Skip to main content

Please use a modern browser to access the
The 2021 Future of cyber survey report
or download the PDF.

Explore the data Deloitte Future of Cyber Survey
Threats What is the top cyber threat you are most concerned about based on your organization’s business model? Given the recognition of the importance of cyber security and the investment in various cyber solutions in recent years, why, in your opinion, are there still so many successful cyber attacks/incidents/breaches? Board involvement To whom does the Chief Information Security Officer (CISO) report to in your organization? To the best of your knowledge, approximately how often, if ever, is cybersecurity on your Board’s agenda? Cross organization How does the cybersecurity division at your organization primarily interface with the various business units across the enterprise? In your opinion, what are the biggest challenges in managing cybersecurity across your organization? Implementation and prioritization Which of the following actions have been implemented in your organization to increase your cyber and information security? An operational and strategic plan to defend your organization against cyber threats Regular cyber awareness training among all employees of the organization Procedure for continuously improving and developing the organization's hygiene with cyber and information security (so-called cyber hygiene) A cyber incident response plan that gets updated and tested regularly Regular voice-of-the-customer input to cyber and data privacy preferences How is your organization prioritizing the following digital transformation initiatives (including and/or apart from security initiatives) in the next 12 months? If your organization/company is considering a new or major ERP upgrade, are you considering the Cyber implications of this implementation or upgrade? Cyber threats and incidents How have the cyber threats to your business evolved... ...prior to 2020 ...during the COVID-19 pandemic (2020-May 2021)? How many cyber incidents or breaches are you aware of that your organization experienced, in the last year, whether they required disclosure or not? What were the biggest impacts of cyber incidents or breaches on your organization? (Please select up to 2 answers) While collecting your customers personal data, which is of higher importance between improved customer experience versus avoiding data breach? Investment How do you expect the adoption of emerging technology to change your organization in the next 3 years? (rank the following) Which of the following statements best describes how your organization tracks decisions on cybersecurity and investments? This includes decisions over architecture, security controls, threat detection, incident response, recovery, and testing. What type of investments or requirements are influencing your commitment to security in the cloud?
Answer the survey questions below to see how you compare against your peers. Threats What is the top cyber threat you are most concerned about based on your organization’s business model? Please select one option Given the recognition of the importance of cyber security and the investment in various cyber solutions in recent years, why, in your opinion, are there still so many successful cyber attacks/incidents/breaches? Please select one option Board involvement To whom does the Chief Information Security Officer (CISO) report to in your organization? Please select one option To the best of your knowledge, approximately how often, if ever, is cybersecurity on your Board’s agenda? Please select one option Cross organization How does the cybersecurity division at your organization primarily interface with the various business units across the enterprise? Please select all that apply In your opinion, what are the biggest challenges in managing cybersecurity across your organization? Please select up to two options Implementation and prioritization Which of the following actions have been implemented in your organization to increase your cyber and information security? Please select one option for each answer An operational and strategic plan to defend your organization against cyber threats Regular cyber awareness training among all employees of the organization Procedure for continuously improving and developing the organization's hygiene with cyber and information security (so-called cyber hygiene) A cyber incident response plan that gets updated and tested regularly Regular voice-of-the-customer input to cyber and data privacy preferences How is your organization prioritizing the following digital transformation initiatives (including and/or apart from security initiatives) in the next 12 months? Please sort the options from most to least important If your organization/company is considering a new or major ERP upgrade, are you considering the Cyber implications of this implementation or upgrade? Please select one option Cyber threats and incidents How have the cyber threats to your business evolved... Please select one option for each period of time ...prior to 2020 ...during the COVID-19 pandemic (2020-May 2021)? How many cyber incidents or breaches are you aware of that your organization experienced, in the last year, whether they required disclosure or not? Please select one option What were the biggest impacts of cyber incidents or breaches on your organization? (Please select up to 2 answers) Please select two options While collecting your customers personal data, which is of higher importance between improved customer experience versus avoiding data breach? Please select two options Investment How do you expect the adoption of emerging technology to change your organization in the next 3 years? Please sort the options from most to least important Which of the following statements best describes how your organization tracks decisions on cybersecurity and investments? This includes decisions over architecture, security controls, threat detection, incident response, recovery, and testing. This includes decisions over architecture, security controls, threat detection, incident response, recovery, and testing. Please select one option What type of investments or requirements are influencing your commitment to security in the cloud? Please select one option
Contacts