SlideShare a Scribd company logo
1 of 8
A new IT-risk culture for Digital Transformation
Milan, May 11, 2017
Redux Version
The market is under pressure
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 2
Source: IDC, 2016 (n=98, companies with more than 50 employees in Italy; weighted extrapolation)
10 OR MORE DATA BREACHES
5-9 DATA BREACHES
3-4 DATA BREACHES
1-2 DATA BREACHES
0% 5% 10% 15% 20%
About 40% knows they have been breached
Who is adopting new IT Security tech is dealing
with specific challenges
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 3
0% 20% 40% 60%
COMPETING WITH CLOUD RESOURCES USED/SHADOW IT
HIGH LEVEL OF DEMAND FOR NEW BUSINESS SERVICES
FRAGMENTATION OR LACK OF INTEGRATION OF SECURITY PRODUCT PORTFOLIO
JUGGLING CONFLICTING PRIORITIES
NOT ENOUGH INTEGRATION INTO THE IT INFRASTRUCTURE TEAMS
LACK OF INSIGHT INTO SECURITY SENSITIVE ACTIVITIES
SKILLS SHORTAGES
OPERATIONS RESOURCES ARE TOO BUSY ON ROUTINE OPERATIONS
BUDGET CONSTRAINTS
What is challenging the development of IT Security
Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
Measuring risks is a proof of your risk aversion
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 4
Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
0%
20%
40%
60%
80%
INTERNAL
COMMUNICATIONS
PLAN
BREACH
NOTIFICATION
PLAN
BREACH
REMEDIATION
PLAN
RESPONSE
PLAN
A FORMAL RISK
ASSESSMENT
EXTERNAL
COMMUNICATIONS
AND PUBLIC
RELATIONS PLAN
CYBER RISK
INSURANCE
Risk management practice currently in use
Risk averse (n=64) Risk propense (n=35)
© IDC Visit us at IDC.com and follow us on Twitter: @IDC
5
TIME (MONTHS) TO MAINSTREAM
ORGANIZATIONALIMPACT
Asingle
department
orabusinessunit
Multiple
departments
orbusinessunitsCompanywide
0-12 12-24 24+
1
2
3
4
5
6
7
8
9
10
[CELLRANGE
]
[CELLRANG
E]
[CELLRANG
E]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE
]
[CELLRANGE]
[CELLRAN
GE]
[CELLRA
NGE]
[CELLRANGE]
IDC FutureScape 2017
Security Products and Services, Western Europe Implications
1
2
3
4
5
6
7
8
9
10
By 2021, 50% of all online transactions will incorporate biometric
authentication driven by a ubiquitous technology infrastructure
that enables low implementation costs and broad user
acceptance.
By 2019, more than 75% of IoT device manufacturers will
improve their security and privacy capabilities, making them
more trustworthy partners for technology buyers.
By 2019, 60% of major multinational corporations with ties to
Europe will face significant cybersecurity attacks aimed at
disruption of commodities.
Over the next 18 months, 85% of consumers in Western
European nations will defect from a business because their
personally identifiable information is impacted in a security
breach.
By 2019, 70% of Western European enterprise cybersecurity
environments will incorporate cognitive/AI technologies to assist
humans in dealing with the vastly increasing scale and complexity of
cyberthreats.
By 2018, 50% of enterprise customers will leverage analytics as
a service to help solve the challenge of combing through
security-related data and events.
By 2020, cloud security gateway functionality will begin to be
integrated as part of web service offerings to entice IT leaders to
move offerings to the cloud.
By 2020, 25% of Western European broadband homes will have
at least one IP-enabled home automation or security monitoring
sensor/device.
By 2021, 60% of Western European enterprises will invest in
incident response retainers.
By 2020, more than 25% of Western European enterprises will
secure their IT architectures through cloud, hosted, or SaaS
security services.
Note: The size of the bubble indicates complexity/cost to address.
Source: IDC, 2016
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 6
Risk posture has an impact on the adoption
of new security technologies
Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
15%
35%
55%
75%
THREAT INTELLIGENCE SERVICES MICRO SEGMENTATION AI/HEURISTICS
Currently using security technologies by risk posture
Risk propense (n=35) Risk averse (n=64)
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 7
40%
52%
64%
76%
KNOWLEDGE OF
OBLIGATIONS
IMPLEMENTATION
PLANNING
PENALTIES MITIGATION
BASED ON EARLY
DETECTION/REMEDIATION
CONTINUOUS
IMPROVEMENT
IMPLEMENTATION
EXECUTION
ASSESSMENT OF
CAPABILITIES AND GAPS
Higherpreparednessscore(4to5)
Preparedness to GDPR
Risk propense (n=35) Risk averse (n=64)
GDPR implementation will also depend on
the actual perception of risks
Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 8
IDC Italia
Viale Monza 14
20127 Milano
Tel: +39 02 28457339
gvercellino@idc.com
Giancarlo Vercellino
Research & Consulting
Manager
IDC Italy
www.idc.com

More Related Content

What's hot

Data Intelligence: come abilitare il valore aziendale
Data Intelligence: come abilitare il valore aziendaleData Intelligence: come abilitare il valore aziendale
Data Intelligence: come abilitare il valore aziendaleIDC Italy
 
CeBIT IoT Forum (2017)
CeBIT IoT Forum (2017)CeBIT IoT Forum (2017)
CeBIT IoT Forum (2017)Marc Jadoul
 
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...IDC Italy
 
Oies IoT World Europe 20170615
Oies IoT World Europe 20170615Oies IoT World Europe 20170615
Oies IoT World Europe 20170615Francisco Maroto
 
Connected Cars Europe keynote (2017)
Connected Cars Europe keynote (2017)Connected Cars Europe keynote (2017)
Connected Cars Europe keynote (2017)Marc Jadoul
 
Internet of Things in 10 slides
Internet of Things in 10 slides Internet of Things in 10 slides
Internet of Things in 10 slides Francisco Maroto
 
VDE Smart Cities (2016)
VDE Smart Cities (2016)VDE Smart Cities (2016)
VDE Smart Cities (2016)Marc Jadoul
 
CCWTR Press Deck Completo
CCWTR Press Deck CompletoCCWTR Press Deck Completo
CCWTR Press Deck CompletoFelipe Lamus
 
Presentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise ArchitecturePresentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise ArchitectureFrancisco Maroto
 
ETSI IoT keynote (2016)
ETSI IoT keynote (2016)ETSI IoT keynote (2016)
ETSI IoT keynote (2016)Marc Jadoul
 
5 Factors in Modern Data Design
5 Factors in Modern Data Design5 Factors in Modern Data Design
5 Factors in Modern Data DesignDan Sexton
 
Israel @ MWC 2017 catalogue
Israel @ MWC 2017 catalogueIsrael @ MWC 2017 catalogue
Israel @ MWC 2017 catalogueMarc Hodara
 
Gartner: Top 10 Strategic Technology Trends 2016
Gartner: Top 10 Strategic Technology Trends 2016Gartner: Top 10 Strategic Technology Trends 2016
Gartner: Top 10 Strategic Technology Trends 2016Den Reymer
 
Business Analytics and the Internet of Things
Business Analytics and the Internet of ThingsBusiness Analytics and the Internet of Things
Business Analytics and the Internet of ThingsMark Benson
 
Industrial IoT Market Winter 2018
Industrial IoT Market Winter 2018Industrial IoT Market Winter 2018
Industrial IoT Market Winter 2018Dan Sexton
 
L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...
L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...
L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...IDC Italy
 
The Rise of Platforms in the IoT
The Rise of Platforms in the IoTThe Rise of Platforms in the IoT
The Rise of Platforms in the IoTMark Benson
 

What's hot (20)

Data Intelligence: come abilitare il valore aziendale
Data Intelligence: come abilitare il valore aziendaleData Intelligence: come abilitare il valore aziendale
Data Intelligence: come abilitare il valore aziendale
 
CeBIT IoT Forum (2017)
CeBIT IoT Forum (2017)CeBIT IoT Forum (2017)
CeBIT IoT Forum (2017)
 
