SlideShare a Scribd company logo
A new IT-risk culture for Digital Transformation
Milan, May 11, 2017
Redux Version
The market is under pressure
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 2
Source: IDC, 2016 (n=98, companies with more than 50 employees in Italy; weighted extrapolation)
10 OR MORE DATA BREACHES
5-9 DATA BREACHES
3-4 DATA BREACHES
1-2 DATA BREACHES
0% 5% 10% 15% 20%
About 40% knows they have been breached
Who is adopting new IT Security tech is dealing
with specific challenges
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 3
0% 20% 40% 60%
COMPETING WITH CLOUD RESOURCES USED/SHADOW IT
HIGH LEVEL OF DEMAND FOR NEW BUSINESS SERVICES
FRAGMENTATION OR LACK OF INTEGRATION OF SECURITY PRODUCT PORTFOLIO
JUGGLING CONFLICTING PRIORITIES
NOT ENOUGH INTEGRATION INTO THE IT INFRASTRUCTURE TEAMS
LACK OF INSIGHT INTO SECURITY SENSITIVE ACTIVITIES
SKILLS SHORTAGES
OPERATIONS RESOURCES ARE TOO BUSY ON ROUTINE OPERATIONS
BUDGET CONSTRAINTS
What is challenging the development of IT Security
Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
Measuring risks is a proof of your risk aversion
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 4
Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
0%
20%
40%
60%
80%
INTERNAL
COMMUNICATIONS
PLAN
BREACH
NOTIFICATION
PLAN
BREACH
REMEDIATION
PLAN
RESPONSE
PLAN
A FORMAL RISK
ASSESSMENT
EXTERNAL
COMMUNICATIONS
AND PUBLIC
RELATIONS PLAN
CYBER RISK
INSURANCE
Risk management practice currently in use
Risk averse (n=64) Risk propense (n=35)
© IDC Visit us at IDC.com and follow us on Twitter: @IDC
5
TIME (MONTHS) TO MAINSTREAM
ORGANIZATIONALIMPACT
Asingle
department
orabusinessunit
Multiple
departments
orbusinessunitsCompanywide
0-12 12-24 24+
1
2
3
4
5
6
7
8
9
10
[CELLRANGE
]
[CELLRANG
E]
[CELLRANG
E]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE
]
[CELLRANGE]
[CELLRAN
GE]
[CELLRA
NGE]
[CELLRANGE]
IDC FutureScape 2017
Security Products and Services, Western Europe Implications
1
2
3
4
5
6
7
8
9
10
By 2021, 50% of all online transactions will incorporate biometric
authentication driven by a ubiquitous technology infrastructure
that enables low implementation costs and broad user
acceptance.
By 2019, more than 75% of IoT device manufacturers will
improve their security and privacy capabilities, making them
more trustworthy partners for technology buyers.
By 2019, 60% of major multinational corporations with ties to
Europe will face significant cybersecurity attacks aimed at
disruption of commodities.
Over the next 18 months, 85% of consumers in Western
European nations will defect from a business because their
personally identifiable information is impacted in a security
breach.
By 2019, 70% of Western European enterprise cybersecurity
environments will incorporate cognitive/AI technologies to assist
humans in dealing with the vastly increasing scale and complexity of
cyberthreats.
By 2018, 50% of enterprise customers will leverage analytics as
a service to help solve the challenge of combing through
security-related data and events.
By 2020, cloud security gateway functionality will begin to be
integrated as part of web service offerings to entice IT leaders to
move offerings to the cloud.
By 2020, 25% of Western European broadband homes will have
at least one IP-enabled home automation or security monitoring
sensor/device.
By 2021, 60% of Western European enterprises will invest in
incident response retainers.
By 2020, more than 25% of Western European enterprises will
secure their IT architectures through cloud, hosted, or SaaS
security services.
Note: The size of the bubble indicates complexity/cost to address.
Source: IDC, 2016
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 6
Risk posture has an impact on the adoption
of new security technologies
Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
15%
35%
55%
75%
THREAT INTELLIGENCE SERVICES MICRO SEGMENTATION AI/HEURISTICS
Currently using security technologies by risk posture
Risk propense (n=35) Risk averse (n=64)
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 7
40%
52%
64%
76%
KNOWLEDGE OF
OBLIGATIONS
IMPLEMENTATION
PLANNING
PENALTIES MITIGATION
BASED ON EARLY
DETECTION/REMEDIATION
CONTINUOUS
IMPROVEMENT
IMPLEMENTATION
EXECUTION
ASSESSMENT OF
CAPABILITIES AND GAPS
Higherpreparednessscore(4to5)
Preparedness to GDPR
Risk propense (n=35) Risk averse (n=64)
GDPR implementation will also depend on
the actual perception of risks
Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 8
IDC Italia
Viale Monza 14
20127 Milano
Tel: +39 02 28457339
gvercellino@idc.com
Giancarlo Vercellino
Research & Consulting
Manager
IDC Italy
www.idc.com

