SlideShare a Scribd company logo
1 of 12
Cyber Ready
Barometer
Research 2018
Vodafone Group
Enterprise Security
C1 - Public
Vodafone Proprietary classified as C2 - Internal
New technology adopters
view security as an enabler
of opportunities, not a
barrier
Cybersecurity drives
tangible business benefit
and allows organisations to
transform faster
A reputation for effective
cyber security is viewed as
having a positive impact on
customers
86%
of high-growth companies believe that strong
cyber enables new business
9 out of 10
believe improving cyber security will enhance
customer trust and loyalty
What we discovered in 2017: The
Innovation Accelerator
2
In 2018, we set out to further investigate the relationship between cyber and success
24%
higher financial benefits for IoT adopters
who invest in cyber security
Vodafone Proprietary classified as C2 - Internal
Introducing the Cyber
Ready Barometer
research
Becoming more Cyber Ready in
the face of the shifting security
landscape and widespread digital
transformation is
increasingly essential
4,809 IT and business
leaders, employees and
consumers were surveyed over
9 countries.
Our objective was to assess the
levels of security readiness and
resilience across businesses of all
sizes and its affect on business
outcomes
We contrasted the results between
these groups and also compared
some of the trends against our
2017 findings
3
Vodafone Proprietary classified as C2 - Internal
Maureen Kaplan
Vodafone Enterprise Security Lead
The Cyber Ready Barometer has taken a
pressure reading on the level of cyber
readiness in the market and uncovered a
clear link between security and
competitive advantage.”
4
Vodafone Proprietary classified as C2 - Internal
5
We created the Cyber Ready
Index, here are the six criteria
Each
respondent
was given a
Cyber Ready
rating out of
100
Vodafone Proprietary classified as C2 - Internal
We identified five
levels of Cyber
Readiness
6
Only 1 in 4
businesses are Cyber Ready and
larger firms are more likely to be
Ready than smaller businesses
Observation 1
46/100
The average score across all
businesses is 46, ranking them
as having Developing readiness.
Vodafone Proprietary classified as C2 - Internal
79%
40%
83%
48%
Using different
types of Cloud
Services
Using IoT
Devices
2017
2018
Observation 2
Evolving digital
footprints present a
big challenge
7
More businesses are using
different types of cloud services
and IoT devices
And the average consumer
household is using
9
connected devices
11
online services
Vodafone Proprietary classified as C2 - Internal
Employees and
businesses have
differing views
Observation 3
30 November 20188
Employee engagement
needs more focus
Disconnects exist between
decision-makers and
employees
47%
said official policy is
followed by all staff
39%
said security is a
box-ticking exercise
8
43%
63%
% of staff that use own
smartphone for work
Business
Employees
20%
gap
Vodafone Proprietary classified as C2 - Internal
But the more
Cyber Ready, the
bigger the advantage
Observation 4
9
Advanced
Basic
Proactive
Stakeholder Trust Revenue Growth >5%
4.8
4.3
3.1
58
%
47
%
22
%
Businesses demonstrating ‘Advanced’ levels of Cyber
Readiness are outperforming those who possess only
‘Basic’ readiness on the Cyber Ready Index
.
Vodafone Proprietary classified as C2 - Internal
The Consumer
Security Advantage
10
Observation 5
70%
consider themselves at
risk of cyber attack
63%
have stopped using an
online service due to
security concerns
43%
don’t trust security measures
of companies they use
59% of consumers say they would pay
extra for better security. But just 29%
of businesses think they can increase
prices for more secure services
Vodafone Proprietary classified as C2 - Internal
11
Read the Cyber Ready
Barometer to learn more
Read the full research report to
read more insight and expert
analysis
Download here
For more
information
Email: cybersecurity@vodafone.com
www.vodafone.com/business/cyber-security
C1 - Public

More Related Content

What's hot

CIO CV-19 Impact Study
CIO CV-19 Impact StudyCIO CV-19 Impact Study
CIO CV-19 Impact StudyIDG
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilienceaccenture
 
