SlideShare a Scribd company logo
1 of 22
Download to read offline
Page 1
EY’s Global
Information Security
Survey 2016
A ‘Getting started’ guide –
client enrollment and survey
participation
Page 2
X
Contents
EY Global Information Security Survey 2016
1 Overview
Welcome to the GISS 2016
3
4
Strengthening your client relationship
2 The survey
2.1 GISS roadmap
2.2 The survey
2.3 Survey participants
2.4 Security
How to enroll participants and complete the survey
3.1 Invitation and enrolment hints and tips
3.2 Survey execution and reporting
3
1.1
1.2
2.5 GISS timings
Helpful links4
Appendix5
5
6-11
7
8
9
10
11
12-16
13-14
15-16
17
19-21
Page 3
Overview
EY Global Information Security Survey 2016
1
Page 4
X
Now in its 19th year, EY’s Global information Security Survey (GISS) has proved year-on-
year to be of significant value to clients, as well as helping shape EY’s reputation for
cybersecurity leadership with analysts and the media.
This year’s survey will explore how organizations are managing their cybersecurity in
today’s complex digital world, from the top of the C-suite to the very center of their
information security operations.
The findings will help organizations understand how today’s cyber risks can impact their
whole strategy and growth agenda; we will show them what mature cybersecurity
capabilities look like, what skills and actions are needed at Board level, and how to
prepare their cybersecurity operations to defend against and recover from a cyber attack.
This survey is designed to be used with CEOs, CFOs and the general C-suite as well as
the more traditional audience of CISOs, CIOs and Network Security professionals. If you
engage with multiple clients from the same organization, this could give you a broader and
more in-depth view of their cybersecurity.
Neither you, nor your client, needs to be an expert in cybersecurity to complete the survey
– when we look at the results we take into account what a realistic level of knowledge
looks like for those who are not in IT or cybersecurity roles.
Welcome to the GISS 2016
EY Global Information Security Survey 2016
1.1
Page 5
X
How will the GISS help you engage with your client?
Our clients welcome the opportunity to have conversations about cybersecurity. Supporting your client
through the survey process in a face to face interview style will help forge stronger relationships with
your clients and prospects and every client that takes part gets an individual benchmark comparison
report after the survey closes. It will also;
Strengthening your client
relationship
EY Global Information Security Survey 2016
Open up a conversation
about their readiness to deal
with one of the biggest and
most complex issues facing
organizations today.
Position EY’s team as
your client’s strategic advisor
and open up engagement
opportunities.
Provide our clients and
prospects with the global
insights and perspectives
that will help them make
smarter decisions about their
cybersecurity capabilities.
Reinforce EY as a global
leader in cybersecurity, thanks
to our market-leading
consulting and service delivery
capabilities, global reach,
consistent methodology
and experience
1.2
Page 6
The survey
EY Global Information Security Survey 2016
2
Page 7
XGISS Roadmap
EY Global Information Security Survey 2016
2.1
Page 8
XThe survey
GISS 2016 consists of one questionnaire that
covers different audiences
EY Global Information Security Survey 2016
GISS 2016 Survey
Question areas This questionnaire consists of 40 questions relating to strategy, innovation and
growth, risk, technology, people and organization, and finance and legal. One-
third of the questions are new this year.
Familiarise yourself with the questions before sharing them with the client by
reviewing the hard copy on the GISS CHS page.
Additional
information
If you complete the questionnaire with your client, why not broaden the
conversation and capture their comments, their experience, their sector or
geographic perspectives? Keep this qualitative information to supplement the
quantitative data the survey will provide you with.
Completion time Approximately 60 minutes
The survey is best conducted via a face-to-face interview, where you can assist your client
and complete the survey using a secure online access tool.
Option: The client can complete the survey themselves if that is more convenient; you can
also complete the survey using a hard copy of the questions, then key the results in later.
2.2
Page 9
X
► The survey is designed to be used with CEOs, CFOs and the general C-suite as well
as the more traditional audience of CISOs, CIOs and Network Security professionals.
► You can enroll multiple clients from the same organization
► You can enroll prospects and non-clients
► If your client has completed it before, by completing it again you can track any
changes, as well as gain insights from the new question areas.
CEO CISO CIO CFO COO CRO CDO Other
Survey participants
You are encouraged to invite both clients and
non-clients to take the survey
EY Global Information Security Survey 2016
2.3
Page 10
XSecurity
Keeping your client’s data confidential
and secure
EY Global Information Security Survey 2016
Because of the nature of the survey, EY is very aware of the
importance of the confidentiality and security of your client’s data.
► As with previous surveys, we have implemented a
comprehensive set of security controls, both organizational and
technical, to provide confidence on this issue.
► All direct and indirect data gathered as a result of the survey will
remain confidential, unless there is specific request from the
client to review their specific benchmarked survey responses
The online questionnaire is being provided in English only. Any
language needs for your specific market will need to be translated
locally, and a paper translation prepared.
For further information, please contact the GISS support team at
giss.support@ey.com
2.4
Page 11
XGISS timings
Important timeframes to consider
EY Global Information Security Survey 2016
Phase 1
Invitation and enrollment
Phase 2
Survey execution
Phase 3
Analysis & launch
► Invite and enroll the client on the
registration site via the links on
the GISS 2016 CHS.
► Make sure the client understands
what their time investment will get
them in terms of the benefits of
insights and perspectives and
their individual benchmark report.
► Share with them, if appropriate,
previous versions of the survey
and the insights this provided,
available on the GISS 2015 CHS
and www.ey.com/giss
► Complete the survey either
through face-to-face
interview/conversation or by
giving the client secure online
access to the survey.
► If during this conversation, the
client’s responses include
important insights on their needs,
be prepared to capture these so
they can be addressed in
subsequent follow-ups, using
survey-related materials and a
perspective from a cybersecurity
practitioners.
► After the survey closes, the
results will be gathered and the
findings analyzed with the
addition of insights and
commentary from our own subject
matter experts.
► The EY point of view on the
findings and the impact on clients
will be presented in thought
leadership, infographics and other
meeting materials. Cuts of data
by sector and geography will be
available.
► Your client’s individual results will
become available for you to
discuss with your client
1st June 13th June - 12th August 19th August – 30th September
2.5
Page 12
How to enroll participants and complete
the survey
EY Global Information Security Survey 2016
3
Page 13
X
Step 1 - Invitations
► The first step in having someone participate in the GISS is to invite them to take
part – this can be done during a meeting or call with your client, or by email/letter.
► A sample client invitation message has been developed that can be tailored for
your specific client; this, and all other supporting material, can be accessed via the
GISS 2016 CHS page.
► Clients can also be invited to view our dedicated website: www.ey.com/cybersecurity
where the results of last year’s GISS 2015 and thought leadership report are
available to view.
► Ideally the client needs to be aware that they are invited prior to you enrolling them.
► NB: The client will never receive communications directly from the EY survey
team; the person who enrols the client will be the single point of any
communication regarding that client
Phase 1 - Invitations
How to invite your client to participate
EY Global Information Security Survey 2016
IMPORTANT:
Keep the Global Coordinating Partner or Engagement Partner aware of any client invitations, especially if
you wish to enroll a Channel 1 client.
Starts 12th May
3.1
Page 14
X
How to enroll before the survey opens:
► EY contacts will be able to enroll clients by logging their information into the GISS Enrollment
system at: https://survey.ey.com/giss/enrollclient.asp.
► Once completed, click the “Enroll client” button and a note will appear informing the EY contact
that their client has been enrolled.
► The EY contact will be emailed the survey URL and client login credentials the day the survey
