SlideShare une entreprise Scribd logo
1  sur  46
Télécharger pour lire hors ligne
From IT Security to Digital Trust:
Trends and Im peratives in a Digital World
Thom as Meyer
Group Vice President
IDC Europe
@tom txt
© IDC
© IDC 2
Revisiting the three mega -drivers
2
Dynamic
Threat
Landscape
Regulatory
Upheaval Digital
Transformation
The rise of digital transformation (DX)
© IDC
4© IDC
89%
of organizations have
digital transformation
as a business priority!
DX dominates the business agenda
Short Term DX
DX initiatives are
tied to enterprise
strategy but with
short -term focus
Impromptu DX
DX initiatives are
tactical and
disconnected from
enterprise strategy
LOB DX
DX initiatives are
initiated at the
function or LOB
level
8% 27% 23%
58%
The Digitally Distracted
DX is the Strategy
The enterprise
strategy is to use
DX to transform
markets with new
business models
and services
Integrated Strategy
Integrated,
continuous
enterprise wide
DX innovation is
in place
17%25%
42%
The Digitally Determined
IDC Global DX Leaders Survey. European sample, n = 405. May, 2018
Unified Digital Strategies Are Uncommon
5© IDC
“In the future, the best
selling car will be the
most secure car. ”
Brian Ward, CISO, Mercedes
6© IDC
© IDC 7
Digital Transformation requires Digital Trust
The digital platform will
be the most important
decision enterprises
make this decade
© IDC 8
Islands of Innovation
3D Product
DesignFraud MonitoringSelf Healing
Assets
Real Time
Inventory Mgmt.
Smart Warehouse
Track
and Trace
Data as a Service
Chat
bots
VR Product
Interaction
Mobile App
P2P Payment
Enterprise IT
© IDC 9
© IDC 10
By 2020
of the total European
IoT Infrastructure
spending will be on Edge
Computing
15%
Source: IDC European IoT Survey, October 2017, N = 1,360
At the Edge –
Sensors/
connected devices
At the Edge –
Local gateway
Real-tim e on-
prem ise
stream ing
platform
Real-tim e cloud-
based stream ing
platform
Central on-
prem ise data
store/lake
Central cloud-based
data store/lake
33% 25% 27% 18% 31% 22%
How does your organization analyze or plan to
analyze its IoT data?
IoT & EDGE
Edge has a key role in IoT deploym ents
A Platform for Digital Trust
EXTERNAL
PROCESSES
Connected
Processes
Assets
People
INTERNAL
PROCESSES
Mobile
IoT
AR/VR
BOT
API
INTELLIGENT
CORE
Cloud -based API
strategies that
orchestrate
exchange of data
across your
ecosystem
1
New customer
experience
technologies that
fully support
customer and
ecosystem-facing
business models
3
Agile application
architectures on
PaaS using
microservices and
containers
2
Foundation for
“digital trust ”
through identity,
vulnerability, and
threat m anagem ent
across all services
4
An intelligent core
based on data
m anagem ent,
cognitive, artificial
intelligence, and
m achine learning
5
© IDC 11
12© IDC
LEVEL 3
 Digital Activity Reputation
LEVEL 1
 Internal IT Risk
LEVEL 4
 Organizational Reputation
LEVEL 2
 Shared IT Resource Risk
What is digital trust?
13© IDC
"Trust arrives by foot and leaves in a Ferrari."
Mark Carney, Governor of the Bank of England
14© IDC
What is the most important
technology to your organisation ‘s digital
transformation strategy in terms of
investment?
The Dynamic Threat Landscape requires Automated
Threat Rem ediation
© IDC
16© IDC
Dynamic Threat Landscape requires
Automated Threat Remediation
© IDC 17
The Security Skills Shortage
17
“The security skills shortage
affects (almost) everyone ”
- Source: IDC European Security Strategies
Survey Spotlight, 2017
I AM
THE
97%
© IDC 18
Impact of Skills Shortage
Loss of IP
Inability to m onitor/m anage the
security environm ent
Financial Loss
1
2
3
Source:IDC European Security Strategies Survey, 2017
© IDC 19
Addressing Technology Rationalisation
20© IDC
Automation &
Orchestration ’
Managed
Security
Services (MSS)
Unified
Security
Next -gen Security: The Building Blocks
21© IDC
1. Unified Security
