SlideShare a Scribd company logo
Security Priorities Study 2021
Insight into the security projects
focused on now and in the coming year
Purpose and methodology
Source: Foundry Security Priorities Study, 2021
Survey goal
To gain a better understanding of
the various security projects
organizations are focused on now
and in the coming year. The
research also looks at the issues
that will demand the most time and
strategic thinking for IT and
security teams, with some
questions specific on Operational
Technology (OT) environments.
Total respondents 772
Collection method
Online questionnaire
Number of questions 35
Region North America 57%
EMEA 17%
APAC 26%
Average company size 11,535 employees
IT Leadership
All survey respondents are involved in IT
and/or corporate/physical security
decisions.
Audience base
CIO, Computerworld, CSO, InfoWorld and
Network World site visitors, and email
invitations to audience base 6%
9%
9%
10%
10%
10%
10%
25%
Retail, wholesale, distribution
Services (legal, consulting,
real estate)
Education
Government/Non-profit
Healthcare
Financial services
Manufacturing
Technology
Job titles
Top represented industries
77%
9%
6%
5%
3%
IT/Security mgmt.
Exec. IT/Security
Business mgmt.
IT/Security pro
Other
2
11%
24%
65%
3
Physical security added to responsibilities
Question: Have you added physical security to your responsibilities in the past three years or do you expect to in the future?
Source: Foundry Security Priorities Study, 2021
Yes
No, and do
not expect to
No, but expect to in
the next 12 months
5%
9%
13%
15%
16%
16%
16%
22%
26%
27%
27%
44%
Other
Not sure
Malicious trusted user(s) – an intentional insider attack
Software supply chain breaches
Compromised active identities
Stolen credentials
Zero-day vulnerability
Unexpected/underexpected business risks which exposed a vulnerability…
Misconfiguration of services or systems either on- or off-premises
Security vulnerabilities at third-party individuals or organizations (e.g., managed…
Unpatched software vulnerabilities
Non-malicious user error – fell victim to phishing or…
4
Security incidents stem from user error
Question: Of the security incidents your organization experienced last year, how many were caused by the following:
Source: Foundry Security Priorities Study, 2021
91%
are aware of what caused their
security incidents in the past year
Up from 87% in 2020
5%
9%
13%
15%
16%
16%
16%
22%
26%
27%
27%
44%
Other
Not sure
Malicious trusted user(s) – an intentional insider attack
Software supply chain breaches
Compromised active identities
Stolen credentials
Zero-day vulnerability
Unexpected/underexpected business risks which exposed a vulnerability
(e.g., managed service providers or other trusted partners)
Misconfiguration of services or systems either on- or off-premises
Security vulnerabilities at third-party individuals or organizations (e.g.,
managed service providers or other trusted partners)
Unpatched software vulnerabilities
Non-malicious user error – fell victim to phishing or non-malicious
violations of security policy(s)
5 weeks
is the average longest amount of
time passed before a security event
was detected
Longest amount of time before security incident
was detected
Question: What is the longest amount of time that passed before a security event was detected at your organization?
17%
5%
6%
13%
27%
33%
Unsure
More than 6 months
Three - six months
One - three months
One - four weeks
Within one week
Source: Foundry Security Priorities Study, 2021
Enterprise: 30%
SMB: 23%
Enterprise: 11%
SMB: 22%
5
#1 #2 #3 #4 #5
Be appropriately prepared to
respond to a security incident
Improve the protection of
confidential and sensitive data
Improve/increase security
awareness among end-users
through training
Upgrade IT and data security
to boost corporate resiliency
Reduce complexity in
IT security infrastructure
This year’s top security priorities
Question: What are your organizations top security priorities for the coming year?
Source: Foundry Security Priorities Study, 2021 6
Zero Trust & SOAR lead the list of technologies
being researched
Question: Which option best describes your current activity for each of the following security solutions?
28%
28%
28%
30%
31%
31%
32%
32%
32%
32%
34%
35%
35%
37%
38%
15%
11%
12%
12%
10%
13%
15%
12%
13%
9%
13%
11%
10%
12%
14%
30%
26%
31%
17%
15%
29%
21%
25%
18%
10%
17%
15%
16%
18%
21%
15%
14%
16%
10%
9%
15%
14%
11%
12%
9%
10%
11%
10%
10%
11%
13%
22%
12%
31%
35%
12%
19%
20%
26%
39%
27%
28%
29%
24%
16%
Data access governance
Data discovery solutions
Cloud data protection
Biometrics
Ransomware broker
Cloud-based cybersecurity services
Behavior monitoring & analysis
Security intelligence services
Cloud access security brokers (CASBs)
Blockchain-enabled security solutions
XDR (extended detection and response)
Deception technology
SASE (secure access service edge)
SOAR (security orchestration,
automation and response)
Zero trust technologies
On my radar or actively searching Piloting In production Upgrading/refining Not interested
Source: Foundry Security Priorities Study, 2021
55% in 2020
46% currently use
Zero Trust technologies
up from 35% in 2020
7
8
Continue the conversation
● To get results from Foundry research when it happens,
or any other news, follow us on Twitter: @FoundryIDG
● Sign up to receive our monthly marketing newsletter
at www.FoundryCo.com/newsletters/
● Visit us on LinkedIn here: www.linkedin.com/company/foundryidg
Additional ways to stay on top of information from Foundry:
To receive a briefing on the full results from this study, or for more
information, please contact your Foundry sales executive or contact us.
For more information on content marketing and lead nurture, explore our
resources on this site under marketing tools. We have additional primary
research, blogs and white papers to make you smarter about tech decision
makers, and targeted products and programs to help you reach them!

