4 Lessons of Security Leaders for 2022 Posted on August 12, 2022August 12, 2022 by Knowledge Hub Media Download to discover the biggest concerns for security leaders in 2022, where they plan to focus their resources, and the impact of cloud adoption on their planning. Please complete the form below to access this research: Business E-mail Address First Name Last Name Company Job Title —Please choose an option—Area Security ManagerAssurance AnalystChief Information Security officerChief Privacy officerChief Security officerChief Technology officerCloud Infrastructure Security ConsultantCloud Security EngineerCloud System AdministratorComputer Network AdministratorComputer Network SpecialistCyber AnalystCyber Defense AnalystCyber Defense ConsultantCyber Defense SpecialistCyber EngineerCyber IR AnalystCyber Offering ManagerCyber Program Security AnalystCyber Security AdvisorCyber Security AnalystCyber Security ArchitectCyber Security Capability ArchitectCyber Security ConsultantCyber Security EngineerCyber Security ManagerCyber Security SIEM AdministratorCyber Security SpecialistCyber TechnologistCyber Threat AnalystCyber Threat Intelligence AnalystCybersecurity AnalystCybersecurity ConsultantCybersecurity DirectorCybersecurity EngineerCybersecurity Operations ManagerCybersecurity SpecialistData AnalystData EngineerData Security AnalystDeputy of IT ServicesDirector Information SecurityDirector Information Technology SecurityDirector IT Infrastructure and SecurityDirector of Cyber SecurityDirector of Global Cybersecurity OperationsDirector of Global IT ComplianceDirector of Global Safety and Security ProgramsDirector of Identity Security & Risk ManagementDirector of Information SecurityDirector of IT SecurityDirector of SecOpsDirector of Security and ComplianceDirector of Security OperationsEnterprise Cloud Solutions ArchitectFraud AnalystHead of Cyber SecurityHead of Cybersecurity OperationsHead of Information SecurityHead of Infrastructure and Cyber SecurityHead of IT SecurityHead of SecurityInformation Security AnalystInformation Security ArchitectInformation Security ConsultantInformation Security EngineerInformation Security ManagerInformation Security officerInformation Security SpecialistInformation Security SupervisorInformation System AnalystInformation System Security ManagerInformation System Security officerInformation Technology Security AnalystInformation Technology Security ArchitectInformation Technology Security ConsultantInformation Technology Security EngineerInformation Technology Security ManagerInformation Technology Security SpecialistIT Compliance officerIT Governance ManagerIT Information Security AnalystIT Infrastructure EngineerIT ManagerIT Operations SpecialistIT Security AdministratorIT Security AnalystIT Security DirectorIT Security EngineerIT Security ManagerIT Security SpecialistIT Systems SpecialistIT Systems SupervisorLead Security EngineerLead Security Information EngineerManager Information SecurityNetwork AdministratorNetwork AnalystNetwork EngineerNetwork Security AnalystNetwork Security EngineerNetwork Security ManagerNetwork Security SpecialistNetwork Support EngineerNetwork System EngineerNetworking SpecialistPrincipal ArchitectPrincipal Product ManagerPrincipal Software EngineerPrincipal Systems EngineerResource IT ManagerSecurity AdministratorSecurity AnalystSecurity ArchitectSecurity Assessment SpecialistSecurity Automation EngineerSecurity ConsultantSecurity Cyber Threat AnalystSecurity Data AnalystSecurity EngineerSecurity ManagerSecurity Operations Center AnalystSecurity Operations EngineerSecurity Operations LeadSecurity Operations ManagerSecurity Operations SpecialistSecurity Posture ManagerSecurity Software EngineerSecurity SpecialistSenior Information Security AnalystSenior Information Security EngineerSenior Information Technology Security officerSenior Manager Information SecuritySenior Network Security EngineerSenior Security AnalystSenior Security ArchitectSenior Security ConsultantSenior Security EngineerSenior Security SpecialistSOC AnalystSOC ManagerSystem AdministratorSystem Security AnalystSystem Security EngineerSystems AdministratorSystems Administrator SpecialistSystems ManagerThreat Detection ManagerThreat Operations AnalystVice President Cyber ServicesVice President Head of Data ScienceVice President Information SecurityVice President IT AuditorVice President of Cyber Defense StrategyVice President of OperationsVice President SecurityVice President Security & PrivacyVice President Security EngineeringOther Job Level —Please choose an option—AdminAnalystArchitectC-LevelConsultantDeveloperDirectorEngineerManagerPractioner+StaffUnknownVice President Job Role —Please choose an option—Application ManagementBig DataBusinessComplianceITMS ExchangeNetworkingSecurityVirtualizationWeb IntelligenceOther Company Size —Please choose an option—0 - 500500 - 15001500 - 50005000+ Industry —Please choose an option—Aerospace & DefenseAgricultureAutomotive & TransportBankingBeveragesBusiness ServicesCharitable OrganizationsChemicalsComputer HardwareComputer ServicesComputer SoftwareConstructionConsumer Products ManufacturersConsumer ServicesCultural InstitutionsEducationElectronicsEnergy & UtilitiesEntertainmentEnvironmental Services & EquipmentFinancial ServicesFoodFoundationsGovernmentHealth CareIndustrial ManufacturingInsuranceLeisureMediaMembership OrganizationsMetals & MiningPharmaceuticalsReal EstateRetailSecurity Products & ServicesTechnologyTelecommunications EquipmentTelecommunications ServicesTransportation ServicesOther Address City State/Province —Please choose an option—AlabamaAlaskaArizonaArkansasCaliforniaColoradoConnecticutDelawareDistrict of ColumbiaFloridaGeorgiaHawaiiIdahoIllinoisIndianaIowaKansasKentuckyLouisianaMaineMarylandMassachusettsMichiganMinnesotaMississippiMissouriMontanaNebraskaNevadaNew HampshireNew JerseyNew MexicoNew YorkNorth CarolinaNorth DakotaOhioOklahomaOregonPennsylvaniaRhode IslandSouth CarolinaSouth DakotaTennesseeTexasUtahVermontVirginiaWashingtonWest VirginiaWisconsinWyoming-AlbertaBritish ColumbiaManitobaNew BrunswickNewfoundland and LabradorNorthwest TerritoriesNova ScotiaNunavutOntarioPrince Edward IslandQuebecSaskatchewanYukon-Other / None of the Above Zip / Postal Code Country —Please choose an option—United StatesCanadaUnited KingdomAfghanistanAlbaniaAlgeriaAndorraAngolaAntigua & DepsArgentinaArmeniaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBhutanBoliviaBosnia HerzegovinaBotswanaBrazilBruneiBulgariaBurkinaBurundiCambodiaCameroonCape VerdeCentral African RepChadChileChinaColombiaComorosCongoCosta RicaCroatiaCubaCyprusCzech RepublicDenmarkDjiboutiDominicaDominican RepublicEast TimorEcuadorEgyptEl SalvadorEquatorial GuineaEritreaEstoniaEthiopiaFijiFinlandFranceGabonGambiaGeorgiaGermanyGhanaGreeceGrenadaGuatemalaGuineaGuinea-BissauGuyanaHaitiHondurasHong KongHungaryIcelandIndiaIndonesiaIranIraqIrelandIsraelItalyIvory CoastJamaicaJapanJordanKazakhstanKenyaKiribatiKorea NorthKorea SouthKosovoKuwaitKyrgyzstanLaosLatviaLebanonLesothoLiberiaLibyaLiechtensteinLithuaniaLuxembourgMacedoniaMadagascarMalawiMalaysiaMaldivesMaliMaltaMontenegroMarshall IslandsMauritaniaMauritiusMexicoMicronesiaMoldovaMonacoMongoliaMoroccoMozambiqueMyanmarNamibiaNauruNepalNetherlandsNew ZealandNicaraguaNigerNigeriaNorwayOmanPakistanPalauPanamaPapua New GuineaParaguayPeruPhilippinesPolandPortugalQatarRomaniaRussiaRwandaSaint Kitts & NevisSaint LuciaSaint Vincent & the GrenadinesSamoaSan MarinoSao Tome & PrincipeSaudi ArabiaSenegalSerbiaSeychellesSierra LeoneSingaporeSlovakiaSloveniaSolomon IslandsSomaliaSouth AfricaSpainSri LankaSudanSurinameSwazilandSwedenSwitzerlandSyriaTaiwanTajikistanTanzaniaThailandTogoTongaTrinidad & TobagoTunisiaTurkeyTurkmenistanTuvaluUgandaUkraineUnited Arab EmiratesUruguayUzbekistanVanuatuVatican CityVenezuelaVietnamYemenZambiaZimbabwe Business Phone Number Company Revenue —Please choose an option—0 - 49 Million50 - 99 Million100 - 249 Million250 - 499 Million500 - 999 Million1 - 5 Billion5+ Billion I consent to this information being transferred to the United States for processing by Knowledge Hub Media and Splunk Inc. I further agree to receive relevant email marketing communications from Splunk and other third parties/partners as described in the Splunk Privacy Policy. I may unsubscribe at any time. Your privacy is a top concern for us at Knowledge Hub Media. We’ll only use your personal information to provide you with the content, products and/or services you’ve requested from us. By entering your contact information and clicking on the “submit” button below, you are confirming that you have carefully read Knowledge Hub Media’s Terms of Use agreement, and Privacy Policy, and agree to be legally bound by all such terms. Yes, I agree to the Terms of Use Agreement. Yes, I agree to the Privacy Policy. The third party vendor sponsoring this content may wish to contact you regarding products and/or services as they relate to this white paper/research. Please check the appropriate boxes below, indicating the ways in which you would like to receive communication from our third party affiliates: Yes, I would like to receive communication by email.Yes, I would like to receive communication by telephone.Yes, I would like to receive communication by postal mail. Knowledge Hub Media would also like to keep in touch regarding related content, white papers, business/technology research and upcoming events in your area of expertise. Please check the appropriate boxes below to opt-in: Yes, Knowledge Hub Media may contact me via email.Yes, Knowledge Hub Media may contact me via telephone.Yes, Knowledge Hub Media may contact me via postal mail. You can easily change your communication and consent preferences at any time. Opt-out of receiving communication from Knowledge Hub Media and/or our third party affiliates by easily updating your personally identifiable data and contact preferences here: Update Communication Preferences Δ