© IDC 22
Complexity - the enemy of security (and
business!)
Unified Security
23© IDC
Unified Security
Technical
Effectiveness
Cost
Effectiveness
When considering security vendors, what is your primary driver for vendor selection?
28%
30%
42%
Source: IDC's European IT Security Strategies Survey, 2017, n = 737
Unified Security
24© IDC
Technical
Effectiveness
Cost
Effectiveness
When considering security vendors, what is your primary driver for vendor selection?
28%
30%
42%
Source: IDC's European IT Security Strategies Survey, 2017, n = 737
Unified Security
Unified Security is the
number one driver for
security vendor selection
25© IDC
Security should not be an island
Focusing prioritisation (with apologies to the NIST Fram ework!)
Risk Com plianceTechnology
SECURITYCULTURE AND ORGANISATIONAL AWARENESS
Security Business
Next -gen Security: The Building Blocks
26© IDC
2. Automation And
Orchestration
© IDC 27
Skills gap or automation opportunity?
Unlocking your analysts ’ potential!
28© IDC
How do you expect your use of security automation to change?
Source: IDC's European IT Security Strategies Survey, 2017, n = 737
1 Increase a
lot, 17%
2 Increase a
little, 55%
3 Stay the
same, 27%
4 Decrease a
little, 1%
5 Decrease a
lot, 0%
Unlocking your analysts ’ potential!
29© IDC
How do you expect your use of security automation to change?
Source: IDC's European IT Security Strategies Survey, 2017, n = 737
1 Increase a
lot, 17%
2 Increase a
little, 55%
3 Stay the
same, 27%
4 Decrease a
little, 1%
5 Decrease a
lot, 0%
72% of enterprises
plan to increase
their use of security
autom ation to som e
extent
Just 1% of
enterprises plan to
decrease the use of
security autom ation
30© IDC
48%
7.5%
To what level has your organisation adopted
automation in their IT security management?
Next -gen Security: The Building Blocks
31© IDC
3. Managed Security
Services (MSS)
MSS– the search for specialist capability & scale
32© IDC
HELP!
I NEED SOMEBODY
HELP!
NOT JUST ANYBODY
MSS- don ’t just take our word for it!
33© IDC
Does your organisation make use of third-party, external, security service providers?
Source: IDC's European IT Security Strategies Survey, 2017, n = 737
MSS- don ’t just take our word for it!
34© IDC
Does your organisation make use of third-party, external, security service providers?
43% of enterprises
plan to work with
security service
providers
46% of enterprises
are already working
with security service
providers
Source: IDC's European IT Security Strategies Survey, 2017, n = 737
IDC’s Western European Security Forecast
35© IDC
MSS is the fastest growing segment of the Western European security market
Source: IDC’s Western European Security Spending Guide, October 2018
0.0%
4.0%
8.0%
12.0%
16.0%
2018 2019 2020 2021 2022
MSS SW PSS HW
% Growth
Regulatory Upheaval
© IDC
37© IDC
Upheaval!
38© IDC
Did the meteor strike?
39© IDC
Manual compliance prevails
Regulatory Upheaval requires
Compliance Operationalisation
40© IDC
2017: #1 Barrier to
AI Adoption in
Europe?
Source: IDC's Western Europe AI/Cognitive Solutions Survey, April 2017 (n = 350)
Business Case
41© IDC
2018: #1 Barrier to
AI Adoption?
Source: IDC's Western Europe AI/Cognitive Solutions Survey, April 2018 (n = 350)
Concerns About
Data Compliance
42© IDC
43© IDC Visit us at IDC.com and follow us on
Twitter: @IDC
“Facebook is facing an existential
crisis.
It will now take a Herculean effort to
restore public trust in Facebook's
com m itm ent to privacy and data
protection. … Outside observers
think regulation has suddenly
becom e m ore likely…”
In conclusion
© IDC
Your strategic priorities
45© IDC
Digital Transformation
requires
Digital Trust
Regulatory Upheaval
requires
Compliance Operationalisation
Dynamic Threat Landscape
requires
Automated Threat Remediation
Thomas Meyer
Group Vice President
IDC Europe
Thank you!
@tomtxt  tmeyer@idc.com

