Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

The benefits of digital trust

By Security Staff
digital Trust freepik

Image via Freepik

September 19, 2022

New ISACA research shows significant gaps between what enterprises are doing now and what they should do to establish digital trust in the future digital ecosystem. While nearly most cybersecurity professionals (98%) say that digital trust is important and 63% say it is relevant to their jobs, only 12% of their organizations have a dedicated staff role for digital trust.


The State of Digital Trust 2022 survey report from ISACA  features insights from 2,755 business and information technology professionals worldwide. ISACA defines digital trust as the confidence in the integrity of relationships, interactions and transactions among providers and consumers within an associated digital ecosystem. It is a driving factor in consumer decisions and enterprise resilience in a digital-dominated environment.


“Digital trust is the bedrock of business relationships and is critical for strategic digital transformation,” said David Samuelson, chief executive officer of ISACA. “Innovation, market leadership and financial performance rely heavily on trust that must be earned every day.”


One breach of digital trust can cause devastating reputational, regulatory and financial repercussions. Yet only 66% say their organization currently prioritizes digital trust at a sufficient level. 


Survey respondents are aware of the consequences and say that organizations with low levels of digital trust experience: reputation decline (62%), more privacy breaches (60%), more cybersecurity incidents (59%), lost customers (56%), less reliable data for decision-making (53%) a negative impact on revenue (43%) and a slower ability to innovate (36%). 



Moving past obstacles

According to the ISACA survey, the most significant obstacles to digital trust are: lack of skills and training (53%), lack of alignment with enterprise goals (44%), lack of leadership buy-in (42%), lack of budget (41%) and lack of technological resources (40%). 



Benefits of digital trust

Enterprises experience various key benefits when prioritizing digital trust in their strategic planning. According to respondents, high levels of digital trust lead to: 

  • Positive reputation (66%)
  • Fewer privacy breaches (58%)
  • Fewer cybersecurity incidents (57%)
  • Stronger customer loyalty (55%)
  • Faster innovation (44%)
  • Higher revenue (25%)


Growth opportunities

An emphasis on digital trust also presents major opportunities for career growth, as 82% say digital trust will be much more important in their organization, and 28% say their organization will likely have a senior staff role dedicated to digital trust in five years. 


Respondents said the top three components of digital trust are security, data integrity and privacy, but only half of the respondents agree that there is a sufficient collaboration among professionals in these and other digital trust fields. 


The top three roles for strengthening digital trust are IT strategy/governance (84%), security (80%) and information technology (74%). Many organizations are still in the early stages of digital transformation, so this is an excellent opportunity for professionals to step up, gain knowledge and lead a multi-disciplinary team. 


According to 76% of respondents, digital trust is very important to digital transformation. Respondents also want tools to help with transformation — 55% say that having a digital trust framework would be extremely or very important to their organization. 


To help businesses prioritize digital trust, ISACA will be releasing the Digital Trust Ecosystem Framework (DTEF) in the fourth quarter of 2022. DTEF is a business framework designed for the entire enterprise and focuses on providing critical factors for organizational success by fostering trusted, meaningful and mutually beneficial relationships, interactions and transactions. 


The State of Digital Trust report is available to download at www.isaca.org/state-of-digital-trust.

KEYWORDS: c-suite cyber security digital trust risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • digital person

    Digital trust: Toward a brighter future of the internet

    See More
  • digital landscape

    Unlocking digital trust: The power of collaboration in a data-driven world

    See More
  • Digital Trust

    Unlocking digital trust: The power of collaboration in a data-driven world

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • The Database Hacker's Handboo

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing