SlideShare a Scribd company logo
A new IT-risk culture for Digital Transformation
Milan, May 11, 2017
Redux Version
The market is under pressure
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 2
Source: IDC, 2016 (n=98, companies with more than 50 employees in Italy; weighted extrapolation)
10 OR MORE DATA BREACHES
5-9 DATA BREACHES
3-4 DATA BREACHES
1-2 DATA BREACHES
0% 5% 10% 15% 20%
About 40% knows they have been breached
Who is adopting new IT Security tech is dealing
with specific challenges
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 3
0% 20% 40% 60%
COMPETING WITH CLOUD RESOURCES USED/SHADOW IT
HIGH LEVEL OF DEMAND FOR NEW BUSINESS SERVICES
FRAGMENTATION OR LACK OF INTEGRATION OF SECURITY PRODUCT PORTFOLIO
JUGGLING CONFLICTING PRIORITIES
NOT ENOUGH INTEGRATION INTO THE IT INFRASTRUCTURE TEAMS
LACK OF INSIGHT INTO SECURITY SENSITIVE ACTIVITIES
SKILLS SHORTAGES
OPERATIONS RESOURCES ARE TOO BUSY ON ROUTINE OPERATIONS
BUDGET CONSTRAINTS
What is challenging the development of IT Security
Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
Measuring risks is a proof of your risk aversion
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 4
Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
0%
20%
40%
60%
80%
INTERNAL
COMMUNICATIONS
PLAN
BREACH
NOTIFICATION
PLAN
BREACH
REMEDIATION
PLAN
RESPONSE
PLAN
A FORMAL RISK
ASSESSMENT
EXTERNAL
COMMUNICATIONS
AND PUBLIC
RELATIONS PLAN
CYBER RISK
INSURANCE
Risk management practice currently in use
Risk averse (n=64) Risk propense (n=35)
© IDC Visit us at IDC.com and follow us on Twitter: @IDC
5
TIME (MONTHS) TO MAINSTREAM
ORGANIZATIONALIMPACT
Asingle
department
orabusinessunit
Multiple
departments
orbusinessunitsCompanywide
0-12 12-24 24+
1
2
3
4
5
6
7
8
9
10
[CELLRANGE
]
[CELLRANG
E]
[CELLRANG
E]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE
]
[CELLRANGE]
[CELLRAN
GE]
[CELLRA
NGE]
[CELLRANGE]
IDC FutureScape 2017
Security Products and Services, Western Europe Implications
1
2
3
4
5
6
7
8
9
10
By 2021, 50% of all online transactions will incorporate biometric
authentication driven by a ubiquitous technology infrastructure
that enables low implementation costs and broad user
acceptance.
By 2019, more than 75% of IoT device manufacturers will
improve their security and privacy capabilities, making them
more trustworthy partners for technology buyers.
By 2019, 60% of major multinational corporations with ties to
Europe will face significant cybersecurity attacks aimed at
disruption of commodities.
Over the next 18 months, 85% of consumers in Western
European nations will defect from a business because their
personally identifiable information is impacted in a security
breach.
By 2019, 70% of Western European enterprise cybersecurity
environments will incorporate cognitive/AI technologies to assist
humans in dealing with the vastly increasing scale and complexity of
cyberthreats.
By 2018, 50% of enterprise customers will leverage analytics as
a service to help solve the challenge of combing through
security-related data and events.
By 2020, cloud security gateway functionality will begin to be
integrated as part of web service offerings to entice IT leaders to
move offerings to the cloud.
By 2020, 25% of Western European broadband homes will have
at least one IP-enabled home automation or security monitoring
sensor/device.
By 2021, 60% of Western European enterprises will invest in
incident response retainers.
By 2020, more than 25% of Western European enterprises will
secure their IT architectures through cloud, hosted, or SaaS
security services.
Note: The size of the bubble indicates complexity/cost to address.
Source: IDC, 2016
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 6
Risk posture has an impact on the adoption
of new security technologies
Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
15%
35%
55%
75%
THREAT INTELLIGENCE SERVICES MICRO SEGMENTATION AI/HEURISTICS
Currently using security technologies by risk posture
Risk propense (n=35) Risk averse (n=64)
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 7
40%
52%
64%
76%
KNOWLEDGE OF
OBLIGATIONS
IMPLEMENTATION
PLANNING
PENALTIES MITIGATION
BASED ON EARLY
DETECTION/REMEDIATION
CONTINUOUS
IMPROVEMENT
IMPLEMENTATION
EXECUTION
ASSESSMENT OF
CAPABILITIES AND GAPS
Higherpreparednessscore(4to5)
Preparedness to GDPR
Risk propense (n=35) Risk averse (n=64)
GDPR implementation will also depend on
the actual perception of risks
Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 8
IDC Italia
Viale Monza 14
20127 Milano
Tel: +39 02 28457339
gvercellino@idc.com
Giancarlo Vercellino
Research & Consulting
Manager
IDC Italy
www.idc.com