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
 
Oies IoT World Europe 20170615
Oies IoT World Europe 20170615Oies IoT World Europe 20170615
Oies IoT World Europe 20170615
 
Connected Cars Europe keynote (2017)
Connected Cars Europe keynote (2017)Connected Cars Europe keynote (2017)
Connected Cars Europe keynote (2017)
 
Go+ product
Go+ productGo+ product
Go+ product
 
Internet of Things in 10 slides
Internet of Things in 10 slides Internet of Things in 10 slides
Internet of Things in 10 slides
 
VDE Smart Cities (2016)
VDE Smart Cities (2016)VDE Smart Cities (2016)
VDE Smart Cities (2016)
 
CCWTR Press Deck Completo
CCWTR Press Deck CompletoCCWTR Press Deck Completo
CCWTR Press Deck Completo
 
Presentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise ArchitecturePresentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise Architecture
 
Predictions idc2013
Predictions idc2013Predictions idc2013
Predictions idc2013
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
ETSI IoT keynote (2016)
ETSI IoT keynote (2016)ETSI IoT keynote (2016)
ETSI IoT keynote (2016)
 
5 Factors in Modern Data Design
5 Factors in Modern Data Design5 Factors in Modern Data Design
5 Factors in Modern Data Design
 
Israel @ MWC 2017 catalogue
Israel @ MWC 2017 catalogueIsrael @ MWC 2017 catalogue
Israel @ MWC 2017 catalogue
 
Gartner: Top 10 Strategic Technology Trends 2016
Gartner: Top 10 Strategic Technology Trends 2016Gartner: Top 10 Strategic Technology Trends 2016
Gartner: Top 10 Strategic Technology Trends 2016
 
Business Analytics and the Internet of Things
Business Analytics and the Internet of ThingsBusiness Analytics and the Internet of Things
Business Analytics and the Internet of Things
 
Industrial IoT Market Winter 2018
Industrial IoT Market Winter 2018Industrial IoT Market Winter 2018
Industrial IoT Market Winter 2018
 
L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...
L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...
L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...
 
The Rise of Platforms in the IoT
The Rise of Platforms in the IoTThe Rise of Platforms in the IoT
The Rise of Platforms in the IoT
 

Similar to Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazione digitale

Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCHarry Gunns
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomyCisco Russia
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
Manage the IT risk in the era of Industrial Internet
Manage the IT risk in the era of Industrial InternetManage the IT risk in the era of Industrial Internet
Manage the IT risk in the era of Industrial InternetIDC Italy
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomIBM Security
 
Retail Week: Cloud Security
Retail Week: Cloud SecurityRetail Week: Cloud Security
Retail Week: Cloud SecurityDatapipe
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
Effecientip DNS security.pdf
Effecientip DNS security.pdfEffecientip DNS security.pdf
Effecientip DNS security.pdfneoalt
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Eoin Keary
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.Onwubiko Emmanuel
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosErin_Jelecos
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroPrime Infoserv
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...TechSoup
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Enterprise Management Associates
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 

Similar to Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazione digitale (20)

Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDC
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital Economy
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
Manage the IT risk in the era of Industrial Internet
Manage the IT risk in the era of Industrial InternetManage the IT risk in the era of Industrial Internet
Manage the IT risk in the era of Industrial Internet
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
Retail Week: Cloud Security
Retail Week: Cloud SecurityRetail Week: Cloud Security
Retail Week: Cloud Security
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
Effecientip DNS security.pdf
Effecientip DNS security.pdfEffecientip DNS security.pdf
Effecientip DNS security.pdf
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - Jelecos
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 

More from IDC Italy

Innovare alla velocità del cloud: la rivoluzione multicloud
Innovare alla velocità del cloud: la rivoluzione multicloudInnovare alla velocità del cloud: la rivoluzione multicloud
Innovare alla velocità del cloud: la rivoluzione multicloudIDC Italy
 
Sogno di una fabbrica digitale
Sogno di una fabbrica digitaleSogno di una fabbrica digitale
Sogno di una fabbrica digitaleIDC Italy
 
