SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
Architecting the As-a-Service Economy
Delivering Cybersecurity & Digital Trust
An HfS Webinar Production, 20 July 2016
FRED	MCCLIMANS
HfS Research
CHRISTINE	FERRUSI	ROSS
HfS	Research
STEVEN	CURTIS
Accenture
RYAN	LASALLE
Accenture
©	2016	HfS	Research	Ltd. Proprietary	│Page	2
Agenda
• The	State	of	Cybersecurity	and	
Digital	Trust:	An	Overview
• Discussion
• Q&A/Closing
©	2016	HfS	Research	Ltd. Proprietary	│Page	3
To better understand the State of Cybersecurity & Digital Trust
HfS	and	Accenture	spoke	with	208	enterprise	professionals,	providing	operational	
cybersecurity	or	security	oversight,	across	multiple	geographies	and	vertical	industries.	
We	learned	a	lot.	
Source: "State of Cyber Security 2016", HfS Research and Accenture
Sample: Enterprise Security Professionals = 208
61
52
30
11
22
32
North	America
Europe
Asia	Pacific	including	Australia/NZ
Middle	East	and	Africa
Latin	America
India
#	Respondents	by	Region	
46
88
51
23
500	- 999
1,000	– 4,999
5,000	– 49,999
50,000+
#	Respondents	by	Enterprise	Size
31
33
30
20
25
36
33
Media	&	Technology	(includes	telecoms,	software,	…
Banking	&	Financial	Services	(includes	capital	markets,	…
Resources	(includes	energy,	utilities,	transportation,	etc.)
Healthcare	/	Pharma
Public	Sector	/	Government	/	NGO
Products	(includes	manufacturing,	distribution,	retail,	…
Other	/	Not	listed
#	Respondents	by	Vertical	Industry
©	2016	HfS	Research	Ltd. Proprietary	│Page	4
What are the “Very/Critically Important” Goals and Initiatives?
Source: "State of Cyber Security 2016", HfS Research and Accenture
Sample: Enterprise Security Professionals = 208
28%
27%
29%
37%
14%
16%
14%
13%
0% 20% 40% 60%
Mobile
Cloud	Storage
Culture	of	Cyber	Security	Awareness
Cloud	Computing
How	important	are	the	following	initiatives	to	your	overall	business?
(Very	or	Critically	Important	responses	only)
VERY	IMPORTANT
CRITICALLY	
IMPORTANT
39%
47%
30%
39%
30%
26%
43%
37%
0% 20% 40% 60% 80% 100%
Marketing
Digital	Transformation	Agendas
Brand	Reputation
Customer	Support/Service
How	important	to	the	following	business	goals	is	your	ability	to	properly	secure	your	data?
(Very	or	Critically	Important	responses	only)
VERY	IMPORTANT
CRITICALLY	
IMPORTANT
©	2016	HfS	Research	Ltd. Proprietary	│Page	5
What are the initiatives that are placing the enterprise at risk?
Source: "State of Cyber Security 2016", HfS Research and Accenture
Sample: Enterprise Security Professionals = 208
Digital	Identity	Management	and	Mobile	Payments	are	considered	the	top	“risky activities”	
when	it	comes	to	securing	data	– these are	the	potential	disruptors	of	Digital	Trust!
35%
39%
39%
42%
41%
23%
23%
23%
23%
28%
0% 10% 20% 30% 40% 50% 60% 70% 80%
Adoption	of	Mobile	Apps	
Shift	to	the	cloud	
Pervasive	IoT	Ecosystem	Development	
Adoption	of	Mobile	Payments	
Digital	Identity	Management	
What	impact	are	the	following	trends	and/or	initiatives	having	on	business	resilience	and	your	ability	
to	properly	secure	your	data?
(Strong	or	Critical	Impact	responses	only)
STRONG	IMPACT CRITICAL	IMPACT
©	2016	HfS	Research	Ltd. Proprietary	│Page	6
Where are today’s threats coming from?
Source: "State of Cyber Security 2016", HfS Research and Accenture
Sample: Enterprise Security Professionals = 208
They	come	from	both	internal	and	external	threat	actors!
69% 57%55%
80%
0%
100%
Internal External
Have	you	experienced	the	theft	or	corruption	of	internal	corporate	or	user/consumer	
information	by	Internal	or	External	threat	actors?
Now Expect	in	the	next	18	months
34%
37%
37%
40%
41%
39%
45%
41%
48%
48%
0% 20% 40% 60%
Hacktivists	with	political	agendas	
State-sponsored	professionals	targeting	national	infrastructure	and	
promoting	cyber-terrorism	
State-sponsored	professionals	targeting	economic	/	IP	theft	(corporate	
espionage)	
Organized	crime-sponsored	professionals	
Well-organized	teams	of	professionals	working	for	themselves	targeting	
personal	/	corporate	information	for	resale	
What	level	of	concern	do	you	have	for	the	following	threat	groups?	
(Strong	&	Critical	Concern	only)
In	12-18	MONTHS
Today
©	2016	HfS	Research	Ltd. Proprietary	│Page	7
Moving forward 12-18 months, the “Major/Critical” threats shift
Source: "State of Cyber Security 2016", HfS Research and Accenture
Sample: Enterprise Security Professionals = 208
19%
22%
24%
25%
28%
29%
29%
29%
31%
33%
34%
35%
35%
31%
35%
37%
34%
35%
33%
32%
32%
39%
41%
36%
39%
37%
0% 10% 20% 30% 40% 50%
Denial	of	Services	(DOS,	DDOS)	
Data	Theft	Corporate	Information	by	insiders
Botnets	/	Zombies	/	Other	Software	Threats	
Ransom-ware	(or	similar	at	the	corporate	level)
Phishing	/	Spear-Phishing	
Website	Hacks	(defacing	public	materials)	
Unauthorized	physical	access	in	office	facilities
Unauthorized	physical	access	in	data	facilities
Data	Theft	Personal	Information	by	outsiders
Data	Loss	/	Destruction	
Software	(Trojan,	malware,	virus,	spyware,	etc)
Data	Theft	Personal	Information	by	insiders
Data	Theft	Corporate	Information	by	outsiders
How	concerned	were	you	during	the	prior	12	months	of	the	following	threats	and	how	concerned	are	
you	moving	into	the	coming	12	to	18	months?	
(responses	citing	Major	or	Critical	Concern	only)
COMING	12	TO	18	MONTHS PRIOR	12	MONTHS
©	2016	HfS	Research	Ltd. Proprietary	│Page	8
Enterprise Digital Trust is Challenged by 5 Critical Gaps
These	gaps	– between	security	requirements	and	operational	reality	– are	disrupting	the	
ability	of	cybersecurity professionals	to	secure	the	extended	enterprise
TALENT
TECHNOLOGY
MANAGEMENT
BUDGET
PARITY
Five	Gaps	that	are	Inhibiting	Digital	Trust TALENT	GAP:	Between	the	technical	and	operational	skill-
set	required	and	the	pool	of	available	talent	– despite	the	
increased	value	to	be	gained	through	automation.
TECHNOLOGY	GAP:	Between	the	growth	of	cyber	threats	
and	the	ability	to	quickly	deploy	and	leverage	new	
technologies	in	support	of	securing	business	initiatives.	
PARITY	GAP:	Between	cyber	preparedness	(and	threats)	in	
different	regions,	across	different	verticals,	and	within	the	
extended	enterprise	ecosystem	– critical	for	multi-national	
organizations.
BUDGET	GAP:	Partly	fueled	by	financial	realities	and	partly	
fueled	by	management	focus,	between	the	level	of	budget	
required	and	available	funds	on	hand.
MANAGEMENT	GAP:	The	perception	gap	between	
executive	management	and	security	operations	
management	– perhaps	the	one	gap	that,	if	addressed,	can	
lead	the	way	in	closing	the	other	gaps.
©	2016	HfS	Research	Ltd. Proprietary	│Page	9
TALENT: Cybersecurity needs improvement across the board
42%	of	respondents	believe	they	need	additional	budget	for	hiring	security	talent	and/or	training,	while	31%	of	respondents	list	
either	lack	of	training	or	staffing	budget	as	their	single	biggest	inhibitor	to	cybersecurity provision.	
54%	of	respondents	(70%	within	EMEA)	indicate	their	employees	are	underprepared	to	prevent	security	breaches (Not	Well	
Prepared,	Somewhat	Prepared,	or	merely	Adequately	Prepared).	
“Acquiring	top	talent	is	a	start,	but	continually	“upgrading”	existing	talent	through	rigorous	
training	and	testing	programs	is	essential	to	cybersecurity in	the	21st century”
77%
76%
77%
75%
75%
75%
73%
74%
72%
76%
72%
22%
22%
22%
22%
22%
25%
25%
26%
28%
24%
27%
0% 25% 50% 75% 100%
Business	[Unit]	Alignment
Platform/Performance	(including	COOP)	
Government	Policies,	such	as	GDPR	or	CISA
Controls	to	restrict	data	by	geographic	region	
User	Education	and	Awareness	
Application	Security	
Governance/Compliance	
Device	Security	
Data	Integrity	
Threat	and	Vulnerability	Assessments	
Identity/Privacy	
How	prepared	are	you	[your	staff]	to	handle	each	of	the	following?
(note:	respondents	had	an	"N/A"	option	not	shown)
NEED	SOME	LEVEL	OF	IMPROVEMENT WE'RE	STATE-OF-THE-ART
Source: "State of Cyber Security 2016", HfS Research and Accenture
Sample: Enterprise Security Professionals = 208
©	2016	HfS	Research	Ltd. Proprietary	│Page	10
TECHNOLOGY: Technology is outpacing ability, but not the
threat
55%	- the	number	of	cybersecurity professionals	in	the	Healthcare/Pharma sector	that	believe	Cognitive/AI	will	be	either	Very	or	
Critically	Important to	their	ability	to	become	a	secure,	digital	enterprise.
“Rapid	evolution	of	technology	and	parity	between	the	enterprise	and	the	threat	actor	has	
eliminated	the	concept	of	‘technical’	state-of-the-art “
3%
3%
6%
7%
8%
12%
14%
18%
20%
21%
25%
31%
33%
0% 20% 40% 60% 80%
Encryption	(network)
Firewalls
VPNs	and	Segmentation
Virtual	Desktops	(VM)
Physical	/	Digital	Security
Encryption	(mobile,	access	control)
Data	Analytics
Behavioral	Tracking	(employee	/	partner)
Identity	&	Access	Management
Automation	(inc	Autonomics	&	RPA)
Behavioral	Tracking	(consumer	/	client)
Data	Anonymization
Cognitive	Computing	/	AI
Indicate	how	important	you	feel	each	of	the	following	technologies	are	today	and	hot	important	
they	will	be	within	12	to	18	months?	
(Very	or	Critically	Important	responses	only)
TODAY
IN	12	TO	18	MONTHS
%	INCREASE
New	Technology
New	Budget	
New	Skills
Commodity	Technology
Existing	Budget	
Common	Skills
©	2016	HfS	Research	Ltd. Proprietary	│Page	11
PARITY: Enterprises face inequalities in the cybersecurity realm
Based	on	1:1	interviews	with	enterprise	cybersecurity and	service	provider	professionals,	there	is	reason	to	believe	this	number	
may	be	accurate	but	that	the	depth	of	vetting	at	this	point	may	not	be	significant.	
“The	enterprise	is	only	as	secure	as	its	least	secure	partner,	and	differences	between	both	
internal	and	external	stakeholders	continue	to	put	Digital	Trust	at	risk“
35%
45%
48%
50%
50%
51%
52%
52%
52%
57%
42%
51%
46%
45%
42%
44%
44%
47%
43%
41%
23%
4%
6%
5%
8%
5%
4%
1%
5%
2%
0% 20% 40% 60% 80% 100% 120%
BPO	Partners	(F&A,	HR,	Procurement,	etc.)
Legal	Partners
Marketing	Partners
IP/Development	Partners
HR/Payroll/Training	Partners
Manufacturing/Distribution	(Supply	Chain)	Partners
R&D,	Design,	and	Engineering	Partners
Financial/Banking/Credit	Partners
Insurance	Partners
Credit	Partners
Do	you	have	a	mechanism	or	set	of	policies	(SOP)	to	vet	ecosystem	partners	for	their	own	
cybersecurity	integrity	and	preparedness,	and	where	do	you	expect	to	invest	over	the	coming	12	to	18	
months?
VETTING	NOW
INVESTMENT
GAP	(NO	PLANS	TO	VET)
Source: "State of Cyber Security 2016", HfS Research and Accenture
Sample: Enterprise Security Professionals = 208
©	2016	HfS	Research	Ltd. Proprietary	│Page	12
PARITY: Enterprises face inequalities WITHIN the enterprise
Sales	and	Call	Center	operations	continue	to	drag	down	the	cyber-preparedness	within	the	enterprise,	and	call	into	question	the	
ability	to	secure	customer	data that	frequently	spans	multiple	enterprise	“silos”.	
“Differences	between	operational	units	within	the	enterprise	– where	data	is	often	shared	
freely	– continue	to	put	Digital	Trust	at	risk“
67%
53%
47% 45%
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
IT	Support	Operations Back	Office	and	Operations Call	Center Sales	Force	
How	cyber-secure	is	<the	following>	within	your	organization?		
(respondents	indicating	Well	or	Very	Well	Secured	only)
NORTH	AMERICA EMEA AP	(ex	INDIA) INDIA LATIN	AMERICA TOTAL
Source: "State of Cyber Security 2016", HfS Research and Accenture
Sample: Enterprise Security Professionals = 208
©	2016	HfS	Research	Ltd. Proprietary	│Page	13
BUDGETS: Enterprises face inequalities WITHIN the enterprise
62%	of respondents	indicate	that	the	
biggest	inhibitor	to	their	organization’s	
security	provision	is	budget-related.	
Other	inhibitors	include:	Legacy	(Fixed)	
Security	Services	Contracts	– 10%;	Limited	
Awareness	of	Potential	Risks	and/or	
Emerging	Threats	– 11%;	and	Limited	
Support	from	Corporate/Executive	Level	–
16%.		
“Budgets	are	never	truly	unlimited,	and	while	‘how	much	is	enough’	is	debatable,	
cybersecurity professionals	continue	to	deal	with	funding	shortfalls	that	directly	translate	to	
less	advanced	technology	and	shortages	of	adequately	trained	staff”
42%
26%
16%
12%
4%
0%
10%
20%
30%
40%
50%
We	have	enough	budget	for	
technology	but	need	additional	
security	talent	and/or	training
We	have	enough	budget	for	both	
technology	and	security	talent
We	have	a	well-trained	staff,	but	are	
lacking	technology	and/or	services	
resources
Inadequate	to	keep	pace	with	the	
rising	threats	and/or	we're	being	
asked	to	cut	back	on	overall	expenses
We	seem	to	have	an	uncapped	or	
unlimited	budget	in	this	area
Which	of	the	following	most	accurately	describes	your	current	funding/staffing	levels	for	Cybersecurity?	
Budget-
related,	62%
Limited	support	
from	
Corporate/Executiv
e	Level,	16%
