SlideShare uma empresa Scribd logo
1 de 22
Baixar para ler offline
Abu Dhabi
Beijing
Berlin
Brussels
Dallas
Dubai
Frankfurt
Hong Kong
Johannesburg
London
Milan
Mumbai
Munich
New York
Paris
Rome
San Francisco
São Paulo
Shanghai
Singapore
Stockholm
Vienna
Washington, D.C.
Brunswick Data
Valuation Survey
October 2016
© Brunswick Insight 2016
2
Who We Surveyed
Audience:
Buy-side investors and Sell-side analysts across North America, Europe, the United
Kingdom, and Asia
Data Collection: August 29th though September 16th, 2016
Sample Size: 208 investors. Margin of error of 6.8%.
Notes:
Data presented in the 2016, 2015, and 2014 surveys have been weighted by
country to allow accurate comparison.
3
Key Findings - 2016
Increasing Importance to
Protect Customer Data
All Attention on the Company
CEO During a Breach
During a data breach, investors will
pay close attention to the response of
a the afflicted company and expect
to hear from the CEO.
For investors, the response from the
company is just as important as the
scale of the breach, and both are top
priorities for investors as they
consider their valuations.
While investors believe that all levels
of a company need to understand
cybersecurity risks, the CEO is the
individual with the most
responsibility to communicate.
Investors view the security of
customer data as among the most
important cybersecurity factors
that can inform their valuation.
The percentage of investors who
have made an investment based on
the security of customer data has
increased in each year of this
survey and is seen as the most
important cybersecurity issue in
global M&A.
Data Breaches Can Reduce
Valuations During M&A
Even after a company has been
acquired as a result of an M&A,
investors may decrease their valuation
of the company if they learned that the
acquired company suffered a data
breach in the past.
Investors are much more likely to
increase their valuation of a company if
they learned that it took proactive
steps to mitigate against potential
cybersecurity risks.
Reactive responses, including working
with law enforcement, can decrease a
valuation.
4
Impact of Data Breaches on
Mergers and Acquisitions
© Brunswick Insight 2016
5
Data Valuation During M&A
Investors will not decrease their valuation if a network security firm assists
with data integration
How would that impact your valuation of the company?
4%
4%
1%
13%
20%
25%
28%
52%
9%
8%
9%
9%
57%
48%
53%
21%
8%
13%
6%
2%
Significantly increase Somewhat increase No impact
Don’t Know Somewhat decrease Significantly decrease
Learning that the companies involved in the merger
will need to spend a large amount of time
integrating the data from different data systems
Learning that the data integration will be a
significant cost of the merger
Learning that one of the companies involved in the
merger had its security compromised in a data
breach in the past
Learning that the merger will require a network
security firm to be brought in to help manage the
data integration
Impact on Valuation During an M&A
65%
61%
59%
23%
© Brunswick Insight 2016
6
Data Valuation After Acquisition
The legacy of a data breach can still decrease a valuation after an acquisition
How would that impact your valuation of the company?
4%
5%
2%
31%
24%
34%
10%
36%
51%
58%
48%
65%
11%
11%
11%
10%
11%
47%
3%
3%
3%
12%
Significantly increase Somewhat increase No impact
Don't Know Somewhat decrease Significantly decrease
Learning that integrating the data from the new
company will be paired with an extensive cyber
education campaign among employees
Learning that the new company which will come
from the acquisition will develop a cybersecurity
response plan
Learning that the acquired company had its security
compromised in a data breach in the past
Learning that the acquired company has worked
with a cybersecurity forensics company in the
past to mitigate against data breaches
Learning that the acquired company has worked
with a cybersecurity forensics company in the past
in response to a data breach
50%
35%
28%
39%
© Brunswick Insight 2016
7
8% 42%
28%
11%
43%
50%
55%
5%
5%
5%
16%
23% 5%
Significantly increase Somewhat increase
No impact Don’t Know
Somewhat decrease Significantly decrease
Mitigation Can Improve Valuations
Action that is taken preemptively and proactively does more to improve
valuation than a reactive response
If you learned that a company was working with a
network security firm to mitigate against potential
cybersecurity risks, how would that impact your
valuation of the company?
If you learned that a company was working with a
network security firm in response to a data breach,
how would that impact your valuation of the company?
If you learned that a company was working with a law
enforcement agency in response to a data breach,
how would that impact your valuation of the company?
Impact on Valuation of a Company
50%
29%
13%
© Brunswick Insight 2016
8
77%
80%
32%
27%
14%
12%
9%
35%
46%
35%
10%
10%
9%
10%
10%
18%
15%
34%
6%
8%
Financial services
Banking
Retail
Healthcare
Energy and natural
resources
Very high risk Somewhat high risk Don't Know Somewhat low risk Very low risk
Most At-Risk Sectors
Financial sectors carry the most cybersecurity risk in the minds of investors
Please rank the followingsectors based on how at-risk their valuation is to cybersecurity issues.
Thinking specifically about the following sectors, how much risk do you believe companies in that sector face from cybersecurity threats?
1. Financial Services
2. Defense
3. Technology
4. Healthcare
5. Telecoms
6. Utilities
7. Retail
8. Transportation
9. Manufacturing
10. Energy and Natural Resources
11.Hospitality
12. Education
13. Entertainment
14. Construction
15. Agriculture
Specific Risk for Cybersecurity ThreatsSectors Most at Risk
89%
89%
67%
73%
50%
9
How Investors Value
Cybersecurity
© Brunswick Insight 2016
10
46%
34% 34%
32%
9%
2%
47%
30%
41%
35%
13%
11%
55%
41%
37%
26%
23%
17% 16%
0%
10%
20%
30%
40%
50%
60%
Announcement of new
products or services
Staffing of executive
leadership positions
Ability to monetize
data it owns
Usage of big data Level of security
placed on customer
data
CSR and community
involvement
initiatives
History with data
breaches
2014 2015 2016
Increased Importance of Breaches