formally opens. If the client is going to complete the survey online themselves, you will need to
email the client with this information so they can access the survey.
► If you want to enroll 10 or more clients at once then please use the mass enrollment form
available on the GISS 2016 CHS page. More information can be found in the appendix
How to enroll after the survey has launched:
► Open the GISS Enrollment page and complete the enrollment information. Upon clicking the
“Enroll client” button, a note will appear that includes the client’s login credentials. Please
retain a copy of this information before sending an email with the login credentials to
your client. You will not receive a separate email with the login credentials if you enroll
your client after the survey opens.
► As the survey is already open, please email your client as soon as possible if they want direct
access to the survey.
Phase 1 – Enrollment
How to enroll your client before and after
survey launch
EY Global Information Security Survey 2016
Starts 12th May
3.1
Page 15
X
Completing the survey during a face-to-face meeting (recommended)
► The recommended way to execute the survey is to have a face-to-face meeting with
the client to go through the questions and discuss any specific issues or challenges
they may be facing. The client may want to do some ‘fact finding’, in which case the
survey can be halted and returned to later if several conversations are needed.
► There are 2 options to fill in the survey with a face-to-face meeting:
1. Go through the survey with the client and input the answers directly into the survey tool
2. Collect the participant’s answers to the questionnaire using the hard copy PDF of the survey
(available on the GISS 2016 CHS page), and then launch the survey online yourself to input
the answers to the survey tool .
Please note, the GISS team cannot accept hard copy questionnaires– all data must be fed into
the survey tool by someone from the engagement team.
Client completing the survey online
► If the client completes the survey directly online, they will need to use the survey link
you sent them. If they have difficulties or queries during the completion process, they
can email GISS.support@ey.com
Phase 2 – Survey execution
How to complete the survey: face-to-face
recommended
EY Global Information Security Survey 2016
3.2
Page 16
XPhase 3 – Reporting
EY Global Information Security Survey 2016
► The survey will close on 12th August. After this date, the results will be
gathered and aggregated, the findings analyzed and the EY point of view
developed.
► Peer comparison benchmark reports will be available to download from the
end of September
► The results will be presented in a thought leadership report tackling key
topics in more depth, accompanied by other client meeting materials
3.2
Page 17
Helpful links
EY Global Information Security Survey 2016
4
Page 18
X
Thank you for your interest in taking part in the GISS 2016
For further instructions on how on to enroll your client and survey participation,
see the GISS 2016 CHS page,
where you will find a variety of useful materials
(this will be added to as the survey progresses).
.
For further information about the GISS, see last year’s GISS deliverables on the
GISS 2015 CHS,
or view www.ey.com/cybersecurity
If you have questions or problems, please email the GISS support team at:
GISS.support@ey.com
Thank you!
EY Global Information Security Survey 2016
4.1
Page 19
Appendix
5
Page 20
X
Enrollment site preview
EY Global Information Security Survey 2016
NOTE - you will not be able to modify any client enrollment data after you’ve submitted it, so please be accurate,
especially when providing demographic details such as the client’s sector or country. If this information is not correct,
the client will be benchmarked against the wrong sector, or the wrong country.
Ensure you insert the
correct GFIS ID#
5.1
Enrolling a non-
client? Insert XXXXX
into this field
Starts June 1st
Page 21
X
Mass Enrollment
EY Global Information Security Survey 2016
Starts June 1st
5.1
► If you will be enrolling 10 or more clients at once, please fill out the mass
enrollment template available on the GISS 2016 CHS and email the
completed form to the GISS support team GISS.support@ey.com
► Note that fields with an asterisk (*) are required
Page 22
X
The survey questionnaire is coming soon!
Please check the GISS 2016 CHS page for further updates
Survey questionnaire
EY Global Information Security Survey 2016
5.2

