版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
>
Howcybersecurityboostsenterprisereinventiontodrivebusinessresilience
StateofCybersecurityResilience2023
Contents
Securing
transformation
success
Page3
Cybersecurityas
achangemaker
Page7
Whatittakesto
beacyber
transformer
Page16
Wherenext?
Abouttheresearch
Extrapressure
points
Page29
Page33
Page23
2
3
Theworldhasshifted
andcybersecurityisshiftingwithit—although,
notalwaysfastenoughtobringabouteliteperformance.
4
Securingtransformationsuccess
Marketdisruption—fueledby
technologicalchange,complexregulations,geopolitical
tensionsandeconomic
uncertainties—istestingglobal
organizations’approachtorisk
andresilience.
AsourTotalEnterpriseReinvention
research
shows,mostlarge
organizationsaretransformingfaster
andmorefrequently.
Ourlatestcybersecurityresearch
revealssomeorganizationsareusing
cybersecurityasadifferentiatorto
deliverbetterbusinessoutcomes.Thoseorganizationsthatcloselyaligntheir
cybersecurityprogramstobusiness
objectivesare18%morelikelyto
increasetheirabilitytodriverevenue
growth,increasemarketshareand
improvecustomersatisfaction,trustandemployeeproductivity.
What’smore,organizationsthatembedkeycybersecurityactionsintotheirdigitaltransformationeffortsandapplystrongcybersecurityoperationalpractices
acrosstheorganizationarenearlysix
timesmorelikelytoexperiencemore
effectivedigitaltransformationsthan
thosethatdon’tdoboth.
Yet,someorganizationsaren’tengagingcybersecurityearlyenoughtoaccelerate
transformationandmeetfuture
challengesandopportunities.
Wefoundthat,whenitcomesto
embeddingsecuritycontrols,18%ofoursurveyrespondentsstilldeploythemafterthey’vefinalizedatransformationeffort—andthat’sonlyifvulnerabilitiesare
detected.
Itcouldbeacaseoftoolittle,toolate.Asarecentstudyfound,thediscoveryofanerrorduetopoorapplicationsecurityinanapp'scodingphase,insteadofduringinitialplanning,costsfivetimesasmuchtofix—andthatsoarsto30timesthecostpost-release.1
Thenextwaveofbusiness
transformationwillmorphfrom
managingisolateddigitalcapabilitiesto
creatingthefoundationsofashared
reality.Itwillconvergethephysicallives
we’vebeenleadingwiththedigitalones
we’vebeenrapidlyexpanding.Insuch
anenvironment,organizationsshould
embedcybersecurityeachstepofthe
waytobettermanagethesehighstakes.
5
Securingtransformationsuccess
Byconvertingcybersecurity
fromanincident-driven
reactionintopartofthefabric
oftransformationefforts,
organizationscannotonly
boostcybersecurityresilience,
butalsopositionthemselves
to
reinventthewhole
enterprise
andsetanew
performancefrontier,safely.
6
7
53%
saidthatcybersecurityispartofthecore
transformationteam
Cybersecurityasachangemaker
OurannualStateofCybersecurityResilienceresearchinvolved
3,000globalrespondentsfrom15industriesacross14countries.
Surveyresponsesshowthat
morethanone-halfof
organizationsarebeginningto
recognizetheimportanceof
beingsecurefromthestartin
anytransformationeffort.
Source:AccentureStateofCybersecurityResilience
2023;N=3,000securityexecutivesandbusinessleaders
&
53%
saidthatcybersecurityis
requiredbeforeany
solutionisdeployed
8
9
Cybersecurityasachangemaker
Wediscoveredthatthemajorityoforganizationsundergoingdigital
transformation,inoursample,increasetheirchancesofbeingfullysatisfied
withthelevelofcybersecurityembeddedintheirdigitaltransformation
effortsby10%iftheyfollowthreeactions.
Threecybersecurityactionstoboosttransformation:
1.
Requirecybersecuritycontrolsbeforeallnewsolutionsaredeployed
2.
Applycybersecurityincrementally
aseachdigitaltransformation
milestoneisachieved
3.