Il nuovo data center, un’infrastruttura digitale agile e distribuita
Il nuovo data center, un’infrastruttura digitale agile e distribuitaIl nuovo data center, un’infrastruttura digitale agile e distribuita
Il nuovo data center, un’infrastruttura digitale agile e distribuitaIDC Italy
 
Cognitive/AI: views, perspectives & directions
Cognitive/AI: views, perspectives & directionsCognitive/AI: views, perspectives & directions
Cognitive/AI: views, perspectives & directionsIDC Italy
 
Enterprise Mobility Blends Next-Gen Technologies
Enterprise Mobility Blends Next-Gen TechnologiesEnterprise Mobility Blends Next-Gen Technologies
Enterprise Mobility Blends Next-Gen TechnologiesIDC Italy
 
Digital Native Enterprise: Disrupt to Transform, Transform to Succeed
Digital Native Enterprise: Disrupt to Transform, Transform to SucceedDigital Native Enterprise: Disrupt to Transform, Transform to Succeed
Digital Native Enterprise: Disrupt to Transform, Transform to SucceedIDC Italy
 
Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...
Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...
Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...IDC Italy
 
Adattare l'organizzazione IT alla trasformazione digitale
Adattare l'organizzazione IT alla trasformazione digitaleAdattare l'organizzazione IT alla trasformazione digitale
Adattare l'organizzazione IT alla trasformazione digitaleIDC Italy
 
Rinnovare il Retail: Piattaforma, Esperienza e Innovazione
Rinnovare il Retail: Piattaforma, Esperienza e InnovazioneRinnovare il Retail: Piattaforma, Esperienza e Innovazione
Rinnovare il Retail: Piattaforma, Esperienza e InnovazioneIDC Italy
 
Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...
Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...
Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...IDC Italy
 
The Cognitive Edge: A New Competitive Advantage
The Cognitive Edge: A New Competitive AdvantageThe Cognitive Edge: A New Competitive Advantage
The Cognitive Edge: A New Competitive AdvantageIDC Italy
 
Open your Transformation, Define your Evolution
Open your Transformation, Define your EvolutionOpen your Transformation, Define your Evolution
Open your Transformation, Define your EvolutionIDC Italy
 
Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...
Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...
Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...IDC Italy
 
Superare gli ostacoli al cambiamento nel percorso di trasformazione digitale
Superare gli ostacoli al cambiamento nel percorso di trasformazione digitaleSuperare gli ostacoli al cambiamento nel percorso di trasformazione digitale
Superare gli ostacoli al cambiamento nel percorso di trasformazione digitaleIDC Italy
 
Mobile Strategy in Digital Environment: the Mindset Shift
Mobile Strategy in Digital Environment: the Mindset ShiftMobile Strategy in Digital Environment: the Mindset Shift
Mobile Strategy in Digital Environment: the Mindset ShiftIDC Italy
 
IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...
IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...
IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...IDC Italy
 
The Analytic Gap – Matching decision making with data analytics
The Analytic Gap – Matching decision making with data analytics The Analytic Gap – Matching decision making with data analytics
The Analytic Gap – Matching decision making with data analytics IDC Italy
 
Digital Analytics
Digital AnalyticsDigital Analytics
Digital AnalyticsIDC Italy
 
Digitalisation Now
Digitalisation NowDigitalisation Now
Digitalisation NowIDC Italy
 
Next Generation Field Service Management
Next Generation Field Service ManagementNext Generation Field Service Management
Next Generation Field Service ManagementIDC Italy
 

More from IDC Italy (20)

Innovare alla velocità del cloud: la rivoluzione multicloud
Innovare alla velocità del cloud: la rivoluzione multicloudInnovare alla velocità del cloud: la rivoluzione multicloud
Innovare alla velocità del cloud: la rivoluzione multicloud
 
Sogno di una fabbrica digitale
Sogno di una fabbrica digitaleSogno di una fabbrica digitale
Sogno di una fabbrica digitale
 
