US Cybersecurity Responsibility, Spending, and Posture
US Cybersecurity Responsibility, Spending, and Posture
A Survey of Enterprise End Users Who Influence Cybersecurity Budgets
20-Apr-2022
North America
Description
The COVID-19 pandemic accelerated the remote working trend by at least 20 years in most parts of the United States. To enable remote workers, digital transformation initiatives that were intended to be rolled out over a period of years instead occurred within weeks or months. In the process, security issues were initially pushed aside or ignored altogether in the rush to enable remote workers and protect productivity. That resulted in many organizations unintentionally increasing cyber risk and needing to reexamine security postures.
This study surveyed budget influencing executives in the United States. The respondent profile is 30% C-level executives, 17% executive management, 21% director-level, 12% middle management, 10% senior management, and 10% manager-level. This research provides a glimpse inside the minds of cybersecurity technology end users to determine what concerns them, what their security posture is, and what is most important to them when making purchasing decisions. It also provides insight on the security implications for American companies as a new and far-reaching second Cold War has erupted between the United States and Russia as a result of the Russo-Ukrainian war.
Author: Jarad Carleton
RESEARCH: INFOGRAPHIC
This infographic presents a brief overview of the research, and highlights the key topics discussed in it.Click image to view it in full size
Table of Contents
Research Objectives and Methodology
Respondent Profile
Key Findings
Cybersecurity Responsibilities Inside Organizations
Cybersecurity Responsibilities Inside Organizations (continued)
Cybersecurity Responsibilities Inside Organizations (continued)
Cybersecurity Budgets in the COVID-19 Era
Cybersecurity Budgets in 2021 and Expectations for 2022
Organizations’ Cybersecurity Concerns
Cyber Incidents’ Impact on Almost Every Organization
Cyber Incidents’ Impact on US Organizations
Cybersecurity Posture Self-assessment
Security Maturity—Cluster Analysis Methodology
Security Maturity Classifications
Technology-focused Security Maturity—United States vs. Europe
Technology-focused Security MaturityA Multinational Usage View by Maturity Category
Barriers to Making Organizations More Secure
Barriers to Making Organizations More Secure (continued)
Barriers to Making Organizations More Secure (continued)
Barriers to Making Organizations More Secure (continued)
Barriers to Making Organizations More Secure (continued)
Choosing Cybersecurity Products and Services
The Most Desired Security Additions for Organizations
List of Exhibits
List of Exhibits (continued)
Legal Disclaimer
Popular Topics
Author | Jarad Carleton |
---|---|
Industries | Information Technology |
No Index | No |
Is Prebook | No |
Podcast | No |
WIP Number | MG51-01-00-00-00 |