About This Report

Register now to download CyberEdge’s seventh-annual Cyberthreat Defense Report – a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. Key insights from this year’s report include:

  • A record 81% of respondents’ networks were breached last year
  • A record 62% were comprised by ransomware and most paid the ransom
  • 13% of a typical enterprise IT budget is spent on security
  • Four in five security pros prefer products that feature ML and AI technology
  • Malware, spear-phishing, and ransomware cause the most headaches
  • ‘Detection of rogue insiders’ is rated as the most-challenging IT security function
  • ‘Lack of skilled personnel’ and ‘low security awareness’ are this year’s top inhibitors to IT security’s success
  • ‘Containerization / micro-virtualization’ is the most-wanted security technology for 2020


Click the infographic below to view and/or download the infographic from CyberEdge’s latest Cyberthreat Defense Report.


Survey Demographics

  • 1,200 security professionals
  • 500+ employees
  • 17 countries
  • 19 industries

Key Industries

  • Telecom
  • Manufacturing
  • Finance
  • Retail
  • Government
  • Health Care
  • Education

Countries Represented

United States
United Kingdom
Saudi Arabia
South Africa

Marketing Kit

By downloading any of the following marketing kit resources, you consent to abiding by the terms of CyberEdge’s acceptable use policy, as depicted in the next tab.

Report figures and table graphics
Report cover graphics
CyberEdge Group logos

Sample report cover graphic

Sample report figure

Acceptable Use Policy

CyberEdge Group, LLC (“CyberEdge”) encourages third-party organizations to incorporate textual and graphical elements of the Cyberthreat Defense Report into presentations, reports, website content, product collateral, and other marketing communications without seeking explicit written permission from CyberEdge, provided such organizations adhere to this acceptable use policy. The following rules apply to referencing textual and/or graphical elements of this report: 

Report distribution. Only CyberEdge and its authorized research sponsors are permitted to distribute this report for commercial purposes. This restriction does preclude reproduction of the report for internal uses, such as a training. 

Source citations. When citing a textual and/or graphical element from this report, you must incorporate the following statement into a corresponding footnote or other citation: “Source: 2020 Cyberthreat Defense Report, CyberEdge Group, LLC.” 

Quotes and excerpts. Quotes and excerpts extracted from this report must not be modified in any way. Rephrasing is not permitted. 

Figures and tables. Figures and tables extracted from this report must not be modified in any way. Artwork for figures and tables for the most recent Cyberthreat Defense Report can be found within the Marketing Kit tab on this web page.

No implied endorsements. CyberEdge does not endorse technology vendors. Cited CyberEdge content should never be used to imply favor from CyberEdge. 

If you have questions about this policy or would like to incorporate content from this report in a manner not addressed by this policy, submit an email to research@cyber-edge.com.

Get Your Copy Now!

First Name*

Last Name*


Job Title*





Organization Size*