SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
SECURING THE
DIGITAL ECONOMYReinventing the Internet for Trust
Internet Today:
We Are More Dependent… But More Concerned
Businesses, Individuals and Societies Are Increasingly Dependent on Internet…
Source: See note for references
Individuals Businesses Societies
… But Only 30% Are Very Confident in the Internet and This Drops to 25% in 5 Years
“How confident are you in the security of the Internet for your business?” (N=1,700)
Why the Internet is Under Pressure
Internet
Today
Authentication is getting harder,
as no individual has just one single
identity in the digital world.
3. Identity and Data Veracity
The global spread of data
localization laws can depress
economic activity across all industries.
4. Digital Fragmentation
Internet Security was
designed to prevent physical
failures, not attacks.
1. Inherent Flaws
More end-points and more
Internet connected devices
to protect expands the
surface area of attack.
2. The IoT Effect
The Risk to the Digital
Economy and Society is High
Risk for the Society
With computers and networks
so deeply embedded in most
critical infrastructures, the
risks are becoming extremely
high.
Cybercrime threatens not only
many of the benefits we have
realized, but also our health and
societal safety.
Risk for the Economy
(Value at Risk* due to direct and indirect attacks,
Cumulative 2019-2023, $Bn)
* Expected foregone revenue cumulative
over the next 5 years. Calculations over a
sample of 4,700 global public companies*
Source: Accenture Research
$5.2Tr
23%
77%
Direct attacks
Indirect attacks
How CEOs Can Help Fix the Internet
Where business decisions
on standards and best
practices in companies
and across ecosystems
are made.
ABOVE GROUND:
BELOW GROUND:
Where new technologies and
innovations to secure the
Internet can advance
businesses and enhance
digital safety.
Governance:
Join Forces with Other Companies and
Govern Globally
75% No one organization can solve the
cybersecurity challenges of the Internet
economy on its own; it will require an organized
group effort.
Business Architecture:
Connect and Protect with a Business
Model that Runs on Digital Trust
80% Protecting companies from
weaknesses in third parties is
increasingly difficult given the complexity
of today’s sprawling Internet ecosystems.
Technology:
Advance Businesses and Enhance Safety
Through Technologies
79% The rate of adoption and innovation has
outpaced the security features needed to
ensure a resilient cyber economy.
Source: Accenture
ABOVE GROUND
Governance
Join Forces with Other Companies and Govern Globally
Promote a formal
educational system able to
train software professionals
to deal their new technical
and ethical responsibilities.
1.
Create an Internet
security code of
ethical conduct
for each industry.
Lead discussions seeking to
design security standards for
devices, data, algorithms,
networks, and protocols
(especially CEOs of
technology companies).
2.
Be proactive with
principle-based
standards for Internet
security.
Participate fully in the
debates that are already
starting to take place as
regulators discuss how
countries and regions must
protect people’s digital
identities.
3.
Promote consumer-
controlled digital
identities.
Accept the short–term costs of
transparency and work with
institutions and other
companies to better
understand how to prevent
new attacks.
4.
Commit to sharing
information about
cyberattacks; help
reduce stigma.
Business Architecture
Connect and Protect with a Business Model That Runs
on Digital Trust
Manage the trade-off
between time to market and
ensuring secure sustainable
growth through technology,
and always choose secure
growth.
1.
Prioritize security by
design.
Align the individual, short-
term incentives of business
line managers to the longer-
term cybersecurity interests
of the company (e.g.
adjusting rewarding system).
2.
Make line-of-business
leaders accountable
for security.
Educate fellow board
members, helping them
become more cyber-savvy
and better risk managers.
3.
Bring a CISO
to the board.
It is in the interest of large
organizations to help smaller
business partners operate in a
trustworthy digital environment
and help to facilitate the same
levels of security.
4.
Protect the entire value
chain.
BELOW GROUND
Technology
Advance Businesses and Enhance Safety Through
Technologies
Invest in and demand the
adoption of new Internet
protocols as they only
produce benefits if enough
networks commit to them.
1.
Campaign to resolve
vulnerabilities
in basic Internet
protocols.
Ensure that software
security and update
functions are embedded
in “edge” devices—such
as mobiles and IoT
devices—from initial
design.
2.
Heighten
security at the “edge.”
Make network
environments dynamic, so
that they exist only for the
time needed to complete a
specific task, making them
almost impossible to
attack.
3.
Embrace the
advantages of
Software Defined
Networking.
Keep the evolution of quantum
computing on the radar to
make IT systems quantum-
ready as soon as the
technology allows.
4.
Tackle the
question of quantum.
Reinventing the Internet for Trust
CEO
Engagement
is Needed
to Reinvent
the Internet
90%
of C-levels believe a
trustworthy digital economy
is very or extremely critical
to their future growth.
Benefits for
Businesses
Individuals
Society

Contenu connexe

Tendances

Tendances (20)

Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
Technology Vision 2016 - Infographic
Technology Vision 2016 - InfographicTechnology Vision 2016 - Infographic
Technology Vision 2016 - Infographic
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
EMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-Security
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
From Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber ResilienceFrom Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber Resilience
 
Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk Management
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]
 
