2019 Cyberthreat Defense Report North America | Europe Asia Pacific | Latin AmericaPhoto FPO Middle East | Africa « Research Sponsors PLATINUM GOLD SILVER » Table of Contents Introduction Research Highlights Current Security Posture Perceptions and Concerns Current and Future Investments Practices and Strategies The Road Ahead Survey Demographics Research Methodology Research Sponsors About CyberEdge Group Table of Contents Introduction................................................................................................................................................ 3 Research Highlights................................................................................................................................... 6 Section 1: Current Security Posture.......................................................................................................... 7 Past Frequency of Successful Cyberattacks..................................................................................................................... 7 Future Likelihood of Successful Cyberattacks ................................................................................................................ 8 Security Posture by IT Domain.............................................................................................................................................. 9 Assessing IT Security Functions.......................................................................................................................................... 10 Cyberthreat Hunting Inhibitors ......................................................................................................................................... 11 The IT Security Skills Shortage ........................................................................................................................................... 12 Section 2: Perceptions and Concerns...................................................................................................... 13 Concern for Cyberthreats..................................................................................................................................................... 13 Responding to Ransomware............................................................................................................................................... 14 Barriers to Establishing Effective Defenses.................................................................................................................... 16 Addressing Cloud Security Needs .................................................................................................................................... 18 Vulnerability Patching Challenges.................................................................................................................................... 19 Section 3: Current and Future Investments............................................................................................ 20 IT Security Budget Allocation.............................................................................................................................................. 20 IT Security Budget Change................................................................................................................................................... 22 Network Security Deployment Status.............................................................................................................................. 24 Endpoint Security Deployment Status ........................................................................................................................... 26 Application and Data Security Deployment Status.................................................................................................... 28 Security Management and Operations Deployment Status ................................................................................... 30 Identity and Access Management Deployment Status ............................................................................................ 32 Machine Learning and Artificial Intelligence Investments ...................................................................................... 34 Section 4: Practices and Strategies......................................................................................................... 36 SSL / TLS Inspection Practices ....................
2019安全威胁报告 cyberthreat defense report 英文版
文档预览
中文文档
50 页
50 下载
1000 浏览
0 评论
0 收藏
3.0分
温馨提示:本文档共50页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
本文档由 SC 于 2022-09-16 07:50:40上传分享