More Related Content

Similar to Enroll Clients in EY's Global Information Security Survey

Insurance Through the Eyes of the Customer
Insurance Through the Eyes of the Customer Insurance Through the Eyes of the Customer
Insurance Through the Eyes of the Customer The Digital Insurer
 
Insurance Service Meeting 2016 - Andrea Eichhorn
Insurance Service Meeting 2016 - Andrea Eichhorn Insurance Service Meeting 2016 - Andrea Eichhorn
Insurance Service Meeting 2016 - Andrea Eichhorn CNseg
 
EY: Why graph technology makes sense for fraud detection and customer 360 pro...
EY: Why graph technology makes sense for fraud detection and customer 360 pro...EY: Why graph technology makes sense for fraud detection and customer 360 pro...
EY: Why graph technology makes sense for fraud detection and customer 360 pro...Neo4j
 
10 Benefits of Outsourcing Customer Loyalty Retail Programs - Invensis Techno...
10 Benefits of Outsourcing Customer Loyalty Retail Programs - Invensis Techno...10 Benefits of Outsourcing Customer Loyalty Retail Programs - Invensis Techno...
10 Benefits of Outsourcing Customer Loyalty Retail Programs - Invensis Techno...Invensis
 
Omni-channel in insurance
Omni-channel in insuranceOmni-channel in insurance
Omni-channel in insuranceRonald Engel
 
Pinpoint Predictive- InsurTech Innovation Award 2022
Pinpoint Predictive- InsurTech Innovation Award 2022Pinpoint Predictive- InsurTech Innovation Award 2022
Pinpoint Predictive- InsurTech Innovation Award 2022The Digital Insurer
 
InsurTech Growth Opportunities: Renters Insurance Opportunity
InsurTech Growth Opportunities: Renters Insurance OpportunityInsurTech Growth Opportunities: Renters Insurance Opportunity
InsurTech Growth Opportunities: Renters Insurance OpportunityBrian Kelley
 
Steve Perry EY - measuring the value of knowledge
Steve Perry EY - measuring the value of knowledgeSteve Perry EY - measuring the value of knowledge
Steve Perry EY - measuring the value of knowledgeSteve Perry
 
Digital strategies in asset management - BI-SAM
Digital strategies in asset management - BI-SAMDigital strategies in asset management - BI-SAM
Digital strategies in asset management - BI-SAMBISAM
 
Антоніна Скрипник “Blockchain, AI and R&D in developing business cases for F...
Антоніна Скрипник  “Blockchain, AI and R&D in developing business cases for F...Антоніна Скрипник  “Blockchain, AI and R&D in developing business cases for F...
Антоніна Скрипник “Blockchain, AI and R&D in developing business cases for F...Lviv Startup Club
 
Cloud Enabled Transformation In Insurance
Cloud Enabled Transformation In InsuranceCloud Enabled Transformation In Insurance
Cloud Enabled Transformation In InsuranceCapgemini
 
The Rise of China InsurTech – both sides of the wall
The Rise of China InsurTech – both sides of the wallThe Rise of China InsurTech – both sides of the wall
The Rise of China InsurTech – both sides of the wallThe Digital Insurer
 
Successful Implementation Of Customer Lifecycle Management And Crosssell
Successful Implementation Of Customer Lifecycle Management And CrosssellSuccessful Implementation Of Customer Lifecycle Management And Crosssell
Successful Implementation Of Customer Lifecycle Management And CrosssellAnand Nigam
 
The swimsuit market in China by Daxue consulting
The swimsuit market in China by Daxue consultingThe swimsuit market in China by Daxue consulting
The swimsuit market in China by Daxue consultingDaxue Consulting
 
BRIDGEi2i Whitepaper - The Science of Customer Experience Management
BRIDGEi2i Whitepaper - The Science of Customer Experience ManagementBRIDGEi2i Whitepaper - The Science of Customer Experience Management
BRIDGEi2i Whitepaper - The Science of Customer Experience ManagementBRIDGEi2i Analytics Solutions
 
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...The Digital Insurer
 
Product Reviews Software Market Size, Share, & Trends Estimation Report By Ty...
Product Reviews Software Market Size, Share, & Trends Estimation Report By Ty...Product Reviews Software Market Size, Share, & Trends Estimation Report By Ty...
Product Reviews Software Market Size, Share, & Trends Estimation Report By Ty...subishsam
 
Digital Thinking to unite sales and operations - LIMRA Bangkok 2015
Digital Thinking to unite sales and operations - LIMRA Bangkok 2015Digital Thinking to unite sales and operations - LIMRA Bangkok 2015
Digital Thinking to unite sales and operations - LIMRA Bangkok 2015The Digital Insurer
 

