archive-com.com » COM » P » PWC.COM

Total: 2203

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Global State of Information Security (R) Survey 2016: Contacts: PwC
    LinkedIn China Megan Haas Partner 852 2289 1911 Ramesh Moosa Partner 86 21 2323 8688 Connect on LinkedIn Kenneth Wong Partner 852 2289 2719 Connect on LinkedIn India Sivarama Krishnan Partner 0124 633 06018 Connect on LinkedIn Japan Yuji Hoshizawa Partner Maki Matsuzaki Partner Naoki Yamamoto Partner Korea Soyoung Park Partner 82 2 709 4798 New Zealand Adrian van Hest Partner 64 21 479 105 Connect on LinkedIn Russia Tim Clough Partner 7 495 967018 Singapore Vincent Loy Partner 65 9088 6328 Connect on LinkedIn Jimmy Sng Partner 65 6236 3808 Connect on LinkedIn South East Asia Jimmy Sng Partner 65 6236 3808 Connect on LinkedIn Bhagya Perera Director 65 6236 7270 Connect on LinkedIn Sean Gunasekera Director 65 9025 9883 Connect on LinkedIn Austria Christian Kurz Senior Manager 43 1 501 88 1407 Belgium Filip De Wolf Partner 32 2 710 4251 Connect on LinkedIn Denmark Christian Kjær Director 45 3945 3282 Mads Nørgaard Madsen Partner 45 2811 1592 France Philippe Trouchaud Partner 33 15657 8248 Germany Derk Fischer Partner 49 211 981 2192 Wilfried Meyer Partner 49 511 5357 5812 Italy Fabio Merello Partner 39 0266720212 Connect on LinkedIn Luxembourg Vincent Villers Partner 352 49 48 48 2367 Connect on LinkedIn Netherlands Otto Vermeulen Partner 31887926372 Connect on LinkedIn Bram van Tiel Director 31 0 887925388 Norway Tom Remberg Director 47 95 26 07 16 Connect on LinkedIn Poland Rafal Jaczynski Director 48 22 746 7122 Connect on LinkedIn Jacek Sygutowski Director 48 519 504 954 Piotr Urban Partner 48 12 433 3557 Connect on LinkedIn Spain Jordi Juan Guillem Director 34 915 684 086 Elena Maestre Partner 34 915 684 120 Sweden Martin Allen Director 46 0 10 2129380 Rolf Rosenvinge Director 46 0 10 2128284 Switzerland Rodney Fortune Manager 41 58 792 1946 Chris Hemmi Manager

    Original URL path: http://www.pwc.com/gx/en/issues/cyber-security/information-security-survey/global-contacts.html (2016-02-10)
    Open archived version from archive


  • Global State of Information Security® Survey 2016: Download: PwC
    Spotlight The CEO agenda CEO insights blog Careers About PwC Technology careers Employer of choice Our history PwC Professional Employability Aspire to lead PwC s series on leadership and gender equality Country job search Explore careers with Strategy Press room Facts and figures Press contacts Analyst relations Global International PwC Sites Commonly visited PwC sites Global Australia Brazil Canada China Hong Kong France Germany India Italy Japan Mexico Middle East Netherlands Russia Singapore South Africa South Korea Spain Sweden Switzerland United Kingdom United States Complete list of PwC territory sites The Global State of Information Security Survey 2016 Download the full report To read insights from The Global State of Information Security Survey 2016 select from any or all of the components listed below to create a customized PDF Select to create a single customised PDF Main report Industry summaries Financial services Retail and consumer Public sector Industrial products Entertainment media and communications Telecommunications Automotive Technology Power utilities Select All Clear All The Global State of Information Security is a registered trademark of International Data Group Inc GSISS home Key themes Industry summaries Explore the data About the survey Contact our global team Download the full report Industry summaries Explore

    Original URL path: http://www.pwc.com/gx/en/issues/cyber-security/information-security-survey/download.html (2016-02-10)
    Open archived version from archive

  • Automotive industry focus: Global State of Information Security Survey: PwC
    PwC Sites Commonly visited PwC sites Global Australia Brazil Canada China Hong Kong France Germany India Italy Japan Mexico Middle East Netherlands Russia Singapore South Africa South Korea Spain Sweden Switzerland United Kingdom United States Complete list of PwC territory sites The Global State of Information Security Survey 2016 Automotive summary Many automotive organisations are taking action to bolster their cybersecurity and privacy capabilities according to The Global State of Information Security Survey 2016 They are strengthening cybersecurity programmes by implementing technologies such as cloud based cybersecurity Big Data analytics and advanced authentication On ramp to the Internet of Things The connected automobile is rapidly becoming a high profile example of the Internet of Things IoT technology In fact automotive organisations are already deeply involved in technologies and services that link vehicles to their operational and IT systems Risks are also on the rise The survey found that security compromises to components that underpin the IoT including operational systems embedded devices and consumer technologies more than doubled in 2015 More than two thirds of survey respondents have an IoT security strategy in place or are implementing guidelines Addressing threats from within Employees were cited as the leading source of compromise They are not the only source of rising insider threats however This year more than two thirds of respondents attributed security incidents to business partners such as supply chains and resellers which often have trusted access to an organisation s internal networks and data Many automotive organisations are leveraging Big Data analytics built on cloud architecture to monitor for suspicious user activity and address these insider threats Intensifying regulatory scrutiny The potential for new regulatory oversight is a key concern for many automotive executives Organisations should prepare by closely following regulatory developments in order to update internal compliance controls processes

