The Global State of Information Security® Survey 2018

How can global business leaders improve cyber and privacy risk management? The key findings of the Global State of Information Security® Survey 2018—based on responses of 9,500 executives in 122 countries and more than 75 industries—provide valuable lessons for companies worldwide.

In a series of three reports, we’re exploring how industry can leverage these lessons and other PwC insights. Our first report examines why businesses are vulnerable to cyber disruptions—and how leaders can help their organizations build resilience to sustain operations and boost economic performance. Our second report focuses on the need for business leaders to revitalize data privacy and trust by jolting stalled risk management efforts into action. The third report will look ahead at the long-term future of cybersecurity.

Download the latest report

Cyber disruptions

Our digital society's ever-growing reliance on data and interconnectivity is ushering in new risks of large-scale cybersecurity incidents with cascading disruptive consequences. We examine how businesses can develop resilience to withstand these disruptions and thrive in the marketplace.

View the cyber disruption report

Privacy and trust

In our increasingly interconnected world, constant data breaches are eroding consumer trust. These risks are complicating data protection and the sharing of information across borders. Businesses, however, can proactively tackle these challenges with a focus on growth.

View the privacy and trust report

The future of cybersecurity

The rapid pace of technological development has broad implications for the future of cybersecurity. We explore how new research and innovations could significantly change how society manages cyber risks.

Coming Spring 2018

The growth in digital devices is driving risk management

With the internet of things (IoT) becoming ubiquitous, and consumers demanding products with an emphasis on cybersecurity and privacy, organizations are revamping their security policies. Key IoT investment areas include policies and technologies to protect consumer privacy, as well as data governance policies.

The growth in digital devices is driving risk management

Policies and technologies implemented to address risks associated with IoT

Policies and technologies implemented to address risks associated with IoT


Business leaders see new risks tied to emerging technologies

Business leaders are clear-eyed about new risks tied to emerging technologies. GSISS respondents recognize that a successful cyberattack on automated or robotic systems could have major consequences, including the disruption of operations, the compromise of sensitive data and damage to product quality.

Business leaders see new risks tied to emerging technologies

Critical consequences of a cyberattack on automation or robotics systems

Critical consequences of a cyberattack on automation or robotics systems

   


Cyber threats to the integrity of data are a rising concern

Cyberattacks that manipulate or destroy data can undermine trusted systems without the owner’s knowledge and have the potential to damage critical infrastructure.

Cyber threats to the integrity of data are a rising concern

Data impacts of security incidents

Data impacts of security incidents

   


Current employees remain the top source of security incidents

Incidents attributed to hackers, competitors and other outsiders have declined. However, those attributed to insiders, such as third parties—including suppliers, consultants and contractors—and employees, have stayed about the same or increased.

Current employees remain the top source of security incidents

Estimated likely source of incidents

Estimated likely source of incidents

   

Contact us

Sean Joyce
Cybersecurity and Privacy Leader, PwC US
Tel: +1 (703) 918 3528
Email

Grant Waterfall
Europe, Middle East & Africa Cybersecurity and Privacy Leader, PwC US
Tel: +44 207 804 2040
Email

Follow us