More Related Content

PDF
Security Priorities Sample Slides 2023.pdf
PDF
Security Priorities Sample Slides 2023.pdf
PDF
R if security_priorities_03.08.22
PDF
Security Priorities 2022 Sample Slides.pdf
PDF
2021 IDG Security Priorities Study
PDF
Final 2021 security_priorities_infographic (1)
PPTX
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
PDF
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
R if security_priorities_03.08.22
Security Priorities 2022 Sample Slides.pdf
2021 IDG Security Priorities Study
Final 2021 security_priorities_infographic (1)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...

Similar to NEW_Security Priorities 2021_Sample Slides.pdf (20)

PDF
Ponemon Institute Data Breaches and Sensitive Data Risk
PPTX
Fortify-Application_Security_Foundation_Training.pptx
PPTX
Fortify-Application_Security_Foundation_Training.pptx
PDF
IDG 2020 Security Priorities Research
PPTX
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
PPTX
SAM05_Barber PW (7-9-15)
PPT
State of endpoint risk v3
PPT
State of endpoint risk v3
PPT
State of endpoint risk v3
PPTX
SolarWinds IT Security Survey - February 2013
PPTX
MS. Cybersecurity Reference Architecture
PPTX
Advanced Operating System Principles.pptx
PDF
State of Security McAfee Study
PPTX
Privacies are coming
PDF
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
PDF
2010 State Of Enterprise Security
PPTX
Privacies are Coming
PPTX
IT Security Essentials
PDF
Theme 4 - Slide Shares-IT-Leader-Forecast.pdf
PDF
Security Checkpoints in Agile SDLC
Ponemon Institute Data Breaches and Sensitive Data Risk
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
IDG 2020 Security Priorities Research
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
SAM05_Barber PW (7-9-15)
State of endpoint risk v3
State of endpoint risk v3
State of endpoint risk v3
SolarWinds IT Security Survey - February 2013
MS. Cybersecurity Reference Architecture
Advanced Operating System Principles.pptx
State of Security McAfee Study
Privacies are coming
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
2010 State Of Enterprise Security
Privacies are Coming
IT Security Essentials
Theme 4 - Slide Shares-IT-Leader-Forecast.pdf
Security Checkpoints in Agile SDLC
Ad

More from IDG (20)

PDF
Role and Influence Sample Slides 2023.pdf
PDF
2023 Digital Business sample slides.pdf
PDF
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
PDF
CIO Tech Priorities 2023_Sample Slides.pdf
PPTX
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
PDF
State of the CIO 2023 Sample Slides.pdf
PDF
R_IF_Security Purchase Process.pdf
PDF
Foundry Customer Engagement Study 2022
PDF
R-PPT_ABM Benchmarking_2022_sample slides.pdf
PDF
Foundry Partner Marketing Study 2022
PDF
R_IF_DataAnalytics22_070822.pdf
PDF
Foundry Future of Work Study 2022
PDF
Data & Analytics Sample Slides_NEW.pdf
PDF
R if data_analytics_03.08.22
PDF
Foundry Partner Marketing Research 2020
PDF
Foundry Data & Analytics Study 2021
PDF
Foundry Digital Business Research 2021
PDF
Foundry Role & Influence of the Technology Decision-Maker Research 2022
PDF
Foundry Customer Engagement Study 2021
PDF
Stateofthe cio 2022 new sample slides
Role and Influence Sample Slides 2023.pdf
2023 Digital Business sample slides.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
CIO Tech Priorities 2023_Sample Slides.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO 2023 Sample Slides.pdf
R_IF_Security Purchase Process.pdf
Foundry Customer Engagement Study 2022
R-PPT_ABM Benchmarking_2022_sample slides.pdf
Foundry Partner Marketing Study 2022
R_IF_DataAnalytics22_070822.pdf
Foundry Future of Work Study 2022
Data & Analytics Sample Slides_NEW.pdf
R if data_analytics_03.08.22
Foundry Partner Marketing Research 2020
Foundry Data & Analytics Study 2021
Foundry Digital Business Research 2021
Foundry Role & Influence of the Technology Decision-Maker Research 2022
Foundry Customer Engagement Study 2021
Stateofthe cio 2022 new sample slides
Ad

