The security data and survey directory

By CSO staff, CSO |  Security, security data

Survey statistics and research studies are a great way to help you recognize impending threats and emerging attack vectors. Data can even help you identify and substantiate the need for specific budgetary increases to the C-suite. So we've compiled this semi-exhaustive list (it certainly made us tired, anyway) of where to find research-backed data you can use.

Where possible we've made note of some key facts about each survey to help you decide its potential value: the number and type of respondents, who sponsored the survey (if a security product or service vendor was involved, which could influence the perception of bias), and whether the report requires registration or a fee.

This list will be updated and expanded on CSOonline.com. Have suggestions about additional data sources? Email CSO editor Derek Slater at dslater@cxo.com. Data sources will be added, removed or modified at the whim of the editor. (We like to be inclusive but make no promises.) Many thanks to Shawna McAlearney for compiling the bulk of the initial directory.

Last update: 11/29/10. Additions planned ASAP: Click fraud, brand abuse, GRC, software security

Research Survey & Study Categories (click to skip directly to any category)

* Risk Management

* Attack Vectors

* Security Spending, Budgets & Priorities

* Physical Security and Loss Prevention

* Security Controls

* Data Security

* Compliance & Governance

* Business Continuity & Disaster Recovery

* Social Networking

* Security Careers, Skills, Salary and Benefits

* Virtualization & Cloud Computing

Risk Management and Security Leadership

State of the CSO 2010: Progress and Peril

Conducted by: CSO

Number of respondents:


Originally published on CSO |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question
randomness