SlideShare une entreprise Scribd logo
1  sur  11
2018 TRENDS IN CYBERSECURITY
BUILDING EFFECTIVE SECURITY TEAMS
September 2018
The complete 2018 Trends in Cybersecurity research report can be viewed free of charge at CompTIA.org (with simple registration)
Copyright (c) 2018 CompTIA Properties, LLC, All Rights Reserved | CompTIA.org | research@comptia.org
Satisfaction with current security posture
Source: CompTIA’s 2018 Trends in Cybersecurity study | n = 402 IT and business professionals in the U.S.
27%
61%
12%
20%
67%
13%
Large Mid-sized Small
Completely
satisfactory
Adequate/
unsatisfactory
Mostly
satisfactory
14%
64%
22%
Major issues driving IT security
31%
35%
38%
44%
47%
51%
51%
57%
Compliance with regulations
Quantifying impact of security to business
Breadth of skills needed to address security issues
Increased reliance on data
Overall threat of attacks to business
Privacy concerns
Variety of attacks
Growing number of hackers/cybercriminals
Source: CompTIA’s 2018 Trends in Cybersecurity study | n = 402 IT and business professionals in the U.S.
Drivers for changing approach to IT security
11%
18%
19%
20%
24%
25%
26%
36%
48%
No recent change to security approach
Focus on a new industry vertical
Change in management
Change in business operations or client base
Vulnerability discovered by an outside party
Action taken after training or certification
Internal security breach or incident
Reports of security breaches at other organizations
Change in IT operations
Source: CompTIA’s 2018 Trends in Cybersecurity study | n = 402 IT and business professionals in the U.S.
Location of security center of operations
Source: CompTIA’s 2018 Trends in Cybersecurity study | n = 402 IT and business professionals in the U.S.
36%
26%
20%
8%
6%
Part of internal infrastructure team Internal team reporting to CIO
Internal team outside IT
Third-party
security firm Not enough security focus
for dedicated center
4%
Third-party IT firm
Demographics of third party security partners
37%
50%
13%
Number of security partners
4 or
more
19%
39%
43%
1-2 years
3-4 years
More than
5 years
2-3
1
Number of years working with
third party security lead
Source: CompTIA’s 2018 Trends in Cybersecurity study | n = 314 IT and business professionals in the U.S. working with third party security firms
n = 54 IT and business professionals in the U.S. working with third party security firms as center of security operations
Prerequisite knowledge needed for IT security
57%
62%
66%
66%
69%
71%
Basic knowledge of cloud architecture
Awareness of laws/regulations
Basic knowledge of endpoint devices
Understanding of internal
workflow/processes
Basic knowledge of networking
Basic knowledge of server
administration
Source: CompTIA’s 2018 Trends in Cybersecurity study | n = 402 IT and business professionals in the U.S.
Improvement needed across broad set of skills
Source: CompTIA’s 2018 Trends in Cybersecurity study | n = 402 IT and business professionals in the U.S.
51%
58%
58%
64%
61%
61%
56%
59%
65%
63%
59%
63%
28%
30%
31%
25%
28%
28%
33%
31%
25%
27%
32%
28%
Cryptography
Penetration testing
Risk management
Network/infrastructure security
Application/data/host security
Security analytics
Educational ability
Incident detection and response
Access control/identity management
Compliance/operational security
Knowledge of threats/vulnerabilities
Vulnerability assessment
Moderate improvement needed Significant improvement needed
Options being considered for improving security skills
57%
53%
44%
41%
37%
Train current
employees
Hire security-
specific skills
Expand use of
third parties
Certify current
employees
Explore use of
third parties
Source: CompTIA’s 2018 Trends in Cybersecurity study | n = 402 IT and business professionals in the U.S.
67%
27%
6%
Formal policies
and procedures
Unwritten rules
that are typically
followed
Incident Response Plans Common but Not Necessarily
Effective
No policies or
procedures
33%
60%
7%
Highly
effective
Moderately
effectiveSlightly
effective/Not
effective
Source: CompTIA’s 2018 Trends in Cybersecurity study | n = 402 IT and business professionals in the U.S.
n = 376 IT and business professionals in the U.S. with formal or informal incident response plans
Wide Variety of Metrics In Use
18%
20%
25%
31%
31%
36%
38%
40%
40%
43%
45%
Number of third-party agreements with security language
Formal return on investment calculation
Informal return on investment process
Percentage of software going through code review
Number of flaws found by third party audit
Number of violations of corporate policy
Percent of network traffic flagged as anomalous
Percentage of employees taking security training
Percent of systems with formal risk assessment
Number of systems patched recently
Number of successful compliance audits
Source: CompTIA’s 2018 Trends in Cybersecurity study | n = 366 IT and business professionals in the U.S. using security metrics