Similar to Enroll Clients in EY's Global Information Security Survey (20)

Insurance Through the Eyes of the Customer
Insurance Through the Eyes of the Customer Insurance Through the Eyes of the Customer
Insurance Through the Eyes of the Customer
 
Insurance Service Meeting 2016 - Andrea Eichhorn
Insurance Service Meeting 2016 - Andrea Eichhorn Insurance Service Meeting 2016 - Andrea Eichhorn
Insurance Service Meeting 2016 - Andrea Eichhorn
 
EY: Why graph technology makes sense for fraud detection and customer 360 pro...
EY: Why graph technology makes sense for fraud detection and customer 360 pro...EY: Why graph technology makes sense for fraud detection and customer 360 pro...
EY: Why graph technology makes sense for fraud detection and customer 360 pro...
 
10 Benefits of Outsourcing Customer Loyalty Retail Programs - Invensis Techno...
10 Benefits of Outsourcing Customer Loyalty Retail Programs - Invensis Techno...10 Benefits of Outsourcing Customer Loyalty Retail Programs - Invensis Techno...
10 Benefits of Outsourcing Customer Loyalty Retail Programs - Invensis Techno...
 
Omni-channel in insurance
Omni-channel in insuranceOmni-channel in insurance
Omni-channel in insurance
 
Pinpoint Predictive- InsurTech Innovation Award 2022
Pinpoint Predictive- InsurTech Innovation Award 2022Pinpoint Predictive- InsurTech Innovation Award 2022
Pinpoint Predictive- InsurTech Innovation Award 2022
 
InsurTech Growth Opportunities: Renters Insurance Opportunity
InsurTech Growth Opportunities: Renters Insurance OpportunityInsurTech Growth Opportunities: Renters Insurance Opportunity
InsurTech Growth Opportunities: Renters Insurance Opportunity
 
Steve Perry EY - measuring the value of knowledge
Steve Perry EY - measuring the value of knowledgeSteve Perry EY - measuring the value of knowledge
Steve Perry EY - measuring the value of knowledge
 
Digital strategies in asset management - BI-SAM
Digital strategies in asset management - BI-SAMDigital strategies in asset management - BI-SAM
Digital strategies in asset management - BI-SAM
 
Антоніна Скрипник “Blockchain, AI and R&D in developing business cases for F...
Антоніна Скрипник  “Blockchain, AI and R&D in developing business cases for F...Антоніна Скрипник  “Blockchain, AI and R&D in developing business cases for F...
Антоніна Скрипник “Blockchain, AI and R&D in developing business cases for F...
 
Cloud Enabled Transformation In Insurance
Cloud Enabled Transformation In InsuranceCloud Enabled Transformation In Insurance
Cloud Enabled Transformation In Insurance
 
Information is Opportunity, Action is Power: Roundtable 2014 Darrell Kunken
Information is Opportunity, Action is Power: Roundtable 2014   Darrell KunkenInformation is Opportunity, Action is Power: Roundtable 2014   Darrell Kunken
Information is Opportunity, Action is Power: Roundtable 2014 Darrell Kunken
 
The Rise of China InsurTech – both sides of the wall
The Rise of China InsurTech – both sides of the wallThe Rise of China InsurTech – both sides of the wall
The Rise of China InsurTech – both sides of the wall
 
Successful Implementation Of Customer Lifecycle Management And Crosssell
Successful Implementation Of Customer Lifecycle Management And CrosssellSuccessful Implementation Of Customer Lifecycle Management And Crosssell
Successful Implementation Of Customer Lifecycle Management And Crosssell
 
The swimsuit market in China by Daxue consulting
The swimsuit market in China by Daxue consultingThe swimsuit market in China by Daxue consulting
The swimsuit market in China by Daxue consulting
 
BRIDGEi2i Whitepaper - The Science of Customer Experience Management
BRIDGEi2i Whitepaper - The Science of Customer Experience ManagementBRIDGEi2i Whitepaper - The Science of Customer Experience Management
BRIDGEi2i Whitepaper - The Science of Customer Experience Management
 
