Security Staffing Climbed Sharply in 2011 - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Security Staffing Climbed Sharply in 2011-4 Next

Sixty percent of respondent organizations outsource some of the information security function. On the average 18 percent of the staffing budget is outsourced, which is up from seven percent in 1997.

Information Shield, a leading developer of information security policy and compliance content, recently announced the results of the 2011 Information Security Staffing Survey. The 2011 survey had respondents from 190 different organizations with headquarters in 34 different countries.

Although the numbers vary considerably by industry, information security staff now makes up roughly one out of every 200 employees. Average staffing levels jumped 880 percent since the previous survey, conducted in 1997. The rapid rise in staffing was driven primarily by compliance and market pressures.

The 2011 Information Security and Data Privacy Staffing Survey measured responses to a variety of questions concerning the staffing levels and characteristics of the information security function. The survey was designed to allow organizations to construct meaningful budget and staffing estimates based on both their industry and organization size.

More Slideshows:

Five Cloud Computing Trends Affecting Cloud Strategy Through 2015 Trends that will be accelerating, shifting or reaching a tipping point over the next three years and that users must factor into their planning processes.

Six Reasons Windows 8 Could Be a Threat to the iPad Reasons why Windows 8 is fierce competition.

Worldwide Software as a Service Revenue Expected to Reach $14.5 Billion in 2012 SaaS revenue in 2012 is forecast to increase 17.9 percent over 2011.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.