SlideShare une entreprise Scribd logo
1  sur  10
Defending and empowering
the resilient digital business
Accenture
Security Services
Sophisticated, well-funded cybercriminals are
outpacing digital businesses
Copyright © 2016 Accenture. All rights reserved. 2
*Source: Ponemon Institute Study 2015
**Source: “Internet Security Threat Report,” Symantec, April 2015, Volume 20.
The impact of security threats is increasingly devastating.
With the explosion of the IoT, cloud and mobile, digital technology is now pervasive.
The opportunities for attack are surging, opening up new areas of vulnerability for security,
privacy and data integrity.
5 out of 6
organizations with
2,500+ employees
attacked**
317 million
new pieces of
malware created
in 2014**
23% rise
in data breaches in
2014*, and a 50%
spike in successful
attacks since
2012**
$7.7 million
damage per
company in
2015*
Business leaders know it’s not enough to focus purely on prevention of
security breaches.
To truly defend and empower your organization, you also need to detect,
intercept and remediate even the most unthinkable threats.
Boardroom priority: “How resilient are we?”
Copyright © 2016 Accenture. All rights reserved. 3
“The impact of security risks is
understated because a lot goes
unreported. The costs of prevention
and remediation are massive and
the brands of organizations and the
reputations of their top leaders are
put at stake.”
Omar Abbosh,
Chief Strategy Officer, Accenture
Build resilience, outpace attackers and turn to what matters most: innovation and
business growth … uninterrupted.
A persistently vigilant business is a resilient business
Copyright © 2016 Accenture. All rights reserved. 4
Defend the Business from
Hostile Adversaries
Empower Business Growth
& Secure Operations
Confidently address growing boardroom
and C-suite security priorities (shareholder
value, revenue and compliance).
Interlock security strategy with business
strategy and spend appropriately on what’s
most important.
Gain security-situational awareness across
expanding business boundaries and
develop rapid-response capabilities to
minimize losses through next-generation
technology such as security automation and
relentless improvement.
Initiate organizational change and transform
security to be digital friendly, taking into
account user centricity, Internet scale and
digital technologies (IoT, big data etc.).
Continuously test environmental robustness
by “training like you fight.”
Manage technology and process security
risks outside of direct organizational
control while leveraging security “As-a-
Service” for greater agility.
Go beyond risk-based tactics to sophisticated, intelligent digital strategies that
are embedded into the fabric of the enterprise and engineered for the future.
Replace vulnerability with capability
Copyright © 2016 Accenture. All rights reserved. 5
Market Maker
Reactionary
and Ad Hoc
Embedded and
Optimized
Threat-centric,
Risk-based
Compliance-
based
MATURITYLEVEL
2015–16
2013–14
2017
Pre-2010
2018 & Beyond
1.0 2.0 3.0 4.0
2018 and Beyond:
Market Maker
Achieving resilience through
innovative security programs
that have a cross-industry impact.
2017: Embedded
and Optimized
Consistently embedding security
and optimizing the business for
agility, freeing staff to innovate.
Today: Threat-centric,
Risk-based
Proactively identifying and
addressing threats in the context
of enterprise risk.
YEARS
Success hinges on a
360-degree approach
and a relentless
focus on business
impact
Copyright © 2016 Accenture. All rights reserved. 6
Business driven
Threat centric
Digitally protected
Adaptive responses
Agile delivery
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Identity
Incident Response
Remediation
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Our mindset: Continuous innovation, empowered
by technology, our culture and ecosystem
Copyright © 2016 Accenture. All rights reserved. 7
Contextual &
behavioral analytics
Culture of non-stop
innovation
Ecosystem
collaboration
Helps clients quickly
identify active threats to
their businesses.
Accelerates R&D and allows
us to focus on innovating
today while anticipating
tomorrow’s threats and
opportunities.
Leverages a vendor-
independent approach
and the best partnerships
and thinking.
At speed, at scale, on demand
Around the world and around the clock, we speed the pace of your
security journey and help you deliver high performance.
Copyright © 2016 Accenture. All rights reserved.
Trusted advisors. Continuously innovating.
Focused on outcomes.
Copyright © 2016 Accenture. All rights reserved. 9
Comprehensive, holistic solutions
Our holistic capabilities—from security
strategy to operations—and 360-degree
approach that takes into account people,
process and technology, address the full
spectrum of security challenges you face.
A partner that helps you thrive
Combining our deep industry and
technology expertise, we collaborate
closely with you to understand your
business, its values and vulnerabilities so
we can help tightly synch your security
strategy with your business goals.
Culture of continuous innovation
Innovating non stop to stay one step ahead.
Collaborating across our network of R&D
labs, centers of excellence and alliance
ecosystem, to develop breakthrough
solutions built to adapt to and thrive in a
sophisticated threat landscape.
Leaders in next-gen Cyber Defense
Investing in advanced automation,
behavioral analytics and threat-centric
solutions to continuously test, identify and
eliminate exploitable security gaps in real
time and at scale.
Business resilience at speed and scale
Managing security around the world and around
the clock, our global scale, end-to-end
capabilities and proven practices speed the
pace of your security journey and help you
deliver high performance—uninterrupted.
Business outcome focused
Driving measurable business outcomes
for clients with transformation-led solutions
that address increasingly complex needs.
Contacts
Copyright © 2016 Accenture. All rights reserved. 10
Bill Phelps
Security Consulting & Managed
Services
bill.phelps@accenture.com
Andrew Vautier
Security Strategy Center of Excellence
Accenture Chief Information Security Officer
andrew.vautier@accenture.com
Steven Culp
Finance & Risk
steven.r.culp@accenture.com
Ryan LaSalle
Security Consulting & Managed
Services
FusionX
ryan.m.lasalle@accenture.com
Kevin Richards
Security Strategy, North America
k.richards@accenture.com
Adam Burden
Application Security
adam.p.burden@accenture.com
Accenture Strategy Accenture Operations Accenture Financial Services
Accenture Technology