Limited	Awareness	
of	Potential	Risks	
and/or	Emerging	
Threats,	11%
Legacy	(Fixed)	
Security	Service	
Contracts,	10%
Other,	1%
Which	of	the	following	are	the	(single)	biggest	inhibitors	to	your	
organization's	security	provision?	
“Budget-related”	includes:
• Lack	of	Security	
(technology/service
s)	Budget	(18%)
• Lack	of	Training	
Budget	(17%)
• Lack	of	Staffing	
Budget	(14%)
• Extended	Budget	
Cycles	(13%)
Source: "State of Cyber Security 2016", HfS Research and Accenture
Sample: Enterprise Security Professionals = 208
©	2016	HfS	Research	Ltd. Proprietary	│Page	14
BUDGETS: Vertical industry perspectives highlight budget risks
“The	extended	ecosystem	often	spans	multiple	verticals,	geographies,	and	businesses	of	
different	scale.	Inequalities	in	cyber-preparedness	between	these	entities	is	cause	for	concern”
14%
23%
18%
26% 24%
11% 13%
21%
20%
14%
11% 16%
20% 16%
14%
13%
14%
16%
16%
11% 16%
7%
7%
7%
16% 12%
20% 19%
0%
10%
20%
30%
40%
50%
60%
70%
80%
Media	&	
Technology	
Banking	&	
Financial	Services
Resources Healthcare	/	
Pharma
Public	Sector	/	
Government	/	
NGO
Products Other
Which	of	the	following	are	the	biggest	inhibitors	to	your	organization’s	security	provision?
(single	biggest	budgetary	inhibitor,	by	industry)
Lack	of	Security	(technology/services)	Budget Lack	of	Training	Budget Lack	of	Staffing	Budget Extended	Budget	Cycles
Legacy	approaches	to	cybersecurity	budgets	– as	a	cost	of	securing	data	– no	longer	meet	the	current/emerging	threat	
environment.	Achieving	a	state-of-the-art	cybersecurity	mindset	– and	driving	enterprise-wide	Digital	Trust	– requires	an	
approach	that	treats	cybersecurity	costs	as	enablers	of	data	utilization
Source: "State of Cyber Security 2016", HfS Research and Accenture
Sample: Enterprise Security Professionals = 208
©	2016	HfS	Research	Ltd. Proprietary	│Page	15
MANAGEMENT: Highlighting the need for executive leadership
43%	of	respondents	cite	a	Culture	of	Cybersecurity Awareness	as	Very	or	Critically	Important	to	the	overall	business	of	the	
enterprise	(#2	behind	Cloud	Computing).
36% of	respondents	believe	management	considers	security	an	unnecessary	cost.	
“Leadership	will	be	critical	in	creating	an	enterprise	mindset	that	is	focused	on	both	corporate	
and	personal	data	responsibility	and	security	– without	leadership,	digital	trust	for	the	
enterprise	brand	cannot	be	achieved ”
36.0%
41.8%
9.6% 12.1%
0.5%
34.1% 34.1%
15.4% 15.4%
1.0%
-1.9%
-7.7%
5.8%
3.3%
0.5%
-20.0%
-10.0%
0.0%
10.0%
20.0%
30.0%
40.0%
50.0%
CEO CIO COO CRO Other
Which	of	the	following	best	describes	your	Security	Management	Reporting	Structure	today,	and	
how	do	you	believe	it	should	change	within	12-18	months?
(data	shows	%	of	reporting	lines) TODAY
NEXT	12-18	
MONTHS
Change
©	2016	HfS	Research	Ltd. Proprietary	│Page	16
MANAGEMENT: I can’t get no [reporting] satisfaction
Over	90%	of	currently	reporting	to	a	Chief	Risk	Officer	(CRO)	are	dissatisfied	with	the	reporting	structure.
Dissatisfaction	with	reporting	to	the	Chief	Executive	Officer	(CEO)	ranges	from	32%	to	61%	depending	on	job	title.
“Communication	and	collaboration	between	operational	security	management	and	executive	
management	is	essential	to	both	promoting	a	culture	of	cybersecurity awareness	and	
executing	on	the	enablers	of	Digital	Trust”
32%
46%
50%
57%
61%
75%
89%
100%
0% 50% 100%
Chief	Information	Security	Officer	(Reports	to	CEO)
VP	/	Director	of	Security	(reports	to	CIO)
Chief	Risk	or	Trust	Officer	(Reports	to	CEO/BoD)
Chief	Information	Security	Officer	(reports	to	CIO)
VP	/	Director	of	Security	(reports	to	CEO)
VP	/	Director	of	Security	(reports	to	COO)
VP	/	Director	of	Security	(reports	to	CRO)
Chief	Information	Security	Officer	(Reports	to	CRO)
Which	%	respondents	want	to	change	reporting	lines?	
(grouped	by	current	reporting	structure)
©	2016	HfS	Research	Ltd. Proprietary	│Page	17
Asking the right questions…
“The	near-term	agenda	must	be	on	closing	the	cybersecurity gaps	that	exist	today,	with	
talent,	technology,	parity,	budgets,	and	cybersecurity oversight	and	management”
Are	we	properly	allocating	
budgets	and	resources?
Are	we	measuring	the	costs	
and	results	of	cybersecurity
correctly?
Are	we	properly	anticipating	
and	leveraging	new	
technologies	and	processes
Are	we	ensuring	parity	of	
protection	across	the	
extended	enterprise	
ecosystem?
How	can	we	best	transform	
cybersecurity to	achieve	a	
holistic	state-of-the-art	
approach	to	leveraging	data	
assets?
EXECUTIVE
LEADERSHIP
driving	
state-of-the-art
Cybersecurity
Processes
and
Digital	Trust
©	2016	HfS	Research	Ltd. Proprietary	│Page	18
Taking the right steps…
“The	future	of	the	digital	enterprise	relies	upon	the	ability	of	cybersecurity	professionals,	
working	in	tandem	with	business	units,	executives,	partners,	providers	and	end	users	to	create	
an	environment	of	digital	trust	where	business	can	flourish.”
Executive	management	must	assume	a	visible,	vocal,	and	engaged	position	on	
cybersecurity,	driving	a	culture	that	fosters	digital	trust.
Cybersecurity	talent	must	be	acquired,	trained	and	developed,	leveraging	holistic	
security	practices	and	emerging	technologies	to	better	address	cyberattacks.
Cybersecurity	operations	and	executive	management	must	collaborate	to	identify	
and	close	gaps	between	security	requirements	and	execution	ability.
Enterprise	cybersecurity	teams	must	establish	innovation	and	testing	capabilities to	
rapidly	and	cost-efficiently	identify,	vet,	and	test	new	and	emerging	technologies	to	
keep	pace	with	the	evolution	of	cyber	threats.
Shift	how	cybersecurity	funding	is	viewed,	moving	away	from	treating	costs	as	
overhead	to	a	holistic	approach	that	includes	the	cost	of	securing	data	and	allowing	
it	to	be	used	as	part	of	overall	business	initiative	financial	requirements.
©	2016	HfS	Research	Ltd. Proprietary	│Page	19
Questions?
©	2016	HfS	Research	Ltd. Proprietary	│Page	20
©	2016	HfS	Research	Ltd. Proprietary	│Page	21
Christine Ferrusi Ross
Research	Vice	President,	Strategy	and	Product	Development,	HfS	Research	– Boston,	MA
Overview
§ Christine Ferrusi Ross focuses on helping firms solve complex client problems by developing new
service offerings and products to meet new market demands. At HfS she’s working with the
team to grow the successful HfS Summits program with a global remit across IT and Business
Process Services.
Previous Experience
§ Christine is a veteran of the IT services industry and the analyst community. She pioneered some
of the industry’s first research into vendor management and supplier risk, as well as building
blockbuster sourcing conferences and peer communities. Christine has helped some of the
largest companies in the world operationalize their sourcing strategies and supplier risk efforts.
§ From a domain perspective, Christine is passionate about supplier and supply chain risk, Internet
of Things, democratizing big data and analytics, and—in large part thanks to her children—
marketing best practices as exemplified by video game designers and Korean boy bands.
§ She’s been quoted in the Wall Street Journal, on CNBC, and other national media regarding IT
services, vendor management, supplier risk, outsourcing, and globalization.
Education
§ Christine holds a dual degree from Boston University: a BA in International Relations and a BS in
Mass Communications.
christine.ferrusi.ross@hfsresearch.com
©	2016	HfS	Research	Ltd. Proprietary	│Page	22
Fred McClimans
Research	Vice	President,	Digital	Trust	&	Cybersecurity,	HfS	Research	– Washington,	DC
Overview
§ As the lead analyst for our Digital Trust and Cybersecurity practice, Fred focuses on the enablers
of Digital Trust, including Cybersecurity, Customer Experience, and emerging technologies, such
as Blockchain, that offer both incremental technology and “trusted” process innovation.
Previous Experience
§ Previously, Fred was the vision, and CEO, behind Current Analysis, a global market intelligence
firm in the IT and services sectors (now part of PDM), and the co-founder of Decisys, an analyst
advisory firm focused on vendor strategies and enterprise architectures (now part of Gartner). A
former Gartner analyst, Fred also served as a Manager in the Technology Practice of Ernst &
Young, the North American Business Unit Manger of the Advanced Technology Group of
Newbridge Networks, and as the Chief Information Officer at DTECH LABS.
§ In addition to authoring a book on communications infrastructure (McGraw-Hill, 1991) and
contributing to “Shift&Reset: Strategies for addressing serious issues in a connected society”
(Wiley&Sons, 2011), his work on digital technology and trends has appeared in media outlets
such as CNN, IDG, Social Media Today, Adotas, and CIO Magazine.
§ As a speaker he has chaired the Enterprise Mobility Conference in Washington, DC, led working
sessions at the Intellifest/Rulesfest AI conference, spoken on Digital Trust at SXSW, and keynoted
the LatAm ANDI Sourcing Summit in Cartagena, Colombia.
Education
§ Syracuse University
fred.mcclimans@hfsresearch.com
@fredmcclimans
©	2016	HfS	Research	Ltd. Proprietary	│Page	23
Steven Curtis
Managing	Director,	Accenture	Security
Overview
§ Steven Curtis has over seventeen years’ experience delivering complex security projects and
building strategic technology programs for Fortune 1000 firms. He has consulted to 20 of the
Fortune 100, and managed strategic engagements throughout the project lifecycle for over 100
companies. Steve co-leads Accenture’s security team focused on clients in the CMT industry, and
works with major software, telecom, and aerospace clients.
§ Prior to working with Accenture, Steve led the services division of Identropy, an identity
management focused service provider, and was a security practice Director for
PricewaterhouseCoopers. He was responsible for developing and executing PwC’s information
security assessment and planning framework, managing sales and alliances, and delivering
consulting operations for more than 50 Fortune 1000 clients.
§ Steve has a BBA from the University of Wisconsin –Madison, specializing in Information Systems
and an MBA from the UCLA Anderson School of Management. Steve is also a PMP®.
steven.curtis@accenture.com
©	2016	HfS	Research	Ltd. Proprietary	│Page	24
Ryan LaSalle
Managing	Director,	Global	Growth	and	Strategy,	Accenture	Security
Overview
§ Ryan LaSalle is Managing Director, Global Growth and Strategy, Accenture Security. Ryan
oversees Accenture’s strategic roadmap for the security practice—including offering
development, industrialization, strategic alliances, innovation and Cyber Labs—helping clients
dramatically improve their ability to adapt and thrive in an evolving threat landscape.
§ As a senior member of the global security leadership team, Ryan directs the go-to-market plans
for enabling client value with responsibilities for embedding next generation innovation into
Accenture's suite of security offerings. These differentiated offerings drive transformational
value and productivity for clients across strategic industry groups—and are delivered through
Accenture’s Global Delivery Network, which consists of more than 50 delivery centers across five
continents. Prior to assuming his current role, he was managing director of Cyber Labs—part of
Accenture’s cross-industry research and development Technology Labs—where he lead the
incubation and launch of mission-focused and active defense strategies.
§ During his 17 years with Accenture, Ryan has led client engagements across commercial, non-
profit and the public sector by integrating emerging technologies into advanced solutions to
drive agility and meet business needs. He consults with customers on focused solutions that
bring together analytics, knowledge discovery, and cyber-security to improve threat assessment
and response methodologies.
§ A widely recognized thought leader, Ryan is a Ponemon Institute Fellow, active with the Greater
Washington Board of Trade and sits on security innovation advisory councils for clients across
multiple industries. He holds patents in human resource management, knowledge discovery and
establishing trust between entities online. Ryan is a frequent speaker at international security
conferences and has authored numerous articles on cybersecurity. Ryan holds a bachelor of
science degree in electrical engineering from Princeton University and resides in Alexandria,
Virginia with his wife Melissa and two children.
ryan.m.lasalle@accenture.com
©	2016	HfS	Research	Ltd.
The HfS Service Buyer Summits…
www.hfsevents.com/new-york-2016

