today’s enterprise cyberthreats lurk amid major transformation · virus/malware advanced threat...

1
Percentage of organizations undergoing a major IT transformation The full report on the results of Protiviti’s 2015 IT Priorities Survey can be accessed at protiviti.com/ITpriorities. © 2015 Protiviti Inc. An Equal Opportunity Employer M/F/Disability/Vet. Protiviti is not licensed or registered as a public accounting firm and does not issue opinions on financial statements or offer attestation services. Virtualization 7.3 6.5 Virus/malware advanced threat 7.1 NA NA detection/eradication Incident response success 7.0 6.3 (containment, recovery) Data breach and privacy laws 7.0 6.2 (various U.S. states) Enterprise architecture 7.0 NA NA Monitoring security events 7.0 6.4 Data architecture 6.9 6.4 Data governance 6.9 6.3 Incident response policy 6.9 6.3 NA and preparedness Incident response reaction time 6.9 6.3 IT project management 6.9 6.5 Patch management 6.9 NA NA Vulnerability scanning 6.9 NA NA Top 10 IT Priorities for 2015 Rank IT Area 2015 Priority Index 2014 Priority Index YOY Trend 1 2 3 (tie) 7 (tie) 60 Percentage of organizations in which the duration of the IT transformation is expected to be a year or longer 54 Level of disruption (scale of 1 to 10) organizations are experiencing as a result of a major IT transformation 6.4 What are the objectives of your organization’s IT transformation?* Today’s Enterprise Cyberthreats Lurk Amid Major Transformation Assessing the Results of Protiviti‘s 2015 IT Priorities Survey Amid major changes, danger lurks everywhere for today’s enterprises. Crafty, cunning and dangerous cyber predators worldwide are threatening to blow the lid off organizational cybersecurity defenses. Outwitting the wolves at your “cyber door” and managing these changes with confidence requires an array of information security approaches, processes and tools – all of which we find at the top of IT’s packed priority list. More than 1,000 survey respondents were asked to rate, on a scale of 1 to 10, the level of priority for them and their organizations to improve in different IT issues and capabilities. A “10” rating indicates the issue is a high priority while a “1” indicates the issue is a low priority. Cost/simplification 64% New functionality 55% (mobile, new products, etc.) Service assurance 47% Regulatory/compliance 46% Adoption of emerging technology 43% Time to market/agility 34% *Multiple responses permitted

Upload: others

Post on 05-Oct-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Today’s Enterprise Cyberthreats Lurk Amid Major Transformation · Virus/malware advanced threat 7.1 NA NA detection/eradication Incident response success 7.0 6.3 (containment, recovery)

Percentage of organizations undergoing a major IT transformation

The full report on the results of Protiviti’s 2015 IT Priorities Survey can be accessed at protiviti.com/ITpriorities.

© 2015 Protiviti Inc. An Equal Opportunity Employer M/F/Disability/Vet. Protiviti is not licensed or registeredas a public accounting firm and does not issue opinions on financial statements or offer attestation services.

Virtualization 7.3 6.5

Virus/malware advanced threat 7.1 NA NAdetection/eradication

Incident response success 7.0 6.3 (containment, recovery) Data breach and privacy laws 7.0 6.2 (various U.S. states)

Enterprise architecture 7.0 NA NA

Monitoring security events 7.0 6.4

Data architecture 6.9 6.4

Data governance 6.9 6.3

Incident response policy 6.9 6.3 NAand preparedness

Incident response reaction time 6.9 6.3

IT project management 6.9 6.5

Patch management 6.9 NA NA

Vulnerability scanning 6.9 NA NA

Top 10 IT Priorities for 2015

Rank IT Area2015PriorityIndex

2014PriorityIndex

YOYTrend

1

2

3(tie)

7(tie)

60Percentage of organizations in which the duration of the IT transformation is expected to be a year or longer

54Level of disruption (scale of 1 to 10) organizations are experiencing as a result of a major IT transformation

6.4

What are the objectivesof your organization’sIT transformation?*

Today’s Enterprise

Cyberthreats Lurk Amid Major TransformationAssessing the Results of Protiviti‘s 2015 IT Priorities Survey

Amid major changes, danger lurks everywhere for today’s enterprises. Crafty, cunning anddangerous cyber predators worldwide are threatening to blow the lid off organizationalcybersecurity defenses. Outwitting the wolves at your “cyber door” and managing these changes with confidence requires an array of information security approaches, processes and tools – all of which we find at the top of IT’s packed priority list. More than 1,000 survey respondents were asked to rate, on a scale of

1 to 10, the level of priority for them and their organizations to improve

in different IT issues and capabilities. A “10” rating indicates the issue

is a high priority while a “1” indicates the issue is a low priority.

Cost/simplification 64%

New functionality 55%(mobile, new products, etc.)

Service assurance 47%

Regulatory/compliance 46%

Adoption of emerging technology 43%

Time to market/agility 34%

*Multiple responses permitted