More Related Content

PPTX
IDC Mobiz - Mobility of Everything Forum 2017
PPTX
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
PPTX
Data Privacy & The Golden Age of Security
PPTX
The Software Defined Business
PPTX
Le mutazioni del rischio IT nell’era della privacy e dell’intelligenza artifi...
PPTX
Future of Work: dal Cosa al Come
PDF
IDC, the third platform and a security perspective Latam, Cisco Live 2014
PPTX
In real-time: new key success factors
IDC Mobiz - Mobility of Everything Forum 2017
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators
Data Privacy & The Golden Age of Security
The Software Defined Business
Le mutazioni del rischio IT nell’era della privacy e dell’intelligenza artifi...
Future of Work: dal Cosa al Come
IDC, the third platform and a security perspective Latam, Cisco Live 2014
In real-time: new key success factors

What's hot (20)

PPTX
Data Intelligence: come abilitare il valore aziendale
PDF
CeBIT IoT Forum (2017)
PPTX
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
PDF
Oies IoT World Europe 20170615
PDF
Connected Cars Europe keynote (2017)
PPTX
Go+ product
PDF
Internet of Things in 10 slides
PDF
VDE Smart Cities (2016)
PDF
CCWTR Press Deck Completo
PDF
Presentation: Impact of IoT in Enterprise Architecture
PDF
Predictions idc2013
PPTX
Internet of Things
PDF
ETSI IoT keynote (2016)
PDF
5 Factors in Modern Data Design
PDF
Israel @ MWC 2017 catalogue
PDF
Gartner: Top 10 Strategic Technology Trends 2016
PDF
Business Analytics and the Internet of Things
PDF
Industrial IoT Market Winter 2018
PPTX
L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...
PDF
The Rise of Platforms in the IoT
Data Intelligence: come abilitare il valore aziendale
CeBIT IoT Forum (2017)
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
Oies IoT World Europe 20170615
Connected Cars Europe keynote (2017)
Go+ product
Internet of Things in 10 slides
VDE Smart Cities (2016)
CCWTR Press Deck Completo
Presentation: Impact of IoT in Enterprise Architecture
Predictions idc2013
Internet of Things
ETSI IoT keynote (2016)
5 Factors in Modern Data Design
Israel @ MWC 2017 catalogue
Gartner: Top 10 Strategic Technology Trends 2016
Business Analytics and the Internet of Things
Industrial IoT Market Winter 2018
L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...
The Rise of Platforms in the IoT
Ad

Similar to Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazione digitale (20)

PDF
Navigating the IT landscape - Thomas Meyer - IDC
PDF
Security Everywhere: A Growth Engine for the Digital Economy
PDF
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
PPTX
Manage the IT risk in the era of Industrial Internet
PDF
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
PDF
Retail Week: Cloud Security
PPTX
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
PDF
Effecientip DNS security.pdf
PDF
Edgescan vulnerability stats report 2020
PDF
kaspersky presentation for palette business solution June 2016 v1.0.
PDF
Security, Compliance and Cloud - Jelecos
PPTX
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
PPTX
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
PDF
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
PDF
Responding to the Pandemic: Information Security and Technology Trends
PDF
Tomorrow Starts Here - Security Everywhere
PPTX
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
PDF
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
PDF
Y20151003 IoT 資訊安全_趨勢科技分享
PDF
Top 5 Cybersecurity Risks in Banking
Navigating the IT landscape - Thomas Meyer - IDC
Security Everywhere: A Growth Engine for the Digital Economy
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Manage the IT risk in the era of Industrial Internet
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Retail Week: Cloud Security
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Effecientip DNS security.pdf
Edgescan vulnerability stats report 2020
kaspersky presentation for palette business solution June 2016 v1.0.
Security, Compliance and Cloud - Jelecos
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Responding to the Pandemic: Information Security and Technology Trends
Tomorrow Starts Here - Security Everywhere
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
Y20151003 IoT 資訊安全_趨勢科技分享
Top 5 Cybersecurity Risks in Banking
Ad

