In 2022, a survey conducted found that around 47 percent of the businesses across Africa reported that their organizations had included the information security function within the broader scope of IT security. Moreover, 34 percent of respondents stated that the firm's cyber and information security function operated independently and reported directly to the leadership team, while their risk management and internal audit teams provided unbiased supervision.
What is your organization’s approach to implementing independent information security oversight?
Respondents were from the following business sectors: financial services, government/ public sector, manufacturing, energy and natural resources, Information & communication technology (ICT), and others.
Possible answers: "We have a fully independent cyber and information security function reporting directly to the organizational leadership. Risk management and internal audit provide independent oversight."; "Information security is incorporated into IT security and reports to the CIO or equivalent. Risk management and/or internal audit provide(s) independent oversight"; "Information security is incorporated into IT security and reports to the CIO or equivalent. Risk management and/or internal audit provide(s) independent oversight"; "We have no formal information security function, and IT security efforts are fully managed out of IT with little to no independent oversight"; "Other formal structures are in place."
Profit from the additional features of your individual account
Currently, you are using a shared account. To use individual functions (e.g., mark statistics as favourites, set
statistic alerts) please log in with your personal account.
If you are an admin, please authenticate by logging in again.
Learn more about how Statista can support your business.
KPMG International. (September 13, 2022). What is your organization’s approach to implementing independent information security oversight? [Graph]. In Statista. Retrieved November 13, 2024, from https://www-statista-com.ezproxy.canberra.edu.au/statistics/1370169/implementation-of-independent-it-security-among-firms-in-africa/
KPMG International. "What is your organization’s approach to implementing independent information security oversight?." Chart. September 13, 2022. Statista. Accessed November 13, 2024. https://www-statista-com.ezproxy.canberra.edu.au/statistics/1370169/implementation-of-independent-it-security-among-firms-in-africa/
KPMG International. (2022). What is your organization’s approach to implementing independent information security oversight?. Statista. Statista Inc.. Accessed: November 13, 2024. https://www-statista-com.ezproxy.canberra.edu.au/statistics/1370169/implementation-of-independent-it-security-among-firms-in-africa/
KPMG International. "What Is Your Organization’s Approach to Implementing Independent Information Security Oversight?." Statista, Statista Inc., 13 Sep 2022, https://www-statista-com.ezproxy.canberra.edu.au/statistics/1370169/implementation-of-independent-it-security-among-firms-in-africa/
KPMG International, What is your organization’s approach to implementing independent information security oversight? Statista, https://www-statista-com.ezproxy.canberra.edu.au/statistics/1370169/implementation-of-independent-it-security-among-firms-in-africa/ (last visited November 13, 2024)
What is your organization’s approach to implementing independent information security oversight? [Graph], KPMG International, September 13, 2022. [Online]. Available: https://www-statista-com.ezproxy.canberra.edu.au/statistics/1370169/implementation-of-independent-it-security-among-firms-in-africa/