Practitioner Report On Cyber Security Challenges, Focuses And Spend

Cyber Security Mid-Year Report

Add bookmark

There are potentially alarming responses to our global pandemic related questions in our Mid-Year Report. All respondents completed the survey between May 17th and June 8th. Most migration to remote work happened in the last two weeks of March. That means that all respondents were defending the enterprise with a remote workforce for at least six weeks when they completed the survey.

2 in 5 have not changed approach

When asked “Has your approach to security changed as a result of the global pandemic and an increasingly remote
workforce?” 39.89% said no.

This same metric is true for respondent's approach to talent- with 40% saying they'll maintian current behaviors and activities. This is one of the solid reasons that good talent is in flight.

Budgets Have Been Inverted

Our half-year survey's have recently been showing steadily growing budgets. Not the case any longer as nearly 70% say budgets are flat or down. And over 60% see that reality continuing for the next six months.

Remote Work Spikes Endpoint Security Investment

An absolute result of the workforce shift- endpoint security went from the fifth highest to the second highest spend in the past six months.

Sponsored By:

More From Arctic Wolf

Attaining True Managed Risk Visibility From On-Prem To The Cloud

Gain the ability to: Classify assets in an environment to measure and manage risk; Incorporate the r...

2022-08-12 by Seth Adler
Attaining True Managed Risk Visibility From On-Prem To The Cloud

Setting The Four Cornerstones Of Cloud Security: Accountability, Strategy, Visib...

Cloud migration led to cloud evolution which has led to a cloud-first mindset. With a pandemic push,...

2021-03-29 by Seth Adler
Setting The Four Cornerstones Of Cloud Security: Accountability, Strategy, Visibility & Enablement

5 Core Security Functions to Operationalize

By operationalizing your core security functions, you can understand and define how your tools, team...

2020-09-28 by Sam McLane
5 Core Security Functions to Operationalize

CISO Strategies & Tactics For Incident Response

The CSHub community provides feedback on how Incident Response, mindset, strategy, tactics and tech...

2020-08-31 by Seth Adler
CISO Strategies & Tactics For Incident Response

Cyber Security Hub Mid-Year Report Interactive Discussion

Following the Cyber Security Hub Mid-Year Report, we come together as a community to discuss and deb...

2020-07-23
Cyber Security Hub Mid-Year Report Interactive Discussion

Sponsor Page

Recommended