Figures
Showing 37 figures from this report.
Figure 1. Current Threat Landscape Sentiment
Figure
Figure 2. Security Incidents Organizations Have Experienced Over the Past 24 Months
Figure
Figure 3. Consequences of the Security Incidents Organizations Have Experienced Over the Past 24 Months
Figure
Figure 4. Primary Drivers of Organization’s Cybersecurity Strategy
Figure
Figure 5. Cyber Supply Chain Security Sentiment
Figure
Figure 6. Why Organizations Believe Cyber Supply Chain Security Is Becoming More Difficult
Figure
Figure 7. Most Important Security Considerations During Product Evaluation and Purchasing Processes
Figure
Figure 8. Audits of Strategic Suppliers
Figure
Figure 9. Internal Groups Responsible for IT Vendor Security Audit Processes
Figure
Figure 10. Mechanisms Used to Conduct IT Vendor Security Audits
Figure
Figure 11. Current IT Vendor Security Audit Process
Figure
Figure 12. Measurement of IT Vendor Security Audits
Figure
Figure 13. Respondents Rate IT Vendors’ Commitment to/Communications about Internal Security Processes and Procedures
Figure
Figure 14. Confidence Level in Organization’s Knowledge of the Purchasing Origin of Hardware and Software
Figure
Figure 15. Use of Suspect Vendors
Figure
Figure 16. Internal Software Development
Figure
Figure 17. Confidence Level in Security of Internally Developed Software
Figure
Figure 18. Security Incidents Related to the Compromise of Internally Developed Software
Figure
Figure 19. Security Activities Included as Part of the Software Development Process
Figure
Figure 20. Secure Software Development Initiatives
Figure
Figure 21. Why Organizations Chose to Establish a Secure Software Development Program
Figure
Figure 22. Plans to Include Security Activities as Part of the Software Development Process
Figure
Figure 23. Outsourcing of Software Maintenance or Development Activities
Figure
Figure 24. Security Safeguards Mandated of Service Providers
Figure
Figure 25. Sharing of IT Services or Business Applications with Third Parties
Figure
Figure 26. Approximate Number of External Third Parties with which Respondent Organizations Share IT Services or Business Applications
Figure
Figure 27. Security Controls Partners Require When Receiving IT Services or Business Applications from Critical Infrastructure Organizations
Figure
Figure 28. Security Controls Critical Infrastructure Organizations Require When Using IT Services or Business Applications from Third Parties
Figure
Figure 29. Groups Responsible for Security Policies and Safeguards for Interaction with Third Parties
Figure
Figure 30. Establishment of Security Policies and Safeguards for Interaction with Third Parties
Figure
Figure 31. Respondents’ Opinion of the U.S. Federal Government’s Cybersecurity Strategy
Figure
Figure 32. Role of the U.S. Federal Government with Regard to Cybersecurity
Figure
Figure 33. Suggested Actions for the U.S. Federal Government with Regard to Cybersecurity
Figure
Figure 34. Survey Respondents by Current Job Function
Figure
Figure 35. Survey Respondents by Number of Employees
Figure
Figure 36. Survey Respondents by Industry
Figure
Figure 37. Survey Respondents by Annual Revenue
Figure