Contenu connexe

Tendances

OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEryk Budi Pratama
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...Raffael Marty
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyePrime Infoserv
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Accenture Communications Industry 2021 - Connected Consumer Platform
Accenture Communications Industry 2021 - Connected Consumer PlatformAccenture Communications Industry 2021 - Connected Consumer Platform
Accenture Communications Industry 2021 - Connected Consumer Platformaccenture
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfParishSummer
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Edureka!
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Journey to Cloud - Enabling the Digital Enterprise - Accenture
Journey to Cloud - Enabling the Digital Enterprise - AccentureJourney to Cloud - Enabling the Digital Enterprise - Accenture
Journey to Cloud - Enabling the Digital Enterprise - AccentureAmazon Web Services
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitectureKris Kimmerle
 

Tendances (20)

OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating Model
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Accenture Communications Industry 2021 - Connected Consumer Platform
Accenture Communications Industry 2021 - Connected Consumer PlatformAccenture Communications Industry 2021 - Connected Consumer Platform
Accenture Communications Industry 2021 - Connected Consumer Platform
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Journey to Cloud - Enabling the Digital Enterprise - Accenture
Journey to Cloud - Enabling the Digital Enterprise - AccentureJourney to Cloud - Enabling the Digital Enterprise - Accenture
Journey to Cloud - Enabling the Digital Enterprise - Accenture
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 

En vedette

Developing a Roadmap for Digital Transformation
Developing a Roadmap for Digital TransformationDeveloping a Roadmap for Digital Transformation
Developing a Roadmap for Digital TransformationJohn Sinke
 
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture - Making the Move: Enabling Security in the CloudAlert Logic
 
Accenture strategy-patient-engagement-consumer-loyalty - copy
Accenture strategy-patient-engagement-consumer-loyalty - copyAccenture strategy-patient-engagement-consumer-loyalty - copy
Accenture strategy-patient-engagement-consumer-loyalty - copyJim Fisher
 
Get Your Shift Together: Aligning Everyone to KPIs that Matter
Get Your Shift Together: Aligning Everyone to KPIs that MatterGet Your Shift Together: Aligning Everyone to KPIs that Matter
Get Your Shift Together: Aligning Everyone to KPIs that MatterJulie Holmes
 
