Research Objectives
- Assess whether this threat vector is a significant concern for IT and security leaders.
- Determine where this expanding threat vector fits into modern security strategies and practice.
- Understand where and how organizations are currently securing this threat vector.
- Identify key challenges, objectives, and opportunities to mitigate risk.