Professional Documents
Culture Documents
2017 Global State of Information Security Survey conducted by PwC, CSO and CIO. Confidential.
51%
44%
46%
46%
46%
Information
security
spending
priorities for
2016
Biometrics &
advanced
authentication
Digital enterprise
architecture
59%
Say digitization
has increased
information
security spending
Q. What types of security safeguards does your organization plan to invest in over the next 12 months? AND What impact has digitization of the
business ecosystem had on your organizations security spending?
2017 Global State of Information Security Survey conducted by PwC, CSO and CIO. Confidential.
32%
34%
35%
35%
37%
46%
Policies,
technologies
and people
skills being
implemented
for the Internet
of Things
Uniform
Policies &
Employee training Assess device &
cybersecurity
technologies to
on IoT security
system
standards &
safeguard against
practices
interconnectivity &
policies for IoT consumer privacy
vulnerability
devices &
violations
across the
systems
business
ecosystem
New data
collection,
retention &
destruction
policies
Are investing in
a security strategy
for the Internet
of Things
Q. What policies, technologies and people skills does your organization plan to implement over the next 12 months to address the cybersecurity
and privacy risks associated with the Internet of Things (IoT)? AND What types of security safeguards does your organization plan to invest in
over the next 12 months?
2017 Global State of Information Security Survey conducted by PwC, CSO and CIO. Confidential.
40%
25%
Benefits
57%
16%
Currently in place Not in place but a
priority for 2017
52%
47%
45%
43%
38%
Currently
outsourced
11%
12%
No plans to adopt
Don't know
37%
28%
17%
Improved
Improved
Better visibility
Improved
understanding of understanding of into anomalous understanding of
external security internal security network activity user behaviour
threats
threats
2%
2%
Do not know
Other
Q. What are the most significant benefits of a Big Data-driven security capability? AND Does your organization employ Big Data analytics to model for and
identify information security incidents?
2017 Global State of Information Security Survey conducted by PwC, CSO and CIO. Confidential.
48%
55%
60%
61%
64%
62%
Types of
managed
security
services used
Threat
intelligence
Real-time
monitoring &
anlytics
Data loss
prevention
Authentication
Use managed
security services
for cybersecurity
& privacy
Q. Does your organization use managed security services in its cybersecurity and privacy programs? AND Which of the following managed
security services does your organization use?
2017 Global State of Information Security Survey conducted by PwC, CSO and CIO. Confidential.