SlideShare une entreprise Scribd logo
1  sur  8
A new IT-risk culture for Digital Transformation
Milan, May 11, 2017
Redux Version
The market is under pressure
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 2
Source: IDC, 2016 (n=98, companies with more than 50 employees in Italy; weighted extrapolation)
10 OR MORE DATA BREACHES
5-9 DATA BREACHES
3-4 DATA BREACHES
1-2 DATA BREACHES
0% 5% 10% 15% 20%
About 40% knows they have been breached
Who is adopting new IT Security tech is dealing
with specific challenges
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 3
0% 20% 40% 60%
COMPETING WITH CLOUD RESOURCES USED/SHADOW IT
HIGH LEVEL OF DEMAND FOR NEW BUSINESS SERVICES
FRAGMENTATION OR LACK OF INTEGRATION OF SECURITY PRODUCT PORTFOLIO
JUGGLING CONFLICTING PRIORITIES
NOT ENOUGH INTEGRATION INTO THE IT INFRASTRUCTURE TEAMS
LACK OF INSIGHT INTO SECURITY SENSITIVE ACTIVITIES
SKILLS SHORTAGES
OPERATIONS RESOURCES ARE TOO BUSY ON ROUTINE OPERATIONS
BUDGET CONSTRAINTS
What is challenging the development of IT Security
Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
Measuring risks is a proof of your risk aversion
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 4
Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
0%
20%
40%
60%
80%
INTERNAL
COMMUNICATIONS
PLAN
BREACH
NOTIFICATION
PLAN
BREACH
REMEDIATION
PLAN
RESPONSE
PLAN
A FORMAL RISK
ASSESSMENT
EXTERNAL
COMMUNICATIONS
AND PUBLIC
RELATIONS PLAN
CYBER RISK
INSURANCE
Risk management practice currently in use
Risk averse (n=64) Risk propense (n=35)
© IDC Visit us at IDC.com and follow us on Twitter: @IDC
5
TIME (MONTHS) TO MAINSTREAM
ORGANIZATIONALIMPACT
Asingle
department
orabusinessunit
Multiple
departments
orbusinessunitsCompanywide
0-12 12-24 24+
1
2
3
4
5
6
7
8
9
10
[CELLRANGE
]
[CELLRANG
E]
[CELLRANG
E]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE
]
[CELLRANGE]
[CELLRAN
GE]
[CELLRA
NGE]
[CELLRANGE]
IDC FutureScape 2017
Security Products and Services, Western Europe Implications
1
2
3
4
5
6
7
8
9
10
By 2021, 50% of all online transactions will incorporate biometric
authentication driven by a ubiquitous technology infrastructure
that enables low implementation costs and broad user
acceptance.
By 2019, more than 75% of IoT device manufacturers will
improve their security and privacy capabilities, making them
more trustworthy partners for technology buyers.
By 2019, 60% of major multinational corporations with ties to
Europe will face significant cybersecurity attacks aimed at
disruption of commodities.
Over the next 18 months, 85% of consumers in Western
European nations will defect from a business because their
personally identifiable information is impacted in a security
breach.
By 2019, 70% of Western European enterprise cybersecurity
environments will incorporate cognitive/AI technologies to assist
humans in dealing with the vastly increasing scale and complexity of
cyberthreats.
By 2018, 50% of enterprise customers will leverage analytics as
a service to help solve the challenge of combing through
security-related data and events.
By 2020, cloud security gateway functionality will begin to be
integrated as part of web service offerings to entice IT leaders to
move offerings to the cloud.
By 2020, 25% of Western European broadband homes will have
at least one IP-enabled home automation or security monitoring
sensor/device.
By 2021, 60% of Western European enterprises will invest in
incident response retainers.
By 2020, more than 25% of Western European enterprises will
secure their IT architectures through cloud, hosted, or SaaS
security services.
Note: The size of the bubble indicates complexity/cost to address.
Source: IDC, 2016
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 6
Risk posture has an impact on the adoption
of new security technologies
Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
15%
35%
55%
75%
THREAT INTELLIGENCE SERVICES MICRO SEGMENTATION AI/HEURISTICS
Currently using security technologies by risk posture
Risk propense (n=35) Risk averse (n=64)
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 7
40%
52%
64%
76%
KNOWLEDGE OF
OBLIGATIONS
IMPLEMENTATION
PLANNING
PENALTIES MITIGATION
BASED ON EARLY
DETECTION/REMEDIATION
CONTINUOUS
IMPROVEMENT
IMPLEMENTATION
EXECUTION
ASSESSMENT OF
CAPABILITIES AND GAPS
Higherpreparednessscore(4to5)
Preparedness to GDPR
Risk propense (n=35) Risk averse (n=64)
GDPR implementation will also depend on
the actual perception of risks
Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 8
IDC Italia
Viale Monza 14
20127 Milano
Tel: +39 02 28457339
gvercellino@idc.com
Giancarlo Vercellino
Research & Consulting
Manager
IDC Italy
www.idc.com