Il nuovo data center, un’infrastruttura digitale agile e distribuita
Il nuovo data center, un’infrastruttura digitale agile e distribuitaIl nuovo data center, un’infrastruttura digitale agile e distribuita
Il nuovo data center, un’infrastruttura digitale agile e distribuita
 
Cognitive/AI: views, perspectives & directions
Cognitive/AI: views, perspectives & directionsCognitive/AI: views, perspectives & directions
Cognitive/AI: views, perspectives & directions
 
Enterprise Mobility Blends Next-Gen Technologies
Enterprise Mobility Blends Next-Gen TechnologiesEnterprise Mobility Blends Next-Gen Technologies
Enterprise Mobility Blends Next-Gen Technologies
 
Digital Native Enterprise: Disrupt to Transform, Transform to Succeed
Digital Native Enterprise: Disrupt to Transform, Transform to SucceedDigital Native Enterprise: Disrupt to Transform, Transform to Succeed
Digital Native Enterprise: Disrupt to Transform, Transform to Succeed
 
Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...
Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...
Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...
 
Adattare l'organizzazione IT alla trasformazione digitale
Adattare l'organizzazione IT alla trasformazione digitaleAdattare l'organizzazione IT alla trasformazione digitale
Adattare l'organizzazione IT alla trasformazione digitale
 
Rinnovare il Retail: Piattaforma, Esperienza e Innovazione
Rinnovare il Retail: Piattaforma, Esperienza e InnovazioneRinnovare il Retail: Piattaforma, Esperienza e Innovazione
Rinnovare il Retail: Piattaforma, Esperienza e Innovazione
 
Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...
Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...
Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...
 
The Cognitive Edge: A New Competitive Advantage
The Cognitive Edge: A New Competitive AdvantageThe Cognitive Edge: A New Competitive Advantage
The Cognitive Edge: A New Competitive Advantage
 
Open your Transformation, Define your Evolution
Open your Transformation, Define your EvolutionOpen your Transformation, Define your Evolution
Open your Transformation, Define your Evolution
 
Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...
Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...
Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...
 
Superare gli ostacoli al cambiamento nel percorso di trasformazione digitale
Superare gli ostacoli al cambiamento nel percorso di trasformazione digitaleSuperare gli ostacoli al cambiamento nel percorso di trasformazione digitale
Superare gli ostacoli al cambiamento nel percorso di trasformazione digitale
 
Mobile Strategy in Digital Environment: the Mindset Shift
Mobile Strategy in Digital Environment: the Mindset ShiftMobile Strategy in Digital Environment: the Mindset Shift
Mobile Strategy in Digital Environment: the Mindset Shift
 
IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...
IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...
IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...
 
The Analytic Gap – Matching decision making with data analytics
The Analytic Gap – Matching decision making with data analytics The Analytic Gap – Matching decision making with data analytics
The Analytic Gap – Matching decision making with data analytics
 
Digital Analytics
Digital AnalyticsDigital Analytics
Digital Analytics
 
Digitalisation Now
Digitalisation NowDigitalisation Now
Digitalisation Now
 
Next Generation Field Service Management
Next Generation Field Service ManagementNext Generation Field Service Management
Next Generation Field Service Management
 

Recently uploaded

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 

Recently uploaded (20)