Investors increasingly care about the security of customer data
QUESTION: Thinking about the past 12 months, please indicate if you have made an investment decision or recommendation in a company due to its:
Option not
provided.
+10
© Brunswick Insight 2016
11
Regional Differences – US and Asia
Investors in Asia pay close attention to a company’s history with data breaches
Announcement of
new products or
services
Staffing of executive
leadership positions
Ability to
monetize data
it owns
Usage of big
data
Level of security
placed on customer
data
CSR and community
involvement
initiatives
45%
33%
36%
43%
13%
2%
55%
43%
48%
42%
16%
7%
68%
50%
38%
21%
19%
13%
15%
24%
12%
47%
35%
6%
39%
26%
55%
32%
16%
3%
43%
22%
32%
18%
25%
35%
2014 2015
History with data
breaches
2016
© Brunswick Insight 2016
12
Regional Differences – Europe and UK
Investors in Europe are now more concerned about protecting customer data
48%
33%
25%
19%
13%
6%
38%
16%
18%
24%
6%
22%
49%
32%
20%
29%
35% 35%
6%
56%
53%
39%
31%
49%
27%
49%
33%
13%
10%
43% 42%
37%
23%
14% 13%
20%
2014 2015 2016
Announcement of
new products or
services
Staffing of executive
leadership positions
Ability to
monetize data
it owns
Usage of big
data
Level of security
placed on customer
data
CSR and community
involvement
initiatives
History with data
breaches
© Brunswick Insight 2016
13
Cybersecurity in Global M&A
Protecting customer data will have the largest impact on global M&A
What are the most important factors related to cybersecurity that will impact global M&A for the next 12 months?
63%
59%
41% 41%
36%
29%
21% 19%
0%
10%
20%
30%
40%
50%
60%
70%
Companies
protecting the
security of
customer data
Companies
protecting the
privacy of customer
data
Companies
verifying that their
data is properly
encrypted
Data breaches of
company data
The ability of
companies that
merge to combine
their IT platforms
Companies
collecting meta-
data on their
customers
New data
protectionism laws
which restrict
access to cloud
computers
Companies
adopting
blockchain
technology
Top Factor: Securing
customer data.
Secondary Factors: Encryption, breaches, and
data merging.
Low Priority Factors: Meta-data collection,
data protectionism, and blockchain technology.
© Brunswick Insight 2016
14
Openness to Data Reporting Regulations
Across geographies, investors believe regulations that require companies to
report breaches will improve the investment climate
Based on what you know now about this law, which of the statements below comes closest to your view?
The EU’s General Data
Protection Regulation is a
rule that focuses on how
companies must respond
to a data breach.
The law requires that
companies notify
regulatory authorities
within 24 hours of a data
breach, followed by notice
to all the individuals
whose personal data was
compromised.
This regulation will improve the
investment climate because regulators
and individuals will get prompt
information about each data breach.
This regulation will hurt the investment
climate because having to report every
data breach will create instability in the
markets.
70% 68%
77%
69% 75%
23% 26%
12%
24% 22%
Total North
America
Europe UK Asia
15
How Investors
Evaluate a Data Breach
© Brunswick Insight 2016
16
Who Will Investors Blame?
Across regions, investors would blame the target company in the event of a hack
If a company that you invested in was hacked and your personal information was stolen, who would you blame?
78%
43%
10%
2% 2%
The Company The Thieves Myself No one The
Government
74%
46%
9%
3%
57%
49%
19%
3% 3%
93%
47%
12%
3%
85%
64%
10%
The Company The Thieves Myself No one The
Government
North America Europe UK Asia
Investors by RegionAll Investors
If a company that you invested in was hacked and your personal
information was stolen, who would you blame?
© Brunswick Insight 2016
17
Investor Concerns During a Data Breach
How a company responds to a breach is the top factor in a valuation
When a company experiences a data breach, what factors do you consider to determine the breach's impact on valuation?
Top concerns
Secondary
concerns
Least important
concerns
The company’s response to the breach
Impact on Valuation
The scale of the breach
Whether previous breaches have occurred at the
company
Commentary on the breach from analysts
The identity of the individual or group responsible
How the breach occurred
The group or individual claiming responsibility
The type of data affected by the breach
The impact of the breach on business operations
Potential factors during a data breach
54%
54%
53%
37%
21%
20%
11%
8%
5%
3%
The media’s reporting on the breach
© Brunswick Insight 2016
18
Corporate Roles During a Breach
During a breach, the CEO is uniquely responsible with responding publicly
When a company experiences a data breach, who do you most want to hear from to learn how the company is responding?
When a company experiences a data breach,
who do you most want to hear from?
55%
32%
31%
30%
21%
15%
12%
9%
9%
5%
2%
CEO
Senior Management Team
C-Suite Executives
Business Unit Leaders
The Company Spokesperson
Board of Directors
Individual Employees
CIO/CTO/CISO
Official Company Statement
IT Team
The General Counsel
Most
responsible
responding
Somewhat
responsible
responding
Not responsible
responding
© Brunswick Insight 2016
19
Who Should Understand Cybersecurity?
All employees need to understand cybersecurity, with the exception of the
company’s spokesperson
Thinking about the companies you are invested in, what levels within those companies should understand the importance of cybersecurity for their business?
What levels within those companies should understand the
importance of cybersecurity for their business?
69%
69%
62%
61%
61%
59%
52%
50%
45%
27%
CEO
Senior Management Team
C-Suite Executives
Business Unit Leaders
The Company Spokesperson
Board of Directors
Individual Employees
CIO/CTO/CISO
IT Team
The General Counsel
Most
critical to
understand
Somewhat
important to
understand
Not very
important to
understand
20
Demographics
© Brunswick Insight 2016
21
Demographics
Investor Focus
52%44%
4%
Buy-Side Investor
Sell-Side Analyst
Other
Region
44%
22%
8%
17%
9%
North America Europe
Asia UK
Other
Age
15%
17%
23%
27%
14%
4%
20-29 30-39 40-49
50-59 60+ NA
2016 Global data valuation survey

