SlideShare ist ein Scribd-Unternehmen logo
1 von 10
New models for IT Security:
how Innovation Accelerators
are changing the game
IDC Tech Vision in a changing world
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 2
About 26% already moving at least on one
About 67% evaluating/ considering/ planning
About 7% no interest/ plan at all
Source: IDC 2015 Western European Software
Survey (n=223, different within groups/ items,
employees > 50, weighted extrapolation)
Source: InformationWeek, Digital
innovators 2015 Top100, IDC
eleboration
Digital Transformation is affecting IT
Security
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 3
Source: IDC, 2015 (n=223, companies with more than 50 employees; weighted extrapolation)
The weakest point in the chain 

Top 7 Human Risks
1. Phishability
2. Not Patching or Using Outdated
Systems
3. Posting too much information about self
or work
4. Reusing passwords across sites
5. Indiscriminate user of mobile media
6. Lack of situational awareness
(believing they are not a target)
7. Accidental loss or disclosure of
sensitive information
Council for Cybersecurity
5
Accept that breaches are inevitable
Fake Fears vs. True Fears
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 5
Source: IDC Italy, September 2015 (n=100; employees > 100;
different within groups/ items; weighted extrapolation)
What do you really REALLY fear?
1. Biometric Authentication
2. Supply Chain Risks
3. Self-Defending Applications
4. Data Breach Impact
5. Insuring Against Risk
6. Security Analytics Services
7. Data Protection Regulations
8. Modern Security Architecture
9. SaaS Security Services
10. Accountability Practices
Source: IDC FutureScape:
Worldwide IT Security
Products and Security
Services 2015
Predictions — Moving Toward
Security Integration,
#253026 Note: The size of the bubble
indicates complexity/cost to
address. Source: IDC, 2016
TIME (MONTHS) TO MAINSTREAM
ORGANIZATIONALIMPACT
Asingledepartment
orabusinessunit
Multipledepartments
orbusinessunits
Companywide
0-12 12-24 24+
EU Data
Protection
Regulations
Biometric
Authenticated
Transactions
Corporate
Responsibility
Security Analytics
as a Service
Supply Chain
Risks
SaaS Security
Adoption
Self-defending
Applications
Tracers & Tethers
Data Breach
Impact
10
4
3
8
1
97
2
6
Cyber Insurance
Maturity
5
The future of Security Spending
From Cloud to Intelligence to Cognitive
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 7
Source: IDC Software Survey 2015 (Italian sample n=223; employees > 50;
weighted extrapolation) and IDC Italy Predictive Security Conference (n=85;
weighted extrapolation)
CSOs need tools to reduce complexities
Main challenges for the introduction of
new Security technologies
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 8
IDC Italy Predictive Security Conference
(n=85; weighted extrapolation)
Security challenges are significant
within the Public Sectors
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 9
Source: IDC Italy, September 2015 (n=100; employees > 100; different within
groups/ items; weighted extrapolation)
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 10
IDC Italia
Viale Monza 14
20127 Milano
Tel: +39 02 28457339
gvercellino@idc.com
Giancarlo Vercellino
Research & Consulting
Manager
IDC Italy
www.idc.com

Weitere Àhnliche Inhalte

Was ist angesagt?

Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDC
Harry Gunns
 

Was ist angesagt? (20)

Cognitive/AI: views, perspectives & directions
Cognitive/AI: views, perspectives & directionsCognitive/AI: views, perspectives & directions
Cognitive/AI: views, perspectives & directions
 
Future of Work: dal Cosa al Come
Future of Work: dal Cosa al ComeFuture of Work: dal Cosa al Come
Future of Work: dal Cosa al Come
 
L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...
L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...
L'IT che vedevamo, l'IT che vedremo: i servizi data center nell'era delle riv...
 
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
Il futuro della customer experience e la regola delle 3C: consenso, conversaz...
 
Navigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDCNavigating the IT landscape - Thomas Meyer - IDC
Navigating the IT landscape - Thomas Meyer - IDC
 
Next Generation Field Service Management
Next Generation Field Service ManagementNext Generation Field Service Management
Next Generation Field Service Management
 
IoT And Its Manifold Business Benefits - Flexsin Inc
IoT And Its Manifold Business Benefits - Flexsin IncIoT And Its Manifold Business Benefits - Flexsin Inc
IoT And Its Manifold Business Benefits - Flexsin Inc
 
Delivering Innovation and Digital Transformation with IoT by V R Vijay Anand,...
Delivering Innovation and Digital Transformation with IoT by V R Vijay Anand,...Delivering Innovation and Digital Transformation with IoT by V R Vijay Anand,...
Delivering Innovation and Digital Transformation with IoT by V R Vijay Anand,...
 
IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014
 
Go+ product
Go+ productGo+ product
Go+ product
 
5 Factors in Modern Data Design
5 Factors in Modern Data Design5 Factors in Modern Data Design
5 Factors in Modern Data Design
 
5 IoT challenges to be faced in 2018- Infographic
5 IoT challenges to be faced in 2018- Infographic5 IoT challenges to be faced in 2018- Infographic
5 IoT challenges to be faced in 2018- Infographic
 
Fujitsu World Tour India 2017-Digital Co-Creation with Fujitsu
Fujitsu World Tour India 2017-Digital Co-Creation with FujitsuFujitsu World Tour India 2017-Digital Co-Creation with Fujitsu
Fujitsu World Tour India 2017-Digital Co-Creation with Fujitsu
 
The Cognitive Edge: A New Competitive Advantage
The Cognitive Edge: A New Competitive AdvantageThe Cognitive Edge: A New Competitive Advantage
The Cognitive Edge: A New Competitive Advantage
 
Gartner Symposium 2016 Roundup: Key Trends for Small Businesses
Gartner Symposium 2016 Roundup: Key Trends for Small BusinessesGartner Symposium 2016 Roundup: Key Trends for Small Businesses
Gartner Symposium 2016 Roundup: Key Trends for Small Businesses
 
Predictions idc2013
Predictions idc2013Predictions idc2013
Predictions idc2013
 
Human Centric Innovation - Driving Digital Transformation - Co-creation
Human Centric Innovation - Driving Digital Transformation - Co-creationHuman Centric Innovation - Driving Digital Transformation - Co-creation
Human Centric Innovation - Driving Digital Transformation - Co-creation
 
Black Gold's Silver Lining
Black Gold's Silver LiningBlack Gold's Silver Lining
Black Gold's Silver Lining
 
Fujitsu World Tour 2017 - Powering Digital Transformation with Intel
Fujitsu World Tour 2017 - Powering Digital Transformation with IntelFujitsu World Tour 2017 - Powering Digital Transformation with Intel
Fujitsu World Tour 2017 - Powering Digital Transformation with Intel
 
The Internet-of-Things: Is 2015 the year of IoT
The Internet-of-Things: Is 2015 the year of IoTThe Internet-of-Things: Is 2015 the year of IoT
The Internet-of-Things: Is 2015 the year of IoT
 

Andere mochten auch

KELLEY MILLER Resume
KELLEY MILLER Resume KELLEY MILLER Resume
KELLEY MILLER Resume
Kelley Miller
 
Mobile Audio Synthesiser - Final Year Thesis
Mobile Audio Synthesiser - Final Year ThesisMobile Audio Synthesiser - Final Year Thesis
Mobile Audio Synthesiser - Final Year Thesis
Sean Rooney
 
Heart Failure - Prevention through Prediction
Heart Failure - Prevention through PredictionHeart Failure - Prevention through Prediction
Heart Failure - Prevention through Prediction
Benjamin Ashkar
 
Gcse computing vs ict (creative i media)
Gcse computing vs ict (creative i media)Gcse computing vs ict (creative i media)
Gcse computing vs ict (creative i media)
chewict
 
ĐœĐ°ŃƒĐșĐŸĐČĐ” Ń‚ĐŸĐČаростĐČĐŸŃ‚ 2015 ... р.
ĐœĐ°ŃƒĐșĐŸĐČĐ” Ń‚ĐŸĐČаростĐČĐŸŃ‚ 2015 ... р.ĐœĐ°ŃƒĐșĐŸĐČĐ” Ń‚ĐŸĐČаростĐČĐŸŃ‚ 2015 ... р.
ĐœĐ°ŃƒĐșĐŸĐČĐ” Ń‚ĐŸĐČаростĐČĐŸŃ‚ 2015 ... р.
Helen Pisna
 
Sergi alls
Sergi allsSergi alls
Sergi alls
ogusee
 

Andere mochten auch (17)

Krishaunia resume 2016
Krishaunia resume 2016Krishaunia resume 2016
Krishaunia resume 2016
 
