Not surprisingly, the priority placed on security and privacy capabilities has intensified in our survey this year – often dramatically. To illustrate, in last year’s study the highest-ranked area in this category (“Developing and maintaining security and privacy standards”) had a priority index of 6.4 (on a 10-point scale). This year, a full dozen of the security and privacy capabilities we assessed are ranked 6.7 or higher. As we detail in our report, the results for CIOs and IT executives are even more pronounced.
These trends are, in fact, evident throughout this year’s results, which show that IT leaders and professionals are contending with a vast number of increasing and competing priorities, including but not limited to cybersecurity. This also mirrors key findings from our recent Executive Perspectives on Top Risks for 2015 study, in which board members and C-suite executives identified cybersecurity as one of the top risks their organizations must address in 2015.2
Our key findings in this year’s IT Priorities Survey include:
1. Security concerns are paramount – No surprise here: Addressing and strengthening cybersecurity represents a critical priority among all respondents, CIOs and companies of all sizes.
2. Major IT changes and upgrades continue – Well over half of all organizations are under- going a major IT transformation that will last a year or longer, intensifying demands on IT departments to manage these changes successfully while addressing other critical business needs (e.g., cybersecurity).
3. The search for balance is underway – As important as cybersecurity and privacy issues have become, they represent just one of many rising priorities, such as virtualization and enterprise
architecture, on the IT department’s bursting agenda. IT executives and professionals have a vast number of pressing duties on their plates this year, with priorities increasing across the board in volume and significance. To address and manage these challenges successfully, they must develop and strengthen the expertise and business savvy necessary to strike the right balance between activities that enhance business value and those that protect organizational value.
4. IT seeks to manage all assets better: data, hardware, software and more – IT departments are adapting and improving how they manage a broader and more diverse collection of company- owned and third-party assets (including data) as their companies seek to harness more and more business value from them.
5. Collaboration is key – Organizations undergoing and managing major changes are focused on leveraging technology to enable greater collaboration across the enterprise. This not only facili- tates more opportunities for real-time partnering, but also reduces time-to-value significantly.
2015 Energy Industry Cybersecurity Report
Strategic Cybersecurity: A Toolkit for Prioritizing, Coordinating, and Transforming Your Cybersecurity Program