SlideShare a Scribd company logo
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
IDG COMMUNICATIONS, INC.
QUALITY
MATTERS
IDG Security Priorities Study
Insight into the security projects focused on now and in the coming year
2021
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
77%
9%
6%
5%
3%
Purpose and Methodology
Source: IDG Security Priorities Study, 2021
To gain a better understanding of the various security projects organizations are focused on now and in the
coming year. The research also looks at the issues that will demand the most time and strategic thinking for
IT and security teams, with some questions specific on Operational Technology (OT) environments.
SURVEY GOAL
AUDIENCE BASE
CIO, Computerworld, CSO, InfoWorld,
and Network World site visitors, and email
invitations to audience base.
NUMBER OF
QUESTIONS 35
COLLECTION METHOD
Online questionnaire
772
IT LEADERSHIP
All survey respondents are involved
in IT and/or corporate/physical
security decisions.
Business Mgmt
Technology
25%
Manufacturing 10%
Financial Services 10%
Healthcare 9%
Government/Non-profit 9%
Education 8%
Services (legal, consulting, real estate) 7%
Retail, Wholesale and Distribution 6%
JOB TITLES
TOTAL RESPONDENTS
TOP
REPRESENTED
INDUSTRIES
AVERAGE
COMPANY SIZE
11,535
EMPLOYEES
ExecIT/
Security
IT/Security
Pro
IT/
Security
Mgmt.
Other
2
REGION
North America – 57%
APAC – 35%
EMEA – 17%
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
Physical Security Added to Responsibilities
3
Q. Have you added physical security to your responsibilities in the past three years or do you expect to in the future?
Source: IDG Security Priorities Study, 2021
11%
24%
65%
No, but expect to in
the next 12 months
No, and do
not expect to
Yes
<1,000 64%
1,000+ 64%
<1,000 12%
1,000+ 11%
<1,000 24%
1,000+ 24%
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
Security Incidents Stem from User Error
4
Q. Of the security incidents your organization experienced last year, how many were caused by the following:
Source: IDG Security Priorities Study, 2021
5%
9%
13%
15%
16%
16%
16%
22%
26%
27%
27%
44%
Other
Not sure
Malicious trusted user(s) – an intentional insider attack
Software supply chain breaches
Compromised active identities
Stolen credentials
Zero-day vulnerability
Unexpected/underexpected business risks which exposed a vulnerability
(pandemic, business interruption, workforce changes, etc.)
Misconfiguration of services or systems either on- or off-premises
Security vulnerabilities at third-party individuals or organizations (e.g.,
managed service providers or other trusted partners)
Unpatched software vulnerabilities
Non-malicious user error – fell victim to phishing or non-malicious
violations of security policy(s)
91%
are aware of what
caused their
security incidents
in the past year
Up from 87% in 2020
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
Longest Amount of Time Before Security
Incident was Detected
5
Q. What is the longest amount of time that passed before a security event was detected at your organization?
Source: IDG Security Priorities Study, 2021
17%
5%
6%
13%
27%
33%
Unsure
More than 6 months
Three - 6 months
One - three months
One - four weeks
Within one week
Enterprise: 30%
SMB: 23%
Enterprise: 11%
SMB: 22%
5 weeks
is the average
longest amount of
time passed before
a security event was
detected
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
This Year’s Top Security Priorities
6
Q. What are your organizations top security priorities for the coming year?
Source: IDG Security Priorities Study, 2021
#1
Be appropriately
prepared to
respond to a
security incident
#2
Improve the
protection of
confidential and
sensitive data
#3
Improve/increase
security awareness
among end-users
through training
#4
Upgrade IT and
data security to
boost corporate
resiliency
#5
Reduce
complexity in
IT security
infrastructure
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
Zero Trust & SOAR Lead the List of Technologies
Being Researched
Q: Which option best describes your current activity for each of the following security solutions?
Source: IDG Security Priorities Study, 2021
28%
28%
28%
30%
31%
31%
32%
32%
32%
32%
34%
35%
35%
37%
38%
15%
11%
12%
12%
10%
13%
15%
12%
13%
9%
13%
11%
10%
12%
14%
30%
26%
31%
17%
15%
29%
21%
25%
18%
10%
17%
15%
16%
18%
21%
15%
14%
16%
10%
9%
15%
14%
11%
12%
9%
10%
11%
10%
10%
11%
13%
22%
12%
31%
35%
12%
19%
20%
26%
39%
27%
28%
29%
24%
16%
Data access governance
Data discovery solutions
Cloud data protection
Biometrics
Ransomware broker
Cloud-based cybersecurity services
Behavior monitoring & analysis
Security intelligence services
Cloud access security brokers (CASBs)
Blockchain-enabled security solutions
XDR (Extended Detection and Response)
Deception Technology
SASE (Secure Access Service Edge)
SOAR (Security Orchestration, Automation and Response)
Zero Trust technologies
On my radar or actively searching Piloting In production Upgrading/refining Not interested
7
I D G C O M M U N I C A T I O N S , I N C .
Q U A L I T Y
MA T T E R S
8
Continue the Conversation
To get results from IDG research when it happens, or any
other news, follow us on Twitter: @IDGWorld
ADDITIONAL WAYS TO STAY ON TOP OF INFORMATION FROM IDG :
Sign up to receive our monthly marketing
newsletter at www.idg.com/newsletters/
Visit us on LinkedIn here:
www.linkedin.com/company/international-data-group--idg-
To receive a briefing on the full results from this study, or for more information, please
contact your IDG sales executive or contact us.
For more information on content marketing and lead nurture, explore our resources on
this site under marketing tools. We have additional primary research, blogs and white
papers to make you smarter about tech decision makers, and targeted products and
programs to help you reach them!