Mais conteúdo relacionado

Mais procurados

Edelman Ireland 2018 Trust Barometer
Edelman Ireland 2018 Trust BarometerEdelman Ireland 2018 Trust Barometer
Edelman Ireland 2018 Trust Barometer
Edelman
 
Privacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and ActionPrivacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and Action
Edelman
 
Edelman Ireland 2014 Trust Barometer
Edelman Ireland 2014 Trust BarometerEdelman Ireland 2014 Trust Barometer
Edelman Ireland 2014 Trust Barometer
Edelman
 
Q4 public company use of social media for investor relations summer2010
Q4 public company use of social media for investor relations   summer2010Q4 public company use of social media for investor relations   summer2010
Q4 public company use of social media for investor relations summer2010
weichengwendao
 

Mais procurados (19)

2016 Edelman Trust Barometer New Zealand
2016 Edelman Trust Barometer New Zealand2016 Edelman Trust Barometer New Zealand
2016 Edelman Trust Barometer New Zealand
 
ATS Singapore 2013, PWC Presentation
ATS Singapore 2013, PWC PresentationATS Singapore 2013, PWC Presentation
ATS Singapore 2013, PWC Presentation
 
Seeing in the dark
Seeing in the darkSeeing in the dark
Seeing in the dark
 
Edelman Ireland 2018 Trust Barometer
Edelman Ireland 2018 Trust BarometerEdelman Ireland 2018 Trust Barometer
Edelman Ireland 2018 Trust Barometer
 
Privacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and ActionPrivacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and Action
 
2014 Brunswick Investor Use of Digital and Social Media Survey
2014 Brunswick Investor Use of Digital and Social Media Survey2014 Brunswick Investor Use of Digital and Social Media Survey
2014 Brunswick Investor Use of Digital and Social Media Survey
 
Cloud complexity: the need for resilience
Cloud complexity: the need for resilienceCloud complexity: the need for resilience
Cloud complexity: the need for resilience
 
Overview of M&A, 2016
Overview of M&A, 2016Overview of M&A, 2016
Overview of M&A, 2016
 
Social Media for Investor Relations
Social Media for Investor RelationsSocial Media for Investor Relations
Social Media for Investor Relations
 
Monitoring Social Media for Investor Relations - September 17, 2009
Monitoring Social Media for Investor Relations - September 17, 2009Monitoring Social Media for Investor Relations - September 17, 2009
Monitoring Social Media for Investor Relations - September 17, 2009
 
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
 
2014 Brunswick Investor Use of Digital and Social Media Survey Infographic
2014 Brunswick Investor Use of Digital and Social Media Survey Infographic2014 Brunswick Investor Use of Digital and Social Media Survey Infographic
2014 Brunswick Investor Use of Digital and Social Media Survey Infographic
 
Edelman Ireland 2014 Trust Barometer
Edelman Ireland 2014 Trust BarometerEdelman Ireland 2014 Trust Barometer
Edelman Ireland 2014 Trust Barometer
 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industry
 
Social Media & Investor Relations Trends, Best Practices & Recommendations - ...
Social Media & Investor Relations Trends, Best Practices & Recommendations - ...Social Media & Investor Relations Trends, Best Practices & Recommendations - ...
Social Media & Investor Relations Trends, Best Practices & Recommendations - ...
 
Executive summary - App nations
Executive summary - App nationsExecutive summary - App nations
Executive summary - App nations
 
Q4 public company use of social media for investor relations summer2010
Q4 public company use of social media for investor relations   summer2010Q4 public company use of social media for investor relations   summer2010
Q4 public company use of social media for investor relations summer2010
 
Accenture 2015: Global Risk Management Study - North American Insurance Report
Accenture 2015: Global Risk Management Study - North American Insurance ReportAccenture 2015: Global Risk Management Study - North American Insurance Report
Accenture 2015: Global Risk Management Study - North American Insurance Report
 

Destaque

China’s Annual Political Gathering 2017
China’s Annual Political Gathering 2017China’s Annual Political Gathering 2017
China’s Annual Political Gathering 2017
Brunswick Group
 
E jeföhl dat verbingk – Content with a Sense of Community
E jeföhl dat verbingk – Content with a Sense of CommunityE jeföhl dat verbingk – Content with a Sense of Community
E jeföhl dat verbingk – Content with a Sense of Community
ContentStrategyForum2014
 

Destaque (19)

Perceptions of Chinese businesses going global
Perceptions of Chinese businesses going globalPerceptions of Chinese businesses going global
Perceptions of Chinese businesses going global
 
Infographic - Perceptions of Chinese businesses going global
Infographic - Perceptions of Chinese businesses going globalInfographic - Perceptions of Chinese businesses going global
Infographic - Perceptions of Chinese businesses going global
 
Perceptions of Chinese businesses going global - Chinese
Perceptions of Chinese businesses going global - ChinesePerceptions of Chinese businesses going global - Chinese
Perceptions of Chinese businesses going global - Chinese
 
U.S. Election Briefing - Chinese version
U.S. Election Briefing - Chinese versionU.S. Election Briefing - Chinese version
U.S. Election Briefing - Chinese version
 
Brunswick China analysis - sixth plenary session
Brunswick China analysis - sixth plenary sessionBrunswick China analysis - sixth plenary session
Brunswick China analysis - sixth plenary session
 
China’s Annual Political Gathering 2016
China’s Annual Political Gathering 2016China’s Annual Political Gathering 2016
China’s Annual Political Gathering 2016
 
Hong Kong 2017 Chief Executive Election
Hong Kong 2017 Chief Executive ElectionHong Kong 2017 Chief Executive Election
Hong Kong 2017 Chief Executive Election
 
China’s Annual Political Gathering 2017
China’s Annual Political Gathering 2017China’s Annual Political Gathering 2017
China’s Annual Political Gathering 2017
 
U.S. Election: Big Issues and Big Stakes
U.S. Election: Big Issues and Big StakesU.S. Election: Big Issues and Big Stakes
U.S. Election: Big Issues and Big Stakes
 
