Full-disk, file, and email encryption are widespread, and privacy practices are driving greater adoption of encryption to control data across its various states (at rest, in transit, and in use). But security and privacy pros have room to improve their use of encryption as a critical data security control and to plan for emerging use cases, such as assessing cryptoagility. Use this report to understand encryption trends and modify your program accordingly.