    Original URL path: http://www.pwc.com/gx/en/issues/cyber-security/information-security-survey/industry/automotive.html (2016-02-10)
    Open archived version from archive

  • Financial services industry focus: Global State of Information Security Survey: PwC
    Hong Kong France Germany India Italy Japan Mexico Middle East Netherlands Russia Singapore South Africa South Korea Spain Sweden Switzerland United Kingdom United States Complete list of PwC territory sites The Global State of Information Security Survey 2016 Financial services summary Key findings from The Global State of Information Security Survey 2016 As cyberattacks continue to escalate forward leaning financial services firms are beginning to leverage and link innovative cybersecurity tools many of them cloud enabled These organisations are improving their security programmes with technologies such as cloud based cybersecurity services Big Data analytics and advanced authentication and biometrics The top challenge Third party security Financial services respondents ranked assessment of security capabilities of third party vendors as the top challenge to their information security efforts Some businesses are improving third party cooperation through the use of risk based security frameworks These guidelines can also help companies more easily exchange information with third party business partners and suppliers and communicate expectations and concerns about services that are being provided Use of mobile devices and payments mounts Around the world the use of mobile devices and apps for consumer banking has exploded To secure those interactions financial services respondents say mobile device security is a leading spending priority in 2015 One way that financial institutions are tackling the rise in mobile risks is through the use of advanced authentication Complex attacks from abroad Financial services companies have long dealt with sophisticated actors like organised crime but some cite a worrisome trend Certain threat actors seem to be working together to carry out attacks Perhaps even more menacing some financial services executives believe that organised crime and foreign nation states are joining forces to perpetrate cybercrime Many organisations are fighting back with the use of Big Data analytics to monitor for covert

    Original URL path: http://www.pwc.com/gx/en/issues/cyber-security/information-security-survey/industry/financial-services.html (2016-02-10)
    Open archived version from archive

  • Industrial products industry focus: Global Information Security Survey: PwC
    Australia Brazil Canada China Hong Kong France Germany India Italy Japan Mexico Middle East Netherlands Russia Singapore South Africa South Korea Spain Sweden Switzerland United Kingdom United States Complete list of PwC territory sites The Global State of Information Security Survey 2016 Industrial products summary Forward leaning organisations are taking steps to capitalise on the opportunities of the Internet of Things IoT while leveraging innovative cybersecurity technologies and solutions many of them cloud enabled to manage potential risks These businesses are improving their security programmes with technologies including cloud based cybersecurity services advanced authentication and Big Data analytics The vast majority of organisations also have adopted risk based cybersecurity frameworks such as the NIST Cybersecurity Framework or ISO 27001 to help guide their overall security practices A strategy for the Internet of Things Manufacturers are already deploying interconnected equipment and sensor based devices across locations to more efficiently run plant systems and enhance operations and logistics A majority of organisations are developing strategies to secure these interconnected devices equipment and data In fact roughly two thirds of survey respondents either have an IoT security strategy in place or are currently implementing a strategy Big Data will get bigger In 2015 half of survey respondents said they use Big Data analytics to model for and identify cybersecurity threats The benefits include better understanding of external and internal security threats enhanced visibility into anomalous network behaviour and an improved ability to identify and mitigate incidents Printing the future in 3D While most businesses have yet to adopt 3D printing for high volume production the technology is poised to disrupt manufacturing as we know it Already 42 of industrial products respondents said they use or plan to use 3D printing in the manufacturing process This transformation however may increase risk to trade secrets

    Original URL path: http://www.pwc.com/gx/en/issues/cyber-security/information-security-survey/industry/industrial-products.html (2016-02-10)
    Open archived version from archive

