The Global State of Information Security

For 20 years, leaders have turned to Global State of Information Security® Survey (GSISS) as a trusted resource to navigate the cyber risk landscape. Over time, that landscape has evolved to be less about information security and more about managing digital risk.

As cybersecurity, privacy and data ethics become increasingly intertwined, organizations need a central place to turn for actionable advice. So PwC has developed Digital Trusts Insights, a new platform that explores how to build confidence in the readiness of people, processes and technologies to meet tomorrow’s challenges.

Trust is critical. Build yours now.

Cyber disruptions

Our digital society's ever-growing reliance on data and interconnectivity is ushering in new risks of large-scale cybersecurity incidents with cascading disruptive consequences. We examine how businesses can develop resilience to withstand these disruptions and thrive in the marketplace.

The growth in digital devices is driving risk management

With the internet of things (IoT) becoming ubiquitous, and consumers demanding products with an emphasis on cybersecurity and privacy, organizations are revamping their security policies. Key IoT investment areas include policies and technologies to protect consumer privacy, as well as data governance policies. 

Policies and technologies implemented to address risks associated with IoT

Business leaders see new risks tied to emerging technologies

Business leaders are clear-eyed about new risks tied to emerging technologies. GSISS respondents recognize that a successful cyberattack on automated or robotic systems could have major consequences, including the disruption of operations, the compromise of sensitive data and damage to product quality.

Critical consequences of a cyberattack on automation or robotics systems

Cyber threats to the integrity of data are a rising concern

Cyberattacks that manipulate or destroy data can undermine trusted systems without the owner’s knowledge and have the potential to damage critical infrastructure.

Data impacts of security incidents

Current employees remain the top source of security incidents

Incidents attributed to hackers, competitors and other outsiders have declined. However, those attributed to insiders, such as third parties—including suppliers, consultants and contractors—and employees, have stayed about the same or increased.

Estimated likely source of incidents

Was this helpful?

Thanks for your feedback!

Related Blog Posts

Join our 150K of happy users

  • Get original papers written according to your instructions
  • Save time for what matters most
Place an order