KPMG Automatonophobia
KPMG AutomatonophobiaKPMG Automatonophobia
KPMG AutomatonophobiaUiPath
 
IT Automation: Rise of the Process Robots
IT Automation: Rise of the Process RobotsIT Automation: Rise of the Process Robots
IT Automation: Rise of the Process RobotsCapgemini
 
Deloitte - Automate this: The business leader’s guide to robotic and intellig...
Deloitte - Automate this: The business leader’s guide to robotic and intellig...Deloitte - Automate this: The business leader’s guide to robotic and intellig...
Deloitte - Automate this: The business leader’s guide to robotic and intellig...UiPath
 
6σ, lean and RPA
6σ, lean and RPA6σ, lean and RPA
6σ, lean and RPAUiPath
 
Capgemini Consulting RPA: the next revolution of Corporate Functions
Capgemini Consulting RPA: the next revolution of Corporate FunctionsCapgemini Consulting RPA: the next revolution of Corporate Functions
Capgemini Consulting RPA: the next revolution of Corporate FunctionsUiPath
 
Sei pronto a passare al continuous delivery?
Sei pronto a passare al continuous delivery?Sei pronto a passare al continuous delivery?
Sei pronto a passare al continuous delivery?Accenture Italia
 
RPA and Artificial Intelligence Brochure EQ - U2 b
RPA and Artificial Intelligence Brochure EQ - U2 bRPA and Artificial Intelligence Brochure EQ - U2 b
RPA and Artificial Intelligence Brochure EQ - U2 bZoe Gammie
 
Accenture digital transformation - re-imagine from the outside-in
Accenture   digital transformation - re-imagine from the outside-inAccenture   digital transformation - re-imagine from the outside-in
Accenture digital transformation - re-imagine from the outside-inRick Bouter
 
A case study on Accenture
A case study on AccentureA case study on Accenture
A case study on AccentureDeeban Babu
 
What You Need to Know About Robotic Process Automation: How It Works & Real-W...
What You Need to Know About Robotic Process Automation: How It Works & Real-W...What You Need to Know About Robotic Process Automation: How It Works & Real-W...
What You Need to Know About Robotic Process Automation: How It Works & Real-W...Captricity
 
An Introduction to RPA
An Introduction to RPAAn Introduction to RPA
An Introduction to RPASteve Burke
 
Unlocking the True Benefit of Software Defined Networking
Unlocking the True Benefit of Software Defined NetworkingUnlocking the True Benefit of Software Defined Networking
Unlocking the True Benefit of Software Defined Networkingaccenture
 
What is Robotic Process Automation? (RPA)
What is Robotic Process Automation? (RPA)What is Robotic Process Automation? (RPA)
What is Robotic Process Automation? (RPA)Newton Day Uploads
 

En vedette (20)

Developing a Roadmap for Digital Transformation
Developing a Roadmap for Digital TransformationDeveloping a Roadmap for Digital Transformation
Developing a Roadmap for Digital Transformation
 
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
 
Digital Business - Accenture
Digital Business - AccentureDigital Business - Accenture
Digital Business - Accenture
 
Accenture strategy-patient-engagement-consumer-loyalty - copy
Accenture strategy-patient-engagement-consumer-loyalty - copyAccenture strategy-patient-engagement-consumer-loyalty - copy
Accenture strategy-patient-engagement-consumer-loyalty - copy
 
Accenture technology vision 2012 final
Accenture technology vision 2012 finalAccenture technology vision 2012 final
Accenture technology vision 2012 final
 
Get Your Shift Together: Aligning Everyone to KPIs that Matter
Get Your Shift Together: Aligning Everyone to KPIs that MatterGet Your Shift Together: Aligning Everyone to KPIs that Matter
Get Your Shift Together: Aligning Everyone to KPIs that Matter
 
Enterprise Security & SSO
Enterprise Security & SSOEnterprise Security & SSO
Enterprise Security & SSO
 
KPMG Automatonophobia
KPMG AutomatonophobiaKPMG Automatonophobia
KPMG Automatonophobia
 
IT Automation: Rise of the Process Robots
IT Automation: Rise of the Process RobotsIT Automation: Rise of the Process Robots
IT Automation: Rise of the Process Robots
 
Deloitte - Automate this: The business leader’s guide to robotic and intellig...
Deloitte - Automate this: The business leader’s guide to robotic and intellig...Deloitte - Automate this: The business leader’s guide to robotic and intellig...
Deloitte - Automate this: The business leader’s guide to robotic and intellig...
 
