SlideShare a Scribd company logo
1 of 17
Kapil Dev Singh
Founder & CEO, Coeus Age
Co-Founder, Core Quadrant
+91 9811771187, kds@kdsnext.com
Cyber Security in the Digital Age
Mumbai, March 11, 2016
Digital Landscape,
2015 & Beyond
Digital as a Theme
of a deep, broad and sustained research initiative
Building a
Digital
Enterprise
Business and IT
Priorities, 2014
and 2015
The Jewels of
Digital, 2015
Digital
Landscape,
2015 & Beyond
Enterprise
Digital Tracker
The Jewels of
Digital, 2015
Images courtesy of freedigitalphotos.net
Enterprise Digital
Tracker
Digital as Enterprise Priority
is on the rise
5
16 17
14
24
31
2014 2015 2016
Top Priority 2nd Top Priority
%
Base- 202
Core Quadrant, 2014, 2015, 2016
Base- 142
Base- 113
Business Priorities
growing efficiently
Base- 142
Ops Eff Cash Growth (O) Growth (I) Culture Customer
Complianc
e
Risk Rationaln
2014 38% 28% 36% 12% 16% 25% 19% 17% 4%
2015 65% 19% 43% 10% 12% 15% 14% 10% 6%
2016 51% 9% 26% 14% 14% 17% 16% 22% 7%
2014 2015 2016
Core Quadrant, 2014, 2015, 2016
Base- 113Base- 202%
IT Priorities
are competing in nature
Base- 142
IT Eff Consolidate
Overhaul
Infra
Overhaul
Apps
Outsource IT Security
Internal
Usage
New Tech
2014 36% 34% 24% 12% 18% 25% 28% 19%
2015 48% 14% 25% 17% 6% 23% 26% 40%
2016 46% 13% 12% 16% 5% 23% 12% 48%
2014 2015 2016
Core Quadrant, 2014, 2015, 2016
Base- 113Base- 202%
The Contextual Complexity
is on the rise
The Framework
of an enterprise digital platform
Core
Catalyst
SMAC+
1. Automation of IT
Processes
2. Communication
between machines, people,
processes & data
3. Embedded play of
Analytics and Big
Data capabilities
4. Availability of IT
Management
Dashboards on
multiple devices
5. Elasticity and
Spread
6. Openness to other
platforms
7. Security &
Governance across the
spectrum
1. Matching expectations of
user experience (UX)
2. Digitized, secured and
dynamically
retrievable documents
3. Automated, agile,
managed, connected, secured
and contextualized business
processes
4. Integrated, open,
managed, optimized,
orchestrated and secured
business applns
5. Secured, quality and
rationalized data, and smooth
data flow
6. Agile, governed and
secure IT
infrastructureCore Quadrant, 2015
Cyber Security Survey
gauging the preparedness
Core Quadrant, 2016
• A nation wide survey by Core Quadrant
• Core Issues
– Organizational Preparedness, Alignment,
Challenges, Structure, and
– CISO Leadership
• The cusp of Enterprise Risk Management and
Cyber Security
• 50 CFOs and 36 CISOs
Threat Perception - CISOs
Core Quadrant, 2016
Increased Decreased Same Cannot Say
External Threats 67% 0% 28% 6%
Internal Threats 33% 17% 39% 11%
Compliance 53% 14% 33% 0%
Spend 64% 6% 28% 3%
Cyber Threats Focus
Core Quadrant, 2016
Increased Decreased Same Cannot Say
Infrastructure 58% 11% 31% 0%
Applications 80% 9% 11% 0%
Digital Applications 77% 6% 14% 3%
Operational Controls 40% 11% 46% 3%
31% 36%
14% 11% 8%
IT Infrastructure Enterprise
Applications
Digital Applications Operational controls Other (please
specify)
Cyber Security - Alignment
Core Quadrant, 2016
What is your agreement with the following statements regarding alignment of business with cyber
risk issues? Please rate on a 5 point scale where 1= completely disagree and 5= completely agree
.
CFO CISO
We have a well-defined cyber security strategy in alignment with the business
strategy
4.12 3.39
Major CXOs are stakeholders in the cyber risk practice 4.02 3.53
Our top management including the CEO is quite active with respect to cyber
risk
3.96 3.78
We have a well-defined cyber security strategy in alignment with the enterprise
IT strategy
3.94 3.44
We have created a well defined cyber security governance structure 3.7 3.47
The company board is involved in cyber risk issues through mechanisms like
board advisor committee
3.4 3.42
Cyber Security - Key Challenges
Core Quadrant, 2016
What are the top two challenges with respect to cyber security in your organization?
CFO CISO
Role definition and accountability 46% 19%
A well secured IT and digital platform 46% 0%
The IT and cyber risk leadership capability 30% 19%
A well developed enterprise risk management framework 28% 28%
A well defined holistic cyber security and risk plan 22% 42%
Top leadership’s appreciation of cyber risk as an organizational issue 14% 19%
Availability of skilled security professionals 12% 31%
Availability of adequate budgetary allocations for security 2% 22%
Lack of/inadequate organizational security culture 0% 19%
Cyber Security Structure
Core Quadrant, 2016
Who is responsible for the cyber security practice in your organisation?
CFO CISO
Chief Information Officer (CIO) 26% 25%
Chief Information Security Officer (CISO) 28% 61%
Chief Risk Officer (CRO) 44% 0%
Someone at the middle/ junior level 2% 3%
Other (please specify) 0% 11%
Who does the person responsible for cyber security report into in your organization?
CFO CISO
Chief Information Officer (CIO) 6% 33%
Chief Executive Officer (CEO) 4% 19%
Chief Financial Officer (CFO) 88% 0%
Chief Risk Officer (CRO) 0% 19%
Other (please specify) 2% 28%
5 Pillars of Cyber Security
Core Quadrant, 2016
Leadership Strategy Structure
Risk
Management
Technology
CISO Leadership
Core Quadrant, 2016
Please rate the CISO or the person responsible for cyber security in your organisation on the
following leadership traits? Please rate on a 5 point scale where 1= very low and 5= very high.
Ability to conceptualise scenarios around business impact of cyber risk 3.8
Ability to motivate and lead people 3.6
Process understanding with respect to cyber security and risk 3.6
Domain understanding of business operations 3.5
Understanding of digital business and digital technologies 3.5
Ability to present convincingly at senior levels and influence decision making 3.5
Technical understanding of the latest development in cyber security products 3.4
CISO Role
appreciating the strategic side
Kapil Dev Singh
Founder & CEO, Coeus Age
Co-Founder, Core Quadrant
+91 9811771187, kds@kdsnext.com
Cyber Security in the Digital Age
Mumbai, March 11, 2016

