Are European companies equipped to fight off cyber security attacks?

Size: px
Start display at page:

Download "Are European companies equipped to fight off cyber security attacks?"

Transcription

1 A Steria Report Are European companies equipped to fight off cyber security attacks? Executive summary In collaboration with PAC è

2 è Are European companies equipped to fight off cyber security attacks? 3 FOREWORD Digital has opened up new ways of working and interacting socially. It has created open, collaborative and connected virtual environments on top of our physical environments. It has enabled electronic document exchange, mobility, cloud computing and social networks. But at the same time, it has opened up new prospects for malevolent acts. Even if complete protection is not possible, have they put in place the resources, solutions and governance needed to provide the best possible prevention, detection and protection? Do they have access to appropriate resources and offerings from security experts? Steria has surveyed 270 public and private sector organisations across Europe, lifting the veil on how Europe s firms are positioned today in terms of cyber security. We have also assessed what short- and mediumterm trends these organisations foresee. Cyber-related risks are greater than ever. It has been estimated that in 2012 the world saw a staggering 42% increase in targeted attacks compared to 2011, $110 billion worth of financial losses due to cyber attacks and more than $200 billion lost due to online fraud. Attacks are becoming more diverse, complex and professional on a daily basis, with increasingly serious effects on business and finance, as well as on firms competitiveness and reputations. To be able to make the most of all the business opportunities in our multi-faceted digital world, the key is to be properly armed for cyberwarfare, without making things too complex or cumbersome. Given this alarming state of affairs, we must ask whether companies have fully grasped the scope of the attacks with which they are increasingly being faced. Are they properly equipped to deal with major crises? Patricia Langrand Executive Vice President Group Business Development & Marketing, Steria Florent Skrabacz Head of Security Business, Steria

3 4 Are European companies equipped to fight off cyber security attacks? è OBJECTIVES AND METHODOLOGY Steria, a European leader in IT and business services, has worked with Pierre Audoin Consultants (PAC) to publish this independent report on cyber security. The report is based on a survey of 270 security decisionmakers in France, the United Kingdom, Germany and Norway. They represent small and medium companies, as well as large organisations working in all areas of activity. In this context, companies refers to both private and public-sector organisations. Large companies are defined as those with more than 5000 employees. Except where otherwise stated, all figures used in this report have been taken from this survey. The survey comprises a quantitative phase and a qualitative phase. The quantitative phase draws on 250 telephone interviews conducted as follows: 70 interviews in France, 70 in the UK, 17 in Germany and 40 in Norway. PAC also conducted 20 in-depth face-to-face interviews. Based on the same questionnaire as the quantitative interviews, these were an opportunity for security decision-makers from large companies and specialised government bodies to discuss their cyber security strategy and how it is implemented. This report provides an outlook on cyber security strategies and models for the next three years. Its purpose is to reveal how current and future threats are actually perceived by companies in Europe and the appropriateness or otherwise of the resources brought to bear. Are European companies equipped to fight off cyber security attacks? Between 500 and 1,000 employees Between 1,000 and 5,000 employees More than 5,000 employees 27% 63% 10% Figure 1 : Size of organisations surveyed (n = 270)

4 è Are European companies equipped to fight off cyber security attacks? 5 2% 36% 33% 22% 40% Between 500 and 1,000 employees Between 1,000 and 5,000 employees More than 5,000 employees 62% 67% 78% 60% Norway France UK Germany Figure 2 : Distribution by size and country (n = 270) 6% 6% 11% 6% 6% 12% 21% 12% 20% Banking Insurance Manufacturing Public sector Retail Services Telecom Transport Utilities Figure 3 : Distribution by business sector (n = 270)

5 6 Are European companies equipped to fight off cyber security attacks? è EXECUTIVE SUMMARY As concerns about the impact of cyber security rise in tandem with the uptake of digital technologies, this report sets out to examine where European companies currently stand in their defence of corporate assets and reputations. What measures do they have in place and how great an understanding is there of the scope and scale of cyber-related risks? The 270 security decision makers who took part in our survey across both public and private sector organisations revealed a number of challenges and opportunities in the corporate fight against cyber crime. 1.European companies have not yet fully grasped the scope of the attacks to which they will be increasingly exposed Despite the growing number of external attacks, European companies are still more concerned about internal attacks. More than 50% of companies still see external attacks as accounting for less than 20% of the threat. Despite the fact that organised crime and state-sponsored attacks are becoming an increasing and genuine threat, these types of attack are still of relatively little concern to European companies in the short and medium term. Overall, less than 15% of companies believe that, either currently or in the next three years, they will have to deal with organised crime; less than 6% believe they will have to deal with state-sponsored attacks. Only the largest organisations are starting to become concerned about this type of attack: 19% of them believe they will be faced with attacks from organised crime within the next three years, and 18% believe they will be faced with state-sponsored attacks. Data theft is a major concern and is likely to remain so. 60% of the companies surveyed say that data theft is one of the three most significant risks keeping them awake at night, and is set to remain so over the next three years. The impact of Prism, Bullrun, and Mandiant is clearly evident. Advanced Persistent Threats (APTs), a three-letter threat that should have heads of security quaking in their boots, has not yet been identified as one of the major risks. Only 12% of the companies identified APTs as one of the three chief threats. However, 35% of the largest companies are concerned about APTs.