6σ, lean and RPA
6σ, lean and RPA6σ, lean and RPA
6σ, lean and RPA
 
Capgemini Consulting RPA: the next revolution of Corporate Functions
Capgemini Consulting RPA: the next revolution of Corporate FunctionsCapgemini Consulting RPA: the next revolution of Corporate Functions
Capgemini Consulting RPA: the next revolution of Corporate Functions
 
Sei pronto a passare al continuous delivery?
Sei pronto a passare al continuous delivery?Sei pronto a passare al continuous delivery?
Sei pronto a passare al continuous delivery?
 
RPA and Artificial Intelligence Brochure EQ - U2 b
RPA and Artificial Intelligence Brochure EQ - U2 bRPA and Artificial Intelligence Brochure EQ - U2 b
RPA and Artificial Intelligence Brochure EQ - U2 b
 
Accenture digital transformation - re-imagine from the outside-in
Accenture   digital transformation - re-imagine from the outside-inAccenture   digital transformation - re-imagine from the outside-in
Accenture digital transformation - re-imagine from the outside-in
 
A case study on Accenture
A case study on AccentureA case study on Accenture
A case study on Accenture
 
What You Need to Know About Robotic Process Automation: How It Works & Real-W...
What You Need to Know About Robotic Process Automation: How It Works & Real-W...What You Need to Know About Robotic Process Automation: How It Works & Real-W...
What You Need to Know About Robotic Process Automation: How It Works & Real-W...
 
An Introduction to RPA
An Introduction to RPAAn Introduction to RPA
An Introduction to RPA
 
Unlocking the True Benefit of Software Defined Networking
Unlocking the True Benefit of Software Defined NetworkingUnlocking the True Benefit of Software Defined Networking
Unlocking the True Benefit of Software Defined Networking
 
What is Robotic Process Automation? (RPA)
What is Robotic Process Automation? (RPA)What is Robotic Process Automation? (RPA)
What is Robotic Process Automation? (RPA)
 

Similaire à Defending Digital Business

For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...Accenture Technology
 
Enable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceEnable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceNeetaSahay1
 
FINTECH: Industries we Serve
FINTECH: Industries we ServeFINTECH: Industries we Serve
FINTECH: Industries we ServeThe TNS Group
 
Microsoft Security adoptionguide for the enterprise
Microsoft Security adoptionguide for the enterpriseMicrosoft Security adoptionguide for the enterprise
Microsoft Security adoptionguide for the enterprisessuserd58af7
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxAhad
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfAhad
 
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfCIO Look Magazine
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainDavid J Rosenthal
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report SummaryAccenture Technology
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Matthew Rosenquist
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityNiamh Hughes
 
Cyber Security Audit.pdf
Cyber Security Audit.pdfCyber Security Audit.pdf
Cyber Security Audit.pdfVograce
 
India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021InsightsSuccess3
 
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfCrucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfseoteameits
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilienceSymantec
 

Similaire à Defending Digital Business (20)

For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Enable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceEnable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplace
 
FINTECH: Industries we Serve
FINTECH: Industries we ServeFINTECH: Industries we Serve
FINTECH: Industries we Serve
 
The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019
 
The 10 most trusted cyber threat solution providers
The 10 most trusted cyber threat solution providersThe 10 most trusted cyber threat solution providers
The 10 most trusted cyber threat solution providers
 
Microsoft Security adoptionguide for the enterprise
Microsoft Security adoptionguide for the enterpriseMicrosoft Security adoptionguide for the enterprise
Microsoft Security adoptionguide for the enterprise
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptx
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
 
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
16231
1623116231
16231
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber security
 
Cyber Security Audit.pdf
Cyber Security Audit.pdfCyber Security Audit.pdf
Cyber Security Audit.pdf
 
India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021
 
Cyber threat forecast 2018..
Cyber threat forecast 2018..Cyber threat forecast 2018..
Cyber threat forecast 2018..
 
