SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
Copyright © 2016 Accenture All rights reserved.
Cybersecurity professionals must work with business units,
executives, and all employees, partners and customers—all members
of the extended enterprise—to sustain an environment of digital
trust and promote the success of the digital business.
In the digital business environment, trust
is built on two components: ethics and
security. Consumers not only expect
cybersecurity; they demand it in today's
trust-based digital economy.
The State of Cybersecurity
and Digital Trust 2016
THE STATE OF CYBER THREATS
Significant and Diverse
The “state of the art” in cyber defense is evolving as digital
technologies proliferate and professional threat actors increase.
Many threats to data
come from within
2 out of 3 respondents
reported experiencing
data theft or corruption
from within their
organizations.
Between the technical and
operational skill set required
and the pool of available talent.
MANAGEMENT GAP
TECHNOLOGY GAP
Between the growth of cyber threats
and the ability to quickly deploy and
leverage new technologies to secure
business initiatives.
Between cyber preparedness and
threats among regions, verticals and
partners in the extended enterprise.
Between the budget required
and available funds—a gap
fueled by financial realities
and management focus.
Between executive management’s
and security operations’
perceptions of cybersecurity in the
extended enterprise. This gap,
if addressed, could lead the way
to closing the other gaps.
PARITY GAP
BUDGET GAP
OPPORTUNITY
Acquire top talent,
develop talent through
effective training and
testing, and establish
business partnerships.
Collaboration is critical.
OPPORTUNITY
Foster an enterprise culture of
corporate and personal data
responsibility and security.
OPPORTUNITY
Adopt a long-range strategy
of budget and talent
expansion, coupled with
a conceptualize-test-
implement-refine methodology.
OPPORTUNITY
Strengthen security
partnerships with all providers.
OPPORTUNITY
Tightly link cybersecurity
to—or embed it in—risk
management and digital
functions to obtain
optimal funding.
GAP
54% indicated their
employees are
underprepared to prevent
security breaches.
GAP
35% believed management is
unconcerned with security,
and 36% believed
management considers
security an unnecessary cost.
GAP
The largest growth was anticipated
in emerging technologies to mitigate
advanced threats: cognitive
computing/AI (33% increase), data
anonymization (31% increase);
behavioral tracking (25% increase);
and automation (21% increase).
GAP
On average only 35-57% of
partners were reported to be
cyber vetted, placing most
enterprises at considerable
risk. And anticipated
41-51% improvement in
vetting still leaves gaps.
GAP
62% indicated that
the biggest inhibitor
to securing their
enterprise is
budget-related.
External threats
are a rising concern
For almost half (48%) of
respondents, organized
teams of professionals
and organized crime will
be the external threats
of most concern.
Digital
transformation is
having a major impact
Half of respondents
said digital initiatives
are having a strong
or critical impact on
data security.
Customer-facing
initiatives require
strong security
The business goals
identified as most
vulnerable to data
security gaps were brand
reputation (43% of
respondents) and
customer support (37%).
Threats are
increasing
The most significant
expected increase was
a 62% hike in data
theft or corruption of
corporate information
by insiders.
THE FUTURE DEPENDS ON TALENT, LEADERSHIP FOCUS, AND BUDGET
Actions to foster a culture of cybersecurity
awareness and enhance digital trust
THE STATE OF CYBER RESPONSE
Five Cybersecurity Gaps Undermining Digital Trust
Set security priorities
consistent with
business goals
Acquire, train and
develop security talent
Increase collaboration
between security
operations and management
Develop innovation
and testing capabilities
Change how
cybersecurity
funding is viewed
TALENT GAP

Contenu connexe

Tendances

Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture Insurance
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...Accenture Technology
 
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderAccenture Australia
 
2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New Yorkaccenture
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportAccenture Technology
 
Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationHarnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationAccenture Operations
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalAccenture Technology
 
Technology Vision 2016 - Infographic
Technology Vision 2016 - InfographicTechnology Vision 2016 - Infographic
Technology Vision 2016 - InfographicAccenture Technology
 
Digital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and OpportunityDigital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and Opportunityaccenture
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016Melissa Gilpin
 
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Operations
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - IrelandAccenture Security
 
The State of the Federal IT Market 2018
The State of the Federal IT Market 2018The State of the Federal IT Market 2018
The State of the Federal IT Market 2018accenture
 
Leading the Digital Enterprise
Leading the Digital EnterpriseLeading the Digital Enterprise
Leading the Digital Enterpriseaccenture
 
Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceTechnology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceAccenture Operations
 
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018Accenture Australia
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare Accenture Security
 

Tendances (20)

Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for Insurance
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leader
 
2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationHarnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open Innovation
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Technology Vision 2016 - Infographic
Technology Vision 2016 - InfographicTechnology Vision 2016 - Infographic
Technology Vision 2016 - Infographic
 
Digital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and OpportunityDigital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and Opportunity
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Cloud in the Boardroom
Cloud in the BoardroomCloud in the Boardroom
Cloud in the Boardroom
 
