One-Minute Insights

One-Minute Insights are quick, digestible reports of benchmark surveys taken only by decision makers like yourself in the Peer Community platform. They are designed to be read between meetings. Each report is available for you to download and use for visual data in a presentation or slide deck.

Filter content by:

All One-Minute InsightsCrowdStrike Outage 2024Talent Sourcing & HiringTraining & CertificationBusiness Continuity & Disaster RecoveryTeam & Organizational DesignAI & Machine LearningIT Strategy & RoadmapGenerative AIPeer InsightsRussian Invasion of UkraineRelationship ManagementProcess ManagementManagement ToolsContact Center & TelecomDisruptive & Emerging TechnologiesSecurity & GRCData & AnalyticsEngineeringEnd-User Services & CollaborationApplications & Platforms+15 more
  1. How are U.S. CISOs Addressing Liability Risk?

    How are U.S. CISOs Addressing Liability Risk?

    New regulations taking effect in the U.S. mean that cybersecurity leaders could face legal liability in the event of an incident. What strategies are they using to protect themselves?

    View insights
  2. CrowdStrike Outage: Impact And Recovery

    CrowdStrike Outage: Impact And Recovery

    From grounded flights to stalled out supply chains, the recent CrowdStrike Windows outage caused major disruptions across the globe. Read on to find out how Gartner Peer Community members were impacted, and how they're responding.

    View insights
  3. Impact & Perceptions of A Privacy-First Digital Era

    Impact & Perceptions of A Privacy-First Digital Era

    Recent policy changes to third-party cookie tracking have led to a new ‘privacy-first’ digital era. Marketers are revisiting and adjusting their digital marketing strategy to comply with these changes. How have these changes already impacted marketing strategy, and how are marketers adapting?

    View insights
  4. Challenges & Tools For A Privacy-First Internet Age

    Challenges & Tools For A Privacy-First Internet Age

    As marketers adapt to a privacy-first digital age, old strategies and tools must be reevaluated. For years, digital marketers have relied on third-party cookies to collect data about online consumers, but new strategies are needed in the years ahead. What challenges do marketers expect they’ll need to overcome, and what tools are they adopting to adjust?

    View insights
  5. IT and Infosec Collaboration on Vulnerability Patching

    IT and Infosec Collaboration on Vulnerability Patching

    IT and infosec teams must work together to patch security vulnerabilities. How do organizations divide responsibility and support cross-functional collaboration?

    View insights
  6. How Do Cybersecurity Leaders Address Employee Burnout?

    How Do Cybersecurity Leaders Address Employee Burnout?

    Cybersecurity employees face myriad internal and external pressures that can lead to burnout. What are the consequences of employee burnout and how are leaders reducing this risk?

    View insights
  7. Emerging Software Security Risks: How Are Tech Leaders Preparing for 2024?

    Emerging Software Security Risks: How Are Tech Leaders Preparing for 2024?

    Software security vulnerabilities can arise from a variety of sources — especially those related to emerging tech. Read on to find out which potential risks are most concerning to tech leaders.

    View insights
  8. Security Behavior and Culture Programs: Adoption Strategies

    Security Behavior and Culture Programs: Adoption Strategies

    Security behavior and culture programs (SBCPs) offer a holistic approach to risk reduction. How are leaders using SBCPs to drive security consciousness and what progress have they made so far?

    View insights
  9. Cybersecurity Leader Burnout: Causes and Resources

    Cybersecurity Leader Burnout: Causes and Resources

    Cybersecurity leaders face unique work-related stresses that increase their risk of burnout. Are their organizations providing the necessary support to mitigate this risk?

    View insights
  10. Cyber Risk Quantification (CRQ): Adoption And Impacts

    Cyber Risk Quantification (CRQ): Adoption And Impacts

    How are organizations employing cyber risk quantification (CRQ) methods and tools, and what are the benefits so far? Discover the challenges and impacts of CRQ adoption identified by technology leaders.

