Center Security On Advanced Technology

Similar documents
Modern Compute Is The Foundation For Your IT Transformation

Evolve Your Security Operations Strategy To Account For Cloud

Mastering The Endpoint

Vulnerability Management Trends In APAC

Build Your Zero Trust Security Strategy With Microsegmentation

Modern Database Architectures Demand Modern Data Security Measures

Fact Or Fiction: The State Of GDPR Compliance

Rethink Enterprise Endpoint Security In The Cloud Computing Era

Supporting The Zero Trust Model Of Information Security: The Important Role Of Today s Intrusion Prevention Systems

Business Success Through Embedded Communication Technology

Unlock The Value Of Cloud: A Spotlight On IT Executives

Unlock The Value Of Cloud

Operationalize Security To Secure Your Data Perimeter

Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility

Digital Transformation Drives Distributed Store Networks To The Breaking Point

Security in India: Enabling a New Connected Era

Best Practices in Securing a Multicloud World

CYBERSECURITY RESILIENCE

Building a Threat Intelligence Program

Innovation Leaders Need IT Services To Drive Transformative Outcomes

The Third Annual Study on the Cyber Resilient Organization

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

THREAT HUNTING REPORT

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Converged Infrastructure Matures And Proves Its Value

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

NEXT GENERATION SECURITY OPERATIONS CENTER

Reducing Cybersecurity Costs & Risk through Automation Technologies

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Cybersecurity. Securely enabling transformation and change

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Sponsored by Raytheon. Don t Wait: The Evolution of Proactive Threat Hunting Executive Summary

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

Red Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

2018 MANAGED SECURITY SERVICE PROVIDER (MSSP): BENCHMARK SURVEY Insights That Inform Decision-Making for Retail Industry Outsourcing

The State of Cybersecurity and Digital Trust 2016

Evolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

ForeScout Extended Module for Splunk

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES

Gaps in Resources, Risk and Visibility Weaken Cybersecurity Posture

What It Takes to be a CISO in 2017

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automation

THALES DATA THREAT REPORT

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

THREAT HUNTING REPORT

Enabling Zero Trust Security Through Network Virtualization And Micro- Segmentation

Building Resilience in a Digital Enterprise

White Paper. How to Write an MSSP RFP

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Security-as-a-Service: The Future of Security Management

INTELLIGENCE DRIVEN GRC FOR SECURITY

PULLING OUR SOCS UP VODAFONE GROUP AT RSAC Emma Smith. Andy Talbot. Group Technology Security Director Vodafone Group Plc

PAIN AND PROGRESS THE RSA CYBERSECURITY AND BUSINESS RISK STUDY

Uncovering the Risk of SAP Cyber Breaches

A Forrester Total Economic Impact Study Commissioned by ServiceNow January 2018

Cyber Security in Timothy Brown Dell Fellow and CTO Dell Security

Continuous protection to reduce risk and maintain production availability

2015 VORMETRIC INSIDER THREAT REPORT

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

THE POWER OF TECH-SAVVY BOARDS:

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Conducted by Vanson Bourne Research

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

DDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT

Cyber Security in Smart Commercial Buildings 2017 to 2021

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

Sage Data Security Services Directory

Enabling Hybrid Cloud Transformation

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

Traditional Security Solutions Have Reached Their Limit

Preparing your network for the next wave of innovation

Cyber Resilience. Think18. Felicity March IBM Corporation

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

Cisco Start. IT solutions designed to propel your business

Managed Endpoint Defense

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Logicalis What we do

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

Converged Security - Protect your Digital Enterprise May 24, Copyright 2016 Vivit Worldwide

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

Are we breached? Deloitte's Cyber Threat Hunting

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

The Modern SOC and NOC

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

Martijn Loderus. Merritt Maxim. Principal Analyst Forrester. Director & Global Practice Partner for Advisory Consulting Janrain

THE STATE OF IT TRANSFORMATION FOR TELECOMMUNICATIONS

Vulnerability Assessments and Penetration Testing

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results

Transcription:

A Forrester Consulting Thought Leadership Paper Commissioned By Fortinet July 2017 Center Security On Advanced Technology How A Technology-Led Strategy Helps CISOs Successfully Secure Their Organizations

