You are on page 1of 11

Sponsored by:

IT Security in the US Federal Government


A Survey of IT and Security Professionals
July 2015

Sponsored by:

Executive Summary
IT professionals in the federal government face a
monumental task securing extremely sensitive
information while allowing employees to be productive all within an environment of limited spending.
This research report, based on an online survey of
150 IT and security professionals in the federal
government, examines how these conflicting goals are
being managed. It also examines how security
attitudes and experiences among US federal IT
professionals compare to those in
other industries.
.
2

METHODOLOGY AND
PARTICIPANTS
3

Sponsored by:

Goals and Methodology


Research Goal

Methodology

Participants

The primary research goal was to capture hard data


on experiences with and attitudes towards IT
security among IT professionals in the federal
government.
A series of online surveys were fielded to
independent sources of IT professionals. This was
part of an overall survey of business and IT
professionals. Some questions were asked of all
participants and some were asked only of those
working in the federal government.
A total of 150 IT professionals completed the survey.
All participants worked for the United States federal
government in organizations with more than 1000
employees. Certain answers are compared to the
general survey taken by 310 IT professionals with
responsibility for security working in other industries.
4

Sponsored by:

Participants Represented US Federal IT


# of employees

Level
Administrator
24%

More than
5,000
55%

1,000 to 5,000
45%

CIO, VP or other
IT execu1ve
39%

IT team
manager
37%

Role with Security


IT security is a
part of my job
58%

IT security is my
en1re job
42%

Sponsored by:

FEDERAL GOVERNMENT
SPECIFIC QUESTIONS
6

Sponsored by:

Half of federal organizations


are using NIST
Is your organization utilizing the NIST Cybersecurity Framework?

No
18%

Yes, fully
53%

Yes, par1ally
29%

Sponsored by:

NIST used primarily as a foundation for


cybersecurity roadmap
Why is your organization utilizing NIST?
n = using NIST

74%

Used as founda1on for our cybersecurity roadmap

68%

Improve organiza1onal security

39%

Create a uniform approach to discussing security

Other typically was that


NIST was required.

7%

Other
0%

10% 20% 30% 40% 50% 60% 70% 80%

Sponsored by:

Federal government feels confident that


they have the resources needed
In your opinion, has your organization been provided with the
necessary resources and guidance to defend against inside threats?

No
16%

Yes
84%

Sponsored by:

For more information


About Dimensional Research
Dimensional Research provides practical marketing research to help
technology companies make smarter business decisions. Our researchers
are experts in technology and understand how corporate IT organizations
operate. Our qualitative research services deliver a clear understanding of
customer and market dynamics.
For more information, visit www.dimensionalresearch.com.

About Dell Software


Dell Software helps customers unlock greater potential through the power
of technologydelivering scalable, affordable and simple-to-use solutions
that simplify IT and mitigate risk. The Dell Software portfolio addresses five
key areas of customer needs: data center and cloud management,
information management, mobile workforce management, security and data
protection. This software, when combined with Dell hardware and services,
drives unmatched efficiency and productivity to accelerate business results.
For more information, visit www.dellsoftware.com.
10

Sponsored by:

Dimensional Research:
Market research from technology professionals

11

You might also like