6 è Are European companies equipped to fight off cyber security attacks? 7 European companies are confident about their future security in terms of available resources, funding, and their ability to withstand major risks 2.European companies appear extremely unruffled about the prospect of a major security crisis; 90% of them believe they are capable of dealing with one. One in five of the larger companies identifies a lack of experienced security resources as one of their main risks, but 85% of respondents believe that within the next three years they will have good access to the necessary skills. Security budgets have not been cut and are likely to remain protected: less than one third of the companies surveyed anticipate cuts. 85% of the respondents are of the opinion that they will have an appropriate security budget over the next three years. Maintaining these budgets is, however, accompanied by cost control, with cost KPIs in place in over half of the companies surveyed.

7 8 Are European companies equipped to fight off cyber security attacks? è It is unclear whether this show of confidence is backed up by reality. Many companies have not taken the most basic ad hoc measures to deal with crises 3.24/7 security is not yet standard: only one quarter of the companies surveyed have implemented it. Fewer than half of the largest companies benefit from this level of protection. As yet, companies have little insurance cover for cyber security risks and have not taken out this type of policy; two thirds of them do not plan to take out specific insurance in the future. Cyber risk insurance has not yet found its market: policies are seen as being too complex, with too many exclusions. Changes in cyber security strategy are not predominantly driven by changing cyber risks or the need to protect against cyber threats. Strategic priorities are directed more at risks arising from the use of new information and communication technologies, particularly with mobility and Bring Your Own Device (BYOD) policies.

8 è Are European companies equipped to fight off cyber security attacks? 9 Companies mostly adopt a self-reliant approach when dealing with risks 4.European companies identify a number of structural barriers to outsourcing (security criticality, giving priority to internal resources, etc). Only one in five of the largest companies would have no problem in outsourcing. There is a perceived lack of maturity in industry offerings: 20% of companies (and one in four large companies) have not yet found the right outsourcing offering for their requirements. Looking forward, however, companies believe they will be more willing to envisage outsourcing; almost three-quarters of them believe that they will outsource part of their security operations in the future. The most compelling argument in favour of outsourcing is cost reduction. For companies with over 5000 employees, however, improvements in attack detection rank second.

9 10 Are European companies equipped to fight off cyber security attacks? è The relationship between companies and their security partners will need 5.to change in coming years Within the next five years, more than one enterprise in four (and more than one large enterprise in three) believe that security is likely to be dealt with mainly by external providers. Over the same period, co-operation between companies in the same business sectors is predicted to become a reality: 15% of companies think they will end up pooling security resources with other players in their sector. Security as a service has not yet achieved market maturity. Less than 10% of companies have bought security as a service or plan to do so in However, companies of all sizes are open to this possibility in the future. Over 40% of all companies have already done so, or plan to do so ultimately.

10 è Are European companies equipped to fight off cyber security è attacks? 37 CONCLUSIONS AND RECOMMENDATIONS

11 38 Are European companies equipped to fight off cyber security attacks? è Being properly equipped to deal with cyber risks is vital to enable organisations small, medium and large to make the most of all the business opportunities available in a multi-faceted digital world. There is no such thing as zero risk, but European companies must put in place prevention, detection, protection and response resources commensurate with the actual threat levels. In view of the growing sophistication of attacks, European companies are still too focused on internal threats, and not concerned enough about new forms of external attack; they have not yet implemented even the most basic resources, for example in order to deal with major crises 24/7. However, there are some more positive observations. Firstly, budget decisions still favour security, with budgets in this field remaining intact and likely to do so in the future. Secondly, the fact that security is currently managed at high levels within companies favours the implementation of ambitious strategies that address business issues. While security experts clearly still have some way to go in tailoring their outsourcing offerings to client needs and making their solutions better known, improving attack detection is already cited as the second most important reason for outsourcing by major companies, just behind cost reduction. Awareness of outsourcing is growing as is the willingness to pool resources. Two thirds of the companies interviewed plan to make use of outsourcing in the future; over one quarter of them believe that five years from now, security will be handled mostly by external partners. Motives are still largely centred on cost control the chief criterion for evaluating security performance to date. It is now up to security experts to demonstrate the effectiveness of their capabilities in terms of attack prevention and detection (as well as response) if they are to persuade Europe s security decision-makers of the benefits of pooling protection resources.

