+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

US Cybersecurity Responsibility, Spending, and Posture

  • Report

  • 36 Pages
  • April 2022
  • Region: United States
  • Frost & Sullivan
  • ID: 5589968
The COVID-19 pandemic accelerated the remote working trend by at least 20 years in most parts of the United States. To enable remote workers, digital transformation initiatives that were intended to be rolled out over a period of years instead occurred within weeks or months. In the process, security issues were initially pushed aside or ignored altogether in the rush to enable remote workers and protect productivity. That resulted in many organizations unintentionally increasing cyber risk and needing to reexamine security postures.

This study surveyed budget influencing executives in the United States. The respondent profile is 30% C-level executives, 17% executive management, 21% director-level, 12% middle management, 10% senior management, and 10% manager-level. This research provides a glimpse inside the minds of cybersecurity technology end-users to determine what concerns them, what their security posture is, and what is most important to them when making purchasing decisions. It also provides insight on the security implications for American companies as a new and far-reaching second Cold War has erupted between the United States and Russia as a result of the Russo-Ukrainian war

Table of Contents

1. Research Objectives and Methodology
  • Research Objectives and Methodology
  • Respondent Profile

2. Key Findings
  • Key Findings

3. Cybersecurity Responsibility in Organizations
  • Cybersecurity Responsibilities Inside Organizations

4. COVID-19 Impact on Cybersecurity Budgets
  • Cybersecurity Budgets in the COVID-19 Era
  • Cybersecurity Budgets in 2021 and Expectations for 2022

5. Security Concerns, Impact, and Posture
  • Organizations’ Cybersecurity Concerns
  • Cyber Incidents’ Impact on Almost Every Organization
  • Cyber Incidents’ Impact on US Organizations
  • Cybersecurity Posture Self-assessment

6. Security Maturity - A Cluster Analysis
  • Security Maturity - Cluster Analysis Methodology
  • Security Maturity Classifications
  • Technology-focused Security Maturity - United States vs. Europe
  • Technology-focused Security Maturity
  • A Multinational Usage View by Maturity Category

7. Security Barriers and Purchasing Intent
  • Barriers to Making Organizations More Secure
  • Choosing Cybersecurity Products and Services
  • The Most Desired Security Additions for Organizations
  • List of Exhibits
  • Legal Disclaimer