Passare dal prospect al cliente fedele
Passare dal prospect al cliente fedelePassare dal prospect al cliente fedele
Passare dal prospect al cliente fedele
 
playence: Media Annotation and Search
playence: Media Annotation and Searchplayence: Media Annotation and Search
playence: Media Annotation and Search
 
KELLEY MILLER Resume
KELLEY MILLER Resume KELLEY MILLER Resume
KELLEY MILLER Resume
 
Why Residential Solar is Having a Powerful Impact
Why Residential Solar is Having a Powerful ImpactWhy Residential Solar is Having a Powerful Impact
Why Residential Solar is Having a Powerful Impact
 
Mobile Audio Synthesiser - Final Year Thesis
Mobile Audio Synthesiser - Final Year ThesisMobile Audio Synthesiser - Final Year Thesis
Mobile Audio Synthesiser - Final Year Thesis
 
Question 6
Question 6Question 6
Question 6
 
Thriller openings ideas pitch (group)
Thriller openings ideas pitch (group) Thriller openings ideas pitch (group)
Thriller openings ideas pitch (group)
 
Heart Failure - Prevention through Prediction
Heart Failure - Prevention through PredictionHeart Failure - Prevention through Prediction
Heart Failure - Prevention through Prediction
 
My m.sc seminar presentation
My m.sc seminar presentationMy m.sc seminar presentation
My m.sc seminar presentation
 
[#openIQUII - Workshop] Innovation Thinking
[#openIQUII - Workshop] Innovation Thinking[#openIQUII - Workshop] Innovation Thinking
[#openIQUII - Workshop] Innovation Thinking
 
Some Notes On "Inclusion" - Pat Kane for Creative Scotland
Some Notes On "Inclusion" - Pat Kane for Creative ScotlandSome Notes On "Inclusion" - Pat Kane for Creative Scotland
Some Notes On "Inclusion" - Pat Kane for Creative Scotland
 
347471_zaverecny_ukol
347471_zaverecny_ukol347471_zaverecny_ukol
347471_zaverecny_ukol
 
How To Leverage Employee Generated Content to Support Your Recruiting Efforts
How To Leverage Employee Generated Content to Support Your Recruiting Efforts How To Leverage Employee Generated Content to Support Your Recruiting Efforts
How To Leverage Employee Generated Content to Support Your Recruiting Efforts
 
Gcse computing vs ict (creative i media)
Gcse computing vs ict (creative i media)Gcse computing vs ict (creative i media)
Gcse computing vs ict (creative i media)
 
ĐœĐ°ŃƒĐșĐŸĐČĐ” Ń‚ĐŸĐČаростĐČĐŸŃ‚ 2015 ... р.
ĐœĐ°ŃƒĐșĐŸĐČĐ” Ń‚ĐŸĐČаростĐČĐŸŃ‚ 2015 ... р.ĐœĐ°ŃƒĐșĐŸĐČĐ” Ń‚ĐŸĐČаростĐČĐŸŃ‚ 2015 ... р.
ĐœĐ°ŃƒĐșĐŸĐČĐ” Ń‚ĐŸĐČаростĐČĐŸŃ‚ 2015 ... р.
 
Sergi alls
Sergi allsSergi alls
Sergi alls
 

Ähnlich wie Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators

kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
Onwubiko Emmanuel
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 

Ähnlich wie Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators (20)

4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital Economy
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
F_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdfF_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdf
 
Security Everywhere in the Digital Economy
Security Everywhere in the Digital EconomySecurity Everywhere in the Digital Economy
Security Everywhere in the Digital Economy
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
IDG 2020 Security Priorities Research
IDG 2020 Security Priorities ResearchIDG 2020 Security Priorities Research
IDG 2020 Security Priorities Research
 
Bt idc event cloud adoption in ireland
Bt  idc event cloud adoption in irelandBt  idc event cloud adoption in ireland
Bt idc event cloud adoption in ireland
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
Business with Cloud Computing
Business with  Cloud ComputingBusiness with  Cloud Computing
Business with Cloud Computing
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
India's Leading Cyber Security Companies to Watch.pdf
India's Leading Cyber Security Companies to Watch.pdfIndia's Leading Cyber Security Companies to Watch.pdf
India's Leading Cyber Security Companies to Watch.pdf
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government InsightsVirtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
Virtual Gov Day - Introduction & Keynote - Alan Webber, IDC Government Insights
 
