SlideShare a Scribd company logo
1 of 1
Download to read offline
TAKE A SECURITY LEAP FORWARD
How do corporations achieve better
security performance in an 
ever-changing threat environment?
Leapfrog organizations* align their security
approach with business objectives to improve
security effectiveness across strategy, technology
and governance.
STRATEGY
START YOUR SECURITY LEAP FORWARD
Pinpoints anomalies
in network traffic
Establish security
protocols over big data
Secure (encrypt) data stored
in cloud environments
6.00 7.18 4.94 6.33 7.45 8.55
(Rankings on a 10 point scale, 1 = low; 10 = high)= Leapfrog
26%
Enterprise risk
management
procedures
35%
Regular reporting
to the board
of directors
Benchmark
security
operations
Metrics to
evaluate security
operations
20% 34%
Leapfrog companies
have dedicated
budget for security
Increased security
budget over the
past two years
CISO defines
security strategy
and initiatives
CISO directly
reports to a
senior executive
CISO is accountable
for budgets or
discretionary spending
81% 57% 71% 71% 65%
Limit insecure devices from
accessing security systems
Controls insecure mobile
devices including BYOD
Provide advance warning
about threats and attackers
7.56 8.27 7.76 7.16 7.18 6.03
By implementing best practices across security strategy, technology and governance, Leapfrog
organizations improved their security effectiveness an average of 53%.
Steps you can take to help make security a competitive advantage:
Leapfrog companies recognize the importance of establishing and following strong governance practices and
controls for their security organization, and are well ahead of Static companies on the following key
governance attributes:
Leapfrog companies use enabling technologies for security more often than Static companies. Taking a proactive
stance helps protect their data onsite, in the cloud and across big data platforms. They put more emphasis on
pinpointing network traffic anomalies, and in providing advance warning on threats and attackers.
Security Strategy in Leapfrog Organizations
Leapfrog companies move
forward with a solid security
strategy, treat security as a
priority and align security with
the organization’s goals.
Innovation is a core component in aligning security strategies with business objectives. Leapfrog organizations
recognize the need to focus on innovation to strengthen their security position and keep pace with evolving needs
to deliver at scale, anywhere.
The role of the Chief Information Security Officer (CISO) in
Leapfrog companies reflects the focus and importance those
companies place on security.
Leapfrog companies provide dedicated
budget and increase budgets for
security improvements.
Higher value placed on
security innovation by
Leapfrog companies
33%
Higher level of security
innovation change in the past
two years in Leapfrog companies
45%
More security
innovation within
Leapfrog companies
20%
LEAPFROG 70%
STATIC 55%
Security strategy exists
69%
45%
LEAPFROG
STATIC
Security is priority
Leapfrog organizations focus more on securing their network, sensitive data and the cloud, while the Static
organizations tend to focus on locking things down, which can prevent business growth.
Embrace
innovative solutions
Streamline your IT
security infrastructure
Create greater visibility
into business processes
Eliminate
security silos
Evolve the C-suite into
security champions
Certain characteristics of the Leapfrog organizations complement each other, and may help those looking to
emulate their successes.
*All source data from Ponemon Institute research, “The Cyber Security Leap: From Laggard to Leader,” 2015,
N = 110 Leapfrog organizations and 137 Static organizations
55%
Leapfrog organizations have a
sanctioned cyber security
strategy AND outsource core
security operations
50%
Leapfrog organizations make
information security a priority
AND align security and
business objectives
59%
Leapfrog CISOs have
dedicated budget
AND accountability
for spending
TECHNOLOGY
63%
40%
LEAPFROG
STATIC
Security and business objectives aligned
GOVERNANCE
= Static
© 2015 Accenture
All rights reserved.

