The 2013 Cybersecurity Salary Benchmarking Report is now available. The number one reason security professionals leave an organization is due to compensation. Security teams and HR professionals need salary benchmarking information to retain key staff and make offers to new team member. Based on this need we developed the 2013 Cybersecurity Salary Benchmarking Report, giving managers the information needed to:
* Compare staff compensation to industry averages
* Retain top talent
* Make competitive offers to new team members
* Increase staff budgets
* Avoid vulnerabilities that result from staffing shortages
"In past years, organizations have commissioned us to produce salary studies for their own knowledge. We are now making this comprehensive report available to all organizations through SecureWorld Insight, a partnership with Ponemon Institute and SecureWorld Expo. As the market for top quality IT security professions gets more competitive, this information becomes increasingly important to assure proper staff budgets and to avoid vulnerabilities that result from unfilled roles." - Dr. Ponemon.
The Compensation and Role of Security Teams report is now available for purchase at www.secureworldinsight.com.
The 2013 study represents the tenth year Ponemon Institute has conducted its
Privacy Trust Study for Retail Banking. This annual survey-based research series
asks consumers to indicate how secure and confident they feel when sharing their
personal information with their primary banking institutions. (Click to download research briefing)
We are pleased to present the 2013 Cost of Data Breach: Global Analysis, our eighth annual benchmark study concerning the cost of data breach incidents for companies located in nine countries. (Click to download study)
We are pleased to present the results from The Economic & Productivity Impact of IT Security on Healthcare study, sponsored by Imprivata. While the implementation of new technologies is designed to improve efficiency and enhance patient care, it also has the potential to introduce risk, so IT departments must ensure that these new systems meet security and regulatory compliance requirements to keep private information protected. The purpose of this study is to determine the industry-wide economic and productivity impact of this paradigm. (Click to download study)
We are pleased to present the results from Moving Beyond Passwords: Consumer Attitudes on Online Authentication A Study of US, UK and German Consumers sponsored by Nok Nok Labs. In this study we investigate consumers' perceptions about how organizations are confirming their identity and determine what they would consider to be the ideal steps and technologies used to ensure their identity is protected. (click to download study)
The purpose of the Big Data Analytics in Cyber Defense study sponsored by Teradata and conducted by Ponemon Institute is to learn about organizations’ cyber security defenses and the use of big data analytics to become more efficient in recognizing the patterns that represent network threats. Click to download study.
Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon
Institute to understand the differences between non-malicious and malicious data breaches and
what lessons are to be learned from the investigation and forensic activities organizations
conduct following the loss or theft of sensitive and confidential information. The majority of
respondents in this study believe it is critical that a thorough post-breach analysis and forensic
investigation be conducted following either a non-malicious or malicious security breach. (Click to download study)
(Click to download study) We are pleased to present the results from the 2012 Most Trusted Companies for Privacy study. This is an objective study that asks consumers to name and rate organizations they believe are most committed to protecting the privacy of their personal information. This annual study tracks consumers’ rankings of organizations that collect and manage their personal information.
(click to download study) Healthcare organizations seem to face an uphill battle in their efforts to stop and reduce the loss or theft of protected health information (PHI) or patient information. As is revealed in the Third Annual Benchmark Study on Patient Privacy and Data Security sponsored by ID Experts, many healthcare organizations struggle with a lack of technologies, resources and trained personnel to deal with privacy and data security risks.
(Click to download study) We are pleased to present the results of the 2013 State of the Endpoint study sponsored by Lumension® and conducted by Ponemon Institute. Since 2010, we have tracked endpoint risk in organizations, the resources to address the risk and the technologies deployed to manage threats.