SlideShare une entreprise Scribd logo
1  sur  9
Security Technology Vision 2016
Empowering Your
Cyber Defenders to
Enable Digital Trust
The digital economy introduces new risks and threats
to challenge cyber defender capabilities…
Pace of
change
New
technologies
Changing
workforce models
Increased
connectedness
Huge scale
of software
operations
Expanded
attack surfaces
More sophisticated,
higher volume
of attacks
Ongoing
privacy concerns
Copyright © 2016 Accenture All rights reserved. 2
… and attackers are overwhelming
organizations that lack skilled resources
to properly defend the enterprise
• Attackers use increasingly sophisticated tools and
techniques to target businesses
• 45 percent of companies say they have difficulty
finding qualified security personnel
Copyright © 2016 Accenture All rights reserved. 3
Underpinning all of this change is the mandate
to boost security’s effectiveness in supporting
the business’ efforts to attain digital trust.
Technology alone cannot resolve
enterprise security threats
To establish robust security capabilities,
organizations need the right skills at the right level at
the right time and to:
• Scale quickly to meet new challenges in cyber defense
• Attract and retain highly skilled resources
• Elevate their existing workforce with enhanced skills
and supporting technology to reach new levels of
performance
Copyright © 2016 Accenture All rights reserved. 4
In the next five years intelligent automation and the liquid
workforce will bring significant changes in how security
professionals work and how they use technology to defend
and empower the enterprise
Intelligent
Automation
Outsized impact on the security workforce
Liquid
Workforce
Copyright © 2016 Accenture All rights reserved. 5
Intelligent automation applies artificial intelligence,
process automation and visualization to enhance a
security professional’s capabilities
Artificial intelligence (AI)
• Helps security professionals understand the larger context
of a threat
• Supports process automation, allowing security teams
to execute automated actions as threats emerge and evolve
Visualization
• Harnesses the human ability to recognize patterns quickly
and pick out anomalies
• Helps professionals quickly understand cascades of data
• Provides real-time views of the entire enterprise with
advanced graphics processing
Copyright © 2016 Accenture All rights reserved. 6
The liquid workforce reduces challenges in accessing
scarce security talent by enabling more flexible
workforce arrangements
• Freelancing, crowdsourcing and broad-based collaboration
will offer a much larger pool of security expertise to
organizations.
• Outsourcing security jobs will require that organizations
leverage service providers they trust and who bring well-
vetted resources to the table.
• Accenture believes 40% of a business’ entire workforce will
be freelance by 2020.
• Enterprises should maintain a core of highly-skilled security
people that are augmented with outside resources.
Copyright © 2016 Accenture All rights reserved. 7
What are the next steps leadership should take to
prepare for the future security workforce?
Identify repetitive and low-impact activities that can be automated to
scale security effectiveness.
Look for security challenges where automated decisions make sense
and where quick action can reduce the cost of security incidents.
Increase visual literacy and focus on presenting security-related data in
compelling and insightful ways.
Evaluate where a liquid workforce approach could help: address chronic
staffing issues, fill a short-term skilled role, or support teams with a
broader perspective on data.
Copyright © 2016 Accenture All rights reserved. 8
To find out more please visit
www.accenture.com/SecurityVision
Copyright © 2016 Accenture All rights reserved. 9

Contenu connexe

Tendances

Cyber Eleven flyer
Cyber Eleven flyerCyber Eleven flyer
Cyber Eleven flyer
Timmy Chou
 

Tendances (19)

Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure
 
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for Insurance
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Technology Vision 2016 - Infographic
Technology Vision 2016 - InfographicTechnology Vision 2016 - Infographic
Technology Vision 2016 - Infographic
 
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
A new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growthA new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growth
 
Accenture Liquid Application Studio
Accenture Liquid Application StudioAccenture Liquid Application Studio
Accenture Liquid Application Studio
 
High Performance Security Report - High Technology
High Performance Security Report - High TechnologyHigh Performance Security Report - High Technology
High Performance Security Report - High Technology
 
Symantec Consulting Infographic
Symantec Consulting InfographicSymantec Consulting Infographic
Symantec Consulting Infographic
 
