Pricewaterhouse Global Information Security Survey 2010

As global economic conditions continue to fluctuate, information security hovers in the balance caught between a new hard-won respect among executives and a painstakingly cautious funding environment. Signs of security’s strategic gains and advances stand side by side with newly emerging cracks in its foundation.


The 2011 Global State of Information Security Survey® is a worldwide security survey by PricewaterhouseCoopers, CIO Magazine and CSO Magazine. It was conducted online from February 19, 2010 to March 4, 2010. Readers of CIO and CSO Magazines and clients of PricewaterhouseCoopers from around the globe were invited via email to take the survey. The results discussed in this report are based on the responses of more than 12,840 CEOs, CFOs, CIOs, CSOs, vice presidents and directors of IT and information security from 135 countries. Thirty-seven percent of respondents were from Asia, 30% from Europe, 17% from North America, 14% from South America, and 2% from the Middle East and South Africa. The margin of error is less than 1%.

Download Document: Documents are in common file formats such as Microsoft Word (doc), Powerpoint (ppt), Excel (xls,csv,xlsx), and Adobe pdf.
Download


Related Categories




Related Topics




Related Articles


5 Key Principles of Data Security

This quick guide to data security for businesses discusses 5 key principles to stay away from trouble.

A Guide to Virtualization Security

A practitioner's perspective on virtualization security issues and solutions.

A Socio-technical Framework for Information Security

 The authors argue that information security requires good tools and technologies combined with organizational integration and social alignment.

Are You Ready For the Cloud?

The cloud is ready. Is the CIO ready for the cloud? This paper contends that even though cloud computing is not perfect there are ways to overcome risks by "paying proper attention to vendor reputation, service-level agreements, and pricing schemes....

Cloud Computing Security

In this paper we will explain why trust, reliability and security decisions are central to choosing the right model for cloud computing.

Cloud Computing: Security, Governance and Assurance Perspective

 This paper provides an overview of cloud computing and discusses potential business benefits, risks and assurance issues.

Creating a Culture of Security

This presentation discusses the impact of human behavior on security, how human involvement can increase the effectiveness of security solutions and how a culture of security can benefit an organization.

C-Suite Support for Cyber Security Survey (2016)

This survey explores the disconnect between security professionals and senior managers on cyber security - difference in priority, threat perception, solutions... - and how it can impact enterprise preparedness against cyber threats. This excellent d...

Cyber Security Survey (Consumer Perspective) 2015

Cyber Security Survey (Financial Services) (2016)

This survey studied the response to cyber security challenges in the financial services industry. The analysis focused on the cyber security preparedness, cyber incidents, and responses to understand how best to prepare against cyber crime.  

Cyberinsecurity: The Cost of Monopoly

Is the dominance of Microsoft posing a risk to security? This paper argues that software monopoly has an additional cost: security vulnerability.

Cybersecurity Survey (2016)

This survey highlights the pitfalls in the current cybersecurity strategy being pursued by CIOs and recommends solutions to address them. 

Cybersecurity Survey (2016)

This comprehensive survey explores the emerging cybersecurity threats and mechanisms to cope with them to prevent harm to the enterprise. It will help CIOs understand, predict, prevent, detect, and respond to cybersecurity threats. 

Cybersecurity Survey (2017)

This cyber security survey explores emerging trends and how enterprises are addressing them. The results can help a CIO set cyber security priorities, understand solution choices and how to selection one that fits their requirements, and create a pl...

Cybersecurity Survey (2017)

This survey explores the prevalence of cyber breaches, their impact, actions businesses are taking to protect themselves, and recommends actions to prepare your enterprise for cyber attack. Good advice for the CIO to create a cybersecurity strategy t...

Deloitte Global Security Survey

This excellent study done by Deloitte highlights the growing issues with information security - the threats are increasing as companies are slowing their investments.

Enterprise Security Best Practices

This presentation discusses the evolving digital world around us, its implications on our lives and business, new threats emanating in this boundary-less universe, and ways to deal with them. Excellent discussion for the CIO who wants a holistic pict...

Enterprise Security Framework Adoption Trends (2016)

This survey tracks the adoption of common security frameworks in the enterprise - why do organizations use security frameworks? which security frameworks are preferred? what is the rate of adoption? A good discussion for the CIO to compare their own ...

Ethical Hacking

Ethical hacking has its place in enterprise security - just ask a Security Supervisor. Or better yet, listen to them when they are talking!

European CIO Cloud Survey

This report is based on a survey of 500 CIOs, in a cross-section of organizations across Europe, to explore current attitudes and adoption levels of cloud computing.

