You've requested...

Download this next:

BrightTALK Professional Engagement Survey 2022

BrightTALK wants to hear from you! We are conducting our annual survey and we’d love to learn about how you research industry topics and engage with content.

This survey digs into how you keep up-to-date on industry trends, the type of content that interests you, and how you currently consume digital content. It should only take about 5 minutes to complete. All data collected will be confidential and aggregated into a report to be available in a few months.

To show our appreciation for your time completing this survey, you'll be entered into a random drawing where we'll be giving away two (2) $100 Amazon gift cards.

These are also closely related to: "AT&T Business Continuity Survey: 2008"

  • BrightTALK Professional Engagement Survey 2022

    BrightTALK wants to hear from you! We are conducting our annual survey and we’d love to learn about how you research industry topics and engage with content.

    This survey digs into how you keep up-to-date on industry trends, the type of content that interests you, and how you currently consume digital content. It should only take about 5 minutes to complete. All data collected will be confidential and aggregated into a report to be available in a few months.

    To show our appreciation for your time completing this survey, you'll be entered into a random drawing where we'll be giving away two (2) $100 Amazon gift cards.

  • Escaping legacy – removing a major roadblock to a digital future

    According to a senior executive survey of leading financial, industrial, government and IT services organisations conducted by the University of Surrey in early 2016, some 40-50% of all IT assets are in urgent need of modernisation. In the case of the UK alone this represents a technology debt estimated to be in the tens of billions of pounds, somewhat equivalent to our national pensions deficit.

    The survey – co-authored by a former UK government CIO – suggests it is time for boards and corporate leaders to control their own destinies in the new digital economy, otherwise they are likely to find their destinies in the hands of someone else.

Find more content like what you just read:

  • The truth behind ESG programs

    According to a recent environmental social and governance (ESG) survey, there is little agreement among organizations as to the scope and vision of their ESG programs. Download this e-book to unlock key findings on the state of ESG and see how you can optimize your sustainability initiatives.

    Download

  • IT Priorities 2021 - European Budgets Infographic

    After surveying near 500 European IT sector professionals, the jury is out on what companies across the continent will be spending on in 2021. We dive into what spend will be easier to justify, if budgets for IT companies are on the rise or fall and what the 2021 project rankings are for most in the new year.

    Download

  • The gender pay gap

    This survey of 1,000 UK workers by CV-Library found that the pay gap is still a concern for professionals working in the UK.

    Download

  • Why integration and automation are two sides of the same coin

    For a while now, organisations have been approaching integration and automation separately. But according to Allan Teng, Workato's managing director, that should not be the case. In this interview, learn about Workato's integration-led approach towards automation and why it makes sense for organisations.

    Download

  • Enterprise Cloud Index Report Findings- Where do you stand on Hybrid Cloud

    Today, IT leaders struggle to manage the unrelenting complexity across their IT environments. And, according to a recent survey of 2,300 IT decision makers, 91% say hybrid cloud is the ideal IT model. But only 18% indicated they have that model today, the survey found. Join us for a lively discussion withGreg Smith, VP of Product Marketing at Nutanix, and Tapan Mehta, Global Head, Healthcare & Life Sciences, at Nutanix, to explore these and other findings, what’s holding companies back, and how they should best execute a hybrid cloud strategy for maximum results

    Download

  • Enterprise Cloud Index Report Findings: Where do you stand on Hybrid Cloud

    Today, IT leaders struggle to manage the unrelenting complexity across their IT environments. And, according to a recent survey of 2,300 IT decision makers, 91% say hybrid cloud is the ideal IT model. But only 18% indicated they have that model today, the survey found. Join us for a lively discussion withGreg Smith, VP of Product Marketing at Nutanix, and Tapan Mehta, Global Head, Healthcare & Life Sciences, at Nutanix, to explore these and other findings, what’s holding companies back, and how they should best execute a hybrid cloud strategy for maximum results

    Download

  • Revenue acceleration for digital leaders

    This report from KPMG identifies three priorities for organisations to embrace to drive better, quicker and more certain returns.

