Trial by fire* Protected. But under pressure to perform
|
|
- Sheena Lane
- 5 years ago
- Views:
Transcription
1 Key findings from the 2010 Global State of Information Security Survey Technology Trial by fire* Protected. But under pressure to perform What global executives expect of information security In the middle of the world s worst economic downturn in thirty years October 2009 *connectedthinking PwC
2 This year, everything is different.
3 As in almost every industry, technology executives are cutting costs. Laying off personnel. And rejiggering spending priorities. Across the enterprise. Across all functions. Including, of course, information security and privacy protection. Or so we thought it safe to assume. That is, before the results of the 2010 Global Information Security Survey emerged. PricewaterhouseCoopers 3
4 What the survey reveals is surprising. Security budgets appear to be less vulnerable to cost-cutting as if executives were protecting them. Yet responses also reveal that security is under enormous pressure to perform. This year, moving from 2009 to 2010, may turn out to be a high-stakes coming of age. A litmus test for a multi-year investment. In the function itself. And in a new generation of security leaders. A trial by fire. PricewaterhouseCoopers 4
5 Agenda 1. Methodology 2. Spending: A decline in growth rate but a manifestly reluctant one 3. Mounting pressure: Impacts of the economic downturn 4. Breaches: Footsteps and fingerprints as visibility increases 5. Current state of the arsenal: New gains will be key this year 6. A crucial year: Security at an important threshold 7. What this means for your business PricewaterhouseCoopers 5
6 Section 1 Methodology A worldwide study The Global State of Information Security 2010, a worldwide study by PricewaterhouseCoopers, CIO Magazine and CSO Magazine, was conducted online from April 22 through June 15, PwC s 11 th year conducting the online survey, 7 th with CIO and CSO Magazines Readers of CIO and CSO Magazines and clients of PwC from 130 countries 7,200+ responses from CEOs, CFOs, CIOs, CSOs, VPs and directors of IT and security More than 40 questions on topics related to privacy and information security safeguards Thirty-two percent (32%) from companies with revenue of $500 million+ Respondents from the technology industry total 1,250 PricewaterhouseCoopers 6
7 Section 1 Methodology Demographics Technology respondents by company revenue Technology respondents by segment Don't Know 15% Nonprofit/Gov. /Edu 2% Small (< $100M US) 37% Electronics, 11% Other, 9% Computer manufacturing, 12% Internet, 18% Large (> $1B US) 27% Medium ($100M - $1B US) 17% Software, 43% Networking, 3% Semiconductors, 4% Numbers reported may not reconcile exactly with raw data due to rounding PricewaterhouseCoopers 7
8 Section 1 Methodology Demographics Technology respondents by region of employment Technology respondents by title Middle East/Africa 2% North America 25% IT & Security (Other) 21% CISO/CSO/ CIO/CTO 8% CEO, CFO, COO 12% Asia 40% South America 15% Compliance /Risk / Privacy 4% IT & Security (Mgmt) 55% Europe 18% Numbers reported may not reconcile exactly with raw data due to rounding PricewaterhouseCoopers 8
9 Agenda 1. Methodology 2. Spending: A decline in growth rate but a manifestly reluctant one 3. Mounting pressure: Impacts of the economic downturn 4. Breaches: Footsteps and fingerprints as visibility increases 5. Current state of the arsenal: New gains will be key this year 6. A crucial year: Security at an important threshold 7. What this means for your business PricewaterhouseCoopers 9
10 Section 2 Spending: A decline in growth rate but a manifestly reluctant one This year, a new factor the economic downturn has shaken up the normal list of leading drivers of information security spending in the industry. And very nearly jumped to the top position. 50% 45% 45% 43% 40% 35% 30% 25% 20% 15% 10% 5% 37% 33% 0% Business continuity / disaster recovery Economic Downturn Internal policy compliance Company reputation Question 32: What business issues or factors are driving your information security spending? (Total does not add up to 100%) PricewaterhouseCoopers 10
11 Section 2 Spending: A decline in growth rate but a manifestly reluctant one Security spending is certainly under pressure. Fewer technology respondents expect spending will increase this coming year. Compared to last year, security spending over the next 12 months will But what we find most interesting is that almost 7 out of 10 (69%) expect spending to either increase or stay the same in spite of the worst economic downturn in decades. Or perhaps because of it. Increase Stay the same Decrease 4% 11% 25% 25% 44% 49% Don't know 20% 22% 0% 10% 20% 30% 40% 50% 60% PricewaterhouseCoopers 11
12 Section 2 Spending: A decline in growth rate but a manifestly reluctant one Is cancelling, deferring or downsizing security-related initiatives important? Absolutely according to 3 out of every 4 technology respondents... 90% 80% 70% 77% 75% 60% 50% 40% 30% 20% 10% 0% Yes for initiatives requiring Operating expenditures Yes for initiatives requiring Capital expenditures Question11: To continue meeting your security objectives in the context of these harsher economic realities, how important are the following strategies? (Respondents who answered Somewhat Important, Important, Very Important or Top Priority ) PricewaterhouseCoopers 12
13 Section 2 Spending: A decline in growth rate but a manifestly reluctant one But far fewer industry executives are acting on this and actually deferring or reducing budgets for security initiatives. Has your company deferred security initiatives? Yes For capital expenditures 47% For operating expenditures 46% Has your company reduced budgets for security initiatives? For capital expenditures 51% For operating expenditures 48% Yes PricewaterhouseCoopers 13
14 Section 2 Spending: A decline in growth rate but a manifestly reluctant one And among the half that are taking action, most are taking the least dramatic response either by deferring initiatives by less than 6 months or reducing spending by under 10%. Has your company deferred security initiatives? Yes By less than 6 months By 6 to 12 months By 1 year or more For capital expenditures 47% 28% 13% 6% For operating expenditures 46% 28% 13% 5% Has your company reduced budgets for security initiatives? Yes By under 10% By 10% to 19% By 20% or more For capital expenditures 51% 22% 17% 12% For operating expenditures 48% 19% 18% 11% In short, it appears that some industry executives are reluctant to cut too deeply into security and may, to some extent, be protecting this investment. PricewaterhouseCoopers 14
15 Agenda 1. Methodology 2. Spending: A decline in growth rate but a manifestly reluctant one 3. Mounting pressure: Impacts of the economic downturn 4. Breaches: Footsteps and fingerprints as visibility increases 5. Current state of the arsenal: New gains will be key this year 6. A crucial year: Security at an important threshold 7. What this means for your business PricewaterhouseCoopers 15
