{"id":2293,"date":"2013-08-02T00:00:00","date_gmt":"2013-08-02T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/08\/02\/ciso-spending-priorities-revealed\/"},"modified":"2021-12-30T11:41:00","modified_gmt":"2021-12-30T11:41:00","slug":"ciso-spending-priorities-revealed","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/08\/02\/ciso-spending-priorities-revealed\/","title":{"rendered":"CISO spending priorities revealed"},"content":{"rendered":"<p style=\"margin: 0px;\">According to a GDS International survey of more than 100 leading European information security professionals, investment priorities are changing. Spending to support business growth is at an all-time high (22% of 2013 budgets, up 5% on 2012 figures). Investments to maintain and run existing systems and processes are still the lion\u2019s share, and have grown by 6% since 2011 (41% of 2013 budgets, up from 35% in 2011).<\/p>\n","protected":false},"excerpt":{"rendered":"<p style=\"margin: 0px;\">As to where the money is going, respondents said five areas were \u2018priority one or two\u2019 (where one is most important and five is least important).<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">Notable changes occur in spending priorities between 0-12 months (FY 2013) and 12-24 (FY 2014) months on data security, document security and social media security.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">54% of respondents indicated spending on data security would be high priority in 2014 (up from 38% in 2013). 38% of respondents indicated spending on document security would be high priority in 2014 (more than double the 15% in 2013). 23% of respondents indicated spending on social media security would be high priority in 2014 (more than triple the 8% in 2013).<\/p>\n<p style=\"margin: 0px;\"><\/p>\n<p style=\"margin: 0px;\">Link: <a href=\"http:\/\/www.net-security.org\/secworld.php?id=15346\">http:\/\/www.net-security.org\/secworld.php?id=15346<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2293","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2293"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2293\/revisions"}],"predecessor-version":[{"id":4780,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2293\/revisions\/4780"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}