One-Minute Insights are quick, digestible reports of benchmark surveys taken only by decision makers like yourself in the Peer Community platform. They are designed to be read between meetings. Each report is available for you to download and use for visual data in a presentation or slide deck.
Filter content by:

New regulations taking effect in the U.S. mean that cybersecurity leaders could face legal liability in the event of an incident. What strategies are they using to protect themselves?

From grounded flights to stalled out supply chains, the recent CrowdStrike Windows outage caused major disruptions across the globe. Read on to find out how Gartner Peer Community members were impacted, and how they're responding.

Recent policy changes to third-party cookie tracking have led to a new ‘privacy-first’ digital era. Marketers are revisiting and adjusting their digital marketing strategy to comply with these changes. How have these changes already impacted marketing strategy, and how are marketers adapting?

As marketers adapt to a privacy-first digital age, old strategies and tools must be reevaluated. For years, digital marketers have relied on third-party cookies to collect data about online consumers, but new strategies are needed in the years ahead. What challenges do marketers expect they’ll need to overcome, and what tools are they adopting to adjust?

IT and infosec teams must work together to patch security vulnerabilities. How do organizations divide responsibility and support cross-functional collaboration?

Cybersecurity employees face myriad internal and external pressures that can lead to burnout. What are the consequences of employee burnout and how are leaders reducing this risk?

Software security vulnerabilities can arise from a variety of sources — especially those related to emerging tech. Read on to find out which potential risks are most concerning to tech leaders.

Security behavior and culture programs (SBCPs) offer a holistic approach to risk reduction. How are leaders using SBCPs to drive security consciousness and what progress have they made so far?

Cybersecurity leaders face unique work-related stresses that increase their risk of burnout. Are their organizations providing the necessary support to mitigate this risk?

How are organizations employing cyber risk quantification (CRQ) methods and tools, and what are the benefits so far? Discover the challenges and impacts of CRQ adoption identified by technology leaders.

Vulnerability management (VM) programs can help organizations achieve software supply chain security and cyber resilience. Do leaders consider their organization’s current VM program up to the task?

Modern security operations centers (SOCs) have the potential to protect organizations against an ever-evolving threat landscape through monitoring, detection and response capabilities, but organizational needs and limitations vary. How are leaders currently deploying and maturing modern SOCs?

Security awareness and training programs aim to address the human element in cybersecurity, making them a must-have for any organization as the threat of social engineering attacks persists. How are leaders innovating to improve training so that more employees think and act securely?

Cybersecurity program management helps IT and security leaders evaluate and improve their organization’s security posture to achieve cyber maturity. How are leaders implementing cybersecurity program management and what impacts have they seen so far?

Cybersecurity mesh architecture (CSMA) offers a centralized approach to security operations and can help organizations cope with increasingly complex point solutions. What do IT and security leaders think of this emerging strategy so far?

Single sign-on (SSO) can improve both security and end-user experience by simplifying the login process. Have organizations realized these benefits, or do access challenges persist?

The cyberthreat landscape is becoming increasingly complex and attackers are eager to take advantage of any digital vulnerability. How are decision makers using emergent strategies and tools to maintain effective cybersecurity?

At a time of heightened cybersecurity and amidst the “Great Resignation,” how are decision makers navigating hiring for cybersecurity roles?

RPA tools automate repetitive tasks by using “software robots” to perform business processes that would otherwise be undertaken by human employees. But have decision-makers chosen to adopt RPA tools yet?

Decision-makers may look to artificial intelligence (AI) and machine learning (ML) technologies, that learn based on training datasets, and make predictions that can aect business outcomes, to achieve their business goals. However, debates around the potential impacts of such technologies on businesses and society continue. How are decision-makers, and their organization, approaching AI ethics?

Artificial intelligence (AI) technologies are being used in a variety of tools—but are decision-makers adopting AI in cybersecurity?

Zero Trust is a concept of blanket skepticism when it comes to network access, even from internal users, requiring verification at all entry points and never assuming access privileges. But while Zero Trust is gaining momentum as a strategic ideal, rearchitecting the network to achieve Zero Trust might not be straightforward. After a year of distributed workforces and numerous headline-making cybersecurity incidents across industries, are decision-makers adopting a Zero Trust security strategy? Gartner Peer Insights surveyed over 200 digital decision-makers to understand: Levels of Zero Trust adoption, or timelines for implementation Perceived benefits of Zero Trust, as well as barriers to adoption Essential components for Zero Trust, and whether organizations have them in place