SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
IDG COMMUNICATIONS, INC.
QUALITY
MATTERS
IDG Security Priorities Study
Insight into the security projects focused on now and in the coming year
2021
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
77%
9%
6%
5%
3%
Purpose and Methodology
Source: IDG Security Priorities Study, 2021
To gain a better understanding of the various security projects organizations are focused on now and in the
coming year. The research also looks at the issues that will demand the most time and strategic thinking for
IT and security teams, with some questions specific on Operational Technology (OT) environments.
SURVEY GOAL
AUDIENCE BASE
CIO, Computerworld, CSO, InfoWorld,
and Network World site visitors, and email
invitations to audience base.
NUMBER OF
QUESTIONS 35
COLLECTION METHOD
Online questionnaire
772
IT LEADERSHIP
All survey respondents are involved
in IT and/or corporate/physical
security decisions.
Business Mgmt
Technology
25%
Manufacturing 10%
Financial Services 10%
Healthcare 9%
Government/Non-profit 9%
Education 8%
Services (legal, consulting, real estate) 7%
Retail, Wholesale and Distribution 6%
JOB TITLES
TOTAL RESPONDENTS
TOP
REPRESENTED
INDUSTRIES
AVERAGE
COMPANY SIZE
11,535
EMPLOYEES
ExecIT/
Security
IT/Security
Pro
IT/
Security
Mgmt.
Other
2
REGION
North America – 57%
APAC – 35%
EMEA – 17%
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
Physical Security Added to Responsibilities
3
Q. Have you added physical security to your responsibilities in the past three years or do you expect to in the future?
Source: IDG Security Priorities Study, 2021
11%
24%
65%
No, but expect to in
the next 12 months
No, and do
not expect to
Yes
<1,000 64%
1,000+ 64%
<1,000 12%
1,000+ 11%
<1,000 24%
1,000+ 24%
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
Security Incidents Stem from User Error
4
Q. Of the security incidents your organization experienced last year, how many were caused by the following:
Source: IDG Security Priorities Study, 2021
5%
9%
13%
15%
16%
16%
16%
22%
26%
27%
27%
44%
Other
Not sure
Malicious trusted user(s) – an intentional insider attack
Software supply chain breaches
Compromised active identities
Stolen credentials
Zero-day vulnerability
Unexpected/underexpected business risks which exposed a vulnerability
(pandemic, business interruption, workforce changes, etc.)
Misconfiguration of services or systems either on- or off-premises
Security vulnerabilities at third-party individuals or organizations (e.g.,
managed service providers or other trusted partners)
Unpatched software vulnerabilities
Non-malicious user error – fell victim to phishing or non-malicious
violations of security policy(s)
91%
are aware of what
caused their
security incidents
in the past year
Up from 87% in 2020
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
Longest Amount of Time Before Security
Incident was Detected
5
Q. What is the longest amount of time that passed before a security event was detected at your organization?
Source: IDG Security Priorities Study, 2021
17%
5%
6%
13%
27%
33%
Unsure
More than 6 months
Three - 6 months
One - three months
One - four weeks
Within one week
Enterprise: 30%
SMB: 23%
Enterprise: 11%
SMB: 22%
5 weeks
is the average
longest amount of
time passed before
a security event was
detected
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
This Year’s Top Security Priorities
6
Q. What are your organizations top security priorities for the coming year?
Source: IDG Security Priorities Study, 2021
#1
Be appropriately
prepared to
respond to a
security incident
#2
Improve the
protection of
confidential and
sensitive data
#3
Improve/increase
security awareness
among end-users
through training
#4
Upgrade IT and
data security to
boost corporate
resiliency
#5
Reduce
complexity in
IT security
infrastructure
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
Zero Trust & SOAR Lead the List of Technologies
Being Researched
Q: Which option best describes your current activity for each of the following security solutions?
Source: IDG Security Priorities Study, 2021
28%
28%
28%
30%
31%
31%
32%
32%
32%
32%
34%
35%
35%
37%
38%
15%
11%
12%
12%
10%
13%
15%
12%
13%
9%
13%
11%
10%
12%
14%
30%
26%
31%
17%
15%
29%
21%
25%
18%
10%
17%
15%
16%
18%
21%
15%
14%
16%
10%
9%
15%
14%
11%
12%
9%
10%
11%
10%
10%
11%
13%
22%
12%
31%
35%
12%
19%
20%
26%
39%
27%
28%
29%
24%
16%
Data access governance
Data discovery solutions
Cloud data protection
Biometrics
Ransomware broker
Cloud-based cybersecurity services
Behavior monitoring & analysis
Security intelligence services
Cloud access security brokers (CASBs)
Blockchain-enabled security solutions
XDR (Extended Detection and Response)
Deception Technology
SASE (Secure Access Service Edge)
SOAR (Security Orchestration, Automation and Response)
Zero Trust technologies
On my radar or actively searching Piloting In production Upgrading/refining Not interested
7
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
8
Continue the Conversation
To get results from IDG research when it happens, or any
other news, follow us on Twitter: @IDGWorld
ADDITIONAL WAYS TO STAY ON TOP OF INFORMATION FROM IDG :
Sign up to receive our monthly marketing
newsletter at www.idg.com/newsletters/
Visit us on LinkedIn here:
www.linkedin.com/company/international-data-group--idg-
To receive a briefing on the full results from this study, or for more information, please
contact your IDG sales executive or contact us.
For more information on content marketing and lead nurture, explore our resources on
this site under marketing tools. We have additional primary research, blogs and white
papers to make you smarter about tech decision makers, and targeted products and
programs to help you reach them!

