The Next 12 Months - Where IT Leaders Anticipate Spending More Time On

IDG’s recent “State of the CIO” survey across IT leaders has revealed the impact of COVID-19 on IT organizations and the sudden and unforeseen shifts of their initial 2020 plans.

Top 4 Priorities for Every CEO to the IT to Lead their Business Through the Current Disruption

  1. leading digital business and digital transformation initiatives(37%)

  2. \

    improving remote work experiences (37%)

  3. \

    upgrading IT and data security to boost corporate resilience (29%)

  4. \

    reduction and rationalization of IT spendings (28%)

Where IT Leaders anticipate spending more time on over the next 12 months

The top activity within the coming months IT leaders will spend their time on is cost control and expense management (45%) followed by improving IT operations/systems performance (38%)

How are IT leaders responding to the pandemic

(Source: IDG Blog - How are IT Leaders Responding to the Pandemic?)

Re-Prioritization of Business Initiatives

The main focus has shifted to the increase in operational efficiency (62% increased priority) followed by supporting the transformation of existing business processes (56%). In fifth position on our list of priorities is the need for increasing cybersecurity protection.

[Increase in Operational Efficiency] + [Increase in Cybersecurity Protection] = SOC Modernization

How do you combine both initiatives? How do you enhance cybersecurity whilst putting additional measures in place without adding additional workload and operational costs on top of existing resources? Is it possible to consolidate different security tools to reduce license spend? How do you justify and communicate information security efforts to management so they understand their importance?

Splunk customers have been resolving these queries daily. Our experts have summarized the top lessons learned. From cost reductions and efficiency gains through migration of SOC operations into Splunk Cloud, automation with Splunk Phantom, or establishing an Enterprise Operational Cyber Risk Score with Splunk Enterprise Security.

Join our upcoming webinar "Five Lessons in SOC Modernization: Real Security Transformation Stories" to learn from the leading security teams at Intel, Airbus, Fresenius, Norlys and Johnson Mathey!

Best,

Matthias

Related Articles

Between Two Alerts: Easy VPN Security Monitoring with Splunk Enterprise Security
Security
3 Minute Read

Between Two Alerts: Easy VPN Security Monitoring with Splunk Enterprise Security

It’s a whole new world we’re living in, at least for now. This little tutorial will help you stay on top of your security game while in the world of Enterprise Security.
Detecting Google Cloud Platform OAuth Token Abuse Using Splunk
Security
5 Minute Read

Detecting Google Cloud Platform OAuth Token Abuse Using Splunk

Google Cloud Platform's Identity Access Management (IAM) permissions can be used to move laterally and escalate privileges. Learn how to detect GCP OAuth token abuse and remediate these events with Splunk.
Splunk Insights: Investigating the 3CXDesktopApp Supply Chain Compromise
Security
9 Minute Read

Splunk Insights: Investigating the 3CXDesktopApp Supply Chain Compromise

In this Splunk blog post, we aim to equip defenders with the necessary tools and strategies to actively hunt down and counteract this campaign. Additionally, we will offer some resilient analytic ideas that can serve as a foundation for future threat detection and response efforts.