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfCrucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 

Plus de Accenture Technology

Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Technology
 
Helping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayHelping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayAccenture Technology
 
Accenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Technology
 
Helping you get back to the workplace confidently
Helping you get back to the workplace confidentlyHelping you get back to the workplace confidently
Helping you get back to the workplace confidentlyAccenture Technology
 
Driving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldDriving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldAccenture Technology
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology
 
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology
 
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology
 
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology
 
Elevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayElevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayAccenture Technology
 
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAutomating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAccenture Technology
 
Technology Vision 2019 for Workday
Technology Vision 2019 for WorkdayTechnology Vision 2019 for Workday
Technology Vision 2019 for WorkdayAccenture Technology
 
Accenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology
 

Plus de Accenture Technology (20)

Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020
 
Helping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayHelping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + Workday
 
Accenture Labs Innovation Stories
Accenture Labs Innovation StoriesAccenture Labs Innovation Stories
Accenture Labs Innovation Stories
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
 
Accenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP Solutions
 
Highlights on the five key trends
Highlights on the five key trendsHighlights on the five key trends
Highlights on the five key trends
 
Helping you get back to the workplace confidently
Helping you get back to the workplace confidentlyHelping you get back to the workplace confidently
Helping you get back to the workplace confidently
 
Driving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldDriving Workday transformation in a virtual world
Driving Workday transformation in a virtual world
 
Accenture + Red Hat
Accenture + Red HatAccenture + Red Hat
Accenture + Red Hat
 
Accenture and Mercedes Case Study
Accenture and Mercedes Case StudyAccenture and Mercedes Case Study
Accenture and Mercedes Case Study
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: Infographic
 
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: Overview
 
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and Me
 
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNA
 
Elevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayElevating the Workforce Experience with Workday
Elevating the Workforce Experience with Workday
 
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAutomating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
 
Technology Vision for SAP 2019
Technology Vision for SAP 2019Technology Vision for SAP 2019
Technology Vision for SAP 2019
 
Technology Vision 2019 for Workday
Technology Vision 2019 for WorkdayTechnology Vision 2019 for Workday
Technology Vision 2019 for Workday
 
Accenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for Pega
 

Dernier

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Dernier (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Defending Digital Business