16 Section 3 Mounting pressure: Impacts of the economic downturn Although given a reprieve, of sorts, from the budget knife, the information security function is under pressure to perform. 70% 60% 50% 58% 54% 50% 49% 47% 40% 30% 20% 10% 0% Regulatory environment has become more complex and burdensome Cost reduction efforts make adequate security more difficult to achieve Risks to the company's data have increased due to employee layoffs Threats to the security of our information assets have increased Because our business partners have been weakened by the downturn, we face additional security risks Question 10: What impacts has the current economic downturn had on your company s security function? (Respondents who answered Agree or Strongly Agree ) PricewaterhouseCoopers 16
17 Section 3 Mounting pressure: Impacts of the economic downturn Technology respondents agree: Almost 6 out of 10 cite the elevated role and importance of the information security function 70% 60% 50% 58% 57% 54% 50% 49% 47% 40% 30% 20% 10% 0% Regulatory environment has become more complex and burdensome Cost reduction efforts make adequate security more difficult to achieve The increased risk environment has elevated the role and importance of the information security function Risks to the company's data have increased due to employee layoffs Threats to the security of our information assets have increased Because our business partners have been weakened by the downturn, we face additional security risks Question 10: What impacts has the current economic downturn had on your company s security function? (Respondents who answered Agree or Strongly Agree ) PricewaterhouseCoopers 17
18 Agenda 1. Methodology 2. Spending: A decline in growth rate but a manifestly reluctant one 3. Mounting pressure: Impacts of the economic downturn 4. Breaches: Footsteps and fingerprints as visibility increases 5. Current state of the arsenal: New gains will be key this year 6. A crucial year: Security at an important threshold 7. What this means for your business PricewaterhouseCoopers 18
19 Section 4 Breaches: Footsteps and fingerprints as visibility increases So, given the industry s concerns about the higher risks this year, has the number of incidents increased? Not necessarily. Yes, reported levels have increased in line with a year-afteryear decline in the number of technology respondents who don t know the answers to key incident-related questions. As visibility sharpens, incident counts rise. But actual incidents may not be growing. Yet. In fact, what s more interesting is what isn t showing up. If the downturn-driven, security-related risks that industry respondents are concerned about were fully reflected here, these numbers and the ones on the next three slides would be considerably higher. Number of security incidents No incidents occurred 20% 23% 17% From 1 to 9 incidents 27% 31% 40% From 10 to 50 incidents 7% 7% 11% More than 50 incidents 4% 5% 6% Don t know 42% 34% 26% PricewaterhouseCoopers 19
20 Section 4 Breaches: Footsteps and fingerprints as visibility increases The new visibility into incidents also extends to types of security incidents and reveals critical information Whether or not risks related to the economic downturn are showing up yet on the IT department s crisis list for the day, better visibility into incidents is revealing very important information: The impacts to data has surged over the past year- by almost 100%. And the exploitation of data is now the leading type of incident. #1 Types of security incidents Data exploited 17% 16% 29% Network exploited 22% 21% 27% System exploited 19% 17% 21% Application exploited 18% 21% 19% Device exploited NA 15% 18% Human exploited (Social engineering) 16% 16% 13% Unknown 46% 43% 33% (Does not add up to 100%) PricewaterhouseCoopers 20
21 Section 4 Breaches: Footsteps and fingerprints as visibility increases Likely sources of incidents As higher risks to security associated with layoffs and terminations begin to manifest themselves in terms of both actual incidents and perceptions of incident rates, we expect the response levels for former employees to rise. Likely source of incidents Current employee 29% 35% Former employee 18% 21% Total 47% 56% Hacker 28% 31% Unknown 42% 34% (Does not add up to 100%) PricewaterhouseCoopers 21
22 Section 4 Breaches: Footsteps and fingerprints as visibility increases Business impacts While the full damage report for 2009 is not yet clear, the first signs aren t promising. Many key business impacts are up: financial losses, compromises to brand or reputation and, naturally, loss of shareholder value. Not surprisingly for the technology industry, intellectual property theft was again noted as having a significant business impact. Business impacts Financial losses 37% 47% Brand/reputation compromised 28% 33% Loss of shareholder value 9% 15% Intellectual property theft 30% 27% Fraud 22% 12% (Does not add up to 100%) PricewaterhouseCoopers 22
23 Agenda 1. Methodology 2. Spending: A decline in growth rate but a manifestly reluctant one 3. Mounting pressure: Impacts of the economic downturn 4. Breaches: Footsteps and fingerprints as visibility increases 5. Current state of the arsenal: New gains will be key this year 6. A crucial year: Security at an important threshold 7. What this means for your business PricewaterhouseCoopers 23
24 Section 5 Current state of the arsenal: New gains will be key this year Survey results reveal that technology companies have made strong advances in four critical arenas over the last 12 months 1. Privacy protection 2. People and training Employ a Chief Privacy Officer 22% 33% Employ a CISO 34% 57% Require employees to complete privacyrelated training Have accurate inventory of locations where data is stored 28% 41% 44% 54% Employ a CSO Have people dedicated to monitoring employee use of Internet Conduct personnel background checks 30% 49% 62% 51% 59% 47% Audit privacy standards through third party assessments 25% 38% Integrate physical and infosec personnel 37% 56% 0% 20% 40% 60% 0% 20% 40% 60% PricewaterhouseCoopers 24
25 Section 5 Current state of the arsenal: New gains will be key this year Each of these areas privacy, people, identity management and critical processes are just-in-time gains this year 3. Identity management 4. Critical processes Identity management strategy Identity management solutions Automated account provisioning Automated account deprovisioning Biometrics 25% 52% 41% 51% 41% 56% 46% 44% 32% 36% Have an overall security strategy Measure and review effectiveness of security policies and procedures in the past year Undertake security risk assessments by third parties 26% 38% 70% 62% 66% 54% 0% 20% 40% 60% 0% 20% 40% 60% 80% PricewaterhouseCoopers 25
26 Section 5 Current state of the arsenal: New gains will be key this year Advances in other areas are less dramatic Does this suggest technology companies are not well positioned to address the unexpected surge in downturn-driven security-related challenges in 2009? Not necessarily. Progress always unfolds in fits and starts and a fair view of the readiness of technology companies to address the security-related risks of the downturn requires acknowledging the gains made over the last several years. A sampling of capabilities Compliance testing 35% 41% 50% 52% Personal/end-user firewalls 43% 61% 67% 68% Centralized user data store 46% 46% 56% 56% Tools to discover unauthorized devices 27% 43% 58% 57% Established standards/procedures for infrastructure deployment 35% 44% 53% 54% PricewaterhouseCoopers 26