Contenu connexe

Tendances

Tendances (20)

2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of Cybercrime
 
Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides
 
CIO COVID-19 Impact Survey, Infographic
CIO COVID-19 Impact Survey, InfographicCIO COVID-19 Impact Survey, Infographic
CIO COVID-19 Impact Survey, Infographic
 
Foundry Digital Business Research 2021
Foundry Digital Business Research 2021Foundry Digital Business Research 2021
Foundry Digital Business Research 2021
 
IDG 2019 Digital Business infographic
IDG 2019 Digital Business infographicIDG 2019 Digital Business infographic
IDG 2019 Digital Business infographic
 
2018 Security Priorities
2018 Security Priorities 2018 Security Priorities
2018 Security Priorities
 
Understanding the Security-Specific Purchase Process [Infographic]
Understanding the Security-Specific Purchase Process [Infographic]Understanding the Security-Specific Purchase Process [Infographic]
Understanding the Security-Specific Purchase Process [Infographic]
 
Digital Business 2018
Digital Business 2018Digital Business 2018
Digital Business 2018
 
2020 IDG Role & Influence of the Technology Decision-Maker
2020 IDG Role & Influence of the Technology Decision-Maker2020 IDG Role & Influence of the Technology Decision-Maker
2020 IDG Role & Influence of the Technology Decision-Maker
 
CIO Tech Poll: Tech Priorities 2018
CIO Tech Poll: Tech Priorities 2018CIO Tech Poll: Tech Priorities 2018
CIO Tech Poll: Tech Priorities 2018
 
Understanding the Data & Analytics Specific Purchase Process [Infographic]
Understanding the Data & Analytics Specific Purchase Process [Infographic]Understanding the Data & Analytics Specific Purchase Process [Infographic]
Understanding the Data & Analytics Specific Purchase Process [Infographic]
 
CIO COVID Research Infographic
CIO COVID Research InfographicCIO COVID Research Infographic
CIO COVID Research Infographic
 
Cloud Insights 2018
Cloud Insights 2018Cloud Insights 2018
Cloud Insights 2018
 
2018 State of the Network
2018 State of the Network2018 State of the Network
2018 State of the Network
 
CIO COVID-19 Impact Survey, Sample Slides
CIO COVID-19 Impact Survey, Sample SlidesCIO COVID-19 Impact Survey, Sample Slides
CIO COVID-19 Impact Survey, Sample Slides
 