Weitere ähnliche Inhalte

Was ist angesagt?

HfS Webinar Slides: The Great Roboboss Debate
HfS Webinar Slides: The Great Roboboss DebateHfS Webinar Slides: The Great Roboboss Debate
HfS Webinar Slides: The Great Roboboss DebateHfS Research
 
HfS Webinar Slides - Achieving Intelligent Automation in Business Operations
HfS Webinar Slides - Achieving Intelligent Automation in Business OperationsHfS Webinar Slides - Achieving Intelligent Automation in Business Operations
HfS Webinar Slides - Achieving Intelligent Automation in Business OperationsHfS Research
 
HfS Webinar Slides: Unveiling the Early Leaders Providing AI capabilities for...
HfS Webinar Slides: Unveiling the Early Leaders Providing AI capabilities for...HfS Webinar Slides: Unveiling the Early Leaders Providing AI capabilities for...
HfS Webinar Slides: Unveiling the Early Leaders Providing AI capabilities for...HfS Research
 
HfS Webinar Slides: Are we ready for Digital HCM?
HfS Webinar Slides: Are we ready for Digital HCM?HfS Webinar Slides: Are we ready for Digital HCM?
HfS Webinar Slides: Are we ready for Digital HCM?HfS Research
 
HfS Webinar Slides: IBM Watson Services
HfS Webinar Slides: IBM Watson ServicesHfS Webinar Slides: IBM Watson Services
HfS Webinar Slides: IBM Watson ServicesHfS Research
 
The Advent of R-BPO: Is the Future of BPO Robotic?
The Advent of R-BPO: Is the Future of BPO Robotic?The Advent of R-BPO: Is the Future of BPO Robotic?
The Advent of R-BPO: Is the Future of BPO Robotic?HfS Research
 