More Related Content

PPTX
CSO Pandemic Impact Survey, 2020
PDF
Final 2021 security_priorities_infographic (1)
PDF
2018 Global State of Information Security Survey
PDF
Impact of COVID-19 [Infographic]
PDF
IDG 2020 Security Priorities Research
PDF
State of the CIO 2018 Infographic
PDF
CIO CV-19 Impact Study
PDF
Data Analytics is Driving The Business Forward
CSO Pandemic Impact Survey, 2020
Final 2021 security_priorities_infographic (1)
2018 Global State of Information Security Survey
Impact of COVID-19 [Infographic]
IDG 2020 Security Priorities Research
State of the CIO 2018 Infographic
CIO CV-19 Impact Study
Data Analytics is Driving The Business Forward

What's hot (20)

PDF
2018 U.S State of Cybercrime
PDF
Stateofthe cio 2022 sample slides
PDF
CIO COVID-19 Impact Survey, Infographic
PDF
Foundry Digital Business Research 2021
PDF
IDG 2019 Digital Business infographic
PDF
2018 Security Priorities
PDF
Understanding the Security-Specific Purchase Process [Infographic]
PDF
Digital Business 2018
PDF
2020 IDG Role & Influence of the Technology Decision-Maker
PDF
CIO Tech Poll: Tech Priorities 2018
PDF
Understanding the Data & Analytics Specific Purchase Process [Infographic]
PDF
CIO COVID Research Infographic
PDF
Cloud Insights 2018
PDF
2018 State of the Network
PDF
CIO COVID-19 Impact Survey, Sample Slides
PDF
CIO Tech Poll: Tech Priorities 2019
PDF
State of the CIO 2018
PDF
2020 State of the CIO Research
PDF
6 Months In: How IT Leaders are Responding to the Pandemic
PDF
Stateofthe cio 2022 sample slides
2018 U.S State of Cybercrime
Stateofthe cio 2022 sample slides
CIO COVID-19 Impact Survey, Infographic
Foundry Digital Business Research 2021
IDG 2019 Digital Business infographic
2018 Security Priorities
Understanding the Security-Specific Purchase Process [Infographic]
Digital Business 2018
2020 IDG Role & Influence of the Technology Decision-Maker
CIO Tech Poll: Tech Priorities 2018
Understanding the Data & Analytics Specific Purchase Process [Infographic]
CIO COVID Research Infographic
Cloud Insights 2018
2018 State of the Network
CIO COVID-19 Impact Survey, Sample Slides
CIO Tech Poll: Tech Priorities 2019
State of the CIO 2018
2020 State of the CIO Research
6 Months In: How IT Leaders are Responding to the Pandemic
Stateofthe cio 2022 sample slides
Ad

Similar to 2021 IDG Security Priorities Study (20)

