Which cybersecurity attack is currently your highest priority (to defend against)?

Ransomware and multifaceted extortion37%

Business email compromise42%

Third-party vendor compromise (supply chain)13%

Cloud security incidents5%

I have no idea1%

lock icon

Please join or sign in to view more content.

740 PARTICIPANTS
3.7k views2 Upvotes1 Comment
Group Director of Information Security in Banking4 months ago
Attacks are a symptom. Attack vectors are more important to identify. As an example; Your choices of Ransomware, Cloud security incidents or even 3rd party vendor compromise, the attack vectors is 'identity compromise'. Identity compromise can happen via insecure account credentials, loss of API keys and secrets, session cookies ,  tokens or inadequate use of OTPs. Now if I flip your question to read, 
"Which cyber security attack vector is your highest priority?" 
I would answer in below order of priority:

1. Credentials / identity loss of web facing applications ( missing SSO/PAM integration).
2. Patchable vulnerabilities exploitation of web facing applications and endpoint desktops. (Broken / insufficient patch management process)
3. Compromised credentials on admin endpoints (Inadequately configured EDR and missing least privilege access user account on privileged user endpoints, making them susceptible to phishing attacks).

Content you might like

VP of Global IT and Cybersecurity in Manufacturing6 years ago
Have clear business requirements up front, make sure the proposal includes items such as scope, timeline, cost, resources.
Read More Comments
22.1k views3 Upvotes28 Comments

TCO19%

Pricing26%

Integrations21%

Alignment with Cloud Provider7%

Security10%

Alignment with Existing IT Skills4%

Product / Feature Set7%

Vendor Relationship / Reputation

Other (comment)

View Results
5.7k views3 Upvotes1 Comment
VP of IT in Retail3 days ago
If you have a full Gartner license, they have a benchmarking tool that maps out to your industry.  It was useful for my needs.
701 views1 Comment
Director of IT in IT Services4 days ago
Implementation of Zero trust architecture, its modules across the organisation is a priority for us. So, we will be implementing zero trust strategies in IAM, inline with overall strategy.
1.4k views1 Comment

Yes, and it is always followed22%

Yes, but it is rarely followed54%

Some departments do, but not across the business14%

No9%

View Results
1.8k views2 Upvotes