What cyber threat are you most concerned about?
Insider threats – rogue admins24%
Encrypting my data39%
Deleting my backup copies13%
Resident malware18%
Data theft – data exfiltration5%
Other
213 PARTICIPANTS
2.7k views1 Comment
Sort by:
Content you might like
Proven outcomes – Documented success stories and measurable KPIs35%
Implementation confidence – Detailed plan, risk mitigation, and resource readiness48%
Total cost – Clear TCO, price protections, and exit terms39%
Innovation & future readiness – Ability to scale, adapt, and support emerging needs13%
Vendor relationship strength – Cultural fit, governance model, and executive commitment12%
There has been an upswell in demand for the use of MCP servers for our development community. What security criteria and considerations do you use for performing a security review, hardening and approval process?
What are your top cloud initiatives?
Migrating more workloads to cloud23%
Optimize cost of the existing cloud usage52%
Refactoring to microservices/containers14%
Automating policies for security/governance6%
Improving cloud cost/usage reporting3%
Social engineering