SlideShare une entreprise Scribd logo
1  sur  9
Copyright © 2016 Accenture All rights reserved.
Continuous
Cyber Attacks:
Building the Next-Gen
Infrastructure for the
New Normal
Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved.
Digital infrastructure plays
a critical role in combatting
cyber attacks
What is an effective digital infrastructure?
How can it best be maintained?
How can leaders choose from among the
wide range of tools and technology
solutions available?
2
1
2
3
Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved.
A comprehensive view of digital
security integrates cyber defense
into the enterprise environment
A next-generation security infrastructure should:
• Provide greater information visibility, context and meaning
regarding security events.
• Give technical analysts the ability to understand the impact of
security events in relation to business operations.
• Offer flexible and open access to data and features.
• Drive much deeper integration levels as security infrastructures
quickly becomes completely defined by software.
• Leverage automation for faster response times and scalability.
3
Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved.
Create the self-defending
enterprise.
To deliver a quantum leap in
performance.
Focus attention on
technology maturity.
To promote security based on
business context.
Align threat intelligence with
the business environment.
To prepare defenses for what's
coming and hunt for what already
might be in the environment.
Implement deceptions
to trap intruders.
To enable higher fidelity detection of
adversaries, learn from their attacks
and limit damage.
Leverage automation.
To focus security staff on more
challenging issues.
Feed the analytics engines.
To identify subtle threats based on
shifting behaviors in networks and
devices.
Creating a next-generation
security infrastructure requires the
following actions
4
Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved.
Organizations should rethink their
focus on tools to extract the most
benefit from them
• Infrastructure siloes prevent organizations from
realizing the full potential from the tools and
technology deployed.
• Instead, orchestrate existing infrastructure
capabilities to disrupt attacks.
• Assess new tools with an eye to replacing
multiple older technologies with a single new one.
5
Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved.
Build a next-generation security
infrastructure to help achieve
operational excellence
• Experiment: Pilot new security technologies and automation
solutions, develop use cases and simulate sophisticated attacks.
• Create cross-functional teams: Instead of having separate
groups managing the network, the servers and security, organize
these experts so they can interact, collaborate and increase the
effectiveness of security automation.
• Team to develop talent: Help staff become specialists, while
ensuring that the business, infrastructure and security teams
know about all projects so they can benefit from each other’s
innovations.
• Raise security’s internal profile: Make sure the chief
information security officer’s level of influence over the
infrastructure is commensurate with that of the IT leader.
6
Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved.
Adopt a comprehensive view to
the organization’s infrastructure
security requirements
7
Look beyond tools. Invest only in
technologies with
proven performance.
Ensure all business
units remain aligned
and are ready to
respond
to cyber attacks.
Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved.
Thank You
Please visit Accenture.com/cyberdefensestrategies
for additional information.
#CyberDefense
Follow us on Twitter @AccentureSecure
8
Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved.
About Accenture
Accenture is a leading global professional services company,
providing a broad range of services and solutions in strategy,
consulting, digital, technology and operations. Combining
unmatched experience and specialized skills across more than 40
industries and all business functions—underpinned by the world’s
largest delivery network—Accenture works at the intersection of
business and technology to help clients improve their performance
and create sustainable value for their stakeholders.
With approximately 373,000 people serving clients in more than
120 countries, Accenture drives innovation to improve the way the
world works and lives. Visit us at www.accenture.com.
Copyright © 2015 Accenture All rights reserved. 9

Contenu connexe

Tendances

FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Teamaccenture
 
Intelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital BusinessIntelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital Businessaccenture
 
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderAccenture Australia
 
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture Insurance
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...Accenture Technology
 
Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationHarnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationAccenture Operations
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016Melissa Gilpin
 
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Operations
 
Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceTechnology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceAccenture Operations
 
Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energyaccenture
 
The New World of As a Service
The New World of As a ServiceThe New World of As a Service
The New World of As a Serviceaccenture
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to Leaderaccenture
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...Accenture Technology
 
Accenture Liquid Application Studio
Accenture Liquid Application StudioAccenture Liquid Application Studio
Accenture Liquid Application StudioAccenture Technology
 
