1234 PDF
1234 PDF
1234 PDF
Contents
Contents ...............................................................................2 Security Operations ......................................................... 22
Line of Business and Industry Sector............................. 5 Adoption of Cyber Threat Intelligence Feeds ......... 27
Assessing and Addressing Cyber Risks ...........................7 Email Security Solutions ................................................. 29
Executive Summary
Welcome to the 2020 FireEye Cyber Trendscape report.
In 2019, FireEye worked with KANTAR, an independent market research organization to perform a large-scale cyber
security research initiative involving over 800 senior executives from North America (U.S. and Canada), Europe (France,
Germany and the UK) and Asia (China, Japan and South Korea).
The goal of this initiative was to identify trends impacting cyber security decisions, the top cyber security priorities for
2020 and beyond, the focus of risk mitigation strategies, and to highlight the overall beliefs and perceptions held by
senior executives regarding the state of the cyber threat landscape and how the cyber security industry, governments
and regulatory agencies are responding to their needs.
The study highlights five cyber security focus areas within organizations:
• Balancing the needs of business operations and ensuring resilience to cyber threats
The report provides direct insights that will help organizations benchmark their cyber security initiatives, offers data
points on leading issues that can be used to support critical decision making and provides context for discussions with
senior leadership, board members and other key stakeholders.
REPORT | CYBER TRENDSCAPE 2020 4
Key Findings
While the findings include regional nuances, representatives from participating organizations were remarkably consistent
in their views and perspectives of cyber security. Also, different attitudes appeared to influence how individuals and
organizations approach cyber security across the world.
Security Approaches
Finding a balance between cyber security and Views on Attacks
operational requirements is a challenge for 63% of Organizations believe the most likely attribution for the
organizations. attacks they experienced over the past 12 months are
hacker groups, individual hackers and criminal
In the US, 51% of organizations believe cloud is more
organizations. Globally, nation states were considered
secure than their on-premise environment however
the least likely source of cyber attacks. Only in South
globally, 60% of organizations prefer an on-premise
Korea were they considered one of the top three most
email system to cloud-based.
likely sources.
Globally, 88% of organizations have active initiatives
related to the use of artificial intelligence and 86%
have active initiatives on the use of block chain.
REPORT | CYBER TRENDSCAPE 2020 5
In the U.S. the breakdown was more pronounced with 78% reporting to IT, 10% to business operations, 6% to finance, 4%
to cyber security and 2% to legal.
IT
Business Operations
Finance / Accounting
Cyber Security
Legal
0 10 20 30 40 50 60 70 80 90
US Global
Participants had operational oversight, budgeting oversight and were responsible for setting the overall cyber security
priorities with their organizations.
Nearly a dozen industry segments were represented in the study. The top three industries, technology, industrial and
manufacturing and banking and finance accounted for 71% of all participants.
500-999
10,000 or more 23%
Education
9%
Infrastructure and Utilities
Finance and Banking 5,000 -
9,999
Government 16%
Healthcare
Industrial and Manufacturing
Insurance
Retail
Legal
Technology
Other 1,000-
4,999
52%
Organizational Structure
Sixty-two percent of participants reported that their organizations had a formal CIO or similar role, while others reported
a CISO/CSO role (50%), chief compliance officer (34%), chief risk officer (26%), chief privacy officer (24%) and general
counsel (20%).
The regions with the highest presence of chief compliance officers or similar roles were the UK (43%), France (41%), the
U.S. (40%) and China (38%).
with 14% reporting it to be very difficult and 49% difficult. Only 14% 60
of organizations found it easy and 3% found it easier to find a
balance. Globally, 18% of organizations were neutral on the issue.
40
Participants from Japan reported that 54% of their organizations
found it difficult and 18% very difficult to find a balance between 20
cyber security and operational requirements as did organizations in
Germany with 53% reporting difficult and 13% more difficult.
0
In France, 26% of organizations reported that it was neither easier 1 2 3 4 5
nor more difficult than before to find a balance between cyber
security and operations requirements. Easier More Difficult
There were no significant regional differences for organizations that Figure 7. Ease of finding a good balance between
indicated it was easy or easier to find a balance between security cyber security and operational requirements.
and operations; they corresponded closely to global results.
REPORT | CYBER TRENDSCAPE 2020 8
Globally, 76% of organizations reported planning net security budget increases in 2020. In the U.S., 39% of participants
were planning security budget increases of 10% or more compared with the UK (30%), Korea (22%), China (17%), France
(17%) and Canada (13%).