Assignacybersecurityrepresentativetothecoretransformationteamandapointpersontoorchestratecybersecurity
acrossalltransformationinitiatives
Applicationsandplatforms
DataandAI
Infrastructureandsecurity
The
digital
core
10
Cybersecurityasachangemaker
Ourrecentlyreleased
ResilienceforReinvention
study2showsthatcompanies
achievinglong-termprofitablegrowthdisplayacommitmenttowarddeveloping
adigitalcore,whichconsistsofthreelayers:infrastructureandsecurity;dataand
artificialintelligence(AI);andapplicationsandplatforms.
Theyalsodemonstratea
consistentlyhighershareof
investmentsinnewtechnologies,
innovationandcybersecurity.
11
Cybersecurityasachangemaker
InthislatestStateofCybersecurityResilienceresearch,wefindthatsomeorganizations—
representing30%ofrespondents—arealreadyprovinghowprioritizingcybersecuritymakesadifference.Theseorganizations—wecallthemcybertransformers—haveaccelerateddigitaltransformationeffortsandplantocontinueacceleratingthemastheirhigh-performing
cybersecurityactionspropelthemforward(Figure1).
Figure1.Cybertransformersacceleratedigitaltransformation
Cybertransformers
Therest
0%30%100%
Cybersecurityasachangemaker
Andlikethecyberchampionsinour
2021report
,thisyear’scyber
transformersstrikeabalancebetweenexcellingatcyberresilienceand
aligningwiththebusinessstrategytoachievebetterbusinessoutcomes.
12
73%
37%
oftherestinvolvethe
cybersecurityteamfromthestartofbusinessplanning
vs.
ofcybertransformersinvolvethe
cybersecurityteamfromthestartofbusinessplanning
13
Cybersecurityasachangemaker
Cybertransformerscloselyaligncybersecurityprogramstobusinessobjectives.
Indoingso,theyare18%morelikelytoincreasethefollowingoutcomes:
•Theirabilitytoachievetargetrevenuegrowthandmarketshare
•Improvedcustomersatisfactionandtrust
•Greateremployeeproductivity
Additionally,cyber
transformersarenearlytwice
asgoodastherestat
involvingthecybersecurity
teamfromthestartof
businessplanning.Andthey
arefarmorecomfortablewith
theirorganization’sinternal
cybersecurityplanning.
14
Cybersecurityasachangemaker
Cybertransformers
buildtransformation
foundationsintwoways
Theynotonlyembedthreekey
cybersecurityactionsintotheir
transformationefforts,butalso
establishabetterfoundation
byapplyingstrong
cybersecurityoperational
practicesfromthestart.Asa
result,theyare5.8Xmorelikely
toexperiencemoreeffective
digitaltransformationsthanthe
rest(Figure2).
Figure2.Cybertransformersbuildtransformationfoundationsintwoways
Source:AccentureResearchlogisticregressionanalysisofStateofCybersecurityResilience2023data;estimatedprobability
premiumfromapplyingcybersecuritybestpracticeswhenconductingdigitaltransformation.N=2,500securityexecutives.
Relymoreheavilyonautomation
Cybersecurityasachangemaker
Cybertransformersoutperformtherestusing
strongcybersecurityoperationalpractices.
Excelatintegrating
cybersecurityandrisk
management
Leveragecybersecurityas-a-servicemorefrequentlyto
enhancesecurityoperations
Morecommittedto
protectingtheirecosystems
fromexternalattacks
15
16
17
Therest
Whatittakestobeacybertransformer
Thereareseveralfactorsthatillustratethedifferences
betweencybertransformersandtherest.
Cyber
transformers
Source:AccentureStateof
CybersecurityResilience2023;N=2,500securityexecutives
65%ofcybertransformersapplythree
leadingpracticestoexcelatrisk
management.Bycontrast,just11%ofthe
restadoptthis“best-in-class”approach.