Contenu connexe

Tendances

MT85 Challenges at the Edge: Dell Edge Gateways
MT85 Challenges at the Edge: Dell Edge GatewaysMT85 Challenges at the Edge: Dell Edge Gateways
MT85 Challenges at the Edge: Dell Edge GatewaysDell EMC World
 
Cognitive/AI: views, perspectives & directions
Cognitive/AI: views, perspectives & directionsCognitive/AI: views, perspectives & directions
Cognitive/AI: views, perspectives & directionsIDC Italy
 
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...IDC Italy
 
IDC Mobiz - Mobility of Everything Forum 2017
IDC Mobiz - Mobility of Everything Forum 2017IDC Mobiz - Mobility of Everything Forum 2017
IDC Mobiz - Mobility of Everything Forum 2017IDC Italy
 
Technology Trends for 2019: What it Means for Your Business
Technology Trends for 2019: What it Means for Your BusinessTechnology Trends for 2019: What it Means for Your Business
Technology Trends for 2019: What it Means for Your BusinessPrecisely
 
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...Enterprise Management Associates
 
Webinar for August 2018 Technology infrastructure for global insurers
Webinar for August 2018 Technology infrastructure  for global insurersWebinar for August 2018 Technology infrastructure  for global insurers
Webinar for August 2018 Technology infrastructure for global insurersThe Digital Insurer
 
Gartner Symposium 2016 Roundup: Key Trends for Small Businesses
Gartner Symposium 2016 Roundup: Key Trends for Small BusinessesGartner Symposium 2016 Roundup: Key Trends for Small Businesses
Gartner Symposium 2016 Roundup: Key Trends for Small BusinessesGetApp
 
Building the Digital Business: The 2016 CIO Agenda
Building the Digital Business: The 2016 CIO AgendaBuilding the Digital Business: The 2016 CIO Agenda
Building the Digital Business: The 2016 CIO AgendaTesora
 
MPG Construct Tech Market Update - April 2021
MPG Construct Tech Market Update - April 2021MPG Construct Tech Market Update - April 2021
MPG Construct Tech Market Update - April 2021Madison Park Group
 
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...IDC Italy
 
The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...
The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...
The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...Enterprise Management Associates
 
5 Factors in Modern Data Design
5 Factors in Modern Data Design5 Factors in Modern Data Design
5 Factors in Modern Data DesignDan Sexton
 
The Analytic Gap – Matching decision making with data analytics
The Analytic Gap – Matching decision making with data analytics The Analytic Gap – Matching decision making with data analytics
The Analytic Gap – Matching decision making with data analytics IDC Italy
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic OpportunityForgeRock
 
2016 CIO Agenda
2016 CIO Agenda2016 CIO Agenda
2016 CIO AgendaDen Reymer
 
IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014Felipe Lamus
 

Tendances (20)

MT85 Challenges at the Edge: Dell Edge Gateways
MT85 Challenges at the Edge: Dell Edge GatewaysMT85 Challenges at the Edge: Dell Edge Gateways
MT85 Challenges at the Edge: Dell Edge Gateways
 
Cognitive/AI: views, perspectives & directions
Cognitive/AI: views, perspectives & directionsCognitive/AI: views, perspectives & directions
Cognitive/AI: views, perspectives & directions
 
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
 
IDC Mobiz - Mobility of Everything Forum 2017
IDC Mobiz - Mobility of Everything Forum 2017IDC Mobiz - Mobility of Everything Forum 2017
IDC Mobiz - Mobility of Everything Forum 2017
 
Technology Trends for 2019: What it Means for Your Business
Technology Trends for 2019: What it Means for Your BusinessTechnology Trends for 2019: What it Means for Your Business
Technology Trends for 2019: What it Means for Your Business
 
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
NetSecOps: Everything Network Managers Must Know About Collaborating with Sec...
 