Recently uploaded (20)

PPTX
Sumit Saxena IIM J Project Market segmentation.pptx
PDF
UNIT 1 -4 Profile of Rural Consumers (1).pdf
PDF
Hidden gems in Microsoft ads with Navah Hopkins
PDF
Is Kanav Kesar Legit or a Scam? Uncovering the Truth Behind the Hype
PDF
UNIT 2 - 5 DISTRIBUTION IN RURAL MARKETS.pdf
PDF
EVOLUTION OF RURAL MARKETING IN INDIAN CIVILIZATION
PDF
How the Minnesota Vikings Used Community to Drive 170% Growth and Acquire 34K...
PDF
AI & Automation: The Future of Marketing or the End of Creativity - Matthew W...
PDF
Modernizing IT for the age of AI - Jason Aloia, Freshworks
PDF
AI & Automation: The Future of Marketing or the End of Creativity - Eric Ritt...
PDF
UNIT 1 -3 Factors Influencing RURAL CONSUMER BEHAVIOUR.pdf
PDF
Mastering Bulk Email Campaign Optimization for 2025
PPTX
UNIT 3 - 5 INDUSTRIAL PRICING.ppt x
PDF
NeuroRank™: The Future of AI-First SEO..
PDF
E_Book_Customer_Relation_Management_0.pdf
PDF
PDF
Building a strong social media presence.
PDF
Mastering the Art of the Prompt - Brantley Smith, HomePro Marketing
PPTX
Solomon_Chapter 6_The Self: Mind, Gender, and Body.pptx
PDF
Mastering Content Strategy in 2025 ss.pdf
Sumit Saxena IIM J Project Market segmentation.pptx
UNIT 1 -4 Profile of Rural Consumers (1).pdf
Hidden gems in Microsoft ads with Navah Hopkins
Is Kanav Kesar Legit or a Scam? Uncovering the Truth Behind the Hype
UNIT 2 - 5 DISTRIBUTION IN RURAL MARKETS.pdf
EVOLUTION OF RURAL MARKETING IN INDIAN CIVILIZATION
How the Minnesota Vikings Used Community to Drive 170% Growth and Acquire 34K...
AI & Automation: The Future of Marketing or the End of Creativity - Matthew W...
Modernizing IT for the age of AI - Jason Aloia, Freshworks
AI & Automation: The Future of Marketing or the End of Creativity - Eric Ritt...
UNIT 1 -3 Factors Influencing RURAL CONSUMER BEHAVIOUR.pdf
Mastering Bulk Email Campaign Optimization for 2025
UNIT 3 - 5 INDUSTRIAL PRICING.ppt x
NeuroRank™: The Future of AI-First SEO..
E_Book_Customer_Relation_Management_0.pdf
Building a strong social media presence.
Mastering the Art of the Prompt - Brantley Smith, HomePro Marketing
Solomon_Chapter 6_The Self: Mind, Gender, and Body.pptx
Mastering Content Strategy in 2025 ss.pdf