1.Integratecyberrisk:Acyberrisk-basedframeworkiscompletelyintegratedintotheirenterpriseriskmanagementprogram
2.Agreeonpriorities:Theircybersecurity
operationsandexecutiveleadership
consistentlyagreeonthepriorityofassetsandoperationstoprotect
3.Lookatriskholistically:Theyconsidercybersecurityrisktoagreatextentwhenevaluatingoverallenterpriserisk
Casestudy
Forexample,bychoosingtointegrate
cybersecurityriskintoitsbroaderenterprise
riskmanagementframework,aglobaltravel
companywasabletogainbetterrisk
management,improvedcompliancewith
regulatoryrequirementsandenhanced
protectionforitsbusinessanditscustomers.
Thisindustry-leadingandcomprehensive
approachtoenterpriseriskmanagement
enabledthecompanytogainadeeper,
holisticunderstandingofthesecurityrisks
associatedwiththird-partyvendorsandIT
systems,aswellasbetterpreparednessand
recoveryplanningintheeventofabreach.
18
Whatittakestobeacybertransformer
Cybertransformersmorefrequentlyuse
cybersecurity-as-a-servicetoenhanceoperations.
40%ofcybertransformersusethirdpartiesormanagedservices
providerstoadministercybersecurityoperationsandaddresstalent
shortages,versus24%oftherest.
Casestudy
WhenaNorthAmericanretailchain
becameastandalonepubliccompany,itneededtorethinkitsIToperations.
Accenturewasaskedtosupportthe
retailer’sfocusedsecurityteamby
expandingintoacybersecurity-as-a-
servicemodel,initiallyrunningthe
company’ssecurityoperations,suchasthreatintelligenceandestablishingaSecurityOperationsCenter(SOC).
Today,Accentureprovidesarangeofservicesincludingdataprotection,
identitymanagement,networksecurity,vulnerabilitymanagement,security
awarenessandriskmanagement.
Improvingitscybersecurityoperationsenabledthecompanytoinnovate
continuously,runitsstoreoperationswithoutdisruptionandmaintain
consumertrust.Theretailergained
improvedcyberresilienceandbusinessoutcomesbybeingsecurefromthestart.
19
Whatittakestobeacybertransformer
Cybertransformersaremorecommitted
toprotectingtheirecosystem.
Basedonouranalysis,cyber
transformersperformedbetterthantherestwhenitcomestotaking
actiontoprotecttheirecosystems.
Forexample,cybertransformersmoreoften
incorporatetheirecosystemorsupplychain
partnersintotheirincidentresponseplan(45%vs.37%)andalsorequirethemtomeetstrictcybersecuritystandards(41%vs.29%).Whiletheseecosystemactionsprovidecyber
transformerswitha10%advantageovertherest,thereisroomforimprovement.
Casestudy
Aleadingpharmaceutical
companycollaboratedwithAmazon
WebServices(AWS)toacceleratedrugdevelopment,increaseoperational
agility,reducetechnologycostsanddeveloptheworkforceofthefuture.
Tocreateamorescalable,reliableandsecurearchitecture,thecompany
moved80%ofitsapplicationstothecloud,removingnon-differentiating
technology,reducingitsinternaldatacenterfootprint,decreasingcapital
expendituresandimprovingresilience.
Customers,employeesandpartnerscanbenefitfromthecompany’sabilityto
respondwithgreaterspeed,agilityandinsightsacrossthevaluechainwhich,inturn,improvespatientexperiences.
Acceleratingthedeliveryofdataservicesandcapabilitiescanhelpthecompanyincreasesecureconnectivityand
collaborationwiththeLifeSciencesecosystemandexternalpartners.
20
Whatittakestobeacybertransformer
Cybertransformersrelyheavilyonautomation.
89%ofcybertransformersrely
heavilyonautomation,comparedwithjust57%oftherest.
What’smore,96%ofrespondentswhose
organizationssubstantiallyautomatetheir
cybersecurityprogramsrecognizethat
automationhelpsthemalleviatecybertalentshortages,akeychallengeforanycompanyseekingcyberresilience.Asevidenceofaman+machineapproachbecomingmore
mainstream,Accentureanalysishasfoundthattheshareofcybersecurity-relatedAIpatentsincreased2.7XbetweenJanuary2017andOctober2022.
