SlideShare a Scribd company logo
1 of 16
Download to read offline
2018 ADOBE CYBER SECURITY SURVEY
1
GMUNK
CYBERSECURITY PROFESSIONALS’ INSIGHTS ON PUBLIC POLICY
O B J E C T I V E S
In a first-of-its-kind study, we surveyed U.S. cybersecurity professionals to understand
their perceptions of cybersecurity and public policy issues
We explored topics such as:
• What are cybersecurity professionals’ top concerns today?
• What are the most important privacy and security issues for governments to address?
• How prepared do they feel for upcoming cybersecurity policy changes?
2
GMUNK
Government and Contractor n=76
Non-government/Private n=452
MOE= ± 4.3%
M E T H O D O L O G Y
AUDIENCE MARGIN METHODSAMPLE SIZE TIMING
Cybersecurity
professionals
nationwide
This report is a result of a U.S. nationwide survey of cybersecurity professionals (manager level or above) at a
variety of different organization types and sizes
Survey fielded
September 5-15, 2017
15-minute
online survey
3
OF ERROR
n=528
GMUNK
S U R V E Y R E S U L T S
4
Q12: How much do you agree or disagree with the following statement?
Q25: In general, how well do you understand how these cybersecurity public policy developments will impact your job?
Cybersecurity professionals say policy has a great impact on their day-to-
day jobs and they understand how upcoming developments can affect
their roles
Agree that
cybersecurity
public policy
affects their job
on a daily basis
85%
Understand how
cybersecurity
public policy
developments
affect their job
90%
Impact of Public Policy on Day-to-Day Job
5
Top 2 Box
Q26: How prepared do you think you, your organization and your industry are for upcoming cybersecurity policy changes?
Level of Preparedness for Upcoming Policy Changes
Yet, only 37% feel completely prepared for upcoming policy changes, and
even fewer are confident in industry preparedness overall
Say their
industry is
completely
prepared
Say their
organization is
completely
prepared
37%
Say they are
completely
prepared
36%
28%
6
Top Box Only
“Regulations contribute to my company's ability to
protect our assets. We as a company need to be ahead of
the curve on all issues involving cybersecurity.”
– Non-Government / Private
83%
Agree that the
regulations in place are
effective in making
things secure
An overwhelming majority of cybersecurity professionals feel government
regulations have a positive impact on cybersecurity
Impact of Regulations on Security
Q6: How much do you agree or disagree with each of the following statements?
Q13: How does cybersecurity public policy affect your job on a day-to-day basis?
7
Top 2 Box
“Policy tends to be a driving force in how
companies/governments begin to react to various threats either
before, or in some cases after, they begin to show up.”
– Government / Contractor
48%
Follow cybersecurity policy issues very closely
However, less than half of cybersecurity professionals follow public policy
issues very closely
Following Public Policy Issues
Q7: How closely do you follow cybersecurity public policy issues? 8
Top Box Only
45%
Almost all cybersecurity professionals agree that more common standards and
frameworks are necessary
Attitudes toward Common Standards
“The most important issue is how to effectively
share threat information and automatically detect
and mitigate them in real-time as well as how to
motivate organizations to implement best
practices.”– Government / Contractor
“[It’s important to] have some sort of uniform standards and
centralized resource relative to what constitutes a
cybersecurity event and how those issues are reported,
responded to, and resolved.” – Non-Government / Private
Agree that the
information security
industry needs more
common security
standards/
frameworks
92%
Q6: How much do you agree or disagree with each of the following statements?
Q14: In your opinion, what are the most important cybersecurity issues for governments to address?
9
Top 2 Box
Q6: How much do you agree or disagree with each of the following statements?
Q13: How does cybersecurity public policy affect your job on a day-to-day basis?
However, compliance is a current pain point for cybersecurity professionals
Agree that regulation
makes organizations
focus more on
compliance than on
security
86%
Agree that their
organization spends
too much of their time
and budget on
compliance
64%
“The lack of direction under regulation
causes us to continually change to try to
stay compliant.”
– Non-Government / Private
“There are often conflicting reports and it is
impossible to get anyone to confirm what
regulation or standard is the one to follow.”
– Government / Contractor
Attitudes toward Compliance
10
Top 2 Box
37%
Respondents believe that modernizing technology is critical to effective
government cybersecurity
Attitudes toward Modernizing Technology
Agree that
modernizing
technology is critical
to effective
government
cybersecurity
96%
“The more archaic our defenses are ... the
easier it is to break them down.”
– Non-Government / Private
“You have legacy systems with users who only
know operational concerns, with no time to bring
systems up-to-date. This alone forces people to be
concerned with more uptime than security.” –
Government / Contractor
Q20: How much do you agree or disagree with each of the following statements?
Q21: What are the greatest cybersecurity risks of not modernizing government technology?
11
Top 2 Box
Agree that
transitioning legacy
systems to the cloud
is critical to effective
government
cybersecurity
88%
Cybersecurity professionals agree that transitioning legacy systems to the
cloud is critical to effective government cybersecurity
Attitudes toward Legacy Systems and the Cloud
Q20: How much do you agree or disagree with each of the following statements?
Q21: What are the greatest cybersecurity risks of not modernizing government technology?
“Legacy systems are easier to breach and
have the greatest security vulnerability.”
– Non-Government / Private
“Open vulnerabilities in legacy hardware and
software [are the greatest cybersecurity risks
of not modernizing government technology].”
– Government / Contractor
12
Top 2 Box
Q3: How important is it for organizations to have each of the following cybersecurity measures in place?
Q5: And which, if any, of the following cybersecurity measures does your organization have in place?
Cybersecurity professionals say monitoring to detect breaches and protect data
at the file level is important, yet only half have tools in place to do so
Current Practice
88%
Say it is important to monitor
to detect breaches and
protect data at the file level
Currently in placeImportant
49%
Say that monitoring to
detect breaches and protect
data at the file level is
currently in place at their
organization
Monitoring to Detect Breaches and Protect Data at the File Level
13
Percent SelectedTop 2 Box
Importance vs.
14
Automating system patching is another opportunity for more effective
cybersecurity
Q3: How important is it for organizations to have each of the following cybersecurity measures in place?
Q5: And which, if any, of the following cybersecurity measures does your organization have in place?
Say that automating
system patching is
important
80%
Automating System Patching Importance vs. Current Practice
Say that automating
system patching is a
measure that is in place at
their organization
44%
Current Practice
Currently in placeImportant
Percent SelectedTop 2 Box
Importance vs.
The overwhelming majority of cybersecurity professionals say critical
infrastructure is important for governments to address
Importance of Cybersecurity Issues for Governments to Address
Q15: How important are each of the following cybersecurity issues for governments to address?
91%
Say that critical infrastructure is
important for governments to address
15
Top 2 Box
Respondents are most informed about cybersecurity policy developments at
the federal level
Informed of Recent Public Policy Developments
77%
80%
87% Are informed about
recent federal level policy
developments
Are informed about recent
state level policy
developments
Are informed about recent
international level policy
developments
Q22: How informed do you feel about the latest cybersecurity public policy developments that have occurred over the last six months at the…? 16
Top 2 Box