    Download

  • Lessons learned about Advanced Threat Protection

    According to recent surveys, the majority of IT Security Executives are concerned about protecting customer data from cybercriminals, but only 1 in 3 is concerned about the loss of their own company’s intellectual property. While understandable, such thinking can also be disastrous, for organizations small and large. In this webinar, Fortinet Chief Security Strategist Tyson MacAulay, discusses accounts of real-world attacks on unsuspecting businesses, targeted by sophisticated cybercriminals, as well as the measures they have taken to successfully defend themselves.

    Download

  • CIO and leadership survey 2017

    This survey of 80 CIOs and IT leaders by Coeus Consulting shows the technology and financial trends facing IT leaders and businesses.

    Download

  • Research Report: VMware Customers Weigh Alternatives

    The Broadcom-VMware merger has left many long-standing customers mulling a change in their hypervisors, according to Foundry and CIO.com. Their comprehensive survey of over 550 enterprise IT leaders provides an in-depth analysis of this landscape change. Download this brand new analyst research report and access key insights

    Download

  • Infographic: 2019 Europe IT Priorities - Business Applications

    In this infographic, we take a look at what the most popular business applications being deployed, the most popular deployment models and the most popular applications being deployed in SaaS mode. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.

    Download

  • July ezine: Getting storage right

    An issue looking at what products are in demand now in the storage world and what technologies are coming that need to be embraced by the channel.

    Download

  • RPA bots compared: Unattended vs. Attended vs. Hybrid

    Robotic process automation (RPA) bots can be divided into three modes -- unattended, attended and hybrid -- depending on how they operate within the enterprise. In this infographic, we compare the main similarities and differences between the three modes and examine how organizations can benefit from each of them.

    Download

  • Deloitte CIO survey 2016-2017 – UK Edition

    Download Deloitte's 2016-2021 CIO survey to discover how CIOs can deliver value and impact to their organisations.

    Download

  • IT Priorities 2018 - What's happening in security?

    In this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.

    Download

  • Discover the Process Enhancements of Workload Automation

    Enterprise workload automation software addresses the challenges brought on by job scheduling packages by offering critical process enhancements such as faster workload deployments, simpler programming, and fewer errors. Access our free whitepaper on workload automation by taking a quick survey to get started.

    Download

  • IT Priorities 2018 - What's happening in storage and cloud?

    In this video, Computer Weekly's editor-in-chief, Bryan Glick, explains what is happening in storage and cloud according to our 2018 IT Priorities survey, taken by over 250 IT decision makers and managers.

    Download

  • Top 14 ransomware targets in 2023 and beyond

    According to a 2022 global survey, two in three organizations suffered a ransomware incident in the previous 12 months, up 78% over the previous year. In this article, we take a look at the 14 top ransomware targets by sector, based on the Sophos survey and other data.

    Download

  • Collaboration software in the era of Gen-Z

    In this e-guide, learn how Microsoft is dominating the Software-as-a-Service space thanks to its strength in collaboration software and how the new generation of collaboration software could be stoking communication overload. Also, check out our chart comparing Slack, Microsoft Teams and Spark.

    Download

  • IT Priorities 2020: Middle East

    When Computer Weekly's IT priorities survey was carried out Covid-19 was not something IT leaders would consider when planning ahead. The results of the survey must be considered with this in mind. Discover here the results of Computer Weekly's IT priorities survey for 2020 in Middle East.