  • Power and Utilities , Global State of Information Security Survey: PwC
    International PwC Sites Commonly visited PwC sites Global Australia Brazil Canada China Hong Kong France Germany India Italy Japan Mexico Middle East Netherlands Russia Singapore South Africa South Korea Spain Sweden Switzerland United Kingdom United States Complete list of PwC territory sites The Global State of Information Security Survey 2016 Power and utilities summary Power and utilities organisations face a raft of challenges as a result of evolving business models distributed generation and increasing demands of connected customers At the same time they should safeguard their operational systems from escalating attacks by highly skilled nation states To address these challenges power and utilities companies are implementing cloud based cybersecurity Big Data analytics and advanced authentication Additionally more organisations share cybersecurity threat intelligence than ever before Protecting the assets that matter While current employees remain the most cited source of cybersecurity incidents this year we saw a startling jump in incidents attributed to foreign nation states organised crime and terrorists Not surprisingly this increase corresponds with a dramatic rise in theft of intellectual property To help protect these assets organisations are leveraging Big Data analytics to increase awareness of internal and external threats as well as enhance understanding of anomalous network activity They are also adopting cloud based cybersecurity services such as real time monitoring and analytics Additionally respondents said that advanced authentication technologies help improve customer confidence in the company s cybersecurity and privacy capabilities The human side of cybersecurity Because technology alone will not eliminate all cyber risks many power and utilities organisations are addressing the human aspects of cybersecurity Increasingly they are sharing cybersecurity threat intelligence with external partners to better identify and respond to risks Internal collaboration also is on the rise as more Boards of Directors become involved in security issues Participation is highest in discussions

    Original URL path: http://www.pwc.com/gx/en/issues/cyber-security/information-security-survey/industry/power-utilities.html (2016-02-10)
    Open archived version from archive

  • Public sector industry focus: Global State of Information Security Survey:PwC
    Spain Sweden Switzerland United Kingdom United States Complete list of PwC territory sites The Global State of Information Security Survey 2016 Public sector summary The public sector is taking proactive steps to rethink cybersecurity and address top security priorities Many are implementing technologies such as cloud based cybersecurity advanced authentication and Big Data analytics The vast majority has adopted one or more risk based cybersecurity frameworks and more organizations are collaborating with others to share cybersecurity intelligence 24 7 monitoring for incidents Public sector respondents ranked continuous monitoring of IT networks and user activity as their highest security priority for the coming year Many organizations said they are improving monitoring capabilities by implementing a security operations center SOC Public sector agencies are also leveraging Big Data analytics as a means to enhance monitoring and strengthen cybersecurity Enhancing cybersecurity with cloud computing The use of cloud computing in the public sector increased significantly in 2015 and respondents said that 42 of their systems have been moved to the cloud The technology also has emerged as a sophisticated tool for cybersecurity safeguards in recent years with more than half of respondents using some form of cloud enabled cybersecurity services Making mobile devices more secure As more employees use personal smartphones and tablets in the workplace the security of mobile devices has become an increasingly pressing priority More than half of respondents believe that use of mobile tools has impaired security they also reported that exploits of these devices soared 52 in 2015 Better ways to manage access Globally public sector organizations are employing cloud based services to tackle a core cybersecurity requirement identity and access management In fact more than 40 of respondents said they have adopted cloud enabled advanced authentication and identity and access management services Why compliance is key While

    Original URL path: http://www.pwc.com/gx/en/issues/cyber-security/information-security-survey/industry/public-sector.html (2016-02-10)
    Open archived version from archive

  • Retail and consumer industry focus: Global State of Information Security Survey: PwC
    France Germany India Italy Japan Mexico Middle East Netherlands Russia Singapore South Africa South Korea Spain Sweden Switzerland United Kingdom United States Complete list of PwC territory sites The Global State of Information Security Survey 2016 Retail and consumer summary Retail and consumer companies are taking decisive action to bolster their cybersecurity capabilities Many are moving to strengthen their cybersecurity posture by implementing technologies such as cloud based cybersecurity advanced authentication and Big Data analytics This year average information security spending soared 67 Given the rash of high profile breaches it was not surprising that companies boosted security spending the real challenge however may be achieving sustained results from these investments Securing payment channels Many organisations are focusing on improving the security of payment channels In the US companies were rushing to complete the migration to the EMV Europay MasterCard and Visa standard for payment card systems In addition to the EMV migration retail and consumer companies said they also were exploring other technologies and processes to protect customer data including point to point encryption next generation firewalls and tokenisation Addressing risks of business partners Assessment of the security capabilities of third party business partners cloud providers in particular has emerged as a top priority for many retail and consumer companies Most said they conduct assessments twice a year or more frequently Many are using risk based security frameworks to improve third party cooperation These guidelines can help companies more easily exchange information with third party business partners and suppliers and communicate expectations and concerns about services that are being provided The elevated roles of the CISO and Board Internally businesses are expanding the roles of the Chief Information Security Officer CISO and the Board of Directors to improve understanding of cyberthreats and help build resilient risk based cybersecurity capabilities

    Original URL path: http://www.pwc.com/gx/en/issues/cyber-security/information-security-survey/industry/retail-consumer.html (2016-02-10)
    Open archived version from archive