Contenu connexe

Tendances

Data Intelligence: come abilitare il valore aziendale
Data Intelligence: come abilitare il valore aziendaleData Intelligence: come abilitare il valore aziendale
Data Intelligence: come abilitare il valore aziendaleIDC Italy
 
CeBIT IoT Forum (2017)
CeBIT IoT Forum (2017)CeBIT IoT Forum (2017)
CeBIT IoT Forum (2017)Marc Jadoul
 
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...IDC Italy
 
Oies IoT World Europe 20170615
Oies IoT World Europe 20170615Oies IoT World Europe 20170615
Oies IoT World Europe 20170615Francisco Maroto
 
Connected Cars Europe keynote (2017)
Connected Cars Europe keynote (2017)Connected Cars Europe keynote (2017)
Connected Cars Europe keynote (2017)Marc Jadoul
 
Internet of Things in 10 slides
Internet of Things in 10 slides Internet of Things in 10 slides
Internet of Things in 10 slides Francisco Maroto
 
VDE Smart Cities (2016)
VDE Smart Cities (2016)VDE Smart Cities (2016)
VDE Smart Cities (2016)Marc Jadoul
 
CCWTR Press Deck Completo
CCWTR Press Deck CompletoCCWTR Press Deck Completo
CCWTR Press Deck CompletoFelipe Lamus
 
Presentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise ArchitecturePresentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise ArchitectureFrancisco Maroto
 
ETSI IoT keynote (2016)
ETSI IoT keynote (2016)ETSI IoT keynote (2016)
ETSI IoT keynote (2016)Marc Jadoul
 
5 Factors in Modern Data Design
5 Factors in Modern Data Design5 Factors in Modern Data Design
5 Factors in Modern Data DesignDan Sexton
 
Israel @ MWC 2017 catalogue
Israel @ MWC 2017 catalogueIsrael @ MWC 2017 catalogue
Israel @ MWC 2017 catalogueMarc Hodara
 
Gartner: Top 10 Strategic Technology Trends 2016
Gartner: Top 10 Strategic Technology Trends 2016Gartner: Top 10 Strategic Technology Trends 2016
Gartner: Top 10 Strategic Technology Trends 2016Den Reymer
 
Business Analytics and the Internet of Things
Business Analytics and the Internet of ThingsBusiness Analytics and the Internet of Things
Business Analytics and the Internet of ThingsMark Benson
 
Industrial IoT Market Winter 2018
Industrial IoT Market Winter 2018Industrial IoT Market Winter 2018
Industrial IoT Market Winter 2018Dan Sexton
 
L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...
L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...
L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...IDC Italy
 
The Rise of Platforms in the IoT
The Rise of Platforms in the IoTThe Rise of Platforms in the IoT
The Rise of Platforms in the IoTMark Benson
 

Tendances (20)

Data Intelligence: come abilitare il valore aziendale
Data Intelligence: come abilitare il valore aziendaleData Intelligence: come abilitare il valore aziendale
Data Intelligence: come abilitare il valore aziendale
 
CeBIT IoT Forum (2017)
CeBIT IoT Forum (2017)CeBIT IoT Forum (2017)
CeBIT IoT Forum (2017)
 
