For 20 years, leaders have turned to Global State of Information Security® Survey (GSISS) as a trusted resource to navigate the cyber risk landscape. Over time, that landscape has evolved to be less about information security and more about managing digital risk.
As cybersecurity, privacy and data ethics become increasingly intertwined, organizations need a central place to turn for actionable advice. So PwC has developed Digital Trusts Insights, a new platform that explores how to build confidence in the readiness of people, processes and technologies to meet tomorrow’s challenges.
Trust is critical. Build yours now.
Cyber disruptions
Our digital society's ever-growing reliance on data and interconnectivity is ushering in new risks of large-scale cybersecurity incidents with cascading disruptive consequences. We examine how businesses can develop resilience to withstand these disruptions and thrive in the marketplace.
The growth in digital devices is driving risk management
With the internet of things (IoT) becoming ubiquitous, and consumers demanding products with an emphasis on cybersecurity and privacy, organizations are revamping their security policies. Key IoT investment areas include policies and technologies to protect consumer privacy, as well as data governance policies.
Policies and technologies implemented to address risks associated with IoT
Business leaders see new risks tied to emerging technologies
Business leaders are clear-eyed about new risks tied to emerging technologies. GSISS respondents recognize that a successful cyberattack on automated or robotic systems could have major consequences, including the disruption of operations, the compromise of sensitive data and damage to product quality.
Critical consequences of a cyberattack on automation or robotics systems
Cyber threats to the integrity of data are a rising concern
Cyberattacks that manipulate or destroy data can undermine trusted systems without the owner’s knowledge and have the potential to damage critical infrastructure.
Data impacts of security incidents
Current employees remain the top source of security incidents
Incidents attributed to hackers, competitors and other outsiders have declined. However, those attributed to insiders, such as third parties—including suppliers, consultants and contractors—and employees, have stayed about the same or increased.