20230130-ISACA Privacy in Practice 2023 Report 1675062548
20230130-ISACA Privacy in Practice 2023 Report 1675062548
CONTENTS
3 Abstract
4 Executive Summary
4 / Key Findings
4 Survey Methodology
6 Privacy Staffing
9 / Skill Gaps
10 Privacy Budgets
18 Privacy by Design
20 Conclusion
21 Acknowledgments
ABSTRACT
Privacy in Practice 2023 reports the results of the ISACA® global State of Privacy Survey,
conducted in the fourth quarter of 2022. This report focuses on privacy staffing, budgets,
program trends, awareness training and breaches, and privacy by design. Some survey
findings are consistent with last year’s survey results, while others indicate relief from
some of the privacy challenges identified last year.
Executive Summary
Privacy in Practice 2023 explores trends in privacy staffing, • Experience is considered the most important factor in
budgets, programs, awareness training and privacy by determining if a privacy-position candidate is qualified.
design, based on the results of the ISACA global State of
• The demand for privacy professionals is expected
Privacy Survey, conducted in the fourth quarter of 2022.
to increase over the next year for technical privacy
Strong enterprise privacy practices are critical in a rapidly professionals and legal/compliance privacy
evolving privacy regulatory landscape. Privacy violations professionals.
erode customer trust and increasingly result in enterprise • Privacy teams interact most frequently with
reputation damage and significant fines. Enterprise privacy information security, legal/compliance and risk
programs that aim to protect data subjects and gain their management teams.
trust set their enterprises apart from competitors. This
• Enterprises that practice privacy by design are more
white paper explores the state of organizational privacy.
likely to:
The following are key survey findings: • Believe that their board of directors appropriately
prioritizes enterprise privacy
• Technical privacy roles are slightly more likely to be
somewhat or significantly understaffed than legal/ • Require documented privacy policies, procedures
are impacted by staff shortages. • Use more privacy controls overall than are legally
• Technical privacy roles are significantly more likely required
than legal/compliance privacy roles to have increased • Feel their privacy budget is appropriately funded
demand in the next year.
Survey Methodology
In the fourth quarter of 2022, ISACA sent survey The most commonly held certification is the CISM
invitations globally to approximately 46,000 ISACA certification: Seventy-five percent of respondents hold
constituents who hold the ISACA CSX Cybersecurity the CISM certification, 42 percent hold the Certified
Practitioner Certification™ (CSX-P™), Certified Information Systems Auditor® (CISA®) certification
Information Security Manager® (CISM®) or Certified Data and 35 percent hold the CDPSE certification. Forty-
Privacy Solutions Engineer™ (CDPSE™) designation, three percent of respondents are in a management
or have “privacy” in their job title. Survey data were role, 26 percent are in senior leadership positions, 21
collected anonymously via Survey Monkey. A total percent are individual contributors and 10 percent
of 1,890 respondents completed the survey; their are in executive leadership positions. Figure 1 shows
responses are included in the results. additional information about survey respondents.
24%
14% 8%
24%
Technology services/ 21%
consulting 14%
23% 16%
19% 13%
24%
12%
Financial/banking
1–5 16–20
13%
6–10 21–25
Less than $50M– $100M– $500M– Greater
Government/military– 11–15 25+ $50M $99M $499M $999M than $1B
national/state/local
Region Europe
20% Asia
19%
North America 47%
4%
4%
Africa
Middle East
Privacy Staffing
According to the survey findings, the mean number of Privacy practitioners can usually be classified into one
full-time-equivalent employees who have privacy-related of two groups—legal/compliance or technical. Legal/
responsibilities within an enterprise is 26, which is slightly compliance privacy professionals have knowledge
higher than last year’s average (25). of the privacy laws and regulations that apply to
an enterprise but may not have extensive technical
Privacy staff roles include legal/compliance expertise; technical privacy professionals have the
practitioner, technical IT staff, risk professional or technical expertise to apply controls that help preserve
security professional. Figure 2 shows the percentage privacy and achieve compliance.
of staff in each of these roles.
FIGURE
What 2: Staff Privacy
percentage of your Roles
staff are in the following roles?