More Related Content

What's hot

Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...
Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...
Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...accenture
 
Mobility Research 2014: Mobility Fueling the Digital Surge
Mobility Research 2014: Mobility Fueling the Digital SurgeMobility Research 2014: Mobility Fueling the Digital Surge
Mobility Research 2014: Mobility Fueling the Digital Surgeaccenture
 
Considerations for an Effective Internal Model Method Implementation
Considerations for an Effective Internal Model Method ImplementationConsiderations for an Effective Internal Model Method Implementation
Considerations for an Effective Internal Model Method Implementationaccenture
 
Accenture 2015 Global Risk Management Study: North American Banking Report Ke...
Accenture 2015 Global Risk Management Study: North American Banking Report Ke...Accenture 2015 Global Risk Management Study: North American Banking Report Ke...
Accenture 2015 Global Risk Management Study: North American Banking Report Ke...accenture
 
Smarter Investments, Outstanding Results: Resources Industries Digital Transf...
Smarter Investments, Outstanding Results: Resources Industries Digital Transf...Smarter Investments, Outstanding Results: Resources Industries Digital Transf...
Smarter Investments, Outstanding Results: Resources Industries Digital Transf...accenture
 
Thriving on Disruption
Thriving on Disruption Thriving on Disruption
Thriving on Disruption accenture
 
The New World of As a Service - Infographic
The New World of As a Service - InfographicThe New World of As a Service - Infographic
The New World of As a Service - Infographicaccenture
 
CPG Companies: Evolving Your Analytics-driven Organizations
CPG Companies: Evolving Your Analytics-driven OrganizationsCPG Companies: Evolving Your Analytics-driven Organizations
CPG Companies: Evolving Your Analytics-driven Organizationsaccenture
 
IT Security: Implications for the Technology Vision 2015
IT Security: Implications for the Technology Vision 2015IT Security: Implications for the Technology Vision 2015
IT Security: Implications for the Technology Vision 2015accenture
 
Accenture 2015 Global Risk Management Study: North American Banking infographic
Accenture 2015 Global Risk Management Study: North American Banking infographicAccenture 2015 Global Risk Management Study: North American Banking infographic
Accenture 2015 Global Risk Management Study: North American Banking infographicaccenture
 
How Industrial Equipment Companies are Mining Fuel for Growth
How Industrial Equipment Companies are Mining Fuel for GrowthHow Industrial Equipment Companies are Mining Fuel for Growth
How Industrial Equipment Companies are Mining Fuel for Growthaccenture
 
Road to Digital Compliance
Road to Digital ComplianceRoad to Digital Compliance
Road to Digital Complianceaccenture
 
Top Ten Challenges for Investment Banks 2015: Regulation: Challenge 1
Top Ten Challenges for Investment Banks 2015: Regulation: Challenge 1Top Ten Challenges for Investment Banks 2015: Regulation: Challenge 1
Top Ten Challenges for Investment Banks 2015: Regulation: Challenge 1accenture
 
People-Centric Growth: The Primacy of People in the Digital Age
People-Centric Growth: The Primacy of People in the Digital AgePeople-Centric Growth: The Primacy of People in the Digital Age
People-Centric Growth: The Primacy of People in the Digital Ageaccenture
 
Agricultural Chemicals 2016 Supply Chain Benchmarking Study
Agricultural Chemicals 2016 Supply Chain Benchmarking StudyAgricultural Chemicals 2016 Supply Chain Benchmarking Study
Agricultural Chemicals 2016 Supply Chain Benchmarking Studyaccenture
 
Securing the Industrial Enterprise
Securing the Industrial EnterpriseSecuring the Industrial Enterprise
Securing the Industrial Enterpriseaccenture
 
Intelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital BusinessIntelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital Businessaccenture
 
Are you Ready to be an Insurer of Things?
Are you Ready to be an Insurer of Things?Are you Ready to be an Insurer of Things?
Are you Ready to be an Insurer of Things?accenture
 
Mastering Operational Flexibility
Mastering Operational FlexibilityMastering Operational Flexibility
Mastering Operational Flexibilityaccenture
 
Accenture Regulatory Compliance Platform
Accenture Regulatory Compliance PlatformAccenture Regulatory Compliance Platform
Accenture Regulatory Compliance Platformaccenture
 

What's hot (20)

Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...
Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...
Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...
 
