SBN

Response to IT industry trends analysis 2020

Introduction

The Computing Technology Industry Association (CompTIA) has just published its Industry Trends Analysis 2020. This publication takes a generalized look at the landscape in which IT professionals, including security professionals, find themselves involved in the coming year.

This year’s analysis begins with these words:

“There are tremendous benefits available through technology for both business and society, but there are major questions around safety, privacy, sustainability, and trust” … 

The global tech industry is worth $5.2 trillion already and continues to grow. Is CompTIA onto something in this year’s report, or have they missed the goal?

The IT industry landscape in 2020

Before we take a closer look at the trends identified by CompTIA, let’s look at how they see the IT industry in 2019 and 2020.

The U.S. remains the biggest market for technology — 32% of the $5.2 trillion is attributed to the USA. This is hardly surprising, as the U.S. is both a major consumer and producer of technology. China is coming up fast behind the U.S., and the EU is also a significant contributor to the global value of the IT sector.

CompTIA trends to watch in 2020

CompTIA set out the landscape for 2020 applying the trends across four “pillars of IT”:

  1. Software development (57%)
  2. Cybersecurity (51%)
  3. Data (47%) 
  4. Infrastructure (45%) 

The CompTIA top ten trends, in order of impact, are:

  1. Tech-washing fades in favor of real strategy
  2. Workforce diversity grows in many ways
  3. Tech topics are front and center in U.S. elections
  4. Hype meets reality with emerging technology
  5. Internet of things continues to redefine IT architecture
  6. Artificial intelligence eats the world
  7. Demand for integration leads to demand for automation
  8. Cybersecurity becomes more operational
  9. Deep fakes and 5G exacerbate the data management challenge
  10. Tech (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Susan Morrow. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/dJL41GBUtVY/