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
 
Oies IoT World Europe 20170615
Oies IoT World Europe 20170615Oies IoT World Europe 20170615
Oies IoT World Europe 20170615
 
Connected Cars Europe keynote (2017)
Connected Cars Europe keynote (2017)Connected Cars Europe keynote (2017)
Connected Cars Europe keynote (2017)
 
Go+ product
Go+ productGo+ product
Go+ product
 
Internet of Things in 10 slides
Internet of Things in 10 slides Internet of Things in 10 slides
Internet of Things in 10 slides
 
VDE Smart Cities (2016)
VDE Smart Cities (2016)VDE Smart Cities (2016)
VDE Smart Cities (2016)
 
CCWTR Press Deck Completo
CCWTR Press Deck CompletoCCWTR Press Deck Completo
CCWTR Press Deck Completo
 
Presentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise ArchitecturePresentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise Architecture
 
Predictions idc2013
Predictions idc2013Predictions idc2013
Predictions idc2013
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
ETSI IoT keynote (2016)
ETSI IoT keynote (2016)ETSI IoT keynote (2016)
ETSI IoT keynote (2016)
 
5 Factors in Modern Data Design
5 Factors in Modern Data Design5 Factors in Modern Data Design
5 Factors in Modern Data Design
 
Israel @ MWC 2017 catalogue
Israel @ MWC 2017 catalogueIsrael @ MWC 2017 catalogue
Israel @ MWC 2017 catalogue
 
Gartner: Top 10 Strategic Technology Trends 2016
Gartner: Top 10 Strategic Technology Trends 2016Gartner: Top 10 Strategic Technology Trends 2016
Gartner: Top 10 Strategic Technology Trends 2016
 
Business Analytics and the Internet of Things
Business Analytics and the Internet of ThingsBusiness Analytics and the Internet of Things
Business Analytics and the Internet of Things
 
Industrial IoT Market Winter 2018
Industrial IoT Market Winter 2018Industrial IoT Market Winter 2018
Industrial IoT Market Winter 2018
 
L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...
L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...
L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...
 
The Rise of Platforms in the IoT
The Rise of Platforms in the IoTThe Rise of Platforms in the IoT
The Rise of Platforms in the IoT
 

Similaire à Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazione digitale

Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCHarry Gunns
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomyCisco Russia
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
Manage the IT risk in the era of Industrial Internet
Manage the IT risk in the era of Industrial InternetManage the IT risk in the era of Industrial Internet
Manage the IT risk in the era of Industrial InternetIDC Italy
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomIBM Security
 
Retail Week: Cloud Security
Retail Week: Cloud SecurityRetail Week: Cloud Security
Retail Week: Cloud SecurityDatapipe
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
Effecientip DNS security.pdf
Effecientip DNS security.pdfEffecientip DNS security.pdf
Effecientip DNS security.pdfneoalt
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Eoin Keary
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.Onwubiko Emmanuel
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosErin_Jelecos
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroPrime Infoserv
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...TechSoup
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Enterprise Management Associates
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 

Similaire à Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazione digitale (20)

Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDC
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital Economy
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
Manage the IT risk in the era of Industrial Internet
Manage the IT risk in the era of Industrial InternetManage the IT risk in the era of Industrial Internet
Manage the IT risk in the era of Industrial Internet
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
Retail Week: Cloud Security
Retail Week: Cloud SecurityRetail Week: Cloud Security
Retail Week: Cloud Security
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
Effecientip DNS security.pdf
Effecientip DNS security.pdfEffecientip DNS security.pdf
Effecientip DNS security.pdf
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - Jelecos
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 

Plus de IDC Italy

Innovare alla velocità del cloud: la rivoluzione multicloud
Innovare alla velocità del cloud: la rivoluzione multicloudInnovare alla velocità del cloud: la rivoluzione multicloud
Innovare alla velocità del cloud: la rivoluzione multicloudIDC Italy
 
Sogno di una fabbrica digitale
Sogno di una fabbrica digitaleSogno di una fabbrica digitale
Sogno di una fabbrica digitaleIDC Italy
 
