Download Publication

Understanding Data Security Risk Survey Report 2025
Release Date: 02/26/2025
Updated On: 07/16/2025
- Many respondents (31%) lack tools to identify their riskiest data sources. Other respondents (12%) are unsure if they even have such tools. This lack of adequate tooling creates blind spots that hinder proactive risk management.
- Only a small number of management professionals (3%) are "not at all confident" in identifying high-risk data sources. However, more of their staff (10%) lack confidence. This lack of staff confidence indicates operational barriers that management’s strategic plans do not fully address.
- Over half of organizations (54%) use four or more tools to manage data risks. This creates inefficiencies and conflicts in information that hinder effective decision-making.
- Over half of respondents (59%) cite regulation and compliance as the primary drivers for risk reduction.
- Respondents rank identifying vulnerabilities (7.06) and prioritizing vulnerabilities (6.15) as their highest priorities. This far outpaces activities such as changing policies and controls (3.62).
Download this Resource
Acknowledgements

Hillary Baron
Senior Technical Director - Research, CSA

Josh Buker
Research Analyst, CSA

Ryan Gifford
Research Analyst, CSA

Sean Heide

Alex Kaluza
Research Analyst, CSA

John Yeoh
Global Vice President of Research, CSA
With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...
Marina Bregkou
Principal Research Analyst, Associate VP
Related Certificates & Training

Learn more