12 è Are European companies equipped to fight off cyber security attacks? 39 a a a a Recommendations for optimum cyber security The above conclusion means that a number of recommendations can be made when it comes to defending the best interests of companies in cyberspace. The following recommendations in particular may be made: - greater co-operation is needed in Europe between security experts and all other stakeholders in order to create global, joint capabilities and to increase the firepower of European providers - performance measurement for security should be improved by focusing first and foremost on security itself (number of attacks detected and dealt with, response times, etc). Today, although security budgets have been maintained, the leading KPI is cost control, whereas greater expenditure may actually indicate better protection - 24/7 operational security management should be provided more systematically - there is a need to develop professional service offers that are better geared to addressing the twofold challenge of economic performance and security effectiveness, in line with companies expectations. a a a Some industry professionals have already invested heavily to develop top-ranking cyber security capabilities, and are inviting companies to benefit from these. Cooperation between Europe s security experts and companies is dependent on three factors: - better support by the experts to help companies understand security issues, diagnostics and the definition of the right governance and resources, in terms of criteria based on efficiency and return on investment - greater maturity of security implementation models in order to drive a much broader uptake whilst improving practices - developing innovative technological partnerships within Europe to provide better protection from the most sophisticated attacks (such as APTs) and to respond as quickly as possible. These recommendations will enable European companies to take hold of the many opportunities offered by every aspect of the digital world, whilst keeping cyber risks under control. As a result, companies will be able to express cautious confidence in their digital activities and cyber security controls and, just as importantly, be justified in doing so.

13 42 Are European companies equipped to fight off cyber security attacks? è About PAC Pierre Audoin Consultants (PAC) is a privately held and management-owned research & consulting firm, specialized on the software and ICT services (SITS) industry. PAC combines detailed knowledge of the local ICT markets in 30+ countries around the globe, with a strong European heritage. At present, PAC is the most reliable source of European IT market intelligence. With a growing network of 120 industry analysts and consultants around the globe, PAC and its partners ensure local presence in the major IT markets. For more information, visit:

14 è Are European companies equipped to fight off cyber security attacks? 43 About Steria Steria delivers IT enabled business services and is the Trusted Transformation Partner for private and public sector organisations across the globe. By combining in depth understanding of our clients businesses with expertise in IT and business process outsourcing, we take on our clients challenges and develop innovative solutions to address them efficiently and profitably. Through our highly collaborative consulting style, we work with our clients to transform their business, enabling them to focus on what they do best. Our 20,000 people, working across 16 countries, support the systems, services and processes that make today s world turn, touching the lives of millions around the globe each day. For more than 20 years, Steria has been the trusted partner of both private businesses and public organisations seeking a security services provider to protect their infrastructures, applications and data. With more than 700 experts throughout Europe, Steria manages every stage of the security lifecycle, from agreeing on a security strategy through to running day-to-day routine tasks. Steria s deep consulting skills allow the company to recommend the most efficient security policies and improve clients return on investment. Steria s Advanced Security Operations Centre (SOC) ensures early detection and prevention of the most complex threats, including APTs (Advanced Persistent Threats), as well as an appropriate, proactive response. Steria also delivers digital trust solutions tailored to clients specific requirements and business processes: identity and access management and authentication, data protection, cloud security, mobile security and more. Founded in 1969, Steria has offices in Europe, India, North Africa and SE Asia and a 2012 revenue of 1.83 billion. Over 20%(*) of Steria s capital is owned by its employees. Headquartered in Paris, Steria is listed on the Euronext Paris market. (*): including SET Trust and XEBT Trust (4.15% of capital)

15 Groupe Steria SCA Quai du Président Roosevelt Issy-les-Moulineaux France Steria is committed to supporting a sustainable world and is Certified Carbon Neutral for Flight and Fleet Travel Steria

Are European companies equipped to fight off cyber security attacks?

Are European companies equipped to fight off cyber security attacks? A Steria Report Are European companies equipped to fight off cyber security attacks? In collaboration with PAC www.steria.com 2 Are European companies equipped to fight off cyber security attacks? www.steria.com

More information

Business Intelligence Maturity Audit (bima) - Specialist Cloud Services

Business Intelligence Maturity Audit (bima) - Specialist Cloud Services www.steria.com/uk Business Intelligence Maturity Audit (bima) - Specialist Cloud Services As Public Sector organisations adopt Cloud services as a result of business demands, changing technology and budgetary

More information

Adoption, Approaches & Attitudes

Adoption, Approaches & Attitudes Adoption, Approaches & Attitudes The Future of Cloud Computing in the Public and Private Sectors A Global Cloud Computing Study Sponsored by JUNE 2011 TABLE OF CONTENTS Executive Summary... 1 Methodology

More information

CYBERSECURITY. Global cybersecurity capabilities for a digital transformation with confidence. Delivering Transformation. Together.