Il nuovo data center, un’infrastruttura digitale agile e distribuita
Il nuovo data center, un’infrastruttura digitale agile e distribuitaIl nuovo data center, un’infrastruttura digitale agile e distribuita
Il nuovo data center, un’infrastruttura digitale agile e distribuitaIDC Italy
 
Cognitive/AI: views, perspectives & directions
Cognitive/AI: views, perspectives & directionsCognitive/AI: views, perspectives & directions
Cognitive/AI: views, perspectives & directionsIDC Italy
 
Enterprise Mobility Blends Next-Gen Technologies
Enterprise Mobility Blends Next-Gen TechnologiesEnterprise Mobility Blends Next-Gen Technologies
Enterprise Mobility Blends Next-Gen TechnologiesIDC Italy
 
Digital Native Enterprise: Disrupt to Transform, Transform to Succeed
Digital Native Enterprise: Disrupt to Transform, Transform to SucceedDigital Native Enterprise: Disrupt to Transform, Transform to Succeed
Digital Native Enterprise: Disrupt to Transform, Transform to SucceedIDC Italy
 
Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...
Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...
Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...IDC Italy
 
Adattare l'organizzazione IT alla trasformazione digitale
Adattare l'organizzazione IT alla trasformazione digitaleAdattare l'organizzazione IT alla trasformazione digitale
Adattare l'organizzazione IT alla trasformazione digitaleIDC Italy
 
Rinnovare il Retail: Piattaforma, Esperienza e Innovazione
Rinnovare il Retail: Piattaforma, Esperienza e InnovazioneRinnovare il Retail: Piattaforma, Esperienza e Innovazione
Rinnovare il Retail: Piattaforma, Esperienza e InnovazioneIDC Italy
 
Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...
Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...
Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...IDC Italy
 
The Cognitive Edge: A New Competitive Advantage
The Cognitive Edge: A New Competitive AdvantageThe Cognitive Edge: A New Competitive Advantage
The Cognitive Edge: A New Competitive AdvantageIDC Italy
 
Open your Transformation, Define your Evolution
Open your Transformation, Define your EvolutionOpen your Transformation, Define your Evolution
Open your Transformation, Define your EvolutionIDC Italy
 
Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...
Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...
Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...IDC Italy
 
Superare gli ostacoli al cambiamento nel percorso di trasformazione digitale
Superare gli ostacoli al cambiamento nel percorso di trasformazione digitaleSuperare gli ostacoli al cambiamento nel percorso di trasformazione digitale
Superare gli ostacoli al cambiamento nel percorso di trasformazione digitaleIDC Italy
 
Mobile Strategy in Digital Environment: the Mindset Shift
Mobile Strategy in Digital Environment: the Mindset ShiftMobile Strategy in Digital Environment: the Mindset Shift
Mobile Strategy in Digital Environment: the Mindset ShiftIDC Italy
 
IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...
IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...
IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...IDC Italy
 
The Analytic Gap – Matching decision making with data analytics
The Analytic Gap – Matching decision making with data analytics The Analytic Gap – Matching decision making with data analytics
The Analytic Gap – Matching decision making with data analytics IDC Italy
 
Digital Analytics
Digital AnalyticsDigital Analytics
Digital AnalyticsIDC Italy
 
Digitalisation Now
Digitalisation NowDigitalisation Now
Digitalisation NowIDC Italy
 
Next Generation Field Service Management
Next Generation Field Service ManagementNext Generation Field Service Management
Next Generation Field Service ManagementIDC Italy
 

Plus de IDC Italy (20)

Innovare alla velocità del cloud: la rivoluzione multicloud
Innovare alla velocità del cloud: la rivoluzione multicloudInnovare alla velocità del cloud: la rivoluzione multicloud
Innovare alla velocità del cloud: la rivoluzione multicloud
 
Sogno di una fabbrica digitale
Sogno di una fabbrica digitaleSogno di una fabbrica digitale
Sogno di una fabbrica digitale
 
