Get Instant Access
to This Blueprint

Security icon

2020 Security Priorities Report

The key to a more secure future is simple prioritization.

Use this deck to learn what projects security practitioners are prioritizing for 2020. Based on a survey of 460 IT security professionals, this report explains what you need to know about the top five priorities, including:

  • Signals and drivers
  • Benefits
  • Critical uncertainties
  • Case study
  • Implications

While the priorities should in no way be read as prescriptive, this research study provides a high-level guide to understand that priorities drive the initiatives, projects, and responsibilities that make up organizations' security strategies.

Our Advice

Critical Insight

There is always more to do, and if IT leaders are to grow with the business, provide meaningful value, and ascend the ladder to achieve true business partner and innovator status, aggressive prioritization is necessary. Clearly, security has become a priority across organizations, as security budgets have continued to increase over the course of 2019. 2020’s priorities highlight that data security has become the thread that runs through all other security priorities, as data is now the currency of the modern digital economy. As a result, data security has reshaped organizations’ priorities to ensure that data is always protected.

Impact and Result

Ultimately, understanding how changes in technology and patterns of work stand to impact the day-to-day lives of IT staff across seniority and industries will allow you to evaluate what your priorities should be for 2020. Ensure that you’re spending your time right. Use data to validate. Prioritize and implement.


2020 Security Priorities Report Research & Tools

Start here – read the Executive Brief

This storyboard will help you understand what projects security practitioners are prioritizing for 2020.

1. Data security

Data security often rubs against other organizational priorities like data quality, but organizations need to understand that the way they store, handle, and dispose of data is now under regulatory oversight.

2. Cloud security

Cloud security means that organizations can take advantage of automation tools not only for patching and patch management but also to secure code throughout the SDLC. It is clear that cloud will transform how security is performed.

3. Email security

Email security is critical, since email continues to be one of the top points of ingress for cyberattacks from ransomware to business email compromise.

4. Security risk management

Security risk management requires organizations to make decisions based on their individual risk tolerance on such things as machine learning and IoT devices.

5. Security awareness and training

Human error continues to be a security issue. In 2020, organizations should tailor their security awareness and training to their people so that they are more secure not only at work but also in life.


Member Testimonials

After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve. See our top member experiences for this blueprint and what our clients have to say.

Client

Experience

Impact

$ Saved

Days Saved

The Saskatchewan Liquor and Gaming Authority

Guided Implementation

7/10

$2,000

2

The information presented confirmed our assumptions. Mark did a good job presenting the information and a few points that were discussed will help... Read More

About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Need Extra Help?
Speak With An Analyst

Get the help you need in this 1-phase advisory process. You'll receive 1 touchpoints with our researchers, all included in your membership.

  • Call 1: Our analysts will explain the findings in the priorities report and help you figure out how to apply the insights to your own organization.

Author

Marc Mazur

Contributors

  • 460 survey respondents
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019