Casestudy
Inourownorganizationof738,000
employees,we’veembracedAIand
automationthroughourIntelligent
ApplicationSecurityPlatform.The
platformusesleadingcommercial
scanningtoolstoperformapplicationsecuritytestingatscaleandtodiscovervulnerabilitiesandcodeissues.Italsoautomates,orchestratesandscales
onboardingapplicationsaswellas
applicationtestingandpipelinegating.
Theplatformusesanartificial
intelligence-poweredfilterthat
removesandreducesvulnerabilities—fromseveralthousandtoafew—
resultinginacuratedandmoremanageableprocess.
Asaresult,thescanningservicehashelpedapplicationteamssave
thousandsofhoursthroughthe
automatedremovaloffalsepositivefindingsgeneratedbyscanningtools.
Whatittakestobeacybertransformer
Fast-emergingAI
developmentssuchas
generativeAIcandriveanewwaveofcybersecurity
advances.
Intime,generativeAIcouldsupportenterprisegovernanceandinformationsecurity,protectingagainstfraud,improvingregulatorycompliance,andproactivelyidentifyingriskbydrawingcross-domainconnectionsandinferencesbothwithinandoutsidetheorganization.3
Indeed,theemergenceofChatGPThasalreadybroughtbothdisruptionandopportunity,offeringtherapidadvancementofcybersecurity
capabilitiessuchasthreatdetection,analysisandresponseandaccelerateduseofautomationtoreduceworkloadandaugmentstaffing.
AsoneCISOnoted:
Thereisanargumentforautomating
SecurityOperationsCenter(SOC)level-onesupport—thingslikecreatingYararulesandmorecomplexqueries.
GenerativeAIalreadyhasthiscapability.However,Ibelieveyou’restillgoingtoneedhumanoversight.”
21
22
Whatittakestobeacybertransformer
Asour
research
shows,TotalEnterpriseReinventionisadeliberate
strategythataimstosetanewperformancefrontierforcompaniesand
inmostcases,theindustriesinwhichtheyoperate.
Cybertransformersarewellplacedtoexecutethatreinventionstrategythroughgainsthatareadirectresultofdifferentiatedcybersecurity
practicesandbehaviors.
Andwhilecybersecurityincidentswillstill
happeneveryday,onaverage,cyber
transformersreport26%lowercostof
breachesandcybersecurityincidentsinthe
past12monthsthantherest—that’smorethanaquarterofallcoststhatcouldbeallocated
acrosstheenterprisetooptimizeoperations,fuelgrowthandimproveresilience.
Casestudy
Alargeretailandcommercialbank
introducedagilecybersecuritydecisionmakingwhileundertakingtwodigital
transformations:movingtoaprivatecloudandcreatingnewproduct
offeringsusingthepubliccloud.
Thebank’sdecentralizedoperating
model,coupledwithembedding
cybersecurityearlyinthedigital
transformationprocess,hashelpedtoreducerisksandvulnerabilities,improvedataprotectionandenhanceitsoverallsecurityposture.
What’smore,thebankhasreducedcosts
anddowntimewhileimproving
compliance—andenhancingitsreputationasasecureandtrustworthyorganization.
23
Extrapressurepoints
Whilemanagingsecuredigitaltransformationisanimportantconsideration,our
researchshowsthereareotherongoingissuesthatcontinuetoputpressureonall
organizationsandinfluencethestateofcybersecurityresilience.Lookingacrossour
entiresetofglobalrespondents,theseadditionalpressurepointswererevealed.
Anuncertaingeopoliticallandscapeisacceleratingthreatsandattacks
Organizations’cyberresilienceis
underpressurefromongoing
geopoliticaltensions,especially
throughtheirsupplychains,physical
infrastructureandexternalnetworks.
Thewholeapproachtocyberriskis
underscrutiny,insideandoutside
Organizationsarefailingtokeeppace
withthescopeandscaleofcyberrisk.
There’sstillroomforimprovementin
cybersecurityandbusinessalignment
Organizationsarebetteraligning
cybersecuritywithbusinessleadership,
buttherearegapsintheeffectiveness
oftheirapproach.