The future of corporate communications report
The future of corporate communications reportThe future of corporate communications report
The future of corporate communications report
 
Brunswick Future of Stakeholder Engagement Report February 2013
Brunswick Future of Stakeholder Engagement Report February 2013Brunswick Future of Stakeholder Engagement Report February 2013
Brunswick Future of Stakeholder Engagement Report February 2013
 
Five Reasons to Visit the Health & Wellness Hub During Social Media Week NYC
Five Reasons to Visit the Health & Wellness Hub During Social Media Week NYCFive Reasons to Visit the Health & Wellness Hub During Social Media Week NYC
Five Reasons to Visit the Health & Wellness Hub During Social Media Week NYC
 
Getting the Deal Done
Getting the Deal DoneGetting the Deal Done
Getting the Deal Done
 
E jeföhl dat verbingk – Content with a Sense of Community
E jeföhl dat verbingk – Content with a Sense of CommunityE jeföhl dat verbingk – Content with a Sense of Community
E jeföhl dat verbingk – Content with a Sense of Community
 
Content management Frukostseminar: Everyone's a Publisher. Can you cope with it?
Content management Frukostseminar: Everyone's a Publisher. Can you cope with it?Content management Frukostseminar: Everyone's a Publisher. Can you cope with it?
Content management Frukostseminar: Everyone's a Publisher. Can you cope with it?
 
Digitale Kommunikation planen für den Erfolg
Digitale Kommunikation planen für den ErfolgDigitale Kommunikation planen für den Erfolg
Digitale Kommunikation planen für den Erfolg
 
Managing co-creation
Managing co-creationManaging co-creation
Managing co-creation
 
Digitales Marketing: Was (nicht) funktioniert
Digitales Marketing: Was (nicht) funktioniertDigitales Marketing: Was (nicht) funktioniert
Digitales Marketing: Was (nicht) funktioniert
 
Digital Business Transformation: Schlüsselfaktoren der Finanzierung
Digital Business Transformation: Schlüsselfaktoren der FinanzierungDigital Business Transformation: Schlüsselfaktoren der Finanzierung
Digital Business Transformation: Schlüsselfaktoren der Finanzierung
 

Semelhante a 2016 Global data valuation survey

Unrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALUnrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINAL
Wayne Anderson
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
nooralmousa
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
IBM Security
 

Semelhante a 2016 Global data valuation survey (20)

UK Business Payments Barometer
UK Business Payments BarometerUK Business Payments Barometer
UK Business Payments Barometer
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
 
Unrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALUnrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINAL
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data Security
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
PCI COMPLIANCE REPORT
PCI COMPLIANCE REPORTPCI COMPLIANCE REPORT
PCI COMPLIANCE REPORT
 
Verizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xgVerizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xg
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study
 
Symantec investor presentation march 2016
Symantec investor presentation march 2016Symantec investor presentation march 2016
Symantec investor presentation march 2016
 
Symantec investor presentation march 2016
Symantec investor presentation march 2016 Symantec investor presentation march 2016
Symantec investor presentation march 2016
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital TransformationReinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
 
Encuesta Mundial de Ciberseguridad de la Información 2017
Encuesta Mundial de Ciberseguridad de la Información 2017Encuesta Mundial de Ciberseguridad de la Información 2017
Encuesta Mundial de Ciberseguridad de la Información 2017
 

Mais de Brunswick Group

Mais de Brunswick Group (20)

Investor use of digital media 2018
Investor use of digital media  2018Investor use of digital media  2018
Investor use of digital media 2018
 
The Rise of Prince Mohammed bin Salman
The Rise of Prince Mohammed bin SalmanThe Rise of Prince Mohammed bin Salman
The Rise of Prince Mohammed bin Salman
 
OECD's Base Erosion and Profit Shifting Project
OECD's Base Erosion and Profit Shifting ProjectOECD's Base Erosion and Profit Shifting Project
OECD's Base Erosion and Profit Shifting Project
 
European climate on foreign investment
European climate on foreign investment European climate on foreign investment
European climate on foreign investment
 
Brunswick ISMEA Quarterly Newsletter - May 2017
Brunswick ISMEA Quarterly Newsletter - May 2017 Brunswick ISMEA Quarterly Newsletter - May 2017
Brunswick ISMEA Quarterly Newsletter - May 2017
 
