-
Featured services
Think beyond the robots
The successful integration of AI and IoT in manufacturing will depend on effective change management, upskilling and rethinking business models.
Read the blog -
Services
Leverage our capabilities to accelerate your business transformation.
-
Services
Network Services
Popular Products
-
Services
Cloud
Popular Products
-
Cloud Architecture and Modernization
Discover how to achieve your business goals through cloud modernization practices, that deliver improved agility, reusability and scalability.
-
Cloud Optimization
Discover how to maximize operational excellence, business continuity and financial sustainability through our cloud-advanced optimization services.
-
-
Services
Consulting
-
-
Services
Data and Artificial intelligence
-
Services
Technology Solutions
Client stories
-
Services
Global Data Centers
-
Services
CX and Design
-
Services
Application Services
-
Services
Sustainability Services
-
Services
Digital Workplace
-
Services
Business Process Services
Master your GenAI destiny
We’ll help you navigate the complexities and opportunities of GenAI.
Explore GenAI -
-
-
Insights
Recent Insights
-
The Future of Networking in 2025 and Beyond
-
Using the cloud to cut costs needs the right approach
When organizations focus on transformation, a move to the cloud can deliver cost savings – but they often need expert advice to help them along their journey
-
Make zero trust security work for your organization
Make zero trust security work for your organization across hybrid work environments.
-
-
Master your GenAI destiny
We’ll help you navigate the complexities and opportunities of GenAI.
Explore GenAI -
-
Master your GenAI destiny
We’ll help you navigate the complexities and opportunities of GenAI.
Explore GenAI -
Discover how we accelerate your business transformation
-
About us
CLIENT STORIES
-
Liantis
Over time, Liantis – an established HR company in Belgium – had built up data islands and isolated solutions as part of their legacy system.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
-
CLIENT STORIES
-
Liantis
Over time, Liantis – an established HR company in Belgium – had built up data islands and isolated solutions as part of their legacy system.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
-
Sponsorships
CLIENT STORIES
-
Liantis
Over time, Liantis – an established HR company in Belgium – had built up data islands and isolated solutions as part of their legacy system.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
Everest Group PEAK Matrix® Assessment
NTT DATA is a Leader and Star Performer in the Everest Group Sustainability Enablement Technology Services PEAK Matrix® Assessment 2024.
Get the Everest report -
- Careers
How resilient is your cybersecurity posture in 2021?
27 May 2021

Topics in this article
The findings of NTT’s recently published 2021 Global Threat Intelligence Report provide new insight into the relative preparedness of organizations in different industries to respond and recover from cybersecurity attacks...something that NTT refers to as ‘cybermaturity’. But first, let’s clarify exactly what we mean by this term and explore what NTTs Cybersecurity Advisory (CA) score actually measures. NTT’s CA score may be understood as a maturity baseline. It’s a measure of the relative maturity of an organization's security practices, covering all aspects of processes, metrics and tools on a 0.00-5.99 scale. A lower baseline indicates less-mature security practices. The higher the baseline, the more mature the organization’s security practices are deemed to be.
The CA baseline is generated as a component of a business-outcome-driven consulting engagement that measures the current environment and helps develop a strategy for reaching security objectives based on the organization's current state. Essentially, the CA helps identify an organization's current maturity level and the goal maturity based on its business and security objectives. The final output of a CA engagement is a plan to help move the organization from its current state to its optimal state.
Now, let’s turn the spotlight on this year’s Report’s findings with respect to the relative industry preparedness of the two most attacked industries:
Finance
While top of the log on cybersecurity maturity or preparedness overall, finance is still among the most attacked industries. Small decreases in baseline scores likely resulted from challenges in prioritization, which potentially affected the allocation of resources and didn’t allow the organization’s program to mature.
Manufacturing
Organizations in this sector experienced a three-year decline in scores, most likely due to changes in the operating environment, the evolution of attacks and a greater inclination to benchmark their overall cybersecurity posture.
Steps to success
If you’re seeking to close the gap between your organization’s current and desired cybermaturity level, maintain an unwavering focus on tools, executive support and the maturity of your underlying processes. But do bear in mind that factors such as cost, compliance and resource availability could hamper your efforts to reach your desired goals, so set yourself realistic expectations.
If you’re interested in reading a deeper analysis of the findings of this year’s Report, read our Executive Guide or download the full technical Report. Otherwise, please connect with me to share your thoughts or questions.