REPORTS
Research: State of Open Source Adoption

Download

Research: 2014 Strategic Security Survey

Research: State of Open Source Adoption

Money, Skills, And Hired Guns

Enterprises outsource everything from server hosting to application development. Why not security? Look for this year to mark the start of a new era in information security, where organizations that can afford to build sophisticated analysis teams -- able to incorporate device context into security events data in a high-volume information steam -- do so, and those that can't hire specialized providers. 

"Managing the complexity of security" reclaimed the No. 1 spot among 10 challenges facing the 536 respondents to our InformationWeek 2014 Strategic Security Survey, all from organizations with 100 or more employees. More stats:

>> 58% see an infected personal device connecting to the corporate network as a top endpoint security concern, making it the No. 1 response, ahead of phishing and lost devices.
>> 56% say cyber-criminals pose the greatest threat to their organizations this year, the top answer, ahead of authorized users and employees at 49%.
>> 31% conduct their own audits of cloud providers.
>> 23% have experienced a security breach or espionage in the past year.

In this report, we:
>> Examine the security challenges around mobility, the benefits of big data, and whether you need cyberrisk insurance.
>> Delve into one of the most commented-on portions of our survey: the IT skills ­shortage.
>> Discuss improvements in outsourced security options.
Respondent breakdown: 41% have 5,000 or more employees; 30% are over 10,000. Government, financial services, and education are well-represented. (R7910514)

Survey Name InformationWeek 2014 Strategic Security Survey

Survey Date April 2014

Region North America

Number of Respondents 536 at organizations with 100 or more employees

Purpose To comprehensively assess the current state of security programs, where organizations are focusing their security efforts, and how IT is adapting to current threats and trends

Methodology InformationWeek surveyed business technology decision-makers at North American organizations with 100 or more employees. The survey was conducted online, and respondents were recruited via an email invitation containing an embedded link to the survey. The email invitation was sent to qualified InformationWeek and Dark Reading subscribers.

 

Download
Table of Contents