CIO Tech Poll: Tech Priorities 2019
CIO Tech Poll: Tech Priorities 2019CIO Tech Poll: Tech Priorities 2019
CIO Tech Poll: Tech Priorities 2019
 
State of the CIO 2018
State of the CIO 2018State of the CIO 2018
State of the CIO 2018
 
2020 State of the CIO Research
2020 State of the CIO Research2020 State of the CIO Research
2020 State of the CIO Research
 
6 Months In: How IT Leaders are Responding to the Pandemic
6 Months In: How IT Leaders are Responding to the Pandemic 6 Months In: How IT Leaders are Responding to the Pandemic
6 Months In: How IT Leaders are Responding to the Pandemic
 
Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides
 

Similaire à 2021 IDG Security Priorities Study

Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
IDG
 

Similaire à 2021 IDG Security Priorities Study (20)

NEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfNEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdf
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
Security Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdfSecurity Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdf
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2
 
Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive era
 
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
 
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
 
Exploring the Tech Specific Purchase Process
Exploring the Tech Specific Purchase ProcessExploring the Tech Specific Purchase Process
Exploring the Tech Specific Purchase Process
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
 
State of the CSO 2015
State of the CSO 2015State of the CSO 2015
State of the CSO 2015
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22
 
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
 
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint Webinar
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance
 
Cybersecurity report-vol-8
Cybersecurity report-vol-8Cybersecurity report-vol-8
Cybersecurity report-vol-8
 

Plus de IDG

State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
IDG
 

Plus de IDG (20)

Role and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdfRole and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdf
 
2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
 
CIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdfCIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdf
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxState of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
 
State of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfState of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdf
 
R_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdfR_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdf
 
Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022
 
R-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdfR-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdf
 
Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022
 
R_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdfR_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdf
 
Foundry Future of Work Study 2022
Foundry Future of Work Study 2022Foundry Future of Work Study 2022
Foundry Future of Work Study 2022
 
Data & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdfData & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdf
 
R if data_analytics_03.08.22
R if data_analytics_03.08.22R if data_analytics_03.08.22
R if data_analytics_03.08.22
 
Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020
 
Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021Foundry Data & Analytics Study 2021
Foundry Data & Analytics Study 2021
 
Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Role & Influence of the Technology Decision-Maker Research 2022Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Role & Influence of the Technology Decision-Maker Research 2022
 
Foundry Customer Engagement Study 2021
Foundry Customer Engagement Study 2021Foundry Customer Engagement Study 2021
Foundry Customer Engagement Study 2021
 
Stateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slidesStateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slides
 
2021 security priorities infographic
2021 security priorities infographic2021 security priorities infographic
2021 security priorities infographic
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

