Summary based on IDG's 2021 Security Priorities study which provides insight into the security projects organizations are prioritizing in the coming year.
1. I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
IDG COMMUNICATIONS, INC.
QUALITY
MATTERS
IDG Security Priorities Study
Insight into the security projects focused on now and in the coming year
2021
2. I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
77%
9%
6%
5%
3%
Purpose and Methodology
Source: IDG Security Priorities Study, 2021
To gain a better understanding of the various security projects organizations are focused on now and in the
coming year. The research also looks at the issues that will demand the most time and strategic thinking for
IT and security teams, with some questions specific on Operational Technology (OT) environments.
SURVEY GOAL
AUDIENCE BASE
CIO, Computerworld, CSO, InfoWorld,
and Network World site visitors, and email
invitations to audience base.
NUMBER OF
QUESTIONS 35
COLLECTION METHOD
Online questionnaire
772
IT LEADERSHIP
All survey respondents are involved
in IT and/or corporate/physical
security decisions.
Business Mgmt
Technology
25%
Manufacturing 10%
Financial Services 10%
Healthcare 9%
Government/Non-profit 9%
Education 8%
Services (legal, consulting, real estate) 7%
Retail, Wholesale and Distribution 6%
JOB TITLES
TOTAL RESPONDENTS
TOP
REPRESENTED
INDUSTRIES
AVERAGE
COMPANY SIZE
11,535
EMPLOYEES
ExecIT/
Security
IT/Security
Pro
IT/
Security
Mgmt.
Other
2
REGION
North America – 57%
APAC – 35%
EMEA – 17%
3. I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
Physical Security Added to Responsibilities
3
Q. Have you added physical security to your responsibilities in the past three years or do you expect to in the future?
Source: IDG Security Priorities Study, 2021
11%
24%
65%
No, but expect to in
the next 12 months
No, and do
not expect to
Yes
<1,000 64%
1,000+ 64%
<1,000 12%
1,000+ 11%
<1,000 24%
1,000+ 24%
4. I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
Security Incidents Stem from User Error
4
Q. Of the security incidents your organization experienced last year, how many were caused by the following:
Source: IDG Security Priorities Study, 2021
5%
9%
13%
15%
16%
16%
16%
22%
26%
27%
27%
44%
Other
Not sure
Malicious trusted user(s) – an intentional insider attack
Software supply chain breaches
Compromised active identities
Stolen credentials
Zero-day vulnerability
Unexpected/underexpected business risks which exposed a vulnerability
(pandemic, business interruption, workforce changes, etc.)
Misconfiguration of services or systems either on- or off-premises
Security vulnerabilities at third-party individuals or organizations (e.g.,
managed service providers or other trusted partners)
Unpatched software vulnerabilities
Non-malicious user error – fell victim to phishing or non-malicious
violations of security policy(s)
91%
are aware of what
caused their
security incidents
in the past year
Up from 87% in 2020
5. I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
Longest Amount of Time Before Security
Incident was Detected
5
Q. What is the longest amount of time that passed before a security event was detected at your organization?
Source: IDG Security Priorities Study, 2021
17%
5%
6%
13%
27%
33%
Unsure
More than 6 months
Three - 6 months
One - three months
One - four weeks
Within one week
Enterprise: 30%
SMB: 23%
Enterprise: 11%
SMB: 22%
5 weeks
is the average
longest amount of
time passed before
a security event was
detected
6. I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
This Year’s Top Security Priorities
6
Q. What are your organizations top security priorities for the coming year?
Source: IDG Security Priorities Study, 2021
#1
Be appropriately
prepared to
respond to a
security incident
#2
Improve the
protection of
confidential and
sensitive data
#3
Improve/increase
security awareness
among end-users
through training
#4
Upgrade IT and
data security to
boost corporate
resiliency
#5
Reduce
complexity in
IT security
infrastructure
7. I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
Zero Trust & SOAR Lead the List of Technologies
Being Researched
Q: Which option best describes your current activity for each of the following security solutions?
Source: IDG Security Priorities Study, 2021
28%
28%
28%
30%
31%
31%
32%
32%
32%
32%
34%
35%
35%
37%
38%
15%
11%
12%
12%
10%
13%
15%
12%
13%
9%
13%
11%
10%
12%
14%
30%
26%
31%
17%
15%
29%
21%
25%
18%
10%
17%
15%
16%
18%
21%
15%
14%
16%
10%
9%
15%
14%
11%
12%
9%
10%
11%
10%
10%
11%
13%
22%
12%
31%
35%
12%
19%
20%
26%
39%
27%
28%
29%
24%
16%
Data access governance
Data discovery solutions
Cloud data protection
Biometrics
Ransomware broker
Cloud-based cybersecurity services
Behavior monitoring & analysis
Security intelligence services
Cloud access security brokers (CASBs)
Blockchain-enabled security solutions
XDR (Extended Detection and Response)
Deception Technology
SASE (Secure Access Service Edge)
SOAR (Security Orchestration, Automation and Response)
Zero Trust technologies
On my radar or actively searching Piloting In production Upgrading/refining Not interested
7
8. I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
8
Continue the Conversation
To get results from IDG research when it happens, or any
other news, follow us on Twitter: @IDGWorld
ADDITIONAL WAYS TO STAY ON TOP OF INFORMATION FROM IDG :
Sign up to receive our monthly marketing
newsletter at www.idg.com/newsletters/
Visit us on LinkedIn here:
www.linkedin.com/company/international-data-group--idg-
To receive a briefing on the full results from this study, or for more information, please
contact your IDG sales executive or contact us.
For more information on content marketing and lead nurture, explore our resources on
this site under marketing tools. We have additional primary research, blogs and white
papers to make you smarter about tech decision makers, and targeted products and
programs to help you reach them!