More Related Content

What's hot

Data Intelligence: come abilitare il valore aziendale
Data Intelligence: come abilitare il valore aziendaleData Intelligence: come abilitare il valore aziendale
Data Intelligence: come abilitare il valore aziendale
IDC Italy
 
CeBIT IoT Forum (2017)
CeBIT IoT Forum (2017)CeBIT IoT Forum (2017)
CeBIT IoT Forum (2017)
Marc Jadoul
 
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
IDC Italy
 
Oies IoT World Europe 20170615
Oies IoT World Europe 20170615Oies IoT World Europe 20170615
Oies IoT World Europe 20170615
Francisco Maroto
 
Connected Cars Europe keynote (2017)
Connected Cars Europe keynote (2017)Connected Cars Europe keynote (2017)
Connected Cars Europe keynote (2017)
Marc Jadoul
 
Go+ product
Go+ productGo+ product
Go+ product
theUntitledVC
 
Internet of Things in 10 slides
Internet of Things in 10 slides Internet of Things in 10 slides
Internet of Things in 10 slides
Francisco Maroto
 
VDE Smart Cities (2016)
VDE Smart Cities (2016)VDE Smart Cities (2016)
VDE Smart Cities (2016)
Marc Jadoul
 
CCWTR Press Deck Completo
CCWTR Press Deck CompletoCCWTR Press Deck Completo
CCWTR Press Deck Completo
Felipe Lamus
 
Presentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise ArchitecturePresentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise Architecture
Francisco Maroto
 
Predictions idc2013
Predictions idc2013Predictions idc2013
Predictions idc2013
Unesco Telemedicine
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
moldovaictsummit2016
 
ETSI IoT keynote (2016)
ETSI IoT keynote (2016)ETSI IoT keynote (2016)
ETSI IoT keynote (2016)
Marc Jadoul
 
5 Factors in Modern Data Design
5 Factors in Modern Data Design5 Factors in Modern Data Design
5 Factors in Modern Data Design
Dan Sexton
 
Israel @ MWC 2017 catalogue
Israel @ MWC 2017 catalogueIsrael @ MWC 2017 catalogue
Israel @ MWC 2017 catalogue
Marc Hodara
 
Gartner: Top 10 Strategic Technology Trends 2016
Gartner: Top 10 Strategic Technology Trends 2016Gartner: Top 10 Strategic Technology Trends 2016
Gartner: Top 10 Strategic Technology Trends 2016
Den Reymer
 
Business Analytics and the Internet of Things
Business Analytics and the Internet of ThingsBusiness Analytics and the Internet of Things
Business Analytics and the Internet of Things
Mark Benson
 
Industrial IoT Market Winter 2018
Industrial IoT Market Winter 2018Industrial IoT Market Winter 2018
Industrial IoT Market Winter 2018
Dan Sexton
 
L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...
L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...
L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...
IDC Italy
 
The Rise of Platforms in the IoT
The Rise of Platforms in the IoTThe Rise of Platforms in the IoT
The Rise of Platforms in the IoT
Mark Benson
 

What's hot (20)

Data Intelligence: come abilitare il valore aziendale
Data Intelligence: come abilitare il valore aziendaleData Intelligence: come abilitare il valore aziendale
Data Intelligence: come abilitare il valore aziendale
 