30
25
20
15
10
0
Increase 10% + Increase 5-9% Increase 1-4% Same as 2019 Decrease 1-4% Decrease 5-9% Decrease 10% +
In Japan and Korea, a full 25% of organizations were planning to keep their 2020 security spend at the same level as 2019
compared with a global average of 13%.
The only countries where organizations were planning to decrease their security budget by more than 10% were France
(3%), Japan (3%), Korea (2%) and China (1%).
Globally, organizations allocated their cyber security budgets into four main categories: prevention (42%), detection
(28%), containment (16%) and remediation (14%).
Japan was the only country that changed the order slightly with an emphasis on detection being expressed by 40% of
organizations followed by prevention (35%), containment (13%) and remediation (12%).
REPORT | CYBER TRENDSCAPE 2020 9
Participants in Japan (29%) and the U.S. (28%) believed cyber security was expensive for the benefits it provides.
Expensive
Inexpensive
18%
25%
Reasonable
57%
Participants offered a mixed view, nearly equally positive and negative, in their Analyst Observation
assessment of technology providers and cyber security vendors, and how well they
The U.S. expressed the highest
were protecting their environment. rate of the most negative views
of governments and regulatory
Only 8% believed that technology providers and cyber security vendors were doing a agencies with very bad
very good job of protecting their environments which is similarly low to the 6% gathering over 15% of the
assessment for a very bad rating. Nearly matching results were also obtained for views. The U.S. response for
good with 34% and bad with 30%. Lastly 22% of organizations did not favor a net bad was in line with other
regions (21%).
positive or negative assessment.
China expressed the most
Organizations were slightly more positive in their assessment of governments and negative perception overall
regulatory agencies and how well they were doing at protecting their environments. with 41% reporting a bad job
4% reporting a very bad job.
A majority of participants believed governments and regulatory agencies were doing The most positive perceptions
a good job (42%) or a very good job (11%). A neutral rating was provided by 19% of were from Japan with 54%
global respondents. Of the remaining organizations 23% believed governments and good 10% very good followed
by the UK with 49% good and
regulatory agencies were doing a bad job and 4% a very bad job.
15% very good.
REPORT | CYBER TRENDSCAPE 2020 10
45
Analyst Observation
40
Korea expressed the most positive
35 assessment of vendors with 35%
reporting good and 14% reporting
30 very good. In contrast, the U.S.
had 36% reporting bad and 15%
25
very bad. Japan had the highest
20 neutral assessment with 30% of
participants not favoring a net
15 positive or negative assessment.
10
0
1 2 3 4 5
Cyber Attacks
Over 90% of organizations believe cyber threats will stay the same or worsen in 2020.
Increase
Decrease
0 10 20 30 40 50 60
Percent of Respondents
Participants believe that the top three industry sectors most likely to be targeted by cyber attacks are finance and
banking (20%), followed by technology (16%) and government (10%).
These results were consistent across nearly all countries represented with only a modest change in emphasis between
them as to which was first and second. The exception was China, where participants believe finance and banking would
be the most likely target, followed by industrial and manufacturing.
REPORT | CYBER TRENDSCAPE 2020 11
Retail
Legal
Insurance
Gaming
Finance and Banking
Technology
Entertainment / Media
Elections
Education
0 5 10 15 20 25
Percent of Respondents
Figure 13. Industry sector most likely to be the target of a cyber attack.
Participants were asked to identify the top three components they believed to be the most likely to be targeted by cyber
attacks and which top three components they believed were the most likely to be vulnerable to a cyber attack.
Participants were globally consistent in their belief that servers and server operating systems, web servers, medical
devices and endpoints were the top three components in both categories.
Web Servers
Servers and OS
Operational Technologies
Network Equipment(3)
Mobile Devices(2)
Medical Devices
Firewalls
Endpoints(1)
0 2 4 6 8 10 12 14 16
Vulnerable Target
Participants were asked which attack types they believed were most likely to lead to a breach. The responses globally
were generally consistent, identifying the top three as malware (21%), targeted phishing (19%) and exploited
vulnerability (18%).
Percent of Respondents
Figure 15. Types of cyber attacks most likely to be the cause a breach.
Similar findings were reported regarding the types of cyber attacks that participant organizations had experienced over
the last 12 months.
