2015 Cyberthreat Defense Report

2015 Cyberthreat Defense Report

The Cyberthreat Defense Report began the process of looking beyond headline-grabbing breaches and the nth stage in the evolution of cyberthreats to better understand the perceptions, concerns, and priorities of the IT security professionals charged with defending today's networks. Representative findings from that first report included the revelation that one in four security professionals doubts whether their organization has invested adequately in cyberthreat defenses, the identification of mobile devices as IT security's "weakest link," and the expectation that more than three-quarters of businesses will adopt bring-your-own-device (BYOD) policies by 2016.

Download this report to examine:

  • The adequacy of existing cybersecurity investments, overall and within specific domains of IT, and the likelihood of being compromised by a successful cyberattack within the next 12 months;
  • The types of cyberthreats that pose the greatest risk to a given organization and the organizational factors that represent the most significant barriers to establishing effective cyberthreat defenses;
  • The impact that software-defined networking (SDN) may have on an organization's ability to defend against cyberthreats

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.