More Related Content

What's hot

Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...FireEye, Inc.
 
Trends in Information Security
Trends in Information SecurityTrends in Information Security
Trends in Information SecurityCompTIA
 
VIPRE --Responding to Cyberattacks
VIPRE --Responding to CyberattacksVIPRE --Responding to Cyberattacks
VIPRE --Responding to CyberattacksAbhishek Sood
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack
 
2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guideJames Fisher
 
NFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk Awareness
NFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk AwarenessNFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk Awareness
NFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk AwarenessCitrin Cooperman
 
Creating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware PracticesCreating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware PracticesDiane M. Metcalf
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMatthew Rosenquist
 
Sans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business MissionSans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business MissionTripwire
 
Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic ManagementMarcelo Martins
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIsSteven Aiello
 
Strengthening Security with Continuous Monitoring
Strengthening Security with Continuous MonitoringStrengthening Security with Continuous Monitoring
Strengthening Security with Continuous MonitoringBooz Allen Hamilton
 
US Government Software Assurance and Security Initiativesi
US Government Software Assurance and Security InitiativesiUS Government Software Assurance and Security Initiativesi
US Government Software Assurance and Security InitiativesiLindsey Landolfi
 
Utility Networks Agile Response Capabilities - New Context at EnergySec 2019
Utility Networks Agile Response Capabilities - New Context at EnergySec 2019Utility Networks Agile Response Capabilities - New Context at EnergySec 2019
Utility Networks Agile Response Capabilities - New Context at EnergySec 2019Andrew Storms
 

What's hot (18)

Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
Trends in Information Security
Trends in Information SecurityTrends in Information Security
Trends in Information Security
 
VIPRE --Responding to Cyberattacks
VIPRE --Responding to CyberattacksVIPRE --Responding to Cyberattacks
VIPRE --Responding to Cyberattacks
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinar
 
