Which of these resources have you used to design cybersecurity programs?
Control frameworks20%
Program frameworks37%
Risk frameworks22%
Consultant services11%
Managed security service providers (MSSPs)5%
Other outsourcing services2%
Other
 154 PARTICIPANTS
1.6k views1 Comment
Sort by:
Content you might like
Targeted emails43%
Org-wide newsletters60%
Lunch & learn sessions47%
Posters, desktop screen-savers/wallpapers37%
Security champions across all lines of business18%
Other (please specify)1%
Ransomware negotiator Retainer? Do you currently hold a retainer with a ransomware negotiator consulting firm? If so any recommendations?
Is your organization prepared to comply with regulations in the EU’s Digital Markets Act (DMA)?
We’re already in compliance with DMA21%
DMA compliance measures are in progress52%
It is currently being discussed16%
No7%
Not sure3%

Should be multi-select answer.