2021 IDG Security Priorities Study

  • 1. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y MA T T E R S IDG COMMUNICATIONS, INC. QUALITY MATTERS IDG Security Priorities Study Insight into the security projects focused on now and in the coming year 2021
  • 2. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y MA T T E R S 77% 9% 6% 5% 3% Purpose and Methodology Source: IDG Security Priorities Study, 2021 To gain a better understanding of the various security projects organizations are focused on now and in the coming year. The research also looks at the issues that will demand the most time and strategic thinking for IT and security teams, with some questions specific on Operational Technology (OT) environments. SURVEY GOAL AUDIENCE BASE CIO, Computerworld, CSO, InfoWorld, and Network World site visitors, and email invitations to audience base. NUMBER OF QUESTIONS 35 COLLECTION METHOD Online questionnaire 772 IT LEADERSHIP All survey respondents are involved in IT and/or corporate/physical security decisions. Business Mgmt Technology 25% Manufacturing 10% Financial Services 10% Healthcare 9% Government/Non-profit 9% Education 8% Services (legal, consulting, real estate) 7% Retail, Wholesale and Distribution 6% JOB TITLES TOTAL RESPONDENTS TOP REPRESENTED INDUSTRIES AVERAGE COMPANY SIZE 11,535 EMPLOYEES ExecIT/ Security IT/Security Pro IT/ Security Mgmt. Other 2 REGION North America – 57% APAC – 35% EMEA – 17%
  • 3. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y MA T T E R S Physical Security Added to Responsibilities 3 Q. Have you added physical security to your responsibilities in the past three years or do you expect to in the future? Source: IDG Security Priorities Study, 2021 11% 24% 65% No, but expect to in the next 12 months No, and do not expect to Yes <1,000 64% 1,000+ 64% <1,000 12% 1,000+ 11% <1,000 24% 1,000+ 24%
  • 4. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y MA T T E R S Security Incidents Stem from User Error 4 Q. Of the security incidents your organization experienced last year, how many were caused by the following: Source: IDG Security Priorities Study, 2021 5% 9% 13% 15% 16% 16% 16% 22% 26% 27% 27% 44% Other Not sure Malicious trusted user(s) – an intentional insider attack Software supply chain breaches Compromised active identities Stolen credentials Zero-day vulnerability Unexpected/underexpected business risks which exposed a vulnerability (pandemic, business interruption, workforce changes, etc.) Misconfiguration of services or systems either on- or off-premises Security vulnerabilities at third-party individuals or organizations (e.g., managed service providers or other trusted partners) Unpatched software vulnerabilities Non-malicious user error – fell victim to phishing or non-malicious violations of security policy(s) 91% are aware of what caused their security incidents in the past year Up from 87% in 2020
  • 5. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y MA T T E R S Longest Amount of Time Before Security Incident was Detected 5 Q. What is the longest amount of time that passed before a security event was detected at your organization? Source: IDG Security Priorities Study, 2021 17% 5% 6% 13% 27% 33% Unsure More than 6 months Three - 6 months One - three months One - four weeks Within one week Enterprise: 30% SMB: 23% Enterprise: 11% SMB: 22% 5 weeks is the average longest amount of time passed before a security event was detected
  • 6. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y MA T T E R S This Year’s Top Security Priorities 6 Q. What are your organizations top security priorities for the coming year? Source: IDG Security Priorities Study, 2021 #1 Be appropriately prepared to respond to a security incident #2 Improve the protection of confidential and sensitive data #3 Improve/increase security awareness among end-users through training #4 Upgrade IT and data security to boost corporate resiliency #5 Reduce complexity in IT security infrastructure
  • 7. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y MA T T E R S Zero Trust & SOAR Lead the List of Technologies Being Researched Q: Which option best describes your current activity for each of the following security solutions? Source: IDG Security Priorities Study, 2021 28% 28% 28% 30% 31% 31% 32% 32% 32% 32% 34% 35% 35% 37% 38% 15% 11% 12% 12% 10% 13% 15% 12% 13% 9% 13% 11% 10% 12% 14% 30% 26% 31% 17% 15% 29% 21% 25% 18% 10% 17% 15% 16% 18% 21% 15% 14% 16% 10% 9% 15% 14% 11% 12% 9% 10% 11% 10% 10% 11% 13% 22% 12% 31% 35% 12% 19% 20% 26% 39% 27% 28% 29% 24% 16% Data access governance Data discovery solutions Cloud data protection Biometrics Ransomware broker Cloud-based cybersecurity services Behavior monitoring & analysis Security intelligence services Cloud access security brokers (CASBs) Blockchain-enabled security solutions XDR (Extended Detection and Response) Deception Technology SASE (Secure Access Service Edge) SOAR (Security Orchestration, Automation and Response) Zero Trust technologies On my radar or actively searching Piloting In production Upgrading/refining Not interested 7
  • 8. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y MA T T E R S 8 Continue the Conversation To get results from IDG research when it happens, or any other news, follow us on Twitter: @IDGWorld ADDITIONAL WAYS TO STAY ON TOP OF INFORMATION FROM IDG : Sign up to receive our monthly marketing newsletter at www.idg.com/newsletters/ Visit us on LinkedIn here: www.linkedin.com/company/international-data-group--idg- To receive a briefing on the full results from this study, or for more information, please contact your IDG sales executive or contact us. For more information on content marketing and lead nurture, explore our resources on this site under marketing tools. We have additional primary research, blogs and white papers to make you smarter about tech decision makers, and targeted products and programs to help you reach them!