SlideShare une entreprise Scribd logo
1  sur  12
COST OF
CYBER CRIME
STUDY
INSIGHTS ON THE SECURITY
INVESTMENTS THAT MAKE
A DIFFERENCE IN ITALY
SECURITY BREACHES
CONTINUE TO PLAGUE
ITALIAN COMPANIES
Average annualized cost
of cyber crime (USD)
$6.73MAverage number of security
breaches each year
52
… AND SPENDING
ON BREACHES
CONTINUES TO RISE
… BUT ITALY DEFENSES
COMPARE BETTER THAN
THE GLOBAL AVERAGE
Average number of security
breaches each year
130
Copyright © 2017 Accenture Security. All rights reserved. 2
Copyright © 2017 Accenture Security. All rights reserved. 3
IN ITALY, MALICIOUS INSIDERS AND
DENIAL OF SERVICES ARE THE TWO MOST
COSTLY ATTACK TYPES
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
$116,443
$0K 25 50 75 100 125 150
Botnets
Malware
Stolen devices
Ransomware
Malicious code
Web-based attacks
Phishing & social
engineering
Denial of services
Malicious insiders
Average cost
per attack
$ thousands
Legend
n = 182 interviews
in Italy
Copyright © 2017 Accenture Security. All rights reserved. 4
MALICIOUS CODE AND MALICIOUS INSIDERS CONTINUE TO
TOP THE LIST -- TAKING THE LONGEST TO RESOLVE
Length of time to resolve
an attack in days
Estimated average time is
measured for each attack
type in days
Legend
N = 109 Interviews
FY 2016
FY 2017
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
0 Days 10 20 30 40 50 60
Botnets
Malware
Stolen devices
Denial of service
Phishing & social
engineering
Ransomware
Web-based attack
Malicious insiders
Malicious code
Copyright © 2017 Accenture Security. All rights reserved. 5
DETECTION ACCOUNTS FOR 1/3RD OF SECURITY
COSTS ON AVERAGE …
22
Containment
22
Recovery
13
Investigation
34
Detection
9
Incident Management
and ex-post response
Percentage cost
by internal activities
Legend
n = 182 interviews in Italy
Detection
Containment
Recovery
Investigation
Incident Management
and ex-post response
Copyright © 2017 Accenture Security. All rights reserved. 6
… BUT INFORMATION LOSS IS ONE OF THE
MOST EXPENSIVE CONSEQUENCES OF CYBER
ATTACKS IN ITALY
Percentage cost
by consequence
Legend
n = 182 interviews in Italy
Business disruption
Information loss
Revenue loss
Equipment damage
44
Information
Loss
20
Revenue Loss
32
Business
Disruption
3
Equipment
Damage
Copyright © 2017 Accenture Security. All rights reserved. 7
AI SECURITY TECHNOLOGIES RANKS 3RD AND
ADVANCED ANALYTICS 4TH FOR COST SAVINGS
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
0 1 2 3 4 5 6 7 8 9
Automated policy management
Enterprise deployment of
Governance, Risk & Compliance
Extensive use of data
loss prevention
Extensive deployment of
encryption technologies
Advanced perimeter controls
Extensive use of cyber analytics
and User Behavior Analytics
Automation, orchestration
and machine learning
Advanced identity and
access governance
Security intelligence systems
Value gap
Rank orderings by spending
levels
and cost savings
Legend
1 = Highest rank
9 = Lowest rank
Rank by percentage
spending
Rank by cost savings
Copyright © 2017 Accenture Security. All rights reserved. 8
… BUT ONLY 29% HAVE DEPLOYED AI AND
ADVANCED ANALYTICS SECURITY TECHNOLOGIES
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
47
[CELLRANGE]
53
63
53
67%
Automation, orchestration
and machine learning
Extensive use of cyber analytics
and User Behavior Analytics
Automated policy management
Enterprise deployment of
Governance, Risk & Compliance
Extensive use of
data loss prevention
Extensive deployment of
encryption technologies
Security intelligence systems
Advanced perimeter controls
Advanced identity and
access governance
0% 10 20 30 40 50 60 70
Nine enabling security
technologies deployed
in Italy
Legend
n = 182 interviews
in Italy
Percentage deployment
frequency
Copyright © 2017 Accenture Security. All rights reserved. 9
PRIORITIZE BREAKTHROUGH INNOVATIONS
LIKE AI AND ADVANCED ANALYTICS
Organizations need to:
1. Better balance investments in security technologies
2. Use compliance technology—but don’t
bet the business on it
3. Grasp the innovation opportunity
1
2
3
Copyright © 2017 Accenture Security. All rights reserved. 10
WE RECOMMEND THREE
STEPS TO IMPROVE
CYBERSECURITY
EFFECTIVENESS
Become brilliant at the basics
Build cybersecurity on a strong foundation
Undertake extreme pressure testing
Identify vulnerabilities more rigorously
Invest in breakthrough innovation
Enhance program effectiveness and scale value
1
2
3
Copyright © 2017 Accenture Security. All rights reserved. 11
ABOUT THE RESEARCH
2,182
interviews
7countries
Australia
France
Germany
Italy
Japan
United Kingdom
United States
254
companies
8-year
research
program
Jointly developed with:
Examining the economic impact of cyber attacks
About Accenture
Accenture is a leading global professional services
company, providing a broad range of services and
solutions in strategy, consulting, digital, technology
and operations. Combining unmatched experience
and specialized skills across more than 40 industries
and all business functions—underpinned by the
world’s largest delivery network—Accenture works
at the intersection of business and technology
to help clients improve their performance and
create sustainable value for their stakeholders.
With approximately 435,000 people serving clients
in more than 120 countries, Accenture drives
innovation to improve the way the world works
and lives. Visit us at www.accenture.com
About Accenture Security
Accenture Security helps organizations build
resilience from the inside out, so they can
confidently focus on innovation and growth.
Leveraging its global network of cybersecurity labs,
deep industry understanding across client value
chains and services that span the security lifecycle,
Accenture protects organization’s valuable assets,
end-to-end. With services that include strategy
and risk management, cyber defense, digital
identity, application security and managed security,
Accenture enables businesses around the world
to defend against known sophisticated threats,
and the unknown. Follow us @AccentureSecure on
Twitter or visit the Accenture Security blog.
Learn more:
http://accenture.com/security