HfS Webinar Slides: The State of Outsourcing and Business Operations 2017
HfS Webinar Slides: The State of Outsourcing and Business Operations 2017HfS Webinar Slides: The State of Outsourcing and Business Operations 2017
HfS Webinar Slides: The State of Outsourcing and Business Operations 2017HfS Research
 
HfS Webinar: What’s Real about Design Thinking in Business Operations and Out...
HfS Webinar: What’s Real about Design Thinking in Business Operations and Out...HfS Webinar: What’s Real about Design Thinking in Business Operations and Out...
HfS Webinar: What’s Real about Design Thinking in Business Operations and Out...HfS Research
 
HfS Webinar Slides: How Cognitive Systems like ignio™ Simplify Batch Jobs Man...
HfS Webinar Slides: How Cognitive Systems like ignio™ Simplify Batch Jobs Man...HfS Webinar Slides: How Cognitive Systems like ignio™ Simplify Batch Jobs Man...
HfS Webinar Slides: How Cognitive Systems like ignio™ Simplify Batch Jobs Man...HfS Research
 
HfS Webinar Slides: Standard Bank Case Discussion - Improving Customer Experi...
HfS Webinar Slides: Standard Bank Case Discussion - Improving Customer Experi...HfS Webinar Slides: Standard Bank Case Discussion - Improving Customer Experi...
HfS Webinar Slides: Standard Bank Case Discussion - Improving Customer Experi...HfS Research
 
HfS Webinar Slides: 2017, the year of making it real
HfS Webinar Slides: 2017, the year of making it realHfS Webinar Slides: 2017, the year of making it real
HfS Webinar Slides: 2017, the year of making it realHfS Research
 
HfS Webinar Slides: Tales from the Automation Trenches
HfS Webinar Slides: Tales from the Automation TrenchesHfS Webinar Slides: Tales from the Automation Trenches
HfS Webinar Slides: Tales from the Automation TrenchesHfS Research
 
HfS Webinar Slides: Beyond RPA
HfS Webinar Slides: Beyond RPAHfS Webinar Slides: Beyond RPA
HfS Webinar Slides: Beyond RPAHfS Research
 
HfS Webinar Slides - A (much-needed) reality-check on Enterprise Artificial I...
HfS Webinar Slides - A (much-needed) reality-check on Enterprise Artificial I...HfS Webinar Slides - A (much-needed) reality-check on Enterprise Artificial I...
HfS Webinar Slides - A (much-needed) reality-check on Enterprise Artificial I...HfS Research
 
Ilya Kazimirovskiy, Outsource People_2016_Minsk
Ilya Kazimirovskiy, Outsource People_2016_MinskIlya Kazimirovskiy, Outsource People_2016_Minsk
Ilya Kazimirovskiy, Outsource People_2016_MinskOutsourcePeopleConference
 
HfS Webinar - The 20 Most Promising Use-Cases of Enterprise Blockchain Adoption
HfS Webinar - The 20 Most Promising Use-Cases of Enterprise Blockchain AdoptionHfS Webinar - The 20 Most Promising Use-Cases of Enterprise Blockchain Adoption
HfS Webinar - The 20 Most Promising Use-Cases of Enterprise Blockchain AdoptionHfS Research
 
HfS Webinar - Digital Workforce for the Digital Enterprise
HfS Webinar - Digital Workforce for the Digital EnterpriseHfS Webinar - Digital Workforce for the Digital Enterprise
HfS Webinar - Digital Workforce for the Digital EnterpriseHfS Research
 
HfS Webinar Slides: State of Operations and Outsourcing 2018
HfS Webinar Slides: State of Operations and Outsourcing 2018HfS Webinar Slides: State of Operations and Outsourcing 2018
HfS Webinar Slides: State of Operations and Outsourcing 2018HfS Research
 
HfS Webinar - Get smart about your Digital Underbelly or you'll Fail to Scale
HfS Webinar - Get smart about your Digital Underbelly or you'll Fail to ScaleHfS Webinar - Get smart about your Digital Underbelly or you'll Fail to Scale
HfS Webinar - Get smart about your Digital Underbelly or you'll Fail to ScaleHfS Research
 
HfS Webinar Slides: Blockchain in BFS - Client Experience and War Stories
HfS Webinar Slides: Blockchain in BFS - Client Experience and War StoriesHfS Webinar Slides: Blockchain in BFS - Client Experience and War Stories
HfS Webinar Slides: Blockchain in BFS - Client Experience and War StoriesHfS Research
 

Was ist angesagt? (20)

HfS Webinar Slides: The Great Roboboss Debate
HfS Webinar Slides: The Great Roboboss DebateHfS Webinar Slides: The Great Roboboss Debate
HfS Webinar Slides: The Great Roboboss Debate
 
HfS Webinar Slides - Achieving Intelligent Automation in Business Operations
HfS Webinar Slides - Achieving Intelligent Automation in Business OperationsHfS Webinar Slides - Achieving Intelligent Automation in Business Operations
HfS Webinar Slides - Achieving Intelligent Automation in Business Operations
 
HfS Webinar Slides: Unveiling the Early Leaders Providing AI capabilities for...
HfS Webinar Slides: Unveiling the Early Leaders Providing AI capabilities for...HfS Webinar Slides: Unveiling the Early Leaders Providing AI capabilities for...
HfS Webinar Slides: Unveiling the Early Leaders Providing AI capabilities for...
 
HfS Webinar Slides: Are we ready for Digital HCM?
HfS Webinar Slides: Are we ready for Digital HCM?HfS Webinar Slides: Are we ready for Digital HCM?
HfS Webinar Slides: Are we ready for Digital HCM?
 
HfS Webinar Slides: IBM Watson Services
HfS Webinar Slides: IBM Watson ServicesHfS Webinar Slides: IBM Watson Services
HfS Webinar Slides: IBM Watson Services
 
The Advent of R-BPO: Is the Future of BPO Robotic?
The Advent of R-BPO: Is the Future of BPO Robotic?The Advent of R-BPO: Is the Future of BPO Robotic?
The Advent of R-BPO: Is the Future of BPO Robotic?
 
HfS Webinar Slides: The State of Outsourcing and Business Operations 2017
HfS Webinar Slides: The State of Outsourcing and Business Operations 2017HfS Webinar Slides: The State of Outsourcing and Business Operations 2017
HfS Webinar Slides: The State of Outsourcing and Business Operations 2017
 
HfS Webinar: What’s Real about Design Thinking in Business Operations and Out...
HfS Webinar: What’s Real about Design Thinking in Business Operations and Out...HfS Webinar: What’s Real about Design Thinking in Business Operations and Out...
HfS Webinar: What’s Real about Design Thinking in Business Operations and Out...
 
HfS Webinar Slides: How Cognitive Systems like ignio™ Simplify Batch Jobs Man...
HfS Webinar Slides: How Cognitive Systems like ignio™ Simplify Batch Jobs Man...HfS Webinar Slides: How Cognitive Systems like ignio™ Simplify Batch Jobs Man...
HfS Webinar Slides: How Cognitive Systems like ignio™ Simplify Batch Jobs Man...
 
HfS Webinar Slides: Standard Bank Case Discussion - Improving Customer Experi...
HfS Webinar Slides: Standard Bank Case Discussion - Improving Customer Experi...HfS Webinar Slides: Standard Bank Case Discussion - Improving Customer Experi...
HfS Webinar Slides: Standard Bank Case Discussion - Improving Customer Experi...
 
HfS Webinar Slides: 2017, the year of making it real
HfS Webinar Slides: 2017, the year of making it realHfS Webinar Slides: 2017, the year of making it real
HfS Webinar Slides: 2017, the year of making it real
 
HfS Webinar Slides: Tales from the Automation Trenches
HfS Webinar Slides: Tales from the Automation TrenchesHfS Webinar Slides: Tales from the Automation Trenches
HfS Webinar Slides: Tales from the Automation Trenches
 
HfS Webinar Slides: Beyond RPA
HfS Webinar Slides: Beyond RPAHfS Webinar Slides: Beyond RPA
HfS Webinar Slides: Beyond RPA
 
HfS Webinar Slides - A (much-needed) reality-check on Enterprise Artificial I...
HfS Webinar Slides - A (much-needed) reality-check on Enterprise Artificial I...HfS Webinar Slides - A (much-needed) reality-check on Enterprise Artificial I...
HfS Webinar Slides - A (much-needed) reality-check on Enterprise Artificial I...
 
Ilya Kazimirovskiy, Outsource People_2016_Minsk
Ilya Kazimirovskiy, Outsource People_2016_MinskIlya Kazimirovskiy, Outsource People_2016_Minsk
Ilya Kazimirovskiy, Outsource People_2016_Minsk
 
HfS Webinar - The 20 Most Promising Use-Cases of Enterprise Blockchain Adoption
HfS Webinar - The 20 Most Promising Use-Cases of Enterprise Blockchain AdoptionHfS Webinar - The 20 Most Promising Use-Cases of Enterprise Blockchain Adoption
HfS Webinar - The 20 Most Promising Use-Cases of Enterprise Blockchain Adoption
 
HfS Webinar - Digital Workforce for the Digital Enterprise
HfS Webinar - Digital Workforce for the Digital EnterpriseHfS Webinar - Digital Workforce for the Digital Enterprise
HfS Webinar - Digital Workforce for the Digital Enterprise
 
HfS Webinar Slides: State of Operations and Outsourcing 2018
HfS Webinar Slides: State of Operations and Outsourcing 2018HfS Webinar Slides: State of Operations and Outsourcing 2018
HfS Webinar Slides: State of Operations and Outsourcing 2018
 
HfS Webinar - Get smart about your Digital Underbelly or you'll Fail to Scale
HfS Webinar - Get smart about your Digital Underbelly or you'll Fail to ScaleHfS Webinar - Get smart about your Digital Underbelly or you'll Fail to Scale
HfS Webinar - Get smart about your Digital Underbelly or you'll Fail to Scale
 
HfS Webinar Slides: Blockchain in BFS - Client Experience and War Stories
HfS Webinar Slides: Blockchain in BFS - Client Experience and War StoriesHfS Webinar Slides: Blockchain in BFS - Client Experience and War Stories
HfS Webinar Slides: Blockchain in BFS - Client Experience and War Stories
 

Andere mochten auch

ISACA and RSA CSX Presentation from the RSA 2015 Conference
ISACA and RSA CSX Presentation from the RSA 2015 Conference ISACA and RSA CSX Presentation from the RSA 2015 Conference
ISACA and RSA CSX Presentation from the RSA 2015 Conference Robert Stroud
 
Foreword of Dean Willard B. Riano (Philippine Legal Lexicon)
Foreword of Dean Willard B. Riano (Philippine Legal Lexicon)Foreword of Dean Willard B. Riano (Philippine Legal Lexicon)
Foreword of Dean Willard B. Riano (Philippine Legal Lexicon)HUDCC
 
2012 IBM Tech Trends Report: Fast track to the future
2012 IBM Tech Trends Report: Fast track to the future2012 IBM Tech Trends Report: Fast track to the future
2012 IBM Tech Trends Report: Fast track to the futureSusanne Hupfer, Ph.D.
 
