Phone Number +1-202-802-9399 (US)

Thycotic is now Delinea!

The CISO Challenge

2019 Cyber Security Teams Survey Report

Perceptions of IT Security Are Critical to a CISO’s Success

New research highlights internal challenges cyber security leaders must work to overcome

To help Chief Information Security Officers (CISOs) better understand their role as executive managers, Thycotic surveyed IT security leaders at 200 organizations in the UK and Germany.

This report reveals key management issues facing those responsible for cyber security, including the need to address perceptions by senior leadership and employees.

Given the enormous impact of security breaches and the increase in compliance requirements, CISOs cannot afford internal challenges that make it more difficult to do their jobs. Yet, negative perceptions of IT security by their own executive boards as well as colleagues are affecting efforts to protect organizations from growing security threats.

Key takeaways from the research:

  • Executive board perceptions restrict cyber security effectiveness.
  • While executives may say cyber security is a priority, they need to follow through with strategic investments.
  • Cyber security must be more visible and a positive experience for all employees across departments.

The bottom line: If CISOs want to expand their influence and align cyber security with business priorities, they must “manage up” to executive boards and “manage across” to all employees.

Get the full Report now

Watch the Webinar
Don’t Wait Until it’s Too Late: Assess Your PAM Risks Now With a Free Tool

Watch this webinar to step through best practices for conducting a Privileged Access Management Risk Assessment. You’ll get access to a free online PAM Risk Assessment you can take yourself to identify potential vulnerabilities among your privileged accounts.


See what attendees at the 2018 Black Hat Conference say about hacking your network:

  • Windows 10 and 8 are the most conquered Operating Systems
  • 91% of hackers exploit Windows environments despite use of GPO
  • 75% of hackers say companies are failing to implement least privilege policies
Black Hat 2018 Hacker Survey Report