24
Extrapressurepoints
Anuncertaingeopoliticallandscapeis
acceleratingthreatsandattacks
Organizations’cyberresilienceisunderpressurefromongoing
geopoliticaltensions,especiallythroughtheirsupplychains,
physicalinfrastructureand
externalnetworks,suchas
investmentpartners.
TheinfluenceofRussia’saggressionintheUkraineisbeingfeltbyalmosteveryone.
Nearlyallorganizations(97%)haveseenanincreaseincyberthreatssincethestartoftheRussia-Ukrainewarandalmostallsurveyrespondentshavetakensomeaction.
51%oforganizationshaveupdatedtheir
businesscontinuityandenterpriseriskplans
andnearlyhalfhaveincreasedtheirincident
responsecapabilities.Atthesametime,only
39%oforganizationsareprioritizingclose
collaborationwithgovernmentagencieson
policiesandrecommendationsinresponse
tothewar.Morethanhalf(54%)seethird
partiesandexternalnetworksasthemost
susceptibleareasforattack.
Indeed,consistentwithlastyear’sfindings,
thepercentageofsuccessfulbreachesfrom
outsidetheorganizationremainshigh,even
nudgingslightlyahead(61%comparedto
60%lastyear),whileforsomeindustries,
suchasUtilities,supplychainpartnerthreats
arehigheragainat62%.
25
Extrapressurepoints
Thewholeapproachtocyberriskisunder
scrutiny,insideandoutside
Organizationsarefailingtokeeppacewiththescopeandscaleofcyberrisk.
Cyberriskmanagementis
challenginginsidethe
organization.Lessthanhalfofallsurveyrespondentssaidthatjustoneaspectofenterpriserisk
management—theircyberrisk-basedframework—iscompletelyintegratedwithintheenterpriseriskmanagementprogram.
Theregulatorylandscapeplaysaparthere,withriskintegration
leapingto81%inthehighlyregulatedBankingindustryor65%fortheSoftwareand
Platformssector.
Andacceleratingtransformationwithoutaddressingsecurityalongthewaycanopenthedoorto
greaterrisk.
While35%ofrespondentssaid
theyembedsecuritycontrolsinalltransformationinitiativesfromthebeginning,therearestill18%whodeploysecurityaftertheevent.Totransformatspeed,securityshouldbebakedin,otherwise
organizationscanexpecttoincurmorecostorreworkdownthe
line(Figure3).
Cyberriskisalsomountingoutsidetheorganization,wherecyber
threatsareincreasingdueto
changesinthethreatlandscapeandcybersecurityomissionsleaveorganizationsexposed.
Figure3.Thesecurityofdigitaltransformationefforts
Deploysecurityaftertransformationisinitialized
onlyifvulnerabilitiesaredetected,ensuringwecan
movetransformationasfastaspossible
Implementsecuritycontrols,onlyforcritical
functions,balancingspeedandriskmanagement
Embedsecuritycontrolsinalltransformation
initiativesfromthebeginning
Source:AccentureStateofCybersecurityResilience2023N=2,500securityexecutivesand500businessleaders
Forexample,Russia’sinvasionofUkrainespurredreactionfrom
executivestoaddress
cybersecuritypractices,suchasupdatestobusinesscontinuity,incidentresponseandincreasingemployeecyberawareness.
Indeed,onlyone-thirdofall
respondents(35%)consider
cybersecurityrisk“toagreat
extent”whenevaluatingoverallenterpriserisk;thishighlights
thereisstillsomewaytogotomakecybersecurityaproactive,strategicnecessitywithin
thebusiness.
26
AsoneCISOreported:
Thebiggesthurdlesecurityleadershaveisexecutivepresence.Youneedto
demonstratebusiness
capabilityandvalueandengageinconversationsthatareaboutmorethanjustsecurity.”
Extrapressurepoints
There’sstillroomforimprovementin
cybersecurityandbusinessalignment
Organizationsarebetterataligningcybersecuritywithbusiness
leadership,buttherearegapsintheeffectivenessoftheapproach.