    View insights
  11. State of Vulnerability Management Programs in 2023

    State of Vulnerability Management Programs in 2023

    Vulnerability management (VM) programs can help organizations achieve software supply chain security and cyber resilience. Do leaders consider their organization’s current VM program up to the task?

    View insights
  12. Modern Security Operations Center (SOC) Strategies

    Modern Security Operations Center (SOC) Strategies

    Modern security operations centers (SOCs) have the potential to protect organizations against an ever-evolving threat landscape through monitoring, detection and response capabilities, but organizational needs and limitations vary. How are leaders currently deploying and maturing modern SOCs?

    View insights
  13. Innovations in Security Awareness & Training

    Innovations in Security Awareness & Training

    Security awareness and training programs aim to address the human element in cybersecurity, making them a must-have for any organization as the threat of social engineering attacks persists. How are leaders innovating to improve training so that more employees think and act securely?

    View insights
  14. Driving Cyber Maturity: Cybersecurity Program Management

    Driving Cyber Maturity: Cybersecurity Program Management

    Cybersecurity program management helps IT and security leaders evaluate and improve their organization’s security posture to achieve cyber maturity. How are leaders implementing cybersecurity program management and what impacts have they seen so far?

    View insights
  15. Cybersecurity Mesh Architecture (CSMA)

    Cybersecurity Mesh Architecture (CSMA)

    Cybersecurity mesh architecture (CSMA) offers a centralized approach to security operations and can help organizations cope with increasingly complex point solutions. What do IT and security leaders think of this emerging strategy so far?

    View insights
  16. Single Sign-On (SSO): Advantages and Disadvantages

    Single Sign-On (SSO): Advantages and Disadvantages

    Single sign-on (SSO) can improve both security and end-user experience by simplifying the login process. Have organizations realized these benefits, or do access challenges persist?

    View insights
  17. The Future of Cybersecurity: Tools and Strategies

    The Future of Cybersecurity: Tools and Strategies

    The cyberthreat landscape is becoming increasingly complex and attackers are eager to take advantage of any digital vulnerability. How are decision makers using emergent strategies and tools to maintain effective cybersecurity?

    View insights
  18. Hiring For Cybersecurity Roles

    Hiring For Cybersecurity Roles

    At a time of heightened cybersecurity and amidst the “Great Resignation,” how are decision makers navigating hiring for cybersecurity roles?

    View insights
  19. RPA Perceptions and Adoption

    RPA Perceptions and Adoption

    RPA tools automate repetitive tasks by using “software robots” to perform business processes that would otherwise be undertaken by human employees. But have decision-makers chosen to adopt RPA tools yet?

    View insights
  20. AI Ethics in Business

    AI Ethics in Business

    Decision-makers may look to artificial intelligence (AI) and machine learning (ML) technologies, that learn based on training datasets, and make predictions that can aect business outcomes, to achieve their business goals. However, debates around the potential impacts of such technologies on businesses and society continue. How are decision-makers, and their organization, approaching AI ethics?

    View insights
  21. AI Adoption in Cybersecurity Tools

    AI Adoption in Cybersecurity Tools

    Artificial intelligence (AI) technologies are being used in a variety of tools—but are decision-makers adopting AI in cybersecurity?

    View insights
  22. Zero Trust Security Strategy Adoption

    Zero Trust Security Strategy Adoption

    Zero Trust is a concept of blanket skepticism when it comes to network access, even from internal users, requiring verification at all entry points and never assuming access privileges. But while Zero Trust is gaining momentum as a strategic ideal, rearchitecting the network to achieve Zero Trust might not be straightforward. After a year of distributed workforces and numerous headline-making cybersecurity incidents across industries, are decision-makers adopting a Zero Trust security strategy? Gartner Peer Insights surveyed over 200 digital decision-makers to understand: Levels of Zero Trust adoption, or timelines for implementation Perceived benefits of Zero Trust, as well as barriers to adoption Essential components for Zero Trust, and whether organizations have them in place

    View insights

Want more insights like these?