Ame 2280 mq for z os latest features
Ame 2280 mq for z os latest featuresAme 2280 mq for z os latest features
Ame 2280 mq for z os latest featuresPete Siddall
 
Impact of BIG Data on MDM
Impact of BIG Data on MDMImpact of BIG Data on MDM
Impact of BIG Data on MDMSubhendu Dey
 
WIFUTURE Conference - Artificial Intelligence and ChatBots - Milan
WIFUTURE Conference - Artificial Intelligence and ChatBots - MilanWIFUTURE Conference - Artificial Intelligence and ChatBots - Milan
WIFUTURE Conference - Artificial Intelligence and ChatBots - MilanPietro Leo
 
Growing up hybrid: Accelerating digital transformation
Growing up hybrid: Accelerating digital transformationGrowing up hybrid: Accelerating digital transformation
Growing up hybrid: Accelerating digital transformationSusanne Hupfer, Ph.D.
 
Social-Psycho Analyses
Social-Psycho AnalysesSocial-Psycho Analyses
Social-Psycho AnalysesJerry Smith
 
Big Data and the Future of Storage
Big Data and the Future of StorageBig Data and the Future of Storage
Big Data and the Future of StorageIBM Research
 
The cognitive advantage: Insights from early adopters on driving business value
The cognitive advantage: Insights from early adopters on driving business valueThe cognitive advantage: Insights from early adopters on driving business value
The cognitive advantage: Insights from early adopters on driving business valueSusanne Hupfer, Ph.D.
 
The Dilemmas of Innovation Management
The Dilemmas of Innovation ManagementThe Dilemmas of Innovation Management
The Dilemmas of Innovation ManagementIBM Research
 
The Intelligent Enterprise: How Companies are Using Cognitive Computing to Dr...
The Intelligent Enterprise: How Companies are Using Cognitive Computing to Dr...The Intelligent Enterprise: How Companies are Using Cognitive Computing to Dr...
The Intelligent Enterprise: How Companies are Using Cognitive Computing to Dr...Susanne Hupfer, Ph.D.
 
Cognitive Era and Introduction to IBM Watson
Cognitive Era and Introduction to IBM WatsonCognitive Era and Introduction to IBM Watson
Cognitive Era and Introduction to IBM WatsonSubhendu Dey
 
Yuri M. Brovman, Data Scientist, eBay
Yuri M. Brovman, Data Scientist, eBayYuri M. Brovman, Data Scientist, eBay
Yuri M. Brovman, Data Scientist, eBayMLconf
 
Introduction to Cognitive Computing the science behind and use of IBM Watson
Introduction to Cognitive Computing the science behind and use of IBM WatsonIntroduction to Cognitive Computing the science behind and use of IBM Watson
Introduction to Cognitive Computing the science behind and use of IBM WatsonSubhendu Dey
 
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017MLconf
 
Claudia Perlich, Chief Scientist, Dstillery
Claudia Perlich, Chief Scientist, Dstillery Claudia Perlich, Chief Scientist, Dstillery
Claudia Perlich, Chief Scientist, Dstillery MLconf
 
Byron Galbraith, Chief Data Scientist, Talla, at MLconf NYC 2017
Byron Galbraith, Chief Data Scientist, Talla, at MLconf NYC 2017 Byron Galbraith, Chief Data Scientist, Talla, at MLconf NYC 2017
Byron Galbraith, Chief Data Scientist, Talla, at MLconf NYC 2017 MLconf
 
Layla El Asri, Research Scientist, Maluuba
Layla El Asri, Research Scientist, Maluuba Layla El Asri, Research Scientist, Maluuba
Layla El Asri, Research Scientist, Maluuba MLconf
 

Andere mochten auch (20)

ISACA and RSA CSX Presentation from the RSA 2015 Conference
ISACA and RSA CSX Presentation from the RSA 2015 Conference ISACA and RSA CSX Presentation from the RSA 2015 Conference
ISACA and RSA CSX Presentation from the RSA 2015 Conference
 
Foreword of Dean Willard B. Riano (Philippine Legal Lexicon)
Foreword of Dean Willard B. Riano (Philippine Legal Lexicon)Foreword of Dean Willard B. Riano (Philippine Legal Lexicon)
Foreword of Dean Willard B. Riano (Philippine Legal Lexicon)
 
2012 IBM Tech Trends Report: Fast track to the future
2012 IBM Tech Trends Report: Fast track to the future2012 IBM Tech Trends Report: Fast track to the future
2012 IBM Tech Trends Report: Fast track to the future
 
Ame 2280 mq for z os latest features
Ame 2280 mq for z os latest featuresAme 2280 mq for z os latest features
Ame 2280 mq for z os latest features
 
Industrial Strategy 10 Pillars
Industrial Strategy 10 PillarsIndustrial Strategy 10 Pillars
Industrial Strategy 10 Pillars
 
Impact of BIG Data on MDM
Impact of BIG Data on MDMImpact of BIG Data on MDM
Impact of BIG Data on MDM
 
WIFUTURE Conference - Artificial Intelligence and ChatBots - Milan
WIFUTURE Conference - Artificial Intelligence and ChatBots - MilanWIFUTURE Conference - Artificial Intelligence and ChatBots - Milan
WIFUTURE Conference - Artificial Intelligence and ChatBots - Milan
 
Growing up hybrid: Accelerating digital transformation
Growing up hybrid: Accelerating digital transformationGrowing up hybrid: Accelerating digital transformation
Growing up hybrid: Accelerating digital transformation
 
Social-Psycho Analyses
Social-Psycho AnalysesSocial-Psycho Analyses
Social-Psycho Analyses
 
Big Data and the Future of Storage
Big Data and the Future of StorageBig Data and the Future of Storage
Big Data and the Future of Storage
 
The cognitive advantage: Insights from early adopters on driving business value
The cognitive advantage: Insights from early adopters on driving business valueThe cognitive advantage: Insights from early adopters on driving business value
The cognitive advantage: Insights from early adopters on driving business value
 
The Dilemmas of Innovation Management
The Dilemmas of Innovation ManagementThe Dilemmas of Innovation Management
The Dilemmas of Innovation Management
 
The Intelligent Enterprise: How Companies are Using Cognitive Computing to Dr...
The Intelligent Enterprise: How Companies are Using Cognitive Computing to Dr...The Intelligent Enterprise: How Companies are Using Cognitive Computing to Dr...
The Intelligent Enterprise: How Companies are Using Cognitive Computing to Dr...
 
Cognitive Era and Introduction to IBM Watson
Cognitive Era and Introduction to IBM WatsonCognitive Era and Introduction to IBM Watson
Cognitive Era and Introduction to IBM Watson
 
Yuri M. Brovman, Data Scientist, eBay
Yuri M. Brovman, Data Scientist, eBayYuri M. Brovman, Data Scientist, eBay
Yuri M. Brovman, Data Scientist, eBay
 
Introduction to Cognitive Computing the science behind and use of IBM Watson
Introduction to Cognitive Computing the science behind and use of IBM WatsonIntroduction to Cognitive Computing the science behind and use of IBM Watson
Introduction to Cognitive Computing the science behind and use of IBM Watson
 
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
Aaron Roth, Associate Professor, University of Pennsylvania, at MLconf NYC 2017
 
Claudia Perlich, Chief Scientist, Dstillery
Claudia Perlich, Chief Scientist, Dstillery Claudia Perlich, Chief Scientist, Dstillery
Claudia Perlich, Chief Scientist, Dstillery
 
Byron Galbraith, Chief Data Scientist, Talla, at MLconf NYC 2017
Byron Galbraith, Chief Data Scientist, Talla, at MLconf NYC 2017 Byron Galbraith, Chief Data Scientist, Talla, at MLconf NYC 2017
Byron Galbraith, Chief Data Scientist, Talla, at MLconf NYC 2017
 
Layla El Asri, Research Scientist, Maluuba
Layla El Asri, Research Scientist, Maluuba Layla El Asri, Research Scientist, Maluuba
Layla El Asri, Research Scientist, Maluuba
 

Ähnlich wie The State of Cybersecurity and Digital Trust 2016

Isbs Survey 2010 Technical Report
Isbs Survey 2010 Technical ReportIsbs Survey 2010 Technical Report
Isbs Survey 2010 Technical Reportlaurenfortune
 
Security of Things World 2016 - Post Event Report
Security of Things World 2016 - Post Event ReportSecurity of Things World 2016 - Post Event Report
Security of Things World 2016 - Post Event ReportRamona Kohrs
 
CyberSecurity Newsletter_FINAL
CyberSecurity Newsletter_FINALCyberSecurity Newsletter_FINAL
CyberSecurity Newsletter_FINALdjnonstp
 
FST_2017_MediaKit
FST_2017_MediaKitFST_2017_MediaKit
FST_2017_MediaKitMark Quinn
 
CI or FS Poly Cleared Job Fair Handbook | February 1
CI or FS Poly Cleared Job Fair Handbook | February 1CI or FS Poly Cleared Job Fair Handbook | February 1
CI or FS Poly Cleared Job Fair Handbook | February 1ClearedJobs.Net
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Rhys A. Mossom
 
