Skip to main content

Report

The State of Cyber Resilience

New cybersecurity report by Marsh and Microsoft identifies eight key cyber risk trends organizations should align on and prioritize for 2022 and beyond.

With nearly 75% of organizations experiencing at least one cyberattack, cyber resilience is now more important than ever.

But which strategies are working? How should you prepare? Which colleagues should be involved in the decision-making process? Where should you invest?  

Marsh and Microsoft asked hundreds of CEOs and risk, finance, IT, and cybersecurity leaders from around the globe to find out. Download the State of Cyber Resilience Report to get the latest statistics, trends, and insights to guide your cyber strategies for 2022 and beyond.

Unlike most other cyber threat reports, you will gain a cross-functional view of cyber risk management that takes into account the different roles and responsibilities across the enterprise. So you and your organization can better collaborate to build cyber resilience.

What you’ll learn in the cyber risk report:

  • What are the key cyber trends every leader should know?
    Gain a deeper understanding of the cyber developments and cyberattacks impacting firms in 2022 and how to plan for them now — and for the future. 
  • Which cyber risk strategies are leaders prioritizing?
    Find out how firms are protecting from and responding to constantly evolving cyber threats, and why enterprise-wide alignment is critical.
  • Where are leaders investing in cyber?
    Explore the different ways firms are planning to increase and maximize the efficiency of cyber investments. 
  • How do functional leaders view their role in cyber?
    Discover how organizational leaders view their role in cyber, how they can best work across the enterprise, and why cyber risk management should be a shared responsibility.
  • What action should leaders take? 
    Come away with a deeper understanding of the steps your organization can take now to build cyber resilience and have confidence in your cybersecurity posture.