封面
市場調查報告書
商品編碼
1660656

企業安全客戶之聲:全球能源與公共產業安全趨勢

Voice of the Enterprise Security Customer: Global Energy and Utilities Security Trends

出版日期: | 出版商: Frost & Sullivan | 英文 55 Pages | 商品交期: 最快1-2個工作天內

價格
簡介目錄

網路安全決策者調查揭示的成長機會

2023 年,Frost & Sullivan 對擁有 250 名或以上員工的組織的 2,448 名網路安全決策者和影響者進行了「客戶之聲」調查,以了解他們的網路安全營運、組織管理、技術投資、威脅認知以及其他影響新網路安全投資決策的因素。受訪者來自七個國家(澳洲、巴西、法國、德國、日本、英國和美國),代表了全球趨勢。

具體到本次分析的重點能源和公共產業領域,146 名受訪者(主要是在資訊科技或網路安全團隊工作的主管級或以上人員)就網路安全預算、計畫優先事項、常用工具和技術以及持續存在的挑戰等主題提供了見解和意見。

研究範圍

  • 檢查能源和公共產業組織的網路安全態勢和營運,以提供基礎設施、政策和流程中的網路安全狀況的最新視圖。
  • 描述網路安全預算的規模和結構,提供財務見解並預測網路安全、端點安全、威脅情報和其他安全系統等技術的預算分配。
  • 它概述了用於保護組織數位資產的工具和技術,並描述了所使用的網路安全解決方案,涉及具體解決方案及其功能。

目錄

研究目標和調查方法

  • 研究目標
  • 調查方法與受訪者概況

能源和公共產業組織的網路安全團隊

  • 主要發現
  • 對網路安全購買和升級的整體影響
  • 調查受訪者的人口統計
  • 網路安全業務
  • 網路安全人才招聘

網路安全解決方案預算

  • 主要發現
  • 網路安全預算
  • 網路安全預算的與前一年同期比較變化
  • 2023 年網路安全預算分配
  • 各國網路安全平均預算
  • 俄烏戰爭將如何影響網路安全預算

成長動力與挑戰

  • 主要發現
  • 網路安全戰略促進因素
  • 網路安全戰略挑戰
  • 提高風險意識,做好應對潛在網路攻擊的準備
  • 過去 12 個月內成功的網路攻擊
  • 目前的網路安全問題
  • 過去成功的網路攻擊
  • 過去成功的網路攻擊的影響
  • 組織風險意識

工具和技術

  • 主要發現
  • 網路安全計劃重點
  • 網路安全解決方案的主要目標
  • 應用安全解決方案
  • 雲端安全解決方案
  • 資料安全解決方案
  • 端點安全解決方案
  • 身分安全解決方案
  • 網路安全解決方案
  • 安全營運解決方案
  • 保全服務

戰略洞察

  • 戰略洞察

附錄

  • 成長機會驅動Growth Pipeline Engine(TM)™
  • 成長為何變得越來越艱難?
  • The Strategic Imperative 8(TM)

後續步驟Next steps

  • 成長機會的好處和影響
  • 後續步驟Next steps
  • 附件列表
  • 免責聲明
簡介目錄
Product Code: MH52-23

Growth Opportunities Garnered from a Survey of Cybersecurity Decision-Makers

Frost & Sullivan conducted a Voice of Customer survey of 2,448 cybersecurity decision-makers and influencers in organizations with at least 250 employees in 2023 to understand their cybersecurity operations, organizational management, technology investment, threat awareness, and other factors influencing decisions for new cybersecurity investments. The respondents were from seven countries (Australia, Brazil, France, Germany, Japan, the United Kingdom, and the United States) chosen as a representation of global trends.

Specifically for the energy and utilities sector, the focus of this analysis, 146 respondents-primarily director-level or above and part of information technology or cybersecurity teams-provided insights and opinions on topics including cybersecurity budgets, program priorities, common tools and technologies, and persistent challenges.

Research Scope:

  • Explore energy and utilities organizations’ cybersecurity posture and operations, showcasing the current state of cybersecurity hygiene in infrastructure, policies, and processes. 
  • Depict the size and structure of cybersecurity budgets, projecting financial insights and the distribution of the budget across technologies such as network security, endpoint security, threat intelligence, and additional security systems. 
  • Describe cybersecurity solutions used, giving an overview of the tools and technologies employed for safeguarding the digital assets of an organization and touching upon specific solutions and their functions.

Table of Contents

Research Objectives and Methodology

  • Objectives
  • Methodology and Respondent Profile

Cybersecurity Teams in Energy and Utilities Organizations

  • Key Findings
  • Overall Influence on Cybersecurity Purchases and Upgrades
  • Survey Respondent Demographics
  • Cybersecurity Operations
  • Cybersecurity Resourcing

Cybersecurity Solutions Budget

  • Key Findings
  • Cybersecurity Budget
  • Cybersecurity Budget Year-over-Year Changes
  • Cybersecurity Budget Allocation in 2023
  • Average Cybersecurity Budget by Country
  • Russo-Ukrainian War's Influence on Cybersecurity Budgets

Growth Drivers and Challenges

  • Key Findings
  • Cybersecurity Strategy Drivers
  • Cybersecurity Strategy Challenges
  • Risk Awareness in Preparing for Potential Cyber Attacks
  • Successful Cyberattacks in the Past 12 Months
  • Current Cybersecurity Concerns
  • Previous Successful Cybersecurity Attacks
  • Impact of Previous Successful Cybersecurity Attacks
  • Organizational Risk Awareness

Tools and Technologies

  • Key Findings
  • Cybersecurity Program Priorities
  • Main Objectives of Cybersecurity Solutions
  • Application Security Solutions
  • Cloud Security Solutions
  • Data Security Solutions
  • Endpoint Security Solutions
  • Identity Security Solutions
  • Network Security Solutions
  • Security Operations Solutions
  • Security Services

Strategic Insights

  • Strategic Insights

Appendix

  • Growth Opportunities Fuel the Growth Pipeline Engine™
  • Why Is It Increasingly Difficult to Grow?
  • The Strategic Imperative 8™

Next Steps

  • Benefits and Impacts of Growth Opportunities
  • Next Steps
  • List of Exhibits
  • Legal Disclaimer