CeBIT IoT Forum (2017)
CeBIT IoT Forum (2017)CeBIT IoT Forum (2017)
CeBIT IoT Forum (2017)
 
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
 
Oies IoT World Europe 20170615
Oies IoT World Europe 20170615Oies IoT World Europe 20170615
Oies IoT World Europe 20170615
 
Connected Cars Europe keynote (2017)
Connected Cars Europe keynote (2017)Connected Cars Europe keynote (2017)
Connected Cars Europe keynote (2017)
 
Go+ product
Go+ productGo+ product
Go+ product
 
Internet of Things in 10 slides
Internet of Things in 10 slides Internet of Things in 10 slides
Internet of Things in 10 slides
 
VDE Smart Cities (2016)
VDE Smart Cities (2016)VDE Smart Cities (2016)
VDE Smart Cities (2016)
 
CCWTR Press Deck Completo
CCWTR Press Deck CompletoCCWTR Press Deck Completo
CCWTR Press Deck Completo
 
Presentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise ArchitecturePresentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise Architecture
 
Predictions idc2013
Predictions idc2013Predictions idc2013
Predictions idc2013
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
ETSI IoT keynote (2016)
ETSI IoT keynote (2016)ETSI IoT keynote (2016)
ETSI IoT keynote (2016)
 
5 Factors in Modern Data Design
5 Factors in Modern Data Design5 Factors in Modern Data Design
5 Factors in Modern Data Design
 
Israel @ MWC 2017 catalogue
Israel @ MWC 2017 catalogueIsrael @ MWC 2017 catalogue
Israel @ MWC 2017 catalogue
 
Gartner: Top 10 Strategic Technology Trends 2016
Gartner: Top 10 Strategic Technology Trends 2016Gartner: Top 10 Strategic Technology Trends 2016
Gartner: Top 10 Strategic Technology Trends 2016
 
Business Analytics and the Internet of Things
Business Analytics and the Internet of ThingsBusiness Analytics and the Internet of Things
Business Analytics and the Internet of Things
 
Industrial IoT Market Winter 2018
Industrial IoT Market Winter 2018Industrial IoT Market Winter 2018
Industrial IoT Market Winter 2018
 
L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...
L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...
L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...
 
The Rise of Platforms in the IoT
The Rise of Platforms in the IoTThe Rise of Platforms in the IoT
The Rise of Platforms in the IoT
 

Similar to Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazione digitale

Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDC
Harry Gunns
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital Economy
Cisco Russia
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Bill Burns
 
Manage the IT risk in the era of Industrial Internet
Manage the IT risk in the era of Industrial InternetManage the IT risk in the era of Industrial Internet
Manage the IT risk in the era of Industrial Internet
IDC Italy
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
IBM Security
 
Retail Week: Cloud Security
Retail Week: Cloud SecurityRetail Week: Cloud Security
Retail Week: Cloud Security
Datapipe
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
IBM Security
 
Effecientip DNS security.pdf
Effecientip DNS security.pdfEffecientip DNS security.pdf
Effecientip DNS security.pdf
neoalt
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020
Eoin Keary
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.Onwubiko Emmanuel
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - Jelecos
Erin_Jelecos
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Prime Infoserv
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
IBM Security
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
TechSoup
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
Enterprise Management Associates
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
Cisco Canada
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
International Federation of Accountants
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
SecPod Technologies
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
m12016changTIIMP
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
Seqrite
 

Similar to Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazione digitale (20)

Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDC
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital Economy
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
Manage the IT risk in the era of Industrial Internet
Manage the IT risk in the era of Industrial InternetManage the IT risk in the era of Industrial Internet
Manage the IT risk in the era of Industrial Internet
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
Retail Week: Cloud Security
Retail Week: Cloud SecurityRetail Week: Cloud Security
Retail Week: Cloud Security
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
Effecientip DNS security.pdf
Effecientip DNS security.pdfEffecientip DNS security.pdf
Effecientip DNS security.pdf
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - Jelecos
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 

More from IDC Italy

Innovare alla velocità del cloud: la rivoluzione multicloud
Innovare alla velocità del cloud: la rivoluzione multicloudInnovare alla velocità del cloud: la rivoluzione multicloud
Innovare alla velocità del cloud: la rivoluzione multicloud
IDC Italy
 
