CISOs tend to spend the bulk of their cybersecurity technology budgets on endpoint, server, and network security controls. Endpoints are often mobile devices rather than Windows PCs while servers are virtual or cloud-based workloads. CISOs are focused on discovering and classifying their most sensitive data where it resides, who has access to it, etc. Infosec teams are also implementing granular access controls and increasing their analysis of user behavior for incident detection. As for the data itself, large organizations are moving toward end-to-end data encryption (i.e. encryption of all sensitive data at-rest and in-flight)”]
Source: https://www.csoonline.com/article/3051597/data-and-identity-two-new-security-perimeters.html