Table Of Contents 1 2 4 5 10 11 Executive Summary CISOs Trust Technology Solutions To Successfully Secure Their Organizations Security Threats Are Constantly Evolving Businesses Must Keep Up Businesses Must Build Sustainable Security Programs Led By Technology Key Recommendations Appendix ABOUT FORRESTER CONSULTING Project Director: Rudy Hernandez, Market Impact Consultant Contributing Research: Forrester s Security & Risk research group Forrester Consulting provides independent and objective research-based consulting to help leaders succeed in their organizations. Ranging in scope from a short strategy session to custom projects, Forrester s Consulting services connect you directly with research analysts who apply expert insight to your specific business challenges. For more information, visit forrester.com/consulting. 2017, Forrester Research, Inc. All rights reserved. Unauthorized reproduction is strictly prohibited. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change. Forrester, Technographics, Forrester Wave, RoleView, TechRadar, and Total Economic Impact are trademarks of Forrester Research, Inc. All other trademarks are the property of their respective companies. For additional information, go to forrester.com. [1-13MD7L5]

Security is a technologycentered discipline. Executive Summary An ever-expanding and -evolving cyberthreat landscape continues to challenge chief information security officers (CISOs) and other security leaders across the globe. New technologies and more open networks, a multitude of new identities, and savvier malicious actors challenge security leaders to keep pace and devote their energies to the areas that are most effective in securing their organizations. But what those areas are those most effective in preventing security breaches and ensuring smooth business operations can be difficult to discern. In April 2017, Fortinet commissioned Forrester Consulting to profile how CISOs and other security leaders secure their organizations. Forrester conducted an online survey with 342 security leaders in the US, Europe, and Asia Pacific (AP) to explore the priorities and challenges they face and what successful leaders do those who have avoided security breaches that others do not. This study found that although people, processes, and trusted third parties are vital components in securing an organization, it is the security leaders who embraced technology that were more successful in avoiding cyberthreats and breaches. KEY FINDINGS Security is a technology-centered discipline. Good processes and skilled staff are important, but technology is the tool that lets them work. Seventy-one percent of respondents who have never experienced a breach cite better security technologies as the key to their success. A layered defense, especially with advanced technologies, is the best defense. Defense in depth is a tried and true security concept. Organizations deploying 10 or more security technologies, including ones like threat intelligence platforms, endpoint detection and response, security information and event management (SIEM), and sandbox, experienced fewer breaches. Constantly evolving cyberthreats are the greatest challenge that security leaders face. Rapidly evolving cyberthreats present the No. 1 challenge to organizations (cited by 53% of respondents). Reducing the time to detect and respond is critical to reducing breach impact. 1 Center Security On Advanced Technology

CISOs Trust Technology Solutions To Successfully Secure Their Organizations CISOs and other top security leaders face an increasingly complicated threat landscape. Cyberthreats abound like never before hackers accessed more than 1 billion customer records in 2016, and 4 of security leaders in our study report that their organizations experienced a security breach within the last two years (see Figure 1) yet the speed of business today demands that necessary security measures not bog down an organization s ability to act nimbly and quickly. 1 It is in this environment that security leaders must prioritize different initiatives that can sometimes come into conflict with one another. This study of 342 final decision makers over risk and security in their organizations in the US, Europe, and AP revealed that: Those who have never experienced a security breach are more likely to have adopted more and generally newer security technologies. In this study, security leaders were asked to indicate how well they collaborated across departments within their organizations, how many of their security processes were being automated, and how many types of security technologies were currently implemented. When comparing the results between those reporting that they have never experienced a security breach and those who have reported a breach, the only significant difference was the number of security technologies used (see Figure 2). Security leaders look to technology to help them succeed. Security leaders in this study are more likely to trust security technologies as the chief driver of their success over better security processes, automation, third-party vendors, and many other staffing/ organizational factors. This trend is even more pronounced among those who have been able to avoid security breaches: They are more likely to entrust technology as a factor in their success than decision makers who have reported a security breach by 17 percentage points (see Figure 3). Figure 1 To the best of your knowledge, has your organization ever experienced a cybersecurity breach? (Showing percentage of those experiencing a breach within the last two years) 4 Base: 342 risk and security decision makers in enterprises in the US, UK, France, Germany, Australia, Japan, and Singapore Source: A commissioned study conducted by Forrester Consulting on behalf of Fortinet, May 2017 Figure 2 Never experienced a security breach (N = 101) % strongly collaborating in at least three different areas 2 % automating more than 50% of their security processes 2 Average number of security technologies adopted 10.2 Have experienced a security breach (N = 239) 19% 2 8.3 Indicates a difference that is statistically significant at the 95% confidence level Base: Risk and security decision makers in enterprises in the US, UK, France, Germany, Australia, Japan, and Singapore 2 Center Security On Advanced Technology

