SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
GAINING
GROUND
ONTHECYBER
ATTACKER
2018 State of Cyber Resilience
Healthcare Payers
Copyright © 2018 Accenture. All rights reserved. 2
SECURITY TEAMS
HAVE MADE PROGRESS
DEFENDING AGAINST
CYBER ATTACKS.
But more needs to be done.
As the number of attacks more than doubles, monitoring, detection and prevention
improves cyber resilience and helps organizations perform better under pressure.
IMPROVING CYBER RESILIENCE
IN HEALTHCARE PAYERS
Organizations reduced the rate of successful
attacks from 30% to 13%.
In the past 12 months, how many attempted / successful
breaches have you identified and how many were successful?
Average.
25
174
1
2018
Security breaches
Targeted attacks
106
232
32 30
2017 2018
Targeted attacks Security breaches
Copyright © 2018 Accenture Security. All rights reserved. 3
Healthcare (payer)
GAIN GROUND ON THE CYBER ATTACKER
Copyright © 2018 Accenture. All rights reserved. 4
FIVE WAYS TO
BECOME CYBER
RESILIENT.
Healthcare Payers
Despite progress, the
basics still need attention
Copyright © 2018 Accenture. All rights reserved. 5
1
say the organization
is not protected by their
cybersecurity program.
42%
Be brilliant at the basics.
Protect valuable assets, from the inside out,
across the value chain.
• Harden your high-value assets
• Protect legacy applications
• Practice your response
More damaging security
breaches accelerate the
need for cyber resilience
Copyright © 2018 Accenture. All rights reserved. 6
2
76%
say it is not possible to
appear “strong, prepared
and competent” if
security is breached
Test your resilience,
like an attacker.
Enhance conventional red attack
and blue defense team testing.
• Coached incident simulation
• Threat intelligence
• Experienced player-coaches
More need to invest
in critical technologies
against new threats
Copyright © 2018 Accenture. All rights reserved.
3
say new technologies are
essential to securing the
future of the organization.
84%
7
Employ advanced technologies
to automate defenses.
Prepare for attackers who use
advanced technology.
• Automated orchestration capabilities
enable teams to respond in near real-time
• Advanced identity access management
controls user access to data
Confidence remains high
but a proactive approach
is needed
Copyright © 2018 Accenture. All rights reserved.
4
say cyber attacks
are still a “bit of a black box;
we do not know how or when they
will affect our organization.”
77%
8
Use intelligence and data to be
proactive with threat hunting.
Find the attackers before they find you.
• Adopt a continuous response model
• Develop strategic and tactical
threat intelligence
• Monitor for anomalous and
suspicious activity
Higher CEO and board
engagement place new
demands on the CISO
Copyright © 2018 Accenture. All rights reserved.
5
Who does the CISO
report directly to?
9
The CISO needs to adapt.
Evolve the role of the CISO to be more
integrated with the business.
• Business adept and tech-savvy
• At home in the C-suite and the
security center
• Able to infuse a ‘security first’
culture everywhere
22%
41%
25%
1 2 3
Board CEO CIO
Copyright © 2018 Accenture. All rights reserved. 10
SECURITY FROM THE INSIDE OUT
Security teams perform better, despite
more attacks.
Leaders should embrace the good news
Investments are proving to be wise. Organizations
show they can perform better under greater pressure.
But transformation does not end here
Improvements must continue. Organizations could
achieve cyber resilience within two to three years.
Copyright © 2018 Accenture. All rights reserved. 11
ABOUT THE RESEARCH
In 2017, Accenture Security surveyed 2,000
executives to understand the extent to
which organizations prioritize security, how
comprehensive their security plans are, what
security capabilities they have, and their level
of spend on security.
Just over a year later, Accenture Security
undertook a similar survey, this time
interviewing 4,600 executives—representing
organizations with annual revenues of $1bn
or more—from 19 industries and 15 countries
across North and South America, Europe and
Asia Pacific.
More than 98 percent of respondents were
sole or key decision-makers in cybersecurity
strategy and spending for their organization.
LEARN MORE
accenture.com/stateofcyber
2018 State of Cyber Resilience
Copyright © 2018 Accenture. All rights reserved. 12
About Accenture
Accenture is a leading global professional services company, providing a broad
range of services and solutions in strategy, consulting, digital, technology and
operations. Combining unmatched experience and specialized skills across more
than 40 industries and all business functions—underpinned by the world’s largest
delivery network—Accenture works at the intersection of business and technology
to help clients improve their performance and create sustainable value for their
stakeholders. With approximately 442,000 people serving clients in more than 120
countries, Accenture drives innovation to improve the way the world works and
lives. Visit us at www.accenture.com
About Accenture Security
Accenture Security helps organizations build resilience from the inside out, so they
can confidently focus on innovation and growth. Leveraging its global network of
cybersecurity labs, deep industry understanding across client value chains and
services that span the security lifecycle, Accenture protects organization’s valuable
assets, end-to-end. With services that include strategy and risk management, cyber
defense, digital identity, application security and managed security, Accenture
enables businesses around the world to defend against known sophisticated threats,
and the unknown. Follow us @AccentureSecure on Twitter or visit the Accenture
Security blog.