Security in the IT Channel
Security in the IT ChannelSecurity in the IT Channel
Security in the IT ChannelCompTIA
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA
 
Accenture Banking Security Index
Accenture Banking Security IndexAccenture Banking Security Index
Accenture Banking Security Indexaccenture
 
2016 IT Industry Outlook
2016 IT Industry Outlook2016 IT Industry Outlook
2016 IT Industry OutlookCompTIA
 
Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCHarry Gunns
 
Decoding Organizational DNA
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNAaccenture
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRImperva
 
2018 Trends in Cybersecurity: Building Effective Security Teams
2018 Trends in Cybersecurity: Building Effective Security Teams 2018 Trends in Cybersecurity: Building Effective Security Teams
2018 Trends in Cybersecurity: Building Effective Security Teams CompTIA
 
The State of the Federal IT Market 2018
The State of the Federal IT Market 2018The State of the Federal IT Market 2018
The State of the Federal IT Market 2018accenture
 
Unfolding the next growth chapter in the Middle East
Unfolding the next growth chapter in the Middle East Unfolding the next growth chapter in the Middle East
Unfolding the next growth chapter in the Middle East Accenture Middle East
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilienceaccenture
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdriveaccenture
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Pierre-Olivier Bedard-Maltais - Industry 4.0: are Canadian SMEs ready for the...
Pierre-Olivier Bedard-Maltais - Industry 4.0: are Canadian SMEs ready for the...Pierre-Olivier Bedard-Maltais - Industry 4.0: are Canadian SMEs ready for the...
Pierre-Olivier Bedard-Maltais - Industry 4.0: are Canadian SMEs ready for the...OECD CFE
 
Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementCHRIS CLIFFORD
 

What's hot (20)

CIO CV-19 Impact Study
CIO CV-19 Impact StudyCIO CV-19 Impact Study
CIO CV-19 Impact Study
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
Financial Impact of BYOD Programs
Financial Impact of BYOD ProgramsFinancial Impact of BYOD Programs
Financial Impact of BYOD Programs
 
Security in the IT Channel
Security in the IT ChannelSecurity in the IT Channel
Security in the IT Channel
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel
 
Accenture Banking Security Index
Accenture Banking Security IndexAccenture Banking Security Index
Accenture Banking Security Index
 
2016 IT Industry Outlook
2016 IT Industry Outlook2016 IT Industry Outlook
2016 IT Industry Outlook
 
Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDC
 
Decoding Organizational DNA
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNA
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
 
2018 Trends in Cybersecurity: Building Effective Security Teams
2018 Trends in Cybersecurity: Building Effective Security Teams 2018 Trends in Cybersecurity: Building Effective Security Teams
2018 Trends in Cybersecurity: Building Effective Security Teams
 
Infosecurity Europe - Infographic
Infosecurity Europe - InfographicInfosecurity Europe - Infographic
Infosecurity Europe - Infographic
 
The State of the Federal IT Market 2018
The State of the Federal IT Market 2018The State of the Federal IT Market 2018
The State of the Federal IT Market 2018
 
Unfolding the next growth chapter in the Middle East
Unfolding the next growth chapter in the Middle East Unfolding the next growth chapter in the Middle East
Unfolding the next growth chapter in the Middle East
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Pierre-Olivier Bedard-Maltais - Industry 4.0: are Canadian SMEs ready for the...
Pierre-Olivier Bedard-Maltais - Industry 4.0: are Canadian SMEs ready for the...Pierre-Olivier Bedard-Maltais - Industry 4.0: are Canadian SMEs ready for the...
Pierre-Olivier Bedard-Maltais - Industry 4.0: are Canadian SMEs ready for the...
 
Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk Management
 

Similar to Vodafone cyber ready barometer 2018

Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise ReportOkta-Inc
 
HPE_Aruba_IoT_Study_Press_Deck_v3.1.pptx
HPE_Aruba_IoT_Study_Press_Deck_v3.1.pptxHPE_Aruba_IoT_Study_Press_Deck_v3.1.pptx
HPE_Aruba_IoT_Study_Press_Deck_v3.1.pptxahmed hesham dandousha
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Burton Lee
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Pierre Audoin Consultants
 
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyondIot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyondDigital Policy and Law Consulting
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Cloudflare
 
The economist intelligence_unit_
The economist intelligence_unit_The economist intelligence_unit_
The economist intelligence_unit_Ali Reza Bakhshi
 
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...TrustArc
 
2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index Insight
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondNandita Nityanandam
 
Digital Readiness and the Pandemic: Assessing the Impact
Digital Readiness and the Pandemic: Assessing the ImpactDigital Readiness and the Pandemic: Assessing the Impact
Digital Readiness and the Pandemic: Assessing the ImpactTata Consultancy Services
 
Securing the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustSecuring the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustAccenture Insurance
 
IDC: The Next Steps in Digital Transformation
IDC: The Next Steps in Digital TransformationIDC: The Next Steps in Digital Transformation
IDC: The Next Steps in Digital TransformationSOA PEOPLE
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityNiamh Hughes
 
Industry 4.0-building-your-digital-enterprise-april-2016
Industry 4.0-building-your-digital-enterprise-april-2016Industry 4.0-building-your-digital-enterprise-april-2016
Industry 4.0-building-your-digital-enterprise-april-2016Vinh Le Van
 
Industry 4.0: Building your digital enterprise
Industry 4.0: Building your digital enterpriseIndustry 4.0: Building your digital enterprise
Industry 4.0: Building your digital enterprisePwC España
 
Industry 4.0-building-your-digital-enterprise-april-2016
Industry 4.0-building-your-digital-enterprise-april-2016Industry 4.0-building-your-digital-enterprise-april-2016
Industry 4.0-building-your-digital-enterprise-april-2016venkysslide
 

Similar to Vodafone cyber ready barometer 2018 (20)

Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
 
HPE_Aruba_IoT_Study_Press_Deck_v3.1.pptx
HPE_Aruba_IoT_Study_Press_Deck_v3.1.pptxHPE_Aruba_IoT_Study_Press_Deck_v3.1.pptx
HPE_Aruba_IoT_Study_Press_Deck_v3.1.pptx
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises?
 
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyondIot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
The economist intelligence_unit_
The economist intelligence_unit_The economist intelligence_unit_
The economist intelligence_unit_
 
EMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-Security
 
Redington Value journal - August 2019
Redington Value journal - August 2019 Redington Value journal - August 2019
Redington Value journal - August 2019
 
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
 
2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
Digital Readiness and the Pandemic: Assessing the Impact
Digital Readiness and the Pandemic: Assessing the ImpactDigital Readiness and the Pandemic: Assessing the Impact
Digital Readiness and the Pandemic: Assessing the Impact
 
Securing the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustSecuring the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for Trust
 
IDC: The Next Steps in Digital Transformation
IDC: The Next Steps in Digital TransformationIDC: The Next Steps in Digital Transformation
IDC: The Next Steps in Digital Transformation
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber security
 
Industry 4.0-building-your-digital-enterprise-april-2016
Industry 4.0-building-your-digital-enterprise-april-2016Industry 4.0-building-your-digital-enterprise-april-2016
Industry 4.0-building-your-digital-enterprise-april-2016
 
Industry 4.0: Building your digital enterprise
Industry 4.0: Building your digital enterpriseIndustry 4.0: Building your digital enterprise
Industry 4.0: Building your digital enterprise
 
Industry 4.0-building-your-digital-enterprise-april-2016
Industry 4.0-building-your-digital-enterprise-april-2016Industry 4.0-building-your-digital-enterprise-april-2016
Industry 4.0-building-your-digital-enterprise-april-2016
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Vodafone cyber ready barometer 2018

