Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators

319 views

Published on

Abstract della presentazione di Giancarlo Vercellino, Research & Consulting Manager di IDC Italia, tenuta nel corso dell'evento Outthink Threats a Roma il 6 luglio 2016

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators

  1. 1. New models for IT Security: how Innovation Accelerators are changing the game
  2. 2. IDC Tech Vision in a changing world © IDC Visit us at IDC.com and follow us on Twitter: @IDC 2 About 26% already moving at least on one About 67% evaluating/ considering/ planning About 7% no interest/ plan at all Source: IDC 2015 Western European Software Survey (n=223, different within groups/ items, employees > 50, weighted extrapolation) Source: InformationWeek, Digital innovators 2015 Top100, IDC eleboration
  3. 3. Digital Transformation is affecting IT Security © IDC Visit us at IDC.com and follow us on Twitter: @IDC 3 Source: IDC, 2015 (n=223, companies with more than 50 employees; weighted extrapolation)
  4. 4. The weakest point in the chain … Top 7 Human Risks 1. Phishability 2. Not Patching or Using Outdated Systems 3. Posting too much information about self or work 4. Reusing passwords across sites 5. Indiscriminate user of mobile media 6. Lack of situational awareness (believing they are not a target) 7. Accidental loss or disclosure of sensitive information Council for Cybersecurity 5 Accept that breaches are inevitable
  5. 5. Fake Fears vs. True Fears © IDC Visit us at IDC.com and follow us on Twitter: @IDC 5 Source: IDC Italy, September 2015 (n=100; employees > 100; different within groups/ items; weighted extrapolation) What do you really REALLY fear?
  6. 6. 1. Biometric Authentication 2. Supply Chain Risks 3. Self-Defending Applications 4. Data Breach Impact 5. Insuring Against Risk 6. Security Analytics Services 7. Data Protection Regulations 8. Modern Security Architecture 9. SaaS Security Services 10. Accountability Practices Source: IDC FutureScape: Worldwide IT Security Products and Security Services 2015 Predictions — Moving Toward Security Integration, #253026 Note: The size of the bubble indicates complexity/cost to address. Source: IDC, 2016 TIME (MONTHS) TO MAINSTREAM ORGANIZATIONALIMPACT Asingledepartment orabusinessunit Multipledepartments orbusinessunits Companywide 0-12 12-24 24+ EU Data Protection Regulations Biometric Authenticated Transactions Corporate Responsibility Security Analytics as a Service Supply Chain Risks SaaS Security Adoption Self-defending Applications Tracers & Tethers Data Breach Impact 10 4 3 8 1 97 2 6 Cyber Insurance Maturity 5 The future of Security Spending
  7. 7. From Cloud to Intelligence to Cognitive © IDC Visit us at IDC.com and follow us on Twitter: @IDC 7 Source: IDC Software Survey 2015 (Italian sample n=223; employees > 50; weighted extrapolation) and IDC Italy Predictive Security Conference (n=85; weighted extrapolation) CSOs need tools to reduce complexities
  8. 8. Main challenges for the introduction of new Security technologies © IDC Visit us at IDC.com and follow us on Twitter: @IDC 8 IDC Italy Predictive Security Conference (n=85; weighted extrapolation)
  9. 9. Security challenges are significant within the Public Sectors © IDC Visit us at IDC.com and follow us on Twitter: @IDC 9 Source: IDC Italy, September 2015 (n=100; employees > 100; different within groups/ items; weighted extrapolation)
  10. 10. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 10 IDC Italia Viale Monza 14 20127 Milano Tel: +39 02 28457339 gvercellino@idc.com Giancarlo Vercellino Research & Consulting Manager IDC Italy www.idc.com

×