More Related Content

What's hot

Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Brad Deflin
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPRHow an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPRPECB
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?PECB
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015Capgemini
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobPriyanka Aash
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governancenooralmousa
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? PECB
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceF-Secure Corporation
 
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityA Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityTripwire
 
The importance of information security risk management
The importance of information security risk managementThe importance of information security risk management
The importance of information security risk managementMichael Francis
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security programWilliam Godwin
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quanticoTuan Phan
 
QSA Shares PCI 3.0 Advice & Checklist
QSA Shares PCI 3.0 Advice & ChecklistQSA Shares PCI 3.0 Advice & Checklist
QSA Shares PCI 3.0 Advice & ChecklistTripwire
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance MonitoringControlCase
 
Achieving Effective IT Security with Continuous ISO 27001 Compliance
Achieving Effective IT Security with Continuous ISO 27001 ComplianceAchieving Effective IT Security with Continuous ISO 27001 Compliance
Achieving Effective IT Security with Continuous ISO 27001 ComplianceTripwire
 

What's hot (20)

Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPRHow an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your Job
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
 
Does audit make us more secure
Does audit make us more secureDoes audit make us more secure
Does audit make us more secure
 
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityA Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
 
The importance of information security risk management
The importance of information security risk managementThe importance of information security risk management
The importance of information security risk management
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
 
QSA Shares PCI 3.0 Advice & Checklist
QSA Shares PCI 3.0 Advice & ChecklistQSA Shares PCI 3.0 Advice & Checklist
QSA Shares PCI 3.0 Advice & Checklist
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance Monitoring
 
Achieving Effective IT Security with Continuous ISO 27001 Compliance
Achieving Effective IT Security with Continuous ISO 27001 ComplianceAchieving Effective IT Security with Continuous ISO 27001 Compliance
Achieving Effective IT Security with Continuous ISO 27001 Compliance
 