Mobility Research 2014: Mobility Fueling the Digital Surge
Mobility Research 2014: Mobility Fueling the Digital SurgeMobility Research 2014: Mobility Fueling the Digital Surge
Mobility Research 2014: Mobility Fueling the Digital Surge
 
Considerations for an Effective Internal Model Method Implementation
Considerations for an Effective Internal Model Method ImplementationConsiderations for an Effective Internal Model Method Implementation
Considerations for an Effective Internal Model Method Implementation
 
Accenture 2015 Global Risk Management Study: North American Banking Report Ke...
Accenture 2015 Global Risk Management Study: North American Banking Report Ke...Accenture 2015 Global Risk Management Study: North American Banking Report Ke...
Accenture 2015 Global Risk Management Study: North American Banking Report Ke...
 
Smarter Investments, Outstanding Results: Resources Industries Digital Transf...
Smarter Investments, Outstanding Results: Resources Industries Digital Transf...Smarter Investments, Outstanding Results: Resources Industries Digital Transf...
Smarter Investments, Outstanding Results: Resources Industries Digital Transf...
 
Thriving on Disruption
Thriving on Disruption Thriving on Disruption
Thriving on Disruption
 
The New World of As a Service - Infographic
The New World of As a Service - InfographicThe New World of As a Service - Infographic
The New World of As a Service - Infographic
 
CPG Companies: Evolving Your Analytics-driven Organizations
CPG Companies: Evolving Your Analytics-driven OrganizationsCPG Companies: Evolving Your Analytics-driven Organizations
CPG Companies: Evolving Your Analytics-driven Organizations
 
IT Security: Implications for the Technology Vision 2015
IT Security: Implications for the Technology Vision 2015IT Security: Implications for the Technology Vision 2015
IT Security: Implications for the Technology Vision 2015
 
Accenture 2015 Global Risk Management Study: North American Banking infographic
Accenture 2015 Global Risk Management Study: North American Banking infographicAccenture 2015 Global Risk Management Study: North American Banking infographic
Accenture 2015 Global Risk Management Study: North American Banking infographic
 
How Industrial Equipment Companies are Mining Fuel for Growth
How Industrial Equipment Companies are Mining Fuel for GrowthHow Industrial Equipment Companies are Mining Fuel for Growth
How Industrial Equipment Companies are Mining Fuel for Growth
 
Road to Digital Compliance
Road to Digital ComplianceRoad to Digital Compliance
Road to Digital Compliance
 
Top Ten Challenges for Investment Banks 2015: Regulation: Challenge 1
Top Ten Challenges for Investment Banks 2015: Regulation: Challenge 1Top Ten Challenges for Investment Banks 2015: Regulation: Challenge 1
Top Ten Challenges for Investment Banks 2015: Regulation: Challenge 1
 
People-Centric Growth: The Primacy of People in the Digital Age
People-Centric Growth: The Primacy of People in the Digital AgePeople-Centric Growth: The Primacy of People in the Digital Age
People-Centric Growth: The Primacy of People in the Digital Age
 
Agricultural Chemicals 2016 Supply Chain Benchmarking Study
Agricultural Chemicals 2016 Supply Chain Benchmarking StudyAgricultural Chemicals 2016 Supply Chain Benchmarking Study
Agricultural Chemicals 2016 Supply Chain Benchmarking Study
 
Securing the Industrial Enterprise
Securing the Industrial EnterpriseSecuring the Industrial Enterprise
Securing the Industrial Enterprise
 
Intelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital BusinessIntelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital Business
 
Are you Ready to be an Insurer of Things?
Are you Ready to be an Insurer of Things?Are you Ready to be an Insurer of Things?
Are you Ready to be an Insurer of Things?
 
Mastering Operational Flexibility
Mastering Operational FlexibilityMastering Operational Flexibility
Mastering Operational Flexibility
 
Accenture Regulatory Compliance Platform
Accenture Regulatory Compliance PlatformAccenture Regulatory Compliance Platform
Accenture Regulatory Compliance Platform
 

Similar to Cyber Security: Take a Security Leap Forward

The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderAccenture Insurance
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Needsimplyme12345
 
7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimmMarie Peters
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22IDG
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - IrelandAccenture Security
 
Final 2021 security_priorities_infographic (1)
Final 2021 security_priorities_infographic (1)Final 2021 security_priorities_infographic (1)
Final 2021 security_priorities_infographic (1)IDG
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience InsuranceAccenture Insurance
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsVMware Tanzu
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationNUS-ISS
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Pierre Audoin Consultants
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdfJose R
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010Lennart Bredberg
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 