Cyber Innovation Intelligence - Digital Space - Carlos Collazo
Cyber Innovation Intelligence - Digital Space - Carlos CollazoCyber Innovation Intelligence - Digital Space - Carlos Collazo
Cyber Innovation Intelligence - Digital Space - Carlos CollazoCarlos Collazo
 
Innovating at speed and scale with implicit security
Innovating at speed and scale with implicit securityInnovating at speed and scale with implicit security
Innovating at speed and scale with implicit securityElasticsearch
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Enterprise Management Associates
 
Cleared Job Fair Job Seeker Handbook Oct 6, 2016, Tysons Corner, Virginia
Cleared Job Fair Job Seeker Handbook Oct 6, 2016, Tysons Corner, VirginiaCleared Job Fair Job Seeker Handbook Oct 6, 2016, Tysons Corner, Virginia
Cleared Job Fair Job Seeker Handbook Oct 6, 2016, Tysons Corner, VirginiaClearedJobs.Net
 
InTTrust_intro_ai_2019
InTTrust_intro_ai_2019InTTrust_intro_ai_2019
InTTrust_intro_ai_2019InTTrust S.A.
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpointCourtney King
 
Cloud Computing Cynthia Carpio-beck's Work sample of product-service prese...
Cloud Computing   Cynthia Carpio-beck's  Work sample of product-service prese...Cloud Computing   Cynthia Carpio-beck's  Work sample of product-service prese...
Cloud Computing Cynthia Carpio-beck's Work sample of product-service prese...Cynthia Renée Beck, SCPM, MBA
 
Event report 2014 published
Event report 2014 publishedEvent report 2014 published
Event report 2014 publishedDSCI_Connect
 
Why Big Data is a Top Priority for Enterprises - Infographics by RapidValue
Why Big Data is a Top Priority for Enterprises - Infographics by RapidValueWhy Big Data is a Top Priority for Enterprises - Infographics by RapidValue
Why Big Data is a Top Priority for Enterprises - Infographics by RapidValueRapidValue
 
Critical Success Factors for IOT
Critical Success Factors for IOTCritical Success Factors for IOT
Critical Success Factors for IOTDr. Mazlan Abbas
 
Global Wi-SUN Technology Market size to reach USD 5,950.2 million by 2027 - k...
Global Wi-SUN Technology Market size to reach USD 5,950.2 million by 2027 - k...Global Wi-SUN Technology Market size to reach USD 5,950.2 million by 2027 - k...
Global Wi-SUN Technology Market size to reach USD 5,950.2 million by 2027 - k...KBV Research
 
Leading Hi-Tech Accessories Brand Set to Cash in on Demand Boom | ASTRUM HOLD...
Leading Hi-Tech Accessories Brand Set to Cash in on Demand Boom | ASTRUM HOLD...Leading Hi-Tech Accessories Brand Set to Cash in on Demand Boom | ASTRUM HOLD...
Leading Hi-Tech Accessories Brand Set to Cash in on Demand Boom | ASTRUM HOLD...MJDelaMasa
 

Ähnlich wie The State of Cybersecurity and Digital Trust 2016 (20)

Isbs Survey 2010 Technical Report
Isbs Survey 2010 Technical ReportIsbs Survey 2010 Technical Report
Isbs Survey 2010 Technical Report
 
Security of Things World 2016 - Post Event Report
Security of Things World 2016 - Post Event ReportSecurity of Things World 2016 - Post Event Report
Security of Things World 2016 - Post Event Report
 
CyberSecurity Newsletter_FINAL
CyberSecurity Newsletter_FINALCyberSecurity Newsletter_FINAL
CyberSecurity Newsletter_FINAL
 
FST_2017_MediaKit
FST_2017_MediaKitFST_2017_MediaKit
FST_2017_MediaKit
 
CI or FS Poly Cleared Job Fair Handbook | February 1
CI or FS Poly Cleared Job Fair Handbook | February 1CI or FS Poly Cleared Job Fair Handbook | February 1
CI or FS Poly Cleared Job Fair Handbook | February 1
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)
 
Cyber Innovation Intelligence - Digital Space - Carlos Collazo
Cyber Innovation Intelligence - Digital Space - Carlos CollazoCyber Innovation Intelligence - Digital Space - Carlos Collazo
Cyber Innovation Intelligence - Digital Space - Carlos Collazo
 
Innovating at speed and scale with implicit security
Innovating at speed and scale with implicit securityInnovating at speed and scale with implicit security
Innovating at speed and scale with implicit security
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
Cleared Job Fair Job Seeker Handbook Oct 6, 2016, Tysons Corner, Virginia
Cleared Job Fair Job Seeker Handbook Oct 6, 2016, Tysons Corner, VirginiaCleared Job Fair Job Seeker Handbook Oct 6, 2016, Tysons Corner, Virginia
Cleared Job Fair Job Seeker Handbook Oct 6, 2016, Tysons Corner, Virginia
 
InTTrust_intro_ai_2019
InTTrust_intro_ai_2019InTTrust_intro_ai_2019
InTTrust_intro_ai_2019
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpoint
 
Employment trends 2011 by zylog
Employment trends 2011 by zylogEmployment trends 2011 by zylog
Employment trends 2011 by zylog
 
Cloud Computing Cynthia Carpio-beck's Work sample of product-service prese...
Cloud Computing   Cynthia Carpio-beck's  Work sample of product-service prese...Cloud Computing   Cynthia Carpio-beck's  Work sample of product-service prese...
Cloud Computing Cynthia Carpio-beck's Work sample of product-service prese...
 
Paxus' Service brochure
Paxus' Service brochurePaxus' Service brochure
Paxus' Service brochure
 
Event report 2014 published
Event report 2014 publishedEvent report 2014 published
Event report 2014 published
 
Why Big Data is a Top Priority for Enterprises - Infographics by RapidValue
Why Big Data is a Top Priority for Enterprises - Infographics by RapidValueWhy Big Data is a Top Priority for Enterprises - Infographics by RapidValue
Why Big Data is a Top Priority for Enterprises - Infographics by RapidValue
 
Critical Success Factors for IOT
Critical Success Factors for IOTCritical Success Factors for IOT
Critical Success Factors for IOT
 
Global Wi-SUN Technology Market size to reach USD 5,950.2 million by 2027 - k...
Global Wi-SUN Technology Market size to reach USD 5,950.2 million by 2027 - k...Global Wi-SUN Technology Market size to reach USD 5,950.2 million by 2027 - k...
Global Wi-SUN Technology Market size to reach USD 5,950.2 million by 2027 - k...
 
Leading Hi-Tech Accessories Brand Set to Cash in on Demand Boom | ASTRUM HOLD...
Leading Hi-Tech Accessories Brand Set to Cash in on Demand Boom | ASTRUM HOLD...Leading Hi-Tech Accessories Brand Set to Cash in on Demand Boom | ASTRUM HOLD...
Leading Hi-Tech Accessories Brand Set to Cash in on Demand Boom | ASTRUM HOLD...
 

Kürzlich hochgeladen

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...lizamodels9
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...lizamodels9
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876dlhescort
 

Kürzlich hochgeladen (20)

