Statements from the following verified business professionals were used to create this chart:
Title |
Company Size |
Industry |
Response |
|
IT Manager |
Large Enterprise |
Food |
- Annual security posture assessment and risk review
- Penetration testing (external, cloud, wireless, social engineering/phishing, physical)
- Boundary Control
- Following a security framework (such as CIS, NIST 800-171, or ISO 27001)
- Secure identity and access
- Endpoint Protection with Next Gen AV
|
|
Chief Information Security Officer |
Medium Enterprise |
Financial Services |
- Annual security posture assessment and risk review
- Penetration testing (external, cloud, wireless, social engineering/phishing, physical)
- Boundary Control
- Security Awareness Training
- Following a security framework (such as CIS, NIST 800-171, or ISO 27001)
- Secure identity and access
- Security analytics and threat intelligence
- Endpoint Protection with Next Gen AV
- Incident response plan
- Tabletop exercises
|
|
IT Director |
Small Business |
Transportation Services |
- Annual security posture assessment and risk review
- Penetration testing (external, cloud, wireless, social engineering/phishing, physical)
- Security Awareness Training
- Following a security framework (such as CIS, NIST 800-171, or ISO 27001)
- Security analytics and threat intelligence
- Endpoint Protection with Next Gen AV
- Incident response plan
|
|
Chief Information Officer |
Medium Enterprise |
Agriculture |
- Annual security posture assessment and risk review
- Penetration testing (external, cloud, wireless, social engineering/phishing, physical)
- Security Awareness Training
- Secure identity and access
- Security analytics and threat intelligence
- Incident response plan
|
|
IT Manager |
Medium Enterprise |
Financial Services |
- Boundary Control
- Following a security framework (such as CIS, NIST 800-171, or ISO 27001)
- Secure identity and access
- Security analytics and threat intelligence
- Incident response plan
|
|
Chief Information Officer |
Educational Institution |
Educational Institution |
- Annual security posture assessment and risk review
- Penetration testing (external, cloud, wireless, social engineering/phishing, physical)
- Boundary Control
- Security Awareness Training
- Incident response plan
|
|
Chief Information Officer |
Non-profit |
Non-profit |
- Annual security posture assessment and risk review
- Penetration testing (external, cloud, wireless, social engineering/phishing, physical)
- Following a security framework (such as CIS, NIST 800-171, or ISO 27001)
- Secure identity and access
|
|
Network Administrator |
Medium Enterprise |
Professional Services |
- Annual security posture assessment and risk review
|
|
IT Director |
Medium Enterprise |
Construction |
- Annual security posture assessment and risk review
- Penetration testing (external, cloud, wireless, social engineering/phishing, physical)
|