Market Research Logo

IT Security: Leadership Guide — Countering Cyberespionage

IT Security: Leadership Guide — Countering Cyberespionage

This IDC study, written for CIOs and senior security executives, describes the forms and methods of cyberespionage, which has risen to become a critically important security mission. Cyberespionage is now a widespread, tangible, and growing threat; thousands of organizations have been penetrated. Confidential information has been extracted, threatening competitive viability. Countering cyberespionage has become one of the principal security tasks for organizations that must protect their "knowledge capital," the foundation for the conduct of business for all 21st century enterprises. This study describes common attacker targets and attack patterns and gives essential guidance for organizational protection.

"Dealing with cyberespionage will require commercial firms to depend on outside sources of intelligence that originate from federal and state government sources that hitherto did not assist in protecting corporate information security centers," says Paul Strassmann, adjunct analyst with IDC's Research Network. "Such information should be used to supplement advice received from commercial security services firms."

Please Note: Extended description available upon request.


IDC Opinion
In This Study
IT Executive Program Research Agenda
Situation Overview
Attacker Targets
Attack Patterns
Future Outlook
Essential Guidance
Immediately
In the Next 6–18 Months
Beyond the Next 18 Months
Learn More
Related Research
Synopsis
Figure: IT Executive Program Research Agenda Themes

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook

Share this report