The Next 12 Months - Where IT Leaders Anticipate Spending More Time On

IDG’s recent “State of the CIO” survey across IT leaders has revealed the impact of COVID-19 on IT organizations and the sudden and unforeseen shifts of their initial 2020 plans.

Top 4 Priorities for Every CEO to the IT to Lead their Business Through the Current Disruption

  1. leading digital business and digital transformation initiatives(37%)

  2. \

    improving remote work experiences (37%)

  3. \

    upgrading IT and data security to boost corporate resilience (29%)

  4. \

    reduction and rationalization of IT spendings (28%)

Where IT Leaders anticipate spending more time on over the next 12 months

The top activity within the coming months IT leaders will spend their time on is cost control and expense management (45%) followed by improving IT operations/systems performance (38%)

How are IT leaders responding to the pandemic

(Source: IDG Blog - How are IT Leaders Responding to the Pandemic?)

Re-Prioritization of Business Initiatives

The main focus has shifted to the increase in operational efficiency (62% increased priority) followed by supporting the transformation of existing business processes (56%). In fifth position on our list of priorities is the need for increasing cybersecurity protection.

[Increase in Operational Efficiency] + [Increase in Cybersecurity Protection] = SOC Modernization

How do you combine both initiatives? How do you enhance cybersecurity whilst putting additional measures in place without adding additional workload and operational costs on top of existing resources? Is it possible to consolidate different security tools to reduce license spend? How do you justify and communicate information security efforts to management so they understand their importance?

Splunk customers have been resolving these queries daily. Our experts have summarized the top lessons learned. From cost reductions and efficiency gains through migration of SOC operations into Splunk Cloud, automation with Splunk Phantom, or establishing an Enterprise Operational Cyber Risk Score with Splunk Enterprise Security.

Join our upcoming webinar "Five Lessons in SOC Modernization: Real Security Transformation Stories" to learn from the leading security teams at Intel, Airbus, Fresenius, Norlys and Johnson Mathey!

Best,

Matthias

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.