More from IDC Italy (20)

PPTX
Innovare alla velocità del cloud: la rivoluzione multicloud
PDF
Sogno di una fabbrica digitale
PPTX
Il nuovo data center, un’infrastruttura digitale agile e distribuita
PPTX
Cognitive/AI: views, perspectives & directions
PPTX
Enterprise Mobility Blends Next-Gen Technologies
PPTX
Digital Native Enterprise: Disrupt to Transform, Transform to Succeed
PPTX
Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...
PPTX
Adattare l'organizzazione IT alla trasformazione digitale
PPTX
Rinnovare il Retail: Piattaforma, Esperienza e Innovazione
PPTX
Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...
PPTX
The Cognitive Edge: A New Competitive Advantage
PPTX
Open your Transformation, Define your Evolution
PPTX
Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...
PPTX
Superare gli ostacoli al cambiamento nel percorso di trasformazione digitale
PPTX
Mobile Strategy in Digital Environment: the Mindset Shift
PPTX
IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...
PPTX
The Analytic Gap – Matching decision making with data analytics
PPTX
Digital Analytics
PPTX
Digitalisation Now
PPTX
Next Generation Field Service Management
Innovare alla velocità del cloud: la rivoluzione multicloud
Sogno di una fabbrica digitale
Il nuovo data center, un’infrastruttura digitale agile e distribuita
Cognitive/AI: views, perspectives & directions
Enterprise Mobility Blends Next-Gen Technologies
Digital Native Enterprise: Disrupt to Transform, Transform to Succeed
Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...
Adattare l'organizzazione IT alla trasformazione digitale
Rinnovare il Retail: Piattaforma, Esperienza e Innovazione
Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...
The Cognitive Edge: A New Competitive Advantage
Open your Transformation, Define your Evolution
Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...
Superare gli ostacoli al cambiamento nel percorso di trasformazione digitale
Mobile Strategy in Digital Environment: the Mindset Shift
IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...
The Analytic Gap – Matching decision making with data analytics
Digital Analytics
Digitalisation Now
Next Generation Field Service Management

Recently uploaded (20)

PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Electronic commerce courselecture one. Pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Cloud computing and distributed systems.
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Empathic Computing: Creating Shared Understanding
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
DOCX
The AUB Centre for AI in Media Proposal.docx
PPT
Teaching material agriculture food technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Electronic commerce courselecture one. Pdf
20250228 LYD VKU AI Blended-Learning.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Reach Out and Touch Someone: Haptics and Empathic Computing
Digital-Transformation-Roadmap-for-Companies.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Cloud computing and distributed systems.
Programs and apps: productivity, graphics, security and other tools
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Empathic Computing: Creating Shared Understanding
gpt5_lecture_notes_comprehensive_20250812015547.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Dropbox Q2 2025 Financial Results & Investor Presentation
The AUB Centre for AI in Media Proposal.docx
Teaching material agriculture food technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazione digitale