Globally, 93% of organizations reported some form of successful cyber attack in the past 12 months. Fifteen percent of
organizations in Japan (more than double the global average of 7%) indicated that they had not experienced a successful
cyber attack in the past 12 months.
Targeted Phishing
Social Engineering
Ransomware
Malware
Exploited Vulnerability
Crypto-Currency Miners
0 5 10 15 20 25
Percent of Respondents
Source of Attacks
Organizations were asked to identify the most likely source of attacks against their organizations. Globally, the results
were highly consistent across all countries with hacker groups (31%), individual hackers (18%) and criminal organizations
(17%) coming in as the top three suspects.
Participants in Japan (25%) and Germany (23%) believed the most likely source of cyber attacks were
criminal organizations.
Globally, nation states were considered the least likely source of cyber attacks totaling less than 8% of responses.
Only in South Korea did it make the top three most likely source with over 19% of responses.
Crimial Organization
Nation State
Malicious Insider
Hacker Groups
Industry Competitor
Individual Hacker
Other
0 5 10 15 20 25 30 35
Percent of Respondents
Participants were asked to provide their insights into the formative elements of their own cyber security program,
how the program was developed and how effective their organization was at responding to and addressing cyber
security issues.
Participants were also asked to describe their internal challenges to maturing their cyber security program and their
biggest fears in the event of a breach.
Globally, 23% of organizations reported formal security programs with a broad, risk-based focus supporting continuous
optimization of processes and approaches, compared to the U.S. (41%) and China (38%).
Only 19% of organizations identified their security program as strategic with intelligence data driving investment
decisions, operational priorities and other critical cyber security factors.
Overall, 7% of organizations indicated they did not have a cyber security program at all. In Canada, this response
jumped to 18%.
Formal
Intelligence Driven
Semi-Formal
Informal
0 5 10 15 20 25 30
Percent of Respondents
These plans consist of pre-established and agreed upon actions, procedures, communications and leadership structure
invoked in the event of a cyber incident. To minimize delays and distractions, plans also include legal agreements and
pre-negotiated contracts with all third-parties that might augment operations or render assistance during an event.
Among all organizations excluding those from the U.S., 29% indicated the existence of mature cyber attack and breach
event response and communications plans that are regularly reviewed and updated. The highest results were from the
U.S. (62%) and China (39%).
However, 29% of organizations reported that while they had cyber plans, they had not been tested or updated in 12 or
more months.
Over 30% of organizations indicated that cyber attack and breach event response plans were owned and maintained by
individual businesses or applications and that they were not coordinated within an overall organization-wide plan.
While only 8% of organizations did not have any cyber attack and breach event response plans, the results were higher in
Canada (19%) and Japan (15%).
No plans
8% Analyst Observation
Figure 20. Roles involved in the development and review of cyber attack and breach response plans.
Organizations reported that the main challenges they faced in maturing their organization’s overall cyber security
posture were primarily IT and security technology maturity followed by IT and security process maturity and then
visibility into threats.
Budget
Percent of Respondents
Globally, participants were quite consistent when they identified the components that currently contributed the most
positive impact to their organization’s ability to prevent a cyber attack or breach. Specifically, vulnerability management
had an edge over security software (both slightly above 16%). These were followed by employee training (14%) and then
response plans and security hardware (both slightly above 12%).
Security Hardware
Outsourcing
Consulting
Employee Training
People
Response Plans
Security Software
Vulnerability Management
0 2 4 6 8 10 12 14 16 18
Percent of Respondents
Figure 23. Components that currently had the most positive impact on security.
REPORT | CYBER TRENDSCAPE 2020 18
Organizations were then asked which component they believed would most positively impact
Analyst Observation
their organization’s ability to prevent a cyber attack or breach if they had the opportunity to
dramatically increase its the budget or presence. Organizations in France
believed employee
The results were globally consistent: 15% of organizations believed that increasing the training was the cyber
investment and presence of vulnerability management solutions within their environment security investment area
with the highest potential
would generate the most impactful results, followed by threat intelligence (13.7%), threat
positive impact against a
hunting (12.6%) and employee training (12%). cyber attack. Their
response was 67% higher
than the global average
(excluding France).
Consulting
Employee Training
Hardware
Outsourcing
People
Response Plans
Threat Intelligence
Vulnerability Management
0 2 4 6 8 10 12 14 16
Percent of Respondents
Figure 24. Components that could most positively impact security, assuming unlimited budget.