Vulnerability Voodoo and the Convergence of Foundational Security Controls
Vulnerability Voodoo and the Convergence of Foundational Security ControlsVulnerability Voodoo and the Convergence of Foundational Security Controls
Vulnerability Voodoo and the Convergence of Foundational Security Controls
 

Mehr von IDC Italy

Mehr von IDC Italy (17)

Innovare alla velocitĂ  del cloud: la rivoluzione multicloud
Innovare alla velocitĂ  del cloud: la rivoluzione multicloudInnovare alla velocitĂ  del cloud: la rivoluzione multicloud
Innovare alla velocitĂ  del cloud: la rivoluzione multicloud
 
Sogno di una fabbrica digitale
Sogno di una fabbrica digitaleSogno di una fabbrica digitale
Sogno di una fabbrica digitale
 
Il nuovo data center, un’infrastruttura digitale agile e distribuita
Il nuovo data center, un’infrastruttura digitale agile e distribuitaIl nuovo data center, un’infrastruttura digitale agile e distribuita
Il nuovo data center, un’infrastruttura digitale agile e distribuita
 
Enterprise Mobility Blends Next-Gen Technologies
Enterprise Mobility Blends Next-Gen TechnologiesEnterprise Mobility Blends Next-Gen Technologies
Enterprise Mobility Blends Next-Gen Technologies
 
Digital Native Enterprise: Disrupt to Transform, Transform to Succeed
Digital Native Enterprise: Disrupt to Transform, Transform to SucceedDigital Native Enterprise: Disrupt to Transform, Transform to Succeed
Digital Native Enterprise: Disrupt to Transform, Transform to Succeed
 
Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...
Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...
Il mercato ICT e l’evoluzione digitale in Italia. I risultati della ricerca I...
 
Adattare l'organizzazione IT alla trasformazione digitale
Adattare l'organizzazione IT alla trasformazione digitaleAdattare l'organizzazione IT alla trasformazione digitale
Adattare l'organizzazione IT alla trasformazione digitale
 
Rinnovare il Retail: Piattaforma, Esperienza e Innovazione
Rinnovare il Retail: Piattaforma, Esperienza e InnovazioneRinnovare il Retail: Piattaforma, Esperienza e Innovazione
Rinnovare il Retail: Piattaforma, Esperienza e Innovazione
 
Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...
Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...
Nuovi paradigmi e leve competitive: la roadmap innovativa della Insurance Ind...
 
Open your Transformation, Define your Evolution
Open your Transformation, Define your EvolutionOpen your Transformation, Define your Evolution
Open your Transformation, Define your Evolution
 
Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...
Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...
Data driven economy: l’impatto sulle infrastrutture IT e la data governance a...
 
Superare gli ostacoli al cambiamento nel percorso di trasformazione digitale
Superare gli ostacoli al cambiamento nel percorso di trasformazione digitaleSuperare gli ostacoli al cambiamento nel percorso di trasformazione digitale
Superare gli ostacoli al cambiamento nel percorso di trasformazione digitale
 
Mobile Strategy in Digital Environment: the Mindset Shift
Mobile Strategy in Digital Environment: the Mindset ShiftMobile Strategy in Digital Environment: the Mindset Shift
Mobile Strategy in Digital Environment: the Mindset Shift
 
IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...
IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...
IDC Mobiz Mobility Forum 2016 - "Enterprise of Everything: individui iperconn...
 
Digital Analytics
Digital AnalyticsDigital Analytics
Digital Analytics
 
Manage the IT risk in the era of Industrial Internet
Manage the IT risk in the era of Industrial InternetManage the IT risk in the era of Industrial Internet
Manage the IT risk in the era of Industrial Internet
 
