Hiring more IT/Cyber risk/GRC professionals
Hiring more IT/Cyber risk/GRC professionals Definitely
Hiring more IT/Cyber risk/GRC professionals Most likely
Hiring more IT/Cyber risk/GRC professionals Maybe/Not sure
Hiring more IT/Cyber risk/GRC professionals Unlikely
Hiring more IT/Cyber risk/GRC professionals Definitely Not
Improving real-time insights and analytics on cyber risks and compliance posture
Improving real-time insights and analytics on cyber risks and compliance posture Definitely
Improving real-time insights and analytics on cyber risks and compliance posture Most likely
Improving real-time insights and analytics on cyber risks and compliance posture Maybe/Not sure
Improving real-time insights and analytics on cyber risks and compliance posture Unlikely
Improving real-time insights and analytics on cyber risks and compliance posture Definitely Not
Quantifying cyber risks in monetary terms
Quantifying cyber risks in monetary terms Definitely
Quantifying cyber risks in monetary terms Most likely
Quantifying cyber risks in monetary terms Maybe/Not sure
Quantifying cyber risks in monetary terms Unlikely
Quantifying cyber risks in monetary terms Definitely Not
Automating processes and workflows
Automating processes and workflows Definitely
Automating processes and workflows Most likely
Automating processes and workflows Maybe/Not sure
Automating processes and workflows Unlikely
Automating processes and workflows Definitely Not
Harmonizing & rationalizing controls across standards and compliance requirements
Harmonizing & rationalizing controls across standards and compliance requirements Definitely
Harmonizing & rationalizing controls across standards and compliance requirements Most likely
Harmonizing & rationalizing controls across standards and compliance requirements Maybe/Not sure
Harmonizing & rationalizing controls across standards and compliance requirements Unlikely
Harmonizing & rationalizing controls across standards and compliance requirements Definitely Not
Continuous monitoring of IT controls using automation
Continuous monitoring of IT controls using automation Definitely
Continuous monitoring of IT controls using automation Most likely
Continuous monitoring of IT controls using automation Maybe/Not sure
Continuous monitoring of IT controls using automation Unlikely
Continuous monitoring of IT controls using automation Definitely Not
Consolidating multiple cyber risk tools/software
Consolidating multiple cyber risk tools/software Definitely
Consolidating multiple cyber risk tools/software Most likely
Consolidating multiple cyber risk tools/software Maybe/Not sure
Consolidating multiple cyber risk tools/software Unlikely
Consolidating multiple cyber risk tools/software Definitely Not
Improve employee awareness on cybersecurity
Improve employee awareness on cybersecurity Definitely
Improve employee awareness on cybersecurity Most likely
Improve employee awareness on cybersecurity Maybe/Not sure
Improve employee awareness on cybersecurity Unlikely
Improve employee awareness on cybersecurity Definitely Not