Session 8 E-Marketing - 7 Sep 10
Session 8   E-Marketing - 7 Sep 10Session 8   E-Marketing - 7 Sep 10
Session 8 E-Marketing - 7 Sep 10
 
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
 
Product Reviews Software Market Size, Share, & Trends Estimation Report By Ty...
Product Reviews Software Market Size, Share, & Trends Estimation Report By Ty...Product Reviews Software Market Size, Share, & Trends Estimation Report By Ty...
Product Reviews Software Market Size, Share, & Trends Estimation Report By Ty...
 
Digital Thinking to unite sales and operations - LIMRA Bangkok 2015
Digital Thinking to unite sales and operations - LIMRA Bangkok 2015Digital Thinking to unite sales and operations - LIMRA Bangkok 2015
Digital Thinking to unite sales and operations - LIMRA Bangkok 2015
 

Enroll Clients in EY's Global Information Security Survey

  • 1. Page 1 EY’s Global Information Security Survey 2016 A ‘Getting started’ guide – client enrollment and survey participation
  • 2. Page 2 X Contents EY Global Information Security Survey 2016 1 Overview Welcome to the GISS 2016 3 4 Strengthening your client relationship 2 The survey 2.1 GISS roadmap 2.2 The survey 2.3 Survey participants 2.4 Security How to enroll participants and complete the survey 3.1 Invitation and enrolment hints and tips 3.2 Survey execution and reporting 3 1.1 1.2 2.5 GISS timings Helpful links4 Appendix5 5 6-11 7 8 9 10 11 12-16 13-14 15-16 17 19-21
  • 3. Page 3 Overview EY Global Information Security Survey 2016 1
  • 4. Page 4 X Now in its 19th year, EY’s Global information Security Survey (GISS) has proved year-on- year to be of significant value to clients, as well as helping shape EY’s reputation for cybersecurity leadership with analysts and the media. This year’s survey will explore how organizations are managing their cybersecurity in today’s complex digital world, from the top of the C-suite to the very center of their information security operations. The findings will help organizations understand how today’s cyber risks can impact their whole strategy and growth agenda; we will show them what mature cybersecurity capabilities look like, what skills and actions are needed at Board level, and how to prepare their cybersecurity operations to defend against and recover from a cyber attack. This survey is designed to be used with CEOs, CFOs and the general C-suite as well as the more traditional audience of CISOs, CIOs and Network Security professionals. If you engage with multiple clients from the same organization, this could give you a broader and more in-depth view of their cybersecurity. Neither you, nor your client, needs to be an expert in cybersecurity to complete the survey – when we look at the results we take into account what a realistic level of knowledge looks like for those who are not in IT or cybersecurity roles. Welcome to the GISS 2016 EY Global Information Security Survey 2016 1.1
  • 5. Page 5 X How will the GISS help you engage with your client? Our clients welcome the opportunity to have conversations about cybersecurity. Supporting your client through the survey process in a face to face interview style will help forge stronger relationships with your clients and prospects and every client that takes part gets an individual benchmark comparison report after the survey closes. It will also; Strengthening your client relationship EY Global Information Security Survey 2016 Open up a conversation about their readiness to deal with one of the biggest and most complex issues facing organizations today. Position EY’s team as your client’s strategic advisor and open up engagement opportunities. Provide our clients and prospects with the global insights and perspectives that will help them make smarter decisions about their cybersecurity capabilities. Reinforce EY as a global leader in cybersecurity, thanks to our market-leading consulting and service delivery capabilities, global reach, consistent methodology and experience 1.2
  • 6. Page 6 The survey EY Global Information Security Survey 2016 2
  • 7. Page 7 XGISS Roadmap EY Global Information Security Survey 2016 2.1
  • 8. Page 8 XThe survey GISS 2016 consists of one questionnaire that covers different audiences EY Global Information Security Survey 2016 GISS 2016 Survey Question areas This questionnaire consists of 40 questions relating to strategy, innovation and growth, risk, technology, people and organization, and finance and legal. One- third of the questions are new this year. Familiarise yourself with the questions before sharing them with the client by reviewing the hard copy on the GISS CHS page. Additional information If you complete the questionnaire with your client, why not broaden the conversation and capture their comments, their experience, their sector or geographic perspectives? Keep this qualitative information to supplement the quantitative data the survey will provide you with. Completion time Approximately 60 minutes The survey is best conducted via a face-to-face interview, where you can assist your client and complete the survey using a secure online access tool. Option: The client can complete the survey themselves if that is more convenient; you can also complete the survey using a hard copy of the questions, then key the results in later. 2.2