    Download

  • The Results are In: 7 Ways to Drive Customer Loyalty in Volatile Times

    Over half of consumers would stop buying from a company after multiple bad experiences. Is your company doing enough to drive loyalty? PwC’s Greta Lovenheim and Mark Baker reveal the results of PwC’s 2022 Customer Loyalty Survey alongside PwC’s 2023 Customer Loyalty Executive Survey. Weaving together the results of both surveys, Greta and Mark will break down the seven most effective strategies for driving customer loyalty through engagement and reveal how these align with an executive’s viewpoint. You’ll also take away: ● Tactics to increase your investments in customer segmentation ● Suggestions on how to develop a balanced approach to physical and digital customer engagement ● Methods to activate a data-driven personalization strategy that drives meaningful relationship building

    Download

  • Digital Disruption Index: Aligning strategy, workforce and technology

    Business leaders' confidence in the digital capabilities of new entrants to the workplace has improved in the past six months, according to the Digital Disruption Index by Deloitte.

    Download

  • Declutter your sales tools and applications

    New studies show that the abundance of sales tools that has negatively affected the output of sales departments. In this expert e-guide, learn why there can be too much of a good thing and why finding the right tool is just one part of making sure it fits with your sales strategy plan.

    Download

  • Global IT Priorities Report 2016

    Benchmark your IT spending plans with our in-depth study of IT spending priorities from around the world.

    Download

  • Best Practices During a Cyber Pandemic | A Discussion with Motorola’s CISO

    Experts in the security field have long predicted that a cyber pandemic could be the next global crisis. According to the ESI ThoughtLab survey of over 1,000 CISOs, cyber criminals and hackers are getting better at targeting and attacking companies. With cyber perpetrators using the COVID-19 pandemic to create havoc with vulnerable organizations, there's a question that should concern all security executives, "Is a cyber pandemic next?" Join Richard Rushing, CISO of Motorola Mobility and Edwin (Eddie) Doyle, Cyber Security Strategist from Check Point Software, as they uncover: • the key factors to withstand a major cyber attack • best practices to mitigate risks and loss • strategies to boost cost-benefit performance and ROI

    Download

  • Why Wireless WAN Works for Mission-Critical Federal Teleworkers

    The shift to remote work has enabled continuity of government during these challenging times but also has expanded the cybersecurity threat surface that federal IT and infosec professionals must monitor and protect. According to a recent SAIC survey, 82% of the federal executives polled expect telework to continue post pandemic. This means federal agencies must continue to build upon their Defense-in-Depth (DiD) security strategies by not only securing government-furnished equipment (GFE), but by gaining control, visibility, and resiliency in the remote network solutions they deploy.

    Download

  • Top 7 Software Supply Chain Security Concerns Revealed

    Nearly 9 in 10 companies have experienced software issues and exposures over the last 12 months. More than 6 in 10 companies believe their software supply chain security defenses are behind, resulting in 80% reporting their company is directly focusing on improving their supply chain security. These and many other illuminating insights were uncovered in the ReversingLabs Software Supply Chain Risk Survey, conducted by Dimensional Research as part of a global survey of over 300 security and IT professionals and executives. The survey contains critical findings that every cybersecurity expert should factor into their decision making for 2023 and beyond. ReversingLabs' Paul Roberts and Matt Stephenson present the findings of the ReversingLabs Software Supply Chain Risk Survey, where he will discuss the broader implications for companies's risk postures.

    Download

  • How do Iconic Business Models such as Airbnb Emerge?

    Brands such as Airbnb disrupt industries and change how consumers think about the market, according to this research from Cass Business School, City University London.

    Download

  • 2017 Nordics Salary Survey Infographic

    Most Nordic IT professionals are not looking for a new job, preferring progression with their current employer, according to a Computer Weekly survey.

    Download

  • 3 considerations for shifting to a SaaS business model

    SaaS is the approach of choice for business globally. Shifting your business to a SaaS model delivers benefits like increased reach and better CX. However, you need to prepare accordingly to realize these results. Access this blog to explore 3 considerations to keep in mind as you embark on your shift to a SaaS business model.

    Download

  • Ultimate guide to digital transformation for enterprise leaders

    This in-depth guide explains what digital transformation is, why it is important and how enterprises can successfully transition to this new business paradigm.

