Welcome to the survey. It has been specially designed in the wake of unprecedented business disruptions created by the Covid-19 pandemic. It aims to gather insights on how the CIO and CISO priorities in India are changing in response to the ongoing crisis.

All your responses will be strictly confidential and appear only as consolidated study findings. Individual responses will not be shared or published.

As a mark of gratitude for your participation in the study, we will be sharing the key findings of the study, for your internal consumption and usage.

Section A – Your Profile

In the section below, please tell us about yourself in brief. 


Section B – Business Impact Assessment of Covid-19

In the section below, please tell us how the pandemic has impacted your business. 


No ImpactLow ImpactHigh ImpactCritical Impact
Overall business financial performance
Core business operations
Workforce related (e.g., recruitment)
Finance (e.g., cash flow)
Technology budgets/adoption
Innovation capabilities
Marketing & Sales related (e.g., marketing spend)
Supply chain

Section C – Readjusting to the Covid-19 impact

This section is aimed at gathering how organizations are re-prioritizing their investments. 


1st2nd3rd4th5th
Optimization and upgradation of existing IT infra
Optimization and upgradation of existing network infra
Application modernization
Open source software
Cloud-IaaS
Cloud-PaaS
Cloud collaboration tools (unified communications)
Cloud SaaS (excluding collaboration tools)
DevOps solutions
Big data / analytics
Artificial intelligence
Robotic process automation
AR/VR
Security systems
Blockchain
Internet of things (IoT)
Others
1st2nd3rd4th5th
Optimization and upgradation of existing IT infra
Optimization and upgradation of existing network infra
Application modernization
Open source software
Cloud-IaaS
Cloud-PaaS
Cloud-Collaboration tools (unified communications)
Cloud-SaaS (excluding collaboration tools)
DevOps solutions
Big data / analytics
Artificial intelligence
Robotic process automation
AR/VR
Security systems
Blockchain
Internet of things (IoT)
Others
1st2nd3rd4th5th
Application security
Asset configuration and management
Audit and compliance management
Cloud access secure gateways (CASB)
Cybersecurity insurance
Data loss prevention
Deception technologies
Email security solutions
Endpoint security
Encryption tools
Incident detection and response
Mobile security solutions
Multi-factor authentication
Next-generation firewalls
Provisioning/managing user accounts and passwords
Secure web gateways
Security analytics and automation
Security education
Single sign on
Software-defined perimeter (zero trust related technologies)
Threat intelligence solutions
Vendor/3rd party risk management
Vulnerability management
Others
Not at all relevant Highly relevant