27 Agenda 1. Methodology 2. Spending: A decline in growth rate but a manifestly reluctant one 3. Mounting pressure: Impacts of the economic downturn 4. Breaches: Footsteps and fingerprints as visibility increases 5. Current state of the arsenal: New gains will be key this year 6. A crucial year: Security at an important threshold 7. What this means for your business PricewaterhouseCoopers 27
28 Section 6 A crucial year: Security at an important threshold This is a key moment In short, this year, in the technology industry, the information security function and its leaders are encountering a powerful combination of factors: The greatest economic turmoil in decades. 2. High levels of executive concerns about risks - and the impact of the downturn on the company 3. Breach-related evidence that doesn t reveal the full picture of these impacts and downturn-related consequences. 4. A multi-year investment for better or worse in the building blocks of an effective privacy and information security program that, whether or not it has reached critical mass, has yet to show a compelling ROI. Enormous pressure (and opportunity) to deliver concrete, measurable business value not just later, but now. PricewaterhouseCoopers 28
29 Agenda 1. Methodology 2. Spending: A decline in growth rate but a manifestly reluctant one 3. Mounting pressure: Impacts of the economic downturn 4. Breaches: Footsteps and fingerprints as visibility increases 5. Current state of the arsenal: New gains will be key this year 6. A crucial year: Security at an important threshold 7. What this means for your business PricewaterhouseCoopers 29
30 Section 7 What this means for your business So how are the industry s security executives trying to tighten the alignment of security s contribution with the business? They re looking hardest at and placing their highest expectations on initiatives that (1) address the big risks first; (2) protect data; (3) pull this portfolio of multiyear investments together (strategy); (4) reduce cost and increase efficiency; and (5) manage the security-related impacts of regulation. 90% 89% 88% 87% 86% 85% 84% 83% 89% 88% 86% 86% 86% 86% 85% Increasing the protection of data Prioritizing security investments based on risk Strengthening the company's governance, risk and compliance program Refocusing on core of existing strategy Accelerating the adoption of securityrelated automation technologies to increase efficiencies and reduce cost Reducing, mitigating or transferring major risks Adopting a recognized security framework as a means of preparing for upcoming regulatory requirements Question 11: To continue meeting your security objectives in the context of these harsher economic realities, how important are the following strategies? (Respondents who answered Somewhat Important, Important, Very Important or Top Priority ) (Total does not add up to 100%) PricewaterhouseCoopers 30
31 Section 7 What this means for your business After years in the limelight, data protection is now in the spotlight at arguably the most critical time While data protection capabilities are uneven not just across the industry, but within many companies as well advances in the past year are worth noting. Data Loss Prevention (DLP): Technology industry respondents who say their organization has a DLP capability leapt this year from 36% to 51%. In addition, 81% consider pursuing more complete configuration of DLP tools to be important which suggests the adoption rate will spike again this year. Classification: The industry continues to make steady advances in prioritizing data and information assets according to their risk level on a continuous basis from 26% in 2007 to 39% today. Protection, disclosure and destruction: To protect data, however, you also have to have a clear rule book. This year s responses reveal that only 1 out of every 2 technology respondents say that their organization s security policies address the protection, disclosure and destruction of data. PricewaterhouseCoopers 31
32 Section 7 What this means for your business Another hot priority is addressing the risks associated with social networking Today a new generation of technology industry employees is accessing social networks from work in great numbers, often without the knowledge of the IT department and in circumvention of the traditional countermeasures employed by many. Some technology companies have moved quickly to close this gap but most need to do more. 60% 50% 40% 48% 44% 30% 27% 20% 10% 0% Have security technologies that support Web 2.0 exchanges - such as social networks, blogs, wikis and others Audit and monitor postings to external blogs or social networking sites Have security policies that address access and postings to social networking sites PricewaterhouseCoopers 32
33 Section 7 What this means for your business Secure your data and control access to your assets now. Tech sector progress in these key areas protection of data, intellectual property, identity management and privacy can be attributed to the industry s migration toward providing services, content, and internet connectivity around products. Why? There is significantly greater integration among OEMs, service providers, and customers, that has enabled efficient monitoring and support, remote software upgrades, better spare-parts logistics, usage-based billing, and insight into how a product is used. But it has, in turn, created a more open and susceptible business environment. This trend is likely to accelerate as companies adopt "cloud computing" applications and services. Today s IT environments are often a collection of builtto-order legacy solutions that were designed to deliver functionality in a silo not agility and change. Since security will continue to be a business model-related challenge for technology companies, right now is a good time to address how to secure your customer data and control and manage access to your assets. PricewaterhouseCoopers 33 Slide 33
34 2009 PricewaterhouseCoopers LLP. All rights reserved. PricewaterhouseCoopers refers to PricewaterhouseCoopers LLP, a Delaware limited liability partnership, or, as the context requires, the PricewaterhouseCoopers global network or other member firms of the network, each of which is a separate and independent legal entity. *connectedthinking is trademark of PricewaterhouseCoopers LLP (US). PwC
Respected but still restrained*
The 2011 Global State of Information Security Survey Aerospace and Defense Respected but still restrained* In the aftermath of the worst global economic jolt in thirty years, information security confronts
More informationIn the aftermath of the worst global economic jolt in 30 years, information security confronts a new economic order.
