top of page
Aquila I Cybersecurity Landscape 2025 (2).png
AQ_white_BG_center - Copy.png

Aquila I Cybersecurity Landscape 2025

Join us in shaping the cybersecurity landscape.

Take Aquila I’s 2025 Cybersecurity Survey and contribute your insights to an exclusive industry report.

Cybersecurity Trends Survey

Thank you for participating in our survey. Your insights will help us understand the evolving needs and priorities in the cybersecurity landscape for 2025. Please take a few minutes to share your thoughts.

How is your cybersecurity strategy primarily driven?
What percentage of your overall IT budget is allocated to cybersecurity in 2025?
How do you prioritize security investments within your budget?
What is your approach to managing security budgets?
What are the most common vectors of digital risk in your organization? (Select up to 2 options)
What types of third-party risks are you most concerned about?
How frequently do you conduct infrastructure monitoring for potential threats?
What are your top priorities for infrastructure monitoring in 2025?
How frequently do you scan your critical infrastructure?
How do you assess the effectiveness of your infrastructure monitoring tools?
What is your strategy for threat modeling in infrastructure assessments?
How often do you perform infrastructure assessments through threat modeling?
How do you manage your critical data? (Select up to 2 options)
How do you ensure compliance with evolving regulatory requirements?
What tools do you use for compliance management?
How do you handle compliance management for multiple regulatory frameworks?
Which media do you prefer for sharing cybersecurity messages in your organization? (Select up to 2 options)
Which of the following best describes your approach to employee simulation assessments and training?
What methods do you use to train employees on cybersecurity?
How do you measure the effectiveness of your employee training programs?
How do you prevent insider threats in your organization? (Select up to 2 options)
What is your primary method for managing third-party risks?
What are your key metrics for evaluating third-party risk management effectiveness?
How do you integrate threat intelligence into your security operations?
What’s your business use of AI?
Describe how your organization leverages AI (e.g., threat detection, automation, predictive analysis).

Thanks for submitting your response!

bottom of page