Sogno di una fabbrica digitale
Sogno di una fabbrica digitaleSogno di una fabbrica digitale
Sogno di una fabbrica digitale
IDC Italy
 
Il nuovo data center, un’infrastruttura digitale agile e distribuita
Il nuovo data center, un’infrastruttura digitale agile e distribuitaIl nuovo data center, un’infrastruttura digitale agile e distribuita
Il nuovo data center, un’infrastruttura digitale agile e distribuita
IDC Italy
 
Cognitive/AI: views, perspectives & directions
Cognitive/AI: views, perspectives & directionsCognitive/AI: views, perspectives & directions
Cognitive/AI: views, perspectives & directions
IDC Italy
 
Enterprise Mobility Blends Next-Gen Technologies
Enterprise Mobility Blends Next-Gen TechnologiesEnterprise Mobility Blends Next-Gen Technologies
Enterprise Mobility Blends Next-Gen Technologies
IDC Italy
 
Digital Native Enterprise: Disrupt to Transform, Transform to Succeed
Digital Native Enterprise: Disrupt to Transform, Transform to SucceedDigital Native Enterprise: Disrupt to Transform, Transform to Succeed
Digital Native Enterprise: Disrupt to Transform, Transform to Succeed
IDC Italy
 
Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...
Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...
Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...
IDC Italy
 
Adattare l'organizzazione IT alla trasformazione digitale
Adattare l'organizzazione IT alla trasformazione digitaleAdattare l'organizzazione IT alla trasformazione digitale
Adattare l'organizzazione IT alla trasformazione digitale
IDC Italy
 
Rinnovare il Retail: Piattaforma, Esperienza e Innovazione
Rinnovare il Retail: Piattaforma, Esperienza e InnovazioneRinnovare il Retail: Piattaforma, Esperienza e Innovazione
Rinnovare il Retail: Piattaforma, Esperienza e Innovazione
IDC Italy
 
Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...
Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...
Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...
IDC Italy
 
The Cognitive Edge: A New Competitive Advantage
The Cognitive Edge: A New Competitive AdvantageThe Cognitive Edge: A New Competitive Advantage
The Cognitive Edge: A New Competitive Advantage
IDC Italy
 
Open your Transformation, Define your Evolution
Open your Transformation, Define your EvolutionOpen your Transformation, Define your Evolution
Open your Transformation, Define your Evolution
IDC Italy
 
Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...
Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...
Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...
IDC Italy
 
Superare gli ostacoli al cambiamento nel percorso di trasformazione digitale
Superare gli ostacoli al cambiamento nel percorso di trasformazione digitaleSuperare gli ostacoli al cambiamento nel percorso di trasformazione digitale
Superare gli ostacoli al cambiamento nel percorso di trasformazione digitale
IDC Italy
 
Mobile Strategy in Digital Environment: the Mindset Shift
Mobile Strategy in Digital Environment: the Mindset ShiftMobile Strategy in Digital Environment: the Mindset Shift
Mobile Strategy in Digital Environment: the Mindset Shift
IDC Italy
 
IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...
IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...
IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...
IDC Italy
 
The Analytic Gap – Matching decision making with data analytics
The Analytic Gap – Matching decision making with data analytics The Analytic Gap – Matching decision making with data analytics
The Analytic Gap – Matching decision making with data analytics
IDC Italy
 
Digital Analytics
Digital AnalyticsDigital Analytics
Digital Analytics
IDC Italy
 
Digitalisation Now
Digitalisation NowDigitalisation Now
Digitalisation Now
IDC Italy
 
Next Generation Field Service Management
Next Generation Field Service ManagementNext Generation Field Service Management
Next Generation Field Service Management
IDC Italy
 

More from IDC Italy (20)

Innovare alla velocità del cloud: la rivoluzione multicloud
Innovare alla velocità del cloud: la rivoluzione multicloudInnovare alla velocità del cloud: la rivoluzione multicloud
Innovare alla velocità del cloud: la rivoluzione multicloud
 