2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide
 
NFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk Awareness
NFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk AwarenessNFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk Awareness
NFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk Awareness
 
Creating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware PracticesCreating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware Practices
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
Sans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business MissionSans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business Mission
 
Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic Management
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Strengthening Security with Continuous Monitoring
Strengthening Security with Continuous MonitoringStrengthening Security with Continuous Monitoring
Strengthening Security with Continuous Monitoring
 
US Government Software Assurance and Security Initiativesi
US Government Software Assurance and Security InitiativesiUS Government Software Assurance and Security Initiativesi
US Government Software Assurance and Security Initiativesi
 
Utility Networks Agile Response Capabilities - New Context at EnergySec 2019
Utility Networks Agile Response Capabilities - New Context at EnergySec 2019Utility Networks Agile Response Capabilities - New Context at EnergySec 2019
Utility Networks Agile Response Capabilities - New Context at EnergySec 2019
 

Similar to 2018 Adobe Cybersecurity Survey

State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesJoseph DeFever
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFLaurie Mosca-Cocca
 
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Marcello Marchesini
 
Please read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docxPlease read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docxLeilaniPoolsy
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
SANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docxSANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docxanhlodge
 
Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022Gartner Peer Insights
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveyEdgar Alejandro Villegas
 
2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research UpdateGridCyberSec
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseThe Economist Media Businesses
 
Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16Dave Darnell
 
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...Capgemini
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...Symantec
 
The state of incident response
The state of incident responseThe state of incident response
The state of incident responseAbhishek Sood
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSilicon Valley Bank
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summarypatmisasi
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskFiona Lew
 

Similar to 2018 Adobe Cybersecurity Survey (20)

State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
 
Please read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docxPlease read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docx
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
SANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docxSANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docx
 
Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
 
2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
 
Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16
 
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
The state of incident response
The state of incident responseThe state of incident response
The state of incident response
 
Cybersecurity report-vol-8
Cybersecurity report-vol-8Cybersecurity report-vol-8
Cybersecurity report-vol-8
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data Risk
 

More from Adobe

Where I'm From | Adobe Diverse Voices
Where I'm From | Adobe Diverse VoicesWhere I'm From | Adobe Diverse Voices
Where I'm From | Adobe Diverse VoicesAdobe
 
Adobe Life Reflections
Adobe Life ReflectionsAdobe Life Reflections
Adobe Life ReflectionsAdobe
 
2021 Sundance Ignite x Adobe Fellows
2021 Sundance Ignite x Adobe Fellows2021 Sundance Ignite x Adobe Fellows
2021 Sundance Ignite x Adobe FellowsAdobe
 
Adobe Holiday Shopping Recap 2020
Adobe Holiday Shopping Recap 2020Adobe Holiday Shopping Recap 2020
Adobe Holiday Shopping Recap 2020Adobe
 
The Inaugural Cohort of Women at Sundance | Adobe Fellowship
The Inaugural Cohort of Women at Sundance | Adobe Fellowship The Inaugural Cohort of Women at Sundance | Adobe Fellowship
The Inaugural Cohort of Women at Sundance | Adobe Fellowship Adobe
 
Adobe COVID-19 Productivity Study: Say ‘buh-bye’ to WFH Stigma
Adobe COVID-19 Productivity Study: Say ‘buh-bye’ to WFH StigmaAdobe COVID-19 Productivity Study: Say ‘buh-bye’ to WFH Stigma
Adobe COVID-19 Productivity Study: Say ‘buh-bye’ to WFH StigmaAdobe
 
Introducing the 2020 Sundance Ignite x Adobe Fellows
Introducing the 2020 Sundance Ignite x Adobe FellowsIntroducing the 2020 Sundance Ignite x Adobe Fellows
Introducing the 2020 Sundance Ignite x Adobe FellowsAdobe
 
Adobe Personalization 2020 Survey​ of Consumers and Marketers
Adobe Personalization 2020 Survey​ of Consumers and MarketersAdobe Personalization 2020 Survey​ of Consumers and Marketers
Adobe Personalization 2020 Survey​ of Consumers and MarketersAdobe
 
The Obstacles and Opportunities of Digital Transformation
The Obstacles and Opportunities of Digital TransformationThe Obstacles and Opportunities of Digital Transformation
The Obstacles and Opportunities of Digital TransformationAdobe
 
Sundance Ignite Fellows
Sundance Ignite FellowsSundance Ignite Fellows
Sundance Ignite FellowsAdobe
 