What percentage of your staff are in the following roles?
Technical IT staff 8%
(excluding security professionals)
37%
21%
14%
10%
6%
4%
Risk professionals 8%
51%
18%
8%
5%
5%
4%
Security professionals 4%
45%
19%
11%
7%
10%
4%
Both legal/compliance and technical privacy teams are more compared to last year and/or increasing privacy
understaffed, according to the ISACA survey results. budgets—35 percent of last year’s survey respondents
Forty-four percent of respondents indicate that legal/ reported that their privacy budget would increase in the
compliance privacy teams are somewhat or significantly next 12 months.
understaffed, and 53 percent of respondents report that
technical privacy teams are somewhat or significantly Some enterprises are taking steps to address
teams than in legal/compliance teams is consistent with say that their enterprises have open legal/compliance
previous years’ findings. Although understaffing remains privacy positions, and 34 percent indicate they have
concerning, it has improved from last year (figure 3). open technical privacy roles. Often, filling privacy
This may be due to enterprises prioritizing privacy positions can be time consuming (figures 4 and 5).
Legal/compliance 46%
44%
2022 2023
FIGURE 4: Time to Fill Open Legal/Compliance Privacy FIGURE 5: Time to Fill Open Technical Privacy Positions
Positions On average, how long does it take to fill technical
On average, how long does it take to fill legal/compliance privacy positions with a qualified candidate?
On average,
privacy how with
positions longadoes it take
qualified to fill legal/compliance
candidate? On average, how long does it take to fill technical privacy
privacy positions with a qualified candidate? positions with a qualified candidate?
2% 2%
10% 9%
22% 23%
20%
24%
2%
26% 25%
2% 18%
15%
1–3 months Cannot fill open positions 1–3 months Cannot fill open positions
Although some survey respondents report that the somewhat increased and 30 percent indicating it stayed
time to fill open privacy positions decreased in the past the same.
year, most report that the amount of time to fill roles One challenge to quickly filling roles is a lack of qualified
increased or stayed the same. For legal/compliance applicants. For approximately one-fifth of respondent
roles, 14 percent of respondents say that the time to enterprises, less than one-quarter of privacy-position
fill positions somewhat or significantly decreased, applicants were well qualified for the positions to which
19 percent report that it significantly or somewhat they applied (for both legal/compliance and technical
increased and 31 percent say that it stayed the same. privacy positions). Experience is the primary factor in
Time to fill technical privacy positions is similar, with determining an applicant’s qualifications. Figure 6 shows
16 percent saying that it somewhat or significantly the importance of factors that are used to evaluate if a
decreased, 23 percent saying that it significantly or privacy candidate is qualified.
Very important Somewhat important Not very important Not at all important
According to 76 percent of ISACA survey respondents, the laws and regulations to which an enterprise is subject
expert-level privacy roles are the most difficult level to hire, (46 percent), followed closely by a lack of technical
followed by the practitioner knowledge level (51 percent) expertise (45 percent). Other skill gaps include:
and entry-level/foundational knowledge level (12 percent).
• Business insight (39 percent)
Which, if any, of the following has your organization undertaken to help decrease this privacy skills gap?
Which, all
Select if any,
thatof the following has your organization undertaken to help decrease this privacy skills gap? Select all that apply.
apply.
Increased use of
performance-based training 25%
to attest to actual skill mastery
Increased reliance on
credentials to attest to actual 25%
subject matter expertise
Organization has no
privacy skills gap 4%
Other 1%
Privacy Budgets
In addition to privacy skill deficiencies, insufficient budgets significantly or somewhat increase in the next 12 months
contribute to the staffing challenges that privacy teams decreased slightly to 34 percent—from 35 percent
face. Forty-two percent of ISACA survey respondents last year—that decrease may be due to the increased
report that their enterprise privacy budget is somewhat or percentage of respondents who believe that their privacy
significantly underfunded, 36 percent say it is appropriately budget is appropriately funded and therefore may not see
funded, seven percent say it is significantly or somewhat a need to increase funding.