Looking more deeply into employee cyber security awareness training (Fig. 25):
• 35% of organizations had semi-formal training conducted at regular intervals that addressed compliance and
typical cyber security awareness topics.
• 29% of organizations had informal training programs focused on meeting core compliance requirements that are
conducted on an as-needed basis
• 25% had advanced training programs designed to promote broad cyber security awareness and behavioral
changes through regular mandatory training and evaluation.
• Over 11% of organizations had no internal employee cyber security training programs.
REPORT | CYBER TRENDSCAPE 2020 19
Significant presence of
Semi-Formal advanced cyber security
35%
training programs was
reported in the U.S. (48%), UK
(34%) and China (37%).
Organizations consistently reported their greatest concern regarding a cyber attack or breach event as the loss of
sensitive data, followed by customers and business operation disruption.
In the U.S. the greatest concern was business operations disruption. U.S. organizations were least concerned by the
possibility of physical damage to real-world infrastructure.
No
7%
Over 56% of organizations reported that they actively
tested their security posture with automated tools and
attack simulation, while 37% indicated that they had
plans to do so in the next 18 months. Only 7% reported
they currently did not and had no plans to do so in the
next 18 months. Yes Planning
56% 37%
The highest reported use of automated tools was by
U.S. organizations (78%) followed by the UK (70%). The
lowest reported use of automated tools was in
Germany (13%) and Japan (13%).
Cloud Initiatives
Cloud is a significant initiative for organizations globally and a hot topic of discussion. Participants were asked to provide
insights into their overall readiness to adopt cloud technologies, their intended outcomes from cloud deployments, their
perceptions of cloud security and how far along they had progressed toward the cloud.
Reduce IT costs
End-of-life software
End-of-life hardware
0 5 10 15 20 25 30
None
0 5 10 15 20 25 30 35
Percent of Respondents
Over 44% of organizations reported that they currently had transitioned some of their environment to the cloud, but they
were being cautious and planned to monitor their experience closely. Thirty-five percent had transitioned some of their
environment and were planning to continue adoption.
Overall, 17% of organizations identified they had a cloud-first approach and their entire environment was cloud-centric.
The most cloud-centric organizations were in the U.S. (37%).
Only 4% of organizations did not have any plans to migrate any of the existing environment to the cloud.
Cloud first
None
0 5 10 15 20 25 30 35
Percent of Respondents
Cloud Security
Over 45% of participants agreed with the belief that security for both their cloud and their on-
Analyst Observation
premise environments was about the same, while 33% believed that cloud was more secure.
In the U.S., 51% of
Only 18% of organizations perceived cloud as being less secure. organizations perceived
cloud as being more
secure than their on-
More secure premise environment.
Security Operations
A security operations center (SOC) is a centralized group within an organization mandated to monitor and address
security issues. Participants were asked to provide insights into their overall SOC maturity, staffing and 2020 plans.
Significant representation of formal proactive SOCs was reported in the U.S. (50%) and China (45%), compared to the
global average of 25% (excluding the U.S. and China).
REPORT | CYBER TRENDSCAPE 2020 23
31-100 people
11-30 people
6-10 people
1-5 people
0 5 10 15 20 25 30 35 40
Figure 33. Size of security operations team (internal and outsourced staff).
Organizations in Korea (78%) and China (76%) planned to increase their levels of internal SOC staffing. This was
significantly higher than the global average of 57% (excludes Korea and China).
Globally, 65% of organizations with outsourced SOC personnel planned to increase staffing levels. Regionally, participants
in China (84%), Canada (75%) and the UK (74%) planned to increase their levels of outsourced staffing.
Increase
No change
Decrease
0 10 20 30 40 50 60 70
Outsourced Internal
Figure 34. Security operations team growth (internal and outsourced staff).
REPORT | CYBER TRENDSCAPE 2020 24
Participants were asked to provide insights into their overall SIEM deployments, use cases, challenges and integration
with other solutions such as security orchestration, automation and response (SOAR).
SIEM Deployments
Globally, over 60% of organizations reported no SIEM solution in their environments and 18% of all participants indicated
they had no plans to deploy a SIEM solution.
In the U.S. and France, 12% of organizations reported they had two or more SIEM solutions.
In Germany, 28% of organizations lacked a SIEM and had no plans to incorporate one in their environment.