Contenu connexe

Tendances

Tendances (20)

Accelerate to a Frictionless Future in Rail and Transit
Accelerate to a Frictionless Future in Rail and TransitAccelerate to a Frictionless Future in Rail and Transit
Accelerate to a Frictionless Future in Rail and Transit
 
Accenture Technology Vision 2019 Ireland Findings: The Post Digital Era is Here
Accenture Technology Vision 2019 Ireland Findings: The Post Digital Era is HereAccenture Technology Vision 2019 Ireland Findings: The Post Digital Era is Here
Accenture Technology Vision 2019 Ireland Findings: The Post Digital Era is Here
 
Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services
 
Accenture 2017 Global Risk Study: Banking Key Trends Infographic
Accenture 2017 Global Risk Study: Banking Key Trends InfographicAccenture 2017 Global Risk Study: Banking Key Trends Infographic
Accenture 2017 Global Risk Study: Banking Key Trends Infographic
 
Securing the Industrial Enterprise
Securing the Industrial EnterpriseSecuring the Industrial Enterprise
Securing the Industrial Enterprise
 
Trash the Rulebook
Trash the RulebookTrash the Rulebook
Trash the Rulebook
 
Decoding Organizational DNA
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNA
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber Resilience
 
2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York
 
Redefining Public Sector Finance in a Digital World
Redefining Public Sector Finance in a Digital WorldRedefining Public Sector Finance in a Digital World
Redefining Public Sector Finance in a Digital World
 
Digital Disruption: Embracing the Future of Work
Digital Disruption: Embracing the Future of Work Digital Disruption: Embracing the Future of Work
Digital Disruption: Embracing the Future of Work
 
Accelerate to a Frictionless Future in Rail and Transit
Accelerate to a Frictionless Future in Rail and Transit Accelerate to a Frictionless Future in Rail and Transit
Accelerate to a Frictionless Future in Rail and Transit
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
 
Accelerating Digital Process Automation
Accelerating Digital Process AutomationAccelerating Digital Process Automation
Accelerating Digital Process Automation
 
Back Office Transformation | Accenture
Back Office Transformation | AccentureBack Office Transformation | Accenture
Back Office Transformation | Accenture
 
Trash The Rulebook
Trash The RulebookTrash The Rulebook
Trash The Rulebook
 
Trash the Rulebook
Trash the RulebookTrash the Rulebook
Trash the Rulebook
 
Breaking Through Disruption
Breaking Through DisruptionBreaking Through Disruption
Breaking Through Disruption
 
Breathe New Life into Life Insurance
Breathe New Life into Life InsuranceBreathe New Life into Life Insurance
Breathe New Life into Life Insurance
 

Similaire à Healthcare Payers: 2018 State of Cyber Resilience

What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
Daren Dunkel
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
Charmaine Servado
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises?
Pierre Audoin Consultants
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
Sarah Jarvis
 

Similaire à Healthcare Payers: 2018 State of Cyber Resilience (20)

State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
 
The Science of Security
The Science of SecurityThe Science of Security
The Science of Security
 
Cybersecurity report-vol-8
Cybersecurity report-vol-8Cybersecurity report-vol-8
Cybersecurity report-vol-8
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Securing the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustSecuring the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for Trust
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises?
 
Proactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital DisruptionProactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital Disruption
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber Resilience
 
WatchGuard Corporate Presentation.pptx
WatchGuard  Corporate Presentation.pptxWatchGuard  Corporate Presentation.pptx
WatchGuard Corporate Presentation.pptx
 
People First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital InsurancePeople First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital Insurance
 
Étude mondiale d'EY sur la cybersécurité (2018)
Étude mondiale d'EY sur la cybersécurité (2018)Étude mondiale d'EY sur la cybersécurité (2018)
Étude mondiale d'EY sur la cybersécurité (2018)
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance
 
Security in the driver's seat: Achieving cyber resilience in automotive
Security in the driver's seat: Achieving cyber resilience in automotiveSecurity in the driver's seat: Achieving cyber resilience in automotive
Security in the driver's seat: Achieving cyber resilience in automotive
 
TrustCheck from Unisys
TrustCheck from UnisysTrustCheck from Unisys
TrustCheck from Unisys
 

Plus de accenture

Plus de accenture (20)

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

Healthcare Payers: 2018 State of Cyber Resilience

  • 1. GAINING GROUND ONTHECYBER ATTACKER 2018 State of Cyber Resilience Healthcare Payers
  • 2. Copyright © 2018 Accenture. All rights reserved. 2 SECURITY TEAMS HAVE MADE PROGRESS DEFENDING AGAINST CYBER ATTACKS. But more needs to be done.
  • 3. As the number of attacks more than doubles, monitoring, detection and prevention improves cyber resilience and helps organizations perform better under pressure. IMPROVING CYBER RESILIENCE IN HEALTHCARE PAYERS Organizations reduced the rate of successful attacks from 30% to 13%. In the past 12 months, how many attempted / successful breaches have you identified and how many were successful? Average. 25 174 1 2018 Security breaches Targeted attacks 106 232 32 30 2017 2018 Targeted attacks Security breaches Copyright © 2018 Accenture Security. All rights reserved. 3 Healthcare (payer)
  • 4. GAIN GROUND ON THE CYBER ATTACKER Copyright © 2018 Accenture. All rights reserved. 4 FIVE WAYS TO BECOME CYBER RESILIENT. Healthcare Payers
  • 5. Despite progress, the basics still need attention Copyright © 2018 Accenture. All rights reserved. 5 1 say the organization is not protected by their cybersecurity program. 42% Be brilliant at the basics. Protect valuable assets, from the inside out, across the value chain. • Harden your high-value assets • Protect legacy applications • Practice your response
  • 6. More damaging security breaches accelerate the need for cyber resilience Copyright © 2018 Accenture. All rights reserved. 6 2 76% say it is not possible to appear “strong, prepared and competent” if security is breached Test your resilience, like an attacker. Enhance conventional red attack and blue defense team testing. • Coached incident simulation • Threat intelligence • Experienced player-coaches
  • 7. More need to invest in critical technologies against new threats Copyright © 2018 Accenture. All rights reserved. 3 say new technologies are essential to securing the future of the organization. 84% 7 Employ advanced technologies to automate defenses. Prepare for attackers who use advanced technology. • Automated orchestration capabilities enable teams to respond in near real-time • Advanced identity access management controls user access to data
  • 8. Confidence remains high but a proactive approach is needed Copyright © 2018 Accenture. All rights reserved. 4 say cyber attacks are still a “bit of a black box; we do not know how or when they will affect our organization.” 77% 8 Use intelligence and data to be proactive with threat hunting. Find the attackers before they find you. • Adopt a continuous response model • Develop strategic and tactical threat intelligence • Monitor for anomalous and suspicious activity
  • 9. Higher CEO and board engagement place new demands on the CISO Copyright © 2018 Accenture. All rights reserved. 5 Who does the CISO report directly to? 9 The CISO needs to adapt. Evolve the role of the CISO to be more integrated with the business. • Business adept and tech-savvy • At home in the C-suite and the security center • Able to infuse a ‘security first’ culture everywhere 22% 41% 25% 1 2 3 Board CEO CIO
  • 10. Copyright © 2018 Accenture. All rights reserved. 10 SECURITY FROM THE INSIDE OUT Security teams perform better, despite more attacks. Leaders should embrace the good news Investments are proving to be wise. Organizations show they can perform better under greater pressure. But transformation does not end here Improvements must continue. Organizations could achieve cyber resilience within two to three years.
  • 11. Copyright © 2018 Accenture. All rights reserved. 11 ABOUT THE RESEARCH In 2017, Accenture Security surveyed 2,000 executives to understand the extent to which organizations prioritize security, how comprehensive their security plans are, what security capabilities they have, and their level of spend on security. Just over a year later, Accenture Security undertook a similar survey, this time interviewing 4,600 executives—representing organizations with annual revenues of $1bn or more—from 19 industries and 15 countries across North and South America, Europe and Asia Pacific. More than 98 percent of respondents were sole or key decision-makers in cybersecurity strategy and spending for their organization. LEARN MORE accenture.com/stateofcyber 2018 State of Cyber Resilience
  • 12. Copyright © 2018 Accenture. All rights reserved. 12 About Accenture Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions—underpinned by the world’s largest delivery network—Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With approximately 442,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com About Accenture Security Accenture Security helps organizations build resilience from the inside out, so they can confidently focus on innovation and growth. Leveraging its global network of cybersecurity labs, deep industry understanding across client value chains and services that span the security lifecycle, Accenture protects organization’s valuable assets, end-to-end. With services that include strategy and risk management, cyber defense, digital identity, application security and managed security, Accenture enables businesses around the world to defend against known sophisticated threats, and the unknown. Follow us @AccentureSecure on Twitter or visit the Accenture Security blog.