Contenu connexe

Tendances

Cloud Computing for Banking - Accenture
Cloud Computing for Banking - AccentureCloud Computing for Banking - Accenture
Cloud Computing for Banking - AccentureKim Jensen
 
VEA Services Portfolio
VEA  Services  PortfolioVEA  Services  Portfolio
VEA Services Portfoliokeygrant
 
HEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITYHEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITYSilverlineCRM
 
Cisco Connect Ottawa 2018 multi cloud
Cisco Connect Ottawa 2018 multi cloudCisco Connect Ottawa 2018 multi cloud
Cisco Connect Ottawa 2018 multi cloudCisco Canada
 
Cloud native-apps-architectures
Cloud native-apps-architecturesCloud native-apps-architectures
Cloud native-apps-architecturesCapgemini
 
Microsoft cloud continuum
Microsoft cloud continuumMicrosoft cloud continuum
Microsoft cloud continuumMathews Job
 
Cloud-native Data Platform Transformation | Accenture
Cloud-native Data Platform Transformation | AccentureCloud-native Data Platform Transformation | Accenture
Cloud-native Data Platform Transformation | Accentureaccenture
 
Delivering applications at the pace of business
Delivering applications at the pace of businessDelivering applications at the pace of business
Delivering applications at the pace of businessAccenture Technology
 
SI Alliance Marketing - Insurance Analytics Solution Webinar
SI Alliance Marketing - Insurance Analytics Solution WebinarSI Alliance Marketing - Insurance Analytics Solution Webinar
SI Alliance Marketing - Insurance Analytics Solution WebinarDavid Castro
 
150601 gartner cloud_summit_vfinal
150601 gartner cloud_summit_vfinal150601 gartner cloud_summit_vfinal
150601 gartner cloud_summit_vfinalMichael Burian
 
The IBM Cloud is the cloud made for business
The IBM Cloud is the cloud made for businessThe IBM Cloud is the cloud made for business
The IBM Cloud is the cloud made for businessAleksandar Francuz
 