    Download

  • 2022 UKI IT Priorities Infographic: Pandemic Impact & Major Trends

    Each year, Computer Weekly asks IT decision-makers what projects they have planned for the coming year. The effects of the global Covid-19 pandemic were evident in the 2022 TechTarget/Computer Weekly IT Priorities survey. To find out more about the results of this survey download the infographic here.

    Download

  • Business analytics needs underpinnings of sound data and data-skilled humans

    Data analytics for the solution of first-order business problems is probably more important than ever. It is not new. Companies and organisations have been analysing computerised data for many decades. But all sorts of companies now pronounce themselves "data driven". Read more about business analytics trends in this exclusive e-guide.

    Download

  • Trending Challenges in Observability for Workload Automation

    Join this webinar with Dimensional Research analyst, David Gehringer, who shares results from his recent survey of 500+ executives and practitioners that identifies the challenges that organizations are facing in workload automation observability in today’s complex hybrid cloud environments. Jennifer Chisik, Head Automation Analytics & Intelligence Product Manager will join him to share details about the exciting latest release of AAI and the new Airflow Connector. Broadcom is collecting your personal data when you submit such information as part of the BrightTALK registration process. Your personal data is processed according to Broadcom's Privacy Policy: https://www.broadcom.com/company/legal/privacy/policy When you interact with Broadcom, this serves as your authorization to BrightTALK to provide your contact information to Broadcom in order for Broadcom to follow up on your interaction.

    Download

  • Trending Challenges in Observability for Workload Automation

    Join this webinar with Dimensional Research analyst, David Gehringer, who shares results from his recent survey of 500+ executives and practitioners that identifies the challenges that organizations are facing in workload automation observability in today’s complex hybrid cloud environments. Jennifer Chisik, Head Advanced Analytics & Intelligence Product Manager will join him to share details about the exciting latest release of AAI and the new Airflow Connector. Broadcom is collecting your personal data when you submit such information as part of the BrightTALK registration process. Your personal data is processed according to Broadcom's Privacy Policy: https://www.broadcom.com/company/legal/privacy/policy When you interact with Broadcom, this serves as your authorization to BrightTALK to provide your contact information to Broadcom in order for Broadcom to follow up on your interaction.

    Download

  • Cyber Notes Cast - Ransomware How to Start Fighting It

    Ransomware is malicious software used by hackers to encrypt and lock data on systems and devices, demanding a ransom payment to return access. Want to know how to deal with this menace? Listen this cyber notes cast episode to the end. In recent years, it has become more expensive and riskier for hackers to execute ransomware attacks, as IT managers have strategies in place to prevent these scams from succeeding. For this reason, malicious actors carry out attacks with higher demands. To give you a sense, the average payout for ransomware in Q4 2021 is up 130% to $322,168, according to Coverware data. But anyone who thinks that only large companies are targets of cybercriminals is wrong: according to recent information from the insurance company Coalition, there has been a 40% increase in successful attacks against small and medium-sized organizations, with consumer goods and healthcare being especially targeted. What’s more, according to a survey by Rapid7, the most frequently leaked data is financial (63%), followed by customer and patient data (48%). With that in mind, we have prepared this episode to show you how to combat ransomware and its consequences. To facilitate your listen, we have divided our content into the following topics: 1. What is ransomware? 2. How does a ransomware attack work? 3. What is the first action you should take in case of a ransomware attack? 4. What is the most common solution to a ransomware attack? 5. About senhasegura. 6. Conclusion. Enjoy this Cyber Notes Cast episode!

    Download

  • Global Risks Report 2017

    Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals

    Download

  • 3 trends driving cloud-native adoption

    62% of organizations say modernizing their cloud architecture is their top IT infrastructure priority over the next 12 months – according to a Business Technographics survey. This webinar dives into where cloud-based business modernization is trending and how you can unlock a smarter future with cloud-native + AI. Watch it here.