Key findings from the 2011 Global State of Information Security Survey Respected but still restrained* In the aftermath of the worst global economic jolt in 30 years, information security confronts a new
More information2008 BUSINESS RESILIENCY SURVEY RESULTS:
ijet/wp0010-06 2008 BUSINESS RESILIENCY SURVEY RESULTS: An Insider's Look at the Current State of Risk Management, Continuity and Resiliency in Multinational Organizations July 2008 ABOUT THE RESEARCH
More informationPwC s 5th Annual Digital IQ Survey
www.pwc.com/digitaliq PwC s 5th Annual Digital IQ Survey Digital Conversations and the C-suite Digital IQ PwC s 5th Annual Survey Findings: Leadership teams integrate digital conversations across all aspects
More informationAugust PwC s 5th Annual Digital IQ Survey Energy and mining companies work to catch up with the IT revolution
August 2013 PwC s 5th Annual Digital IQ Survey Energy and mining companies work to catch up with the IT revolution Main headline Text is in 2 or 3 columns to create a dynamic and visually appealing layout.
More informationThe future for cloud-based supply chain management solutions
The future for cloud-based supply chain management solutions A global survey of attitudes and future plans for the adoption of supply chain management solutions in the cloud Survey conducted by IDG Connect
More informationCanadian business perspectives on the governance of enterprise IT (GEIT)
www.pwc.com/ca/technology-consulting A PwC White Paper Canadian business perspectives on the governance of enterprise IT (GEIT) 2 Canadian business perspectives on the governance of enterprise IT (GEIT)
More informationOptimized for Growth:
The Fifth Annual Change in the (Supply) Chain Survey Optimized for Growth: High-Tech Executives Adapt to Meet Global Demands INTRODUCTION Optimized for Growth: High-Tech Executives Adapt to Meet Global
More informationThe top 8 reasons. to outsource your IT. to a managed services provider
The top 8 reasons to outsource your IT to a managed services provider INTRODUCTION The way we work is changing. Where once we had in-house IT teams looking after every aspect of IT operations, the cloud
More informationWhy Hiring the Right CISO is so Hard And What You Can Do About It
Why Hiring the Right CISO is so Hard And What You Can Do About It AUTHORS: ERIK MATSON Managing Director, Global Head of Insurance & Cybersercurity JOHN BUDRISS Executive Director, Technology, Data Science
More informationIT GOVERNANCE. WITH ROBERT GOODSELL, MANAGING DIRECTOR JOE BRUTSCHE, DIRECTOR PwC. April 4, 2013
IT GOVERNANCE WITH ROBERT GOODSELL, MANAGING DIRECTOR JOE BRUTSCHE, DIRECTOR PwC April 4, 2013 Agenda The challenge IT Governance defined IT Governance components Next steps Questions THE CHALLENGE The
More informationSOLUTION BRIEF EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER
EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER ARRIVAL OF GDPR IN 2018 The European Union (EU) General Data Protection Regulation (GDPR), which takes effect in 2018, will bring changes
More informationMay PwC s 2014 Annual Corporate Directors Survey - The gender edition
May 2015 PwC s 2014 Annual Corporate Directors Survey - The gender edition Table of contents Introduction Gender-specific responses Perspectives on the need for diversity 3 Impediments to board renewal
More informationRA Survey Appendix 1. All questions and answers and Additional insights. TM Forum Revenue Assurance Team TM Forum 1 V2015.4
RA Survey Appendix All questions and answers and Additional insights TM Forum Revenue Assurance Team 06 TM Forum All questions and answers 6 7 8 Respondent Profiles Page RA Organizations and Maturity Page
More informationConsiderations when Choosing a Managed IT Services Provider. ebook
Considerations when Choosing a Managed IT Services Provider ebook Contents Considering Managed Services?...3 Consideration 1: Depth...4 Consideration 2: Proactive...5 Consideration 3: Knowledge & Processes...6
More informationOptimized for Growth:
The Fifth Annual Change in the (Supply) Chain Survey REGIONAL SUMMARY: LATIN AMERICA Optimized for Growth: High-Tech Executives Adapt to Meet Global Demands INTRODUCTION Optimized for Growth: High-Tech
More informationFinance disrupted. Future of finance in healthcare: As the industry adjusts to continuous disruption, the finance function has an opportunity to lead
Future of finance in healthcare: Finance disrupted As the industry adjusts to continuous disruption, the finance function has an opportunity to lead kpmg.com/us/futurefinance Finance disrupted Amid continuous
More informationBENEFITS OF AN EFFECTIVE OUTSOURCING STRATEGY. March 1, 2017
BENEFITS OF AN EFFECTIVE OUTSOURCING STRATEGY March 1, 2017 RSM overview Fifth largest audit, tax and consulting firm in the U.S. Over $1.6 billion in revenue 80 cities and more than 8,000 employees in
More informationApplication-Centric Transformation for the Digital Age