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 

The State of Cybersecurity and Digital Trust 2016

  • 1. Architecting the As-a-Service Economy Delivering Cybersecurity & Digital Trust An HfS Webinar Production, 20 July 2016 FRED MCCLIMANS HfS Research CHRISTINE FERRUSI ROSS HfS Research STEVEN CURTIS Accenture RYAN LASALLE Accenture
  • 3. © 2016 HfS Research Ltd. Proprietary │Page 3 To better understand the State of Cybersecurity & Digital Trust HfS and Accenture spoke with 208 enterprise professionals, providing operational cybersecurity or security oversight, across multiple geographies and vertical industries. We learned a lot. Source: "State of Cyber Security 2016", HfS Research and Accenture Sample: Enterprise Security Professionals = 208 61 52 30 11 22 32 North America Europe Asia Pacific including Australia/NZ Middle East and Africa Latin America India # Respondents by Region 46 88 51 23 500 - 999 1,000 – 4,999 5,000 – 49,999 50,000+ # Respondents by Enterprise Size 31 33 30 20 25 36 33 Media & Technology (includes telecoms, software, … Banking & Financial Services (includes capital markets, … Resources (includes energy, utilities, transportation, etc.) Healthcare / Pharma Public Sector / Government / NGO Products (includes manufacturing, distribution, retail, … Other / Not listed # Respondents by Vertical Industry
  • 4. © 2016 HfS Research Ltd. Proprietary │Page 4 What are the “Very/Critically Important” Goals and Initiatives? Source: "State of Cyber Security 2016", HfS Research and Accenture Sample: Enterprise Security Professionals = 208 28% 27% 29% 37% 14% 16% 14% 13% 0% 20% 40% 60% Mobile Cloud Storage Culture of Cyber Security Awareness Cloud Computing How important are the following initiatives to your overall business? (Very or Critically Important responses only) VERY IMPORTANT CRITICALLY IMPORTANT 39% 47% 30% 39% 30% 26% 43% 37% 0% 20% 40% 60% 80% 100% Marketing Digital Transformation Agendas Brand Reputation Customer Support/Service How important to the following business goals is your ability to properly secure your data? (Very or Critically Important responses only) VERY IMPORTANT CRITICALLY IMPORTANT
  • 5. © 2016 HfS Research Ltd. Proprietary │Page 5 What are the initiatives that are placing the enterprise at risk? Source: "State of Cyber Security 2016", HfS Research and Accenture Sample: Enterprise Security Professionals = 208 Digital Identity Management and Mobile Payments are considered the top “risky activities” when it comes to securing data – these are the potential disruptors of Digital Trust! 35% 39% 39% 42% 41% 23% 23% 23% 23% 28% 0% 10% 20% 30% 40% 50% 60% 70% 80% Adoption of Mobile Apps Shift to the cloud Pervasive IoT Ecosystem Development Adoption of Mobile Payments Digital Identity Management What impact are the following trends and/or initiatives having on business resilience and your ability to properly secure your data? (Strong or Critical Impact responses only) STRONG IMPACT CRITICAL IMPACT
  • 6. © 2016 HfS Research Ltd. Proprietary │Page 6 Where are today’s threats coming from? Source: "State of Cyber Security 2016", HfS Research and Accenture Sample: Enterprise Security Professionals = 208 They come from both internal and external threat actors! 69% 57%55% 80% 0% 100% Internal External Have you experienced the theft or corruption of internal corporate or user/consumer information by Internal or External threat actors? Now Expect in the next 18 months 34% 37% 37% 40% 41% 39% 45% 41% 48% 48% 0% 20% 40% 60% Hacktivists with political agendas State-sponsored professionals targeting national infrastructure and promoting cyber-terrorism State-sponsored professionals targeting economic / IP theft (corporate espionage) Organized crime-sponsored professionals Well-organized teams of professionals working for themselves targeting personal / corporate information for resale What level of concern do you have for the following threat groups? (Strong & Critical Concern only) In 12-18 MONTHS Today
  • 7. © 2016 HfS Research Ltd. Proprietary │Page 7 Moving forward 12-18 months, the “Major/Critical” threats shift Source: "State of Cyber Security 2016", HfS Research and Accenture Sample: Enterprise Security Professionals = 208 19% 22% 24% 25% 28% 29% 29% 29% 31% 33% 34% 35% 35% 31% 35% 37% 34% 35% 33% 32% 32% 39% 41% 36% 39% 37% 0% 10% 20% 30% 40% 50% Denial of Services (DOS, DDOS) Data Theft Corporate Information by insiders Botnets / Zombies / Other Software Threats Ransom-ware (or similar at the corporate level) Phishing / Spear-Phishing Website Hacks (defacing public materials) Unauthorized physical access in office facilities Unauthorized physical access in data facilities Data Theft Personal Information by outsiders Data Loss / Destruction Software (Trojan, malware, virus, spyware, etc) Data Theft Personal Information by insiders Data Theft Corporate Information by outsiders How concerned were you during the prior 12 months of the following threats and how concerned are you moving into the coming 12 to 18 months? (responses citing Major or Critical Concern only) COMING 12 TO 18 MONTHS PRIOR 12 MONTHS
  • 8. © 2016 HfS Research Ltd. Proprietary │Page 8 Enterprise Digital Trust is Challenged by 5 Critical Gaps These gaps – between security requirements and operational reality – are disrupting the ability of cybersecurity professionals to secure the extended enterprise TALENT TECHNOLOGY MANAGEMENT BUDGET PARITY Five Gaps that are Inhibiting Digital Trust TALENT GAP: Between the technical and operational skill- set required and the pool of available talent – despite the increased value to be gained through automation. TECHNOLOGY GAP: Between the growth of cyber threats and the ability to quickly deploy and leverage new technologies in support of securing business initiatives. PARITY GAP: Between cyber preparedness (and threats) in different regions, across different verticals, and within the extended enterprise ecosystem – critical for multi-national organizations. BUDGET GAP: Partly fueled by financial realities and partly fueled by management focus, between the level of budget required and available funds on hand. MANAGEMENT GAP: The perception gap between executive management and security operations management – perhaps the one gap that, if addressed, can lead the way in closing the other gaps.
  • 9. © 2016 HfS Research Ltd. Proprietary │Page 9 TALENT: Cybersecurity needs improvement across the board 42% of respondents believe they need additional budget for hiring security talent and/or training, while 31% of respondents list either lack of training or staffing budget as their single biggest inhibitor to cybersecurity provision. 54% of respondents (70% within EMEA) indicate their employees are underprepared to prevent security breaches (Not Well Prepared, Somewhat Prepared, or merely Adequately Prepared). “Acquiring top talent is a start, but continually “upgrading” existing talent through rigorous training and testing programs is essential to cybersecurity in the 21st century” 77% 76% 77% 75% 75% 75% 73% 74% 72% 76% 72% 22% 22% 22% 22% 22% 25% 25% 26% 28% 24% 27% 0% 25% 50% 75% 100% Business [Unit] Alignment Platform/Performance (including COOP) Government Policies, such as GDPR or CISA Controls to restrict data by geographic region User Education and Awareness Application Security Governance/Compliance Device Security Data Integrity Threat and Vulnerability Assessments Identity/Privacy How prepared are you [your staff] to handle each of the following? (note: respondents had an "N/A" option not shown) NEED SOME LEVEL OF IMPROVEMENT WE'RE STATE-OF-THE-ART Source: "State of Cyber Security 2016", HfS Research and Accenture Sample: Enterprise Security Professionals = 208
  • 10. © 2016 HfS Research Ltd. Proprietary │Page 10 TECHNOLOGY: Technology is outpacing ability, but not the threat 55% - the number of cybersecurity professionals in the Healthcare/Pharma sector that believe Cognitive/AI will be either Very or Critically Important to their ability to become a secure, digital enterprise. “Rapid evolution of technology and parity between the enterprise and the threat actor has eliminated the concept of ‘technical’ state-of-the-art “ 3% 3% 6% 7% 8% 12% 14% 18% 20% 21% 25% 31% 33% 0% 20% 40% 60% 80% Encryption (network) Firewalls VPNs and Segmentation Virtual Desktops (VM) Physical / Digital Security Encryption (mobile, access control) Data Analytics Behavioral Tracking (employee / partner) Identity & Access Management Automation (inc Autonomics & RPA) Behavioral Tracking (consumer / client) Data Anonymization Cognitive Computing / AI Indicate how important you feel each of the following technologies are today and hot important they will be within 12 to 18 months? (Very or Critically Important responses only) TODAY IN 12 TO 18 MONTHS % INCREASE New Technology New Budget New Skills Commodity Technology Existing Budget Common Skills
  • 11. © 2016 HfS Research Ltd. Proprietary │Page 11 PARITY: Enterprises face inequalities in the cybersecurity realm Based on 1:1 interviews with enterprise cybersecurity and service provider professionals, there is reason to believe this number may be accurate but that the depth of vetting at this point may not be significant. “The enterprise is only as secure as its least secure partner, and differences between both internal and external stakeholders continue to put Digital Trust at risk“ 35% 45% 48% 50% 50% 51% 52% 52% 52% 57% 42% 51% 46% 45% 42% 44% 44% 47% 43% 41% 23% 4% 6% 5% 8% 5% 4% 1% 5% 2% 0% 20% 40% 60% 80% 100% 120% BPO Partners (F&A, HR, Procurement, etc.) Legal Partners Marketing Partners IP/Development Partners HR/Payroll/Training Partners Manufacturing/Distribution (Supply Chain) Partners R&D, Design, and Engineering Partners Financial/Banking/Credit Partners Insurance Partners Credit Partners Do you have a mechanism or set of policies (SOP) to vet ecosystem partners for their own cybersecurity integrity and preparedness, and where do you expect to invest over the coming 12 to 18 months? VETTING NOW INVESTMENT GAP (NO PLANS TO VET) Source: "State of Cyber Security 2016", HfS Research and Accenture Sample: Enterprise Security Professionals = 208
  • 12. © 2016 HfS Research Ltd. Proprietary │Page 12 PARITY: Enterprises face inequalities WITHIN the enterprise Sales and Call Center operations continue to drag down the cyber-preparedness within the enterprise, and call into question the ability to secure customer data that frequently spans multiple enterprise “silos”. “Differences between operational units within the enterprise – where data is often shared freely – continue to put Digital Trust at risk“ 67% 53% 47% 45% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% IT Support Operations Back Office and Operations Call Center Sales Force How cyber-secure is <the following> within your organization? (respondents indicating Well or Very Well Secured only) NORTH AMERICA EMEA AP (ex INDIA) INDIA LATIN AMERICA TOTAL Source: "State of Cyber Security 2016", HfS Research and Accenture Sample: Enterprise Security Professionals = 208
  • 13. © 2016 HfS Research Ltd. Proprietary │Page 13 BUDGETS: Enterprises face inequalities WITHIN the enterprise 62% of respondents indicate that the biggest inhibitor to their organization’s security provision is budget-related. Other inhibitors include: Legacy (Fixed) Security Services Contracts – 10%; Limited Awareness of Potential Risks and/or Emerging Threats – 11%; and Limited Support from Corporate/Executive Level – 16%. “Budgets are never truly unlimited, and while ‘how much is enough’ is debatable, cybersecurity professionals continue to deal with funding shortfalls that directly translate to less advanced technology and shortages of adequately trained staff” 42% 26% 16% 12% 4% 0% 10% 20% 30% 40% 50% We have enough budget for technology but need additional security talent and/or training We have enough budget for both technology and security talent We have a well-trained staff, but are lacking technology and/or services resources Inadequate to keep pace with the rising threats and/or we're being asked to cut back on overall expenses We seem to have an uncapped or unlimited budget in this area Which of the following most accurately describes your current funding/staffing levels for Cybersecurity? Budget- related, 62% Limited support from Corporate/Executiv e Level, 16% Limited Awareness of Potential Risks and/or Emerging Threats, 11% Legacy (Fixed) Security Service Contracts, 10% Other, 1% Which of the following are the (single) biggest inhibitors to your organization's security provision? “Budget-related” includes: • Lack of Security (technology/service s) Budget (18%) • Lack of Training Budget (17%) • Lack of Staffing Budget (14%) • Extended Budget Cycles (13%) Source: "State of Cyber Security 2016", HfS Research and Accenture Sample: Enterprise Security Professionals = 208