CYBERSECURITY. Global cybersecurity capabilities for a digital transformation with confidence. Delivering Transformation. Together. CYBERSECURITY Global cybersecurity capabilities for a digital transformation with confidence Delivering Transformation. Together. Sopra Steria, a European leader in digital transformation, has one of the

More information

Performance Testing and Functional Automation Specialist Cloud Services

Performance Testing and Functional Automation Specialist Cloud Services www.steria.com/uk Performance Testing and Functional Automation Specialist Cloud Services Public Sector organisations will be increasingly developing and adopting Cloud computing strategies to reduce costs,

More information

Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary

Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary Is cyber security now too hard for enterprises? Executive Summary Sponsors The creation and distribution of this study was supported by CGI, cybx and Fujitsu/Symantec. Premium sponsors: Gold sponsor: 2

More information

Gold study sponsor: Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary

Gold study sponsor: Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary Gold study sponsor: Is cyber security now too hard for enterprises? Cyber security trends in the UK Executive Summary Core statements I. Cyber security is now too hard for enterprises The threat is increasing

More information

HR Software and Services in France in Good Health

HR Software and Services in France in Good Health PRESS RELEASE HR Software and Services in France in Good Health Paris, October 2007 The software and services market in Human Resources continues to rise and confirms trends from previous years. The year

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

The Future of Stakeholder Engagement

The Future of Stakeholder Engagement The Future of Stakeholder Engagement Views of Senior European Communicators on Current and Future Best Practice February 2013 Table of contents 3 4 6 11 18 25 28 29 Introduction Key findings The current

More information

REPORT. Next steps in cyber security

REPORT. Next steps in cyber security REPORT March 2015 Contents Executive summary...3 The Deloitte and Efma questionnaire...5 Level of awareness...5 Level of significance...8 Level of implementation...11 Gap identification and concerns...15

More information

A global infrastructure to safeguard your business_

A global infrastructure to safeguard your business_ Global Security Services A global infrastructure to safeguard your business_ Global Solutions More than just peace of mind: increase confidence and reduce risk across your entire organisation_ How do you

More information

How To Improve Security In An Organization

How To Improve Security In An Organization Protecting the organization against the unknown A new generation of threats February 2014 Contents Scope of the research 3 Research methodology 3 Aims of the research 3 Summary of key findings 4 IT security

More information

Cybersecurity: Mission integration to protect your assets

Cybersecurity: Mission integration to protect your assets Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions

More information

Gold Sponsor of the study: Incident Response Management

Gold Sponsor of the study: Incident Response Management Gold Sponsor of the study: Incident Response Management How European Enterprises are Planning to Prepare for a Cyber Security Breach Y R A M SUM IVE T U C E PAC 2015 X E Telefonica company profile About

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

TCS as a Digital Transformation Partner for European Customers

TCS as a Digital Transformation Partner for European Customers TCS as a Digital Transformation Partner for European Customers December 2014 By Nicole Dufft, Independent Vice President - Digital Enterprise, PAC Germany TCS as a Digital Transformation Partner 2 1. INTRODUCTION

More information

Are European companies ready for customer centricity?

Are European companies ready for customer centricity? EXECUTIVE SUMMARY Are European companies ready for customer centricity? In collaboration with MV2 Conseil Delivering Transformation. Together. Contents 3 Introduction 4 Objectives and methodology 5 10

More information

Cybersecurity Strategic Consulting

Cybersecurity Strategic Consulting Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with

More information

Unisys Security Insights: Global Summary A Consumer Viewpoint - 2015

Unisys Security Insights: Global Summary A Consumer Viewpoint - 2015 Unisys Security Insights: Global Summary A Consumer Viewpoint - 2015 How consumers in 12 countries feel about: Personal data security, ranked by industry Region-specific security perceptions Research by

More information

Meeting the challenge

Meeting the challenge Meeting the challenge Working with you to ensure your IT infrastructure delivers Infrastructure Management Services Overview Real solutions to tough challenges Infrastructure Management Services Overview

More information

Accenture Risk Management. Industry Report. Life Sciences

Accenture Risk Management. Industry Report. Life Sciences Accenture Risk Management Industry Report Life Sciences Risk management as a source of competitive advantage and high performance in the life sciences industry Risk management that enables long-term competitive

More information

Combating a new generation of cybercriminal with in-depth security monitoring

Combating a new generation of cybercriminal with in-depth security monitoring Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.

More information

Companies need integrated mobility management solutions

Companies need integrated mobility management solutions Spotlight analysis Companies need integrated mobility management solutions January 2014 f This spotlight analysis is based on the PAC trend study Mobile Device & Application Management in Germany, France,

More information

Is your business secure in a hosted world?

