封面
市场调查报告书
商品编码
1660656

企业安全客户之声:全球能源与公共产业安全趋势

Voice of the Enterprise Security Customer: Global Energy and Utilities Security Trends

出版日期: | 出版商: Frost & Sullivan | 英文 55 Pages | 商品交期: 最快1-2个工作天内

价格
简介目录

网路安全决策者调查揭示的成长机会

2023 年,Frost & Sullivan 对拥有 250 名或以上员工的组织的 2,448 名网路安全决策者和影响者进行了「客户之声」调查,以了解他们的网路安全营运、组织管理、技术投资、威胁认知以及其他影响新网路安全投资决策的因素。受访者来自七个国家(澳洲、巴西、法国、德国、日本、英国和美国),代表了全球趋势。

具体到本次分析的重点能源和公共产业领域,146 名受访者(主要是在资讯科技或网路安全团队工作的主管级或以上人员)就网路安全预算、计画优先事项、常用工具和技术以及持续存在的挑战等主题提供了见解和意见。

研究范围

  • 检查能源和公共产业组织的网路安全态势和运营,以提供基础设施、政策和流程中的网路安全状况的最新视图。
  • 描述网路安全预算的规模和结构,提供财务见解并预测网路安全、端点安全、威胁情报和其他安全系统等技术的预算分配。
  • 它概述了用于保护组织数位资产的工具和技术,并描述了所使用的网路安全解决方案,涉及具体解决方案及其功能。

目录

研究目标和调查方法

  • 研究目标
  • 调查方法与受访者概况

能源和公共产业组织的网路安全团队

  • 主要发现
  • 对网路安全购买和升级的整体影响
  • 调查受访者的人口统计
  • 网路安全业务
  • 网路安全人才招聘

网路安全解决方案预算

  • 主要发现
  • 网路安全预算
  • 网路安全预算的与前一年同期比较变化
  • 2023 年网路安全预算分配
  • 各国网路安全平均预算
  • 俄乌战争将如何影响网路安全预算

成长动力与挑战

  • 主要发现
  • 网路安全战略驱动因素
  • 网路安全战略挑战
  • 提高风险意识,做好应对潜在网路攻击的准备
  • 过去 12 个月内成功的网路攻击
  • 目前的网路安全问题
  • 过去成功的网路攻击
  • 过去成功的网路攻击的影响
  • 组织风险意识

工具和技术

  • 主要发现
  • 网路安全计划重点
  • 网路安全解决方案的主要目标
  • 应用安全解决方案
  • 云端安全解决方案
  • 资料安全解决方案
  • 端点安全解决方案
  • 身分安全解决方案
  • 网路安全解决方案
  • 安全营运解决方案
  • 保全服务

战略洞察

  • 战略洞察

附录

  • 成长机会驱动Growth Pipeline Engine(TM)™
  • 成长为何变得越来越艰难?
  • The Strategic Imperative 8(TM)

后续步骤Next steps

  • 成长机会的好处和影响
  • 后续步骤Next steps
  • 附件列表
  • 免责声明
简介目录
Product Code: MH52-23

Growth Opportunities Garnered from a Survey of Cybersecurity Decision-Makers

Frost & Sullivan conducted a Voice of Customer survey of 2,448 cybersecurity decision-makers and influencers in organizations with at least 250 employees in 2023 to understand their cybersecurity operations, organizational management, technology investment, threat awareness, and other factors influencing decisions for new cybersecurity investments. The respondents were from seven countries (Australia, Brazil, France, Germany, Japan, the United Kingdom, and the United States) chosen as a representation of global trends.

Specifically for the energy and utilities sector, the focus of this analysis, 146 respondents-primarily director-level or above and part of information technology or cybersecurity teams-provided insights and opinions on topics including cybersecurity budgets, program priorities, common tools and technologies, and persistent challenges.

Research Scope:

  • Explore energy and utilities organizations’ cybersecurity posture and operations, showcasing the current state of cybersecurity hygiene in infrastructure, policies, and processes. 
  • Depict the size and structure of cybersecurity budgets, projecting financial insights and the distribution of the budget across technologies such as network security, endpoint security, threat intelligence, and additional security systems. 
  • Describe cybersecurity solutions used, giving an overview of the tools and technologies employed for safeguarding the digital assets of an organization and touching upon specific solutions and their functions.

Table of Contents

Research Objectives and Methodology

  • Objectives
  • Methodology and Respondent Profile

Cybersecurity Teams in Energy and Utilities Organizations

  • Key Findings
  • Overall Influence on Cybersecurity Purchases and Upgrades
  • Survey Respondent Demographics
  • Cybersecurity Operations
  • Cybersecurity Resourcing

Cybersecurity Solutions Budget

  • Key Findings
  • Cybersecurity Budget
  • Cybersecurity Budget Year-over-Year Changes
  • Cybersecurity Budget Allocation in 2023
  • Average Cybersecurity Budget by Country
  • Russo-Ukrainian War's Influence on Cybersecurity Budgets

Growth Drivers and Challenges

  • Key Findings
  • Cybersecurity Strategy Drivers
  • Cybersecurity Strategy Challenges
  • Risk Awareness in Preparing for Potential Cyber Attacks
  • Successful Cyberattacks in the Past 12 Months
  • Current Cybersecurity Concerns
  • Previous Successful Cybersecurity Attacks
  • Impact of Previous Successful Cybersecurity Attacks
  • Organizational Risk Awareness

Tools and Technologies

  • Key Findings
  • Cybersecurity Program Priorities
  • Main Objectives of Cybersecurity Solutions
  • Application Security Solutions
  • Cloud Security Solutions
  • Data Security Solutions
  • Endpoint Security Solutions
  • Identity Security Solutions
  • Network Security Solutions
  • Security Operations Solutions
  • Security Services

Strategic Insights

  • Strategic Insights

Appendix

  • Growth Opportunities Fuel the Growth Pipeline Engine™
  • Why Is It Increasingly Difficult to Grow?
  • The Strategic Imperative 8™

Next Steps

  • Benefits and Impacts of Growth Opportunities
  • Next Steps
  • List of Exhibits
  • Legal Disclaimer