2015 IT Security and Privacy Survey

2015 IT Security and Privacy Survey

IT Security and Privacy Survey 2015

Cybersecurity concerns and discussions abound in companies today. From the boardroom and C-suite to IT, Legal, Finance and more, every corner and function of the business appears intent on addressing these issues aggressively. But are these intentions translating into effective policies and actions to secure the “crown jewels” of organizations? The answers are mixed, at best, according to the results of Protiviti’s latest IT Security and Privacy Survey.


In last year’s study, we identified notable gaps, or chasms, that separated top-performing companies from other organizations in terms of best practices in IT security and privacy, as well as where these organizations needed to progress to bridge these gaps. Fast-forward a year, and many of these gaps remain.


But there are bright spots, starting with those organizations that have changed with confidence to become what we classify as top performers. In these organizations, the board of directors is highly engaged in information security, and there are strong security frameworks that include fundamental information security policies.



Top 4 Key Findings:

  1. "Tone from the top" is a critical differentiator
  2. ​Having the right policies is the foundation of strong information security
  3. Many companies lack critical policies and an understanding of their "crown jewels"
  4. There aren't high levels of confidence in the ability to prevent an internal or external cyberattack




2015 IT Security and Privacy Survey Infographic





Content Contributed by: