SlideShare a Scribd company logo
1 of 15
Copyright © 2015 Accenture All rights reserved.
Continuous Cyber Attacks:
Engaging Business Leaders for the New Normal
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
Organizations face a cybercrime
wave that is increasing in
intensity and sophistication
Cyber defenses are threatened from well-funded,
highly motivated digital adversaries
Sophisticated hackers are using state-of-the-art
techniques
It’s never been easier or more lucrative for
adversaries to cash in on their efforts
Cyber-thieves operate across borders and rarely
face prosecution
2
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
Business leaders must establish
a holistic, end-to-end security
strategy to protect the organization
• Regulatory compliance is not enough
• Purchasing the latest security products can drain the budget
without improving overall defense
3
A solid cyber defense approach requires a shift in
approach: the organization’s business side must
partner with the security organization
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
The following 3 approaches
can help an organization
minimize cyber-crime risk
Make the business a better security
“customer”
Strengthen the partnership between
the business and security
Continuously exercise organizational
defenses
4
1
2
3
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
1Make the business a better
security “customer”
• A solid cyber defense requires
companies to interlock an
organization’s business stakeholders,
its risk management office and the
security team
• Develop a true relationship that asks
all employees to own responsibility
for security
5
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
When the business side fails to
cooperate with the security team,
multiple challenges emerge
• Security lacks sufficient top
management access
• The front lines remain unengaged in
security issues
• Ambiguity regarding who “owns” the
systems under attack
6
1
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
Strengthening the relationship
between the business and security
transforms the organization’s
security posture
Leaders take
responsibility to
keep security on the
agenda
Recognize the
complexity
of the challenge
7
Work together to identify
the organization’s
critical data
Evolve the
organizational culture
to attract and retain top-
tier security talent
2
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
Strengthen the partnership
between the business and
security
• Put security on the agenda
• Focus on cyber defense innovation
• Embrace and implement new ideas
• Develop security strategies approved by
leaders
• Make information security a business priority
• Inform employees on business security
requirements
8
2
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
Strengthen the partnership
between the business and
security
Recognize the complexity of the
challenge
• Determine the best way to manage cyber
losses
• Develop a complete scope of potential
damage areas, including data, business
operations, company brand, consumer
confidence
• Recognize that future costs could rise
• Prioritize the protection of critical information
9
2
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
Strengthen the partnership
between the business and
security
Work together to identify the
organization’s critical data
• Analyze the organization as a hacker
would to identify vulnerabilities
• Focus efforts on the truly critical assets
to reduce risk
• Delete or encrypt online information
• Reduce data volume where possible
10
2
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
Strengthen the partnership
between the business and
security
Seek top-tier security talent
• Think proactively and creatively to attract and
retain scarce, expert security resources
• Build the executive team’s confidence in
security leaders
• Work with universities to develop cyber
defense recruits
• Look for expertise outside of normal channels
• Consider dual-track career paths for cyber
defense experts who seek higher managerial
roles
11
2
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
Exercise defenses with a
sparring partner to develop
organizational resilience
Relentlessly test defenses with a third-party
sparring partner who can realistically mimic
hackers
Assume security is compromised and
constantly hunt for intruders across the
environment
Be prepared to react rapidly in removing
attackers from the environment before they
can achieve their objectives
Copyright © 2015 Accenture All rights reserved.
3
12
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
The current digital attack waves
are dangerous for businesses
and governments. Leaders should
take action now to make their
organizations more resilient.
Copyright © 2015 Accenture All rights reserved. 13
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
Thank You
Please visit
www.accenture.com/cyberdefense
for additional information.
#CyberDefense
Follow us on Twitter
@AccentureSecure
14
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
About Accenture
Accenture is a leading global professional services company,
providing a broad range of services and solutions in strategy,
consulting, digital, technology and operations. Combining
unmatched experience and specialized skills across more than 40
industries and all business functions—underpinned by the world’s
largest delivery network—Accenture works at the intersection of
business and technology to help clients improve their performance
and create sustainable value for their stakeholders. With more
than 358,000 people serving clients in more than 120 countries,
Accenture drives innovation to improve the way the world works
and lives. Visit us at www.accenture.com.
Copyright © 2015 Accenture All rights reserved. 15

More Related Content

What's hot

Cloud in the Boardroom
Cloud in the BoardroomCloud in the Boardroom
Cloud in the Boardroom
Accenture Operations
 

What's hot (20)

Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationHarnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open Innovation
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
Accenture High Performance Security Report 2016 For Communications
Accenture High Performance  Security Report 2016 For CommunicationsAccenture High Performance  Security Report 2016 For Communications
Accenture High Performance Security Report 2016 For Communications
 
Intelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital BusinessIntelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital Business
 
Accenture Liquid Application Studio
Accenture Liquid Application StudioAccenture Liquid Application Studio
Accenture Liquid Application Studio
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for Insurance
 
Intelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital BusinessIntelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital Business
 
Cloud in the Boardroom
Cloud in the BoardroomCloud in the Boardroom
Cloud in the Boardroom
 
2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York
 
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leader
 
Technology Vision 2016 - Infographic
Technology Vision 2016 - InfographicTechnology Vision 2016 - Infographic
Technology Vision 2016 - Infographic
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
 

Similar to Continuous Cyber Attacks: Engaging Business Leaders for the New Normal

IT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsIT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and Tools
Andrew S. Baker (ASB)
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises?
Pierre Audoin Consultants
 

Similar to Continuous Cyber Attacks: Engaging Business Leaders for the New Normal (20)

Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to Leader
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber Resilience
 
The Cyber Security Leap
The Cyber Security LeapThe Cyber Security Leap
The Cyber Security Leap
 
Healthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber ResilienceHealthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber Resilience
 
Strategic Cybersecurity
Strategic CybersecurityStrategic Cybersecurity
Strategic Cybersecurity
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilience
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
 
The Science of Security
The Science of SecurityThe Science of Security
The Science of Security
 
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
 
Are you Ready to be an Insurer of Things?
Are you Ready to be an Insurer of Things?Are you Ready to be an Insurer of Things?
Are you Ready to be an Insurer of Things?
 
Securing Solutions Amid The Journey To Digital Transformation.pdf
Securing Solutions Amid The Journey To Digital Transformation.pdfSecuring Solutions Amid The Journey To Digital Transformation.pdf
Securing Solutions Amid The Journey To Digital Transformation.pdf
 
IT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsIT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and Tools
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial Services
 
Securing Consumer Trust
Securing Consumer TrustSecuring Consumer Trust
Securing Consumer Trust
 
Tech Conferences To Share Ways Of Building A Robust Cybersecurity Culture
Tech Conferences To Share Ways Of Building A Robust Cybersecurity CultureTech Conferences To Share Ways Of Building A Robust Cybersecurity Culture
Tech Conferences To Share Ways Of Building A Robust Cybersecurity Culture
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises?
 

More from Accenture Operations

More from Accenture Operations (20)

Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | Accenture
 
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | Accenture
 
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | Accenture
 
Network Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureNetwork Operations | SlideShare | Accenture
Network Operations | SlideShare | Accenture
 
Network Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureNetwork Operations | SlideShare | Accenture
Network Operations | SlideShare | Accenture
 
Start your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureStart your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | Accenture
 
Start your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureStart your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | Accenture
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | Accenture
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | Accenture
 
Driving change: Unlocking data to transform the front office
Driving change: Unlocking data to transform the front officeDriving change: Unlocking data to transform the front office
Driving change: Unlocking data to transform the front office
 
Marketing Operations | SlideShare | Accenture
Marketing Operations | SlideShare | AccentureMarketing Operations | SlideShare | Accenture
Marketing Operations | SlideShare | Accenture
 
The Value Multiplier | SlideShare | Accenture
The Value Multiplier | SlideShare | AccentureThe Value Multiplier | SlideShare | Accenture
The Value Multiplier | SlideShare | Accenture
 
Intelligent Talent & HR Operations | SlideShare | Accenture
Intelligent Talent & HR Operations | SlideShare | AccentureIntelligent Talent & HR Operations | SlideShare | Accenture
Intelligent Talent & HR Operations | SlideShare | Accenture
 
Intelligent Marketing Operations | SlideShare | Accenture
Intelligent Marketing Operations | SlideShare | AccentureIntelligent Marketing Operations | SlideShare | Accenture
Intelligent Marketing Operations | SlideShare | Accenture
 
Elevate with Intelligent Supply Chain | SlideShare | Accenture
Elevate with Intelligent Supply Chain | SlideShare | AccentureElevate with Intelligent Supply Chain | SlideShare | Accenture
Elevate with Intelligent Supply Chain | SlideShare | Accenture
 
Fast-Track to Future-Ready Finance Operations
Fast-Track to Future-Ready Finance OperationsFast-Track to Future-Ready Finance Operations
Fast-Track to Future-Ready Finance Operations
 
Elevate Every Decision with Intelligent Procurement
Elevate Every Decision with Intelligent ProcurementElevate Every Decision with Intelligent Procurement
Elevate Every Decision with Intelligent Procurement
 
Elevate Every Decision with Digital Inside Sales
Elevate Every Decision with Digital Inside SalesElevate Every Decision with Digital Inside Sales
Elevate Every Decision with Digital Inside Sales
 
Fast Track to Future Ready Banking Operations
Fast Track to Future Ready Banking OperationsFast Track to Future Ready Banking Operations
Fast Track to Future Ready Banking Operations
 
Fast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance OperationsFast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance Operations
 

Recently uploaded

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 

Recently uploaded (20)

The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLJAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 

Continuous Cyber Attacks: Engaging Business Leaders for the New Normal

  • 1. Copyright © 2015 Accenture All rights reserved. Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
  • 2. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. Organizations face a cybercrime wave that is increasing in intensity and sophistication Cyber defenses are threatened from well-funded, highly motivated digital adversaries Sophisticated hackers are using state-of-the-art techniques It’s never been easier or more lucrative for adversaries to cash in on their efforts Cyber-thieves operate across borders and rarely face prosecution 2
  • 3. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. Business leaders must establish a holistic, end-to-end security strategy to protect the organization • Regulatory compliance is not enough • Purchasing the latest security products can drain the budget without improving overall defense 3 A solid cyber defense approach requires a shift in approach: the organization’s business side must partner with the security organization
  • 4. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. The following 3 approaches can help an organization minimize cyber-crime risk Make the business a better security “customer” Strengthen the partnership between the business and security Continuously exercise organizational defenses 4 1 2 3
  • 5. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. 1Make the business a better security “customer” • A solid cyber defense requires companies to interlock an organization’s business stakeholders, its risk management office and the security team • Develop a true relationship that asks all employees to own responsibility for security 5
  • 6. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. When the business side fails to cooperate with the security team, multiple challenges emerge • Security lacks sufficient top management access • The front lines remain unengaged in security issues • Ambiguity regarding who “owns” the systems under attack 6 1
  • 7. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. Strengthening the relationship between the business and security transforms the organization’s security posture Leaders take responsibility to keep security on the agenda Recognize the complexity of the challenge 7 Work together to identify the organization’s critical data Evolve the organizational culture to attract and retain top- tier security talent 2
  • 8. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. Strengthen the partnership between the business and security • Put security on the agenda • Focus on cyber defense innovation • Embrace and implement new ideas • Develop security strategies approved by leaders • Make information security a business priority • Inform employees on business security requirements 8 2
  • 9. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. Strengthen the partnership between the business and security Recognize the complexity of the challenge • Determine the best way to manage cyber losses • Develop a complete scope of potential damage areas, including data, business operations, company brand, consumer confidence • Recognize that future costs could rise • Prioritize the protection of critical information 9 2
  • 10. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. Strengthen the partnership between the business and security Work together to identify the organization’s critical data • Analyze the organization as a hacker would to identify vulnerabilities • Focus efforts on the truly critical assets to reduce risk • Delete or encrypt online information • Reduce data volume where possible 10 2
  • 11. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. Strengthen the partnership between the business and security Seek top-tier security talent • Think proactively and creatively to attract and retain scarce, expert security resources • Build the executive team’s confidence in security leaders • Work with universities to develop cyber defense recruits • Look for expertise outside of normal channels • Consider dual-track career paths for cyber defense experts who seek higher managerial roles 11 2
  • 12. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. Exercise defenses with a sparring partner to develop organizational resilience Relentlessly test defenses with a third-party sparring partner who can realistically mimic hackers Assume security is compromised and constantly hunt for intruders across the environment Be prepared to react rapidly in removing attackers from the environment before they can achieve their objectives Copyright © 2015 Accenture All rights reserved. 3 12
  • 13. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. The current digital attack waves are dangerous for businesses and governments. Leaders should take action now to make their organizations more resilient. Copyright © 2015 Accenture All rights reserved. 13
  • 14. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. Thank You Please visit www.accenture.com/cyberdefense for additional information. #CyberDefense Follow us on Twitter @AccentureSecure 14
  • 15. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. About Accenture Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions—underpinned by the world’s largest delivery network—Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With more than 358,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com. Copyright © 2015 Accenture All rights reserved. 15