Il nuovo data center, un’infrastruttura digitale agile e distribuita
Il nuovo data center, un’infrastruttura digitale agile e distribuitaIl nuovo data center, un’infrastruttura digitale agile e distribuita
Il nuovo data center, un’infrastruttura digitale agile e distribuita
 
Cognitive/AI: views, perspectives & directions
Cognitive/AI: views, perspectives & directionsCognitive/AI: views, perspectives & directions
Cognitive/AI: views, perspectives & directions
 
Enterprise Mobility Blends Next-Gen Technologies
Enterprise Mobility Blends Next-Gen TechnologiesEnterprise Mobility Blends Next-Gen Technologies
Enterprise Mobility Blends Next-Gen Technologies
 
Digital Native Enterprise: Disrupt to Transform, Transform to Succeed
Digital Native Enterprise: Disrupt to Transform, Transform to SucceedDigital Native Enterprise: Disrupt to Transform, Transform to Succeed
Digital Native Enterprise: Disrupt to Transform, Transform to Succeed
 
Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...
Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...
Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...
 
Adattare l'organizzazione IT alla trasformazione digitale
Adattare l'organizzazione IT alla trasformazione digitaleAdattare l'organizzazione IT alla trasformazione digitale
Adattare l'organizzazione IT alla trasformazione digitale
 
Rinnovare il Retail: Piattaforma, Esperienza e Innovazione
Rinnovare il Retail: Piattaforma, Esperienza e InnovazioneRinnovare il Retail: Piattaforma, Esperienza e Innovazione
Rinnovare il Retail: Piattaforma, Esperienza e Innovazione
 
Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...
Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...
Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...
 
The Cognitive Edge: A New Competitive Advantage
The Cognitive Edge: A New Competitive AdvantageThe Cognitive Edge: A New Competitive Advantage
The Cognitive Edge: A New Competitive Advantage
 
Open your Transformation, Define your Evolution
Open your Transformation, Define your EvolutionOpen your Transformation, Define your Evolution
Open your Transformation, Define your Evolution
 
Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...
Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...
Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...
 
Superare gli ostacoli al cambiamento nel percorso di trasformazione digitale
Superare gli ostacoli al cambiamento nel percorso di trasformazione digitaleSuperare gli ostacoli al cambiamento nel percorso di trasformazione digitale
Superare gli ostacoli al cambiamento nel percorso di trasformazione digitale
 
Mobile Strategy in Digital Environment: the Mindset Shift
Mobile Strategy in Digital Environment: the Mindset ShiftMobile Strategy in Digital Environment: the Mindset Shift
Mobile Strategy in Digital Environment: the Mindset Shift
 
IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...
IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...
IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...
 
The Analytic Gap – Matching decision making with data analytics
The Analytic Gap – Matching decision making with data analytics The Analytic Gap – Matching decision making with data analytics
The Analytic Gap – Matching decision making with data analytics
 
Digital Analytics
Digital AnalyticsDigital Analytics
Digital Analytics
 
Digitalisation Now
Digitalisation NowDigitalisation Now
Digitalisation Now
 
Next Generation Field Service Management
Next Generation Field Service ManagementNext Generation Field Service Management
Next Generation Field Service Management
 