Viewers also liked

2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
2016 ISACA NACACS - Audit As An Impact Player For CybersecurityNathan Anderson
 
The CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedThe CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedIBM Security
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementKeelan Stewart
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?PECB
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Accenture Technology
 
Digital Security
Digital SecurityDigital Security
Digital Securityaccenture
 
The ‘Data Driven Video Business’
The ‘Data Driven Video Business’The ‘Data Driven Video Business’
The ‘Data Driven Video Business’accenture
 
CTSC+SWAMP: cybersecurity resources for your campus
CTSC+SWAMP: cybersecurity resources for your campusCTSC+SWAMP: cybersecurity resources for your campus
CTSC+SWAMP: cybersecurity resources for your campusjbasney
 

Viewers also liked (8)

2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
2016 ISACA NACACS - Audit As An Impact Player For Cybersecurity
 
The CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedThe CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the Unexpected
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk Management
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Digital Security
Digital SecurityDigital Security
Digital Security
 
The ‘Data Driven Video Business’
The ‘Data Driven Video Business’The ‘Data Driven Video Business’
The ‘Data Driven Video Business’
 
CTSC+SWAMP: cybersecurity resources for your campus
CTSC+SWAMP: cybersecurity resources for your campusCTSC+SWAMP: cybersecurity resources for your campus
CTSC+SWAMP: cybersecurity resources for your campus
 

Similar to Cyber Security in the Digital Age Report

Optimizing SaaS Productivity for CEOs, CFOs & CIOs with LeanIX's CEO
Optimizing SaaS Productivity for CEOs, CFOs & CIOs with LeanIX's CEOOptimizing SaaS Productivity for CEOs, CFOs & CIOs with LeanIX's CEO
Optimizing SaaS Productivity for CEOs, CFOs & CIOs with LeanIX's CEOsaastr
 
Data and Findings - Accelerating IT Transformation with DATA
Data and Findings - Accelerating IT Transformation with DATAData and Findings - Accelerating IT Transformation with DATA
Data and Findings - Accelerating IT Transformation with DATAMatt Mandich
 
Digital Pulse 2018: Organizational Structure
Digital Pulse 2018: Organizational StructureDigital Pulse 2018: Organizational Structure
Digital Pulse 2018: Organizational StructureTuan Anh Nguyen
 
Stateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slidesStateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slidesIDG
 
Cyber_security_survey201415_2
Cyber_security_survey201415_2Cyber_security_survey201415_2
Cyber_security_survey201415_2Stephanie Crates
 
Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides IDG
 
Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides IDG
 
2018 Tech Adoption Summit: Let’s Do the Numbers — Why Small Businesses are M...
2018 Tech Adoption Summit:  Let’s Do the Numbers — Why Small Businesses are M...2018 Tech Adoption Summit:  Let’s Do the Numbers — Why Small Businesses are M...
2018 Tech Adoption Summit: Let’s Do the Numbers — Why Small Businesses are M...Localogy
 
TCS 2020 CFO Study: Key Findings - Empowering the enterprise with data-driven...
TCS 2020 CFO Study: Key Findings - Empowering the enterprise with data-driven...TCS 2020 CFO Study: Key Findings - Empowering the enterprise with data-driven...
TCS 2020 CFO Study: Key Findings - Empowering the enterprise with data-driven...Tata Consultancy Services
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxState of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxIDG
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfIDG
 
State of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfState of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfIDG
 
State of the CIO 2018
State of the CIO 2018State of the CIO 2018
State of the CIO 2018IDG
 
The Asset Management Digital Marketing Survey 2018
The Asset Management Digital Marketing Survey 2018The Asset Management Digital Marketing Survey 2018
The Asset Management Digital Marketing Survey 2018Kurtosys Systems
 
Across Health Multichannel Maturometer 2018
Across Health Multichannel Maturometer 2018Across Health Multichannel Maturometer 2018
Across Health Multichannel Maturometer 2018Across Health
 
Transforming the Modern PMO- Harnessing AI-Driven Strategic Portfolio Managem...
Transforming the Modern PMO- Harnessing AI-Driven Strategic Portfolio Managem...Transforming the Modern PMO- Harnessing AI-Driven Strategic Portfolio Managem...
Transforming the Modern PMO- Harnessing AI-Driven Strategic Portfolio Managem...OnePlan Solutions
 