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland
 
The State of the Federal IT Market 2018
The State of the Federal IT Market 2018The State of the Federal IT Market 2018
The State of the Federal IT Market 2018
 
Leading the Digital Enterprise
Leading the Digital EnterpriseLeading the Digital Enterprise
Leading the Digital Enterprise
 
Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceTechnology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Service
 
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare
 

Similaire à The State of Cybersecurity and Digital Trust 2016

SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSilicon Valley Bank
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey Rahul Neel Mani
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for InsuranceAccenture Insurance
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyScalar Decisions
 
2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summarypatmisasi
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesJoseph DeFever
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseThe Economist Media Businesses
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey ReportDImension Data
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22IDG
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSilicon Valley Bank
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summarypatmisasi
 
Securing Consumer Trust
Securing Consumer TrustSecuring Consumer Trust
Securing Consumer Trustaccenture
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022Gartner Peer Insights
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise ReportOkta-Inc
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 

Similaire à The State of Cybersecurity and Digital Trust 2016 (20)

SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
 
Securing Consumer Trust
Securing Consumer TrustSecuring Consumer Trust
Securing Consumer Trust
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 

Plus de Accenture Operations

Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureAccenture Operations
 
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureAccenture Operations
 
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureAccenture Operations
 
Network Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureNetwork Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureAccenture Operations
 
Network Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureNetwork Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureAccenture Operations
 
Start your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureStart your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureAccenture Operations
 
Start your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureStart your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureAccenture Operations
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureAccenture Operations
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureAccenture Operations
 
Driving change: Unlocking data to transform the front office
Driving change: Unlocking data to transform the front officeDriving change: Unlocking data to transform the front office
Driving change: Unlocking data to transform the front officeAccenture Operations
 
Marketing Operations | SlideShare | Accenture
Marketing Operations | SlideShare | AccentureMarketing Operations | SlideShare | Accenture
Marketing Operations | SlideShare | AccentureAccenture Operations
 
The Value Multiplier | SlideShare | Accenture
The Value Multiplier | SlideShare | AccentureThe Value Multiplier | SlideShare | Accenture
The Value Multiplier | SlideShare | AccentureAccenture Operations
 
Intelligent Talent & HR Operations | SlideShare | Accenture
Intelligent Talent & HR Operations | SlideShare | AccentureIntelligent Talent & HR Operations | SlideShare | Accenture
Intelligent Talent & HR Operations | SlideShare | AccentureAccenture Operations
 
Intelligent Marketing Operations | SlideShare | Accenture
Intelligent Marketing Operations | SlideShare | AccentureIntelligent Marketing Operations | SlideShare | Accenture
Intelligent Marketing Operations | SlideShare | AccentureAccenture Operations
 
Elevate with Intelligent Supply Chain | SlideShare | Accenture
Elevate with Intelligent Supply Chain | SlideShare | AccentureElevate with Intelligent Supply Chain | SlideShare | Accenture
Elevate with Intelligent Supply Chain | SlideShare | AccentureAccenture Operations
 
Fast-Track to Future-Ready Finance Operations
Fast-Track to Future-Ready Finance OperationsFast-Track to Future-Ready Finance Operations
Fast-Track to Future-Ready Finance OperationsAccenture Operations
 
Elevate Every Decision with Intelligent Procurement
Elevate Every Decision with Intelligent ProcurementElevate Every Decision with Intelligent Procurement
Elevate Every Decision with Intelligent ProcurementAccenture Operations
 
Elevate Every Decision with Digital Inside Sales
Elevate Every Decision with Digital Inside SalesElevate Every Decision with Digital Inside Sales
Elevate Every Decision with Digital Inside SalesAccenture Operations
 
Fast Track to Future Ready Banking Operations
Fast Track to Future Ready Banking OperationsFast Track to Future Ready Banking Operations
Fast Track to Future Ready Banking OperationsAccenture Operations
 
Fast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance OperationsFast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance OperationsAccenture Operations
 

Plus de Accenture Operations (20)

Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | Accenture
 
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | Accenture
 
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | Accenture
 
Network Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureNetwork Operations | SlideShare | Accenture
Network Operations | SlideShare | Accenture
 
Network Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureNetwork Operations | SlideShare | Accenture
Network Operations | SlideShare | Accenture
 
Start your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureStart your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | Accenture
 
Start your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureStart your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | Accenture
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | Accenture
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | Accenture
 
Driving change: Unlocking data to transform the front office
Driving change: Unlocking data to transform the front officeDriving change: Unlocking data to transform the front office
Driving change: Unlocking data to transform the front office
 
Marketing Operations | SlideShare | Accenture
Marketing Operations | SlideShare | AccentureMarketing Operations | SlideShare | Accenture
Marketing Operations | SlideShare | Accenture
 
The Value Multiplier | SlideShare | Accenture
The Value Multiplier | SlideShare | AccentureThe Value Multiplier | SlideShare | Accenture
The Value Multiplier | SlideShare | Accenture
 
Intelligent Talent & HR Operations | SlideShare | Accenture
Intelligent Talent & HR Operations | SlideShare | AccentureIntelligent Talent & HR Operations | SlideShare | Accenture
Intelligent Talent & HR Operations | SlideShare | Accenture
 
Intelligent Marketing Operations | SlideShare | Accenture
Intelligent Marketing Operations | SlideShare | AccentureIntelligent Marketing Operations | SlideShare | Accenture
Intelligent Marketing Operations | SlideShare | Accenture
 
Elevate with Intelligent Supply Chain | SlideShare | Accenture
Elevate with Intelligent Supply Chain | SlideShare | AccentureElevate with Intelligent Supply Chain | SlideShare | Accenture
Elevate with Intelligent Supply Chain | SlideShare | Accenture
 
Fast-Track to Future-Ready Finance Operations
Fast-Track to Future-Ready Finance OperationsFast-Track to Future-Ready Finance Operations
Fast-Track to Future-Ready Finance Operations
 
Elevate Every Decision with Intelligent Procurement
Elevate Every Decision with Intelligent ProcurementElevate Every Decision with Intelligent Procurement
Elevate Every Decision with Intelligent Procurement
 
Elevate Every Decision with Digital Inside Sales
Elevate Every Decision with Digital Inside SalesElevate Every Decision with Digital Inside Sales
Elevate Every Decision with Digital Inside Sales
 
Fast Track to Future Ready Banking Operations
Fast Track to Future Ready Banking OperationsFast Track to Future Ready Banking Operations
Fast Track to Future Ready Banking Operations
 
Fast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance OperationsFast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance Operations
 

Dernier

Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateCannaBusinessPlans
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...NadhimTaha
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannaBusinessPlans
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Omaninstagramfab782445
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030tarushabhavsar
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified Binance Account
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfbelieveminhh
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSpanmisemningshen123
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdflaloo_007
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 

Dernier (20)

Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From Seosmmearth
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 

The State of Cybersecurity and Digital Trust 2016

  • 1. Copyright © 2016 Accenture All rights reserved. Cybersecurity professionals must work with business units, executives, and all employees, partners and customers—all members of the extended enterprise—to sustain an environment of digital trust and promote the success of the digital business. In the digital business environment, trust is built on two components: ethics and security. Consumers not only expect cybersecurity; they demand it in today's trust-based digital economy. The State of Cybersecurity and Digital Trust 2016 THE STATE OF CYBER THREATS Significant and Diverse The “state of the art” in cyber defense is evolving as digital technologies proliferate and professional threat actors increase. Many threats to data come from within 2 out of 3 respondents reported experiencing data theft or corruption from within their organizations. Between the technical and operational skill set required and the pool of available talent. MANAGEMENT GAP TECHNOLOGY GAP Between the growth of cyber threats and the ability to quickly deploy and leverage new technologies to secure business initiatives. Between cyber preparedness and threats among regions, verticals and partners in the extended enterprise. Between the budget required and available funds—a gap fueled by financial realities and management focus. Between executive management’s and security operations’ perceptions of cybersecurity in the extended enterprise. This gap, if addressed, could lead the way to closing the other gaps. PARITY GAP BUDGET GAP OPPORTUNITY Acquire top talent, develop talent through effective training and testing, and establish business partnerships. Collaboration is critical. OPPORTUNITY Foster an enterprise culture of corporate and personal data responsibility and security. OPPORTUNITY Adopt a long-range strategy of budget and talent expansion, coupled with a conceptualize-test- implement-refine methodology. OPPORTUNITY Strengthen security partnerships with all providers. OPPORTUNITY Tightly link cybersecurity to—or embed it in—risk management and digital functions to obtain optimal funding. GAP 54% indicated their employees are underprepared to prevent security breaches. GAP 35% believed management is unconcerned with security, and 36% believed management considers security an unnecessary cost. GAP The largest growth was anticipated in emerging technologies to mitigate advanced threats: cognitive computing/AI (33% increase), data anonymization (31% increase); behavioral tracking (25% increase); and automation (21% increase). GAP On average only 35-57% of partners were reported to be cyber vetted, placing most enterprises at considerable risk. And anticipated 41-51% improvement in vetting still leaves gaps. GAP 62% indicated that the biggest inhibitor to securing their enterprise is budget-related. External threats are a rising concern For almost half (48%) of respondents, organized teams of professionals and organized crime will be the external threats of most concern. Digital transformation is having a major impact Half of respondents said digital initiatives are having a strong or critical impact on data security. Customer-facing initiatives require strong security The business goals identified as most vulnerable to data security gaps were brand reputation (43% of respondents) and customer support (37%). Threats are increasing The most significant expected increase was a 62% hike in data theft or corruption of corporate information by insiders. THE FUTURE DEPENDS ON TALENT, LEADERSHIP FOCUS, AND BUDGET Actions to foster a culture of cybersecurity awareness and enhance digital trust THE STATE OF CYBER RESPONSE Five Cybersecurity Gaps Undermining Digital Trust Set security priorities consistent with business goals Acquire, train and develop security talent Increase collaboration between security operations and management Develop innovation and testing capabilities Change how cybersecurity funding is viewed TALENT GAP