Download PDF version Contact company

The Entrust Cybersecurity Institute released survey findings on the state of Zero Trust adoption and encryption in 2024.

Entrust’s eighteenth annual study conducted by the Ponemon Institute reveals that the risk of a cyber breach is the number one global driver for Zero Trust strategy implementation. 

Zero Trust security practice

With the rise of costly breaches and AI-generated deepfakes, synthetic identity fraud, ransomware gangs, and cyber warfare, the threat landscape is intensifying at an alarming rate," said Samantha Mabey, Director of Solutions Marketing at Entrust.

This means that implementing a Zero Trust security practice is an urgent business imperative and the security of organisations' and their customers’ data, networks, and identities depends on it.

2024 State of Zero Trust & Encryption Study

41% of respondents prioritise security investments to reduce the risks of data breaches or other security incidents

The 2024 State of Zero Trust & Encryption Study surveyed 4,052 IT and IT security practitioners across the U.S., UK, Canada, Germany, Australia and New Zealand, Japan, Singapore, and the Middle East. The survey shows that people are more motivated to invest in security to prevent data breaches, rather than just to follow regulations.

While in the past, compliance was the main reason for security investments, 41% of respondents prioritise security investments to reduce the risks of data breaches or other security incidents. This marks a significant change in attitudes toward why organisations invest in security.

Key findings 

  • Rising rates of cyber breaches are driving Zero Trust adoption: Two-thirds of organisations list cyber-risk concerns as the most important drivers for implementing a Zero Trust strategy. The pattern is even more pronounced in the U.S., with 50% of organisations citing cyber breach risk and 29% reporting the expanding attack surface for a combined total of 79%
  • Senior leadership support for Zero Trust is increasing, but skills and budget aren’t keeping pace: Despite 60% of organisations reporting significant senior leadership support for Zero Trust, a lack of skills and budget are still cited as the biggest roadblocks to implementing these frameworks, highlighting a discrepancy between support and resource allocation.
  • Zero Trust adoption is exploding, but lagging in the West: While 62% of organisations have begun their own Zero Trust journey, only 48% of U.S. organisations have, raising a concern that Western entities know they have a problem but are unable to adopt Zero Trust, leaving them vulnerable to cyber threats.
  • Good cyber hygiene alone can’t safeguard against all threats: 46% of respondents cited hackers exposing sensitive or confidential data as their top security concern, followed by system or process malfunctions and unmanaged certificates. For the first time in the past eight years, organisations did not rank employee mistakes as a top security threat.
  • People, skills, and ownership remain painful hurdles for CISOs to achieve effective credential management: 50% of respondents identified a shortage of skilled personnel, 47% highlighted the absence of clear ownership, and 46% pointed to inadequate staffing as the primary reasons for the challenges associated with credential management.
Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?