Similar to Cyber Security in the Digital Age Report (20)

Optimizing SaaS Productivity for CEOs, CFOs & CIOs with LeanIX's CEO
Optimizing SaaS Productivity for CEOs, CFOs & CIOs with LeanIX's CEOOptimizing SaaS Productivity for CEOs, CFOs & CIOs with LeanIX's CEO
Optimizing SaaS Productivity for CEOs, CFOs & CIOs with LeanIX's CEO
 
CIO: 2022 Priorities
CIO: 2022 PrioritiesCIO: 2022 Priorities
CIO: 2022 Priorities
 
Data and Findings - Accelerating IT Transformation with DATA
Data and Findings - Accelerating IT Transformation with DATAData and Findings - Accelerating IT Transformation with DATA
Data and Findings - Accelerating IT Transformation with DATA
 
Digital Pulse 2018: Organizational Structure
Digital Pulse 2018: Organizational StructureDigital Pulse 2018: Organizational Structure
Digital Pulse 2018: Organizational Structure
 
Stateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slidesStateofthe cio 2022 new sample slides
Stateofthe cio 2022 new sample slides
 
Cyber_security_survey201415_2
Cyber_security_survey201415_2Cyber_security_survey201415_2
Cyber_security_survey201415_2
 
Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides
 
Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides Stateofthe cio 2022 sample slides
Stateofthe cio 2022 sample slides
 
2018 Tech Adoption Summit: Let’s Do the Numbers — Why Small Businesses are M...
2018 Tech Adoption Summit:  Let’s Do the Numbers — Why Small Businesses are M...2018 Tech Adoption Summit:  Let’s Do the Numbers — Why Small Businesses are M...
2018 Tech Adoption Summit: Let’s Do the Numbers — Why Small Businesses are M...
 
TCS 2020 CFO Study: Key Findings - Empowering the enterprise with data-driven...
TCS 2020 CFO Study: Key Findings - Empowering the enterprise with data-driven...TCS 2020 CFO Study: Key Findings - Empowering the enterprise with data-driven...
TCS 2020 CFO Study: Key Findings - Empowering the enterprise with data-driven...
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxState of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
 
State of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfState of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdf
 
State of the CIO 2018
State of the CIO 2018State of the CIO 2018
State of the CIO 2018
 
The Asset Management Digital Marketing Survey 2018
The Asset Management Digital Marketing Survey 2018The Asset Management Digital Marketing Survey 2018
The Asset Management Digital Marketing Survey 2018
 
#DBS2016 - The Digital Journey - Keys to Success
#DBS2016 - The Digital Journey  - Keys to Success#DBS2016 - The Digital Journey  - Keys to Success
#DBS2016 - The Digital Journey - Keys to Success
 
Across Health Multichannel Maturometer 2018
Across Health Multichannel Maturometer 2018Across Health Multichannel Maturometer 2018
Across Health Multichannel Maturometer 2018
 
Transforming the Modern PMO- Harnessing AI-Driven Strategic Portfolio Managem...
Transforming the Modern PMO- Harnessing AI-Driven Strategic Portfolio Managem...Transforming the Modern PMO- Harnessing AI-Driven Strategic Portfolio Managem...
Transforming the Modern PMO- Harnessing AI-Driven Strategic Portfolio Managem...
 
Leading in digital
Leading in digitalLeading in digital
Leading in digital
 
The Digital Journey
The Digital JourneyThe Digital Journey
The Digital Journey
 

More from Rahul Neel Mani

7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 ReportRahul Neel Mani
 
TweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital InitiativeTweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital InitiativeRahul Neel Mani
 
Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017Rahul Neel Mani
 
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, MumbaiRahul Neel Mani
 
CIO Productivity Conclave 2017
CIO Productivity Conclave 2017 CIO Productivity Conclave 2017
CIO Productivity Conclave 2017 Rahul Neel Mani
 
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...Rahul Neel Mani
 
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...Rahul Neel Mani
 
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...Rahul Neel Mani
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey Rahul Neel Mani
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game Rahul Neel Mani
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsRahul Neel Mani
 
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseDetect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseRahul Neel Mani
 
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security FabricUpgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security FabricRahul Neel Mani
 
Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom? Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom? Rahul Neel Mani
 