overfunded and 14 percent do not know. This is a
slight improvement from last year, when 45 percent of
respondents felt their privacy budget was underfunded,
and a larger improvement from 2021, when 49 percent Forty-two percent of respondents report
of survey respondents believed their privacy budget that their enterprise privacy budget is
was underfunded. somewhat or significantly underfunded.
percent of respondents say the chief information officer is executive or business support is an obstacle to forming
accountable for privacy, and 14 percent say the executive- a privacy program, and 38 percent of respondents say
level security officer— e.g., chief information security officer that a lack of visibility and influence in the organization
(CISO) or chief security officer (CSO)—is accountable. is an obstacle—these challenges can be mitigated by
having a strong C-level privacy advocate. Figure 9 shows
Ensuring the appropriate person is accountable for additional challenges enterprises face when forming a
privacy is essential because this individual can help privacy program.
Who is primarily
Who is primarily accountable
accountable for
for privacy
privacy in
in your
yourorganization?
organization?
Board of directors 5%
Don't know 4%
Other 4%
Which, if any, of the following are obstacles faced by an organization in its ability to form a privacy program?
Which, all
Select if any,
thatof the following are obstacles faced by an organization in its ability to form a privacy program?
apply.
Select all that apply.
No obstacles exist 7%
Don't know 9%
Other 1%
meet with legal/compliance privacy professionals privacy considerations exist throughout the enterprise.
Another 17 percent of respondents report that their and development, procurement, internal audit, human
meet when new privacy laws and regulations go finance, product/business development and public
FIGURE 10: Frequency of Meetings Between Technical and Legal/Compliance Privacy Professionals
How often do technical privacy professionals meet with legal/compliance professionals to understand legal
How often do technical privacy professionals meet with legal/compliance professionals to understand legal and
and regulatory requirements?
regulatory requirements?
6%
17%
Never Monthly
25%
7%
1–2 times per year Weekly
28%
Do you think your board of directors views your enterprise’s privacy program as:
Do you think your board of directors views your enterprise’s privacy program as:
A combination of both
14%
Perform a privacy
impact assessment (PIA) 45%
No monitoring is performed
9%
Don't know
11%
Other 1%
Annually 65%
Quarterly 17%
Don’t know 6%
Other 2%
and revise training as new laws and regulations go into Most respondents believe that privacy training
effect, nine percent review it every two-to-five years and programs benefit their enterprise. Twenty-six percent
four percent do not revise their privacy training. of respondents say that privacy training and awareness
programs have a strong positive impact, and 47 percent
To evaluate if employees are benefitting from privacy say they have some positive impact.
awareness training, enterprises should monitor their
training programs. Figure 14 shows the metrics that
respondent enterprises use to evaluate privacy training
program effectiveness. It is impossible to have privacy
without security, but security does not
Relying solely on the number of privacy incidents necessarily guarantee privacy.
and/or the number of privacy complaints received
from customers is problematic because it is reactive;
enterprises will not know training is ineffective until a In 57 percent of respondent enterprises, privacy
privacy incident occurs or a privacy complaint is received. awareness training is separate from security awareness
Although tracking the number of people who complete training, while 31 percent of respondent enterprises
privacy training may be valuable, it does not reveal the do not separate privacy awareness training from
efficacy of the privacy training; it treats training as a security awareness training.
check-the-box exercise without evaluating if employees
are learning anything from it. Although privacy and security training can be combined
in a way that teaches both topics, a concern is that
Pre- and post-training assessments are a stronger privacy-specific topics are not covered thoroughly in
metric, as they demonstrate if staff have learned from combined training. It is impossible to have privacy
the training programs. If there is no difference or a without security, but security does not necessarily
minimal difference between pre- and post-training guarantee privacy.
assessments, that may be an indicator that the privacy
awareness training needs to be revised.
What metrics does your organization track to evaluate the privacy training program’s effectiveness?
Select all that does
What metrics apply.your organization track to evaluate the privacy training program’s effectiveness? Select all that apply.