Contenu connexe

Tendances

Trends in Information Security
Trends in Information SecurityTrends in Information Security
Trends in Information SecurityCompTIA
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsArgyle Executive Forum
 
State of the CIO 2018 Infographic
State of the CIO 2018 InfographicState of the CIO 2018 Infographic
State of the CIO 2018 InfographicIDG
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionPrecisely
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Priyanka Aash
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summarypatmisasi
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsScalar Decisions
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...Symantec
 
How to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategyHow to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategyCigniti Technologies Ltd
 
Cybersecurity's Impact on Innovation
Cybersecurity's Impact on InnovationCybersecurity's Impact on Innovation
Cybersecurity's Impact on InnovationSilicon Valley Bank
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecurityImperva
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyScalar Decisions
 
How Do Organizations Measure up on Securing their IoT Products?
How Do Organizations Measure up on Securing their IoT Products?How Do Organizations Measure up on Securing their IoT Products?
How Do Organizations Measure up on Securing their IoT Products?Capgemini
 
BSides Delhi 2018: Securing Supply Chain- A Risk Based Assessment Framework
BSides Delhi 2018: Securing Supply Chain- A Risk Based Assessment FrameworkBSides Delhi 2018: Securing Supply Chain- A Risk Based Assessment Framework
BSides Delhi 2018: Securing Supply Chain- A Risk Based Assessment FrameworkBSides Delhi
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Phil Agcaoili
 
2021 IDG Security Priorities Study
2021 IDG Security Priorities Study2021 IDG Security Priorities Study
2021 IDG Security Priorities StudyIDG
 
Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15Symantec
 

Tendances (20)

Trends in Information Security
Trends in Information SecurityTrends in Information Security
Trends in Information Security
 
Infosecurity Europe - Infographic
Infosecurity Europe - InfographicInfosecurity Europe - Infographic
Infosecurity Europe - Infographic
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
 
State of the CIO 2018 Infographic
State of the CIO 2018 InfographicState of the CIO 2018 Infographic
State of the CIO 2018 Infographic
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
State of Security
State of SecurityState of Security
State of Security
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
How to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategyHow to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategy
 
Cybersecurity's Impact on Innovation
Cybersecurity's Impact on InnovationCybersecurity's Impact on Innovation
Cybersecurity's Impact on Innovation
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
How Do Organizations Measure up on Securing their IoT Products?
How Do Organizations Measure up on Securing their IoT Products?How Do Organizations Measure up on Securing their IoT Products?
How Do Organizations Measure up on Securing their IoT Products?
 
BSides Delhi 2018: Securing Supply Chain- A Risk Based Assessment Framework
BSides Delhi 2018: Securing Supply Chain- A Risk Based Assessment FrameworkBSides Delhi 2018: Securing Supply Chain- A Risk Based Assessment Framework
BSides Delhi 2018: Securing Supply Chain- A Risk Based Assessment Framework
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
 
2021 IDG Security Priorities Study
2021 IDG Security Priorities Study2021 IDG Security Priorities Study
2021 IDG Security Priorities Study
 
Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15
 

Similaire à 2018 Trends in Cybersecurity: Building Effective Security Teams

CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
CompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security TrendsCompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security TrendsCompTIA
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA
 
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Precisely
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019Precisely
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfIDG
 
Forrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardForrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardSecurityScorecard
 
CompTIA 2014 IT Trends in Review
CompTIA 2014 IT Trends in ReviewCompTIA 2014 IT Trends in Review
CompTIA 2014 IT Trends in ReviewCompTIA
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22IDG
 
Digital organizations study
Digital organizations studyDigital organizations study
Digital organizations studyCompTIA
 
Security Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdfSecurity Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdfIDG
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...SolarWinds
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryCompTIA
 
International Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryInternational Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryCompTIA
 
International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryCompTIA
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfIDG
 
International Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryInternational Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryCompTIA
 