Dernier

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 

Dernier (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 

Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazione digitale

  • 1. A new IT-risk culture for Digital Transformation Milan, May 11, 2017 Redux Version
  • 2. The market is under pressure © IDC Visit us at IDC.com and follow us on Twitter: @IDC 2 Source: IDC, 2016 (n=98, companies with more than 50 employees in Italy; weighted extrapolation) 10 OR MORE DATA BREACHES 5-9 DATA BREACHES 3-4 DATA BREACHES 1-2 DATA BREACHES 0% 5% 10% 15% 20% About 40% knows they have been breached
  • 3. Who is adopting new IT Security tech is dealing with specific challenges © IDC Visit us at IDC.com and follow us on Twitter: @IDC 3 0% 20% 40% 60% COMPETING WITH CLOUD RESOURCES USED/SHADOW IT HIGH LEVEL OF DEMAND FOR NEW BUSINESS SERVICES FRAGMENTATION OR LACK OF INTEGRATION OF SECURITY PRODUCT PORTFOLIO JUGGLING CONFLICTING PRIORITIES NOT ENOUGH INTEGRATION INTO THE IT INFRASTRUCTURE TEAMS LACK OF INSIGHT INTO SECURITY SENSITIVE ACTIVITIES SKILLS SHORTAGES OPERATIONS RESOURCES ARE TOO BUSY ON ROUTINE OPERATIONS BUDGET CONSTRAINTS What is challenging the development of IT Security Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
  • 4. Measuring risks is a proof of your risk aversion © IDC Visit us at IDC.com and follow us on Twitter: @IDC 4 Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation) 0% 20% 40% 60% 80% INTERNAL COMMUNICATIONS PLAN BREACH NOTIFICATION PLAN BREACH REMEDIATION PLAN RESPONSE PLAN A FORMAL RISK ASSESSMENT EXTERNAL COMMUNICATIONS AND PUBLIC RELATIONS PLAN CYBER RISK INSURANCE Risk management practice currently in use Risk averse (n=64) Risk propense (n=35)
  • 5. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 5 TIME (MONTHS) TO MAINSTREAM ORGANIZATIONALIMPACT Asingle department orabusinessunit Multiple departments orbusinessunitsCompanywide 0-12 12-24 24+ 1 2 3 4 5 6 7 8 9 10 [CELLRANGE ] [CELLRANG E] [CELLRANG E] [CELLRANGE] [CELLRANGE] [CELLRANGE ] [CELLRANGE] [CELLRAN GE] [CELLRA NGE] [CELLRANGE] IDC FutureScape 2017 Security Products and Services, Western Europe Implications 1 2 3 4 5 6 7 8 9 10 By 2021, 50% of all online transactions will incorporate biometric authentication driven by a ubiquitous technology infrastructure that enables low implementation costs and broad user acceptance. By 2019, more than 75% of IoT device manufacturers will improve their security and privacy capabilities, making them more trustworthy partners for technology buyers. By 2019, 60% of major multinational corporations with ties to Europe will face significant cybersecurity attacks aimed at disruption of commodities. Over the next 18 months, 85% of consumers in Western European nations will defect from a business because their personally identifiable information is impacted in a security breach. By 2019, 70% of Western European enterprise cybersecurity environments will incorporate cognitive/AI technologies to assist humans in dealing with the vastly increasing scale and complexity of cyberthreats. By 2018, 50% of enterprise customers will leverage analytics as a service to help solve the challenge of combing through security-related data and events. By 2020, cloud security gateway functionality will begin to be integrated as part of web service offerings to entice IT leaders to move offerings to the cloud. By 2020, 25% of Western European broadband homes will have at least one IP-enabled home automation or security monitoring sensor/device. By 2021, 60% of Western European enterprises will invest in incident response retainers. By 2020, more than 25% of Western European enterprises will secure their IT architectures through cloud, hosted, or SaaS security services. Note: The size of the bubble indicates complexity/cost to address. Source: IDC, 2016
  • 6. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 6 Risk posture has an impact on the adoption of new security technologies Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation) 15% 35% 55% 75% THREAT INTELLIGENCE SERVICES MICRO SEGMENTATION AI/HEURISTICS Currently using security technologies by risk posture Risk propense (n=35) Risk averse (n=64)
  • 7. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 7 40% 52% 64% 76% KNOWLEDGE OF OBLIGATIONS IMPLEMENTATION PLANNING PENALTIES MITIGATION BASED ON EARLY DETECTION/REMEDIATION CONTINUOUS IMPROVEMENT IMPLEMENTATION EXECUTION ASSESSMENT OF CAPABILITIES AND GAPS Higherpreparednessscore(4to5) Preparedness to GDPR Risk propense (n=35) Risk averse (n=64) GDPR implementation will also depend on the actual perception of risks Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
  • 8. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 8 IDC Italia Viale Monza 14 20127 Milano Tel: +39 02 28457339 gvercellino@idc.com Giancarlo Vercellino Research & Consulting Manager IDC Italy www.idc.com