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure
 
Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energy
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Born to be digital - how leading CIOs are preparing for digital transformation
Born to be digital - how leading CIOs are preparing for digital transformationBorn to be digital - how leading CIOs are preparing for digital transformation
Born to be digital - how leading CIOs are preparing for digital transformation
 
General Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian FirmsGeneral Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian Firms
 
Cyber Security Infographic
Cyber Security InfographicCyber Security Infographic
Cyber Security Infographic
 

Similaire à Securing the Digital Economy: Reinventing the Internet

Similaire à Securing the Digital Economy: Reinventing the Internet (20)

Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
 
16231
1623116231
16231
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
 
Top List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfTop List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdf
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
Why Cyber Security Is important?
Why Cyber Security Is important?Why Cyber Security Is important?
Why Cyber Security Is important?
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 

Plus de accenture

Plus de accenture (20)

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 

Dernier

Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
lizamodels9
 

Dernier (20)

How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 

Securing the Digital Economy: Reinventing the Internet

  • 2. Internet Today: We Are More Dependent… But More Concerned Businesses, Individuals and Societies Are Increasingly Dependent on Internet… Source: See note for references Individuals Businesses Societies
  • 3. … But Only 30% Are Very Confident in the Internet and This Drops to 25% in 5 Years “How confident are you in the security of the Internet for your business?” (N=1,700)
  • 4. Why the Internet is Under Pressure Internet Today Authentication is getting harder, as no individual has just one single identity in the digital world. 3. Identity and Data Veracity The global spread of data localization laws can depress economic activity across all industries. 4. Digital Fragmentation Internet Security was designed to prevent physical failures, not attacks. 1. Inherent Flaws More end-points and more Internet connected devices to protect expands the surface area of attack. 2. The IoT Effect
  • 5. The Risk to the Digital Economy and Society is High Risk for the Society With computers and networks so deeply embedded in most critical infrastructures, the risks are becoming extremely high. Cybercrime threatens not only many of the benefits we have realized, but also our health and societal safety. Risk for the Economy (Value at Risk* due to direct and indirect attacks, Cumulative 2019-2023, $Bn) * Expected foregone revenue cumulative over the next 5 years. Calculations over a sample of 4,700 global public companies* Source: Accenture Research $5.2Tr 23% 77% Direct attacks Indirect attacks
  • 6. How CEOs Can Help Fix the Internet Where business decisions on standards and best practices in companies and across ecosystems are made. ABOVE GROUND: BELOW GROUND: Where new technologies and innovations to secure the Internet can advance businesses and enhance digital safety. Governance: Join Forces with Other Companies and Govern Globally 75% No one organization can solve the cybersecurity challenges of the Internet economy on its own; it will require an organized group effort. Business Architecture: Connect and Protect with a Business Model that Runs on Digital Trust 80% Protecting companies from weaknesses in third parties is increasingly difficult given the complexity of today’s sprawling Internet ecosystems. Technology: Advance Businesses and Enhance Safety Through Technologies 79% The rate of adoption and innovation has outpaced the security features needed to ensure a resilient cyber economy. Source: Accenture
  • 8. Governance Join Forces with Other Companies and Govern Globally Promote a formal educational system able to train software professionals to deal their new technical and ethical responsibilities. 1. Create an Internet security code of ethical conduct for each industry. Lead discussions seeking to design security standards for devices, data, algorithms, networks, and protocols (especially CEOs of technology companies). 2. Be proactive with principle-based standards for Internet security. Participate fully in the debates that are already starting to take place as regulators discuss how countries and regions must protect people’s digital identities. 3. Promote consumer- controlled digital identities. Accept the short–term costs of transparency and work with institutions and other companies to better understand how to prevent new attacks. 4. Commit to sharing information about cyberattacks; help reduce stigma.
  • 9. Business Architecture Connect and Protect with a Business Model That Runs on Digital Trust Manage the trade-off between time to market and ensuring secure sustainable growth through technology, and always choose secure growth. 1. Prioritize security by design. Align the individual, short- term incentives of business line managers to the longer- term cybersecurity interests of the company (e.g. adjusting rewarding system). 2. Make line-of-business leaders accountable for security. Educate fellow board members, helping them become more cyber-savvy and better risk managers. 3. Bring a CISO to the board. It is in the interest of large organizations to help smaller business partners operate in a trustworthy digital environment and help to facilitate the same levels of security. 4. Protect the entire value chain.
  • 11. Technology Advance Businesses and Enhance Safety Through Technologies Invest in and demand the adoption of new Internet protocols as they only produce benefits if enough networks commit to them. 1. Campaign to resolve vulnerabilities in basic Internet protocols. Ensure that software security and update functions are embedded in “edge” devices—such as mobiles and IoT devices—from initial design. 2. Heighten security at the “edge.” Make network environments dynamic, so that they exist only for the time needed to complete a specific task, making them almost impossible to attack. 3. Embrace the advantages of Software Defined Networking. Keep the evolution of quantum computing on the radar to make IT systems quantum- ready as soon as the technology allows. 4. Tackle the question of quantum.
  • 12. Reinventing the Internet for Trust CEO Engagement is Needed to Reinvent the Internet 90% of C-levels believe a trustworthy digital economy is very or extremely critical to their future growth. Benefits for Businesses Individuals Society