The Total Economic Impact of Adobe Document Cloud
The Total Economic Impact of Adobe Document CloudThe Total Economic Impact of Adobe Document Cloud
The Total Economic Impact of Adobe Document CloudAdobe
 
Adobe Digital Insights Holiday Recap 2019
Adobe Digital Insights Holiday Recap 2019Adobe Digital Insights Holiday Recap 2019
Adobe Digital Insights Holiday Recap 2019Adobe
 
ADI Consumer Electronics Report 2020
ADI Consumer Electronics Report 2020ADI Consumer Electronics Report 2020
ADI Consumer Electronics Report 2020Adobe
 
Five Ways to Accelerate the Sales Cycle and Close Deals Faster
Five Ways to Accelerate the Sales Cycle and Close Deals FasterFive Ways to Accelerate the Sales Cycle and Close Deals Faster
Five Ways to Accelerate the Sales Cycle and Close Deals FasterAdobe
 
No Happy Holidays for Seasonal Employees
 No Happy Holidays for Seasonal Employees No Happy Holidays for Seasonal Employees
No Happy Holidays for Seasonal EmployeesAdobe
 
Adobe Holiday Retailer Survey 2019
Adobe Holiday Retailer Survey 2019Adobe Holiday Retailer Survey 2019
Adobe Holiday Retailer Survey 2019Adobe
 
Adobe 2019 Holiday Shopping Predictions
Adobe 2019 Holiday Shopping PredictionsAdobe 2019 Holiday Shopping Predictions
Adobe 2019 Holiday Shopping PredictionsAdobe
 
ADI -- Digital Divide 2019
ADI -- Digital Divide 2019ADI -- Digital Divide 2019
ADI -- Digital Divide 2019Adobe
 
AdobeStudy: Consumer Banking Insights
AdobeStudy: Consumer Banking InsightsAdobeStudy: Consumer Banking Insights
AdobeStudy: Consumer Banking InsightsAdobe
 
Adobe Digital Insights -- Connected Car 2019
Adobe Digital Insights -- Connected Car 2019Adobe Digital Insights -- Connected Car 2019
Adobe Digital Insights -- Connected Car 2019Adobe
 

More from Adobe (20)

Where I'm From | Adobe Diverse Voices
Where I'm From | Adobe Diverse VoicesWhere I'm From | Adobe Diverse Voices
Where I'm From | Adobe Diverse Voices
 
Adobe Life Reflections
Adobe Life ReflectionsAdobe Life Reflections
Adobe Life Reflections
 
2021 Sundance Ignite x Adobe Fellows
2021 Sundance Ignite x Adobe Fellows2021 Sundance Ignite x Adobe Fellows
2021 Sundance Ignite x Adobe Fellows
 
Adobe Holiday Shopping Recap 2020
Adobe Holiday Shopping Recap 2020Adobe Holiday Shopping Recap 2020
Adobe Holiday Shopping Recap 2020
 
The Inaugural Cohort of Women at Sundance | Adobe Fellowship
The Inaugural Cohort of Women at Sundance | Adobe Fellowship The Inaugural Cohort of Women at Sundance | Adobe Fellowship
The Inaugural Cohort of Women at Sundance | Adobe Fellowship
 
Adobe COVID-19 Productivity Study: Say ‘buh-bye’ to WFH Stigma
Adobe COVID-19 Productivity Study: Say ‘buh-bye’ to WFH StigmaAdobe COVID-19 Productivity Study: Say ‘buh-bye’ to WFH Stigma
Adobe COVID-19 Productivity Study: Say ‘buh-bye’ to WFH Stigma
 
Introducing the 2020 Sundance Ignite x Adobe Fellows
Introducing the 2020 Sundance Ignite x Adobe FellowsIntroducing the 2020 Sundance Ignite x Adobe Fellows
Introducing the 2020 Sundance Ignite x Adobe Fellows
 
Adobe Personalization 2020 Survey​ of Consumers and Marketers
Adobe Personalization 2020 Survey​ of Consumers and MarketersAdobe Personalization 2020 Survey​ of Consumers and Marketers
Adobe Personalization 2020 Survey​ of Consumers and Marketers
 
The Obstacles and Opportunities of Digital Transformation
The Obstacles and Opportunities of Digital TransformationThe Obstacles and Opportunities of Digital Transformation
The Obstacles and Opportunities of Digital Transformation
 
Sundance Ignite Fellows
Sundance Ignite FellowsSundance Ignite Fellows
Sundance Ignite Fellows
 