Leading the Digital Enterprise
Leading the Digital EnterpriseLeading the Digital Enterprise
Leading the Digital Enterprise
 
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leader
 
Accenture Enkitec Group: Oracle database and Engineered Systems
Accenture Enkitec Group: Oracle database and Engineered SystemsAccenture Enkitec Group: Oracle database and Engineered Systems
Accenture Enkitec Group: Oracle database and Engineered Systems
 
Cyber Eleven flyer
Cyber Eleven flyerCyber Eleven flyer
Cyber Eleven flyer
 
Steven Greschner - About Me
Steven Greschner - About MeSteven Greschner - About Me
Steven Greschner - About Me
 
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
 
Going Deep: Mining Experiential and Behavioral Data in VR
Going Deep: Mining Experiential and Behavioral Data in VRGoing Deep: Mining Experiential and Behavioral Data in VR
Going Deep: Mining Experiential and Behavioral Data in VR
 

En vedette

Shaun-Flak_12_08_15_Customer Relations Manager
Shaun-Flak_12_08_15_Customer Relations ManagerShaun-Flak_12_08_15_Customer Relations Manager
Shaun-Flak_12_08_15_Customer Relations Manager
Shaun Flak
 
ATL GROUP_INTRODUCTION_EN
ATL GROUP_INTRODUCTION_ENATL GROUP_INTRODUCTION_EN
ATL GROUP_INTRODUCTION_EN
Camelia Lovin
 

En vedette (19)

MAHESH KHILNANI-resume
MAHESH KHILNANI-resumeMAHESH KHILNANI-resume
MAHESH KHILNANI-resume
 
Eximdesk Trade PPT
Eximdesk Trade PPTEximdesk Trade PPT
Eximdesk Trade PPT
 
Shaun-Flak_12_08_15_Customer Relations Manager
Shaun-Flak_12_08_15_Customer Relations ManagerShaun-Flak_12_08_15_Customer Relations Manager
Shaun-Flak_12_08_15_Customer Relations Manager
 
App design
App designApp design
App design
 
Portfolio Aude Mazaud
Portfolio Aude MazaudPortfolio Aude Mazaud
Portfolio Aude Mazaud
 
Resume
ResumeResume
Resume
 
Presentation On Slum
Presentation On SlumPresentation On Slum
Presentation On Slum
 
ATL GROUP_INTRODUCTION_EN
ATL GROUP_INTRODUCTION_ENATL GROUP_INTRODUCTION_EN
ATL GROUP_INTRODUCTION_EN
 
Philippines Trade Compliance
Philippines Trade CompliancePhilippines Trade Compliance
Philippines Trade Compliance
 
7 tips van om KBC om van kennisdeling een succes te maken
7 tips van om KBC om van kennisdeling een succes te maken7 tips van om KBC om van kennisdeling een succes te maken
7 tips van om KBC om van kennisdeling een succes te maken
 
Globale conjunctuurvooruitzichten en belgische competitiviteit - Koen De Leus
Globale conjunctuurvooruitzichten en belgische competitiviteit - Koen De Leus Globale conjunctuurvooruitzichten en belgische competitiviteit - Koen De Leus
Globale conjunctuurvooruitzichten en belgische competitiviteit - Koen De Leus
 
Prueba tercera parcial
Prueba tercera parcialPrueba tercera parcial
Prueba tercera parcial
 
pamflett
pamflettpamflett
pamflett
 
Seguridad vial
Seguridad vialSeguridad vial
Seguridad vial
 
Tonja.powerpoint
Tonja.powerpointTonja.powerpoint
Tonja.powerpoint
 
Daniel Scobie
Daniel ScobieDaniel Scobie
Daniel Scobie
 
Global Education Manual
Global Education ManualGlobal Education Manual
Global Education Manual
 
Art5 parede
Art5 paredeArt5 parede
Art5 parede
 
DB16-Full-Report
DB16-Full-ReportDB16-Full-Report
DB16-Full-Report
 

Similaire à Security Technology Vision 2016

Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
nooralmousa
 
How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program  Hire A Great Iso!!How Do You Create A Successful Information Security Program  Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!
Tammy Clark
 
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Aujas
 

Similaire à Security Technology Vision 2016 (20)

For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Intelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital BusinessIntelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital Business
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations Center
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
 
People First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital InsurancePeople First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital Insurance
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program  Hire A Great Iso!!How Do You Create A Successful Information Security Program  Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!
 