PDF
NEW_Security Priorities 2021_Sample Slides.pdf
PDF
Security Priorities Sample Slides 2023.pdf
PDF
Security Priorities Sample Slides 2023.pdf
PDF
Security Priorities 2022 Sample Slides.pdf
PPTX
CompTIA - IT Security Sales Practices in the Channel
PPTX
Idge dell reignite2014 qp #2
PDF
Priming your digital immune system: Cybersecurity in the cognitive era
PDF
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
PDF
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
PDF
Exploring the Tech Specific Purchase Process
PDF
Cybersecurity: Perceptions & Practices
PPTX
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
PPTX
State of the CSO 2015
PDF
R if security_priorities_03.08.22
PPTX
Evolving State of the Endpoint Webinar
PPTX
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
PPTX
2018 State of Cyber Resilience Insurance
PDF
Cybersecurity report-vol-8
PDF
The top challenges to expect in network security in 2019 survey report
PDF
State of Endpoint Security: The Buyers Mindset
NEW_Security Priorities 2021_Sample Slides.pdf
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
Security Priorities 2022 Sample Slides.pdf
CompTIA - IT Security Sales Practices in the Channel
Idge dell reignite2014 qp #2
Priming your digital immune system: Cybersecurity in the cognitive era
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Exploring the Tech Specific Purchase Process
Cybersecurity: Perceptions & Practices
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
State of the CSO 2015
R if security_priorities_03.08.22
Evolving State of the Endpoint Webinar
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
2018 State of Cyber Resilience Insurance
Cybersecurity report-vol-8
The top challenges to expect in network security in 2019 survey report
State of Endpoint Security: The Buyers Mindset
Ad

More from IDG (20)

PDF
Role and Influence Sample Slides 2023.pdf
PDF
2023 Digital Business sample slides.pdf
PDF
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
PDF
CIO Tech Priorities 2023_Sample Slides.pdf
PPTX
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
PDF
State of the CIO 2023 Sample Slides.pdf
PDF
R_IF_Security Purchase Process.pdf
PDF
Foundry Customer Engagement Study 2022
PDF
R-PPT_ABM Benchmarking_2022_sample slides.pdf
PDF
Foundry Partner Marketing Study 2022
PDF
R_IF_DataAnalytics22_070822.pdf
PDF
Foundry Future of Work Study 2022
PDF
Data & Analytics Sample Slides_NEW.pdf
PDF
R if data_analytics_03.08.22
PDF
Foundry Partner Marketing Research 2020
PDF
Foundry Data & Analytics Study 2021
PDF
Foundry Role & Influence of the Technology Decision-Maker Research 2022
PDF
Foundry Customer Engagement Study 2021
PDF
Stateofthe cio 2022 new sample slides
PDF
2021 security priorities infographic
Role and Influence Sample Slides 2023.pdf
2023 Digital Business sample slides.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
CIO Tech Priorities 2023_Sample Slides.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO 2023 Sample Slides.pdf
R_IF_Security Purchase Process.pdf
Foundry Customer Engagement Study 2022
R-PPT_ABM Benchmarking_2022_sample slides.pdf
Foundry Partner Marketing Study 2022
R_IF_DataAnalytics22_070822.pdf
Foundry Future of Work Study 2022
Data & Analytics Sample Slides_NEW.pdf
R if data_analytics_03.08.22
Foundry Partner Marketing Research 2020
Foundry Data & Analytics Study 2021
Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Customer Engagement Study 2021
Stateofthe cio 2022 new sample slides
2021 security priorities infographic

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Modernizing your data center with Dell and AMD
PPT
Teaching material agriculture food technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Encapsulation theory and applications.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Approach and Philosophy of On baking technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
Electronic commerce courselecture one. Pdf
Understanding_Digital_Forensics_Presentation.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Digital-Transformation-Roadmap-for-Companies.pptx
Empathic Computing: Creating Shared Understanding
Modernizing your data center with Dell and AMD
Teaching material agriculture food technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Machine learning based COVID-19 study performance prediction
Encapsulation theory and applications.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Building Integrated photovoltaic BIPV_UPV.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Reach Out and Touch Someone: Haptics and Empathic Computing
The AUB Centre for AI in Media Proposal.docx
Approach and Philosophy of On baking technology
Per capita expenditure prediction using model stacking based on satellite ima...