Application-Centric Transformation for the Digital Age APRIL 2017 PREPARED FOR COPYRIGHT 2017 451 RESEARCH. ALL RIGHTS RESERVED. About this paper A Black & White paper is a study based on primary research
More informationProject management practices for asset maintenance: A Guide for Power, Energy & Process Industries
Project management practices for asset maintenance: A Guide for Power, Energy & Process Industries One of the critical challenges faced by companies in the power, energy & process industries, including
More informationDisrupt or be disrupted
Disrupt or be disrupted Using secure APIs to drive digital transformation 2019 Rogue Wave Software, Inc. All Rights Reserved. 1 Presenter Olaf van Gorp Akana Platform Senior Specialist olaf.van.gorp@roguewave.com
More informationRamifications of the New COSO Framework & Recent PCAOB Actions
Ramifications of the New COSO Framework & Recent PCAOB Actions Panelists Moderator Bob Meyer, Senior Vice President of Finance & Corporate Controller, American Tower Joann Cangelosi, Partner, Grant Thornton
More informationName: Venkat Bhamidipati. City: Seattle, WA. Company: Microsoft. Title: CFO, Worldwide Enterprise & Partner Group
Name: Venkat Bhamidipati City: Seattle, WA Company: Microsoft Title: CFO, Worldwide Enterprise & Partner Group Education: BA, Commerce, Osmania University MA, Commerce, Osmania University MBA, Indiana
More informationIT Governance and the Audit Committee Recognizing the Importance of Reliable and Timely Information
IT ADVISORY IT Governance and the Audit Committee Recognizing the Importance of Reliable and Timely Information KPMG INTERNATIONAL IT Governance and the Audit Committee: Recognizing the Importance of
More informationMaintaining PC Refresh Cycles While Leveraging PC Innovations. PC Refresh Cycles: The State of Play
WHITE PAPER PRESENTED BY Maintaining PC Refresh Cycles While Leveraging PC Innovations Security, productivity, and efficiency enhanced by hardware-based breakthrough features 40% In the U.S., 40% of survey
More informationENABLING THE BUSINESS WITH SOCIAL RELATIONSHIP PLATFORMS
W H I T E PA P E R ENABLING THE BUSINESS WITH SOCIAL RELATIONSHIP PLATFORMS AN EASY WIN FOR STRATEGIC CIOs THE ROLE OF THE IT LEADER IS CHANGING. CIOs must shift their focus from keeping the lights on
More informationAgenda. Enterprise Risk Management Defined. The Intersection of Enterprise-wide Risk Management (ERM) and Business Continuity Management (BCM)
The Intersection of Enterprise-wide Risk (ERM) and Business Continuity (BCM) Marc Dominus 2005 Protiviti Inc. EOE Agenda Terminology and Process Introductions ERM Process Overview BCM Process Overview
More informationForging an agile, secure supply chain
Life Sciences Of special interest to Chief operating officers Chief risk officers Vice presidents of tax Insights for 5executives Forging an agile, secure supply chain The case for combining performance
More information5 Best Practices for Transforming Financial Planning and Analysis
WHITE PAPER 5 Best Practices for Transforming Financial Planning and Analysis Accenture s Findings on Transforming Finance Table of Contents 1 Why Transform Finance? Closing the knowledge gap: the Accenture
More informationTurn Your Business Vision into Reality with Microsoft Dynamics NAV
Turn Your Business Vision into Reality with Microsoft Dynamics NAV You have worked hard to build a vision for your business. With Microsoft Dynamics NAV, you can turn that vision into reality with a solution
More informationTurn Your Business Vision into Reality with Microsoft Dynamics NAV
Turn Your Business Vision into Reality with Microsoft Dynamics NAV You have worked hard to build a vision for your business. With Microsoft Dynamics NAV, you can turn that vision into reality with a solution
More informationHOW TO HIRE A SECURITY TEAM STRONG AND EFFECTIVE HOW TO HIRE A STRONG AND EFFECTIVE SECURITY TEAM - 1
HOW TO HIRE A STRONG AND EFFECTIVE SECURITY TEAM HOW TO HIRE A STRONG AND EFFECTIVE SECURITY TEAM - 1 Introduction Your organization is thinking about building a dedicated security team, but do you know
More informationThe Path to Digital Transformation. A Roadmap for Business Success
The Path to Digital Transformation A Roadmap for Business Success Table of Contents Introduction 3 Moving Toward Transformation 4 Overcoming Transformation Barriers 7 How DXC Technology Can Help 8 Conclusion
More informationUS BANKING & CAPITAL MARKETS
US BANKING & CAPITAL MARKETS Risk Potential Exposed Accenture 2017 Global Risk Management Study: U.S. Banking & Capital Markets Supplement INTRODUCTION This presentation is a supplement to the Global Risk
More informationDrive more value through data source and use case optimization
Drive more value through data source and use case optimization BEST PRACTICES FOR SHARING DATA ACROSS THE ENTEPRRISE David Caradonna Director, Global Business Value Consulting Date Washington, DC Forward-Looking
More informationHOW CAN DIGITAL SUPPLIERS ACCELERATE CUSTOMERS TRANSFORMATIONS?
