SlideShare a Scribd company logo
1 of 12
CYBER SECURITY
IN AUSTRALIA AND
NEW ZEALAND:
HOW
OPERATIONAL
EFFECTIVENESS
IS KEY
STRATEGY AND TECHNOLOGY ALONE
DO NOT GUARANTEE AN EFFECTIVE
CYBER DEFENCE
The best strategy, supported by the latest technology,
can fail if not executed properly.
Risks to effective cyber defence include:
• Increased exposure to attack
(cloud, Internet of Things, connected devices)
• High turnover within security team
• Lack of visibility to critical assets
• Frequent IT changes not communicated
• Length of time taken to detect breaches
Copyright © 2016 Accenture. All rights reserved. 2
SHORTAGE OF CRITICAL TECHNOLOGIES
AND SKILLS HAMPER ORGANISATIONS’
SECURITY APPROACH
• Operations lack rigor and consistency
• Stakeholders remain unaware of their vulnerability
• Employees don’t follow standard security practices
• Security work generates “noise” that masks valid threats
• Out-dated tools and processes can limit effectiveness
of the security team
Copyright © 2016 Accenture. All rights reserved. 3
DRIVE IMPROVED SECURITY
OPERATIONS FROM ACTIONABLE
THREAT INTELLIGENCE
Steps that can create security operational excellence:
1. Assess effectiveness of current security processes
2. Invest in attracting and retaining skilled security talent
3. Automate intelligently to leverage scarce resources
4. Understand how threat data pertains to the business
5. Identify what isn’t known
6. Create a plan to address knowledge gaps
7. Find an effective sparring partner to improve security capabilities
Copyright © 2016 Accenture. All rights reserved. 4
CYBER DEFENCE STRATEGIES AND
SUPPORTING TECHNOLOGY WILL ONLY
WORK IF EXECUTED PROPERLY
Leading organisations focus on creating a highly efficient
operating model that balances security operations,
new technology implementation, testing of security
posture and feedback to update defences.
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Security
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
5Copyright © 2016 Accenture. All rights reserved.
ACHIEVING OPERATIONAL EXCELLENCE
IN CYBER DEFENCE REQUIRES A
COMPREHENSIVE APPROACH
Our model helps organisations prepare and protect for
threats, defend and detect breaches, and then respond to
and recover from incidents.
Application &
Data Security
Platform &
Infrastructure Security
Digital Security
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Security
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
6Copyright © 2016 Accenture. All rights reserved.
START WITH A BIG-PICTURE STRATEGY
OF HOW SECURITY SUPPORTS
BUSINESS PERFORMANCE
• Forward-thinking capabilities to help
scale activities
• IT strategy that provides greater understanding
of assets, data sets, technical and
business functions
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Security
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
7Copyright © 2016 Accenture. All rights reserved.
FORWARD-THINKING CAPABILITIES
HELP SCALE ACTIVITIES EFFECTIVELY
• High-powered analytics to predict and detect incidents,
and identify behavior changes that indicate security risks
• Emphasis on visualisation to
identify anomalies
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Security
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
8Copyright © 2016 Accenture. All rights reserved.
CONCENTRATE ON INTELLIGENT
INCIDENT RESPONSE
• Platforms that guide operators in hunting for threats
• Train the same way the company fights attackers, to
prepare for real-world adversaries
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Security
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
9Copyright © 2016 Accenture. All rights reserved.
THE GOAL
Create a highly efficient operating model
that balances security operations, new
technology implementation, testing of
security posture and feedback to update
defences.
Copyright © 2016 Accenture. All rights reserved. 10
THANK YOU
For further information:
• Visit Accenture.com/operationaleffectiveness
• Follow us on Twitter @AccentureSecure
• Contact APAC Security Lead, Joshua Kennedy-White
Copyright © 2016 Accenture. All rights reserved. 11
ABOUT ACCENTURE
Accenture is a leading global professional services company, providing a
broad range of services and solutions in strategy, consulting, digital,
technology and operations. Combining unmatched experience and
specialized skills across more than 40 industries and all business
functions—underpinned by the world’s largest delivery network—
Accenture works at the intersection of business and technology to help
clients improve their performance and create sustainable value for their
stakeholders. With approximately 373,000 people serving clients in more
than 120 countries, Accenture drives innovation to improve the way the
world works and lives. Visit us at www.accenture.com.
Accenture, its logo, and High performance. Delivered. are trademarks of Accenture.
Copyright © 2016 Accenture
All rights reserved.