Webinar for August 2018 Technology infrastructure for global insurers
Webinar for August 2018 Technology infrastructure  for global insurersWebinar for August 2018 Technology infrastructure  for global insurers
Webinar for August 2018 Technology infrastructure for global insurers
 
Gartner Symposium 2016 Roundup: Key Trends for Small Businesses
Gartner Symposium 2016 Roundup: Key Trends for Small BusinessesGartner Symposium 2016 Roundup: Key Trends for Small Businesses
Gartner Symposium 2016 Roundup: Key Trends for Small Businesses
 
Building the Digital Business: The 2016 CIO Agenda
Building the Digital Business: The 2016 CIO AgendaBuilding the Digital Business: The 2016 CIO Agenda
Building the Digital Business: The 2016 CIO Agenda
 
MPG Construct Tech Market Update - April 2021
MPG Construct Tech Market Update - April 2021MPG Construct Tech Market Update - April 2021
MPG Construct Tech Market Update - April 2021
 
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...
 
The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...
The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...
The Internet of Things and Enterprise Networks: Planning, Engineering, and Op...
 
Predictions idc2013
Predictions idc2013Predictions idc2013
Predictions idc2013
 
5 Factors in Modern Data Design
5 Factors in Modern Data Design5 Factors in Modern Data Design
5 Factors in Modern Data Design
 
The Analytic Gap – Matching decision making with data analytics
The Analytic Gap – Matching decision making with data analytics The Analytic Gap – Matching decision making with data analytics
The Analytic Gap – Matching decision making with data analytics
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic Opportunity
 
2016 CIO Agenda
2016 CIO Agenda2016 CIO Agenda
2016 CIO Agenda
 
Black Gold's Silver Lining
Black Gold's Silver LiningBlack Gold's Silver Lining
Black Gold's Silver Lining
 
Idc predictions 2016
Idc predictions 2016Idc predictions 2016
Idc predictions 2016
 
IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014
 

Similaire à Navigating the IT landscape - Thomas Meyer - IDC

Phil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewPhil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewVeritas Technologies LLC
 
Idc Insights Overview 3.2012
Idc Insights Overview 3.2012Idc Insights Overview 3.2012
Idc Insights Overview 3.2012samgo1
 
Idc Insights Overview 3.2012
Idc Insights Overview 3.2012Idc Insights Overview 3.2012
Idc Insights Overview 3.2012robaweber
 
Idc insights overview 3.2012
Idc insights overview 3.2012Idc insights overview 3.2012
Idc insights overview 3.2012Thaddox
 
IDC Insights Overview
IDC Insights OverviewIDC Insights Overview
IDC Insights Overviewmahowald
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroPrime Infoserv
 
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat ThreatsUsing Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat ThreatsEnterprise Management Associates
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...SolarWinds
 
State of IT - Takeaways for Sales & Marketing Professionals
State of IT - Takeaways for Sales & Marketing ProfessionalsState of IT - Takeaways for Sales & Marketing Professionals
State of IT - Takeaways for Sales & Marketing ProfessionalsUBM (Technology)
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017Bill Chamberlin
 
How to fast track your Internet of Thing deployments?
How to fast track your Internet of Thing deployments?How to fast track your Internet of Thing deployments?
How to fast track your Internet of Thing deployments?Bijal (Bee) Hayes-Thakore
 
The Search for Value: Five Trends in Digital Investment
The Search for Value:  Five Trends in Digital InvestmentThe Search for Value:  Five Trends in Digital Investment
The Search for Value: Five Trends in Digital Investmentaccenture
 
Alfresco Day Amsterdam 2015 - "Digital Transformation in the Netherlands", IDC
Alfresco Day Amsterdam 2015 - "Digital Transformation in the Netherlands", IDCAlfresco Day Amsterdam 2015 - "Digital Transformation in the Netherlands", IDC
Alfresco Day Amsterdam 2015 - "Digital Transformation in the Netherlands", IDCAlfresco Software
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Enterprise Management Associates
 
