Enterprises continue to struggle with cybersecurity staffing. The survey conducted by HCL and ISACA® highlights a dearth of necessary skills
Unfilled (open) cybersecurity positions
No Unfilled (open) cybersecurity positions
*Per 60% survey respondents. Download the report for more details.
32% of enterprises take 6 months or more to fill a cybersecurity position with a qualified candidate
Today, enterprises feel that the following threat actors are most likely to attack them
While Phishing remains the predominant attack type even today as compared to prior years
Top threat actors and attack vectors remain largely consistent year over year, while phishing, malware and social engineering continue to top the list of prevalent attack types. Learn how to identify the attacks that are most prevalent and determine which programs and reporting structures combat the prevailing attacks most effectively.