Is your business secure in a hosted world? Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer

More information

Guide Antivirus. You wouldn t leave the door to your premises open at night. So why risk doing the same with your network?

Guide Antivirus. You wouldn t leave the door to your premises open at night. So why risk doing the same with your network? You wouldn t leave the door to your premises open at night. So why risk doing the same with your network? Most businesses know the importance of installing antivirus products on their PCs to securely protect

More information

Wealth Advisory Services Winning with clients

Wealth Advisory Services Winning with clients Wealth Advisory Services Winning with clients About Us Deloitte, with more than 500 professionals operating out of offices in all major cities is one of the largest and fastest-growing professional services

More information

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287

More information

Sytorus Information Security Assessment Overview

Sytorus Information Security Assessment Overview Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)

More information

Enterprise Software Security Strategies

Enterprise Software Security Strategies Enterprise Software Security Strategies Summary Results October 2014 Program Overview Between June and September, 2014, Gatepoint Research invited IT and Security executives to participate in a survey

More information

Is a cyber breach inevitable? Cyber Security Challenges in the Netherlands

Is a cyber breach inevitable? Cyber Security Challenges in the Netherlands Cyber Security Challenges in the Netherlands June 2015 Comissioned by: 2 Published by CGI George Hintzenweg 89, 3068 AX Rotterdam, The Netherlands Pierre Audoin Consultants (PAC) Ltd 15 Bowling Green Lane,

More information

Token Security or Just Token Security? A Vanson Bourne report for Entrust

Token Security or Just Token Security? A Vanson Bourne report for Entrust Token Security or Just Token Security? A Vanson Bourne report for Entrust Foreword In 2011, Entrust Inc., an identity-based security company, partnered with respected technology research firm Vanson Bourne

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

Managed Security in the Enterprise (U.S. Enterprise)

Managed Security in the Enterprise (U.S. Enterprise) MANAGED SECURITY IN THE ENTERPRISE Managed Security in the Enterprise (U.S. Enterprise) March 2009 CONTENTS Executive overview... 3 Methodology... 4 Demographics... 5 Finding 1: Cyber Risk a Big Problem...

More information

Consumer Goods and Services

Consumer Goods and Services Accenture Risk Management Industry Report Consumer Goods and Services 2011 Global Risk Management Point of View Consumer Goods and Services 2011 Global Risk Management Point of View Consumer Goods and

More information

Supplier Connect Supplier Collaboration within Product Development. December 2015

Supplier Connect Supplier Collaboration within Product Development. December 2015 Supplier Connect Supplier Collaboration within Product Development December 2015 Supplier Connect - Supplier Collaboration within Product Development 2 Published by Atos SE - River Ouest - 80, quai Voltaire

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

A Steria Report SEPA: will European businesses be ready for the transformation? Prepared in collaboration with. è www.steria.com

A Steria Report SEPA: will European businesses be ready for the transformation? Prepared in collaboration with. è www.steria.com A Steria Report SEPA: will European businesses be ready for the transformation? Prepared in collaboration with è www.steria.com 02 SEPA : will European businesses be ready for the transformation? è www.steria.com

More information

2015 GLOBAL ASSET MANAGEMENT SURVEY

2015 GLOBAL ASSET MANAGEMENT SURVEY 2015 GLOBAL ASSET MANAGEMENT SURVEY It's not what happens to you, but how you react to it that matters." -Epictetus A survey carried out globally by Linedata. INTRODUCTION It's not what happens to you,

More information

Premium study sponsors: Is cyber security now too hard for enterprises?

Premium study sponsors: Is cyber security now too hard for enterprises? Premium study sponsors: Is cyber security now too hard for enterprises? Company profile Fujitsu Technology Solutions GmbH About Fujitsu Fujitsu is a Japanese IT company offering a complete range of products,

More information

Private Cloud Deployment

Private Cloud Deployment Oracle Private Cloud Private Cloud Deployment ADOPTION BARRIERS, DEPLOYMENT LEVELS, CUSTOMER EXPERIENCES AND FUTURE PLANS FOR PRIVATE CLOUD Survey conducted by IDG Connect on behalf of Oracle IDG Connect,

More information

2011 GLOBAL INVESTMENT MANAGEMENT SURVEY

2011 GLOBAL INVESTMENT MANAGEMENT SURVEY 2011 GLOBAL INVESTMENT MANAGEMENT SURVEY In this world, nothing can be said to be certain, except death and taxes. If Benjamin Franklin were a 21 st century investment manager, he would be tempted to add

More information

BT Assure Threat Intelligence

BT Assure Threat Intelligence BT Assure Threat Intelligence Providing you with the intelligence to help keep your organisation safe BT Assure. Security that matters At all times, organisations are vulnerable to all kinds of cyber attacks

More information

Cyber Security for audit committees

Cyber Security for audit committees AUDIT COMMITTEE INSTITUTE Cyber Security for audit committees An introduction kpmg.com/globalaci 2 Audit Committee Institute An introduction to cyber security for audit committees Audit committees have

More information

How are companies currently changing their facilities management delivery model...?