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazione digitale

  • 1. A new IT-risk culture for Digital Transformation Milan, May 11, 2017 Redux Version
  • 2. The market is under pressure © IDC Visit us at IDC.com and follow us on Twitter: @IDC 2 Source: IDC, 2016 (n=98, companies with more than 50 employees in Italy; weighted extrapolation) 10 OR MORE DATA BREACHES 5-9 DATA BREACHES 3-4 DATA BREACHES 1-2 DATA BREACHES 0% 5% 10% 15% 20% About 40% knows they have been breached
  • 3. Who is adopting new IT Security tech is dealing with specific challenges © IDC Visit us at IDC.com and follow us on Twitter: @IDC 3 0% 20% 40% 60% COMPETING WITH CLOUD RESOURCES USED/SHADOW IT HIGH LEVEL OF DEMAND FOR NEW BUSINESS SERVICES FRAGMENTATION OR LACK OF INTEGRATION OF SECURITY PRODUCT PORTFOLIO JUGGLING CONFLICTING PRIORITIES NOT ENOUGH INTEGRATION INTO THE IT INFRASTRUCTURE TEAMS LACK OF INSIGHT INTO SECURITY SENSITIVE ACTIVITIES SKILLS SHORTAGES OPERATIONS RESOURCES ARE TOO BUSY ON ROUTINE OPERATIONS BUDGET CONSTRAINTS What is challenging the development of IT Security Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
  • 4. Measuring risks is a proof of your risk aversion © IDC Visit us at IDC.com and follow us on Twitter: @IDC 4 Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation) 0% 20% 40% 60% 80% INTERNAL COMMUNICATIONS PLAN BREACH NOTIFICATION PLAN BREACH REMEDIATION PLAN RESPONSE PLAN A FORMAL RISK ASSESSMENT EXTERNAL COMMUNICATIONS AND PUBLIC RELATIONS PLAN CYBER RISK INSURANCE Risk management practice currently in use Risk averse (n=64) Risk propense (n=35)
  • 5. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 5 TIME (MONTHS) TO MAINSTREAM ORGANIZATIONALIMPACT Asingle department orabusinessunit Multiple departments orbusinessunitsCompanywide 0-12 12-24 24+ 1 2 3 4 5 6 7 8 9 10 [CELLRANGE ] [CELLRANG E] [CELLRANG E] [CELLRANGE] [CELLRANGE] [CELLRANGE ] [CELLRANGE] [CELLRAN GE] [CELLRA NGE] [CELLRANGE] IDC FutureScape 2017 Security Products and Services, Western Europe Implications 1 2 3 4 5 6 7 8 9 10 By 2021, 50% of all online transactions will incorporate biometric authentication driven by a ubiquitous technology infrastructure that enables low implementation costs and broad user acceptance. By 2019, more than 75% of IoT device manufacturers will improve their security and privacy capabilities, making them more trustworthy partners for technology buyers. By 2019, 60% of major multinational corporations with ties to Europe will face significant cybersecurity attacks aimed at disruption of commodities. Over the next 18 months, 85% of consumers in Western European nations will defect from a business because their personally identifiable information is impacted in a security breach. By 2019, 70% of Western European enterprise cybersecurity environments will incorporate cognitive/AI technologies to assist humans in dealing with the vastly increasing scale and complexity of cyberthreats. By 2018, 50% of enterprise customers will leverage analytics as a service to help solve the challenge of combing through security-related data and events. By 2020, cloud security gateway functionality will begin to be integrated as part of web service offerings to entice IT leaders to move offerings to the cloud. By 2020, 25% of Western European broadband homes will have at least one IP-enabled home automation or security monitoring sensor/device. By 2021, 60% of Western European enterprises will invest in incident response retainers. By 2020, more than 25% of Western European enterprises will secure their IT architectures through cloud, hosted, or SaaS security services. Note: The size of the bubble indicates complexity/cost to address. Source: IDC, 2016
  • 6. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 6 Risk posture has an impact on the adoption of new security technologies Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation) 15% 35% 55% 75% THREAT INTELLIGENCE SERVICES MICRO SEGMENTATION AI/HEURISTICS Currently using security technologies by risk posture Risk propense (n=35) Risk averse (n=64)
  • 7. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 7 40% 52% 64% 76% KNOWLEDGE OF OBLIGATIONS IMPLEMENTATION PLANNING PENALTIES MITIGATION BASED ON EARLY DETECTION/REMEDIATION CONTINUOUS IMPROVEMENT IMPLEMENTATION EXECUTION ASSESSMENT OF CAPABILITIES AND GAPS Higherpreparednessscore(4to5) Preparedness to GDPR Risk propense (n=35) Risk averse (n=64) GDPR implementation will also depend on the actual perception of risks Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
  • 8. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 8 IDC Italia Viale Monza 14 20127 Milano Tel: +39 02 28457339 gvercellino@idc.com Giancarlo Vercellino Research & Consulting Manager IDC Italy www.idc.com