Other 6%
Unsurprisingly, regional variations exist for the frameworks A previous section in this report revealed that privacy
and regulations used to manage privacy. Seventy-nine budgets appear to be more adequately funded this
percent of European respondents use GDPR. It may be year than last year, and understaffing seems to be
surprising that only 79 percent of respondents in Europe improving. Part of the reason for this may be that
use GDPR, but this may be partially attributable to Brexit. enterprises felt the strain on their privacy teams and
Sixty-one percent of respondents in the United States use increased privacy budgets and staff sizes accordingly.
the NIST Privacy Framework. This strain may be caused partially by an increase
in data-subject requests. Thirty-four percent of
Given the myriad privacy laws and regulations in effect, respondents say that the number of data-subject
some enterprises struggle to identify and understand requests has somewhat or significantly increased.
their privacy obligations. Twenty-three percent of
Only 11 percent of respondents report that their they know a security incident occurred but are unsure
enterprise experienced a material privacy breach in the if personal information was compromised. Dwell time
past 12 months, which is slightly higher than last year (the time between a breach and when an enterprise
(10 percent). Sixty-four percent of respondents report discovers the breach) may have also influenced why
that their enterprise did not have a privacy breach, 17 so many respondents do not know if a privacy
percent do not know and nine percent preferred not breach occurred. Figure 16 shows the number of
to answer. Although the percentage of respondents enterprises experiencing more or fewer breaches
who do not know may seem high, it is possible that than last year.
In your opinion, which of the following are the most common privacy failures in an organization?
In your all
Select opinion, which of the following are the most common privacy failures in an organization? Select all that apply.
that apply.
Other 2%
Is your organization experiencing an increase or decrease in material privacy breaches as compared to a year ago?
Is your organization experiencing an increase or decrease in material privacy breaches as compared to a year ago?
5%
16%
33% More breaches Prefer not to answer
26%
Privacy by Design
Privacy by design is a systems engineering method that Given that not practicing privacy by design is viewed as
“mandates that any system, process or infrastructure a common privacy failure (figure 15), it is surprising that
that uses personal data consider privacy throughout its more enterprises do not always practice it. The reason
development life cycle and identify possible risk to the may be that enterprises that always practice privacy
rights and freedoms of the data subjects and minimize by design are more likely to have resources that enable
them before they can cause actual damage.”1 Figure them to do so (figure 18). The median privacy staff
17 shows how often respondent enterprises practice size among enterprises that always practice privacy
privacy by design. Thirty percent of respondents
FIGURE 17: Frequency of Practicing Privacy by Design
indicate that their enterprises always practice privacy
How often does
How often doesyour
yourenterprise
enterprisepractice
practiceprivacy
privacy
by design, and 30 percent of respondents say that their by design?
by design?
enterprises frequently practice privacy by design.
76%
Feel that their board
properly prioritizes privacy 55%
1 ISACA, “Eight Strategies to Help Organizations Implement Privacy by Design and Default,” 21 October 2021, https://www.isaca.org/why-isaca/about-
us/newsroom/press-releases/2021/eight-strategies-to-help-organizations-implement-privacy-by-design-and-default
by design is almost twice as large—19 compared to 10 ability to ensure data privacy and achieve compliance
for total respondents. Forty-four percent of respondent with new privacy laws and regulations. Seventy-six
enterprises that always practice privacy by design feel percent of these respondents feel completely or
that their privacy department is adequately staffed, somewhat confident in this ability, compared to 35
compared to 34 percent of total respondents. It also percent of total respondents.
appears that the boards of directors of enterprises
that always practice privacy by design better prioritize Those who always practice privacy by design are less
privacy; 76 percent of these enterprises feel that their likely to have boards that view privacy programs as
board properly prioritizes privacy, compared to just 55 purely compliance driven (24 percent vs. 33 percent).
percent of total respondents. Given that a key tenet of privacy by design is that
privacy should be proactive and not reactive, and
Respondents from enterprises that always practice purely compliance-driven programs are often reactive,
privacy by design are significantly more likely to be it makes sense that enterprises that always practice
completely or somewhat confident in their team’s privacy by design do not operate reactively.
Given the various requirements privacy teams must A primary responsibility of privacy professionals is to
meet and the growing number of international privacy respond to privacy breaches. Figure 19 shows the
laws and regulations, it makes sense that the demand likelihood of experiencing a privacy breach in the
for privacy professionals is expected to grow in the next next year.
