What would cybersecurity look like if it was invented today?
Would it look anything like the cybersecurity you have now? It probably wouldn’t. And for good reason. You would build something that understood the way data is shared and how people interact with it. Something that recognized we’re living in a world without boundaries. You would start fresh and ask yourself different questions.
Take our brief survey and share your vision for rethinking cybersecurity.
Take our brief survey to join the conversation and help rethink cybersecurity.
3 minutes
Start |
Start |
3 minutes

Previous
Imagine rebuilding your organization's cybersecurity from the ground up. Where would this ideal cyber security strategy be positioned?
3/4
What innovative security technologies will be most valuable to your organization in three to five years?
1/4
Which of the following will pose the greatest overall threat to your organization’s cybersecurity in three to five years?
2/4
If you had the chance to re-think and re-build your cybersecurity from the ground up today, with no budget or talent restrictions, what would it look like?
4/4
Get the results
Get the results
Next
Next
Next
Next
Next
Next
Please select one from each row
Please select up to two
Behavior-based policy enforcement
Biometric authentication
Data masking/ tokenization/ format-preserving encryption
Artificial intelligence
Integrated suites/platforms of broad security capability
Don’t know / not applicable
Malware (including phishing)
Identity theft (including stolen credentials)
Accidental user error
Malicious insider
Poor patching
Denial of Service (DDoS)
Poor system administration (including cloud misconfigurations)
Don't know / not applicable
Please select up to two
Behavior-based policy enforcement
Biometric authentication
Data masking/ tokenization/ format-preserving encryption
Artificial intelligence
Integrated suites/platforms of broad security capability
Don't know / not applicable
Malware (including phishing)
Identity theft (including stolen credentials)
Accidental user error
Malicious insider
Poor patching
Denial of Service (DDoS)
Poor system administration (including cloud misconfigurations)
Don't know / not applicable
Reactive and incident-driven
Threat-centric (focused on walls and barriers)
Segmented (owned by departments or regions and controlled separately)
Rule-based (focued on rules and policies by department)
This is much more important
This is somewhat more important
These are equally important
This is somewhat more important
This is much more important
Proactive and risk-focused
Behavior-centric (focused on people and their habits)
Integrated (owned by entire organization and viewed holistically)
Risk adaptive (i.e. drive security at the user level based on risk exposure)
Behavior-based policy enforcement
Biometric authentication
Data masking/ tokenization/ format-preserving encryption
Artificial intelligence
Integrated suites/platforms of broad security capability
Don’t know / not applicable
Malware (including phishing)
Identity theft (including stolen credentials)
Accidental user error
Malicious insider
Poor patching
Denial of Service (DDoS)
Poor system administration (including cloud misconfigurations)
Don't know / not applicable
Thank you for sharing your thoughts on the future of cybersecurity. We partnered with the Wall Street Journal to ask these same questions and much more in our comprehensive cybersecurity survey of global CEOs and CISOs.
Sign-up and we'll send you the in-depth report when it's ready in January.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time at Manage Subscriptions.
Sign up to get the results
restart
Thank you for sharing your views!
At Forcepoint, we believe the future of cybersecurity is human-centric, and its humans like you that are helping us redefine data security for the future.
Curious what your peers had to say? We partnered with the Wall Street Journal to ask the same questions — and many more — in our comprehensive cybersecurity survey of global CEOs and CISOs.
The results will be released in an in-depth report in January.