Brunswick Group - ISMEA Newsletter - May 2017
Brunswick Group - ISMEA Newsletter - May 2017Brunswick Group - ISMEA Newsletter - May 2017
Brunswick Group - ISMEA Newsletter - May 2017
 
Brunswick Group is expanding in Germany
Brunswick Group is expanding in Germany Brunswick Group is expanding in Germany
Brunswick Group is expanding in Germany
 
The Mine of the Future
The Mine of the FutureThe Mine of the Future
The Mine of the Future
 
Brexit in perspective article 50 notification
Brexit in perspective   article 50 notificationBrexit in perspective   article 50 notification
Brexit in perspective article 50 notification
 
Stakeholder management in getting the deal done
Stakeholder management in getting the deal doneStakeholder management in getting the deal done
Stakeholder management in getting the deal done
 
India, Singapore, Middle East and Africa – quarterly review
India, Singapore, Middle East and Africa – quarterly reviewIndia, Singapore, Middle East and Africa – quarterly review
India, Singapore, Middle East and Africa – quarterly review
 
How will President Trump impact the GCC?
How will President Trump impact the GCC?How will President Trump impact the GCC?
How will President Trump impact the GCC?
 
France 2017 elections – The left wing primaries
France 2017 elections – The left wing primariesFrance 2017 elections – The left wing primaries
France 2017 elections – The left wing primaries
 
Brunswick intelligence - Brexit in perspective
Brunswick intelligence - Brexit in perspectiveBrunswick intelligence - Brexit in perspective
Brunswick intelligence - Brexit in perspective
 
Brunswick Insight global horizon scan
Brunswick Insight global horizon scanBrunswick Insight global horizon scan
Brunswick Insight global horizon scan
 
Cybersecurity under the Trump Administration
Cybersecurity under the Trump AdministrationCybersecurity under the Trump Administration
Cybersecurity under the Trump Administration
 
Financial Services Barometer 2016
Financial Services Barometer 2016Financial Services Barometer 2016
Financial Services Barometer 2016
 
New York DFS proposed cybersecurity regulations
New York DFS proposed cybersecurity regulationsNew York DFS proposed cybersecurity regulations
New York DFS proposed cybersecurity regulations
 
Brunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attackBrunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attack
 
Precious ore, precious data
Precious ore, precious dataPrecious ore, precious data
Precious ore, precious data
 

Último

Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Dipal Arora
 

Último (20)

