Cybersecurity & Networking

  • Insights from Microsoft Ignite 2023

  • Discover what’s trending on our network to engage IT buyers in market now and improve marketing and sales effectiveness. This report covers trending areas of interest across 240+ IT markets over the last 6 months (April 2023 – September 2023) in five (5) regions across the TechTarget & BrightTALK network: WW, NA, EMEA, APAC, LATAM.

    In this report you will find:


    • The top 20 broad technology markets driving the most activity in the past 6 months. Activity data can help show where audience research is growing or declining and therefore help reinforce which markets are on the rise or declining.


    • The top 25 granular topics growing the most across the TechTarget and BrightTALK network in the last 6 months. This gives insight into the content areas that are on the rise right now to leverage in your conversations.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Recent prominent multifactor authentication-based breaches and friction in the end-user authentication experience have reached the ears of app developers, IT, and cybersecurity leadership. Organizations are now searching for alternative authentication methods to address the risks and challenges of multifactor authentication (MFA) and password-based authentication. TechTarget’s Enterprise Strategy Group recently surveyed IT, cybersecurity, and application development professionals to gain insights into these trends.

    Learn more about these trends with the free infographic, Passwordless in the Enterprise: The Dirty Secrets of Antiquated Authentication.

  • As AI continues its meteoric rise into business and IT environments, organizations are rapidly assembling or accelerating strategies to support AI technologies across every applicable area. Unlike niche technologies that impact only certain processes or personnel, AI has wide-ranging potential to transform entire businesses, IT environments, and associated teams. In turn, AI strategies must be multi-pronged efforts that properly align business objectives with AI initiatives and expectations, which requires thorough participation from stakeholders across the organization. The underlying infrastructure and other supportive elements must be fully capable of supporting that tandem strategy.

    While many organizations are consistent in their efforts to build AI strategies, the components and direction of those strategies often vary. To assess the evolving AI landscape and the infrastructure that supports it, TechTarget’s Enterprise Strategy Group surveyed 375 data and IT professionals in North America (US and Canada) responsible for strategizing, evaluating, purchasing, and/or managing infrastructure specifically supporting AI initiatives for their organization. This study sought to answer the following questions:

    • What are the primary business objectives for implementing AI? How long does it take for organizations to start seeing value from AI initiatives?
    • What are the top challenges organizations encounter when implementing AI?
    • What individuals or teams influence decision making related to infrastructure used to support AI initiatives? Which of these has the most influence on final decisions?
    • How are organizations planning to address skills gaps related to the selection, implementation, and management of infrastructure supporting AI initiatives?
    • In which physical locations do organizations primarily deploy their AI infrastructure? What are the top factors that influence the choice of these locations? Are AI environments mostly centralized, mostly decentralized, or an even mix of both?
    • What capabilities of AI infrastructure are most important?
    • Are organizations using internal resources, third-party resources, or both to manage their AI infrastructure?
    • How important is sustainability and environmental responsibility when selecting AI infrastructure? How important is a vendor’s stance on these factors when making purchase decisions for AI infrastructure?
    • What types of data do organizations use to build and train AI models and algorithms? What steps do organizations take to ensure accuracy in the data used for building and training these models?
    • How do organizations handle the movement of the large amounts of data required to support AI initiatives? What challenges are involved with this process?
    • How are organizations using synthetic and third-party data to support AI model training?
    • How are organizations using generative AI (GenAI)? What challenges are they encountering?
    • To what extent are developers leveraging AI infrastructure resources? How do developers access these resources?
    • How do organizations measure the success and effectiveness of AI initiatives?
    • What is AI’s impact on employee productivity, processes, workflows, competitiveness, and other factors?

    Survey participants represented a wide range of industries, including financial, manufacturing, retail/wholesale, and healthcare, among others. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Women in Cybersecurity: Fleur Chapman

    For this episode, I had the opportunity to interview Fleur Chapman, chief operating officer for ITC Secure. Although she more recently joined the cybersecurity field, her analytical and project management skills, her background in economics, finance, and even speech and drama, have contributed to her current role running operations at a global cyber security services company. Be sure to watch the full video to hear the full interview. Below are some highlights and resources that she shared.

    Jump to video >>

    Using Her Analytics and Project Management Background

    Chapman came into cybersecurity when she was recruited to her role due to her experience as a technical project manager and consultant in previous roles. With her education in finance and econ, and a teacher’s diploma in speech and drama, she started her career in the public sector, working for the Ministry of Education in New Zealand.

    She described one of her roles for the Ministry of Education where she led the implementation of the first births data matching programme in NZ. Analytical by nature, she enjoyed interfacing with software developers, third-party vendors, internal and external stake holders, and realized her passion for quality and delivery.

    She earned IT service management certifications and ran projects overseeing operational teams, transactional data systems, delivering strategy and policy initiatives, transformational change, data privacy, identity and access management (IAM) solutions, and regulatory compliance programs.

    At one point, she managed the technical assurance program for Transport. She said it was a huge challenge, but she wasn’t satisfied. She wanted to go further than project or program management, and she wanted a more strategic role in the private sector.

    She was a contractor delivering managed service projects when she started working with ITC Secure. She worked on several projects, including implementing governance risk and compliance (GRC) for a large customer, and she worked on incident response services for a remote security operations center (SOC). This experience helped her move to an internal role as programme director, and then she was head of compliance. She also set up their risk and compliance function, GDPR, and governance model, and then become their Chief Operating Officer.

    Security Challenges and Goals

    Her role is broad – she helps global customers with risk and compliance, and she works on internal information security, legal and operations. Operations includes 24×7 managed services, the SOC, the network operations center (NOC), governance, and their platform team.

    Her biggest challenges: the skills shortage, evolving threat landscape, ever changing technologies, and thinking about third party risk.

    “If you miss something, you’re remembered for what you missed, not the constant good stuff that you’ve caught. You have to make sure you have robust processes in place, as well as everchanging technologies, keeping up to date with technological advancements, offering more to customers for less.”

    For third-party risk, she said they are constantly reassessing their third parties, direct and indirect suppliers. “We are judged by the suppliers we use and the threats we expose.”

    People, Process and Technology

    “We have to think about confidentiality, integrity and availability of the information – it’s vital. The key thing for our business is to prevent sensitive info from falling into the wrong hands.”

    So her background in the public sector with process and procedures is helpful with fundamentals around change management, incident management, access control, and authorization.

    “Procedures underpin how to provide your best services. We can guarantee services with confidentiality and integrity,” she said. “Humans make mistakes, so minimizing risk comes back to standardizing, documenting, managing and monitoring. It’s a constant challenge. There is no blame culture. People will make mistakes, but how do you identify them and learn. You can identify opportunities to improve services and operational security.”

    Advice and Resources

    Chapman has experience taking on roles to rescue failing projects due to constraints around timeframes, costs, or mistakes that people have made. Her advice:

    “Be confident in yourself and your ability. There is no challenge too great, never be afraid to ask for guidance from your leaders or your peers,” she said. “I’ve had situation where I had to tell myself to step back, take a breath, pause, and think before your next course of action, never respond straightaway to the email that angered you. Not to sweat the small stuff, know what to let go of, and what to push.”

    While this is useful advice earned from experience that you can’t learn from a book, Chapman mentioned that she is an avid reader for advice and inspiration. Two recent books she recommends:

    To listen to the full interview, click here.

    Be sure to also visit our Women in Cybersecurity page, where you can view past episodes and connect with us to hear more inspiring stories in future shows!

  • 6 Reasons Cisco Acquired Splunk