Information Security Survey Question Title * 1. What is the size of your organization? < 1000 FTE 1001 – 5000 FTE 5001 – 10000 FTE 10001 – 50000 FTE > 50000 FTE Question Title * 2. What is your industry? Construction Consumer Products Education Financial Services/Banking Government Healthcare Provider Insurance Manufacturing Mining Non-profit Oil and Gas Pharmaceuticals Retail Utilities Question Title * 3. Which of the following best describes your role in your organization? Executive Manager Line-level Employee Question Title * 4. Which of the following best describes your function in your organization? Information Security Legal Records Management Non-Information-Security IT Line of Business Question Title * 5. Where does Information Security "live" in the organization? IT Risk Compliance Legal Standalone Department/Division Other Question Title * 6. What level of effort has your organization spent over the last 3 years on the “Data Theft” step in the kill chain? None 1 to 25 percent of our total information security efforts 26 to 49 percent of our total information security efforts 50 to 74 percent of our total information security efforts Greater than 75 percent of our total information security efforts Question Title * 7. What level of effort is your organization planning to spend over the next 3 years on the “Data Theft” step in the kill chain? None 1 to 25 percent of our total information security budget 26 to 49 percent of our total information security budget 50 to 74 percent of our total information security budget Greater than 75 percent of our total information security budget Question Title * 8. How is your organization leveraging technology to address the “Data Theft” step in the kill chain? No system(s) in place System(s) in place, but not being effectively leveraged System(s) in place, being somewhat effectively leveraged System(s) in place, being effectively leveraged System(s) in place, being very effectively leveraged Question Title * 9. How closely does Information Security at your organization work with information management functions such as Records Management, Legal, Privacy, etc.? Not at all; we have little to no contact or coordination Somewhat; we have infrequent, mostly project-driven interactions for specific initiatives Moderate; we interact on projects and also in general, but in a more ad hoc way Closely; we interact in regular, scheduled ways to ensure alignment in general, as well as at the project level Question Title * 10. Which of the following best describes the relationship between Information Security and information management at your organization? The functions each report up to different departments, with no dotted-line connection The functions each report up to different departments, with moderate dotted-line connections The functions both report up to the same department Question Title * 11. Which of the following best describes the vision for the relationship between the Information Security and Information management functions at your organization? The relationship will remain the same over the next 3 years They will become more closely aligned over the next 3 years They will become more independent over the next 3 years Question Title * 12. Please provide your email address if you would like to receive a copy of the survey results as well as Doculabs' analysis of them. Done