Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Spending

Below you will find reports with the tag of “Spending”

image from EY Global Information Security Survey 2021

EY Global Information Security Survey 2021

The EY Global Information Security Survey 2021 (GISS)finds Chief information Security Officers (CISOs) and security leaders battling against a new wave of threats unleashed by COVID-19. Our report illustrates the devastating and disproportionate impact that the crisis has had on a function that is striving too position itself as an enabler of growth and a strategic partner to the business. It also outlines what cybersecurity leaders need to know now about their current operating environment and what they need to do to transform it.

(more available)
Added: September 6, 2022
image from Cloud Automation is the Key to Future-Proofing Cybersecurity

Cloud Automation is the Key to Future-Proofing Cybersecurity

This report reveals the challenges we face as a security industry and points towards a balanced path of expertise and automation to guide our work.

(more available)
Added: April 14, 2022
image from The state of cybersecurity resilience 2021

The state of cybersecurity resilience 2021

More than 4,700 executives were surveyed in March and April of 2021 in order to understand the extent to which organizations prioritize security, how comprehensive their security plans are, and how their security investments are performing.

(more available)
Added: January 7, 2022
image from Hiscox Cyber Readiness Report 2021

Hiscox Cyber Readiness Report 2021

This annual cyber readiness report focusing on the threats and losses as reported via a survey of over 6,000 organizations.

(more available)
Added: April 22, 2021
image from The 2021 Security Outcomes Study – Small and Midsize Business Edition

The 2021 Security Outcomes Study – Small and Midsize Business Edition

What makes for successful cybersecurity? Is there evidence that security investments result in measurable outcomes? How do we know what actually works and what doesn’t? These are the types of burning questions guiding Cisco’s 2021 Security Outcomes Study, which pulls together the experiences of over 4,800 IT, security, and privacy professionals around the world. This document is an offshoot of the larger study that focuses on small and midsize businesses (SMBs). Discover how SMBs compare to larger enterprises when it comes to security, and what key factors contributed to successful security planning in companies like yours.

(more available)
Added: April 19, 2021
image from How IT Security Leaders Can Unlock the Potential of Their Teams

How IT Security Leaders Can Unlock the Potential of Their Teams

This report looks at IT security teams. They highlight changes in the teams and the ways that they work.

Added: February 28, 2021
image from The 2021 Security Outcomes Study

The 2021 Security Outcomes Study

Based on a survey of over 4,800, this report reviews the practices that lead to positive outcomes for security programs. Linking together practices that are more (or less) successful to the characteristics of positive outcomes, this report aims to give guidance for where practitioners can focus their efforts to achieve similar outcomes.

(more available)
Added: December 1, 2020
image from The State of Industrial Cybersecurity in the Era of Digitalization

The State of Industrial Cybersecurity in the Era of Digitalization

An annual survey on the challenges and response to those challenges of cybersecurity in the Industrial Control Systems (ICS) space.

(more available)
Added: October 27, 2020
image from Cybersecurity Team's Guide: Technology Decision Making

Cybersecurity Team's Guide: Technology Decision Making

This report is based off an August 2020 survey, in order to better understand how companies should allocate finite resources, how decisions on cybersecurity are made, and more.

(more available)
Added: October 14, 2020
image from 2020 State of Hybrid Cloud Security

2020 State of Hybrid Cloud Security

FireMon’s second annual State of Hybrid Cloud Security report dives into how the proliferation of cloud environments is impacting enterprises and their ability to scale and protect them.

(more available)
Added: September 25, 2020
image from Modern Application Development Security

Modern Application Development Security

This study examines trends in application development security. It looks as the extent to which security teams understand modern development practices, what influences application security investments, and the dynamic between development teams and cybersecurity teams.

(more available)
Added: September 2, 2020
image from 2020 State of Cyber Resilience: Innovate for Cyber Resilience

2020 State of Cyber Resilience: Innovate for Cyber Resilience

This report goes into the general state of cyber resilience. At a glance, Innovation investment is growing, Cybersecurity basics are better, and leading organizations are getting better at preventing and fixing breaches.

(more available)
Added: July 29, 2020
image from Spends and Trends: SANS 2020 IT Cybersecurity Spending Survey

Spends and Trends: SANS 2020 IT Cybersecurity Spending Survey

A survey of 450 individuals on cybersecurity spending plans, areas of investment, and workforce requirements.

Added: July 22, 2020
image from 2020 Cloud Security Report

2020 Cloud Security Report

The Cloud Security Report is an annual paper published by ISC(2). It goes in depth on the changing cloud environment as companies continue to rapidly migrate workloads from data centers to the cloud.

(more available)
Added: June 25, 2020
image from Hiscox Cyber Readiness Report 2020

Hiscox Cyber Readiness Report 2020

The fourth annual report from Hiscox. This survey based report collected responses from IT managers, executives, and other professionals across multiple sectors and countries. Focuses on assessing the cyber readiness of firms, budget spend, and losses experienced.

(more available)
Added: June 25, 2020
image from The State of Application Security, 2020

The State of Application Security, 2020

This report from Forrester goes into the state of application security for 2020, detailing changes in the external attack methods, and changes companies should make to their application security efforts.

(more available)
Added: June 24, 2020
image from 2020 SANS Automation and Integration Survey

2020 SANS Automation and Integration Survey

Automation and integration is often hailed as a great enabler for the future. This survey identified how respondents are adopting systems, where their systems currently stand and what is on the planning horizon.

(more available)
Added: May 21, 2020
image from Cloud companies appear to be silver lining as coronavirus dampens IT spending

Cloud companies appear to be silver lining as coronavirus dampens IT spending

COVID-19 is already beginning to weigh on corporate IT security budgets, but as millions work from home, one survey is nding a spending shift to cloud providers and security and away from PCs and servers.

(more available)
Added: May 18, 2020
image from 2020 Q1 Report Data Breach QuickView

2020 Q1 Report Data Breach QuickView

This report goes in depth into the overall changes in data breaches in the first part of 2020. Some highlights are that the number of publicly reported breaches decreased by 42% from 2019. and the number of records exposed grew 273% since last year.

(more available)
Added: May 11, 2020
image from EY Global Information Security Survey 2020

EY Global Information Security Survey 2020

Against the backdrop of mounting threat in an era of disruption, the most forward-thinking cybersecurity functions can be critical agents of change. But this will require organizations to foster new relationships between CISOs, the board and C-suite, and every function of the business.

(more available)
Added: May 8, 2020
image from 2020 Cyberthreat Defense Report

2020 Cyberthreat Defense Report

CyberEdge’s annual Cyberthreat Defense Report (CDR) plays a unique role in the IT security industry. Other surveys do a great job of collecting statistics on cyberattacks and data breaches and exploring the techniques of cybercriminals and other bad actors. Our mission is the provide deep insight into the minds of IT security professionals.

(more available)
Added: May 8, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 00:08 UTC (build b1d7be4)