The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 

2016 Global data valuation survey

  • 1. Abu Dhabi Beijing Berlin Brussels Dallas Dubai Frankfurt Hong Kong Johannesburg London Milan Mumbai Munich New York Paris Rome San Francisco São Paulo Shanghai Singapore Stockholm Vienna Washington, D.C. Brunswick Data Valuation Survey October 2016
  • 2. © Brunswick Insight 2016 2 Who We Surveyed Audience: Buy-side investors and Sell-side analysts across North America, Europe, the United Kingdom, and Asia Data Collection: August 29th though September 16th, 2016 Sample Size: 208 investors. Margin of error of 6.8%. Notes: Data presented in the 2016, 2015, and 2014 surveys have been weighted by country to allow accurate comparison.
  • 3. 3 Key Findings - 2016 Increasing Importance to Protect Customer Data All Attention on the Company CEO During a Breach During a data breach, investors will pay close attention to the response of a the afflicted company and expect to hear from the CEO. For investors, the response from the company is just as important as the scale of the breach, and both are top priorities for investors as they consider their valuations. While investors believe that all levels of a company need to understand cybersecurity risks, the CEO is the individual with the most responsibility to communicate. Investors view the security of customer data as among the most important cybersecurity factors that can inform their valuation. The percentage of investors who have made an investment based on the security of customer data has increased in each year of this survey and is seen as the most important cybersecurity issue in global M&A. Data Breaches Can Reduce Valuations During M&A Even after a company has been acquired as a result of an M&A, investors may decrease their valuation of the company if they learned that the acquired company suffered a data breach in the past. Investors are much more likely to increase their valuation of a company if they learned that it took proactive steps to mitigate against potential cybersecurity risks. Reactive responses, including working with law enforcement, can decrease a valuation.
  • 4. 4 Impact of Data Breaches on Mergers and Acquisitions
  • 5. © Brunswick Insight 2016 5 Data Valuation During M&A Investors will not decrease their valuation if a network security firm assists with data integration How would that impact your valuation of the company? 4% 4% 1% 13% 20% 25% 28% 52% 9% 8% 9% 9% 57% 48% 53% 21% 8% 13% 6% 2% Significantly increase Somewhat increase No impact Don’t Know Somewhat decrease Significantly decrease Learning that the companies involved in the merger will need to spend a large amount of time integrating the data from different data systems Learning that the data integration will be a significant cost of the merger Learning that one of the companies involved in the merger had its security compromised in a data breach in the past Learning that the merger will require a network security firm to be brought in to help manage the data integration Impact on Valuation During an M&A 65% 61% 59% 23%
  • 6. © Brunswick Insight 2016 6 Data Valuation After Acquisition The legacy of a data breach can still decrease a valuation after an acquisition How would that impact your valuation of the company? 4% 5% 2% 31% 24% 34% 10% 36% 51% 58% 48% 65% 11% 11% 11% 10% 11% 47% 3% 3% 3% 12% Significantly increase Somewhat increase No impact Don't Know Somewhat decrease Significantly decrease Learning that integrating the data from the new company will be paired with an extensive cyber education campaign among employees Learning that the new company which will come from the acquisition will develop a cybersecurity response plan Learning that the acquired company had its security compromised in a data breach in the past Learning that the acquired company has worked with a cybersecurity forensics company in the past to mitigate against data breaches Learning that the acquired company has worked with a cybersecurity forensics company in the past in response to a data breach 50% 35% 28% 39%
  • 7. © Brunswick Insight 2016 7 8% 42% 28% 11% 43% 50% 55% 5% 5% 5% 16% 23% 5% Significantly increase Somewhat increase No impact Don’t Know Somewhat decrease Significantly decrease Mitigation Can Improve Valuations Action that is taken preemptively and proactively does more to improve valuation than a reactive response If you learned that a company was working with a network security firm to mitigate against potential cybersecurity risks, how would that impact your valuation of the company? If you learned that a company was working with a network security firm in response to a data breach, how would that impact your valuation of the company? If you learned that a company was working with a law enforcement agency in response to a data breach, how would that impact your valuation of the company? Impact on Valuation of a Company 50% 29% 13%
  • 8. © Brunswick Insight 2016 8 77% 80% 32% 27% 14% 12% 9% 35% 46% 35% 10% 10% 9% 10% 10% 18% 15% 34% 6% 8% Financial services Banking Retail Healthcare Energy and natural resources Very high risk Somewhat high risk Don't Know Somewhat low risk Very low risk Most At-Risk Sectors Financial sectors carry the most cybersecurity risk in the minds of investors Please rank the followingsectors based on how at-risk their valuation is to cybersecurity issues. Thinking specifically about the following sectors, how much risk do you believe companies in that sector face from cybersecurity threats? 1. Financial Services 2. Defense 3. Technology 4. Healthcare 5. Telecoms 6. Utilities 7. Retail 8. Transportation 9. Manufacturing 10. Energy and Natural Resources 11.Hospitality 12. Education 13. Entertainment 14. Construction 15. Agriculture Specific Risk for Cybersecurity ThreatsSectors Most at Risk 89% 89% 67% 73% 50%
  • 10. © Brunswick Insight 2016 10 46% 34% 34% 32% 9% 2% 47% 30% 41% 35% 13% 11% 55% 41% 37% 26% 23% 17% 16% 0% 10% 20% 30% 40% 50% 60% Announcement of new products or services Staffing of executive leadership positions Ability to monetize data it owns Usage of big data Level of security placed on customer data CSR and community involvement initiatives History with data breaches 2014 2015 2016 Increased Importance of Breaches Investors increasingly care about the security of customer data QUESTION: Thinking about the past 12 months, please indicate if you have made an investment decision or recommendation in a company due to its: Option not provided. +10