2021 IDG Security Priorities Study

  • 1. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y MA T T E R S IDG COMMUNICATIONS, INC. QUALITY MATTERS IDG Security Priorities Study Insight into the security projects focused on now and in the coming year 2021
  • 2. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y MA T T E R S 77% 9% 6% 5% 3% Purpose and Methodology Source: IDG Security Priorities Study, 2021 To gain a better understanding of the various security projects organizations are focused on now and in the coming year. The research also looks at the issues that will demand the most time and strategic thinking for IT and security teams, with some questions specific on Operational Technology (OT) environments. SURVEY GOAL AUDIENCE BASE CIO, Computerworld, CSO, InfoWorld, and Network World site visitors, and email invitations to audience base. NUMBER OF QUESTIONS 35 COLLECTION METHOD Online questionnaire 772 IT LEADERSHIP All survey respondents are involved in IT and/or corporate/physical security decisions. Business Mgmt Technology 25% Manufacturing 10% Financial Services 10% Healthcare 9% Government/Non-profit 9% Education 8% Services (legal, consulting, real estate) 7% Retail, Wholesale and Distribution 6% JOB TITLES TOTAL RESPONDENTS TOP REPRESENTED INDUSTRIES AVERAGE COMPANY SIZE 11,535 EMPLOYEES ExecIT/ Security IT/Security Pro IT/ Security Mgmt. Other 2 REGION North America – 57% APAC – 35% EMEA – 17%
  • 3. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y MA T T E R S Physical Security Added to Responsibilities 3 Q. Have you added physical security to your responsibilities in the past three years or do you expect to in the future? Source: IDG Security Priorities Study, 2021 11% 24% 65% No, but expect to in the next 12 months No, and do not expect to Yes <1,000 64% 1,000+ 64% <1,000 12% 1,000+ 11% <1,000 24% 1,000+ 24%
  • 4. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y MA T T E R S Security Incidents Stem from User Error 4 Q. Of the security incidents your organization experienced last year, how many were caused by the following: Source: IDG Security Priorities Study, 2021 5% 9% 13% 15% 16% 16% 16% 22% 26% 27% 27% 44% Other Not sure Malicious trusted user(s) – an intentional insider attack Software supply chain breaches Compromised active identities Stolen credentials Zero-day vulnerability Unexpected/underexpected business risks which exposed a vulnerability (pandemic, business interruption, workforce changes, etc.) Misconfiguration of services or systems either on- or off-premises Security vulnerabilities at third-party individuals or organizations (e.g., managed service providers or other trusted partners) Unpatched software vulnerabilities Non-malicious user error – fell victim to phishing or non-malicious violations of security policy(s) 91% are aware of what caused their security incidents in the past year Up from 87% in 2020
  • 5. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y MA T T E R S Longest Amount of Time Before Security Incident was Detected 5 Q. What is the longest amount of time that passed before a security event was detected at your organization? Source: IDG Security Priorities Study, 2021 17% 5% 6% 13% 27% 33% Unsure More than 6 months Three - 6 months One - three months One - four weeks Within one week Enterprise: 30% SMB: 23% Enterprise: 11% SMB: 22% 5 weeks is the average longest amount of time passed before a security event was detected
  • 6. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y MA T T E R S This Year’s Top Security Priorities 6 Q. What are your organizations top security priorities for the coming year? Source: IDG Security Priorities Study, 2021 #1 Be appropriately prepared to respond to a security incident #2 Improve the protection of confidential and sensitive data #3 Improve/increase security awareness among end-users through training #4 Upgrade IT and data security to boost corporate resiliency #5 Reduce complexity in IT security infrastructure
  • 7. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y MA T T E R S Zero Trust & SOAR Lead the List of Technologies Being Researched Q: Which option best describes your current activity for each of the following security solutions? Source: IDG Security Priorities Study, 2021 28% 28% 28% 30% 31% 31% 32% 32% 32% 32% 34% 35% 35% 37% 38% 15% 11% 12% 12% 10% 13% 15% 12% 13% 9% 13% 11% 10% 12% 14% 30% 26% 31% 17% 15% 29% 21% 25% 18% 10% 17% 15% 16% 18% 21% 15% 14% 16% 10% 9% 15% 14% 11% 12% 9% 10% 11% 10% 10% 11% 13% 22% 12% 31% 35% 12% 19% 20% 26% 39% 27% 28% 29% 24% 16% Data access governance Data discovery solutions Cloud data protection Biometrics Ransomware broker Cloud-based cybersecurity services Behavior monitoring & analysis Security intelligence services Cloud access security brokers (CASBs) Blockchain-enabled security solutions XDR (Extended Detection and Response) Deception Technology SASE (Secure Access Service Edge) SOAR (Security Orchestration, Automation and Response) Zero Trust technologies On my radar or actively searching Piloting In production Upgrading/refining Not interested 7
  • 8. I D G C O M M U N I C A T I O N S , I N C . Q U A L I T Y MA T T E R S 8 Continue the Conversation To get results from IDG research when it happens, or any other news, follow us on Twitter: @IDGWorld ADDITIONAL WAYS TO STAY ON TOP OF INFORMATION FROM IDG : Sign up to receive our monthly marketing newsletter at www.idg.com/newsletters/ Visit us on LinkedIn here: www.linkedin.com/company/international-data-group--idg- To receive a briefing on the full results from this study, or for more information, please contact your IDG sales executive or contact us. For more information on content marketing and lead nurture, explore our resources on this site under marketing tools. We have additional primary research, blogs and white papers to make you smarter about tech decision makers, and targeted products and programs to help you reach them!