More Related Content

Viewers also liked

Guarding and Growing Personal Data Value
Guarding and Growing Personal Data ValueGuarding and Growing Personal Data Value
Guarding and Growing Personal Data Valueaccenture
 
Setting up The Centre of Excellence for Rpa
Setting up The Centre of Excellence for RpaSetting up The Centre of Excellence for Rpa
Setting up The Centre of Excellence for RpaMohit Sharma (GAICD)
 
The digital government: shaped around its citizens
The digital government: shaped around its citizensThe digital government: shaped around its citizens
The digital government: shaped around its citizensAccenture Australia
 
Buying RPA - From Hype to Reality
Buying RPA - From Hype to RealityBuying RPA - From Hype to Reality
Buying RPA - From Hype to RealitySymphony Ventures
 
The Real World of Robotics Process Automation (RPA)
The Real World of Robotics Process Automation (RPA)The Real World of Robotics Process Automation (RPA)
The Real World of Robotics Process Automation (RPA)CGI Suomi
 
What, Why and How of Governance in RPA
What, Why and How of Governance  in RPAWhat, Why and How of Governance  in RPA
What, Why and How of Governance in RPAMohit Sharma (GAICD)
 
Lessons learned and business case for a rapid RPA
Lessons learned and business case for a rapid RPALessons learned and business case for a rapid RPA
Lessons learned and business case for a rapid RPAMohit Sharma (GAICD)
 

Viewers also liked (11)

Guarding and Growing Personal Data Value
Guarding and Growing Personal Data ValueGuarding and Growing Personal Data Value
Guarding and Growing Personal Data Value
 
Technology Vision 2017 - Overview
Technology Vision 2017 - OverviewTechnology Vision 2017 - Overview
Technology Vision 2017 - Overview
 
28022017 Simen Munter Mindfields
28022017 Simen Munter Mindfields28022017 Simen Munter Mindfields
28022017 Simen Munter Mindfields
 
Setting up The Centre of Excellence for Rpa
Setting up The Centre of Excellence for RpaSetting up The Centre of Excellence for Rpa
Setting up The Centre of Excellence for Rpa
 
The digital government: shaped around its citizens
The digital government: shaped around its citizensThe digital government: shaped around its citizens
The digital government: shaped around its citizens
 
28022017 Mohit Sharma
28022017 Mohit Sharma28022017 Mohit Sharma
28022017 Mohit Sharma
 
Buying RPA - From Hype to Reality
Buying RPA - From Hype to RealityBuying RPA - From Hype to Reality
Buying RPA - From Hype to Reality
 
Network Transformation Roadmap
Network Transformation RoadmapNetwork Transformation Roadmap
Network Transformation Roadmap
 
The Real World of Robotics Process Automation (RPA)
The Real World of Robotics Process Automation (RPA)The Real World of Robotics Process Automation (RPA)
The Real World of Robotics Process Automation (RPA)
 
What, Why and How of Governance in RPA
What, Why and How of Governance  in RPAWhat, Why and How of Governance  in RPA
What, Why and How of Governance in RPA
 
Lessons learned and business case for a rapid RPA
Lessons learned and business case for a rapid RPALessons learned and business case for a rapid RPA
Lessons learned and business case for a rapid RPA
 

Recently uploaded

ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 

Recently uploaded (20)

ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 

Cyber security in australia and new zealand

  • 1. CYBER SECURITY IN AUSTRALIA AND NEW ZEALAND: HOW OPERATIONAL EFFECTIVENESS IS KEY
  • 2. STRATEGY AND TECHNOLOGY ALONE DO NOT GUARANTEE AN EFFECTIVE CYBER DEFENCE The best strategy, supported by the latest technology, can fail if not executed properly. Risks to effective cyber defence include: • Increased exposure to attack (cloud, Internet of Things, connected devices) • High turnover within security team • Lack of visibility to critical assets • Frequent IT changes not communicated • Length of time taken to detect breaches Copyright © 2016 Accenture. All rights reserved. 2
  • 3. SHORTAGE OF CRITICAL TECHNOLOGIES AND SKILLS HAMPER ORGANISATIONS’ SECURITY APPROACH • Operations lack rigor and consistency • Stakeholders remain unaware of their vulnerability • Employees don’t follow standard security practices • Security work generates “noise” that masks valid threats • Out-dated tools and processes can limit effectiveness of the security team Copyright © 2016 Accenture. All rights reserved. 3
  • 4. DRIVE IMPROVED SECURITY OPERATIONS FROM ACTIONABLE THREAT INTELLIGENCE Steps that can create security operational excellence: 1. Assess effectiveness of current security processes 2. Invest in attracting and retaining skilled security talent 3. Automate intelligently to leverage scarce resources 4. Understand how threat data pertains to the business 5. Identify what isn’t known 6. Create a plan to address knowledge gaps 7. Find an effective sparring partner to improve security capabilities Copyright © 2016 Accenture. All rights reserved. 4
  • 5. CYBER DEFENCE STRATEGIES AND SUPPORTING TECHNOLOGY WILL ONLY WORK IF EXECUTED PROPERLY Leading organisations focus on creating a highly efficient operating model that balances security operations, new technology implementation, testing of security posture and feedback to update defences. Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation 5Copyright © 2016 Accenture. All rights reserved.
  • 6. ACHIEVING OPERATIONAL EXCELLENCE IN CYBER DEFENCE REQUIRES A COMPREHENSIVE APPROACH Our model helps organisations prepare and protect for threats, defend and detect breaches, and then respond to and recover from incidents. Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation 6Copyright © 2016 Accenture. All rights reserved.
  • 7. START WITH A BIG-PICTURE STRATEGY OF HOW SECURITY SUPPORTS BUSINESS PERFORMANCE • Forward-thinking capabilities to help scale activities • IT strategy that provides greater understanding of assets, data sets, technical and business functions Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation 7Copyright © 2016 Accenture. All rights reserved.
  • 8. FORWARD-THINKING CAPABILITIES HELP SCALE ACTIVITIES EFFECTIVELY • High-powered analytics to predict and detect incidents, and identify behavior changes that indicate security risks • Emphasis on visualisation to identify anomalies Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation 8Copyright © 2016 Accenture. All rights reserved.
  • 9. CONCENTRATE ON INTELLIGENT INCIDENT RESPONSE • Platforms that guide operators in hunting for threats • Train the same way the company fights attackers, to prepare for real-world adversaries Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation 9Copyright © 2016 Accenture. All rights reserved.
  • 10. THE GOAL Create a highly efficient operating model that balances security operations, new technology implementation, testing of security posture and feedback to update defences. Copyright © 2016 Accenture. All rights reserved. 10
  • 11. THANK YOU For further information: • Visit Accenture.com/operationaleffectiveness • Follow us on Twitter @AccentureSecure • Contact APAC Security Lead, Joshua Kennedy-White Copyright © 2016 Accenture. All rights reserved. 11
  • 12. ABOUT ACCENTURE Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions—underpinned by the world’s largest delivery network— Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With approximately 373,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com. Accenture, its logo, and High performance. Delivered. are trademarks of Accenture. Copyright © 2016 Accenture All rights reserved.