  • 11. © Brunswick Insight 2016 11 Regional Differences – US and Asia Investors in Asia pay close attention to a company’s history with data breaches Announcement of new products or services Staffing of executive leadership positions Ability to monetize data it owns Usage of big data Level of security placed on customer data CSR and community involvement initiatives 45% 33% 36% 43% 13% 2% 55% 43% 48% 42% 16% 7% 68% 50% 38% 21% 19% 13% 15% 24% 12% 47% 35% 6% 39% 26% 55% 32% 16% 3% 43% 22% 32% 18% 25% 35% 2014 2015 History with data breaches 2016
  • 12. © Brunswick Insight 2016 12 Regional Differences – Europe and UK Investors in Europe are now more concerned about protecting customer data 48% 33% 25% 19% 13% 6% 38% 16% 18% 24% 6% 22% 49% 32% 20% 29% 35% 35% 6% 56% 53% 39% 31% 49% 27% 49% 33% 13% 10% 43% 42% 37% 23% 14% 13% 20% 2014 2015 2016 Announcement of new products or services Staffing of executive leadership positions Ability to monetize data it owns Usage of big data Level of security placed on customer data CSR and community involvement initiatives History with data breaches
  • 13. © Brunswick Insight 2016 13 Cybersecurity in Global M&A Protecting customer data will have the largest impact on global M&A What are the most important factors related to cybersecurity that will impact global M&A for the next 12 months? 63% 59% 41% 41% 36% 29% 21% 19% 0% 10% 20% 30% 40% 50% 60% 70% Companies protecting the security of customer data Companies protecting the privacy of customer data Companies verifying that their data is properly encrypted Data breaches of company data The ability of companies that merge to combine their IT platforms Companies collecting meta- data on their customers New data protectionism laws which restrict access to cloud computers Companies adopting blockchain technology Top Factor: Securing customer data. Secondary Factors: Encryption, breaches, and data merging. Low Priority Factors: Meta-data collection, data protectionism, and blockchain technology.
  • 14. © Brunswick Insight 2016 14 Openness to Data Reporting Regulations Across geographies, investors believe regulations that require companies to report breaches will improve the investment climate Based on what you know now about this law, which of the statements below comes closest to your view? The EU’s General Data Protection Regulation is a rule that focuses on how companies must respond to a data breach. The law requires that companies notify regulatory authorities within 24 hours of a data breach, followed by notice to all the individuals whose personal data was compromised. This regulation will improve the investment climate because regulators and individuals will get prompt information about each data breach. This regulation will hurt the investment climate because having to report every data breach will create instability in the markets. 70% 68% 77% 69% 75% 23% 26% 12% 24% 22% Total North America Europe UK Asia
  • 16. © Brunswick Insight 2016 16 Who Will Investors Blame? Across regions, investors would blame the target company in the event of a hack If a company that you invested in was hacked and your personal information was stolen, who would you blame? 78% 43% 10% 2% 2% The Company The Thieves Myself No one The Government 74% 46% 9% 3% 57% 49% 19% 3% 3% 93% 47% 12% 3% 85% 64% 10% The Company The Thieves Myself No one The Government North America Europe UK Asia Investors by RegionAll Investors If a company that you invested in was hacked and your personal information was stolen, who would you blame?
  • 17. © Brunswick Insight 2016 17 Investor Concerns During a Data Breach How a company responds to a breach is the top factor in a valuation When a company experiences a data breach, what factors do you consider to determine the breach's impact on valuation? Top concerns Secondary concerns Least important concerns The company’s response to the breach Impact on Valuation The scale of the breach Whether previous breaches have occurred at the company Commentary on the breach from analysts The identity of the individual or group responsible How the breach occurred The group or individual claiming responsibility The type of data affected by the breach The impact of the breach on business operations Potential factors during a data breach 54% 54% 53% 37% 21% 20% 11% 8% 5% 3% The media’s reporting on the breach
  • 18. © Brunswick Insight 2016 18 Corporate Roles During a Breach During a breach, the CEO is uniquely responsible with responding publicly When a company experiences a data breach, who do you most want to hear from to learn how the company is responding? When a company experiences a data breach, who do you most want to hear from? 55% 32% 31% 30% 21% 15% 12% 9% 9% 5% 2% CEO Senior Management Team C-Suite Executives Business Unit Leaders The Company Spokesperson Board of Directors Individual Employees CIO/CTO/CISO Official Company Statement IT Team The General Counsel Most responsible responding Somewhat responsible responding Not responsible responding
  • 19. © Brunswick Insight 2016 19 Who Should Understand Cybersecurity? All employees need to understand cybersecurity, with the exception of the company’s spokesperson Thinking about the companies you are invested in, what levels within those companies should understand the importance of cybersecurity for their business? What levels within those companies should understand the importance of cybersecurity for their business? 69% 69% 62% 61% 61% 59% 52% 50% 45% 27% CEO Senior Management Team C-Suite Executives Business Unit Leaders The Company Spokesperson Board of Directors Individual Employees CIO/CTO/CISO IT Team The General Counsel Most critical to understand Somewhat important to understand Not very important to understand
  • 21. © Brunswick Insight 2016 21 Demographics Investor Focus 52%44% 4% Buy-Side Investor Sell-Side Analyst Other Region 44% 22% 8% 17% 9% North America Europe Asia UK Other Age 15% 17% 23% 27% 14% 4% 20-29 30-39 40-49 50-59 60+ NA