  • 14. © 2016 HfS Research Ltd. Proprietary │Page 14 BUDGETS: Vertical industry perspectives highlight budget risks “The extended ecosystem often spans multiple verticals, geographies, and businesses of different scale. Inequalities in cyber-preparedness between these entities is cause for concern” 14% 23% 18% 26% 24% 11% 13% 21% 20% 14% 11% 16% 20% 16% 14% 13% 14% 16% 16% 11% 16% 7% 7% 7% 16% 12% 20% 19% 0% 10% 20% 30% 40% 50% 60% 70% 80% Media & Technology Banking & Financial Services Resources Healthcare / Pharma Public Sector / Government / NGO Products Other Which of the following are the biggest inhibitors to your organization’s security provision? (single biggest budgetary inhibitor, by industry) Lack of Security (technology/services) Budget Lack of Training Budget Lack of Staffing Budget Extended Budget Cycles Legacy approaches to cybersecurity budgets – as a cost of securing data – no longer meet the current/emerging threat environment. Achieving a state-of-the-art cybersecurity mindset – and driving enterprise-wide Digital Trust – requires an approach that treats cybersecurity costs as enablers of data utilization Source: "State of Cyber Security 2016", HfS Research and Accenture Sample: Enterprise Security Professionals = 208
  • 15. © 2016 HfS Research Ltd. Proprietary │Page 15 MANAGEMENT: Highlighting the need for executive leadership 43% of respondents cite a Culture of Cybersecurity Awareness as Very or Critically Important to the overall business of the enterprise (#2 behind Cloud Computing). 36% of respondents believe management considers security an unnecessary cost. “Leadership will be critical in creating an enterprise mindset that is focused on both corporate and personal data responsibility and security – without leadership, digital trust for the enterprise brand cannot be achieved ” 36.0% 41.8% 9.6% 12.1% 0.5% 34.1% 34.1% 15.4% 15.4% 1.0% -1.9% -7.7% 5.8% 3.3% 0.5% -20.0% -10.0% 0.0% 10.0% 20.0% 30.0% 40.0% 50.0% CEO CIO COO CRO Other Which of the following best describes your Security Management Reporting Structure today, and how do you believe it should change within 12-18 months? (data shows % of reporting lines) TODAY NEXT 12-18 MONTHS Change
  • 16. © 2016 HfS Research Ltd. Proprietary │Page 16 MANAGEMENT: I can’t get no [reporting] satisfaction Over 90% of currently reporting to a Chief Risk Officer (CRO) are dissatisfied with the reporting structure. Dissatisfaction with reporting to the Chief Executive Officer (CEO) ranges from 32% to 61% depending on job title. “Communication and collaboration between operational security management and executive management is essential to both promoting a culture of cybersecurity awareness and executing on the enablers of Digital Trust” 32% 46% 50% 57% 61% 75% 89% 100% 0% 50% 100% Chief Information Security Officer (Reports to CEO) VP / Director of Security (reports to CIO) Chief Risk or Trust Officer (Reports to CEO/BoD) Chief Information Security Officer (reports to CIO) VP / Director of Security (reports to CEO) VP / Director of Security (reports to COO) VP / Director of Security (reports to CRO) Chief Information Security Officer (Reports to CRO) Which % respondents want to change reporting lines? (grouped by current reporting structure)
  • 17. © 2016 HfS Research Ltd. Proprietary │Page 17 Asking the right questions… “The near-term agenda must be on closing the cybersecurity gaps that exist today, with talent, technology, parity, budgets, and cybersecurity oversight and management” Are we properly allocating budgets and resources? Are we measuring the costs and results of cybersecurity correctly? Are we properly anticipating and leveraging new technologies and processes Are we ensuring parity of protection across the extended enterprise ecosystem? How can we best transform cybersecurity to achieve a holistic state-of-the-art approach to leveraging data assets? EXECUTIVE LEADERSHIP driving state-of-the-art Cybersecurity Processes and Digital Trust
  • 18. © 2016 HfS Research Ltd. Proprietary │Page 18 Taking the right steps… “The future of the digital enterprise relies upon the ability of cybersecurity professionals, working in tandem with business units, executives, partners, providers and end users to create an environment of digital trust where business can flourish.” Executive management must assume a visible, vocal, and engaged position on cybersecurity, driving a culture that fosters digital trust. Cybersecurity talent must be acquired, trained and developed, leveraging holistic security practices and emerging technologies to better address cyberattacks. Cybersecurity operations and executive management must collaborate to identify and close gaps between security requirements and execution ability. Enterprise cybersecurity teams must establish innovation and testing capabilities to rapidly and cost-efficiently identify, vet, and test new and emerging technologies to keep pace with the evolution of cyber threats. Shift how cybersecurity funding is viewed, moving away from treating costs as overhead to a holistic approach that includes the cost of securing data and allowing it to be used as part of overall business initiative financial requirements.
  • 21. © 2016 HfS Research Ltd. Proprietary │Page 21 Christine Ferrusi Ross Research Vice President, Strategy and Product Development, HfS Research – Boston, MA Overview § Christine Ferrusi Ross focuses on helping firms solve complex client problems by developing new service offerings and products to meet new market demands. At HfS she’s working with the team to grow the successful HfS Summits program with a global remit across IT and Business Process Services. Previous Experience § Christine is a veteran of the IT services industry and the analyst community. She pioneered some of the industry’s first research into vendor management and supplier risk, as well as building blockbuster sourcing conferences and peer communities. Christine has helped some of the largest companies in the world operationalize their sourcing strategies and supplier risk efforts. § From a domain perspective, Christine is passionate about supplier and supply chain risk, Internet of Things, democratizing big data and analytics, and—in large part thanks to her children— marketing best practices as exemplified by video game designers and Korean boy bands. § She’s been quoted in the Wall Street Journal, on CNBC, and other national media regarding IT services, vendor management, supplier risk, outsourcing, and globalization. Education § Christine holds a dual degree from Boston University: a BA in International Relations and a BS in Mass Communications. christine.ferrusi.ross@hfsresearch.com
  • 22. © 2016 HfS Research Ltd. Proprietary │Page 22 Fred McClimans Research Vice President, Digital Trust & Cybersecurity, HfS Research – Washington, DC Overview § As the lead analyst for our Digital Trust and Cybersecurity practice, Fred focuses on the enablers of Digital Trust, including Cybersecurity, Customer Experience, and emerging technologies, such as Blockchain, that offer both incremental technology and “trusted” process innovation. Previous Experience § Previously, Fred was the vision, and CEO, behind Current Analysis, a global market intelligence firm in the IT and services sectors (now part of PDM), and the co-founder of Decisys, an analyst advisory firm focused on vendor strategies and enterprise architectures (now part of Gartner). A former Gartner analyst, Fred also served as a Manager in the Technology Practice of Ernst & Young, the North American Business Unit Manger of the Advanced Technology Group of Newbridge Networks, and as the Chief Information Officer at DTECH LABS. § In addition to authoring a book on communications infrastructure (McGraw-Hill, 1991) and contributing to “Shift&Reset: Strategies for addressing serious issues in a connected society” (Wiley&Sons, 2011), his work on digital technology and trends has appeared in media outlets such as CNN, IDG, Social Media Today, Adotas, and CIO Magazine. § As a speaker he has chaired the Enterprise Mobility Conference in Washington, DC, led working sessions at the Intellifest/Rulesfest AI conference, spoken on Digital Trust at SXSW, and keynoted the LatAm ANDI Sourcing Summit in Cartagena, Colombia. Education § Syracuse University fred.mcclimans@hfsresearch.com @fredmcclimans
  • 23. © 2016 HfS Research Ltd. Proprietary │Page 23 Steven Curtis Managing Director, Accenture Security Overview § Steven Curtis has over seventeen years’ experience delivering complex security projects and building strategic technology programs for Fortune 1000 firms. He has consulted to 20 of the Fortune 100, and managed strategic engagements throughout the project lifecycle for over 100 companies. Steve co-leads Accenture’s security team focused on clients in the CMT industry, and works with major software, telecom, and aerospace clients. § Prior to working with Accenture, Steve led the services division of Identropy, an identity management focused service provider, and was a security practice Director for PricewaterhouseCoopers. He was responsible for developing and executing PwC’s information security assessment and planning framework, managing sales and alliances, and delivering consulting operations for more than 50 Fortune 1000 clients. § Steve has a BBA from the University of Wisconsin –Madison, specializing in Information Systems and an MBA from the UCLA Anderson School of Management. Steve is also a PMP®. steven.curtis@accenture.com
  • 24. © 2016 HfS Research Ltd. Proprietary │Page 24 Ryan LaSalle Managing Director, Global Growth and Strategy, Accenture Security Overview § Ryan LaSalle is Managing Director, Global Growth and Strategy, Accenture Security. Ryan oversees Accenture’s strategic roadmap for the security practice—including offering development, industrialization, strategic alliances, innovation and Cyber Labs—helping clients dramatically improve their ability to adapt and thrive in an evolving threat landscape. § As a senior member of the global security leadership team, Ryan directs the go-to-market plans for enabling client value with responsibilities for embedding next generation innovation into Accenture's suite of security offerings. These differentiated offerings drive transformational value and productivity for clients across strategic industry groups—and are delivered through Accenture’s Global Delivery Network, which consists of more than 50 delivery centers across five continents. Prior to assuming his current role, he was managing director of Cyber Labs—part of Accenture’s cross-industry research and development Technology Labs—where he lead the incubation and launch of mission-focused and active defense strategies. § During his 17 years with Accenture, Ryan has led client engagements across commercial, non- profit and the public sector by integrating emerging technologies into advanced solutions to drive agility and meet business needs. He consults with customers on focused solutions that bring together analytics, knowledge discovery, and cyber-security to improve threat assessment and response methodologies. § A widely recognized thought leader, Ryan is a Ponemon Institute Fellow, active with the Greater Washington Board of Trade and sits on security innovation advisory councils for clients across multiple industries. He holds patents in human resource management, knowledge discovery and establishing trust between entities online. Ryan is a frequent speaker at international security conferences and has authored numerous articles on cybersecurity. Ryan holds a bachelor of science degree in electrical engineering from Princeton University and resides in Alexandria, Virginia with his wife Melissa and two children. ryan.m.lasalle@accenture.com
  • 25. © 2016 HfS Research Ltd. The HfS Service Buyer Summits… www.hfsevents.com/new-york-2016