The Future of the Digital Enterprise – Australia & New Zealand

5/5 (1)

5/5 (1)

Organisations in Australia and New Zealand (ANZ) are focusing their digital transformation efforts on continued innovation in the experiences they deliver to their customers and employees.

Innovation has been at the core of organisations’ survival strategies – now it will be the means to gain competitive advantage and is getting prioritised over resiliency, business continuity and compliance.  

Here are 5 insights on where ANZ organisations are headed in the tech priorities and investments, based on the findings of the Ecosystm Digital Enterprise Study, 2022.

  • Tech Teams in ANZ are restructuring after a two-year struggle and as they face skills shortage.
  • Tech investments are focusing on experience and digital workplace and customer experience technologies are seeing continued growth.
  • Hybrid cloud investments are focused on augmenting existing infrastructure – whether public or on-prem
  • Sales & Marketing are leveraging data & AI solutions the most; IT Ops and SecOps will see un uptick in 2023
  • Cybersecurity practices are not evolving fast enough with only 9% of organisations having implemented Zero Trust

More insights into the ANZ tech market below.

The-Future-of-the-Digital-Enterprise-ANZ-1
The-Future-of-the-Digital-Enterprise-ANZ-2
The-Future-of-the-Digital-Enterprise-ANZ-3
The-Future-of-the-Digital-Enterprise-ANZ-4
The-Future-of-the-Digital-Enterprise-ANZ-5
The-Future-of-the-Digital-Enterprise-ANZ-6
The-Future-of-the-Digital-Enterprise-ANZ-7
The-Future-of-the-Digital-Enterprise-ANZ-8
previous arrowprevious arrow
next arrownext arrow
The-Future-of-the-Digital-Enterprise-ANZ-1
The-Future-of-the-Digital-Enterprise-ANZ-2
The-Future-of-the-Digital-Enterprise-ANZ-3
The-Future-of-the-Digital-Enterprise-ANZ-4
The-Future-of-the-Digital-Enterprise-ANZ-5
The-Future-of-the-Digital-Enterprise-ANZ-6
The-Future-of-the-Digital-Enterprise-ANZ-7
The-Future-of-the-Digital-Enterprise-ANZ-8
previous arrow
next arrow
Shadow

Click here to download The Future of the Digital Enterprise – Australia & New Zealand as a PDF

More Insights to tech Buyer Guidance
0
Shaping your Cyber Practice in 2022

5/5 (1)

5/5 (1)

Against a backdrop of extended disruption, cybersecurity risks are expanding rapidly and current defences are inadequate. Ransomware attacks are increasing in frequency and impact, focusing more on targets where outages are not an option, such as critical infrastructure and hospitals. Supply chain attacks are creating chaos and has led to a much-needed focus on supply chain vulnerabilities.

As digitalisation continues at a faster pace, cybersecurity is too often, a secondary concern.

With the acceleration of cloud adoption; widespread remote working; the resulting proliferation of endpoints; and the expansion of attack surface for malicious actors, this is the time for organisations to transform their cybersecurity approaches.

Here are the 5 steps that you should consider:

  • Having CISOs report directly into top management – bypassing CIOs
  • Focusing on configuration management
  • Building resilience against ransomware attacks
  • Migrating away from a legacy perimeter-based approach
  • Shifting to Policy-as-Code

In 2022, attacks on organisations will grow in frequency and intensity. Organisations need to transform their approaches to cybersecurity. This involves embracing new concepts such as zero-trust and Secure Access Service Edge (SASE) as well as a stronger focus on policy as code and human factors.

Shaping-your-Cyber-Practice-in-2022-1
Shaping-your-Cyber-Practice-in-2022-2
Shaping-your-Cyber-Practice-in-2022-3
Shaping-your-Cyber-Practice-in-2022-4
Shaping-your-Cyber-Practice-in-2022-5
Shaping-your-Cyber-Practice-in-2022-6
Shaping-your-Cyber-Practice-in-2022-7
Shaping-your-Cyber-Practice-in-2022-8
previous arrowprevious arrow
next arrownext arrow
Shaping-your-Cyber-Practice-in-2022-1
Shaping-your-Cyber-Practice-in-2022-2
Shaping-your-Cyber-Practice-in-2022-3
Shaping-your-Cyber-Practice-in-2022-4
Shaping-your-Cyber-Practice-in-2022-5
Shaping-your-Cyber-Practice-in-2022-6
Shaping-your-Cyber-Practice-in-2022-7
Shaping-your-Cyber-Practice-in-2022-8
previous arrow
next arrow
Shadow

Click here to download Shaping your Cyber Practice in 2022 as a PDF

Cybersecurity Insights
0
What Makes the Great Bounce Forward Different to the New Normal?

5/5 (3)

5/5 (3)

One of the main questions that I have faced over the past week, since I wrote the  Ecosystm Insight – Welcome to the Great Bounce Forward – is “How is this different to the “New Normal”? Many have commented that the concept of the Great Bounce Forward is more descriptive and more positive than the term “New Normal” – but I believe they are different, and require different strategies and mindsets.

What makes the great bounce forward different to the new normal

This is a brief summary of some of the major differences between the New Normal and the Great Bounce Forward. I look forward with excitement and some trepidation towards this future. One where business success will be dictated not only by our customer obsession, but also the ability of our business to pivot, shift, change and adapt.