2017 Role & Influence of the Technology Decision-Maker
2017 Role & Influence of the Technology Decision-Maker2017 Role & Influence of the Technology Decision-Maker
2017 Role & Influence of the Technology Decision-MakerIDG
 

Similaire à 2018 Trends in Cybersecurity: Building Effective Security Teams (20)

CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
CompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security TrendsCompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security Trends
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel
 
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
Forrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardForrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the Standard
 
CompTIA 2014 IT Trends in Review
CompTIA 2014 IT Trends in ReviewCompTIA 2014 IT Trends in Review
CompTIA 2014 IT Trends in Review
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22
 
Digital organizations study
Digital organizations studyDigital organizations study
Digital organizations study
 
Security Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdfSecurity Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdf
 
Conférence CISCO ACSS 2018
Conférence CISCO ACSS 2018Conférence CISCO ACSS 2018
Conférence CISCO ACSS 2018
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian Summary
 
International Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryInternational Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand Summary
 
International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian Summary
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
International Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryInternational Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India Summary
 
2017 Role & Influence of the Technology Decision-Maker
2017 Role & Influence of the Technology Decision-Maker2017 Role & Influence of the Technology Decision-Maker
2017 Role & Influence of the Technology Decision-Maker
 

Plus de CompTIA

CompTIA IT Employment Tracker – December 2021
CompTIA IT Employment Tracker –  December 2021CompTIA IT Employment Tracker –  December 2021
CompTIA IT Employment Tracker – December 2021CompTIA
 
CompTIA IT Employment Tracker – November 2021
CompTIA IT Employment Tracker –  November 2021CompTIA IT Employment Tracker –  November 2021
CompTIA IT Employment Tracker – November 2021CompTIA
 
CompTIA IT Employment Tracker – October 2021
CompTIA IT Employment Tracker –  October 2021CompTIA IT Employment Tracker –  October 2021
CompTIA IT Employment Tracker – October 2021CompTIA
 
CompTIA IT Employment Tracker – September 2021
CompTIA IT Employment Tracker –  September 2021CompTIA IT Employment Tracker –  September 2021
CompTIA IT Employment Tracker – September 2021CompTIA
 
CompTIA IT Employment Tracker – July 2021
CompTIA IT Employment Tracker –  July 2021CompTIA IT Employment Tracker –  July 2021
CompTIA IT Employment Tracker – July 2021CompTIA
 
CompTIA IT Employment Tracker – June 2021
CompTIA IT Employment Tracker –  June 2021CompTIA IT Employment Tracker –  June 2021
CompTIA IT Employment Tracker – June 2021CompTIA
 
Trends in Automation 2021
Trends in Automation 2021Trends in Automation 2021
Trends in Automation 2021CompTIA
 
CompTIA IT Employment Tracker – May 2021
CompTIA IT Employment Tracker –  May 2021CompTIA IT Employment Tracker –  May 2021
CompTIA IT Employment Tracker – May 2021CompTIA
 
CompTIA IT Employment Tracker – April 2021
CompTIA IT Employment Tracker –  April 2021CompTIA IT Employment Tracker –  April 2021
CompTIA IT Employment Tracker – April 2021CompTIA
 
IT Operations and Emerging Technology
IT Operations and Emerging TechnologyIT Operations and Emerging Technology
IT Operations and Emerging TechnologyCompTIA
 
CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021CompTIA
 
Help Desk Trends
Help Desk TrendsHelp Desk Trends
Help Desk TrendsCompTIA
 
CompTIA IT Employment Tracker – February 2021
CompTIA IT Employment Tracker –  February 2021CompTIA IT Employment Tracker –  February 2021
CompTIA IT Employment Tracker – February 2021CompTIA
 
CompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry OutlookCompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry OutlookCompTIA
 
CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021CompTIA
 
CompTIA IT Employment Tracker – November 2020
CompTIA IT Employment Tracker –  November 2020CompTIA IT Employment Tracker –  November 2020
CompTIA IT Employment Tracker – November 2020CompTIA
 
CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020CompTIA
 
CompTIA IT Employment Tracker – September 2020
CompTIA IT Employment Tracker –  September 2020CompTIA IT Employment Tracker –  September 2020
CompTIA IT Employment Tracker – September 2020CompTIA
 
