
R if data_analytics_03.08.22R if data_analytics_03.08.22
R if data_analytics_03.08.22
 
Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020
 

Kürzlich hochgeladen

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Kürzlich hochgeladen (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

State of the CSO 2015

  • 1. State of the CSO 2015
  • 2. 2 Purpose and Methodology SURVEY SAMPLE TOTAL RESPONDENTS 366 Security Decision-Makers MARGIN OF ERROR +/- 5.1% AUDIENCE BASE CSOonline.com visitors, CSO LinkedIn Forum members and email invitations to audience. COLLECTION Online Questionnaire NUMBER OF QUESTIONS 26 (incl. demographics) Mitigating risk and keeping an organization secure continues to be a challenge. CSO’s annual State of the CSO survey is conducted to provide a complete overview of the evolving role of CSOs in today’s business climate, from security strategy, to metrics, budget and function ownership. SURVEY GOAL SURVEY METHOD Source: State of the CSO Survey, CSO, 2015
  • 3. 3 Big Breaches = Security Practices Reevaluation Q. Have recent big name data breaches (such as those experienced by eBay, Neiman Marcus and Target) caused your organization to reevaluate its information security standards? 49% 44% 7% Source: State of the CSO Survey, CSO, 2015 Not Reevaluating Not Sure If They Are Reevaluating Reevaluating
  • 4. 4 Most Likely to Directly Report to CEO Q. To whom do you directly report? Source: State of the CSO Survey, CSO, 2015 23% 21% 8% 8% 8% 7% 4% 13% Chief Executive Officer (CEO)/ President/ Owner/ Partner Chief Information Officer (CIO) or Equivalent Chief Security Officer (CSO) Chief Financial Officer (CFO) or Equivalent Chief Technology Officer (CTO) or Equivalent Chief Operating Officer (COO) or Equivalent Chief Risk Officer (CRO) or Other Risk Management Function Other
  • 5. 5 Increasing Value in Managing Risk Q. In the past 12 months, has your organization's senior management placed more, less or the same value on risk management? Q. In the next 12 months, how do you expect the value senior management places on risk management to change? 51% 13% 35% 70% 5% 19% More Value Less Value No Change Past 12 Months Next 12 Months Source: State of the CSO Survey, CSO, 2015
  • 6. 6 Source: State of the CSO Survey, CSO, 2015 5% 34% 35% 37% 40% 56% 62% 67% 72% 77% 82% 87% Other Sales/Marketing Supply Chain Third Party Technology Ecosystem Loss Prevention Human Resources General Counsel/Legal Physical/Corporate Security Financial Risk/Insurance Executive Management Business Continuity/Disaster Recovery Information Security Collaboration Needed for Successful ERM Implementation Q. Which of the following disciplines, departments or groups are included in your organization’s formal Enterprise Risk Management process? (base: use a formal ERM process that incorporates multiple types of risk) 6.5 departments on average involved in formal ERM process
  • 7. 7 Satisfaction Decreasing with Security Vendors Q. In general, how satisfied are you with the quality and relevance of products and services offered by security vendors? Source: State of the CSO Survey, CSO, 2015
  • 8. 8 Learn More Source: State of the CSO Survey, CSO, 2015 For more information on this study, contact Sue Yanovitch, VP of Marketing, at syanovitch@idgenterprise.com.