Accenture cloud-ascent-how-to-maximize-its-value
Accenture cloud-ascent-how-to-maximize-its-valueAccenture cloud-ascent-how-to-maximize-its-value
Accenture cloud-ascent-how-to-maximize-its-valuengaurhcd
 
Assembling your cloud orchestra: A field guide to multi-cloud management
Assembling your cloud orchestra: A field guide to multi-cloud managementAssembling your cloud orchestra: A field guide to multi-cloud management
Assembling your cloud orchestra: A field guide to multi-cloud managementIBM
 
Build and Innovate on Cloud - PWC
Build and Innovate on Cloud - PWCBuild and Innovate on Cloud - PWC
Build and Innovate on Cloud - PWCAmazon Web Services
 
Optimizing User-Experience with Carrier-Neutral Colocation
Optimizing User-Experience with Carrier-Neutral ColocationOptimizing User-Experience with Carrier-Neutral Colocation
Optimizing User-Experience with Carrier-Neutral ColocationEquinix
 
Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213Davis Blair
 

Tendances (20)

Value Journal _July 2020
Value Journal _July 2020Value Journal _July 2020
Value Journal _July 2020
 
Value Journal - February 2021
Value Journal - February 2021Value Journal - February 2021
Value Journal - February 2021
 
Cloud Computing for Banking - Accenture
Cloud Computing for Banking - AccentureCloud Computing for Banking - Accenture
Cloud Computing for Banking - Accenture
 
VEA Services Portfolio
VEA  Services  PortfolioVEA  Services  Portfolio
VEA Services Portfolio
 
HEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITYHEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITY
 
Cisco Connect Ottawa 2018 multi cloud
Cisco Connect Ottawa 2018 multi cloudCisco Connect Ottawa 2018 multi cloud
Cisco Connect Ottawa 2018 multi cloud
 
Cloud native-apps-architectures
Cloud native-apps-architecturesCloud native-apps-architectures
Cloud native-apps-architectures
 
Microsoft cloud continuum
Microsoft cloud continuumMicrosoft cloud continuum
Microsoft cloud continuum
 
Cloud-native Data Platform Transformation | Accenture
Cloud-native Data Platform Transformation | AccentureCloud-native Data Platform Transformation | Accenture
Cloud-native Data Platform Transformation | Accenture
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Delivering applications at the pace of business
Delivering applications at the pace of businessDelivering applications at the pace of business
Delivering applications at the pace of business
 
SI Alliance Marketing - Insurance Analytics Solution Webinar
SI Alliance Marketing - Insurance Analytics Solution WebinarSI Alliance Marketing - Insurance Analytics Solution Webinar
SI Alliance Marketing - Insurance Analytics Solution Webinar
 
150601 gartner cloud_summit_vfinal
150601 gartner cloud_summit_vfinal150601 gartner cloud_summit_vfinal
150601 gartner cloud_summit_vfinal
 
The IBM Cloud is the cloud made for business
The IBM Cloud is the cloud made for businessThe IBM Cloud is the cloud made for business
The IBM Cloud is the cloud made for business
 
Accenture cloud-ascent-how-to-maximize-its-value
Accenture cloud-ascent-how-to-maximize-its-valueAccenture cloud-ascent-how-to-maximize-its-value
Accenture cloud-ascent-how-to-maximize-its-value
 
Assembling your cloud orchestra: A field guide to multi-cloud management
Assembling your cloud orchestra: A field guide to multi-cloud managementAssembling your cloud orchestra: A field guide to multi-cloud management
Assembling your cloud orchestra: A field guide to multi-cloud management
 
Build and Innovate on Cloud - PWC
Build and Innovate on Cloud - PWCBuild and Innovate on Cloud - PWC
Build and Innovate on Cloud - PWC
 
Optimizing User-Experience with Carrier-Neutral Colocation
Optimizing User-Experience with Carrier-Neutral ColocationOptimizing User-Experience with Carrier-Neutral Colocation
Optimizing User-Experience with Carrier-Neutral Colocation
 
Value journal March2020
Value journal March2020Value journal March2020
Value journal March2020
 
Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213
 

Similaire à I Costi del Cybercrime 2017 - Italia

Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services accenture
 
2017 Cost Of Cyber Crime Study | Insights On The Security Investments That Ma...
2017 Cost Of Cyber Crime Study | Insights On The Security Investments That Ma...2017 Cost Of Cyber Crime Study | Insights On The Security Investments That Ma...
2017 Cost Of Cyber Crime Study | Insights On The Security Investments That Ma...Accenture Insurance
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - IrelandAccenture Security
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience InsuranceAccenture Insurance
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planetVincent Kwon
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Technology
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrZYMR, INC.
 
Zymr Cybersecurity
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity Zymr Inc
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber ResilienceAccenture Security
 
CWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurityCWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurityCapgemini
 
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...FinTech Belgium
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptxDESTROYER39
 
Evolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEvolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEY
 

Similaire à I Costi del Cybercrime 2017 - Italia (20)

Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services
 
2017 Cost Of Cyber Crime Study | Insights On The Security Investments That Ma...
2017 Cost Of Cyber Crime Study | Insights On The Security Investments That Ma...2017 Cost Of Cyber Crime Study | Insights On The Security Investments That Ma...
2017 Cost Of Cyber Crime Study | Insights On The Security Investments That Ma...
 
Cost of Cyber Crime UK Data
Cost of Cyber Crime UK DataCost of Cyber Crime UK Data
Cost of Cyber Crime UK Data
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
 
Zymr Cybersecurity
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber Resilience
 
CWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurityCWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurity
 
16231
1623116231
16231
 
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
 
CCA study group
CCA study groupCCA study group
CCA study group
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptx
 
Evolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEvolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architecture
 
The 10 most trusted cyber threat solution providers
The 10 most trusted cyber threat solution providersThe 10 most trusted cyber threat solution providers
The 10 most trusted cyber threat solution providers
 

Plus de Accenture Italia

Accenture United Nations Global Compact: Communication on Progress 2021
Accenture United Nations Global Compact: Communication on Progress 2021Accenture United Nations Global Compact: Communication on Progress 2021
Accenture United Nations Global Compact: Communication on Progress 2021Accenture Italia
 
Studio Accenture-AGICI 2022
Studio Accenture-AGICI 2022Studio Accenture-AGICI 2022
Studio Accenture-AGICI 2022Accenture Italia
 
Accenture United Nations Global Compact: Communication on Progress 2020
Accenture United Nations Global Compact: Communication on Progress 2020Accenture United Nations Global Compact: Communication on Progress 2020
Accenture United Nations Global Compact: Communication on Progress 2020Accenture Italia
 
Accenture Italia Corporate Citizenship Report 2020
Accenture Italia Corporate Citizenship Report 2020Accenture Italia Corporate Citizenship Report 2020
Accenture Italia Corporate Citizenship Report 2020Accenture Italia
 
Accenture Corporate Citizenship Report 2019
Accenture Corporate Citizenship Report 2019Accenture Corporate Citizenship Report 2019
Accenture Corporate Citizenship Report 2019Accenture Italia
 
Gli approcci alla sostenibilità della GDO italiana
Gli approcci alla sostenibilità della GDO italianaGli approcci alla sostenibilità della GDO italiana
Gli approcci alla sostenibilità della GDO italianaAccenture Italia
 
Sustainability: A new integrated framework for enterprise performance management
Sustainability: A new integrated framework for enterprise performance managementSustainability: A new integrated framework for enterprise performance management
Sustainability: A new integrated framework for enterprise performance managementAccenture Italia
 
What’s Hot Maggio – Giugno 2020
What’s Hot Maggio – Giugno 2020What’s Hot Maggio – Giugno 2020
What’s Hot Maggio – Giugno 2020Accenture Italia
 
What’s Hot Marzo – Aprile 2020
What’s Hot Marzo – Aprile 2020What’s Hot Marzo – Aprile 2020
What’s Hot Marzo – Aprile 2020Accenture Italia
 
What’s Hot Luglio - Agosto
What’s Hot Luglio - Agosto What’s Hot Luglio - Agosto
What’s Hot Luglio - Agosto Accenture Italia
 
General data protection regulation - GDPR
General data protection regulation - GDPRGeneral data protection regulation - GDPR
General data protection regulation - GDPRAccenture Italia
 
DRIIM - What's Hot (maggio - giugno 2019)
DRIIM - What's Hot (maggio - giugno 2019)DRIIM - What's Hot (maggio - giugno 2019)
DRIIM - What's Hot (maggio - giugno 2019)Accenture Italia
 
The Age of Relevance - Accenture Customer Innovation Network Milan
The Age of Relevance - Accenture Customer Innovation Network MilanThe Age of Relevance - Accenture Customer Innovation Network Milan
The Age of Relevance - Accenture Customer Innovation Network MilanAccenture Italia
 
The Age of Relevance – Mark Curtis, Fjord
The Age of Relevance – Mark Curtis, FjordThe Age of Relevance – Mark Curtis, Fjord
The Age of Relevance – Mark Curtis, FjordAccenture Italia
 
Accenture Corporate Citizenship Report 2018
Accenture Corporate Citizenship Report 2018Accenture Corporate Citizenship Report 2018
Accenture Corporate Citizenship Report 2018Accenture Italia
 
DRIIM - What's Hot (marzo - aprile 2019)
DRIIM - What's Hot (marzo - aprile 2019)DRIIM - What's Hot (marzo - aprile 2019)
DRIIM - What's Hot (marzo - aprile 2019)Accenture Italia
 
DRIIM - What's Hot (Gennaio - Febbraio 2019)
DRIIM - What's Hot (Gennaio - Febbraio 2019)DRIIM - What's Hot (Gennaio - Febbraio 2019)
DRIIM - What's Hot (Gennaio - Febbraio 2019)Accenture Italia
 
DRIIM - What's Hot (Settembre - Ottobre 2018)
DRIIM - What's Hot (Settembre - Ottobre 2018)DRIIM - What's Hot (Settembre - Ottobre 2018)
DRIIM - What's Hot (Settembre - Ottobre 2018)Accenture Italia
 
POSITION PAPER PER L’ECONOMIA CIRCOLARE
POSITION PAPER PER L’ECONOMIA CIRCOLAREPOSITION PAPER PER L’ECONOMIA CIRCOLARE
POSITION PAPER PER L’ECONOMIA CIRCOLAREAccenture Italia
 
Accenture Technology Vision 2017 - Infografica
Accenture Technology Vision 2017 - InfograficaAccenture Technology Vision 2017 - Infografica
Accenture Technology Vision 2017 - InfograficaAccenture Italia
 

Plus de Accenture Italia (20)

Accenture United Nations Global Compact: Communication on Progress 2021
Accenture United Nations Global Compact: Communication on Progress 2021Accenture United Nations Global Compact: Communication on Progress 2021
Accenture United Nations Global Compact: Communication on Progress 2021
 
Studio Accenture-AGICI 2022
Studio Accenture-AGICI 2022Studio Accenture-AGICI 2022
Studio Accenture-AGICI 2022
 
Accenture United Nations Global Compact: Communication on Progress 2020
Accenture United Nations Global Compact: Communication on Progress 2020Accenture United Nations Global Compact: Communication on Progress 2020
Accenture United Nations Global Compact: Communication on Progress 2020
 
Accenture Italia Corporate Citizenship Report 2020
Accenture Italia Corporate Citizenship Report 2020Accenture Italia Corporate Citizenship Report 2020
Accenture Italia Corporate Citizenship Report 2020
 
Accenture Corporate Citizenship Report 2019
Accenture Corporate Citizenship Report 2019Accenture Corporate Citizenship Report 2019
Accenture Corporate Citizenship Report 2019
 
Gli approcci alla sostenibilità della GDO italiana
Gli approcci alla sostenibilità della GDO italianaGli approcci alla sostenibilità della GDO italiana
Gli approcci alla sostenibilità della GDO italiana
 
Sustainability: A new integrated framework for enterprise performance management
Sustainability: A new integrated framework for enterprise performance managementSustainability: A new integrated framework for enterprise performance management
Sustainability: A new integrated framework for enterprise performance management
 
What’s Hot Maggio – Giugno 2020
What’s Hot Maggio – Giugno 2020What’s Hot Maggio – Giugno 2020
What’s Hot Maggio – Giugno 2020
 
What’s Hot Marzo – Aprile 2020
What’s Hot Marzo – Aprile 2020What’s Hot Marzo – Aprile 2020
What’s Hot Marzo – Aprile 2020
 
What’s Hot Luglio - Agosto
What’s Hot Luglio - Agosto What’s Hot Luglio - Agosto
What’s Hot Luglio - Agosto
 
General data protection regulation - GDPR
General data protection regulation - GDPRGeneral data protection regulation - GDPR
General data protection regulation - GDPR
 
DRIIM - What's Hot (maggio - giugno 2019)
DRIIM - What's Hot (maggio - giugno 2019)DRIIM - What's Hot (maggio - giugno 2019)
DRIIM - What's Hot (maggio - giugno 2019)
 
The Age of Relevance - Accenture Customer Innovation Network Milan
The Age of Relevance - Accenture Customer Innovation Network MilanThe Age of Relevance - Accenture Customer Innovation Network Milan
The Age of Relevance - Accenture Customer Innovation Network Milan
 
The Age of Relevance – Mark Curtis, Fjord
The Age of Relevance – Mark Curtis, FjordThe Age of Relevance – Mark Curtis, Fjord
The Age of Relevance – Mark Curtis, Fjord
 
Accenture Corporate Citizenship Report 2018
Accenture Corporate Citizenship Report 2018Accenture Corporate Citizenship Report 2018
Accenture Corporate Citizenship Report 2018
 
DRIIM - What's Hot (marzo - aprile 2019)
DRIIM - What's Hot (marzo - aprile 2019)DRIIM - What's Hot (marzo - aprile 2019)
DRIIM - What's Hot (marzo - aprile 2019)
 
DRIIM - What's Hot (Gennaio - Febbraio 2019)
DRIIM - What's Hot (Gennaio - Febbraio 2019)DRIIM - What's Hot (Gennaio - Febbraio 2019)
DRIIM - What's Hot (Gennaio - Febbraio 2019)
 
DRIIM - What's Hot (Settembre - Ottobre 2018)
DRIIM - What's Hot (Settembre - Ottobre 2018)DRIIM - What's Hot (Settembre - Ottobre 2018)
DRIIM - What's Hot (Settembre - Ottobre 2018)
 
POSITION PAPER PER L’ECONOMIA CIRCOLARE
POSITION PAPER PER L’ECONOMIA CIRCOLAREPOSITION PAPER PER L’ECONOMIA CIRCOLARE
POSITION PAPER PER L’ECONOMIA CIRCOLARE
 
Accenture Technology Vision 2017 - Infografica
Accenture Technology Vision 2017 - InfograficaAccenture Technology Vision 2017 - Infografica
Accenture Technology Vision 2017 - Infografica
 

Dernier

joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...NadhimTaha
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateCannaBusinessPlans
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Omaninstagramfab782445
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSpanmisemningshen123
 
BeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfBeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfDerekIwanaka1
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptxRoofing Contractor
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsShree Krishna Exports
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Timegargpaaro
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfwill854175
 

Dernier (20)

unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
BeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfBeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdf
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 