    Download

  • $60M Business Email Compromise Attacks - Week in Security

    A Luxembourg-based company lost $60 million in one of the largest-ever business email compromise (BEC) attacks. BEC scams, where #cybercriminals impersonate executives, caused $2.9 billion in losses according to the FBI’s 2023 report.

    Download

  • Going big: why companies need to focus on operational analytics

    This report from Capgemini Consulting shows how the search for competitive advantage has driven organisations to shift the focus of their analytical efforts to back office operations

    Download

  • CIOs and CISOs: Insights for a New Hybrid Workforce

    This in-depth research report examines how CIOs and CISOs are overcoming the challenges of the hybrid workforce, including securing remote access and more. Download the full report to discover effective techniques for transitioning to a Zero Trust strategy.

    Download

  • Preparing for the SEC's Climate Disclosure Ruling

    Workiva and PwC commissioned a survey of 300 executives at U.S.-based public companies, asking them pressing questions about a range of challenges and opportunities related to ESG reporting and strategy; specifically focusing on the SEC’s climate disclosure ruling. Join us for a 60-minute webinar as PwC and Workiva specialists uncover and discuss insights from the survey. We’ll take a look at how companies plan to proactively push ahead with SEC climate disclosure compliance, and how some still have work to do to be fully prepared to face challenges with technology, staffing, and investment. After this webinar you’ll be able to: -Identify technology solutions to help you prepare for the SEC climate disclosure -Apply key insights from the survey to your climate disclosure strategy -Compare your company’s climate disclosure readiness to the survey results -Summarize the challenges and barriers of SEC climate disclosure compliance

    Download

  • How doctors can create patient trust through the use of generative AI

    Providers and community health partners might be instrumental in building patient trust in generative AI and encouraging use.

    Download

  • On the Cybersecurity Forefront: Behavioral Analytics to the Rescue

    Most companies have hundreds of apps deployed in the cloud, and those numbers will only continue to increase. Securing a growing collection of cloud apps is one of the most challenging tasks for IT security teams, according to a new IDG survey. Behavioral analytics are one powerful set of tools being used to battle ever-changing cybersecurity threats in a mobile, cloud-dependent world. Join IDG’s Bob Bragdon and Forcepoint’s Jim Fulton as we explore the survey findings, including why behavioural analytics is growing in use and best practices for deploying such solutions from IT security practitioners.

    Download

  • On the Cybersecurity Forefront: Behavioural Analytics to the Rescue

    Most companies have hundreds of apps deployed in the cloud, and those numbers will only continue to increase. Securing a growing collection of cloud apps is one of the most challenging tasks for IT security teams, according to a new IDG survey. Behavioural analytics are one powerful set of tools being used to battle ever-changing cybersecurity threats in a mobile, cloud-dependent world. Join IDG’s Bob Bragdon and Forcepoint’s Jim Fulton as we explore the survey findings, including why behavioural analytics is growing in use, and best practices for deploying such solutions from IT security practitioners.

    Download

  • On the Cybersecurity Forefront - Behavioral Analytics to the Rescue

    Most companies have hundreds of apps deployed in the cloud, and those numbers will only continue to increase. Securing a growing collection of cloud apps is one of the most challenging tasks for IT security teams, according to a new IDG survey. Behavioral analytics are one powerful set of tools being used to battle ever-changing cybersecurity threats in a mobile, cloud-dependent world. Join IDG’s Bob Bragdon and Forcepoint’s Jim Fulton as we explore the survey findings, including why behavioural analytics is growing in use and best practices for deploying such solutions from IT security practitioners.

    Download

  • AI by the Numbers: See How You Stack Up in the Race to Generative AI

    With all the buzz around Generative AI, the race is on. Dataiku and Databricks surveyed 400 senior AI professionals in large companies around the world, and our data shows that “AI Pioneers” are pulling away from the pack in their applications and ability to execute on AI. This gap is slated to widen with the advent of Generative AI. With this conversation find out how you stack up, what AI Pioneers are doing differently than the rest, and — if you’re not executing on AI at scale — how to catch up.

    Download