Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.

IT Security: Implications for the Technology Vision 2015

5 086 vues

Publié le

Cyber Security plays a key role in today’s digital business. Examine the 5 key security implications emerging out of this year’s Tech Vision and strategies to approach them: autonomous devices, data integrity, big data, security platforms and customer trust.

IT Security: Implications for the Technology Vision 2015

  1. 1. Security Implications
  2. 2. Each year, our Technology Vision pinpoints the emerging technology trends that will impact large enterprises in the next 3-5 years based on our insights and research. Security is a pervasive issue for organizations in the We Economy. To help executives understand and plan for the future, we are pleased to release a dedicated report identifying the key Security Implications of this year’s Technology Vision. Accenture Technology Vision 2015 Digital Business Era: Stretch Your Boundaries Copyright © 2015 Accenture All rights reserved.
  3. 3. Digital Business Era: Stretch Your Boundaries Succeeding in the We Economy 3 Edge Autonomy Data Integrity Big Data Security Security Platforms Customer Trust 1 2 3 4 5 5 Security Implications Copyright © 2015 Accenture All rights reserved.
  4. 4. 1 Edge Autonomy: Enabling autonomous devices at the edge Copyright © 2015 Accenture All rights reserved.
  5. 5. The Accenture Technology Vision 2015 highlights how the rapidly growing Internet of Things (IoT) is introducing billions of embedded sensors, smart machines, wearable devices and connected industrial equipment. Businesses are beginning to interconnect these “things” to enable the delivery of intelligent products and services through the digital ecosystem. In time, this connected intelligence will be used to deliver what customers really want: results, or what Accenture calls the Outcome Economy. There are 4 key actions to take to enable edge autonomy: 1.Prioritize protecting edge devices 2.Boost security for edge device infrastructure 3.Include system context in security planning 4.Manage edge intelligence with new governance model Edge Autonomy: Enabling autonomous devices at the edge. #cybersecurity www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
  6. 6. 2 Data Integrity: Making data-driven decisions at Internet of Things scale. 6 Copyright © 2015 Accenture All rights reserved.
  7. 7. As the IoT proliferates, businesses will use data passed between interconnected devices, applications and processes to determine customer context, and then collaborate through platforms to provide the intelligent products and services that customers desire in the Outcome Economy. A connected digital ecosystem, combined with edge computing and smart M2M communications, will expand the ability to use data collected from IoT devices to drive significantly faster decisions. To optimize decisions, businesses will require edge data that is accurate, authentic and complete. Accenture proposes three key strategies: 1.Protect data on edge devices 2.Implement assurance that scales 3.Tie IoT protocols to business models Data Integrity: Making data-driven decisions at Internet of Things scale. #cybersecurity www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
  8. 8. 3 Securing the three Vs. 8 Big Data Security: Copyright © 2015 Accenture All rights reserved.
  9. 9. Businesses are experiencing exponential growth in data as more devices get deployed at the edge and business processes become increasingly digital— causing their data repositories to reach capacity. For Intelligent Enterprises to fully reap the benefits of software intelligence and embrace a collaborative workforce model of humans and machines (or what Accenture deems Workforce Reimagined), it will be critical to securely process and protect big data. Traditional database management systems cannot scale enough to handle the data volume, acquisition velocity or data variety–what is often referred to as the three Vs. Enterprises should focus on two key areas: 1.Secure big data processing platforms 2.Embed security into data Big Data Security: Securing the three Vs. #cybersecurity www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
  10. 10. 4 Security Platforms: Maximizing protection across digital ecosystem platforms. 10 Copyright © 2015 Accenture All rights reserved.
  11. 11. With the evolution of the IoT and digital industry ecosystems, platform-based businesses will offer new opportunities for growth and profitability. Platform security is a vital capability to operating in the digital ecosystem. Businesses must understand the potential cyber-physical risks of delivering platform-based services and augment existing security efforts with digital platform intelligence. Accenture outlines 5 approaches to maximize security platforms: 1.Understand physical security risks 2.Evolve data security intelligently 3.Plan security into the platform 4.Utilize existing platforms to augment security intelligence 5.Shift to security DevOps Security Platforms: Maximizing protection across digital ecosystem platforms. #cybersecurity www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
  12. 12. 5 Customer Trust: Building customer trust in a digital economy Copyright © 2015 Accenture All rights reserved.
  13. 13. One of the key determinants of success for digital businesses will be the ability to deliver products and services that are highly personalized based on individual their specific habits and preferences. Accenture calls this trend the Internet of Me. To maximize customer data and deliver personalization, businesses must apply more stringent security measures to protect privacy—and ultimately build and maintain trust with customers. We share 5 strategies to build customer trust: 1.Build trust by taking transparency seriously 2.Follow basic data protection guidelines 3.Take advantage of privacy-preserving analytics 4.Innovate to appeal to privacy-wary customers 5.Empower customers with tools Customer Trust: Building customer trust in a digital economy. #cybersecurity www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
  14. 14. Digital Business Era: Stretch Your Boundaries 14 Edge Autonomy Data Integrity Big Data Security Security Platforms Customer Trust 1 2 3 4 5 5 Security Implications Copyright © 2015 Accenture All rights reserved.
  15. 15. 15 Accenture Technology Vision 2015 Digital Business Era: Stretch Your Boundaries Security Implications www.accenture.com/securityvision www.accenture.com/technologyvision #techvision2015 #cybersecurity @accenturelabs Copyright © 2015 Accenture All rights reserved.

×