The Total Economic Impact of Adobe Document Cloud
The Total Economic Impact of Adobe Document CloudThe Total Economic Impact of Adobe Document Cloud
The Total Economic Impact of Adobe Document Cloud
 
Adobe Digital Insights Holiday Recap 2019
Adobe Digital Insights Holiday Recap 2019Adobe Digital Insights Holiday Recap 2019
Adobe Digital Insights Holiday Recap 2019
 
ADI Consumer Electronics Report 2020
ADI Consumer Electronics Report 2020ADI Consumer Electronics Report 2020
ADI Consumer Electronics Report 2020
 
Five Ways to Accelerate the Sales Cycle and Close Deals Faster
Five Ways to Accelerate the Sales Cycle and Close Deals FasterFive Ways to Accelerate the Sales Cycle and Close Deals Faster
Five Ways to Accelerate the Sales Cycle and Close Deals Faster
 
No Happy Holidays for Seasonal Employees
 No Happy Holidays for Seasonal Employees No Happy Holidays for Seasonal Employees
No Happy Holidays for Seasonal Employees
 
Adobe Holiday Retailer Survey 2019
Adobe Holiday Retailer Survey 2019Adobe Holiday Retailer Survey 2019
Adobe Holiday Retailer Survey 2019
 
Adobe 2019 Holiday Shopping Predictions
Adobe 2019 Holiday Shopping PredictionsAdobe 2019 Holiday Shopping Predictions
Adobe 2019 Holiday Shopping Predictions
 
ADI -- Digital Divide 2019
ADI -- Digital Divide 2019ADI -- Digital Divide 2019
ADI -- Digital Divide 2019
 
AdobeStudy: Consumer Banking Insights
AdobeStudy: Consumer Banking InsightsAdobeStudy: Consumer Banking Insights
AdobeStudy: Consumer Banking Insights
 
Adobe Digital Insights -- Connected Car 2019
Adobe Digital Insights -- Connected Car 2019Adobe Digital Insights -- Connected Car 2019
Adobe Digital Insights -- Connected Car 2019
 