  • 9. Page 9 X ► The survey is designed to be used with CEOs, CFOs and the general C-suite as well as the more traditional audience of CISOs, CIOs and Network Security professionals. ► You can enroll multiple clients from the same organization ► You can enroll prospects and non-clients ► If your client has completed it before, by completing it again you can track any changes, as well as gain insights from the new question areas. CEO CISO CIO CFO COO CRO CDO Other Survey participants You are encouraged to invite both clients and non-clients to take the survey EY Global Information Security Survey 2016 2.3
  • 10. Page 10 XSecurity Keeping your client’s data confidential and secure EY Global Information Security Survey 2016 Because of the nature of the survey, EY is very aware of the importance of the confidentiality and security of your client’s data. ► As with previous surveys, we have implemented a comprehensive set of security controls, both organizational and technical, to provide confidence on this issue. ► All direct and indirect data gathered as a result of the survey will remain confidential, unless there is specific request from the client to review their specific benchmarked survey responses The online questionnaire is being provided in English only. Any language needs for your specific market will need to be translated locally, and a paper translation prepared. For further information, please contact the GISS support team at giss.support@ey.com 2.4
  • 11. Page 11 XGISS timings Important timeframes to consider EY Global Information Security Survey 2016 Phase 1 Invitation and enrollment Phase 2 Survey execution Phase 3 Analysis & launch ► Invite and enroll the client on the registration site via the links on the GISS 2016 CHS. ► Make sure the client understands what their time investment will get them in terms of the benefits of insights and perspectives and their individual benchmark report. ► Share with them, if appropriate, previous versions of the survey and the insights this provided, available on the GISS 2015 CHS and www.ey.com/giss ► Complete the survey either through face-to-face interview/conversation or by giving the client secure online access to the survey. ► If during this conversation, the client’s responses include important insights on their needs, be prepared to capture these so they can be addressed in subsequent follow-ups, using survey-related materials and a perspective from a cybersecurity practitioners. ► After the survey closes, the results will be gathered and the findings analyzed with the addition of insights and commentary from our own subject matter experts. ► The EY point of view on the findings and the impact on clients will be presented in thought leadership, infographics and other meeting materials. Cuts of data by sector and geography will be available. ► Your client’s individual results will become available for you to discuss with your client 1st June 13th June - 12th August 19th August – 30th September 2.5
  • 12. Page 12 How to enroll participants and complete the survey EY Global Information Security Survey 2016 3
  • 13. Page 13 X Step 1 - Invitations ► The first step in having someone participate in the GISS is to invite them to take part – this can be done during a meeting or call with your client, or by email/letter. ► A sample client invitation message has been developed that can be tailored for your specific client; this, and all other supporting material, can be accessed via the GISS 2016 CHS page. ► Clients can also be invited to view our dedicated website: www.ey.com/cybersecurity where the results of last year’s GISS 2015 and thought leadership report are available to view. ► Ideally the client needs to be aware that they are invited prior to you enrolling them. ► NB: The client will never receive communications directly from the EY survey team; the person who enrols the client will be the single point of any communication regarding that client Phase 1 - Invitations How to invite your client to participate EY Global Information Security Survey 2016 IMPORTANT: Keep the Global Coordinating Partner or Engagement Partner aware of any client invitations, especially if you wish to enroll a Channel 1 client. Starts 12th May 3.1