Leading the Digital Enterprise
Leading the Digital EnterpriseLeading the Digital Enterprise
Leading the Digital Enterpriseaccenture
 
Agricultural Chemicals 2016 Supply Chain Benchmarking Study
Agricultural Chemicals 2016 Supply Chain Benchmarking StudyAgricultural Chemicals 2016 Supply Chain Benchmarking Study
Agricultural Chemicals 2016 Supply Chain Benchmarking Studyaccenture
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportAccenture Technology
 
Accenture Regulatory Compliance Platform
Accenture Regulatory Compliance PlatformAccenture Regulatory Compliance Platform
Accenture Regulatory Compliance Platformaccenture
 
Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceTechnology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Serviceaccenture
 

Tendances (20)

FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
 
Cloud in the Boardroom
Cloud in the BoardroomCloud in the Boardroom
Cloud in the Boardroom
 
Intelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital BusinessIntelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital Business
 
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leader
 
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for Insurance
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationHarnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open Innovation
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
 
Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceTechnology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Service
 
Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energy
 
The New World of As a Service
The New World of As a ServiceThe New World of As a Service
The New World of As a Service
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to Leader
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Accenture Liquid Application Studio
Accenture Liquid Application StudioAccenture Liquid Application Studio
Accenture Liquid Application Studio
 
Leading the Digital Enterprise
Leading the Digital EnterpriseLeading the Digital Enterprise
Leading the Digital Enterprise
 
Agricultural Chemicals 2016 Supply Chain Benchmarking Study
Agricultural Chemicals 2016 Supply Chain Benchmarking StudyAgricultural Chemicals 2016 Supply Chain Benchmarking Study
Agricultural Chemicals 2016 Supply Chain Benchmarking Study
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
Accenture Regulatory Compliance Platform
Accenture Regulatory Compliance PlatformAccenture Regulatory Compliance Platform
Accenture Regulatory Compliance Platform
 
Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceTechnology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Service
 

En vedette

Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital ageAccenture Technology
 
Accenture Security Framework for AWS: Monetary Authority of Singapore Guidelines
Accenture Security Framework for AWS: Monetary Authority of Singapore GuidelinesAccenture Security Framework for AWS: Monetary Authority of Singapore Guidelines
Accenture Security Framework for AWS: Monetary Authority of Singapore GuidelinesAccenture Operations
 
Accenture Cloud-based Lab Reviews Case Study
Accenture Cloud-based Lab Reviews Case StudyAccenture Cloud-based Lab Reviews Case Study
Accenture Cloud-based Lab Reviews Case StudyAccenture Operations
 
Accenture Enkitec Group: Oracle database and Engineered Systems
Accenture Enkitec Group: Oracle database and Engineered SystemsAccenture Enkitec Group: Oracle database and Engineered Systems
Accenture Enkitec Group: Oracle database and Engineered SystemsAccenture Operations
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Accenture Technology
 
Driving Growth and Competitiveness: Can The Power of Cloud Lift M&A Value Int...
Driving Growth and Competitiveness: Can The Power of Cloud Lift M&A Value Int...Driving Growth and Competitiveness: Can The Power of Cloud Lift M&A Value Int...
Driving Growth and Competitiveness: Can The Power of Cloud Lift M&A Value Int...accenture
 
Guarding and Growing Personal Data Value
Guarding and Growing Personal Data ValueGuarding and Growing Personal Data Value
Guarding and Growing Personal Data Valueaccenture
 
The Six Distinctions of Procurement
The Six Distinctions of ProcurementThe Six Distinctions of Procurement
The Six Distinctions of ProcurementAccenture Operations
 
Sustaining Competitiveness in a Digital Age: How Trust Can Make or Break The ...
Sustaining Competitiveness in a Digital Age: How Trust Can Make or Break The ...Sustaining Competitiveness in a Digital Age: How Trust Can Make or Break The ...
Sustaining Competitiveness in a Digital Age: How Trust Can Make or Break The ...accenture
 

En vedette (13)

Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital age
 
The Promise of as-a-Service
The Promise of as-a-ServiceThe Promise of as-a-Service
The Promise of as-a-Service
 
Accenture Security Framework for AWS: Monetary Authority of Singapore Guidelines
Accenture Security Framework for AWS: Monetary Authority of Singapore GuidelinesAccenture Security Framework for AWS: Monetary Authority of Singapore Guidelines
Accenture Security Framework for AWS: Monetary Authority of Singapore Guidelines
 
Accenture Cloud-based Lab Reviews Case Study
Accenture Cloud-based Lab Reviews Case StudyAccenture Cloud-based Lab Reviews Case Study
Accenture Cloud-based Lab Reviews Case Study
 
Accenture Enkitec Group: Oracle database and Engineered Systems
Accenture Enkitec Group: Oracle database and Engineered SystemsAccenture Enkitec Group: Oracle database and Engineered Systems
Accenture Enkitec Group: Oracle database and Engineered Systems
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Driving Growth and Competitiveness: Can The Power of Cloud Lift M&A Value Int...
Driving Growth and Competitiveness: Can The Power of Cloud Lift M&A Value Int...Driving Growth and Competitiveness: Can The Power of Cloud Lift M&A Value Int...
Driving Growth and Competitiveness: Can The Power of Cloud Lift M&A Value Int...
 
Technology Vision 2017 - Overview
Technology Vision 2017 - OverviewTechnology Vision 2017 - Overview
Technology Vision 2017 - Overview
 
Guarding and Growing Personal Data Value
Guarding and Growing Personal Data ValueGuarding and Growing Personal Data Value
Guarding and Growing Personal Data Value
 
The Six Distinctions of Procurement
The Six Distinctions of ProcurementThe Six Distinctions of Procurement
The Six Distinctions of Procurement
 
Sustaining Competitiveness in a Digital Age: How Trust Can Make or Break The ...
Sustaining Competitiveness in a Digital Age: How Trust Can Make or Break The ...Sustaining Competitiveness in a Digital Age: How Trust Can Make or Break The ...
Sustaining Competitiveness in a Digital Age: How Trust Can Make or Break The ...
 
Technology Vision 2016 - Overview
Technology Vision 2016 - OverviewTechnology Vision 2016 - Overview
Technology Vision 2016 - Overview
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 

Similaire à Continuous cyber attacks: Building the next-gen infrastructure

Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.accenture
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.accenture
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakMarc St-Pierre
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalAccenture Operations
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centersBrencil Kaimba
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
 
Expert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxExpert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxkathyzink87
 
Intelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital BusinessIntelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital BusinessAccenture Technology
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterEMC
 
Gartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhangGartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhangColloqueRISQ
 
Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...gemmarie1
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamAccenture Operations
 
Assault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities GridAssault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities Gridaccenture
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
SAM and Security Teams Must Join Forces to Enhance Security
SAM and Security Teams Must Join Forces to Enhance SecuritySAM and Security Teams Must Join Forces to Enhance Security
SAM and Security Teams Must Join Forces to Enhance SecurityFlexera
 

Similaire à Continuous cyber attacks: Building the next-gen infrastructure (20)

Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
Expert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxExpert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptx
 
Intelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital BusinessIntelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital Business
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations Center
 
Gartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhangGartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhang
 
Cybersecurity.pdf
Cybersecurity.pdfCybersecurity.pdf
Cybersecurity.pdf
 
Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
 
The 10 most trusted cyber threat solution providers
The 10 most trusted cyber threat solution providersThe 10 most trusted cyber threat solution providers
The 10 most trusted cyber threat solution providers
 
Assault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities GridAssault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities Grid
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
SAM and Security Teams Must Join Forces to Enhance Security
SAM and Security Teams Must Join Forces to Enhance SecuritySAM and Security Teams Must Join Forces to Enhance Security
SAM and Security Teams Must Join Forces to Enhance Security
 
CCSK.pptx
CCSK.pptxCCSK.pptx
CCSK.pptx
 

Plus de Accenture Operations

Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureAccenture Operations
 
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureAccenture Operations
 
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureAccenture Operations
 
Network Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureNetwork Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureAccenture Operations
 
Network Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureNetwork Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureAccenture Operations
 
Start your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureStart your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureAccenture Operations
 
Start your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureStart your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureAccenture Operations
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureAccenture Operations
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureAccenture Operations
 
Driving change: Unlocking data to transform the front office
Driving change: Unlocking data to transform the front officeDriving change: Unlocking data to transform the front office
Driving change: Unlocking data to transform the front officeAccenture Operations
 
Marketing Operations | SlideShare | Accenture
Marketing Operations | SlideShare | AccentureMarketing Operations | SlideShare | Accenture
Marketing Operations | SlideShare | AccentureAccenture Operations
 
The Value Multiplier | SlideShare | Accenture
The Value Multiplier | SlideShare | AccentureThe Value Multiplier | SlideShare | Accenture
The Value Multiplier | SlideShare | AccentureAccenture Operations
 
Intelligent Talent & HR Operations | SlideShare | Accenture
Intelligent Talent & HR Operations | SlideShare | AccentureIntelligent Talent & HR Operations | SlideShare | Accenture
Intelligent Talent & HR Operations | SlideShare | AccentureAccenture Operations
 
Intelligent Marketing Operations | SlideShare | Accenture
Intelligent Marketing Operations | SlideShare | AccentureIntelligent Marketing Operations | SlideShare | Accenture
Intelligent Marketing Operations | SlideShare | AccentureAccenture Operations
 
Elevate with Intelligent Supply Chain | SlideShare | Accenture
Elevate with Intelligent Supply Chain | SlideShare | AccentureElevate with Intelligent Supply Chain | SlideShare | Accenture
Elevate with Intelligent Supply Chain | SlideShare | AccentureAccenture Operations
 
Fast-Track to Future-Ready Finance Operations
Fast-Track to Future-Ready Finance OperationsFast-Track to Future-Ready Finance Operations
Fast-Track to Future-Ready Finance OperationsAccenture Operations
 
Elevate Every Decision with Intelligent Procurement
Elevate Every Decision with Intelligent ProcurementElevate Every Decision with Intelligent Procurement
Elevate Every Decision with Intelligent ProcurementAccenture Operations
 
Elevate Every Decision with Digital Inside Sales
Elevate Every Decision with Digital Inside SalesElevate Every Decision with Digital Inside Sales
Elevate Every Decision with Digital Inside SalesAccenture Operations
 
Fast Track to Future Ready Banking Operations
Fast Track to Future Ready Banking OperationsFast Track to Future Ready Banking Operations
Fast Track to Future Ready Banking OperationsAccenture Operations
 
Fast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance OperationsFast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance OperationsAccenture Operations
 

Plus de Accenture Operations (20)

Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | Accenture
 
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | Accenture
 
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | Accenture
 
Network Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureNetwork Operations | SlideShare | Accenture
Network Operations | SlideShare | Accenture
 
Network Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureNetwork Operations | SlideShare | Accenture
Network Operations | SlideShare | Accenture
 
Start your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureStart your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | Accenture
 
Start your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureStart your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | Accenture
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | Accenture
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | Accenture
 
Driving change: Unlocking data to transform the front office
Driving change: Unlocking data to transform the front officeDriving change: Unlocking data to transform the front office
Driving change: Unlocking data to transform the front office
 
Marketing Operations | SlideShare | Accenture
Marketing Operations | SlideShare | AccentureMarketing Operations | SlideShare | Accenture
Marketing Operations | SlideShare | Accenture
 
The Value Multiplier | SlideShare | Accenture
The Value Multiplier | SlideShare | AccentureThe Value Multiplier | SlideShare | Accenture
The Value Multiplier | SlideShare | Accenture
 
Intelligent Talent & HR Operations | SlideShare | Accenture
Intelligent Talent & HR Operations | SlideShare | AccentureIntelligent Talent & HR Operations | SlideShare | Accenture
Intelligent Talent & HR Operations | SlideShare | Accenture
 
Intelligent Marketing Operations | SlideShare | Accenture
Intelligent Marketing Operations | SlideShare | AccentureIntelligent Marketing Operations | SlideShare | Accenture
Intelligent Marketing Operations | SlideShare | Accenture
 