Very likely 4%
Likely 11%
Unlikely 20%
Approximately one-fifth of respondents do not know the last year, but the same number of respondents say they
likelihood of experiencing a privacy breach in the next year. plan to use AI for privacy in the next 12 months.
This may indicate that privacy risk is an area that is not
very mature or that enterprises are just not prioritizing it. Given the significant understaffing of privacy teams, it is
surprising that nearly 38 percent of respondents do not
The challenges in hiring the right people for privacy plan to use AI. This result may be because of the privacy-
positions and the consequences of a material privacy related concerns associated with AI.2 The large number
breach are leading some enterprises to start or plan to use of respondents who do not know of plans to use AI for
AI for privacy. Figure 20 shows respondent enterprise use privacy may also be explained by these concerns surfacing
of AI for privacy. More respondents use AI this year than when considering AI for privacy-related functions.
Conclusion
Data can provide information about an individual’s Despite the challenges associated with data privacy,
health, religion, orientation, political beliefs and more. the ISACA survey reveals good news: It appears that
Protecting data subjects’ privacy is critical to building enterprise budgets have started adjusting for the growing
and preserving digital trust, so enterprises must prioritize emphasis on privacy. Privacy teams are larger this year
privacy accordingly. The number of privacy laws and than they were last year. Although there is room for
regulations will only increase in the coming years, and improvement, and many enterprises believe they need
making headlines for a privacy violation can damage more resources, enterprises are moving toward better
trust with consumers. supporting their privacy teams.
2 Pearce, G.; “Beware the Privacy Violations in Artificial Intelligence Applications,” ISACA Now Blog, 28 May 2021, https://www.isaca.org/resources/
news-and-trends/isaca-now-blog/2021/beware-the-privacy-violations-in-artificial-intelligence-applications
Acknowledgments
ISACA would like to recognize:
Board of Directors
Pamela Nigro, Chair Gregory Touhill
CISA, CGEIT, CRISC, CDPSE, CRMA CISM, CISSP
Vice President, Security, Medecision, USA ISACA Board Chair, 2021-2022
Director, CERT Center, Carnegie Mellon
John De Santis, Vice-Chair
University, USA
Former Chairman and Chief Executive
Officer, HyTrust, Inc., USA Tracey Dedrick
ISACA Board Chair (2020-2021) and
Niel Harper
Interim Chief Executive Officer
CISA, CRISC, CDPSE, CISSP
Former Chief Risk Officer, Hudson City
Chief Information Security Officer, Data
Bancorp, USA
Privacy Officer, Doodle GmbH, Germany
Brennan P. Baybeck
Gabriela Hernandez-Cardoso
CISA, CISM, CRISC, CISSP
Independent Board Member, Mexico
ISACA Board Chair, 2019-2020
Maureen O’Connell Vice President and Chief Information
NACD-DC Security Officer for Customer Services,
Board Chair, Acacia Research (NASDAQ), Oracle Corporation, USA
Former Chief Financial Officer and Chief
Rob Clyde
Administration Officer, Scholastic, Inc.,
CISM, NACD-DC
USA
ISACA Board Chair, 2018-2019
Veronica Rose Independent Director, Titus, Executive
CISA, CDPSE Chair, White Cloud Security, Managing
Senior Information Systems Auditor– Director, Clyde Consulting LLC, USA
Advisory Consulting, KPMG Uganda,
Founder, Encrypt Africa, Kenya
Gerrard Schmid
Former President and Chief Executive
Officer, Diebold Nixdorf, USA
Bjorn R. Watne
CISA, CISM, CGEIT, CRISC, CDPSE,
CISSP-ISSMP
Senior Vice President and Chief Security
Officer, Telenor Group, USA
Asaf Weisberg
CISA, CISM, CGEIT, CRISC, CDPSE, CSX-P
Chief Executive Officer, introSight Ltd.,
Israel
About ISACA
ISACA® (www.isaca.org) is a global community advancing individuals and
organizations in their pursuit of digital trust. For more than 50 years, ISACA 1700 E. Golf Road, Suite 400
has equipped individuals and enterprises with the knowledge, credentials, Schaumburg, IL 60173, USA