Scenario: Recent EY’s Global Information Security Survey 2021 - finds Chief Information Security Officers (CISOs) and security leaders battling against a new wave of threats unleashed by COVID-19 highlighted the current state of cybersecurity and the challenges that organisations face in protecting their data and systems. The growing vulnerability of an IT risk has received a lot of attention in the survey report. Overall, the 2021 EY Global Information Security Survey report provides valuable insights into the current state of cybersecurity, the challenges that organizations face, and strategies for improving cybersecurity resilience and preparedness in the face of emerging threats. a) Briefly explain the nature of EY's Global Information Security Survey. b) Identify any TWO(2) key challenges faced by CISOs to balance the competing demands of cybersecurity while preserving business innovation and growth.

icon
Related questions
Question
(**no chatGPT and feel free to provide the reference link)

Scenario:

Recent EY’s Global Information Security Survey 2021 - finds Chief Information Security Officers (CISOs) and security leaders battling against a new wave of threats unleashed by COVID-19 highlighted the current state of cybersecurity and the challenges that organisations face in protecting their data and systems. The growing vulnerability of an IT risk has received a lot of attention in the survey report. Overall, the 2021 EY Global Information Security Survey report provides valuable insights into the current state of cybersecurity, the challenges that organizations face, and strategies for improving cybersecurity resilience and preparedness in the face of emerging threats.
 
a) Briefly explain the nature of EY's Global Information Security Survey.
b) Identify any TWO(2) key challenges faced by CISOs to balance the competing demands of cybersecurity while preserving business innovation and growth.  
Expert Solution
steps

Step by step

Solved in 3 steps

Blurred answer
Knowledge Booster
Windows
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, cybersecurity and related others by exploring similar questions and additional content below.
Similar questions