CIO Productivity Conclave 2016
CIO Productivity Conclave 2016CIO Productivity Conclave 2016
CIO Productivity Conclave 2016Rahul Neel Mani
 
Take Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva KumarTake Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva KumarRahul Neel Mani
 

More from Rahul Neel Mani (20)

7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
 
TweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital InitiativeTweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital Initiative
 
Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017
 
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
 
CIO Productivity Conclave 2017
CIO Productivity Conclave 2017 CIO Productivity Conclave 2017
CIO Productivity Conclave 2017
 
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
 
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
 
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
 
Sumit dhar
Sumit dharSumit dhar
Sumit dhar
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
 
Cyber Crime Management
Cyber Crime ManagementCyber Crime Management
Cyber Crime Management
 
ABC of Infosec
ABC of InfosecABC of Infosec
ABC of Infosec
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of Botnets
 
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseDetect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
 
Get the Basics Right
Get the Basics RightGet the Basics Right
Get the Basics Right
 
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security FabricUpgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security Fabric
 
Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom? Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom?
 
CIO Productivity Conclave 2016
CIO Productivity Conclave 2016CIO Productivity Conclave 2016
CIO Productivity Conclave 2016
 
Take Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva KumarTake Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva Kumar
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Cyber Security in the Digital Age Report

  • 1. Kapil Dev Singh Founder & CEO, Coeus Age Co-Founder, Core Quadrant +91 9811771187, kds@kdsnext.com Cyber Security in the Digital Age Mumbai, March 11, 2016
  • 2. Digital Landscape, 2015 & Beyond Digital as a Theme of a deep, broad and sustained research initiative Building a Digital Enterprise Business and IT Priorities, 2014 and 2015 The Jewels of Digital, 2015 Digital Landscape, 2015 & Beyond Enterprise Digital Tracker The Jewels of Digital, 2015 Images courtesy of freedigitalphotos.net Enterprise Digital Tracker
  • 3. Digital as Enterprise Priority is on the rise 5 16 17 14 24 31 2014 2015 2016 Top Priority 2nd Top Priority % Base- 202 Core Quadrant, 2014, 2015, 2016 Base- 142 Base- 113
  • 4. Business Priorities growing efficiently Base- 142 Ops Eff Cash Growth (O) Growth (I) Culture Customer Complianc e Risk Rationaln 2014 38% 28% 36% 12% 16% 25% 19% 17% 4% 2015 65% 19% 43% 10% 12% 15% 14% 10% 6% 2016 51% 9% 26% 14% 14% 17% 16% 22% 7% 2014 2015 2016 Core Quadrant, 2014, 2015, 2016 Base- 113Base- 202%
  • 5. IT Priorities are competing in nature Base- 142 IT Eff Consolidate Overhaul Infra Overhaul Apps Outsource IT Security Internal Usage New Tech 2014 36% 34% 24% 12% 18% 25% 28% 19% 2015 48% 14% 25% 17% 6% 23% 26% 40% 2016 46% 13% 12% 16% 5% 23% 12% 48% 2014 2015 2016 Core Quadrant, 2014, 2015, 2016 Base- 113Base- 202%
  • 7. The Framework of an enterprise digital platform Core Catalyst SMAC+ 1. Automation of IT Processes 2. Communication between machines, people, processes & data 3. Embedded play of Analytics and Big Data capabilities 4. Availability of IT Management Dashboards on multiple devices 5. Elasticity and Spread 6. Openness to other platforms 7. Security & Governance across the spectrum 1. Matching expectations of user experience (UX) 2. Digitized, secured and dynamically retrievable documents 3. Automated, agile, managed, connected, secured and contextualized business processes 4. Integrated, open, managed, optimized, orchestrated and secured business applns 5. Secured, quality and rationalized data, and smooth data flow 6. Agile, governed and secure IT infrastructureCore Quadrant, 2015
  • 8. Cyber Security Survey gauging the preparedness Core Quadrant, 2016 • A nation wide survey by Core Quadrant • Core Issues – Organizational Preparedness, Alignment, Challenges, Structure, and – CISO Leadership • The cusp of Enterprise Risk Management and Cyber Security • 50 CFOs and 36 CISOs