CompTIA IT Employment Tracker – August 2020
CompTIA IT Employment Tracker –  August 2020CompTIA IT Employment Tracker –  August 2020
CompTIA IT Employment Tracker – August 2020CompTIA
 
CompTIA IT Employment Tracker – July 2020
CompTIA IT Employment Tracker –  July 2020CompTIA IT Employment Tracker –  July 2020
CompTIA IT Employment Tracker – July 2020CompTIA
 

Plus de CompTIA (20)

CompTIA IT Employment Tracker – December 2021
CompTIA IT Employment Tracker –  December 2021CompTIA IT Employment Tracker –  December 2021
CompTIA IT Employment Tracker – December 2021
 
CompTIA IT Employment Tracker – November 2021
CompTIA IT Employment Tracker –  November 2021CompTIA IT Employment Tracker –  November 2021
CompTIA IT Employment Tracker – November 2021
 
CompTIA IT Employment Tracker – October 2021
CompTIA IT Employment Tracker –  October 2021CompTIA IT Employment Tracker –  October 2021
CompTIA IT Employment Tracker – October 2021
 
CompTIA IT Employment Tracker – September 2021
CompTIA IT Employment Tracker –  September 2021CompTIA IT Employment Tracker –  September 2021
CompTIA IT Employment Tracker – September 2021
 
CompTIA IT Employment Tracker – July 2021
CompTIA IT Employment Tracker –  July 2021CompTIA IT Employment Tracker –  July 2021
CompTIA IT Employment Tracker – July 2021
 
CompTIA IT Employment Tracker – June 2021
CompTIA IT Employment Tracker –  June 2021CompTIA IT Employment Tracker –  June 2021
CompTIA IT Employment Tracker – June 2021
 
Trends in Automation 2021
Trends in Automation 2021Trends in Automation 2021
Trends in Automation 2021
 
CompTIA IT Employment Tracker – May 2021
CompTIA IT Employment Tracker –  May 2021CompTIA IT Employment Tracker –  May 2021
CompTIA IT Employment Tracker – May 2021
 
CompTIA IT Employment Tracker – April 2021
CompTIA IT Employment Tracker –  April 2021CompTIA IT Employment Tracker –  April 2021
CompTIA IT Employment Tracker – April 2021
 
IT Operations and Emerging Technology
IT Operations and Emerging TechnologyIT Operations and Emerging Technology
IT Operations and Emerging Technology
 
CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021CompTIA IT Employment Tracker – March 2021
CompTIA IT Employment Tracker – March 2021
 
Help Desk Trends
Help Desk TrendsHelp Desk Trends
Help Desk Trends
 
CompTIA IT Employment Tracker – February 2021
CompTIA IT Employment Tracker –  February 2021CompTIA IT Employment Tracker –  February 2021
CompTIA IT Employment Tracker – February 2021
 
CompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry OutlookCompTIA 2021 IT Industry Outlook
CompTIA 2021 IT Industry Outlook
 
CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker - January 2021
 
CompTIA IT Employment Tracker – November 2020
CompTIA IT Employment Tracker –  November 2020CompTIA IT Employment Tracker –  November 2020
CompTIA IT Employment Tracker – November 2020
 
CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – October 2020
 
CompTIA IT Employment Tracker – September 2020
CompTIA IT Employment Tracker –  September 2020CompTIA IT Employment Tracker –  September 2020
CompTIA IT Employment Tracker – September 2020
 
CompTIA IT Employment Tracker – August 2020
CompTIA IT Employment Tracker –  August 2020CompTIA IT Employment Tracker –  August 2020
CompTIA IT Employment Tracker – August 2020
 
CompTIA IT Employment Tracker – July 2020
CompTIA IT Employment Tracker –  July 2020CompTIA IT Employment Tracker –  July 2020
CompTIA IT Employment Tracker – July 2020
 

Dernier

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Dernier (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