  • 1. A new IT-risk culture for Digital Transformation Milan, May 11, 2017 Redux Version
  • 2. The market is under pressure © IDC Visit us at IDC.com and follow us on Twitter: @IDC 2 Source: IDC, 2016 (n=98, companies with more than 50 employees in Italy; weighted extrapolation) 10 OR MORE DATA BREACHES 5-9 DATA BREACHES 3-4 DATA BREACHES 1-2 DATA BREACHES 0% 5% 10% 15% 20% About 40% knows they have been breached
  • 3. Who is adopting new IT Security tech is dealing with specific challenges © IDC Visit us at IDC.com and follow us on Twitter: @IDC 3 0% 20% 40% 60% COMPETING WITH CLOUD RESOURCES USED/SHADOW IT HIGH LEVEL OF DEMAND FOR NEW BUSINESS SERVICES FRAGMENTATION OR LACK OF INTEGRATION OF SECURITY PRODUCT PORTFOLIO JUGGLING CONFLICTING PRIORITIES NOT ENOUGH INTEGRATION INTO THE IT INFRASTRUCTURE TEAMS LACK OF INSIGHT INTO SECURITY SENSITIVE ACTIVITIES SKILLS SHORTAGES OPERATIONS RESOURCES ARE TOO BUSY ON ROUTINE OPERATIONS BUDGET CONSTRAINTS What is challenging the development of IT Security Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
  • 4. Measuring risks is a proof of your risk aversion © IDC Visit us at IDC.com and follow us on Twitter: @IDC 4 Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation) 0% 20% 40% 60% 80% INTERNAL COMMUNICATIONS PLAN BREACH NOTIFICATION PLAN BREACH REMEDIATION PLAN RESPONSE PLAN A FORMAL RISK ASSESSMENT EXTERNAL COMMUNICATIONS AND PUBLIC RELATIONS PLAN CYBER RISK INSURANCE Risk management practice currently in use Risk averse (n=64) Risk propense (n=35)
  • 5. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 5 TIME (MONTHS) TO MAINSTREAM ORGANIZATIONALIMPACT Asingle department orabusinessunit Multiple departments orbusinessunitsCompanywide 0-12 12-24 24+ 1 2 3 4 5 6 7 8 9 10 [CELLRANGE ] [CELLRANG E] [CELLRANG E] [CELLRANGE] [CELLRANGE] [CELLRANGE ] [CELLRANGE] [CELLRAN GE] [CELLRA NGE] [CELLRANGE] IDC FutureScape 2017 Security Products and Services, Western Europe Implications 1 2 3 4 5 6 7 8 9 10 By 2021, 50% of all online transactions will incorporate biometric authentication driven by a ubiquitous technology infrastructure that enables low implementation costs and broad user acceptance. By 2019, more than 75% of IoT device manufacturers will improve their security and privacy capabilities, making them more trustworthy partners for technology buyers. By 2019, 60% of major multinational corporations with ties to Europe will face significant cybersecurity attacks aimed at disruption of commodities. Over the next 18 months, 85% of consumers in Western European nations will defect from a business because their personally identifiable information is impacted in a security breach. By 2019, 70% of Western European enterprise cybersecurity environments will incorporate cognitive/AI technologies to assist humans in dealing with the vastly increasing scale and complexity of cyberthreats. By 2018, 50% of enterprise customers will leverage analytics as a service to help solve the challenge of combing through security-related data and events. By 2020, cloud security gateway functionality will begin to be integrated as part of web service offerings to entice IT leaders to move offerings to the cloud. By 2020, 25% of Western European broadband homes will have at least one IP-enabled home automation or security monitoring sensor/device. By 2021, 60% of Western European enterprises will invest in incident response retainers. By 2020, more than 25% of Western European enterprises will secure their IT architectures through cloud, hosted, or SaaS security services. Note: The size of the bubble indicates complexity/cost to address. Source: IDC, 2016
  • 6. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 6 Risk posture has an impact on the adoption of new security technologies Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation) 15% 35% 55% 75% THREAT INTELLIGENCE SERVICES MICRO SEGMENTATION AI/HEURISTICS Currently using security technologies by risk posture Risk propense (n=35) Risk averse (n=64)
  • 7. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 7 40% 52% 64% 76% KNOWLEDGE OF OBLIGATIONS IMPLEMENTATION PLANNING PENALTIES MITIGATION BASED ON EARLY DETECTION/REMEDIATION CONTINUOUS IMPROVEMENT IMPLEMENTATION EXECUTION ASSESSMENT OF CAPABILITIES AND GAPS Higherpreparednessscore(4to5) Preparedness to GDPR Risk propense (n=35) Risk averse (n=64) GDPR implementation will also depend on the actual perception of risks Source: IDC Italy, 2016 (n=100, different within groups; cross-sector study, companies with more than 500 employees in Italy; weighted extrapolation)
  • 8. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 8 IDC Italia Viale Monza 14 20127 Milano Tel: +39 02 28457339 gvercellino@idc.com Giancarlo Vercellino Research & Consulting Manager IDC Italy www.idc.com