I can’t tell you what will happen in the future – a green revolution? Another pandemic? A major war? A global recession? Market hypergrowth? All the people living life in peace? Imagine that…

What I can tell you is what your organisation needs to do to be able to meet all of these challenges head-on and set yourself up for success. And to me, that won’t look like the new normal. There is nothing normal about these business capabilities at all.

More Insights to tech Buyer Guidance
0
Ecosystm Predicts: The Top 5 Cybersecurity & Compliance Trends for 2021

5/5 (1)

5/5 (1)

Ecosystm research finds that 47% of organisations re-evaluated cybersecurity risks and management making it the biggest measure undertaken by IT Teams when COVID-19 hit. There is no denying any more that cybersecurity is a key business enabler. This year witnessed cybercrime escalating in all parts of the world and several governments issued advisories warning enterprises and citizens of the increase in the threat landscape, during and post COVID-19. Against this backdrop, Ecosystm Advisors, Alex Woerndle, Andrew Milroy, Carl Woerndle and Claus Mortensen present the top 5 Ecosystm predictions for Cybersecurity & Compliance in 2021.

This is a summary of the predictions, the full report (including the implications) is available to download for free on the Ecosystm platform here.

The Top 5 Cybersecurity & Compliance Trends for 2021

  1. There will be Further Expansion of M&A Activities Through 2021 and Beyond

As predicted last year, the market is set to witness mergers and acquisitions (M&As) to consolidate the market. The pandemic has slowed down M&A activities in 2020. However, the market remains fragmented and there is a demand for consolidation. As the cyber market continues to mature, we expect M&A activities to ramp up over the next couple of years especially once we emerge from COVID-19.  Some organisations that understand the full impact of the shift to remote working and the threats it creates have embraced the opportunity to acquire, based on perceived value due to COVID-19. The recent acquisition of Asavie by Akamai Technologies is a case in point. Asavie’s platform is expected to strengthen Akamai’s IoT and mobile device security and management services.

  1. After a Year of Pandemic Leniency, Regulators will Get Stricter in 2021

The regulators in the EU appear to have gone through a period of relative leniency or less activity during the first few months of the pandemic and have started to increase their efforts after the summer break. Expect regulators – even outside the EU – to step up their enforcement activities in 2021 and seek larger penalties for breaches.

Governments continue to evolve their Compliance policies across broader sectors, which will impact all industries. As an example, in Australia, the Federal Government has made changes to its definition of critical infrastructure, which brings mandates to many more organisations. Governments have shown an acute awareness of the rise in cyber-attacks highlighted by several high-profile breaches reported in mainstream media. Insider threats – highlighted by Tesla, where an employee raised the allegations of bribery by unknown third parties in exchange for exfiltrating corporate information – will also lead regulators to double down on their enforcement activities.

  1. The Zero Trust Model Will Gain Momentum

Remote working has challenged the traditional network security perimeter model. The use of personal and corporate devices to access the network via public networks and third-party clouds is creating more opportunity for attackers. Organisations have started turning to a Zero Trust security model to mitigate the risk, applying advanced authentication and continuous monitoring. We expect the adoption of the Zero Trust model to gain momentum through 2021. This will also see an increase in managed services around active security monitoring such as Threat Detection & Response and the increased adoption of authentication technologies. With an eye on the future, especially around quantum computing, authentication technologies will need to continually evolve.

  1. The Endpoint Will be the Weakest Link

The attack surface continues to grow exponentially, with the increase in remote working, IoT devices and multicloud environments. Remote endpoints require the same, if not higher levels of security than assets that sit within corporate firewalls, and it will become very clear to organisations that endpoints are the most vulnerable. Remote workers are often using unsecure home Wi-Fi connections and unpatched VPNs, and are increasingly vulnerable to phishing attacks. IoT device passwords are often so weak that brute-force attackers can enter networks in milliseconds.

Although endpoint security can be dealt with through strict policies together with hardware or software authentication, the difficult part is to adopt an approach that retains a relatively high level of security without having a too negative an impact on the employee experience. Experience shows that if the security measures are too cumbersome, employees will find ways to circumvent them.

  1. Hackers Will Turn the Table on AI Security

Cybersecurity vendors are increasingly offering solutions that leverage AI to identify and stop cyber-attacks with less human intervention than is typically expected or needed with traditional security approaches. AI can enhance cybersecurity by better predicting attacks enabling more proactive countermeasures, shortening response times, and potentially saving cybersecurity investment costs. The problem is that the exact same thing applies to the hackers. By leveraging AI, the costs and efforts needed to launch and coordinate large hacker attacks will also go down. Hackers can automate their attacks well beyond the use of botnets, target and customise their attacks with more granularity than before and can effectively target the biggest weakness of any IT security system – people.

Already, phishing attacks account for many of the breaches we see today typically by employees being tricked into sharing their IT credentials via email or over the phone. As we move forward, these types of attacks will become much more sophisticated. Many of the deepfake videos we see have been made using cheap or free AI-enabled apps that are easy enough for even a child to use. As we move into 2021, this ability to manipulate both video and audio will increasingly enable attackers to accurately impersonate individuals.


New call-to-action
5