How are companies currently changing their facilities management delivery model...? Interserve and Sheffield Hallam University market research 2012 Page 2 www.commercial.interserve.com How are companies currently changing their facilities management delivery model...? we have a strategy

More information

Cyber Security Trends 2016. Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK

Cyber Security Trends 2016. Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK Cyber Security Trends 2016 Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK December, 2015 Cyber security Trends 2016 What do new technologies and

More information

Is now a good time to sell your consulting firm?

Is now a good time to sell your consulting firm? Is now a good time to sell your consulting firm? T H E 2 0 1 4 B U Y E R S R E S E A R C H R E P O R T F R O M E Q U I T E Q Opportunities for sellers in the consulting sector M&A market Contents Highlights...3

More information

Smart Security. Smart Compliance.

Smart Security. Smart Compliance. Smart Security. Smart Compliance. SRM are dedicated to helping our clients stay safe in the information environment. With a wide range of knowledge and practical experience, our consultants are ready to

More information

Outsourcing RESEARCH PAPER

Outsourcing RESEARCH PAPER Written by Maxine Holt, March 2002 INFRASTRUCTURE Research and Advisory Services Outsourcing RESEARCH PAPER Infosys Outsourcing Services Abstract Infosys provides a range of IT outsourcing services to

More information

Response to the European Commission consultation on. European Data Protection Legal Framework

Response to the European Commission consultation on. European Data Protection Legal Framework Response to the European Commission consultation on European Data Protection Legal Framework A submission by Acxiom (ID number 02737212854-67) Correspondence Address: Martin-Behaim-Straße 12, 63263 Neu-Isenburg,

More information

Testing the Security of your Applications

Testing the Security of your Applications Home Safeguarding Business Critical Testing the of your Applications Safeguarding business critical systems and applications 2 Safeguarding business critical systems and applications Organizations are

More information

Under control 2015 Hot topics for IT internal audit in financial services. An Internal Audit viewpoint

Under control 2015 Hot topics for IT internal audit in financial services. An Internal Audit viewpoint Under control 2015 Hot topics for IT internal audit in financial services An Internal Audit viewpoint Introduction Welcome to our fourth annual review of the IT hot topics for IT internal audit in financial

More information

White Paper. The benefits of basing email and web security in the cloud. including cost, speed, agility and better protection

White Paper. The benefits of basing email and web security in the cloud. including cost, speed, agility and better protection White Paper The benefits of basing email and web security in the cloud A White Paper by Bloor Research Author : Fran Howarth Publish date : July 2010 the outsourcing of email and web security defences

More information

Cyber Security Strategy for Germany

Cyber Security Strategy for Germany Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable

More information

Achieving Global Cyber Security Through Collaboration

Achieving Global Cyber Security Through Collaboration Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda

More information

Leading Providers of Consulting & System Integration (C&SI) Services to the Automotive Industry in Germany 2014

Leading Providers of Consulting & System Integration (C&SI) Services to the Automotive Industry in Germany 2014 C&SI Services in the Automotive Industry I Germany I 2014 Leading Providers of Consulting & System Integration (C&SI) Services to the Automotive Industry in Germany 2014 SITSI I Vendor Analysis I PAC RADAR

More information

Information Protection in Today s Changing Mobile and Cloud Environments

Information Protection in Today s Changing Mobile and Cloud Environments Information Protection in Today s Changing Mobile and Cloud Environments Art Gilliland, Sr. Vice President Symantec, Information Security Group Session ID: SPO1-107 Session Classification: Intermediate

More information

CYBER SECURITY, A GROWING CIO PRIORITY

CYBER SECURITY, A GROWING CIO PRIORITY www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------

More information

Europe: For Richer, For Poorer? Government s Role in Preserving Standard of Living

Europe: For Richer, For Poorer? Government s Role in Preserving Standard of Living Delivering Public Service for the Future Europe: For Richer, For Poorer? Government s Role in Preserving Standard of Living Learn about delivering public service for the future by creating high performing

More information

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions

More information

Far more than finance

Far more than finance Far more than finance Do you want to expand your business? Increase your sales? Do you have any investment projects? Together, we can quicken the pace of your development... If you are a manufacturer or

More information

Independent wealth managers. Société Générale Private Banking (Suisse) SA

Independent wealth managers. Société Générale Private Banking (Suisse) SA Independent wealth managers Société Générale Private Banking (Suisse) SA A unique relationship tailored to your personal requirements Dedicated team Société Générale Private Banking (Suisse) SA has been

