Chapter

Information Security Trends Collection – Page 2

Global Information Security Survey (2014)

This annual survey tracks the state of security in enterprises across industry and geography to learn what is coming down the security pike, how are others planning for it?, how best to plan for it? An excellent resource for CIOs to create a robust security capability. 

Global Information Security Survey (2013)

This annual survey tracks the state of security in enterprises across industry and geography to learn what is coming down the security pike, how are others planning for it?, how best to plan for it? An excellent resource for CIOs to create a robust security capability. 

Global Information Security Survey (2011)

This annual survey tracks the state of security in enterprises across industry and geography to learn what is coming down the security pike, how are others planning for it?, how best to plan for it? An excellent resource for CIOs to create a robust security capability.

Enterprise Security Framework Adoption Trends (2016)

This survey tracks the adoption of common security frameworks in the enterprise – why do organizations use security frameworks? which security frameworks are preferred? what is the rate of adoption? A good discussion for the CIO to compare their own security framework and strategy.

Global State of Information Security Survey (PwC) (2011)

This presentation discusses the key findings from PricewaterhouseCoopers 2011 Global State of Information Security Survey – "In the aftermath of the worst global economic jolt in 30 years, information security confronts a new economic order: Respected – but still restrained"

Global Information Security Survey (2010)

As organizational boundaries vanish, so does the traditional information security paradigm. This survey of over 1600 participants from 56 countries highlights the information security challenges facing organizations today and how they are managing them – so you can focus on the most critical risks, and identify your strengths and weaknesses to improve information security

CIO Portal