Figure 3 Which of the following would best contribute to achieving success in your role in securing your organization? (Showing those ranking as either first, second, or third priority) Never experienced a security breach (N = 101) Have experienced a security breach (N = 239) Using better security technologies Developing better security processes/procedures Automating security processes Finding trustworthy third-party partners Bringing in more in-house staff Increasing the visibility of my department within my organization Developing partnerships among the revenue-generating, line-of-business departments within my organization 7 54% 5 5 49% 4 3 43% 3 29% 30% 3 2 3 Indicates a difference that is statistically significant at the 95% confidence level Base: Risk and security decision makers in enterprises in the US, UK, France, Germany, Australia, Japan, and Singapore 3

Security Threats Are Constantly Evolving Businesses Must Keep Up Cutting-edge security technology is highly valued by CISOs because of an increasingly complicated and threatening cybersecurity landscape. Indeed, failing to keep pace with the evolution of security technology is not just complacency it can jeopardize an organization s existence. Security leaders face these challenges every day and are realigning their priorities accordingly. This study reveals that: The constant evolution of cyberthreats is the greatest challenge that security leaders face. Fifty-three percent of survey respondents say that the rapidly evolving threat of cyberthreats presents the greatest challenge to their organizations (see Figure 4). This clearly shows that security leaders must aggressively keep pace and never let their guard down, especially with challenges of complexity cloud, internet of things (IoT), and alert overload that followed close on the heels of cyber threats. In response, security leaders seek to improve their ability to react to cyberthreats. To counter these rapidly evolving threats, security leaders are currently improving (and will continue to improve) operational efficiency (5) and reducing time to detect (54%) and time to respond (49%), in addition to preventing breaches from happening in the first place (5). Part of this preparation requires hiring and training qualified staff to attend to these threats a priority that will increase by 30% in the next three years (see Figure 5). Figure 4 Which of the following are the most challenging factors in securing your organization? (Showing those ranking as first, second, third, fourth, or fifth greatest challenge) 53% The rapidly evolving nature of cyberthreats 49% Securing cloud workloads or services 49% Complexity of our IT environment 4 Securing IoT systems and devices 4 Managing and prioritizing multiple security alerts based on level of risk Base: 342 risk and security decision makers in enterprises in the US, UK, France, Germany, Australia, Japan, and Singapore Source: A commissioned study conducted by Forrester Consulting on behalf of Fortinet, May 2017 Figure 5 What are your organization s current cybersecurity priorities? How do you think these priorities will change over the next three years? (Showing those ranking as either first, second, third, fourth, or fifth priority) Current Next three years % point change Improving operational efficiency 5 5 + Reducing the time to detect potential security threats Preventing data breaches from happening Reducing the response time for security breaches that have already occurred Detecting malicious user behavior Increasing funding/share of budget for cybersecurity initiatives Creating a center dedicated to full-time security incident responses 54% 54% 5 55% 49% 5 4 44% 44% 39% 4 4 0% +3% + - -5% - Ensuring partners/outsourced parties comply with our security policies 3 3 - Proving compliance with government regulations and industry mandates Outsourcing cybersecurity services to trusted third-party partners/vendors Finding and/or training qualified cybersecurity staff 34% 34% 33% 33% 33% 43% 0% 0% +10% Base: 342 risk and security decision makers in enterprises in the US, UK, France, Germany, Australia, Japan, and Singapore 4 Center Security On Advanced Technology

Businesses Must Build Sustainable Security Programs Led By Technology Preparation for the evolving cyberthreats of today and tomorrow requires that CISOs and other security leaders align people, processes, and technologies in order to function with the agility and efficiency needed both to counter these threats and to allow the business as a whole to stay competitive. Leaders must be aware, however, that technology is the demonstrably central component to this equation a technology-led security practice can prevent breaches and quickly respond to ones that do occur. Results from this study confirm that organizations that have avoided security breaches are more likely to (see Figure 6): Adopt multiple types of security technologies. From next-generation firewalls and SIEM to sandbox technologies, organizations that have never reported a security breach are more likely to adopt multiple security technologies by between 11 to 23 percentage points. Gather intelligence. Good threat intelligence provides insight into attacker methods and indicators of compromise (IOCs); 7 of those organizations that haven t experienced a breach adopt threat intelligence platforms. Choose network analysis and visibility (73%), network access control (7), and network segmentation gateways (65%) to monitor and control network activity. Security leaders must control network and data access to avoid breaches. Network analysis and visibility (NAV) solutions monitor network activity while network access control (NAC) and network segmentation gateways control access. These security leaders segment their networks with network segmentation gateways, only allowing authorized access to sensitive data, and they employ NAC to control which devices are allowed to connect to their networks. Leverage support from a wide range of sources in order to acquire security technologies. All these technologies carry a cost to acquire, maintain, and manage. While building a business case is certainly important, security leaders indicated that obtaining technical validation from third parties, industry analysts, and other departments that the products work as expected were the most common approaches. How much senior decision makers value the opinion of one source versus another varies per organization, so it is important to leverage as many as possible. 5