The Search for Value: Five Trends Indigital Investment
The Search for Value: Five Trends Indigital InvestmentThe Search for Value: Five Trends Indigital Investment
The Search for Value: Five Trends Indigital Investmentaccenture
 
ANZ SMS Synopsis
ANZ SMS SynopsisANZ SMS Synopsis
ANZ SMS Synopsispatrikbzz
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissEnterprise Mobile
 

Similaire à Navigating the IT landscape - Thomas Meyer - IDC (20)

Phil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewPhil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of view
 
Idc Insights Overview 3.2012
Idc Insights Overview 3.2012Idc Insights Overview 3.2012
Idc Insights Overview 3.2012
 
Idc Insights Overview 3.2012
Idc Insights Overview 3.2012Idc Insights Overview 3.2012
Idc Insights Overview 3.2012
 
Idc insights overview 3.2012
Idc insights overview 3.2012Idc insights overview 3.2012
Idc insights overview 3.2012
 
IDC Insights Overview
IDC Insights OverviewIDC Insights Overview
IDC Insights Overview
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat ThreatsUsing Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
 
State of IT - Takeaways for Sales & Marketing Professionals
State of IT - Takeaways for Sales & Marketing ProfessionalsState of IT - Takeaways for Sales & Marketing Professionals
State of IT - Takeaways for Sales & Marketing Professionals
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
 
How to fast track your Internet of Thing deployments?
How to fast track your Internet of Thing deployments?How to fast track your Internet of Thing deployments?
How to fast track your Internet of Thing deployments?
 
Webinar: CX up AND costs down?
Webinar: CX up AND costs down?Webinar: CX up AND costs down?
Webinar: CX up AND costs down?
 
The Search for Value: Five Trends in Digital Investment
The Search for Value:  Five Trends in Digital InvestmentThe Search for Value:  Five Trends in Digital Investment
The Search for Value: Five Trends in Digital Investment
 
Alfresco Day Amsterdam 2015 - "Digital Transformation in the Netherlands", IDC
Alfresco Day Amsterdam 2015 - "Digital Transformation in the Netherlands", IDCAlfresco Day Amsterdam 2015 - "Digital Transformation in the Netherlands", IDC
Alfresco Day Amsterdam 2015 - "Digital Transformation in the Netherlands", IDC
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
The Search for Value: Five Trends Indigital Investment
The Search for Value: Five Trends Indigital InvestmentThe Search for Value: Five Trends Indigital Investment
The Search for Value: Five Trends Indigital Investment
 
ANZ SMS Synopsis
ANZ SMS SynopsisANZ SMS Synopsis
ANZ SMS Synopsis
 
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
 
Vodafone Internet of Things
Vodafone Internet of ThingsVodafone Internet of Things
Vodafone Internet of Things
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
 

Plus de Harry Gunns

Why understanding your attack surface matters
Why understanding your attack surface mattersWhy understanding your attack surface matters
Why understanding your attack surface mattersHarry Gunns
 
How major changes to the IT landscape are leading to new approaches in security
How major changes to the IT landscape are leading to new approaches in securityHow major changes to the IT landscape are leading to new approaches in security
How major changes to the IT landscape are leading to new approaches in securityHarry Gunns
 
Confusing the myths with some facts
Confusing the myths with some factsConfusing the myths with some facts
Confusing the myths with some factsHarry Gunns
 
Weaponised Information - Geoff White
Weaponised Information - Geoff WhiteWeaponised Information - Geoff White
Weaponised Information - Geoff WhiteHarry Gunns
 
Not becoming the next cybersecurity headline is difficult, very difficult - S...
Not becoming the next cybersecurity headline is difficult, very difficult - S...Not becoming the next cybersecurity headline is difficult, very difficult - S...
Not becoming the next cybersecurity headline is difficult, very difficult - S...Harry Gunns
 
Worry free security breach - Gemalto
Worry free security breach - GemaltoWorry free security breach - Gemalto
Worry free security breach - GemaltoHarry Gunns
 