  • 1. Cyber Ready Barometer Research 2018 Vodafone Group Enterprise Security C1 - Public
  • 2. Vodafone Proprietary classified as C2 - Internal New technology adopters view security as an enabler of opportunities, not a barrier Cybersecurity drives tangible business benefit and allows organisations to transform faster A reputation for effective cyber security is viewed as having a positive impact on customers 86% of high-growth companies believe that strong cyber enables new business 9 out of 10 believe improving cyber security will enhance customer trust and loyalty What we discovered in 2017: The Innovation Accelerator 2 In 2018, we set out to further investigate the relationship between cyber and success 24% higher financial benefits for IoT adopters who invest in cyber security
  • 3. Vodafone Proprietary classified as C2 - Internal Introducing the Cyber Ready Barometer research Becoming more Cyber Ready in the face of the shifting security landscape and widespread digital transformation is increasingly essential 4,809 IT and business leaders, employees and consumers were surveyed over 9 countries. Our objective was to assess the levels of security readiness and resilience across businesses of all sizes and its affect on business outcomes We contrasted the results between these groups and also compared some of the trends against our 2017 findings 3
  • 4. Vodafone Proprietary classified as C2 - Internal Maureen Kaplan Vodafone Enterprise Security Lead The Cyber Ready Barometer has taken a pressure reading on the level of cyber readiness in the market and uncovered a clear link between security and competitive advantage.” 4
  • 5. Vodafone Proprietary classified as C2 - Internal 5 We created the Cyber Ready Index, here are the six criteria Each respondent was given a Cyber Ready rating out of 100
  • 6. Vodafone Proprietary classified as C2 - Internal We identified five levels of Cyber Readiness 6 Only 1 in 4 businesses are Cyber Ready and larger firms are more likely to be Ready than smaller businesses Observation 1 46/100 The average score across all businesses is 46, ranking them as having Developing readiness.
  • 7. Vodafone Proprietary classified as C2 - Internal 79% 40% 83% 48% Using different types of Cloud Services Using IoT Devices 2017 2018 Observation 2 Evolving digital footprints present a big challenge 7 More businesses are using different types of cloud services and IoT devices And the average consumer household is using 9 connected devices 11 online services
  • 8. Vodafone Proprietary classified as C2 - Internal Employees and businesses have differing views Observation 3 30 November 20188 Employee engagement needs more focus Disconnects exist between decision-makers and employees 47% said official policy is followed by all staff 39% said security is a box-ticking exercise 8 43% 63% % of staff that use own smartphone for work Business Employees 20% gap
  • 9. Vodafone Proprietary classified as C2 - Internal But the more Cyber Ready, the bigger the advantage Observation 4 9 Advanced Basic Proactive Stakeholder Trust Revenue Growth >5% 4.8 4.3 3.1 58 % 47 % 22 % Businesses demonstrating ‘Advanced’ levels of Cyber Readiness are outperforming those who possess only ‘Basic’ readiness on the Cyber Ready Index .
  • 10. Vodafone Proprietary classified as C2 - Internal The Consumer Security Advantage 10 Observation 5 70% consider themselves at risk of cyber attack 63% have stopped using an online service due to security concerns 43% don’t trust security measures of companies they use 59% of consumers say they would pay extra for better security. But just 29% of businesses think they can increase prices for more secure services
  • 11. Vodafone Proprietary classified as C2 - Internal 11 Read the Cyber Ready Barometer to learn more Read the full research report to read more insight and expert analysis Download here

Editor's Notes

  1. Key findings: At a high level, what we found is concerning. Less than a quarter of businesses could be considered to be Cyber Ready. This slide needs some other stats on it too
  2. A couple of the key reasons we found: Disconnect between decision-makers and employers. Employers think they understand what’s going on in their business, but they don’t Delving deeper we found worrying perceptions from the employees themselves – seeing security as a box-ticking exercise
  3. Not only are they putting data at risk, but there are additional benefits of being a secure business, businesses are missing an opportunity
  4. Not only are they putting data at risk, but there are additional benefits of being a secure business, businesses are missing an opportunity