Ce diaporama a bien été signalé.
Le téléchargement de votre SlideShare est en cours. ×

For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for the New Normal

Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Chargement dans…3
×

Consultez-les par la suite

1 sur 12 Publicité

For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for the New Normal

Télécharger pour lire hors ligne

Strategy and technology alone do not guarantee an effective cyber defense. Many organizations fall short because they lack the right mix of talent and capabilities, or aren’t using a strong and complete cyber security model, or have difficulty with properly executing the strategy.

Strategy and technology alone do not guarantee an effective cyber defense. Many organizations fall short because they lack the right mix of talent and capabilities, or aren’t using a strong and complete cyber security model, or have difficulty with properly executing the strategy.

Publicité
Publicité

Plus De Contenu Connexe

Diaporamas pour vous (20)

Les utilisateurs ont également aimé (18)

Publicité

Similaire à For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for the New Normal (20)

Plus par Accenture Technology (20)

Publicité

Plus récents (20)

For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for the New Normal

  1. 1. Continuous Cyber Attacks: Achieving Operational Excellence for the New Normal
  2. 2. Copyright © 2016 Accenture. All rights reserved. Strategy and technology alone do not guarantee an effective cyber defense The best strategy, supported by the latest technology, can fail if not executed properly. Risks to effective cyber defense include: •Increased exposure to attack (cloud, Internet of Things, connected devices) •High turnover within security team •Lack of visibility to critical assets •Frequent IT changes not communicated •Length of time taken to detect breaches
  3. 3. Copyright © 2016 Accenture. All rights reserved. Shortage of critical technologies and skills hamper organizations’ security approach • Operations lack rigor and consistency • Stakeholders remain unaware of their vulnerability • Employees don’t follow standard security practices • Security work generates “noise” that masks valid threats • Out-dated tools and processes can limit effectiveness of the security team
  4. 4. Copyright © 2016 Accenture. All rights reserved. Drive improved security operations from actionable threat intelligence Steps that can create security operational excellence: 1.Assess effectiveness of current security processes 2.Invest in attracting and retaining skilled security talent 3.Automate intelligently to leverage scarce resources 4.Understand how threat data pertains to the business 5.Identify what isn’t known 6.Create a plan to address knowledge gaps 7.Find an effective sparring partner to improve security capabilities
  5. 5. Copyright © 2016 Accenture. All rights reserved. Cyber defense strategies and supporting technology will only work if executed properly Leading organizations focus on creating a highly efficient operating model that balances security operations, new technology implementation, testing of security posture and feedback to update defenses. Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation
  6. 6. Copyright © 2016 Accenture. All rights reserved. Achieving operational excellence in cyber defense requires a comprehensive approach Our model helps organizations prepare and protect for threats, defend and detect breaches, and then respond to and recover from incidents. Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation
  7. 7. Copyright © 2016 Accenture. All rights reserved. Start with a big-picture strategy of how security supports business performance • Forward-thinking capabilities to help scale activities • IT strategy that provides greater understanding of assets, data sets, technical and business functions Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation
  8. 8. Copyright © 2016 Accenture. All rights reserved. Forward-thinking capabilities help scale activities effectively • High-powered analytics to predict and detect incidents, and identify behavior changes that indicate security risks • Emphasis on visualization to identify anomalies Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation
  9. 9. Copyright © 2016 Accenture. All rights reserved. Concentrate on intelligent incident response • Platforms that guide operators in hunting for threats • Train the same way the company fights attackers, to prepare for real-world adversaries Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation
  10. 10. Powerpoint Title The goal Create a highly efficient operating model that balances security operations, new technology implementation, testing of security posture and feedback to update defenses.
  11. 11. Powerpoint Title Thank You Please visit Accenture.com/CyberDefensePlan for additional information. #CyberDefense Follow us on Twitter @AccentureSecure
  12. 12. About Accenture Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions—underpinned by the world’s largest delivery network—Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With approximately 373,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com. Accenture, its logo, and High performance. Delivered. are trademarks of Accenture. Copyright © 2016 Accenture All rights reserved.

×