Understanding your own data - Varonis
Understanding your own data - VaronisUnderstanding your own data - Varonis
Understanding your own data - VaronisHarry Gunns
 
Smart security people - Dominic White - SensePost
Smart security people - Dominic White - SensePostSmart security people - Dominic White - SensePost
Smart security people - Dominic White - SensePostHarry Gunns
 
Security Debt - Charl van der Walt - SecureData
Security Debt - Charl van der Walt - SecureDataSecurity Debt - Charl van der Walt - SecureData
Security Debt - Charl van der Walt - SecureDataHarry Gunns
 
Pick a password, any password - Wicus Ross - SensePost
Pick a password, any password - Wicus Ross - SensePostPick a password, any password - Wicus Ross - SensePost
Pick a password, any password - Wicus Ross - SensePostHarry Gunns
 
Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetHarry Gunns
 
Hacking our chairmans inbox - Charl van der Walt - SensePost
Hacking our chairmans inbox - Charl van der Walt - SensePostHacking our chairmans inbox - Charl van der Walt - SensePost
Hacking our chairmans inbox - Charl van der Walt - SensePostHarry Gunns
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check PointHarry Gunns
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - SymantecHarry Gunns
 
Cloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksCloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksHarry Gunns
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksHarry Gunns
 
AI & Machine Learning - Etienne Greeff - SecureData
AI & Machine Learning - Etienne Greeff - SecureDataAI & Machine Learning - Etienne Greeff - SecureData
AI & Machine Learning - Etienne Greeff - SecureDataHarry Gunns
 

Plus de Harry Gunns (17)

Why understanding your attack surface matters
Why understanding your attack surface mattersWhy understanding your attack surface matters
Why understanding your attack surface matters
 
How major changes to the IT landscape are leading to new approaches in security
How major changes to the IT landscape are leading to new approaches in securityHow major changes to the IT landscape are leading to new approaches in security
How major changes to the IT landscape are leading to new approaches in security
 
Confusing the myths with some facts
Confusing the myths with some factsConfusing the myths with some facts
Confusing the myths with some facts
 
Weaponised Information - Geoff White
Weaponised Information - Geoff WhiteWeaponised Information - Geoff White
Weaponised Information - Geoff White
 
Not becoming the next cybersecurity headline is difficult, very difficult - S...
Not becoming the next cybersecurity headline is difficult, very difficult - S...Not becoming the next cybersecurity headline is difficult, very difficult - S...
Not becoming the next cybersecurity headline is difficult, very difficult - S...
 
Worry free security breach - Gemalto
Worry free security breach - GemaltoWorry free security breach - Gemalto
Worry free security breach - Gemalto
 
Understanding your own data - Varonis
Understanding your own data - VaronisUnderstanding your own data - Varonis
Understanding your own data - Varonis
 
Smart security people - Dominic White - SensePost
Smart security people - Dominic White - SensePostSmart security people - Dominic White - SensePost
Smart security people - Dominic White - SensePost
 
Security Debt - Charl van der Walt - SecureData
Security Debt - Charl van der Walt - SecureDataSecurity Debt - Charl van der Walt - SecureData
Security Debt - Charl van der Walt - SecureData
 
Pick a password, any password - Wicus Ross - SensePost
Pick a password, any password - Wicus Ross - SensePostPick a password, any password - Wicus Ross - SensePost
Pick a password, any password - Wicus Ross - SensePost
 
Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - Fortinet
 
Hacking our chairmans inbox - Charl van der Walt - SensePost
Hacking our chairmans inbox - Charl van der Walt - SensePostHacking our chairmans inbox - Charl van der Walt - SensePost
Hacking our chairmans inbox - Charl van der Walt - SensePost
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
 
Cloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksCloud Security Primer - F5 Networks
Cloud Security Primer - F5 Networks
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
 
AI & Machine Learning - Etienne Greeff - SecureData
AI & Machine Learning - Etienne Greeff - SecureDataAI & Machine Learning - Etienne Greeff - SecureData
AI & Machine Learning - Etienne Greeff - SecureData
 

Dernier

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 

Dernier (20)