NEW_Security Priorities 2021_Sample Slides.pdf

  • 1. Security Priorities Study 2021 Insight into the security projects focused on now and in the coming year
  • 2. Purpose and methodology Source: Foundry Security Priorities Study, 2021 Survey goal To gain a better understanding of the various security projects organizations are focused on now and in the coming year. The research also looks at the issues that will demand the most time and strategic thinking for IT and security teams, with some questions specific on Operational Technology (OT) environments. Total respondents 772 Collection method Online questionnaire Number of questions 35 Region North America 57% EMEA 17% APAC 26% Average company size 11,535 employees IT Leadership All survey respondents are involved in IT and/or corporate/physical security decisions. Audience base CIO, Computerworld, CSO, InfoWorld and Network World site visitors, and email invitations to audience base 6% 9% 9% 10% 10% 10% 10% 25% Retail, wholesale, distribution Services (legal, consulting, real estate) Education Government/Non-profit Healthcare Financial services Manufacturing Technology Job titles Top represented industries 77% 9% 6% 5% 3% IT/Security mgmt. Exec. IT/Security Business mgmt. IT/Security pro Other 2
  • 3. 11% 24% 65% 3 Physical security added to responsibilities Question: Have you added physical security to your responsibilities in the past three years or do you expect to in the future? Source: Foundry Security Priorities Study, 2021 Yes No, and do not expect to No, but expect to in the next 12 months
  • 4. 5% 9% 13% 15% 16% 16% 16% 22% 26% 27% 27% 44% Other Not sure Malicious trusted user(s) – an intentional insider attack Software supply chain breaches Compromised active identities Stolen credentials Zero-day vulnerability Unexpected/underexpected business risks which exposed a vulnerability… Misconfiguration of services or systems either on- or off-premises Security vulnerabilities at third-party individuals or organizations (e.g., managed… Unpatched software vulnerabilities Non-malicious user error – fell victim to phishing or… 4 Security incidents stem from user error Question: Of the security incidents your organization experienced last year, how many were caused by the following: Source: Foundry Security Priorities Study, 2021 91% are aware of what caused their security incidents in the past year Up from 87% in 2020 5% 9% 13% 15% 16% 16% 16% 22% 26% 27% 27% 44% Other Not sure Malicious trusted user(s) – an intentional insider attack Software supply chain breaches Compromised active identities Stolen credentials Zero-day vulnerability Unexpected/underexpected business risks which exposed a vulnerability (e.g., managed service providers or other trusted partners) Misconfiguration of services or systems either on- or off-premises Security vulnerabilities at third-party individuals or organizations (e.g., managed service providers or other trusted partners) Unpatched software vulnerabilities Non-malicious user error – fell victim to phishing or non-malicious violations of security policy(s)
  • 5. 5 weeks is the average longest amount of time passed before a security event was detected Longest amount of time before security incident was detected Question: What is the longest amount of time that passed before a security event was detected at your organization? 17% 5% 6% 13% 27% 33% Unsure More than 6 months Three - six months One - three months One - four weeks Within one week Source: Foundry Security Priorities Study, 2021 Enterprise: 30% SMB: 23% Enterprise: 11% SMB: 22% 5
  • 6. #1 #2 #3 #4 #5 Be appropriately prepared to respond to a security incident Improve the protection of confidential and sensitive data Improve/increase security awareness among end-users through training Upgrade IT and data security to boost corporate resiliency Reduce complexity in IT security infrastructure This year’s top security priorities Question: What are your organizations top security priorities for the coming year? Source: Foundry Security Priorities Study, 2021 6
  • 7. Zero Trust & SOAR lead the list of technologies being researched Question: Which option best describes your current activity for each of the following security solutions? 28% 28% 28% 30% 31% 31% 32% 32% 32% 32% 34% 35% 35% 37% 38% 15% 11% 12% 12% 10% 13% 15% 12% 13% 9% 13% 11% 10% 12% 14% 30% 26% 31% 17% 15% 29% 21% 25% 18% 10% 17% 15% 16% 18% 21% 15% 14% 16% 10% 9% 15% 14% 11% 12% 9% 10% 11% 10% 10% 11% 13% 22% 12% 31% 35% 12% 19% 20% 26% 39% 27% 28% 29% 24% 16% Data access governance Data discovery solutions Cloud data protection Biometrics Ransomware broker Cloud-based cybersecurity services Behavior monitoring & analysis Security intelligence services Cloud access security brokers (CASBs) Blockchain-enabled security solutions XDR (extended detection and response) Deception technology SASE (secure access service edge) SOAR (security orchestration, automation and response) Zero trust technologies On my radar or actively searching Piloting In production Upgrading/refining Not interested Source: Foundry Security Priorities Study, 2021 55% in 2020 46% currently use Zero Trust technologies up from 35% in 2020 7
  • 8. 8 Continue the conversation ● To get results from Foundry research when it happens, or any other news, follow us on Twitter: @FoundryIDG ● Sign up to receive our monthly marketing newsletter at www.FoundryCo.com/newsletters/ ● Visit us on LinkedIn here: www.linkedin.com/company/foundryidg Additional ways to stay on top of information from Foundry: To receive a briefing on the full results from this study, or for more information, please contact your Foundry sales executive or contact us. For more information on content marketing and lead nurture, explore our resources on this site under marketing tools. We have additional primary research, blogs and white papers to make you smarter about tech decision makers, and targeted products and programs to help you reach them!