Close
Menu
Tables or Figures
Figure 1. Current Threat Landscape Sentiment
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 2. Security Incidents Organizations Have Experienced Over the Past 24 Months
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 3. Consequences of the Security Incidents Organizations Have Experienced Over the Past 24 Months
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 4. Primary Drivers of Organization’s Cybersecurity Strategy
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 5. Cyber Supply Chain Security Sentiment
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 6. Why Organizations Believe Cyber Supply Chain Security Is Becoming More Difficult
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 7. Most Important Security Considerations During Product Evaluation and Purchasing Processes
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 8. Audits of Strategic Suppliers
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 9. Internal Groups Responsible for IT Vendor Security Audit Processes
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 10. Mechanisms Used to Conduct IT Vendor Security Audits
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 11. Current IT Vendor Security Audit Process
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 12. Measurement of IT Vendor Security Audits
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 13. Respondents Rate IT Vendors’ Commitment to/Communications about Internal Security Processes and Procedures
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 14. Confidence Level in Organization’s Knowledge of the Purchasing Origin of Hardware and Software
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 15. Use of Suspect Vendors
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 16. Internal Software Development
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 17. Confidence Level in Security of Internally Developed Software
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 18. Security Incidents Related to the Compromise of Internally Developed Software
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 19. Security Activities Included as Part of the Software Development Process
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 20. Secure Software Development Initiatives
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 21. Why Organizations Chose to Establish a Secure Software Development Program
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 22. Plans to Include Security Activities as Part of the Software Development Process
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 23. Outsourcing of Software Maintenance or Development Activities
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 24. Security Safeguards Mandated of Service Providers
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 25. Sharing of IT Services or Business Applications with Third Parties
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 26. Approximate Number of External Third Parties with which Respondent Organizations Share IT Services or Business Applications
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 27. Security Controls Partners Require When Receiving IT Services or Business Applications from Critical Infrastructure Organizations
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 28. Security Controls Critical Infrastructure Organizations Require When Using IT Services or Business Applications from Third Parties
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 29. Groups Responsible for Security Policies and Safeguards for Interaction with Third Parties
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 30. Establishment of Security Policies and Safeguards for Interaction with Third Parties
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 31. Respondents’ Opinion of the U.S. Federal Government’s Cybersecurity Strategy
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 32. Role of the U.S. Federal Government with Regard to Cybersecurity
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 33. Suggested Actions for the U.S. Federal Government with Regard to Cybersecurity
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Research Findings
Source: Enterprise Strategy Group, 2015.
Figure 34. Survey Respondents by Current Job Function
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Respondent Demographics
Source: Enterprise Strategy Group, 2015.
Figure 35. Survey Respondents by Number of Employees
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Respondent Demographics
Source: Enterprise Strategy Group, 2015.
Figure 36. Survey Respondents by Industry
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Respondent Demographics
Source: Enterprise Strategy Group, 2015.
Figure 37. Survey Respondents by Annual Revenue
Report:
ESG Research Report: Cyber Supply Chain Security Revisited
/ Chapter:
Respondent Demographics
Source: Enterprise Strategy Group, 2015.
To the Top