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 

Navigating the IT landscape - Thomas Meyer - IDC

  • 1. From IT Security to Digital Trust: Trends and Im peratives in a Digital World Thom as Meyer Group Vice President IDC Europe @tom txt © IDC
  • 2. © IDC 2 Revisiting the three mega -drivers 2 Dynamic Threat Landscape Regulatory Upheaval Digital Transformation
  • 3. The rise of digital transformation (DX) © IDC
  • 4. 4© IDC 89% of organizations have digital transformation as a business priority! DX dominates the business agenda
  • 5. Short Term DX DX initiatives are tied to enterprise strategy but with short -term focus Impromptu DX DX initiatives are tactical and disconnected from enterprise strategy LOB DX DX initiatives are initiated at the function or LOB level 8% 27% 23% 58% The Digitally Distracted DX is the Strategy The enterprise strategy is to use DX to transform markets with new business models and services Integrated Strategy Integrated, continuous enterprise wide DX innovation is in place 17%25% 42% The Digitally Determined IDC Global DX Leaders Survey. European sample, n = 405. May, 2018 Unified Digital Strategies Are Uncommon 5© IDC
  • 6. “In the future, the best selling car will be the most secure car. ” Brian Ward, CISO, Mercedes 6© IDC
  • 7. © IDC 7 Digital Transformation requires Digital Trust
  • 8. The digital platform will be the most important decision enterprises make this decade © IDC 8
  • 9. Islands of Innovation 3D Product DesignFraud MonitoringSelf Healing Assets Real Time Inventory Mgmt. Smart Warehouse Track and Trace Data as a Service Chat bots VR Product Interaction Mobile App P2P Payment Enterprise IT © IDC 9
  • 10. © IDC 10 By 2020 of the total European IoT Infrastructure spending will be on Edge Computing 15% Source: IDC European IoT Survey, October 2017, N = 1,360 At the Edge – Sensors/ connected devices At the Edge – Local gateway Real-tim e on- prem ise stream ing platform Real-tim e cloud- based stream ing platform Central on- prem ise data store/lake Central cloud-based data store/lake 33% 25% 27% 18% 31% 22% How does your organization analyze or plan to analyze its IoT data? IoT & EDGE Edge has a key role in IoT deploym ents
  • 11. A Platform for Digital Trust EXTERNAL PROCESSES Connected Processes Assets People INTERNAL PROCESSES Mobile IoT AR/VR BOT API INTELLIGENT CORE Cloud -based API strategies that orchestrate exchange of data across your ecosystem 1 New customer experience technologies that fully support customer and ecosystem-facing business models 3 Agile application architectures on PaaS using microservices and containers 2 Foundation for “digital trust ” through identity, vulnerability, and threat m anagem ent across all services 4 An intelligent core based on data m anagem ent, cognitive, artificial intelligence, and m achine learning 5 © IDC 11
  • 12. 12© IDC LEVEL 3  Digital Activity Reputation LEVEL 1  Internal IT Risk LEVEL 4  Organizational Reputation LEVEL 2  Shared IT Resource Risk What is digital trust?
  • 13. 13© IDC "Trust arrives by foot and leaves in a Ferrari." Mark Carney, Governor of the Bank of England
  • 14. 14© IDC What is the most important technology to your organisation ‘s digital transformation strategy in terms of investment?
  • 15. The Dynamic Threat Landscape requires Automated Threat Rem ediation © IDC
  • 16. 16© IDC Dynamic Threat Landscape requires Automated Threat Remediation
  • 17. © IDC 17 The Security Skills Shortage 17 “The security skills shortage affects (almost) everyone ” - Source: IDC European Security Strategies Survey Spotlight, 2017 I AM THE 97%
  • 18. © IDC 18 Impact of Skills Shortage Loss of IP Inability to m onitor/m anage the security environm ent Financial Loss 1 2 3 Source:IDC European Security Strategies Survey, 2017
  • 20. Addressing Technology Rationalisation 20© IDC Automation & Orchestration ’ Managed Security Services (MSS) Unified Security