More information

The Purpose of PR 2016

The Purpose of PR 2016 The Purpose of PR 2016 Research Report Contents Introduction Key findings Purpose of PR Tactics Budget Social media, SEO Media Relevance and importance of PR INTRODUCTION FROM XANTHE VAUGHAN WILLIAMS PR

More information

Digital Leaders Survey

Digital Leaders Survey Contents 1. Key findings 3 2. Top three management issues 4 3. Top three IT topics or trends 5 4. Additional resources needed to address the issues prioritised 6 5. Skills gaps 7 6. Concerns about future

More information

ICT Industry in Europe. Outsourcing Fuels Business Growth

ICT Industry in Europe. Outsourcing Fuels Business Growth ICT Industry in Europe. Outsourcing Fuels Business Growth 1 CONTENTS Introduction... 3 Implications of owning own IT infrastructure Drivers to outsourcing IT nearshoring to pick up in 2014 Risks of outsourcing

More information

SUPPLY, DEMAND, ENERGY AND LOCATION: THE FOUR PILLARS TO SUCCESS

SUPPLY, DEMAND, ENERGY AND LOCATION: THE FOUR PILLARS TO SUCCESS SUPPLY, DEMAND, ENERGY AND LOCATION: THE FOUR PILLARS TO SUCCESS DC RADAR The second edition of the Arcadis European Data Centre Radar, produced in conjunction with ixconsulting, is based upon extensive

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit

Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit 2014 Welcome to our third annual review of the IT hot topics facing Internal Audit functions within

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions

More information

IT Workforce snapshot

IT Workforce snapshot 2013 IT Workforce snapshot TEKsystems IT Workforce Snapshot is designed to provide a high-level view of trends impacting IT spending, IT employment, workforce supply and demand, compensation and geographical

More information

SUPPLY, DEMAND, ENERGY AND LOCATION: THE FOUR PILLARS TO SUCCESS

SUPPLY, DEMAND, ENERGY AND LOCATION: THE FOUR PILLARS TO SUCCESS SUPPLY, DEMAND, ENERGY AND LOCATION: THE FOUR PILLARS TO SUCCESS DC RADAR The second edition of the Arcadis European Data Centre Radar, produced in conjunction with ixconsulting, is based upon extensive

More information

Western Australian Auditor General s Report. Information Systems Audit Report

Western Australian Auditor General s Report. Information Systems Audit Report Western Australian Auditor General s Report Information Systems Audit Report Report 10 June 2012 Auditor General s Overview The Information Systems Audit Report is tabled each year by my Office. It summarises

More information

NNIT Cybersecurity. A new threat landscape requires a new approach

NNIT Cybersecurity. A new threat landscape requires a new approach NNIT Cybersecurity A new threat landscape requires a new approach Effective cybersecurity is not about spending more money. It s about aligning your security initiatives with the threats and priorities

More information

Caretower s SIEM Managed Security Services

Caretower s SIEM Managed Security Services Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During

More information

W H I T E P A P E R I n t u i t i v e e n t e r p r i s e a p p l i c a t i o n s i m p r o v e b u s i n e s s p e r f o r m a n c e

W H I T E P A P E R I n t u i t i v e e n t e r p r i s e a p p l i c a t i o n s i m p r o v e b u s i n e s s p e r f o r m a n c e W H I T E P A P E R I n t u i t i v e e n t e r p r i s e a p p l i c a t i o n s i m p r o v e b u s i n e s s p e r f o r m a n c e Sponsored by: IFS Anders Elbak 2011 Global Survey I D C O p i n i o

More information

SOPRA-STERIA GROUP. Merger project Creation of a European leader in digital transformation

SOPRA-STERIA GROUP. Merger project Creation of a European leader in digital transformation SOPRA-STERIA GROUP Merger project Creation of a European leader in digital transformation DISCLAIMER This presentation may contain forward-looking statements concerning Groupe Stéria and Sopra Group. Such

More information

Global Cyber Security Market Forecast and Opportunities, 2020

Global Cyber Security Market Forecast and Opportunities, 2020 Brochure More information from http://www.researchandmarkets.com/reports/3232007/ Global Cyber Security Market Forecast and Opportunities, 2020 Description: According to Global Cyber Security Market Forecast

More information

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s IDC Middle East, Africa, and Turkey, Al Thuraya Tower 1, Level 15, Dubai

More information

Fraud Solution for Financial Services

Fraud Solution for Financial Services Fraud Solution for Financial Services Transforming Fraud Detection and Prevention in Banks and Financial Services In the digital age, the implications of financial crime against banks and other financial

More information

UK ICT Outsourcing Service Provider Performance and Satisfaction (SPPS) Study: 2013