Businessleaders(CEOandCFOrespondentsintheresearch)expectCISOstogobeyondtheirtraditionaltechnicalroletoactasa
representativeoftheorganization.BusinessleadersreportedtheimportanceofCISOsadoptingcertaincharacteristics,suchas
translatingthetechnicalaspectsof
cybersecuritytotheCEOandBoard(44%),leadingtheresponseduringbreaches(42%)andestablishingtrustwithcustomers(41%).
Thesefindingsunderscoretheimportance
ofhavingabusiness-ledCISOwhoactsas
aneducatorandcollaboratorwithnon-
securityaudiences.
Inparticular,there’sagapbetweenCISOs
andbusinessleaderswhenitcomestoa
post-breachcommunicationstrategytothe
generalpublic.Andyet,asevery
organizationwhohasexperiencedanattack
knows,inthemiddleofacrisis,it’scriticalto
providequick,transparentcommunications
toinformandreassurestakeholders.
NearlyhalfofCISOssaidthatnodefined
executivewasresponsiblefor
communicatingexternallyduringabreach.
27
Extrapressurepoints
There’sstillroomforimprovementin
cybersecurityandbusinessalignment
Figure4.Communicationresponsibilitiesduringabreach
Securityexecutives
Businessleaders
Inaddition,thedifferencesinopinion
betweenCISOsandbusinessleaders
aboutthisresponsibilitymayindicatea
lackofclarityforpost-breach
communication(Figure4).
Thisisaredflagforthewholeenterprise
asitattemptstolimitthedamageofa
breachtoitsbrandandcustomer
satisfactionscores,identifiedasthemost
importantconsiderationfollowinga
breachby50%ofoursurveyrespondents.
Organizationshavearesponsibilityto
defineacrisiscommunicationsstrategy
thatisagile,thatconsidersthe
complexitiesofcybereventsandthat
Source:AccentureStateofCybersecurityResilience2023.N=2,500securityexecutivesand500businessleaders
clearlydefinesrolesandresponsibilitiesfor
communicatingwithstakeholders.
28
29
30
Wherenext?
Realistically,ifyou’renotlookingat
cybersecurityholistically,you’renot
fullyprotectingyourbusiness
Embedcybersecuritytoprotectthedigitalcore
Securityiscriticaltoenablingbusiness
agilityandscalabilityaswellasdriving
continuedinnovationandestablishinganorganization’sdigitalcore—onethat
empowersemployeesanddepartmentstoexperimentandscalewhilemitigatingrisk.
Whatyoucando:Takethethree
cybersecurityactionsandestablishastrongfoundationwithcybersecurityoperationalpractices
toimprovebusinessoutcomesandoverallperformance.
Wherenext?
Here’showyoucanemploycybersecuritytodrivebetterresults
Applycybersecurityto
reconciledigitaland
physicalworlds
Increasedaccess,devices,softwareandconnectivityacrosstheCloudContinuumandlegacyenvironmentshasresultedinanever-expandingthreatsurface.And
whilegenerativeAI4canheraldaneweraofagilityandcyberprotection,italsoactsasanewthreatvectorforcybercriminals.
Whatyoucando
Investinunderstandingyourdata,itsvalue
andwhohasaccess.Re-examine
enterpriseandcustomeridentitytobetterbridgethephysicalanddigitalworlds.
Establishenhancedmonitoringand
visibilityacrossbothlegacyandcloudenvironmentsusingendpointdetectionandresponse(EDR)andsecurity
orchestration,automationandresponse(SOAR)technologies.
Makecybersecurity
partofthefabricof
transformation
Thetraditionalapproachto
cybersecurityisunsustainable.Aglobalshortageofcybersecuritytalentto
handleongoingthreatsiscompoundedbyfewerpeopleavailabletohandlethe
effectsofcyberattacksonan
organization’sbusinesscontinuity,
economicsandreputation.Thelinesarebecomingblurredaroundwhen
transformationbeginsandends.
Whatyoucando
Makecybersecurityacornerstoneof
yourtransformationeffortsandelevatetheCISOreportingsothatthefunction
isfundamentaltobusiness
transformationefforts.
