Screen Reader Mode Icon


Add your voice to guide our path.


Highlights from this research will be shared when completed, on The Security Bulldog, emailed to respondents, and on social media.

Add your thoughts to this important research now – it is only seven questions long - no essay questions, lol - and takes just 3 minutes to complete. Your answers will be kept confidential, and the results will be presented in aggregate form only.

If you have any questions about this survey, please contact jeff@securitybulldog.com.

Thank you for your help with this important research.

Question Title

* 1. Which of the following best describes your current occupation?

Question Title

* 2. What is your work title?

Question Title

* 3. What percentage of your time is spent, per week, searching for cybersecurity information (data, videos, best practices, certifications, etc.) on the Internet?

0 50 100
Clear
i We adjusted the number you entered based on the slider’s scale.

Question Title

* 4. When you are searching for cybersecurity information on the Internet, what questions are you asking?

Question Title

* 5. Some possible threat scenarios and types of attacks are listed below. In the worst case, how would you classify the extent of damage in the event of each cyber incident?

  Insignificant Minor Critical Catastrophic
Industrial espionage
Access to data by government intelligence agencies
Financially driven cyberattacks (e.g., ransomware, crypto-mining)
Risk potential due to negligence on the part of internal employees
Data theft / sabotage by own (current or former) employees
Theft of customers` personally identifiable information / theft of digital identities / theft of access data
Attacks on the software supply chain
Attacks from the supply chain / from partners

Question Title

* 6. In your opinion, what is the probability of each of the following cyber incidents occurring in your company or organization within the next 12 months?

  Very unlikely unlikely likely very likely don´t know
Industrial espionage
Access to data by government intelligence agencies
Financially driven cyberattacks (e.g., ransomware, crypto-mining).
Risk potential due to negligence on the part of internal employees
Data theft / sabotage by own (former) employees
Theft of digital identities / theft of access data
Attacks on the supply chain
Attacks from the supply chain / from partners

Question Title

* 7. Which of the following statements best describes the situation at your company, organization, or agency?

Question Title

* 8. If you want us to send the results of the survey directly to you, please fill out this form. It is not required to do so.

0 of 8 answered
 

T