Sogno di una fabbrica digitale
Sogno di una fabbrica digitaleSogno di una fabbrica digitale
Sogno di una fabbrica digitale
 
Il nuovo data center, un’infrastruttura digitale agile e distribuita
Il nuovo data center, un’infrastruttura digitale agile e distribuitaIl nuovo data center, un’infrastruttura digitale agile e distribuita
Il nuovo data center, un’infrastruttura digitale agile e distribuita
 
Cognitive/AI: views, perspectives & directions
Cognitive/AI: views, perspectives & directionsCognitive/AI: views, perspectives & directions
Cognitive/AI: views, perspectives & directions
 
Enterprise Mobility Blends Next-Gen Technologies
Enterprise Mobility Blends Next-Gen TechnologiesEnterprise Mobility Blends Next-Gen Technologies
Enterprise Mobility Blends Next-Gen Technologies
 
Digital Native Enterprise: Disrupt to Transform, Transform to Succeed
Digital Native Enterprise: Disrupt to Transform, Transform to SucceedDigital Native Enterprise: Disrupt to Transform, Transform to Succeed
Digital Native Enterprise: Disrupt to Transform, Transform to Succeed
 
Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...
Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...
Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...
 
Adattare l'organizzazione IT alla trasformazione digitale
Adattare l'organizzazione IT alla trasformazione digitaleAdattare l'organizzazione IT alla trasformazione digitale
Adattare l'organizzazione IT alla trasformazione digitale
 
Rinnovare il Retail: Piattaforma, Esperienza e Innovazione
Rinnovare il Retail: Piattaforma, Esperienza e InnovazioneRinnovare il Retail: Piattaforma, Esperienza e Innovazione
Rinnovare il Retail: Piattaforma, Esperienza e Innovazione
 
Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...
Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...
Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...
 
The Cognitive Edge: A New Competitive Advantage
The Cognitive Edge: A New Competitive AdvantageThe Cognitive Edge: A New Competitive Advantage
The Cognitive Edge: A New Competitive Advantage
 
Open your Transformation, Define your Evolution
Open your Transformation, Define your EvolutionOpen your Transformation, Define your Evolution
Open your Transformation, Define your Evolution
 
Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...
Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...
Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...
 
Superare gli ostacoli al cambiamento nel percorso di trasformazione digitale
Superare gli ostacoli al cambiamento nel percorso di trasformazione digitaleSuperare gli ostacoli al cambiamento nel percorso di trasformazione digitale
Superare gli ostacoli al cambiamento nel percorso di trasformazione digitale
 
Mobile Strategy in Digital Environment: the Mindset Shift
Mobile Strategy in Digital Environment: the Mindset ShiftMobile Strategy in Digital Environment: the Mindset Shift
Mobile Strategy in Digital Environment: the Mindset Shift
 
IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...
IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...
IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...
 
The Analytic Gap – Matching decision making with data analytics
The Analytic Gap – Matching decision making with data analytics The Analytic Gap – Matching decision making with data analytics
The Analytic Gap – Matching decision making with data analytics
 
Digital Analytics
Digital AnalyticsDigital Analytics
Digital Analytics
 
Digitalisation Now
Digitalisation NowDigitalisation Now
Digitalisation Now
 
Next Generation Field Service Management
Next Generation Field Service ManagementNext Generation Field Service Management
Next Generation Field Service Management
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazione digitale

  • 1. A new IT-risk culture for Digital Transformation Milan, May 11, 2017 Redux Version
  • 2. The market is under pressure © IDC Visit us at IDC.com and follow us on Twitter: @IDC 2 Source: IDC, 2016 (n=98, companies with more than 50 employees in Italy; weighted extrapolation) 10 OR MORE DATA BREACHES 5-9 DATA BREACHES 3-4 DATA BREACHES 1-2 DATA BREACHES 0% 5% 10% 15% 20% About 40% knows they have been breached
  • 3. Who is adopting new IT Security tech is dealing with specific challenges © IDC Visit us at IDC.com and follow us on Twitter: @IDC 3 0% 20% 40% 60% COMPETING WITH CLOUD RESOURCES USED/SHADOW IT HIGH LEVEL OF DEMAND FOR NEW BUSINESS SERVICES FRAGMENTATION OR LACK OF INTEGRATION OF SECURITY PRODUCT PORTFOLIO JUGGLING CONFLICTING PRIORITIES NOT ENOUGH INTEGRATION INTO THE IT INFRASTRUCTURE TEAMS LACK OF INSIGHT INTO SECURITY SENSITIVE ACTIVITIES SKILLS SHORTAGES OPERATIONS RESOURCES ARE TOO BUSY ON ROUTINE OPERATIONS BUDGET CONSTRAINTS What is challenging the development of IT Security Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
  • 4. Measuring risks is a proof of your risk aversion © IDC Visit us at IDC.com and follow us on Twitter: @IDC 4 Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation) 0% 20% 40% 60% 80% INTERNAL COMMUNICATIONS PLAN BREACH NOTIFICATION PLAN BREACH REMEDIATION PLAN RESPONSE PLAN A FORMAL RISK ASSESSMENT EXTERNAL COMMUNICATIONS AND PUBLIC RELATIONS PLAN CYBER RISK INSURANCE Risk management practice currently in use Risk averse (n=64) Risk propense (n=35)
  • 5. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 5 TIME (MONTHS) TO MAINSTREAM ORGANIZATIONALIMPACT Asingle department orabusinessunit Multiple departments orbusinessunitsCompanywide 0-12 12-24 24+ 1 2 3 4 5 6 7 8 9 10 [CELLRANGE ] [CELLRANG E] [CELLRANG E] [CELLRANGE] [CELLRANGE] [CELLRANGE ] [CELLRANGE] [CELLRAN GE] [CELLRA NGE] [CELLRANGE] IDC FutureScape 2017 Security Products and Services, Western Europe Implications 1 2 3 4 5 6 7 8 9 10 By 2021, 50% of all online transactions will incorporate biometric authentication driven by a ubiquitous technology infrastructure that enables low implementation costs and broad user acceptance. By 2019, more than 75% of IoT device manufacturers will improve their security and privacy capabilities, making them more trustworthy partners for technology buyers. By 2019, 60% of major multinational corporations with ties to Europe will face significant cybersecurity attacks aimed at disruption of commodities. Over the next 18 months, 85% of consumers in Western European nations will defect from a business because their personally identifiable information is impacted in a security breach. By 2019, 70% of Western European enterprise cybersecurity environments will incorporate cognitive/AI technologies to assist humans in dealing with the vastly increasing scale and complexity of cyberthreats. By 2018, 50% of enterprise customers will leverage analytics as a service to help solve the challenge of combing through security-related data and events. By 2020, cloud security gateway functionality will begin to be integrated as part of web service offerings to entice IT leaders to move offerings to the cloud. By 2020, 25% of Western European broadband homes will have at least one IP-enabled home automation or security monitoring sensor/device. By 2021, 60% of Western European enterprises will invest in incident response retainers. By 2020, more than 25% of Western European enterprises will secure their IT architectures through cloud, hosted, or SaaS security services. Note: The size of the bubble indicates complexity/cost to address. Source: IDC, 2016
  • 6. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 6 Risk posture has an impact on the adoption of new security technologies Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation) 15% 35% 55% 75% THREAT INTELLIGENCE SERVICES MICRO SEGMENTATION AI/HEURISTICS Currently using security technologies by risk posture Risk propense (n=35) Risk averse (n=64)
  • 7. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 7 40% 52% 64% 76% KNOWLEDGE OF OBLIGATIONS IMPLEMENTATION PLANNING PENALTIES MITIGATION BASED ON EARLY DETECTION/REMEDIATION CONTINUOUS IMPROVEMENT IMPLEMENTATION EXECUTION ASSESSMENT OF CAPABILITIES AND GAPS Higherpreparednessscore(4to5) Preparedness to GDPR Risk propense (n=35) Risk averse (n=64) GDPR implementation will also depend on the actual perception of risks Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
  • 8. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 8 IDC Italia Viale Monza 14 20127 Milano Tel: +39 02 28457339 gvercellino@idc.com Giancarlo Vercellino Research & Consulting Manager IDC Italy www.idc.com