2018 Adobe Cybersecurity Survey

  • 1. 2018 ADOBE CYBER SECURITY SURVEY 1 GMUNK CYBERSECURITY PROFESSIONALS’ INSIGHTS ON PUBLIC POLICY
  • 2. O B J E C T I V E S In a first-of-its-kind study, we surveyed U.S. cybersecurity professionals to understand their perceptions of cybersecurity and public policy issues We explored topics such as: • What are cybersecurity professionals’ top concerns today? • What are the most important privacy and security issues for governments to address? • How prepared do they feel for upcoming cybersecurity policy changes? 2 GMUNK
  • 3. Government and Contractor n=76 Non-government/Private n=452 MOE= ± 4.3% M E T H O D O L O G Y AUDIENCE MARGIN METHODSAMPLE SIZE TIMING Cybersecurity professionals nationwide This report is a result of a U.S. nationwide survey of cybersecurity professionals (manager level or above) at a variety of different organization types and sizes Survey fielded September 5-15, 2017 15-minute online survey 3 OF ERROR n=528 GMUNK
  • 4. S U R V E Y R E S U L T S 4
  • 5. Q12: How much do you agree or disagree with the following statement? Q25: In general, how well do you understand how these cybersecurity public policy developments will impact your job? Cybersecurity professionals say policy has a great impact on their day-to- day jobs and they understand how upcoming developments can affect their roles Agree that cybersecurity public policy affects their job on a daily basis 85% Understand how cybersecurity public policy developments affect their job 90% Impact of Public Policy on Day-to-Day Job 5 Top 2 Box
  • 6. Q26: How prepared do you think you, your organization and your industry are for upcoming cybersecurity policy changes? Level of Preparedness for Upcoming Policy Changes Yet, only 37% feel completely prepared for upcoming policy changes, and even fewer are confident in industry preparedness overall Say their industry is completely prepared Say their organization is completely prepared 37% Say they are completely prepared 36% 28% 6 Top Box Only
  • 7. “Regulations contribute to my company's ability to protect our assets. We as a company need to be ahead of the curve on all issues involving cybersecurity.” – Non-Government / Private 83% Agree that the regulations in place are effective in making things secure An overwhelming majority of cybersecurity professionals feel government regulations have a positive impact on cybersecurity Impact of Regulations on Security Q6: How much do you agree or disagree with each of the following statements? Q13: How does cybersecurity public policy affect your job on a day-to-day basis? 7 Top 2 Box “Policy tends to be a driving force in how companies/governments begin to react to various threats either before, or in some cases after, they begin to show up.” – Government / Contractor
  • 8. 48% Follow cybersecurity policy issues very closely However, less than half of cybersecurity professionals follow public policy issues very closely Following Public Policy Issues Q7: How closely do you follow cybersecurity public policy issues? 8 Top Box Only
  • 9. 45% Almost all cybersecurity professionals agree that more common standards and frameworks are necessary Attitudes toward Common Standards “The most important issue is how to effectively share threat information and automatically detect and mitigate them in real-time as well as how to motivate organizations to implement best practices.”– Government / Contractor “[It’s important to] have some sort of uniform standards and centralized resource relative to what constitutes a cybersecurity event and how those issues are reported, responded to, and resolved.” – Non-Government / Private Agree that the information security industry needs more common security standards/ frameworks 92% Q6: How much do you agree or disagree with each of the following statements? Q14: In your opinion, what are the most important cybersecurity issues for governments to address? 9 Top 2 Box
  • 10. Q6: How much do you agree or disagree with each of the following statements? Q13: How does cybersecurity public policy affect your job on a day-to-day basis? However, compliance is a current pain point for cybersecurity professionals Agree that regulation makes organizations focus more on compliance than on security 86% Agree that their organization spends too much of their time and budget on compliance 64% “The lack of direction under regulation causes us to continually change to try to stay compliant.” – Non-Government / Private “There are often conflicting reports and it is impossible to get anyone to confirm what regulation or standard is the one to follow.” – Government / Contractor Attitudes toward Compliance 10 Top 2 Box
  • 11. 37% Respondents believe that modernizing technology is critical to effective government cybersecurity Attitudes toward Modernizing Technology Agree that modernizing technology is critical to effective government cybersecurity 96% “The more archaic our defenses are ... the easier it is to break them down.” – Non-Government / Private “You have legacy systems with users who only know operational concerns, with no time to bring systems up-to-date. This alone forces people to be concerned with more uptime than security.” – Government / Contractor Q20: How much do you agree or disagree with each of the following statements? Q21: What are the greatest cybersecurity risks of not modernizing government technology? 11 Top 2 Box
  • 12. Agree that transitioning legacy systems to the cloud is critical to effective government cybersecurity 88% Cybersecurity professionals agree that transitioning legacy systems to the cloud is critical to effective government cybersecurity Attitudes toward Legacy Systems and the Cloud Q20: How much do you agree or disagree with each of the following statements? Q21: What are the greatest cybersecurity risks of not modernizing government technology? “Legacy systems are easier to breach and have the greatest security vulnerability.” – Non-Government / Private “Open vulnerabilities in legacy hardware and software [are the greatest cybersecurity risks of not modernizing government technology].” – Government / Contractor 12 Top 2 Box
  • 13. Q3: How important is it for organizations to have each of the following cybersecurity measures in place? Q5: And which, if any, of the following cybersecurity measures does your organization have in place? Cybersecurity professionals say monitoring to detect breaches and protect data at the file level is important, yet only half have tools in place to do so Current Practice 88% Say it is important to monitor to detect breaches and protect data at the file level Currently in placeImportant 49% Say that monitoring to detect breaches and protect data at the file level is currently in place at their organization Monitoring to Detect Breaches and Protect Data at the File Level 13 Percent SelectedTop 2 Box Importance vs.
  • 14. 14 Automating system patching is another opportunity for more effective cybersecurity Q3: How important is it for organizations to have each of the following cybersecurity measures in place? Q5: And which, if any, of the following cybersecurity measures does your organization have in place? Say that automating system patching is important 80% Automating System Patching Importance vs. Current Practice Say that automating system patching is a measure that is in place at their organization 44% Current Practice Currently in placeImportant Percent SelectedTop 2 Box Importance vs.
  • 15. The overwhelming majority of cybersecurity professionals say critical infrastructure is important for governments to address Importance of Cybersecurity Issues for Governments to Address Q15: How important are each of the following cybersecurity issues for governments to address? 91% Say that critical infrastructure is important for governments to address 15 Top 2 Box
  • 16. Respondents are most informed about cybersecurity policy developments at the federal level Informed of Recent Public Policy Developments 77% 80% 87% Are informed about recent federal level policy developments Are informed about recent state level policy developments Are informed about recent international level policy developments Q22: How informed do you feel about the latest cybersecurity public policy developments that have occurred over the last six months at the…? 16 Top 2 Box