Figure 6 What are your organization's plans to adopt the following network security/security operations technologies? (Showing those selecting currently adopted or expanding current adoption ) Never experienced a security breach (N = 101) Have experienced a security breach (N = 239) Threat intelligence platform Virtualization-aware security technologies Network analysis and visibility (NAV) Endpoint detection and response technologies Network access control (NAC) Next-generation firewall (NGFW) Security information and event management (SIEM) Network segmentation gateways Endpoint prevention technologies Sandbox technologies Intrusion detection/prevention system (IDS/IPS) User behavioral analytics (UBA) Internet of things (IoT)/M2M security Wireless security Dedicated security automation and orchestration solution 7 55% 70% 4 73% 5 75% 60% 7 5 6 54% 7 59% 65% 53% 74% 6 6 5 69% 5 59% 53% 55% 49% 70% 64% 5 53% Indicates a difference that is statistically significant at the 95% confidence level Base: Risk and security decision makers in enterprises in the US, UK, France, Germany, Australia, Japan, and Singapore 6 Center Security On Advanced Technology

ALIGN PEOPLE AND PROCESSES TO SUPPORT YOUR TECHNOLOGY- LED SECURITY PRACTICE Focusing on technology does not mean neglecting other elements of your security practice; they all must work together to effectively secure your organization. Security leaders must take stock of where they stand in these areas and seek to make improvements as necessary. They specifically should: Become more embedded with line-of-business (LoB) teams. Security leaders generally feel that their relationships with LoB departments are satisfactory, but only a minority have built strong ties. Only 2 to 2 strongly agree they are effectively collaborating, interacting, or building influence with other parts of their organizations (see Figure 7). Strengthening these ties will create greater awareness of individual security needs and result in better security controls, threat discovery, and breach mitigation. Drive greater automation. Security leaders adopt numerous security processes, but only one-third to a half are automated (see Figure 8). Manual processes place a higher burden on security staff to recognize and respond to threats. Automation can foster more operational efficiency and enable security staff to put greater focus on security innovation and breach prevention. Figure 7 Would you agree or disagree that any of the following are true statements regarding how you and the cybersecurity department interact with the rest of the organization? (Select one response per row) Strongly agree Generally agree Slightly agree Neither agree nor disagree Slightly, generally, or strongly disagree Collaborations between my department and the revenue-generating, line-of-business departments in the organization are almost always mutually beneficial/successful Our department frequently collaborates with the revenue-generating, line-of-business departments in the organization The cybersecurity department has an incredibly high level of standing and influence at the executive board level Interactions between me/my department and the revenue-generating, line-of-business departments (e.g., sales, etc.) in the organization are seamless My department and I are incredibly successful in getting funding for our cybersecurity initiatives 2 3 23% 2 43% 2 25% 39% 2 2 4 23% 2 44% 25% 10% 1 Base: 342 risk and security decision makers in enterprises in the US, UK, France, Germany, Australia, Japan, and Singapore 7 Center Security On Advanced Technology

Figure 8 What are your organization's plans to adopt the following processes as part of your organization's security operations? (Select one for each) Adopted (either fully adopted or expanding adoption) Currently piloting adoption Planning to adopt No plans to adopt or phasing out current adoption 1 Application security 69% 1 14% Management/administration of 65% 1 security technologies 14% Risk and vulnerability 6 20% management 14% Log analysis 6 20% 13% Incident investigation 59% 23% Which of the processes that you use are automated through technology? (Percentages based on those who have adopted each technology) 55% 33% 4 44% 3 Security metrics reporting 5 2 1 50% Real-time monitoring (log/alert monitoring) Compliance reporting 5 2 1 1 5 2 5 3 Malware research/reversal Threat intelligence (IOCs) 55% 23% 1 14% 54% 2 50% 54% Penetration testing/red teaming 5 2 1 4 Incident response 5 2 1 33% Threat hunting 5 25% 1 4 Base: 342 risk and security decision makers in enterprises in the US, UK, France, Germany, Australia, Japan, and Singapore 8