Elevate with Intelligent Supply Chain | SlideShare | Accenture
Elevate with Intelligent Supply Chain | SlideShare | AccentureElevate with Intelligent Supply Chain | SlideShare | Accenture
Elevate with Intelligent Supply Chain | SlideShare | Accenture
 
Fast-Track to Future-Ready Finance Operations
Fast-Track to Future-Ready Finance OperationsFast-Track to Future-Ready Finance Operations
Fast-Track to Future-Ready Finance Operations
 
Elevate Every Decision with Intelligent Procurement
Elevate Every Decision with Intelligent ProcurementElevate Every Decision with Intelligent Procurement
Elevate Every Decision with Intelligent Procurement
 
Elevate Every Decision with Digital Inside Sales
Elevate Every Decision with Digital Inside SalesElevate Every Decision with Digital Inside Sales
Elevate Every Decision with Digital Inside Sales
 
Fast Track to Future Ready Banking Operations
Fast Track to Future Ready Banking OperationsFast Track to Future Ready Banking Operations
Fast Track to Future Ready Banking Operations
 
Fast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance OperationsFast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance Operations
 

Dernier

Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000dlhescort
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Sheetaleventcompany
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 

Dernier (20)

Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 

Continuous cyber attacks: Building the next-gen infrastructure

  • 1. Copyright © 2016 Accenture All rights reserved. Continuous Cyber Attacks: Building the Next-Gen Infrastructure for the New Normal
  • 2. Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved. Digital infrastructure plays a critical role in combatting cyber attacks What is an effective digital infrastructure? How can it best be maintained? How can leaders choose from among the wide range of tools and technology solutions available? 2 1 2 3
  • 3. Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved. A comprehensive view of digital security integrates cyber defense into the enterprise environment A next-generation security infrastructure should: • Provide greater information visibility, context and meaning regarding security events. • Give technical analysts the ability to understand the impact of security events in relation to business operations. • Offer flexible and open access to data and features. • Drive much deeper integration levels as security infrastructures quickly becomes completely defined by software. • Leverage automation for faster response times and scalability. 3
  • 4. Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved. Create the self-defending enterprise. To deliver a quantum leap in performance. Focus attention on technology maturity. To promote security based on business context. Align threat intelligence with the business environment. To prepare defenses for what's coming and hunt for what already might be in the environment. Implement deceptions to trap intruders. To enable higher fidelity detection of adversaries, learn from their attacks and limit damage. Leverage automation. To focus security staff on more challenging issues. Feed the analytics engines. To identify subtle threats based on shifting behaviors in networks and devices. Creating a next-generation security infrastructure requires the following actions 4
  • 5. Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved. Organizations should rethink their focus on tools to extract the most benefit from them • Infrastructure siloes prevent organizations from realizing the full potential from the tools and technology deployed. • Instead, orchestrate existing infrastructure capabilities to disrupt attacks. • Assess new tools with an eye to replacing multiple older technologies with a single new one. 5
  • 6. Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved. Build a next-generation security infrastructure to help achieve operational excellence • Experiment: Pilot new security technologies and automation solutions, develop use cases and simulate sophisticated attacks. • Create cross-functional teams: Instead of having separate groups managing the network, the servers and security, organize these experts so they can interact, collaborate and increase the effectiveness of security automation. • Team to develop talent: Help staff become specialists, while ensuring that the business, infrastructure and security teams know about all projects so they can benefit from each other’s innovations. • Raise security’s internal profile: Make sure the chief information security officer’s level of influence over the infrastructure is commensurate with that of the IT leader. 6
  • 7. Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved. Adopt a comprehensive view to the organization’s infrastructure security requirements 7 Look beyond tools. Invest only in technologies with proven performance. Ensure all business units remain aligned and are ready to respond to cyber attacks.
  • 8. Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved. Thank You Please visit Accenture.com/cyberdefensestrategies for additional information. #CyberDefense Follow us on Twitter @AccentureSecure 8
  • 9. Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved. About Accenture Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions—underpinned by the world’s largest delivery network—Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With approximately 373,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com. Copyright © 2015 Accenture All rights reserved. 9