I Costi del Cybercrime 2017 - Italia

  • 1. COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE IN ITALY
  • 2. SECURITY BREACHES CONTINUE TO PLAGUE ITALIAN COMPANIES Average annualized cost of cyber crime (USD) $6.73MAverage number of security breaches each year 52 … AND SPENDING ON BREACHES CONTINUES TO RISE … BUT ITALY DEFENSES COMPARE BETTER THAN THE GLOBAL AVERAGE Average number of security breaches each year 130 Copyright © 2017 Accenture Security. All rights reserved. 2
  • 3. Copyright © 2017 Accenture Security. All rights reserved. 3 IN ITALY, MALICIOUS INSIDERS AND DENIAL OF SERVICES ARE THE TWO MOST COSTLY ATTACK TYPES [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] $116,443 $0K 25 50 75 100 125 150 Botnets Malware Stolen devices Ransomware Malicious code Web-based attacks Phishing & social engineering Denial of services Malicious insiders Average cost per attack $ thousands Legend n = 182 interviews in Italy
  • 4. Copyright © 2017 Accenture Security. All rights reserved. 4 MALICIOUS CODE AND MALICIOUS INSIDERS CONTINUE TO TOP THE LIST -- TAKING THE LONGEST TO RESOLVE Length of time to resolve an attack in days Estimated average time is measured for each attack type in days Legend N = 109 Interviews FY 2016 FY 2017 [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] 0 Days 10 20 30 40 50 60 Botnets Malware Stolen devices Denial of service Phishing & social engineering Ransomware Web-based attack Malicious insiders Malicious code
  • 5. Copyright © 2017 Accenture Security. All rights reserved. 5 DETECTION ACCOUNTS FOR 1/3RD OF SECURITY COSTS ON AVERAGE … 22 Containment 22 Recovery 13 Investigation 34 Detection 9 Incident Management and ex-post response Percentage cost by internal activities Legend n = 182 interviews in Italy Detection Containment Recovery Investigation Incident Management and ex-post response
  • 6. Copyright © 2017 Accenture Security. All rights reserved. 6 … BUT INFORMATION LOSS IS ONE OF THE MOST EXPENSIVE CONSEQUENCES OF CYBER ATTACKS IN ITALY Percentage cost by consequence Legend n = 182 interviews in Italy Business disruption Information loss Revenue loss Equipment damage 44 Information Loss 20 Revenue Loss 32 Business Disruption 3 Equipment Damage
  • 7. Copyright © 2017 Accenture Security. All rights reserved. 7 AI SECURITY TECHNOLOGIES RANKS 3RD AND ADVANCED ANALYTICS 4TH FOR COST SAVINGS [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] [CELLRANGE] 0 1 2 3 4 5 6 7 8 9 Automated policy management Enterprise deployment of Governance, Risk & Compliance Extensive use of data loss prevention Extensive deployment of encryption technologies Advanced perimeter controls Extensive use of cyber analytics and User Behavior Analytics Automation, orchestration and machine learning Advanced identity and access governance Security intelligence systems Value gap Rank orderings by spending levels and cost savings Legend 1 = Highest rank 9 = Lowest rank Rank by percentage spending Rank by cost savings
  • 8. Copyright © 2017 Accenture Security. All rights reserved. 8 … BUT ONLY 29% HAVE DEPLOYED AI AND ADVANCED ANALYTICS SECURITY TECHNOLOGIES [CELLRANGE] [CELLRANGE] [CELLRANGE] 47 [CELLRANGE] 53 63 53 67% Automation, orchestration and machine learning Extensive use of cyber analytics and User Behavior Analytics Automated policy management Enterprise deployment of Governance, Risk & Compliance Extensive use of data loss prevention Extensive deployment of encryption technologies Security intelligence systems Advanced perimeter controls Advanced identity and access governance 0% 10 20 30 40 50 60 70 Nine enabling security technologies deployed in Italy Legend n = 182 interviews in Italy Percentage deployment frequency
  • 9. Copyright © 2017 Accenture Security. All rights reserved. 9 PRIORITIZE BREAKTHROUGH INNOVATIONS LIKE AI AND ADVANCED ANALYTICS Organizations need to: 1. Better balance investments in security technologies 2. Use compliance technology—but don’t bet the business on it 3. Grasp the innovation opportunity 1 2 3
  • 10. Copyright © 2017 Accenture Security. All rights reserved. 10 WE RECOMMEND THREE STEPS TO IMPROVE CYBERSECURITY EFFECTIVENESS Become brilliant at the basics Build cybersecurity on a strong foundation Undertake extreme pressure testing Identify vulnerabilities more rigorously Invest in breakthrough innovation Enhance program effectiveness and scale value 1 2 3
  • 11. Copyright © 2017 Accenture Security. All rights reserved. 11 ABOUT THE RESEARCH 2,182 interviews 7countries Australia France Germany Italy Japan United Kingdom United States 254 companies 8-year research program Jointly developed with: Examining the economic impact of cyber attacks
  • 12. About Accenture Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions—underpinned by the world’s largest delivery network—Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With approximately 435,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com About Accenture Security Accenture Security helps organizations build resilience from the inside out, so they can confidently focus on innovation and growth. Leveraging its global network of cybersecurity labs, deep industry understanding across client value chains and services that span the security lifecycle, Accenture protects organization’s valuable assets, end-to-end. With services that include strategy and risk management, cyber defense, digital identity, application security and managed security, Accenture enables businesses around the world to defend against known sophisticated threats, and the unknown. Follow us @AccentureSecure on Twitter or visit the Accenture Security blog. Learn more: http://accenture.com/security