1、The(CS)2AI-KPMGControl System Cybersecurity Annual Report20242The(CS)2AI-KPMG Control System Cybersecurity Annual Report 2024ContentThe Chairmans Message04Annual Report Title Sponsor Foreword05Executive Summary06(CS)2Programs08(CS)2Program Maturity Longitudinal Analysis09Client(CS)2Program Maturity
2、Regions10(CS)2Key Performance Indicators(KPIs)High M vs Low M11Security Frameworks in use End Users vs Vendors12Organizational Plans End Users13(CS)2Services End Users14(CS)2Technologies End Users15Obstacles to Reducing the(CS)2Attack Surface16(CS)2Obstacles High M vs Low M17(CS)2Obstacles Organizat
3、ional Level18(CS)2Obstacles End Users&Vendors19(CS)2Obstacles Regional Analysis20(CS)2 Spending and Budgets21Top(CS)2ROI Organizational Level22Top(CS)2ROI High M vs Low M23Spending Priorities Organizational Level24Vendor Budget Guidance to Clients Vendors25Top(CS)2Expenditures High M vs Low M vs All
4、26Top(CS)2Expenditures End Users27(CS)2 Budget Change Longitudinal Analysis28(CS)2Obstacles High M vs Low M29(CS)2Obstacles Organizational Level30(CS)2Budgets High M vs Low M31(CS)2Assessments32(CS)2Assessment Frequency High M vs Low M33(CS)2Assessment Frequency End Users&Vendors34(CS)2Assessment In
5、clusions High M vs Low M35(CS)2Assessment Inclusions End Users&Vendors36(CS)2Assessment Responses High M vs Low M37Pre-Acquisition(CS)2Risk Assessments High M vs Low M38Security Training39(CS)2Awareness Training Integration End Users40(CS)2Awareness Training Integration High M vs Low M41(CS)2Trainin
6、g Inclusions High M vs Low M42(CS)2Networks43Control System Component Accessibility44Current Managed(CS)2Services High M vs Low M47ContentUse of Managed(CS)2Services Longitudinal Analysis48Current(CS)2Technologies High M vs Low M49(CS)2Network Monitoring Longitudinal Analysis50(CS)2Visibility End Us