Tuesday, April 28, 2026
Cloud Native Now
MENU
MENU
Home
Webinars
Upcoming
Calendar View
On-Demand
Podcasts
Cloud Native Now Podcast
Techstrong.tv Podcast
Techstrong.tv - Twitch
About
Sponsor
MENU
MENU
News
Latest News
News Releases
Cloud-Native Development
Cloud-Native Platforms
Cloud-Native Networking
Cloud-Native Security
Spark
Best of 2023: Using Airflow to Run Spark on Kubernetes
Here's how to set up a Spark application on Kubernetes using the Airflow scheduler for data-intensive workloads ...
Chandan Pandey
|
January 2, 2024
|
Airflow
,
Apache Spark
,
big data
,
container orchestration
,
data processing
,
kubernetes
,
Spark
×
Executive Security Survey
1
2
3
4
5
6
7
8
In the past 12 months, has your team been involved in detecting, investigating, or remediating a cybersecurity incident that originated from a senior leader's (or senior leader's family member's) personal device, home network, or personal online account?
*
Yes, multiple times
Yes, at least once
No, but we have formal responsibility to do so
No, this is not part of our team's scope
When a security incident targeting a senior leader or senior leader's family member originates outside the physical and digital corporate perimeter, how does your team typically become aware of it? (Select one)
*
The executive or a family member reports it directly
Our corporate security tools detect anomalous activity that we trace back to a personal source
A third-party service or vendor alerts us
We discover it during routine threat intelligence monitoring
We usually don't find out until there is a downstream corporate impact
Other
What are the most common threat vectors your team has encountered in incidents targeting senior leaders or their families outside the corporate environment? (Select up to three)
*
Phishing or smishing (email/SMS) to personal accounts
Credential harvesting or account takeover of personal accounts
AI-generated impersonation or deepfake targeting the executive or family members
Compromise of the executive's home network or personal devices
Exploitation of personal information exposed in data brokers or dark web leaks
Social engineering of family members to reach the executive
Sextortion, catfishing, or reputational extortion
On average, how many total staff hours does your team spend investigating and remediating any one incident that originates from a senior leader's personal digital life? Including any downstream corporate impact in your estimate. (Select one)
*
Fewer than 4 hours
4–10 hours
11–20 hours
More than 20 hours
We have not been able to estimate this
Which of the following challenges has your team experienced when responding to a security incident involving a senior leader's personal digital life? (Select all that apply)
*
Navigating legal or privacy concerns when accessing the executive's personal data
Lack of visibility in personal devices, accounts, or home networks
Reluctance or resistance from the executive or their family to cooperate
No formal incident response playbook covering non-corporate assets
Pulling senior security staff away from higher-priority corporate security work
Uncertainty about whether the incident creates corporate regulatory exposure
Difficulty coordinating with external vendors or service providers
Does your organization's current incident response plan include formal, documented procedures for handling security incidents on assets not owned or managed by the corporation? (Select one)
*
Yes, we have specific documented procedures for non-corporate assets
We have informal or ad hoc processes, but nothing formally documented
No, our IR plan only covers corporate-owned assets
Don't know
What is the most likely way your security operations would change if an external service could handle detection, investigation, and remediation of security incidents targeting senior leaders' personal digital lives—without involving your internal team or requiring access to executives' personal data? (Select one)
*
It would allow our team to increase focus on corporate priorities
It would help resolve corporate legal and privacy concerns
It would be helpful but otherwise not meaningfully change our operations
We would be unlikely to adopt an external service for this purpose
How might such an external service (that doesn't involve your internal team or require access to executives' personal data) change your security operations burden? (Select one)
*
It would significantly reduce the operational burden
It would moderately reduce the burden
It would not reduce or increase the burden
It would moderately increase the burden
It would significantly increase the burden
Don't know
Δ
×