HOW CAN DIGITAL SUPPLIERS ACCELERATE CUSTOMERS TRANSFORMATIONS? By Astrid Rauchfuss, Tobias Schmitter, Philipp Bode, and Dominik Michaelis There s a big opportunity for digital suppliers out there, but
More informationCreating Technology Financial Accountability. IT Financial Management and Cost Transparency White Paper
Creating Technology Financial Accountability IT Financial Management and Cost Transparency White Paper CREATING FINANCIAL ACCOUNTABILITY FROM IT ACROSS THE ORGANIZATION Insight into IT Costs and Services
More informationSOLUTION BRIEF EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER
EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER ARRIVAL OF GDPR IN 2018 The European Union (EU) General Data Protection Regulation (GDPR) that takes effect in 2018 will bring changes for
More informationCutting through cloud choice
Cutting through cloud choice Practical guide Tips for choosing the right cloud from the right partner. The future is exciting. Introduction The cloud is flexible and agile. It can free up valuable IT resource,
More informationEY Center for Board Matters. Leading practices for audit committees
EY Center for Board Matters for audit committees As an audit committee member, your role is increasingly complex and demanding. Regulators, standard-setters and investors are pressing for more transparency
More informationStrategic Meetings Management: Solutions and Consolidation Opportunities
About Egencia Meetings & Incentives Egencia Meetings & Incentives combines strategic meetings management expertise with fullservice meeting and incentive planning, all backed by an expert team of meetings
More informationBusiness IT Trends Annual Report IT budgets remain steady in uncertain times
2018 Business IT Trends Annual Report IT budgets remain steady in uncertain times 2018 Business IT Trends Annual Report Update on IT budgets and tech spending We surveyed businesses of all types and sizes,
More informationSAP Value Assurance for SAP S/4HANA Quick-Start Your Digital Transformation with SAP S/4HANA
SAP Value Assurance for SAP S/4HANA Quick-Start Your Digital Transformation with SAP S/4HANA Level 1 Customer Presentation March 2017 Digitalization is happening now Achieve your business goals with a
More informationRSA. Sustaining Trust in the Digital World. Gintaras Pelenis
1 RSA Sustaining Trust in the Digital World Gintaras Pelenis +370 698 75456 Gintaras.pelenis@emc.com 2 IN 2011 THE DIGITAL UNIVERSE WILL SURPASS 1.8 ZETTABYTES 1,800,000,000,000,000,000,000 3 $ 4 5 Advanced
More informationFinancial Supply Chain Transactions: The Rising Importance of Information Protection and Secure Connectivity for Data Exchange
Financial Supply Chain Transactions: The Rising Importance of Information Protection and Secure Connectivity for Data June 18, 2007 Rising Complexity of Financial Supply Chain Transactions and the Role
More informationTHIRD-PARTY REMOTE ACCESS: CHALLENGES FOR ENTERPRISES AND TECHNOLOGY VENDORS
THIRD-PARTY REMOTE ACCESS: CHALLENGES FOR ENTERPRISES AND TECHNOLOGY VENDORS Overview According to data from the nonprofit ID Theft Resource Center, there have been more than 500 data breaches and more
More informationIDC MarketScape: Worldwide Security Solutions and Services Hardcopy 2017 Vendor Assessment
IDC MarketScape IDC MarketScape: Worldwide Security Solutions and Services Hardcopy 2017 Vendor Assessment Robert Palmer Allison Correia THIS IDC MARKETSCAPE EXCERPT FEATURES: XEROX IDC MARKETSCAPE FIGURE
More informationModernize Your Device Management Practices Using The Cloud
A Forrester Consulting Thought Leadership Paper Commissioned By Microsoft June 2017 Modernize Your Device Management Practices Using The Cloud New Cloud-Enabled Operating Systems Deliver Ease And Flexibility
More informationAdapting Risk Management to Evolving Technologies
Adapting Risk Management to Evolving Technologies May 9, 2017 Ray Cheung 2017 Crowe 2017 Horwath Crowe International Horwath LLP Agenda Digital Disruption and Shifting IT Spend High Tech Risk Environment
More informationIntegrated IT Management Solutions. Overview
Integrated IT Management Solutions Overview freedommanage IT, The Numara FootPrints family of IT Management products and solutions streamline, automate and improve IT operations. They have been designed
More informationBullish on digital: McKinsey Global Survey results
AUGUST 013 Jean-François Martin b u s i n e s s t e c h n o l o g y o f f i c e Bullish on digital: McKinsey Global Survey results CEOs and other senior executives are increasingly engaged as their companies
More informationDavid Nolan, CEO Fusion Risk Management, Inc.
David Nolan, CEO Fusion Risk Management, Inc. Business Continuity Risk Management ( BCRM ) What Defining BCRM Why Justifying BCRM Who Organizing BCRM Roles How Establishing a BCRM Process When Sustaining
More informationSharePoint & The Cloud
SharePoint & The Cloud Matthew Lathrop Rackspace Hosting SharePoint Evangelist 3/4/2011 1 ENTERPRISE CLOUD SOLUTIONS PAGE 1 Fast Facts About Rackspace 2010 REVENUE Founded: 1998 / IPO 2008 NYSE: RAX Headquarters:
More informationFOUR STRATEGIES. To allow you more time with patients
FOUR STRATEGIES To allow you more time with patients Hearing care professionals spend years studying the science surrounding how people hear, the causes of hearing loss, how it can be treated and how it
More informationFuture of finance: Finance disrupted. How should the CFO respond to a business environment in turmoil? kpmg.com/us/futurefinance
Future of finance: Finance disrupted How should the CFO respond to a business environment in turmoil? kpmg.com/us/futurefinance Finance disrupted How should the CFO respond to a business environment in
More informationThe CIO and the Cloud: Strategic Allies. Recent Research on Challenges and Opportunities Facing the CIO
The CIO and the Cloud: Strategic Allies Recent Research on Challenges and Opportunities Facing the CIO You ve probably heard the rumors about some new up-and-coming role that will supplant the chief information
More informationPricewaterhouseCoopers CEO Survey Executive Summary Introduction
PricewaterhouseCoopers CEO Survey Executive Summary Introduction PricewaterhouseCoopers 7 th Annual Global CEO Survey, Managing Risk: An Assessment of CEO Preparedness, represents input from nearly 1,400
More informationLondon. November 27 th, Results. Lanesborough Hotel
London November 27 th, 2007 Lanesborough Hotel Results 0. Compared to a year ago, has it become easier or harder to secure your networking environment? 1. Easier 7.1% 2. Harder 64.3% 3. The same 28.6%
More informationJAPAN BANKING & CAPITAL MARKETS
JAPAN BANKING & CAPITAL MARKETS Risk Potential Exposed Accenture 2017 Global Risk Management Study: Japan Banking & Capital Markets Supplement INTRODUCTION This presentation is a supplement to the Global
More informationLiving on borrowed time
Power & Utilities Of special interest to Chief operating officers Chief risk officers Vice presidents of tax Insights for 5executives Living on borrowed time Protecting utilities and the public from aging
More informationBUSINESS INTELLIGENCE: IT S TIME TO TAKE PRIVATE EQUITY TO THE NEXT LEVEL
BUSINESS INTELLIGENCE: IT S TIME TO TAKE PRIVATE EQUITY TO THE NEXT LEVEL BUSINESS CONSULTANTS DEEP TECHNOLOGISTS In a challenging economic environment, portfolio management has taken on greater importance.