Executive's Handbook of Information Security

This guide provides in-depth introduction to the key issues surrounding information security in the digital age, highlights the impact of these issues, and recommends risk mitigation strategies to anticipate, and avoid losing business value because o...

Global Information Security Survey (2010)

As organizational boundaries vanish, so does the traditional information security paradigm. This survey of over 1600 participants from 56 countries highlights the information security challenges facing organizations today and how they are managing t...

Global Information Security Survey (2011)

This annual survey tracks the state of security in enterprises across industry and geography to learn what is coming down the security pike, how are others planning for it?, how best to plan for it? An excellent resource for CIOs to create a robust ...

Global Information Security Survey (2013)

This annual survey tracks the state of security in enterprises across industry and geography to learn what is coming down the security pike, how are others planning for it?, how best to plan for it? An excellent resource for CIOs to create a robust s...

Global Information Security Survey (2014)

This annual survey tracks the state of security in enterprises across industry and geography to learn what is coming down the security pike, how are others planning for it?, how best to plan for it? An excellent resource for CIOs to create a robust ...

Global Information Security Survey (2015)

This annual survey tracks the state of security in enterprises across industry and geography to learn what is coming down the security pike, how are others planning for it?, how best to plan for it? An excellent resource for CIOs to create a robust ...

Global Information Security Survey (2016)

This annual survey tracks the state of security in enterprises across industry and geography to learn what is coming down the security pike, how are others planning for it?, how best to plan for it? An excellent resource for CIOs to create a robust s...

Global State of Information Security Survey (PwC) (2011)

This presentation discusses the key findings from PricewaterhouseCoopers 2011 Global State of Information Security Survey - "In the aftermath of the worst global economic jolt in 30 years, information security confronts a new economic order: Respect...

Hacking 101

This presentation describes the key vulnerabilities in web applications and discusses how to protect against the next attack.

Healthcare Industry Security Survey (2010)

This annual survey tracks the state of security in healthcare organizations to learn what is coming down the security pike, how are others planning for it, how best to plan for it. An excellent resource for CIOs across industry to create a robust sec...

Healthcare Industry Security Survey (2011)

This annual survey tracks the state of security in healthcare organizations to learn what is coming down the security pike, how are others planning for it, how best to plan for it. An excellent resource for CIOs across industry to create a robust sec...

Healthcare Industry Security Survey (2012)

This annual survey tracks the state of security in healthcare organizations to learn what is coming down the security pike, how are others planning for it, how best to plan for it. An excellent resource for CIOs across industry to create a robust sec...

Healthcare Industry Security Survey (2013)

This annual survey tracks the state of security in healthcare organizations to learn what is coming down the security pike, how are others planning for it, how best to plan for it. An excellent resource for CIOs across industry to create a robust sec...

Healthcare Industry Security Survey (2016)

This annual survey tracks the state of security in healthcare organizations to learn what is coming down the security pike, how are others planning for it, how best to plan for it. An excellent resource for CIOs across industry to create a robust sec...

Hybrid Web Security

 Security threats and solutions for both Cloud Computing and On-premises environment.

Identity Management in Health IT

This presentation discusses the imperatives for identity and access management in health information technology.

Information Security Strategy Guide

This information security guide provides guidance to organizations and auditors on assessing the level of security risks to the organization and evaluating the adequacy of the organization’s risk management.

Information Technology Security

This study provides a framework to compare and assess information security governance, strategy, investment, and practices with other organizations using the ISO/IEC 17799 framework for security standards as a guide. The study was done for instituti...

Security Considerations in the System Development Life Cycle

This guide details the steps to integrate information security into the software development lifecycle (SDLC) and related IT projects and initiatives.

Virtualization Security

  Virtualization Security describes the issues and possible solutions to deal with security vulnerabilities in a virtualized environment.

Virtualization Security Strategy

This white paper discusses a coordinated approach for intrusion detection and prevention in a virtualization environment. 




Posted on 04/24/2011 by


Pricewaterhouse Global Information Security Survey 2010 author sourabhhajela

sourabhhajela




Signup For ThoughtLeader









Subscribe


CIO Index

Our Focus is On Your Agenda

CIO Index is the world's largest professional network for CIOs - of the CIO, for the CIO, by the CIO. 

Over 70,000 CIOs and other IT Executives use CIO Index to Learn, Network and Share.

 

Cioindex, Inc.

  • (+1) 800-309-3550
  • Mon - Fri 9:00am - 5:00 pm
  • 115 Franklin Tpke, Mahwah, NJ 07430