In Korea, 58% of organizations planned to add a SIEM to their environment—significantly higher than the global average
(39%, excluding Korea).
0 10 20 30 40 50
Percent of Respondents
SOAR
Threat hunting
Insider threat
Data exfiltration
Discovering lateral movement from compromized trusted
resources
Compliance
0 2 4 6 8 10 12 14 16
Percent of Respondents
There was a nearly a four-way split across the levels of maturity of SIEM deployments for organizations and the findings
were consistent across all regions.
Organizations in France
reported their biggest issue as
the lack of third-party
integration.
Complex to operate
No challenges
0 5 10 15 20 25 30
Participants reported that 25% of organizations were currently exploring the integration of SOAR with their SIEM, while
24% reported that they currently have a SOAR deployment.
Organizations in Japan reported the highest lack of SOAR deployment compared to other regions, while organizations in
France reported advanced SOAR deployments with automation twice as often as any other region.
0 5 10 15 20 25 30
This intelligence is built from collection of reports that contain a wide range of information, such as vulnerability data,
detailed descriptions of tools and techniques used by attackers and comprehensive attribution of a threat actor with a
full history of their activity and the intent. These reports can be used on their own to assess risks within an environment
and can also be used in conjunction with SIEM and other cyber security solutions.
Participants were asked to provide insights into their adoption of threat intelligence subscriptions or feeds as well as their
perceived utility, value and effectiveness of the intelligence.
In Japan, 18% of organizations neither had nor planned to integrate intelligence feeds with their SIEM—more than three
times the global average (5%, excluding Japan).
France (42%) had the highest number of organizations reporting the integration of two or more free or paid intelligence
feeds through their SIEM solution, followed by the U.S. (32%), Canada (18%) and Korea (18%).
Integrated more than one free or paid Intelligence feed with our SIEM
0 5 10 15 20 25 30 35
Of the organizations that used free and paid intelligence, 94% reported they used more than one intelligence feed. The
majority of organizations used five threat intelligence feeds. Just over 6% said they used 10 or more feeds.
10 or more
9
8
7
6
5
4
3
2
1
0 5 10 15 20
50
Percent of Respondents
40
30
20
10
0
1 2 3 4 5
Organizations also responded that it was overall more easy than difficult to derive benefits from free and paid
intelligence feeds.
Percent of Respondents
50
40
30
20
10
0
1 2 3 4 5
Very Easy Very Difficult
Free Paid
Organizations indicated that free and paid intelligence feeds were overall more actionable than not.
Percent of Respondents
50
40
30
20
10
0
1 2 3 4 5
Organizations generally indicated that the scope of insights provided by free and paid intelligence feeds were broad
enough for their use and were not considered limited or in need of improvements.
Percent of Respondents
40
30
20
10
0
1 2 3 4 5
Email Adoption
Globally, organizations reported a preference for on-premise (60%) versus cloud-based (40%) email systems.
Analyst Observation
Cloud
40% The regions with the highest
response rate for on-premise
email were from Canada
(79%), Germany (57%) and
Korea (62%).
Email Management
Organizations reported a minor preference for managing their own email solution (52%) over outsourcing
management (48%).
Organizations inclined to manage their own solutions were concentrated in China (67%), followed by the U.S.
(63%) and then Germany (57%).
Leading the preference for outsourced management of email were Japan (63%), Korea (56%) and Canada (53%).
We manage our
email solution
52%
We outsource the
management of our
email solution
48%
Email Security
Participants were nearly evenly split between the use of third-party email security solutions (51%) and integrated email
security solutions (49%).
Organizations preferring third-party email security solutions were mostly located in Canada (67%) and the UK (55%).
Those preferring integrated solutions were in China (60%) Korea (53%) and the U.S. (53%).
We use a third-party
email security solution
51%
We use an integrated
email security solution
49%
Endpoint hardening
Endpoint firewall
Encryption
Data loss prevention (DLP)
Application whitelisting
Vulnerability management
1 1 3 2 2 3
and remediation
Endpoint firewall 2 2 3 1 2 1
Endpoint encryption 3 2 1 1
Anti-malware or anti-virus
3 1 1 3 1 2
prevention
Port and device control 2
Application privilege control 3
Application behavior
3
analytics
Endpoint detection and
3
response (EDR)
REPORT | CYBER TRENDSCAPE 2020 32
Planning
41%
On the other hand, fewer organizations reported that it was simple (20%) or very simple (8%).
