The cyber-chasm: How the disconnect between the C-suite and security endangers the enterprise

Research Methodology

In January-February 2016, the EIU, surveyed 1,100 senior executives on data security practices within their firms. The survey’s primary objective was to analyse the differences, if any, between the C-suite and senior IT executives on data security.

The survey sample was recruited from companies with between $500 million and $10 billion in revenues, and is equally representative of the Americas, Asia-Pacific and European regions. The panel came from 20 industries, with no single industry accounting for more than 14% of the total.

The cyber-chasm: How the disconnect between the C-suite and security endangers the enterprise

Not so, according to a new global survey by The Economist Intelligence Unit (EIU), sponsored by VMware. Instead, the research found a systematic disconnect between C-suite executives and senior technology leaders—a divide that can imperil the security of the firm.

Download the full report to learn more.

Ready. Or not...

The ability of businesses across Europe, the Middle East and Africa to manage a range of emerging risks is not what it should be. This needs to change.

Measuring the soft costs of cybercrime: a hard problem in need of a solution

Cyberattacks come in many forms, and each can entail soft costs of different kinds and magnitudes. Cyberthieves could steal sensitive personal data, taking the trust of current and future customers with them. “Hacktivists” could immobilize a website, causing customer frustration and bad press. Competitors could lift product designs and take over the market with low-cost copies. And hostile nations could disrupt or destroy services and facilities vital to a healthy economy.

What’s in a number? Estimating the cost of cybercrime

If you need to understand property crime in the US, visit the Federal Bureau of Investigation’s website. Its Uniform Crime Report will tell you how many offenses were committed nationally in 2011 (9,063,173) and of what type (burglary 24%, larceny 68% and motor vehicle theft 7.9%). It will also give you an estimate of how much property crime cost the US economy that year ($15.6bn).

Holistic risk management

Report Summary

Businesses have always been exposed to risk, and the obligation to manage it is nothing new. However, there is a growing concern among business leaders that they are exposed to strategic risks that threaten the very existence of their company. 

Most companies are not equipped to handle these strategic risks and responsibility for individual risks—such as legal, audit, cyber security and safety—is divided among separate divisions.

Terror-bite: Small companies come under attack

Smaller businesses are traditionally considered to be less of a target for cyber-attacks and consequently less prepared for these threats. During a study of Austrian organisations, Stefan Fenz, a researcher at the Vienna University of Technology, found that size of a business is much more of a useful indicator of preparedness levels than industry or sector.

Priming the pump: Corporate involvement in the classroom

                                 

When Northwestern University launched its new Master of Science in Analytics degree in early 2012, university leadership envisaged a small programme—a tight community of 20 students.  Northwestern received more than 200 applications during the programme’s inaugural year. This year, they have increased the size of the programme by 50% to 30 students and have received over 380 applications

Strategic sensors

Sensors embedded in products are the technology set to grow the most in strategic significance in the next three to five years, Economist Intelligence Unit research has found

Top Tech Trends for 2015

Cyber security, data analytics and private cloud are the top priorities for IT investment in 2015, according to a new survey of over 500 IT and business executives from around the globe. 

The survey, conducted by The Economist Intelligence Unit for PwC, asked 503 executives which technologies they are currently investing in and how they plan to modify their investment in 2015. 

The key findings are as follows:

Enjoy in-depth insights and expert analysis - subscribe to our Perspectives newsletter, delivered every week