Contenu connexe
Similaire à Navigating the IT landscape - Thomas Meyer - IDC
Similaire à Navigating the IT landscape - Thomas Meyer - IDC (20)
Navigating the IT landscape - Thomas Meyer - IDC
- 1. From IT Security to Digital Trust:
Trends and Im peratives in a Digital World
Thom as Meyer
Group Vice President
IDC Europe
@tom txt
© IDC
- 2. © IDC 2
Revisiting the three mega -drivers
2
Dynamic
Threat
Landscape
Regulatory
Upheaval Digital
Transformation
- 5. Short Term DX
DX initiatives are
tied to enterprise
strategy but with
short -term focus
Impromptu DX
DX initiatives are
tactical and
disconnected from
enterprise strategy
LOB DX
DX initiatives are
initiated at the
function or LOB
level
8% 27% 23%
58%
The Digitally Distracted
DX is the Strategy
The enterprise
strategy is to use
DX to transform
markets with new
business models
and services
Integrated Strategy
Integrated,
continuous
enterprise wide
DX innovation is
in place
17%25%
42%
The Digitally Determined
IDC Global DX Leaders Survey. European sample, n = 405. May, 2018
Unified Digital Strategies Are Uncommon
5© IDC
- 6. “In the future, the best
selling car will be the
most secure car. ”
Brian Ward, CISO, Mercedes
6© IDC
- 9. Islands of Innovation
3D Product
DesignFraud MonitoringSelf Healing
Assets
Real Time
Inventory Mgmt.
Smart Warehouse
Track
and Trace
Data as a Service
Chat
bots
VR Product
Interaction
Mobile App
P2P Payment
Enterprise IT
© IDC 9
- 10. © IDC 10
By 2020
of the total European
IoT Infrastructure
spending will be on Edge
Computing
15%
Source: IDC European IoT Survey, October 2017, N = 1,360
At the Edge –
Sensors/
connected devices
At the Edge –
Local gateway
Real-tim e on-
prem ise
stream ing
platform
Real-tim e cloud-
based stream ing
platform
Central on-
prem ise data
store/lake
Central cloud-based
data store/lake
33% 25% 27% 18% 31% 22%
How does your organization analyze or plan to
analyze its IoT data?
IoT & EDGE
Edge has a key role in IoT deploym ents
- 11. A Platform for Digital Trust
EXTERNAL
PROCESSES
Connected
Processes
Assets
People
INTERNAL
PROCESSES
Mobile
IoT
AR/VR
BOT
API
INTELLIGENT
CORE
Cloud -based API
strategies that
orchestrate
exchange of data
across your
ecosystem
1
New customer
experience
technologies that
fully support
customer and
ecosystem-facing
business models
3
Agile application
architectures on
PaaS using
microservices and
containers
2
Foundation for
“digital trust ”
through identity,
vulnerability, and
threat m anagem ent
across all services
4
An intelligent core
based on data
m anagem ent,
cognitive, artificial
intelligence, and
m achine learning
5
© IDC 11
- 12. 12© IDC
LEVEL 3
Digital Activity Reputation
LEVEL 1
Internal IT Risk
LEVEL 4
Organizational Reputation
LEVEL 2
Shared IT Resource Risk
What is digital trust?
- 14. 14© IDC
What is the most important
technology to your organisation ‘s digital
transformation strategy in terms of
investment?
- 17. © IDC 17
The Security Skills Shortage
17
“The security skills shortage
affects (almost) everyone ”
- Source: IDC European Security Strategies
Survey Spotlight, 2017
I AM
THE
97%
- 18. © IDC 18
Impact of Skills Shortage
Loss of IP
Inability to m onitor/m anage the
security environm ent
Financial Loss
1
2
3
Source:IDC European Security Strategies Survey, 2017
- 23. Unified Security
23© IDC
Unified Security
Technical
Effectiveness
Cost
Effectiveness
When considering security vendors, what is your primary driver for vendor selection?
28%
30%
42%
Source: IDC's European IT Security Strategies Survey, 2017, n = 737
- 25. 25© IDC
Security should not be an island
Focusing prioritisation (with apologies to the NIST Fram ework!)
Risk Com plianceTechnology
SECURITYCULTURE AND ORGANISATIONAL AWARENESS
Security Business
- 28. Unlocking your analysts ’ potential!
28© IDC
How do you expect your use of security automation to change?
Source: IDC's European IT Security Strategies Survey, 2017, n = 737
1 Increase a
lot, 17%
2 Increase a
little, 55%
3 Stay the
same, 27%
4 Decrease a
little, 1%
5 Decrease a
lot, 0%
- 29. Unlocking your analysts ’ potential!
29© IDC
How do you expect your use of security automation to change?
Source: IDC's European IT Security Strategies Survey, 2017, n = 737
1 Increase a
lot, 17%
2 Increase a
little, 55%
3 Stay the
same, 27%
4 Decrease a
little, 1%
5 Decrease a
lot, 0%
72% of enterprises
plan to increase
their use of security
autom ation to som e
extent
Just 1% of
enterprises plan to
decrease the use of
security autom ation
- 32. MSS– the search for specialist capability & scale
32© IDC
HELP!
I NEED SOMEBODY
HELP!
NOT JUST ANYBODY
- 33. MSS- don ’t just take our word for it!
33© IDC
Does your organisation make use of third-party, external, security service providers?
Source: IDC's European IT Security Strategies Survey, 2017, n = 737
- 34. MSS- don ’t just take our word for it!
34© IDC
Does your organisation make use of third-party, external, security service providers?
43% of enterprises
plan to work with
security service
providers
46% of enterprises
are already working
with security service
providers
Source: IDC's European IT Security Strategies Survey, 2017, n = 737
- 35. IDC’s Western European Security Forecast
35© IDC
MSS is the fastest growing segment of the Western European security market
Source: IDC’s Western European Security Spending Guide, October 2018
0.0%
4.0%
8.0%
12.0%
16.0%
2018 2019 2020 2021 2022
MSS SW PSS HW
% Growth
- 41. 2017: #1 Barrier to
AI Adoption in
Europe?
Source: IDC's Western Europe AI/Cognitive Solutions Survey, April 2017 (n = 350)
Business Case
41© IDC
- 42. 2018: #1 Barrier to
AI Adoption?
Source: IDC's Western Europe AI/Cognitive Solutions Survey, April 2018 (n = 350)
Concerns About
Data Compliance
42© IDC
- 43. 43© IDC Visit us at IDC.com and follow us on
Twitter: @IDC
“Facebook is facing an existential
crisis.
It will now take a Herculean effort to
restore public trust in Facebook's
com m itm ent to privacy and data
protection. … Outside observers
think regulation has suddenly
becom e m ore likely…”
- 45. Your strategic priorities
45© IDC
Digital Transformation
requires
Digital Trust
Regulatory Upheaval
requires
Compliance Operationalisation
Dynamic Threat Landscape
requires
Automated Threat Remediation