SlideShare une entreprise Scribd logo
1  sur  1
FEWER
All data from original Forrester research:
“Center Security on Advanced Technology – How A Technology-
Led Strategy Helps CISOs Successfully Secure
Their Organizations,” July, 2017.
A TECHNOLOGY-CENTERED
SECURITY
STRATEGY
=
RESEARCH SHOWS:
of those surveyed
experienced a breach within
the last two years.
SECURITY
BREACHES
More than half say
their greatest security challenge
is the rapid evolution
of cyber threats.
adopt newer technologies like
a threat intelligence platform,
SIEM, and Sandbox.
attribute their
success to
Better
Technology.71%
62%
Today’sTop 3 Priorities Will Remain the Same for
the Next 3 Years
...and, over the next 12 months
plan to increase outsourcing
of most security services
...but, over the next 3 years
finding and/or training qualified
cyber security staff moves rapidly
up the priority list
42%
1BILLION
Hackers accessed
more than
customer records
in 2016.
ORGANIZATIONS THAT AVOID SECURITY BREACHES
DEPLOY MORE, BETTER, AND NEWER TECHNOLOGY
CURRENT AND FUTURE SECURITY PRIORITIES
CISOs FACE A
GROWING THREAT
!
more security
technologies.
25%
They deploy
adopted more and newer
security technology.
Those who never
experienced a
breach are
more likely to have
To view the complete survey report, go to Fortinet.com/cisosurvey
1
2
3
1
2
3
Improve operational
efficiency
Reduce time to
threat detection
Prevent breaches
from happening
Improve operational
efficiency
Prevent breaches
from happening
Reduce time to
threat detection
40%

Contenu connexe

Plus de Fortinet

Infographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into FocusInfographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into FocusFortinet
 
Securing the Internet of Things 2017
Securing the Internet of Things 2017Securing the Internet of Things 2017
Securing the Internet of Things 2017Fortinet
 
Infographic: Fortinet Q1 2017 Threat Landscape Report
Infographic: Fortinet Q1 2017 Threat Landscape ReportInfographic: Fortinet Q1 2017 Threat Landscape Report
Infographic: Fortinet Q1 2017 Threat Landscape ReportFortinet
 
Protecting Higher Education Data
Protecting Higher Education DataProtecting Higher Education Data
Protecting Higher Education DataFortinet
 
Q4 Threat Report 2016
Q4 Threat Report 2016Q4 Threat Report 2016
Q4 Threat Report 2016Fortinet
 
Infographic Protecting Patient Data
Infographic  Protecting Patient Data Infographic  Protecting Patient Data
Infographic Protecting Patient Data Fortinet
 

Plus de Fortinet (6)

Infographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into FocusInfographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into Focus
 
Securing the Internet of Things 2017
Securing the Internet of Things 2017Securing the Internet of Things 2017
Securing the Internet of Things 2017
 
Infographic: Fortinet Q1 2017 Threat Landscape Report
Infographic: Fortinet Q1 2017 Threat Landscape ReportInfographic: Fortinet Q1 2017 Threat Landscape Report
Infographic: Fortinet Q1 2017 Threat Landscape Report
 
Protecting Higher Education Data
Protecting Higher Education DataProtecting Higher Education Data
Protecting Higher Education Data
 
Q4 Threat Report 2016
Q4 Threat Report 2016Q4 Threat Report 2016
Q4 Threat Report 2016
 
Infographic Protecting Patient Data
Infographic  Protecting Patient Data Infographic  Protecting Patient Data
Infographic Protecting Patient Data
 

Dernier

『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesLumiverse Solutions Pvt Ltd
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 

Dernier (9)

『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best Practices
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 

Infographic: Current and Future CISO Security Priorities

  • 1. FEWER All data from original Forrester research: “Center Security on Advanced Technology – How A Technology- Led Strategy Helps CISOs Successfully Secure Their Organizations,” July, 2017. A TECHNOLOGY-CENTERED SECURITY STRATEGY = RESEARCH SHOWS: of those surveyed experienced a breach within the last two years. SECURITY BREACHES More than half say their greatest security challenge is the rapid evolution of cyber threats. adopt newer technologies like a threat intelligence platform, SIEM, and Sandbox. attribute their success to Better Technology.71% 62% Today’sTop 3 Priorities Will Remain the Same for the Next 3 Years ...and, over the next 12 months plan to increase outsourcing of most security services ...but, over the next 3 years finding and/or training qualified cyber security staff moves rapidly up the priority list 42% 1BILLION Hackers accessed more than customer records in 2016. ORGANIZATIONS THAT AVOID SECURITY BREACHES DEPLOY MORE, BETTER, AND NEWER TECHNOLOGY CURRENT AND FUTURE SECURITY PRIORITIES CISOs FACE A GROWING THREAT ! more security technologies. 25% They deploy adopted more and newer security technology. Those who never experienced a breach are more likely to have To view the complete survey report, go to Fortinet.com/cisosurvey 1 2 3 1 2 3 Improve operational efficiency Reduce time to threat detection Prevent breaches from happening Improve operational efficiency Prevent breaches from happening Reduce time to threat detection 40%