2018 Trends in Cybersecurity: Building Effective Security Teams

  • 1. 2018 TRENDS IN CYBERSECURITY BUILDING EFFECTIVE SECURITY TEAMS September 2018 The complete 2018 Trends in Cybersecurity research report can be viewed free of charge at CompTIA.org (with simple registration) Copyright (c) 2018 CompTIA Properties, LLC, All Rights Reserved | CompTIA.org | research@comptia.org
  • 2. Satisfaction with current security posture Source: CompTIA’s 2018 Trends in Cybersecurity study | n = 402 IT and business professionals in the U.S. 27% 61% 12% 20% 67% 13% Large Mid-sized Small Completely satisfactory Adequate/ unsatisfactory Mostly satisfactory 14% 64% 22%
  • 3. Major issues driving IT security 31% 35% 38% 44% 47% 51% 51% 57% Compliance with regulations Quantifying impact of security to business Breadth of skills needed to address security issues Increased reliance on data Overall threat of attacks to business Privacy concerns Variety of attacks Growing number of hackers/cybercriminals Source: CompTIA’s 2018 Trends in Cybersecurity study | n = 402 IT and business professionals in the U.S.
  • 4. Drivers for changing approach to IT security 11% 18% 19% 20% 24% 25% 26% 36% 48% No recent change to security approach Focus on a new industry vertical Change in management Change in business operations or client base Vulnerability discovered by an outside party Action taken after training or certification Internal security breach or incident Reports of security breaches at other organizations Change in IT operations Source: CompTIA’s 2018 Trends in Cybersecurity study | n = 402 IT and business professionals in the U.S.
  • 5. Location of security center of operations Source: CompTIA’s 2018 Trends in Cybersecurity study | n = 402 IT and business professionals in the U.S. 36% 26% 20% 8% 6% Part of internal infrastructure team Internal team reporting to CIO Internal team outside IT Third-party security firm Not enough security focus for dedicated center 4% Third-party IT firm
  • 6. Demographics of third party security partners 37% 50% 13% Number of security partners 4 or more 19% 39% 43% 1-2 years 3-4 years More than 5 years 2-3 1 Number of years working with third party security lead Source: CompTIA’s 2018 Trends in Cybersecurity study | n = 314 IT and business professionals in the U.S. working with third party security firms n = 54 IT and business professionals in the U.S. working with third party security firms as center of security operations
  • 7. Prerequisite knowledge needed for IT security 57% 62% 66% 66% 69% 71% Basic knowledge of cloud architecture Awareness of laws/regulations Basic knowledge of endpoint devices Understanding of internal workflow/processes Basic knowledge of networking Basic knowledge of server administration Source: CompTIA’s 2018 Trends in Cybersecurity study | n = 402 IT and business professionals in the U.S.
  • 8. Improvement needed across broad set of skills Source: CompTIA’s 2018 Trends in Cybersecurity study | n = 402 IT and business professionals in the U.S. 51% 58% 58% 64% 61% 61% 56% 59% 65% 63% 59% 63% 28% 30% 31% 25% 28% 28% 33% 31% 25% 27% 32% 28% Cryptography Penetration testing Risk management Network/infrastructure security Application/data/host security Security analytics Educational ability Incident detection and response Access control/identity management Compliance/operational security Knowledge of threats/vulnerabilities Vulnerability assessment Moderate improvement needed Significant improvement needed
  • 9. Options being considered for improving security skills 57% 53% 44% 41% 37% Train current employees Hire security- specific skills Expand use of third parties Certify current employees Explore use of third parties Source: CompTIA’s 2018 Trends in Cybersecurity study | n = 402 IT and business professionals in the U.S.
  • 10. 67% 27% 6% Formal policies and procedures Unwritten rules that are typically followed Incident Response Plans Common but Not Necessarily Effective No policies or procedures 33% 60% 7% Highly effective Moderately effectiveSlightly effective/Not effective Source: CompTIA’s 2018 Trends in Cybersecurity study | n = 402 IT and business professionals in the U.S. n = 376 IT and business professionals in the U.S. with formal or informal incident response plans
  • 11. Wide Variety of Metrics In Use 18% 20% 25% 31% 31% 36% 38% 40% 40% 43% 45% Number of third-party agreements with security language Formal return on investment calculation Informal return on investment process Percentage of software going through code review Number of flaws found by third party audit Number of violations of corporate policy Percent of network traffic flagged as anomalous Percentage of employees taking security training Percent of systems with formal risk assessment Number of systems patched recently Number of successful compliance audits Source: CompTIA’s 2018 Trends in Cybersecurity study | n = 366 IT and business professionals in the U.S. using security metrics

Notes de l'éditeur

  1. Q9
  2. Q9
  3. Q9
  4. Q9
  5. Q9
  6. Q9
  7. Q9
  8. Q6 and Q10