Find the right security partners and solutions. Many security leaders outsource various aspects of their organizations security to vendors/ third-party partners a trend that will increase in the next 12 months (see Figure 9). Outsourcing provides various benefits, such as added expertise and experience and added technology to which organizations might not have access. Figure 9 Do you anticipate that outsourcing the following security services to vendors/third-party partners will increase/be adopted or decrease/be abandoned in the next 12 months? (Select one for each) Will rely on vendors/ third parties entirely Will increase Will remain the same Will decrease Will be abandoned entirely (i.e., moving in-house) Security information and event management (SIEM) 4 4 Mobile device management/ mobile security 3 44% 4% Application security 40% 43% 3% Identity and access management 4% 4 4 10% Endpoint security 4 43% Security device management 3 43% 9% Managed security services 39% 43% 3% Security monitoring (IDS/IPS) 4 43% 9% Email security 1 3 39% 9% 3% Threat hunting 3 45% Data loss prevention 39% 4 10% Message archiving 5% 34% 5 DNS protection 35% 4 ediscovery 33% 49% Base: 342 risk and security decision makers in enterprises in the US, UK, France, Germany, Australia, Japan, and Singapore 9 Center Security On Advanced Technology

Key Recommendations Transforming your security practice and becoming technology-led requires that you and other security leaders in your organization plot a concerted strategy to overcome organizational, budgetary, and cultural hurdles. Based on this research, Forrester recommends that organizations that wish to stay ahead of the evolution of cyberthreats: Stay up to date. CISOs and other security leaders must investigate new innovations and technologies to remain ahead of evolving cyberthreats. You must regularly attend conferences, follow security thought leaders and consult with your peers, and work with vendors to understand and adopt new offerings. Keep pace with the threat. Malicious actors continually innovate their methods and tools. You must match them by adopting an agile stance and ensuring your security controls don t fall behind. Frequently assess and readjust their security strategy accordingly. Regularly assess your security program and technology stack to identify gaps. Build an iterative strategy to close those gaps and measure improvement. Get efficient. One reason security technology is a differentiator is because it can do the heavy lifting for your staff. Innovations in threat detection, workflow management, and automation can take some of the burden off your team and help compensate for the skills or staff shortages in key areas. Learn the business. CISOs must accelerate their evolution to become business managers focused on protecting their brand, strengthening their reputation, and building customer trust. 2 This means building connections with leaders in your organization to learn what they are working on. Find ways in which security can fit with existing business processes to become an asset not a hindrance and reduce overall risk. 10 Center Security On Advanced Technology

Appendix A: Methodology In this study, Forrester conducted an online survey of 342 risk and security leaders in organizations with 1,000 or more employees in the US and in organizations with 500 or more employees in the UK, France, Germany, Australia, Japan, and Singapore. These individuals were directors or higher with final decision-making authority over information/ cybersecurity and risk within their organizations. Questions provided to the respondents asked about their overall security priorities, challenges faced, technology used, and security breaches experienced. The study began in April 2017 and was completed in May 2017. Appendix B: Demographics/Data Industry Financial services IT 3 1 33% FR, DE, UK Retail Manufacturing and materials 10% 9% 35% US 33% AU, JP, SG Business or consumer services Healthcare Energy, utilities and waste management Construction 5% 5% 5% 9% 4 Company size 34% 10% Transportation and logistics Telecommunications services Electronics Agriculture, food, and beverage Chemicals and metals Consumer product manufacturing Education and nonprofits Media and leisure Travel and hospitality 5% 3% 500 to 999 employees 1,000 to 4,999 employees 5,000 to 19,999 employees 20,000 or more employees Other Base: 342 risk and security decision makers in enterprises in the US, UK, France, Germany, Australia, Japan, and Singapore Note: Percentages may not total 100 due to rounding. Appendix C: Endnotes 1 Source: Lessons Learned From The World s Biggest Data Breaches And Privacy Abuses, 2016, Forrester Research, Inc., January 9, 2017. 2 Source: Build A High-Performance, Customer-Obsessed Security Organization, Forrester Research, Inc., February 9, 2016. 11 Center Security On Advanced Technology