Star 0

Abstract

This presentation analyzes results of more than 500 hours of interviews with leaders of information security at end user firms. What are their security budgets, and how are they changing? What vendors’ security products are performing and which are falling flat? What are the pain points security managers are reporting? What users are keeping them up at night?