More informationFinding a safe harbor within the IT storm
Finding a safe harbor within the IT storm Managing the delivery of IT services is a turbulent process. The unified capabilities of Dell and BMC Software can help you find a safe harbor within the IT storm.
More informationSponsored by HOW TO DELIVER ON THE PROMISE OF INDUSTRY 4.0
HOW TO DELIVER ON THE PROMISE OF INDUSTRY 4.0 How to Deliver on the Promise of Industry 4.0 2 The Promise of Industry 4.0 Manufacturing is an old industry that is changing so fast you may not recognize
More informationExpert Reference Series of White Papers. Bridging IT Skills Gaps to Transform Your Business
Expert Reference Series of White Papers Bridging IT Skills Gaps to Transform Your Business 1-800-COURSES www.globalknowledge.com Bridging IT Skills Gaps to Transform Your Business James A. DiIanni, SFIA
More informationA Guide to IT Risk Assessment for Financial Institutions. March 2, 2011
A Guide to IT Risk Assessment for Financial Institutions March 2, 2011 Welcome! Housekeeping Control panel on the right side of your screen. Audio Telephone VoIP Submit Questions in the pane on the control
More informationWelcome to the postmodern era for public sector ERP
Welcome to the postmodern era for public sector ERP Time to update your public sector enterprise resource planning (ERP)? Consider a postmodern strategy to address your unique requirements. Welcome to
More informationRecognizing your needs
Our internal audit and IT risk assurance capability statement Recognizing your needs www.pwc.com/ph Our Assurance services Assurance PwC Assurance team delivers the assurance you need on the financial
More informationThe State of Sustainable Business Results of the 10 th Annual Survey of Sustainable Business Leaders 2018
The State of Sustainable Business 2018 Results of the 10 th Annual Survey of Sustainable Business Leaders 2018 Table of Contents Introduction + Key Findings 3 Sustainability Priorities 9 Sustainability
More informationTHE SIX ESSENTIALS FOR DEVOPS TEAM EXCELLENCE
THE SIX ESSENTIALS FOR DEVOPS TEAM EXCELLENCE Creating a secure enterprise requires everyone to do their part. Here s how you get there. CONTENTS Introduction 4 Continuous cybersecurity skills training
More informationKey capabilities for mastering the cloud
Key capabilities for mastering the cloud HP white paper According to IDC, 85 percent of net-new enterprise applications will be specifically designed to be accessed in the cloud by 2012. 1 The reasons
More informationDigital Transformation Built on Cloud ERP
BUYERS GUIDE TO Digital Transformation Built on Cloud ERP 1. Foreword Digital transformation is a fact of life for many businesses today and is emerging as a major business driver in the annual research
More informationTop 5 Must Do IT Audits
Top 5 Must Do IT Audits Mike Fabrizius, Sharp HealthCare, VP, Internal Audit DJ Wilkins, KPMG, Partner, IT Advisory 2011 AHIA Annual Conference www.ahia.org Background on Sharp HealthCare Sharp s Co-sourcing
More informationAsset and Plant Optimization in a Connected Enterprise
Asset and Plant Optimization in a Connected Enterprise Maximize return on production assets with effective monitoring, management and optimization services Enabling a Connected Enterprise As operations
More informationm2m A Global Market Happening Now, With Telefónica Well Positioned Mr. Carlos Morales Global M2M, Cloud and Apps Director
m2m A Global Market Happening Now, With Telefónica Well Positioned Mr. Carlos Morales Global M2M, Cloud and Apps Director M2M Main Messages Enormous opportunity already happening at M2M. Markets at both
More informationThe Top 5 Questions CIOs Ask About Moving to the Cloud
The Top 5 Questions CIOs Ask About Moving to the Cloud THE TOP 5 QUESTIONS CIOs ASK ABOUT MOVING TO THE CLOUD CONTENTS Is the Cloud Secure?... 3 Will I Own the Software and Data?... 5 Can I Capitalize
More informationCollaboration between humans and technology is creating a new labor class
Collaboration between humans and technology is creating a new labor class U.S. CEO Industry Outlook Executive Summary kpmg.com/tech 2 Executive summary Disruptive technologies are reshaping all industries
More information5 Pitfalls and 5 Payoffs of Conducting Your Business Processes in the Cloud
5 Pitfalls and 5 Payoffs of Conducting Your Business Processes in the Cloud Keith Swenson VP R&D, Chief Architect Fujitsu America, Inc. April 2014 Fujitsu at a Glance Headquarters: Tokyo, Japan Established:
More informationThe Social Marketer vs. the Social Enterprise Social media in financial institutions is in transition.
