In order to provide a list of 50 topics surrounding developer security, we have looked at non-company specific conferences that took place in the United States surrounding security that occurred either virtually after lock downs for COVID-19 and/or in the first three months of 2020 when there was no lock down and/or conferences that occurred in the latter half of 2019. We have provided the name of the conference, website link to it, when it took place, and the overarching theme of the conference. Then after scanning the conference agenda, we provided relevant topics discussed at that conference, a synopsis of each topic when that was available, and who delivered the presentation. In total, we scraped the websites of nine conferences in order to build a list of 50 topics. We felt this portion of the research was best delivered in a custom Google spreadsheet for ease of viewing, which can be accessed here. We also did a media scan to understand fifteen topics surrounding developer security currently top of mind in media reporting. As requested and where it was available, we have included any new security policies that have been announced in the United States broadly, or more narrowly, in individual states. For each media article found, we provided the name of the article, the link to it, the topic covered, and a brief description of the content. We also placed this in the custom Google spreadsheet deliverable. Finally, we have curated seven pieces of information, data, and/or statistics surrounding consumer perception of online security in the United States. This included, but was not limited to, mobile security perceptions and the perception of cybersecurity threats in general. We did not place this part in the Google spreadsheet deliverable, and instead, it can be viewed below under the header titled “Consumer Perception of Online Security “.

Security Based Conferences: Topics Discussed

  • We have presented two highlights from this part of the research below. However, the entirety of this part can be viewed in this custom Google spreadsheet on the tab titled conferences.
  • Black Hat USA took place virtually from August 1 – 6, 2020. One of the sessions was called “Election Security: Securing America’s Future” The session was described as “[t]he United States Government is intensely focused on election security and is working together with election partners better than ever before. The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) is leading the federal effort to support state and local officials in their important mission to secure elections in 2020. We are sharing intelligence, resources, support and cybersecurity services to secure election infrastructure against malicious activity.” This can be viewed in row 6 of the Google spreadsheet.
  • The Cyber Security Summit will be taking place in Houston, Seattle, Scottsdale, Nashville, Columbus, and Boston with dates of October 1, 9, 15, 20, 30, and November 5 respectively. “The Cyber Security Summit connects C-Suite & Senior Level Executives who are responsible for protecting their companies from all types of cyber crime, insider threats, ransomware & maintaining compliance with information security experts.” We curated four topics from across all six cities which can be viewed in rows 11-14.

Media Scan: Topics Discussed

  • We have presented two highlights from this part of the research below. However, the entirety of this part can be viewed in this custom Google spreadsheet on the tab titled media scan.
  • An article called “Congress, Warning of Cybersecurity Vulnerabilities, Recommends Overhaul” was published by The New York Times on the topic of cybersecurity. An excerpt from the article is: “A yearlong congressional study of American cyberspace strategy concludes that the United States remains ill-prepared to deter attacks, including from Russia, North Korea and Iran. It calls for an overhaul of how the United States manages its offensive and defensive cyberoperations.” “The White House has also been secretive about current policy: The administration refused to share with Congress, or the commission, the presidential order signed in August” This can be found in row 16 of the Google spreadsheet.
  • In row 13, a Forbes article titled “The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About” can be viewed. Five cybersecurity trends are discussed: “Artificial intelligence (AI) will play an increasing role in both cyber-attack and defense, political and economic divisions between east and west lead to increased security threats, political interference increasingly common and increasingly sophisticated, the cybersecurity skills gap continues to grow, and vehicle hacking and data theft increases.”

Consumer Perception of Online Security

wish there were more companies they could trust with their data.
sharing personal information with companies a “necessary evil.”

Concern about the way connected devices collect and use personal data:US consumers think smart devices are "creepy"

Additional Helpful Research

  • We found this January 2020 study that examined consumers in different countries and which ones placed the highest value on privacy. It was authored by Jeffrey Prince and Scott Wallsten of the Technical Policy Institute. This was a global survey of six countries, including the United States, but it was impossible to parse out all the US data. We still felt that this might be of interest, so we have linked to the report here.
  • We also found this September 2019 Google consumer survey where people in the United States and Canada were asked where they stand with the main themes connected to protection. “ESET and NCSA polled 4,000 consumers (2,000 Americans and 2,000 Canadians) in four separate surveys of 1,000 consumers each. The surveys have a margin of error of +/- 3.2%.” We did not include this in our main research because it included Canadians, but we decided that this might be of interest, so we have linked to the survey results here.
Glenn is the Lead Operations Research Analyst at The Digital Momentum with experience in research, statistical data analysis and interview techniques. A holder of degree in Economics. A true specialist in quantitative and qualitative research.


Previous article


Next article

You may also like


Leave a reply

Your email address will not be published.