  • 9. Threat Perception - CISOs Core Quadrant, 2016 Increased Decreased Same Cannot Say External Threats 67% 0% 28% 6% Internal Threats 33% 17% 39% 11% Compliance 53% 14% 33% 0% Spend 64% 6% 28% 3%
  • 10. Cyber Threats Focus Core Quadrant, 2016 Increased Decreased Same Cannot Say Infrastructure 58% 11% 31% 0% Applications 80% 9% 11% 0% Digital Applications 77% 6% 14% 3% Operational Controls 40% 11% 46% 3% 31% 36% 14% 11% 8% IT Infrastructure Enterprise Applications Digital Applications Operational controls Other (please specify)
  • 11. Cyber Security - Alignment Core Quadrant, 2016 What is your agreement with the following statements regarding alignment of business with cyber risk issues? Please rate on a 5 point scale where 1= completely disagree and 5= completely agree . CFO CISO We have a well-defined cyber security strategy in alignment with the business strategy 4.12 3.39 Major CXOs are stakeholders in the cyber risk practice 4.02 3.53 Our top management including the CEO is quite active with respect to cyber risk 3.96 3.78 We have a well-defined cyber security strategy in alignment with the enterprise IT strategy 3.94 3.44 We have created a well defined cyber security governance structure 3.7 3.47 The company board is involved in cyber risk issues through mechanisms like board advisor committee 3.4 3.42
  • 12. Cyber Security - Key Challenges Core Quadrant, 2016 What are the top two challenges with respect to cyber security in your organization? CFO CISO Role definition and accountability 46% 19% A well secured IT and digital platform 46% 0% The IT and cyber risk leadership capability 30% 19% A well developed enterprise risk management framework 28% 28% A well defined holistic cyber security and risk plan 22% 42% Top leadership’s appreciation of cyber risk as an organizational issue 14% 19% Availability of skilled security professionals 12% 31% Availability of adequate budgetary allocations for security 2% 22% Lack of/inadequate organizational security culture 0% 19%
  • 13. Cyber Security Structure Core Quadrant, 2016 Who is responsible for the cyber security practice in your organisation? CFO CISO Chief Information Officer (CIO) 26% 25% Chief Information Security Officer (CISO) 28% 61% Chief Risk Officer (CRO) 44% 0% Someone at the middle/ junior level 2% 3% Other (please specify) 0% 11% Who does the person responsible for cyber security report into in your organization? CFO CISO Chief Information Officer (CIO) 6% 33% Chief Executive Officer (CEO) 4% 19% Chief Financial Officer (CFO) 88% 0% Chief Risk Officer (CRO) 0% 19% Other (please specify) 2% 28%
  • 14. 5 Pillars of Cyber Security Core Quadrant, 2016 Leadership Strategy Structure Risk Management Technology
  • 15. CISO Leadership Core Quadrant, 2016 Please rate the CISO or the person responsible for cyber security in your organisation on the following leadership traits? Please rate on a 5 point scale where 1= very low and 5= very high. Ability to conceptualise scenarios around business impact of cyber risk 3.8 Ability to motivate and lead people 3.6 Process understanding with respect to cyber security and risk 3.6 Domain understanding of business operations 3.5 Understanding of digital business and digital technologies 3.5 Ability to present convincingly at senior levels and influence decision making 3.5 Technical understanding of the latest development in cyber security products 3.4
  • 16. CISO Role appreciating the strategic side
  • 17. Kapil Dev Singh Founder & CEO, Coeus Age Co-Founder, Core Quadrant +91 9811771187, kds@kdsnext.com Cyber Security in the Digital Age Mumbai, March 11, 2016

Editor's Notes

  1. Let’s see the bigger context, which makes an enterprise digital platform a must. What was within the enterprise premise (or an extended physical premise) has moved beyond boundaries. The situation has become more complex. Because -The traditional IT architecture is challenged by the emerging cloud computing paradigm -There is a plethora of devices from many access points and on multiple platforms -Multiple stakeholders, each one with unique ‘interaction requirements’. Enterprise platform is opened for the customers from a customer service or ecommerce perspective. -Multiple and ever growing applications meeting the unique requirements of the stakeholders -As a result of multiple devices, users and applications data is exploding, data flow across the enterprise boundaries -Increasing pressure for speed, compliance, security and governance The legacy enterprise platform is becoming inadequate to meet the emerging priorities for the CIOs.