  • 14. Page 14 X How to enroll before the survey opens: ► EY contacts will be able to enroll clients by logging their information into the GISS Enrollment system at: https://survey.ey.com/giss/enrollclient.asp. ► Once completed, click the “Enroll client” button and a note will appear informing the EY contact that their client has been enrolled. ► The EY contact will be emailed the survey URL and client login credentials the day the survey formally opens. If the client is going to complete the survey online themselves, you will need to email the client with this information so they can access the survey. ► If you want to enroll 10 or more clients at once then please use the mass enrollment form available on the GISS 2016 CHS page. More information can be found in the appendix How to enroll after the survey has launched: ► Open the GISS Enrollment page and complete the enrollment information. Upon clicking the “Enroll client” button, a note will appear that includes the client’s login credentials. Please retain a copy of this information before sending an email with the login credentials to your client. You will not receive a separate email with the login credentials if you enroll your client after the survey opens. ► As the survey is already open, please email your client as soon as possible if they want direct access to the survey. Phase 1 – Enrollment How to enroll your client before and after survey launch EY Global Information Security Survey 2016 Starts 12th May 3.1
  • 15. Page 15 X Completing the survey during a face-to-face meeting (recommended) ► The recommended way to execute the survey is to have a face-to-face meeting with the client to go through the questions and discuss any specific issues or challenges they may be facing. The client may want to do some ‘fact finding’, in which case the survey can be halted and returned to later if several conversations are needed. ► There are 2 options to fill in the survey with a face-to-face meeting: 1. Go through the survey with the client and input the answers directly into the survey tool 2. Collect the participant’s answers to the questionnaire using the hard copy PDF of the survey (available on the GISS 2016 CHS page), and then launch the survey online yourself to input the answers to the survey tool . Please note, the GISS team cannot accept hard copy questionnaires– all data must be fed into the survey tool by someone from the engagement team. Client completing the survey online ► If the client completes the survey directly online, they will need to use the survey link you sent them. If they have difficulties or queries during the completion process, they can email GISS.support@ey.com Phase 2 – Survey execution How to complete the survey: face-to-face recommended EY Global Information Security Survey 2016 3.2
  • 16. Page 16 XPhase 3 – Reporting EY Global Information Security Survey 2016 ► The survey will close on 12th August. After this date, the results will be gathered and aggregated, the findings analyzed and the EY point of view developed. ► Peer comparison benchmark reports will be available to download from the end of September ► The results will be presented in a thought leadership report tackling key topics in more depth, accompanied by other client meeting materials 3.2
  • 17. Page 17 Helpful links EY Global Information Security Survey 2016 4
  • 18. Page 18 X Thank you for your interest in taking part in the GISS 2016 For further instructions on how on to enroll your client and survey participation, see the GISS 2016 CHS page, where you will find a variety of useful materials (this will be added to as the survey progresses). . For further information about the GISS, see last year’s GISS deliverables on the GISS 2015 CHS, or view www.ey.com/cybersecurity If you have questions or problems, please email the GISS support team at: GISS.support@ey.com Thank you! EY Global Information Security Survey 2016 4.1
  • 20. Page 20 X Enrollment site preview EY Global Information Security Survey 2016 NOTE - you will not be able to modify any client enrollment data after you’ve submitted it, so please be accurate, especially when providing demographic details such as the client’s sector or country. If this information is not correct, the client will be benchmarked against the wrong sector, or the wrong country. Ensure you insert the correct GFIS ID# 5.1 Enrolling a non- client? Insert XXXXX into this field Starts June 1st
  • 21. Page 21 X Mass Enrollment EY Global Information Security Survey 2016 Starts June 1st 5.1 ► If you will be enrolling 10 or more clients at once, please fill out the mass enrollment template available on the GISS 2016 CHS and email the completed form to the GISS support team GISS.support@ey.com ► Note that fields with an asterisk (*) are required
  • 22. Page 22 X The survey questionnaire is coming soon! Please check the GISS 2016 CHS page for further updates Survey questionnaire EY Global Information Security Survey 2016 5.2