Globally, 15% of organizations found it neither easy nor difficult to find cyber insurance providers.
Participants in the U.S. reported the greatest ease in finding cyber insurance with 38% indicating simple and 16%
indicating very simple.
Participants in Korea reported the most difficulty in finding cyber insurance providers with 12% 55% reporting it as
difficult and 12% as very difficult. Japan also found it challenging, with 49% difficult and 7% very difficult.
REPORT | CYBER TRENDSCAPE 2020 33
Percent of Respondents
50
40
30
20
10
0
1 2 3 4 5
Very Simple Very Difficult
The findings were nearly evenly split when it came to judging whether it was simple or difficult to understand the
coverages provided by cyber insurance, with a slight bias toward difficult. Globally, 8% of organizations found that it was
very easy compared to 10% finding it to be very difficult. Overall, 30% of organizations found it easy to understand,
contrasted with 33% that found it difficult. Slightly more than 19% of organizations found it neither easy or difficult.
In the U.S., participants had the highest incidence of finding it simple (36%) to very simple (23%) to understand the scope
of coverage provide by cyber insurance.
Organizations in Korea had the most challenges, reporting that it was difficult (41%) or very difficult (12%) to understand
scope of coverage. Participants from Japan echoed similar concerns with 45% reporting difficult and 6% very difficult.
Percent of Respondents
40
30
20
10
0
1 2 3 4 5
Very Simple Very Difficult
Overall, most participants echoed similar views that cyber insurance offerings needed to be improved, indicating that
cyber insurance provided very limited scope of protection and represented poor value.
• 10% of organizations found insurance to provide very poor value and 9% excellent value
• 36% of organizations found insurance to provide poor value and 23% good value
REPORT | CYBER TRENDSCAPE 2020 34
Slightly more than 22% of organizations indicated that cyber insurance provided neither poor or good value.
40
Analyst Observation
% of Respondents
Artificial Intelligence
Artificial intelligence (AI) is a computer science specialty focused on creating systems and technologies that mimic how
the human brain learns and adapts to changing conditions. Its goal is to be able to reason, complete tasks and solve
complex problems even when data elements are not complete.
Participants were asked to provide insights into their overall readiness for incorporating AI in their environments and for
their 2020 plans.
Globally, 34% of organizations reported they had started projects to understand AI and AI security issues and 28% had a
preliminary understanding of AI and AI security with pilot deployments.
Only 12% reported that they had not investigated AI and that it was not a priority at this time.
U.S. organizations are the most advanced on the path to AI—28% reported a strong understanding of AI and AI security
concerns and have established a formal approach. The U.K. (15%) and France (11%) were the next most advanced.
0 5 10 15 20 25 30 35 40
Percent of Respondents
Blockchain
Blockchain is a technology developed for creating distributed, transparent and immutable records or ledgers of data and
events. Every data element or event recorded using blockchain is linked to both the immediate data element or event
before it and following it. Each element is coded with its own unique identifier and locked in place using tamper-proof
technology.
Participants were asked to provide insights into their overall readiness for incorporating blockchain in their environments
and associated 2020 plans.
Adoption of Blockchain
Over 86% of organizations reported blockchain initiatives.
Globally, 30% of organizations had begun an initiative to understand blockchain and related security issues and 27% have
a preliminary understanding of blockchain security with pilot deployments.
Only 14% of organizations reported that they had not investigated blockchain and it was not currently a priority.
U.S. organizations were the most advanced in their path to leveraging blockchain with 29% reporting a strong
understanding of blockchain and related security with a formal approach. The next most advanced organizations were
France (13%) and the UK (11%).
Many countries, including Germany (21%), Canada (17%) Japan (17%) reported that they had not investigated blockchain
and it was not currently a priority.
0 5 10 15 20 25 30 35
Percent of Respondents
Conclusions
The FireEye Cyber Trendscape report is a detailed point-in-time view of the state of cyber security and how
organizations are responding and adapting to the changing landscape.
While there were occasional regional nuances with the findings, the most intriguing discovery was how consistent the
overall views and perspective were across very diverse regions. Organizations had more in common with one other than
their geographic location, size or industries would suggest.
We expect the Cyber Trendscape report to provide you with valuable data for 2020 planning and we look forward to
sharing future editions that include retrospective reviews and emerging trends.