Digitalisation Now
Digitalisation NowDigitalisation Now
Digitalisation Now
 

KĂŒrzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

KĂŒrzlich hochgeladen (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
 

Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation Accelerators

  • 1. New models for IT Security: how Innovation Accelerators are changing the game
  • 2. IDC Tech Vision in a changing world © IDC Visit us at IDC.com and follow us on Twitter: @IDC 2 About 26% already moving at least on one About 67% evaluating/ considering/ planning About 7% no interest/ plan at all Source: IDC 2015 Western European Software Survey (n=223, different within groups/ items, employees > 50, weighted extrapolation) Source: InformationWeek, Digital innovators 2015 Top100, IDC eleboration
  • 3. Digital Transformation is affecting IT Security © IDC Visit us at IDC.com and follow us on Twitter: @IDC 3 Source: IDC, 2015 (n=223, companies with more than 50 employees; weighted extrapolation)
  • 4. The weakest point in the chain 
 Top 7 Human Risks 1. Phishability 2. Not Patching or Using Outdated Systems 3. Posting too much information about self or work 4. Reusing passwords across sites 5. Indiscriminate user of mobile media 6. Lack of situational awareness (believing they are not a target) 7. Accidental loss or disclosure of sensitive information Council for Cybersecurity 5 Accept that breaches are inevitable
  • 5. Fake Fears vs. True Fears © IDC Visit us at IDC.com and follow us on Twitter: @IDC 5 Source: IDC Italy, September 2015 (n=100; employees > 100; different within groups/ items; weighted extrapolation) What do you really REALLY fear?
  • 6. 1. Biometric Authentication 2. Supply Chain Risks 3. Self-Defending Applications 4. Data Breach Impact 5. Insuring Against Risk 6. Security Analytics Services 7. Data Protection Regulations 8. Modern Security Architecture 9. SaaS Security Services 10. Accountability Practices Source: IDC FutureScape: Worldwide IT Security Products and Security Services 2015 Predictions — Moving Toward Security Integration, #253026 Note: The size of the bubble indicates complexity/cost to address. Source: IDC, 2016 TIME (MONTHS) TO MAINSTREAM ORGANIZATIONALIMPACT Asingledepartment orabusinessunit Multipledepartments orbusinessunits Companywide 0-12 12-24 24+ EU Data Protection Regulations Biometric Authenticated Transactions Corporate Responsibility Security Analytics as a Service Supply Chain Risks SaaS Security Adoption Self-defending Applications Tracers & Tethers Data Breach Impact 10 4 3 8 1 97 2 6 Cyber Insurance Maturity 5 The future of Security Spending
  • 7. From Cloud to Intelligence to Cognitive © IDC Visit us at IDC.com and follow us on Twitter: @IDC 7 Source: IDC Software Survey 2015 (Italian sample n=223; employees > 50; weighted extrapolation) and IDC Italy Predictive Security Conference (n=85; weighted extrapolation) CSOs need tools to reduce complexities
  • 8. Main challenges for the introduction of new Security technologies © IDC Visit us at IDC.com and follow us on Twitter: @IDC 8 IDC Italy Predictive Security Conference (n=85; weighted extrapolation)
  • 9. Security challenges are significant within the Public Sectors © IDC Visit us at IDC.com and follow us on Twitter: @IDC 9 Source: IDC Italy, September 2015 (n=100; employees > 100; different within groups/ items; weighted extrapolation)
  • 10. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 10 IDC Italia Viale Monza 14 20127 Milano Tel: +39 02 28457339 gvercellino@idc.com Giancarlo Vercellino Research & Consulting Manager IDC Italy www.idc.com

Hinweis der Redaktion

  1. Focus on authentication and authrorization relative to Phishability that is related to posting too much info on social networks, reusing passwords, lack of situational awareness (entering passwords while connected to public WiFi hotspots), etc. Critical Security Controls (CSC) 2FA Password complexity Patching Mail Attachment Filtering Web Security Accept that breaches are inevitable Plan, prepare & test Migrate budget from Prevent & Protect to Detect & Respond Regard data as the new perimeter Identify, classify & appropriately secure data assets Adopt a risk-based security management approach Communicate risk to the board, and prepare to defend mitigation strategies in public
  2. Alcuni neutrali rispetto alle dimensioni aziendali
  3. Emphasize Authenticaiton and Authorization relative to: 1) Biometrics, 2) Supply Chain (want to be able to accurately audit who touched the products and service in case problems), 9) SaaS (talk about Pete’s Cloud Security Gateway report and the need to help people manage their IT certified and Shadow IT SaaS applications while providing the convenience of SSO across all their users, devices, and apps.
  4. Conoscere le statistiche normali della propria rete Ragionare sempre per scenari di rischio, moltiplicare i contingency plan Per i rischi normali allocare il budget rispetto a una stima del valore medio del rischio, per i rischi eccezionali investire quanto necessario per preservare sopravvivenza dell’operativitĂ