31
32
Wherenext?
Fromriskassessmentandmanagementto
securitycontrolimplementation,andfrom
securityawarenessandtrainingto
incidentresponseandrecovery,
cybersecurityisessentialtomaintain
dynamicprotectioninevery
transformationprogram.What’smore,as
ourcybertransformersshow,business
leadershaveanopportunitytomake
cybersecurity’simpactextendbeyond
protectingthebusinessinthehereand
now,toactivelyinfluencecontinuous,
dynamicreinvention.
33
Abouttheresearch
Demographics
OurStateofCybersecurity
Resilience2023researchinvolved3,000globalrespondentsfrom15industriesacross14countries.We
wantedtounderstandtheroleof
cybersecurityinorganizations’
approachtotransformationandthebroadercybersecuritypracticesthatfacilitatesecuredigital
transformation.Therespondents
representorganizationswithannualrevenuesof$1billionormoreacrossNorthandSouthAmerica,Europe
andAsiaPacific.
3,000
TotalRespondents
2,500Securityexecutives
500Businessleaders(CEO,CFO)
US$1B+
Revenues
14
Countries
Australia(234)
Brazil(100)
Canada(115)
France(201)
Germany(223)
Ireland(102)
Italy(200)
Japan(221)
Netherlands(101)Norway(100)
SaudiArabia(55)
Spain(100)
UnitedKingdom(360)UnitedStates(888)
15
Industries
Banking(265)HealthcarePayers(102)(100)
CapitalMarkets(177)HealthcareProvidersRetail(259)
Chemicals(186)(130)Software&Platforms
ConsumerGoods&HighTech(209)(135)
Services(288)Insurance(209)Telecommunications
Energy–OilandGasLifeSciences(199)(202)
(277)USFederalServicesUtilities(262)
34
35
Methodology
Surveydataanalysis
Weusedstandardsurveydataanalysistounderstandtheoveralllandscapeaswellascharacteristicsofvarious
groupsinoursample;inparticularwecomparedcyber
transformerswhomadeup30%ofthesecurityexecutivesinthesample(741respondents)andtherestofthesecurityexecutives(1,759respondents).Wedefinedcyber
transformersasorganizationsthathaveaccelerateddigitaltransformationeffortsandplantocontinueacceleratingthemoverthenexttwoyears.
Compositeindicators
Weconstructedtwoindependentindexestocapturehowadvancedcompaniesareinmorecomplexareas.
1.Ecosystemprotectionindex.Incorporatesoursurveydataandisbasedonthenumberofpositiveanswerstoquestionsonecosystemprotecti
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2023中暑后如何进行合理的预防-中暑预防
- 部编版四年级下册道德与法治期末测试卷(预热题)
- 小学六年级下册数学期末测试卷含答案(突破训练)
- 人教版六年级下册数学期末测试卷及完整答案【易错题】
- 人教版六年级下册数学期末测试卷含答案(满分必刷)
- 人教版六年级下册数学期末测试卷附完整答案(全优)
- 人教版四年级下册数学期末测试卷及参考答案(巩固)
- 人教版四年级下册数学期末测试卷及答案(名师系列)
- 人教版四年级下册数学期末测试卷附答案【轻巧夺冠】
- 小学六年级下册数学期末测试卷及答案【有一套】
- 数学研究性学习.测量学校旗杆、建筑物的高度.doc
- 生物化学实验论文 从啤酒酵母中提取蔗糖酶
- 国家开放大学《土木工程力学(本)》形考作业1-5参考答案
- 2021医学考研复试:心血管内科[SC长难句翻译文]
- API-685-中文_
- 食堂食品定点采购询价记录表
- 有趣的汉字小故事(课堂PPT)
- 治疗颈肩腰腿痛的中药配方及蜜丸的制作办法
- 小学五年级下册美术课件-第18课映日荷花别样红-浙美版(17张)ppt课件
- 化肥安全应急预案 化肥公司应急预案 .doc
- 上市公司对外投资管理制度与内控流程
评论
0/150
提交评论