1、Cisco Cybersecurity Report Series 2020 CISO Benchmark Study Securing Whats Now and Whats Next 20 Cybersecurity Considerations for 2020 Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 20 Cybersecurity Considerations for 2020 . . . . . .
2、 . . . . . . . . . . . . . . . .4 1. Who in your organization provides executive support and clear focus? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2. How might you decide which metrics matter most? . . . . . . . . . . . . . . 5 3. What primary considerations
3、drive spending on a limited budget? . . . 6 4. Whats the right balance for spending on trust verification and threat detection?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 5. What can measuring the business impact of security breaches tell you? . . . . . . . . . . . .
4、. . . . . . . . . . . . . . . . . . . . . . . . . . . 9 6. Why is voluntary breach disclosure at an all-time high? . . . . . . . . . . 11 7. Can you quantify collaboration benefits between networking and security?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
5、8. What reasons do you observe other than cost reduction for outsourcing?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 9. Does preparation pay off for you? . . . . . . . . . . . . . . . . . . . . . . . . . . 13 10. How critical is patching in breach defense? . .
6、. . . . . . . . . . . . . . . . 13 11. What causes downtime? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 12. How challenging is it to protect the mobile workforce?. . . . . . . . . . 14 13. How might you extend zero trust to secure applications?. . . . . . . . 14 14. Is defend