InfoTechWhitePapers

2018 Cyberthreat Defense Report

The cyberthreat landscape has changed considerably over the past half-decade. Many IT security vendors publish reports on their...


2018 Cyberthreat Defense Report | Security | HiTechNectar
Published By - hitechnectar

Many, if not most, IT security vendors publish reports on their respective views of the cyberthreat landscape – often slanted toward their particular areas of expertise. Although these reports yield helpful insights, until the launch of our inaugural Cyberthreat Defense Report (CDR) in 2014, no research organization had ever taken a vendor-agnostic look at how enterprises actually perceive cyberthreats and how they leverage third-party products and services to overcome them.

CyberEdge is proud to have filled that void. Now in its fifth year, the CDR has become a staple among IT security leaders and practitioners by helping them gauge their internal practices and security investments against their peers – now across 17 countries and 19 industries. Simply put, there is no other report of its kind. And we are proud to have received a 2017 MarCom Platinum Award for our efforts!

The cyberthreat landscape has changed considerably over the past half-decade. And so have our defenses.

The CDR is the most geographically comprehensive vendor agnostic study of IT security decision makers and practitioners. Rather than compiling cyberthreat statistics and assessing the damage caused by data breaches (other researchers do a great job there), the CDR surveys the perceptions of actual IT security professionals, gaining insights into how they see the world.

Specifically, the CDR examines:

  • The frequency of successful cyberattacks in the prior year and optimism (or pessimism) for preventing further
    attacks in the coming year
  • The perceived impact of cyberthreats and the challenges faced in mitigating their risks
  • The adequacy of organizations’ security postures and their internal security practices
  • The organizational factors that present the most significant barriers to establishing effective cyberthreat defenses
  • The investments in security technologies already made and those planned for the coming year
  • The health of IT security budgets and the portion of the overall IT budget they consume

By revealing these details, we hope to help IT security decision makers and practitioners gain a better understanding of how their perceptions, concerns, priorities, and defenses stack up against those of their peers in other countries and industries.

Applied constructively, the data, analyses, and findings can be used by diligent IT security teams to shape answers to many important questions, such as:

  • Where do we have gaps in our cyberthreat defenses relative to other organizations?
  • Have we fallen behind in our defensive strategy to the point that our organization is now the “low-hanging fruit” (i.e., likely to be targeted more often due to its relative weaknesses)?
  • Are we on track with both our approach and progress in continuing to address traditional areas of concern, while also tackling the challenges of emerging threats?
  • How does our level of spending on IT security compare to that of other organizations?
  • How are other IT security practitioners thinking differently about cyberthreats and their defenses, and should we adjust our perspective and plans to account for these differences?

The Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. The report delivers countless insights IT security teams can use to better understand how their perceptions, priorities, and security postures stack up against those of their peers.


You May Also Like to Read:
A Buydown for Risk: Why Data Security is a Must

Add Comment

Click here to post a comment

four × one =

Download the complete Resource:

I would like to receive communications from HiTechNectar and consent to the processing of the personal data provided above in accordance with and as described in the privacy policy.


Translate »
Social media & sharing icons powered by UltimatelySocial