DECEMBER 2014 THE STATE OF Social Media in Financial Services The Social Marketer vs. the Social Enterprise Social media in financial institutions is in transition. Although social media is largely perceived
More informationCFO #CFOPERFORMANCE. Understanding and Managing Risk In Professional Service Firms
#CFOPERFORMANCE Understanding and Managing Risk In Professional Service Firms Your firm didn t get where it is now by ignoring risks. Today, as professional service firms look for opportunities to expand
More informationCISO Tips: Speaking the language of business
CISO Tips: Speaking the language of business The six phrases CISOs can use to connect with business executives 2017 Cybereason. All rights reserved. 1 A cost center that doesn t align with the rest of
More informationHow to Grow SaaS Revenue, Profits and Market Share with Use-Appropriate Software Licensing and Pricing A SaaS Business Models White Paper
WHITE PAPER How to Grow SaaS Revenue, Profits and Market Share with Use-Appropriate Software Licensing and Pricing A SaaS Business Models White Paper How to Grow SaaS Revenue, Profits and Market Share
More informationFighting Fraud in the e-commerce Channel: A Merchant Study. June 2018
Fighting Fraud in the e-commerce Channel: A Merchant Study June 2018 1 Contents Executive Summary Section I: Identifying Threats Section II: Fraud Mitigation Tools Section III: Information Sharing Partnerships
More informationMatt Loeb ISACA CEO. September 17, WCARS
Matt Loeb ISACA CEO September 17, 2016 37WCARS Agenda A Disruptive and Changing World Impact on Auditors Implications for the Future Workforce A Disrupted World Digital disruption is already here World
More informationFlying with IT through Market Turbulence
IT ADVISORY Flying with IT through Market Turbulence ADVISORY Agenda Global Financial Crisis IT Strategies for Global Economic Recession IT Consolidation Software Asset Management 2 The GFC Global Financial
More informationDigital Transformation at Midsized Businesses:
Trend Report Digital Transformation at Midsized Businesses: Exciting Advances and Potential Roadblocks Table of Contents Introduction...3 Chapter 1: Digital Transformation: What is it exactly?...4 Chapter
More informationBUSINESS CONTINUITY: PROTECTING YOUR BUSINESS FUTURE
BUSINESS CONTINUITY: PROTECTING YOUR BUSINESS FUTURE An insight into the current environment and importance that business continuity has on your business reputation. Table of Contents Introduction 3 Current
More informationSOLUTION BRIEF HELPING ADDRESS GDPR CHALLENGES WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE
HELPING ADDRESS GDPR CHALLENGES WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE PREPARATION FOR GDPR IS ESSENTIAL ACROSS THE GLOBE The EU GDPR imposes interrelated obligations for organizations
More informationData, Analytics and Your Audit
Data, Analytics and Your Audit What Financial Executives Need to Know By Roger O Donnell Partner, KPMG LLP Reprinted by permission from Financial Executive kpmg.com audit Perhaps no business trend has
More informationTitle: HP OpenView Configuration Management Overview Session #: 87 Speaker: Loic Avenel Company: HP
Title: HP OpenView Configuration Management Overview Session #: 87 Speaker: Loic Avenel Company: HP What we will cover in this session What is the HP OpenView configuration management solution for enterprises?
More informationExecutives Beware: White Paper. Senior Vice President
Executives Beware: Five Questions Astute Boards Are Asking About Healthcare IT White Paper TERRY WILK, MBA, FCHIME Senior Vice President September 2018 CONTACT For further information about Coker Group
More informationSecurity intelligence for service providers
Security Thought Leadership White Paper July 2015 Security intelligence for service providers Expanded capabilities for IBM Security QRadar including multi-tenancy, unified management and SaaS 2 Security
More informationSMALL BUSINESS BANKING: A $56.9 BILLION OPPORTUNITY FOR THE TAKING
SMALL BUSINESS BANKING: A $56.9 BILLION OPPORTUNITY FOR THE TAKING EXECUTIVE SUMMARY Small businesses are the hottest under-served market segment, offering outstanding revenue potential for financial institutions.
More informationthe need to step away from the screen is greater than ever
the need to step away from the screen is greater than ever Key findings include: IT Leaders most need to drive alignment between what their business sets as priority, where IT investments are made, and
More informationToday s State of Work: At the Breaking Point
Today s State of Work: At the Breaking Point The volume of work is accelerating dramatically. By 2020, 86% of companies will need intelligent automation to keep up, as revealed by a global survey of more
More informationThird Party Risk Management ( TPRM ) Transformation
Third Party Risk Management ( TPRM ) Transformation September 20, 2017 Internal use only An introduction to TPRM What is a Third Party relationship? A Third Party relationship is any business arrangement
More information2017 Healthcare Compliance Benchmark Study
2017 Healthcare Compliance Benchmark Study Executive Summary and Results EXECUTIVE SUMMARY This report represents SAI Global s eighth annual survey gathering insights from compliance professionals in the
More informationBuilding A Holistic and Risk Based Insider Threat Program. An Approach to Preventing, Detecting and Responding to Insider Threats
Building A Holistic and Risk Based Insider Threat Program An Approach to Preventing, Detecting and Responding to Insider Threats Michael G Gelles, Psy.D. Deloitte Consulting LLP October 2014 Insider Threat:
More informationA Guide to Building a Healthy Dental Practice. technology mistakes that can damage or destroy 7 your dental practice - and how to avoid them
A Guide to Building a Healthy Dental Practice technology mistakes that can damage or destroy 7 your dental practice - and how to avoid them Today s dental practices face a myriad of information technology
More informationEnterprise Risk Management (ERM) - Impact of 2017 COSO ERM Model
Enterprise Risk Management (ERM) - Impact of 2017 COSO ERM Model Institute of Internal Auditors, Detroit Chapter Meeting February 2019 With you today Sarah Ann Moore Director Internal Audit and Enterprise
More information