Similar to Cyber Security: Take a Security Leap Forward (20)

The Cyber Security Leap
The Cyber Security LeapThe Cyber Security Leap
The Cyber Security Leap
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to Leader
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 
7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland
 
Final 2021 security_priorities_infographic (1)
Final 2021 security_priorities_infographic (1)Final 2021 security_priorities_infographic (1)
Final 2021 security_priorities_infographic (1)
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises?
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 

More from accenture

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024accenture
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileaccenture
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial Systemaccenture
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyaccenture
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023accenture
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operationsaccenture
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Studyaccenture
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023accenture
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented changeaccenture
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% meaccenture
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023accenture
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoaccenture
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industryaccenture
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023accenture
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accentureaccenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accentureaccenture
 

More from accenture (20)

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 

Recently uploaded

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Cyber Security: Take a Security Leap Forward

  • 1. TAKE A SECURITY LEAP FORWARD How do corporations achieve better security performance in an  ever-changing threat environment? Leapfrog organizations* align their security approach with business objectives to improve security effectiveness across strategy, technology and governance. STRATEGY START YOUR SECURITY LEAP FORWARD Pinpoints anomalies in network traffic Establish security protocols over big data Secure (encrypt) data stored in cloud environments 6.00 7.18 4.94 6.33 7.45 8.55 (Rankings on a 10 point scale, 1 = low; 10 = high)= Leapfrog 26% Enterprise risk management procedures 35% Regular reporting to the board of directors Benchmark security operations Metrics to evaluate security operations 20% 34% Leapfrog companies have dedicated budget for security Increased security budget over the past two years CISO defines security strategy and initiatives CISO directly reports to a senior executive CISO is accountable for budgets or discretionary spending 81% 57% 71% 71% 65% Limit insecure devices from accessing security systems Controls insecure mobile devices including BYOD Provide advance warning about threats and attackers 7.56 8.27 7.76 7.16 7.18 6.03 By implementing best practices across security strategy, technology and governance, Leapfrog organizations improved their security effectiveness an average of 53%. Steps you can take to help make security a competitive advantage: Leapfrog companies recognize the importance of establishing and following strong governance practices and controls for their security organization, and are well ahead of Static companies on the following key governance attributes: Leapfrog companies use enabling technologies for security more often than Static companies. Taking a proactive stance helps protect their data onsite, in the cloud and across big data platforms. They put more emphasis on pinpointing network traffic anomalies, and in providing advance warning on threats and attackers. Security Strategy in Leapfrog Organizations Leapfrog companies move forward with a solid security strategy, treat security as a priority and align security with the organization’s goals. Innovation is a core component in aligning security strategies with business objectives. Leapfrog organizations recognize the need to focus on innovation to strengthen their security position and keep pace with evolving needs to deliver at scale, anywhere. The role of the Chief Information Security Officer (CISO) in Leapfrog companies reflects the focus and importance those companies place on security. Leapfrog companies provide dedicated budget and increase budgets for security improvements. Higher value placed on security innovation by Leapfrog companies 33% Higher level of security innovation change in the past two years in Leapfrog companies 45% More security innovation within Leapfrog companies 20% LEAPFROG 70% STATIC 55% Security strategy exists 69% 45% LEAPFROG STATIC Security is priority Leapfrog organizations focus more on securing their network, sensitive data and the cloud, while the Static organizations tend to focus on locking things down, which can prevent business growth. Embrace innovative solutions Streamline your IT security infrastructure Create greater visibility into business processes Eliminate security silos Evolve the C-suite into security champions Certain characteristics of the Leapfrog organizations complement each other, and may help those looking to emulate their successes. *All source data from Ponemon Institute research, “The Cyber Security Leap: From Laggard to Leader,” 2015, N = 110 Leapfrog organizations and 137 Static organizations 55% Leapfrog organizations have a sanctioned cyber security strategy AND outsource core security operations 50% Leapfrog organizations make information security a priority AND align security and business objectives 59% Leapfrog CISOs have dedicated budget AND accountability for spending TECHNOLOGY 63% 40% LEAPFROG STATIC Security and business objectives aligned GOVERNANCE = Static © 2015 Accenture All rights reserved.