UK ICT Outsourcing Service Provider Performance and Satisfaction (SPPS) Study: 2013 A STUDY BY KPMG UK ICT Outsourcing Service Provider Performance and Satisfaction (SPPS) Study: 2013 A study of the UK Information and Communication Technology (ICT) Outsourcing Market and its Service Providers

More information

A stocktaking of measures

A stocktaking of measures LA FINANCE SOLIDAIRE CHAPTER OU ÉTHIQUE 1 A stocktaking of measures to protect online card payments 13 13 The Observatory regularly monitors fraud in card-not-present (CNP) payments, which amounted to

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

MOBILE BANKING TESTING TIMES FOR APPS DEVELOPMENT RESULTS OF OUR SURVEY

MOBILE BANKING TESTING TIMES FOR APPS DEVELOPMENT RESULTS OF OUR SURVEY MOBILE BANKING TESTING TIMES FOR APPS DEVELOPMENT RESULTS OF OUR SURVEY About this survey A SNAPSHOT ABOUT THE DEVELOPMENT OF MOBILE BANKING APPLICATIONS The aim of this survey, conducted in February 2014,

More information

Putting your best foot forward. Managing corporate security in a world of consumer devices an analysis of primary research

Putting your best foot forward. Managing corporate security in a world of consumer devices an analysis of primary research Putting your best foot forward Managing corporate security in a world of consumer devices an analysis of primary research Take two footwear manufacturers: one in Milan, Italy and one in Sao Paulo, Brazil.

More information

I D C M a r k e t S c a p e : W o r l d w i d e F i n a n c i a l S e r v i c e s C o n s u l t i n g 2 0 1 2 V e n d o r A n a l y s i s

I D C M a r k e t S c a p e : W o r l d w i d e F i n a n c i a l S e r v i c e s C o n s u l t i n g 2 0 1 2 V e n d o r A n a l y s i s Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com C O M P E T I T I V E A N A L Y S I S I D C M a r k e t S c a p e : W o r l d w i d e F i n a n c

More information

COMBATING CYBER THREATS: A HOW TO FOR THE CISO.

COMBATING CYBER THREATS: A HOW TO FOR THE CISO. www.wipro.com COMBATING CYBER THREATS: A HOW TO FOR THE CISO. Gopinathan. K, Practice Head - Managed Security and Network Services, Global Infrastructure Services (GIS), Wipro Infotech Contents 02 -------------------------------------

More information

2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY

2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY 2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY 1 EXECUTIVE SUMMARY INTRODUCING THE 2015 GLOBAL THREAT INTELLIGENCE REPORT Over the last several years, there has been significant security industry

More information

Digital Transformation in Germany

Digital Transformation in Germany Silver sponsor of the study: Changing marketing and IT strategies Executive Summary Background The way enterprises interact with their customers is currently undergoing a massive change: Digital technologies,

More information

Managing Growth, Risk and the Cloud

Managing Growth, Risk and the Cloud Managing Growth, Risk and the Cloud Executive Summary of Independent Market Research Commissioned by Zenium Data Centers Spring 2015 Foreword Rising data volumes combined with the always on approach to

More information

Dell Global Technology Adoption Index Overview

Dell Global Technology Adoption Index Overview Dell Global Technology Adoption Index Overview Dell prioritizes developing a deep understanding of our customers specific technology needs to provide the best possible solutions to unleash their organizations

More information

SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY

SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY Transported Asset Protection Association SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY YOUR INVITATION TO JOIN TAPA EMEA Making your supply chain more resilient The Transported Asset Protection Association

More information

RUAG Cyber Security. More security for your data

RUAG Cyber Security. More security for your data RUAG Cyber Security More security for your data More security in cyberspace The RUAG Cyber Security Portfolio offers greater protection for your data through inspection, event analysis and decision-making

More information

PMR. IT outsourcing in Central and Eastern Europe FREE ARTICLE. www.ictrussia.com

PMR. IT outsourcing in Central and Eastern Europe FREE ARTICLE. www.ictrussia.com FREE ARTICLE www.ictrussia.com IT outsourcing in Central and Eastern Europe Source: IT outsourcing in Central and Eastern Europe 2009 Countries attractiveness and development forecasts January 2009 PMR

More information

Best practices FOR implementing an executive

Best practices FOR implementing an executive Best practices FOR implementing an executive protection program Executive Summary What is Executive Protection? Many executives have bought into common misperceptions about executive protection. As the

More information

AGILE BUSINESS SERVICES. Guiding and supporting your business. at any stage of your agile journey

AGILE BUSINESS SERVICES. Guiding and supporting your business. at any stage of your agile journey AGILE BUSINESS SERVICES Guiding and supporting your business at any stage of your agile journey SOGETI AGILE SERVICES Overcoming barriers to agile success Agile methods are being adopted by a wide range

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information