Mobile, Cloud, Security, Cognitive and Analytics
Mobile, Cloud, Security, Cognitive and AnalyticsMobile, Cloud, Security, Cognitive and Analytics
Mobile, Cloud, Security, Cognitive and Analytics
 
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
 
SOC Service in India.pdf
SOC Service in India.pdfSOC Service in India.pdf
SOC Service in India.pdf
 
Accenture Technology Vision for Banking
Accenture Technology Vision for BankingAccenture Technology Vision for Banking
Accenture Technology Vision for Banking
 
Sonia randhawa speaks on cybersecurity and innovation
Sonia randhawa speaks on cybersecurity and innovationSonia randhawa speaks on cybersecurity and innovation
Sonia randhawa speaks on cybersecurity and innovation
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
 

Dernier

Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 

Dernier (20)

Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 

Security Technology Vision 2016

  • 1. Security Technology Vision 2016 Empowering Your Cyber Defenders to Enable Digital Trust
  • 2. The digital economy introduces new risks and threats to challenge cyber defender capabilities… Pace of change New technologies Changing workforce models Increased connectedness Huge scale of software operations Expanded attack surfaces More sophisticated, higher volume of attacks Ongoing privacy concerns Copyright © 2016 Accenture All rights reserved. 2
  • 3. … and attackers are overwhelming organizations that lack skilled resources to properly defend the enterprise • Attackers use increasingly sophisticated tools and techniques to target businesses • 45 percent of companies say they have difficulty finding qualified security personnel Copyright © 2016 Accenture All rights reserved. 3 Underpinning all of this change is the mandate to boost security’s effectiveness in supporting the business’ efforts to attain digital trust.
  • 4. Technology alone cannot resolve enterprise security threats To establish robust security capabilities, organizations need the right skills at the right level at the right time and to: • Scale quickly to meet new challenges in cyber defense • Attract and retain highly skilled resources • Elevate their existing workforce with enhanced skills and supporting technology to reach new levels of performance Copyright © 2016 Accenture All rights reserved. 4
  • 5. In the next five years intelligent automation and the liquid workforce will bring significant changes in how security professionals work and how they use technology to defend and empower the enterprise Intelligent Automation Outsized impact on the security workforce Liquid Workforce Copyright © 2016 Accenture All rights reserved. 5
  • 6. Intelligent automation applies artificial intelligence, process automation and visualization to enhance a security professional’s capabilities Artificial intelligence (AI) • Helps security professionals understand the larger context of a threat • Supports process automation, allowing security teams to execute automated actions as threats emerge and evolve Visualization • Harnesses the human ability to recognize patterns quickly and pick out anomalies • Helps professionals quickly understand cascades of data • Provides real-time views of the entire enterprise with advanced graphics processing Copyright © 2016 Accenture All rights reserved. 6
  • 7. The liquid workforce reduces challenges in accessing scarce security talent by enabling more flexible workforce arrangements • Freelancing, crowdsourcing and broad-based collaboration will offer a much larger pool of security expertise to organizations. • Outsourcing security jobs will require that organizations leverage service providers they trust and who bring well- vetted resources to the table. • Accenture believes 40% of a business’ entire workforce will be freelance by 2020. • Enterprises should maintain a core of highly-skilled security people that are augmented with outside resources. Copyright © 2016 Accenture All rights reserved. 7
  • 8. What are the next steps leadership should take to prepare for the future security workforce? Identify repetitive and low-impact activities that can be automated to scale security effectiveness. Look for security challenges where automated decisions make sense and where quick action can reduce the cost of security incidents. Increase visual literacy and focus on presenting security-related data in compelling and insightful ways. Evaluate where a liquid workforce approach could help: address chronic staffing issues, fill a short-term skilled role, or support teams with a broader perspective on data. Copyright © 2016 Accenture All rights reserved. 8
  • 9. To find out more please visit www.accenture.com/SecurityVision Copyright © 2016 Accenture All rights reserved. 9