2022 Voice of the CISO
Though less eventful than its predecessor, 2021 was another blockbuster year for cybersecurity. With 2020's scramble to enable remote working fading from memory, securing hybrid setups in the long term presented a new and complex challenge.
At the same time, cybercrime went prime time. High-profile cyber-attacks on healthcare, food and fuel supplies put CISOs on high alert. Keeping threat actors out was only part of the problem. Post-pandemic, The Great Resignation saw employees leave their roles in record numbers, often taking valuable data and credentials with them.
To find out how security professionals adapted to this turbulent time, Proofpoint surveyed 1,400 CISOs from around the world, inviting them to share their experiences of the past 12 months and offer their insights for the years ahead.
In the '2022 Voice of the CISO Report,' you'll learn about:
Read More
By submitting this form you agree to Proofpoint contacting you with marketing-related emails or by telephone. You may unsubscribe at any time. Proofpoint web sites and communications are subject to their Privacy Notice.
By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@techpublishhub.com
Related Categories: Backups, Cloud, Compliance, Email, ERP, IT Security, Malware, Network, Security Solutions, Service Providers, Software, Telecommunications


More resources from Proofpoint

Proofpoint Information and Cloud Security Pla...
The Proofpoint Information and Cloud Security platform combines many of our products to address secure access, data loss prevention (DLP) and insid...

Rethinking Insider Risk in the Gig Economy
More and more companies are relying on gig, contract and freelance workers to scale their business. Fully 1 in 5 people now belong to the contract ...

Redefining Data Loss Prevention
Data doesn't move itself. People—whether they are negligent, compromised or malicious—move data in secure and risky ways. Legacy approaches to ...