  • 1. Defending and empowering the resilient digital business Accenture Security Services
  • 2. Sophisticated, well-funded cybercriminals are outpacing digital businesses Copyright © 2016 Accenture. All rights reserved. 2 *Source: Ponemon Institute Study 2015 **Source: “Internet Security Threat Report,” Symantec, April 2015, Volume 20. The impact of security threats is increasingly devastating. With the explosion of the IoT, cloud and mobile, digital technology is now pervasive. The opportunities for attack are surging, opening up new areas of vulnerability for security, privacy and data integrity. 5 out of 6 organizations with 2,500+ employees attacked** 317 million new pieces of malware created in 2014** 23% rise in data breaches in 2014*, and a 50% spike in successful attacks since 2012** $7.7 million damage per company in 2015*
  • 3. Business leaders know it’s not enough to focus purely on prevention of security breaches. To truly defend and empower your organization, you also need to detect, intercept and remediate even the most unthinkable threats. Boardroom priority: “How resilient are we?” Copyright © 2016 Accenture. All rights reserved. 3 “The impact of security risks is understated because a lot goes unreported. The costs of prevention and remediation are massive and the brands of organizations and the reputations of their top leaders are put at stake.” Omar Abbosh, Chief Strategy Officer, Accenture
  • 4. Build resilience, outpace attackers and turn to what matters most: innovation and business growth … uninterrupted. A persistently vigilant business is a resilient business Copyright © 2016 Accenture. All rights reserved. 4 Defend the Business from Hostile Adversaries Empower Business Growth & Secure Operations Confidently address growing boardroom and C-suite security priorities (shareholder value, revenue and compliance). Interlock security strategy with business strategy and spend appropriately on what’s most important. Gain security-situational awareness across expanding business boundaries and develop rapid-response capabilities to minimize losses through next-generation technology such as security automation and relentless improvement. Initiate organizational change and transform security to be digital friendly, taking into account user centricity, Internet scale and digital technologies (IoT, big data etc.). Continuously test environmental robustness by “training like you fight.” Manage technology and process security risks outside of direct organizational control while leveraging security “As-a- Service” for greater agility.
  • 5. Go beyond risk-based tactics to sophisticated, intelligent digital strategies that are embedded into the fabric of the enterprise and engineered for the future. Replace vulnerability with capability Copyright © 2016 Accenture. All rights reserved. 5 Market Maker Reactionary and Ad Hoc Embedded and Optimized Threat-centric, Risk-based Compliance- based MATURITYLEVEL 2015–16 2013–14 2017 Pre-2010 2018 & Beyond 1.0 2.0 3.0 4.0 2018 and Beyond: Market Maker Achieving resilience through innovative security programs that have a cross-industry impact. 2017: Embedded and Optimized Consistently embedding security and optimizing the business for agility, freeing staff to innovate. Today: Threat-centric, Risk-based Proactively identifying and addressing threats in the context of enterprise risk. YEARS
  • 6. Success hinges on a 360-degree approach and a relentless focus on business impact Copyright © 2016 Accenture. All rights reserved. 6 Business driven Threat centric Digitally protected Adaptive responses Agile delivery Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Identity Incident Response Remediation Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics
  • 7. Our mindset: Continuous innovation, empowered by technology, our culture and ecosystem Copyright © 2016 Accenture. All rights reserved. 7 Contextual & behavioral analytics Culture of non-stop innovation Ecosystem collaboration Helps clients quickly identify active threats to their businesses. Accelerates R&D and allows us to focus on innovating today while anticipating tomorrow’s threats and opportunities. Leverages a vendor- independent approach and the best partnerships and thinking.
  • 8. At speed, at scale, on demand Around the world and around the clock, we speed the pace of your security journey and help you deliver high performance. Copyright © 2016 Accenture. All rights reserved.
  • 9. Trusted advisors. Continuously innovating. Focused on outcomes. Copyright © 2016 Accenture. All rights reserved. 9 Comprehensive, holistic solutions Our holistic capabilities—from security strategy to operations—and 360-degree approach that takes into account people, process and technology, address the full spectrum of security challenges you face. A partner that helps you thrive Combining our deep industry and technology expertise, we collaborate closely with you to understand your business, its values and vulnerabilities so we can help tightly synch your security strategy with your business goals. Culture of continuous innovation Innovating non stop to stay one step ahead. Collaborating across our network of R&D labs, centers of excellence and alliance ecosystem, to develop breakthrough solutions built to adapt to and thrive in a sophisticated threat landscape. Leaders in next-gen Cyber Defense Investing in advanced automation, behavioral analytics and threat-centric solutions to continuously test, identify and eliminate exploitable security gaps in real time and at scale. Business resilience at speed and scale Managing security around the world and around the clock, our global scale, end-to-end capabilities and proven practices speed the pace of your security journey and help you deliver high performance—uninterrupted. Business outcome focused Driving measurable business outcomes for clients with transformation-led solutions that address increasingly complex needs.
  • 10. Contacts Copyright © 2016 Accenture. All rights reserved. 10 Bill Phelps Security Consulting & Managed Services bill.phelps@accenture.com Andrew Vautier Security Strategy Center of Excellence Accenture Chief Information Security Officer andrew.vautier@accenture.com Steven Culp Finance & Risk steven.r.culp@accenture.com Ryan LaSalle Security Consulting & Managed Services FusionX ryan.m.lasalle@accenture.com Kevin Richards Security Strategy, North America k.richards@accenture.com Adam Burden Application Security adam.p.burden@accenture.com Accenture Strategy Accenture Operations Accenture Financial Services Accenture Technology