  • 21. Next -gen Security: The Building Blocks 21© IDC 1. Unified Security
  • 22. © IDC 22 Complexity - the enemy of security (and business!)
  • 23. Unified Security 23© IDC Unified Security Technical Effectiveness Cost Effectiveness When considering security vendors, what is your primary driver for vendor selection? 28% 30% 42% Source: IDC's European IT Security Strategies Survey, 2017, n = 737
  • 24. Unified Security 24© IDC Technical Effectiveness Cost Effectiveness When considering security vendors, what is your primary driver for vendor selection? 28% 30% 42% Source: IDC's European IT Security Strategies Survey, 2017, n = 737 Unified Security Unified Security is the number one driver for security vendor selection
  • 25. 25© IDC Security should not be an island Focusing prioritisation (with apologies to the NIST Fram ework!) Risk Com plianceTechnology SECURITYCULTURE AND ORGANISATIONAL AWARENESS Security Business
  • 26. Next -gen Security: The Building Blocks 26© IDC 2. Automation And Orchestration
  • 27. © IDC 27 Skills gap or automation opportunity?
  • 28. Unlocking your analysts ’ potential! 28© IDC How do you expect your use of security automation to change? Source: IDC's European IT Security Strategies Survey, 2017, n = 737 1 Increase a lot, 17% 2 Increase a little, 55% 3 Stay the same, 27% 4 Decrease a little, 1% 5 Decrease a lot, 0%
  • 29. Unlocking your analysts ’ potential! 29© IDC How do you expect your use of security automation to change? Source: IDC's European IT Security Strategies Survey, 2017, n = 737 1 Increase a lot, 17% 2 Increase a little, 55% 3 Stay the same, 27% 4 Decrease a little, 1% 5 Decrease a lot, 0% 72% of enterprises plan to increase their use of security autom ation to som e extent Just 1% of enterprises plan to decrease the use of security autom ation
  • 30. 30© IDC 48% 7.5% To what level has your organisation adopted automation in their IT security management?
  • 31. Next -gen Security: The Building Blocks 31© IDC 3. Managed Security Services (MSS)
  • 32. MSS– the search for specialist capability & scale 32© IDC HELP! I NEED SOMEBODY HELP! NOT JUST ANYBODY
  • 33. MSS- don ’t just take our word for it! 33© IDC Does your organisation make use of third-party, external, security service providers? Source: IDC's European IT Security Strategies Survey, 2017, n = 737
  • 34. MSS- don ’t just take our word for it! 34© IDC Does your organisation make use of third-party, external, security service providers? 43% of enterprises plan to work with security service providers 46% of enterprises are already working with security service providers Source: IDC's European IT Security Strategies Survey, 2017, n = 737
  • 35. IDC’s Western European Security Forecast 35© IDC MSS is the fastest growing segment of the Western European security market Source: IDC’s Western European Security Spending Guide, October 2018 0.0% 4.0% 8.0% 12.0% 16.0% 2018 2019 2020 2021 2022 MSS SW PSS HW % Growth
  • 38. 38© IDC Did the meteor strike?
  • 40. Regulatory Upheaval requires Compliance Operationalisation 40© IDC
  • 41. 2017: #1 Barrier to AI Adoption in Europe? Source: IDC's Western Europe AI/Cognitive Solutions Survey, April 2017 (n = 350) Business Case 41© IDC
  • 42. 2018: #1 Barrier to AI Adoption? Source: IDC's Western Europe AI/Cognitive Solutions Survey, April 2018 (n = 350) Concerns About Data Compliance 42© IDC
  • 43. 43© IDC Visit us at IDC.com and follow us on Twitter: @IDC “Facebook is facing an existential crisis. It will now take a Herculean effort to restore public trust in Facebook's com m itm ent to privacy and data protection. … Outside observers think regulation has suddenly becom e m ore likely…”
  • 45. Your strategic priorities 45© IDC Digital Transformation requires Digital Trust Regulatory Upheaval requires Compliance Operationalisation Dynamic Threat Landscape requires Automated Threat Remediation
  • 46. Thomas Meyer Group Vice President IDC Europe Thank you! @tomtxt  tmeyer@idc.com