SlideShare une entreprise Scribd logo
1  sur  10
Defending and empowering
the resilient digital business
Accenture
Security Services
Sophisticated, well-funded cybercriminals are
outpacing digital businesses
Copyright © 2016 Accenture. All rights reserved. 2
*Source: Ponemon Institute Study 2015
**Source: “Internet Security Threat Report,” Symantec, April 2015, Volume 20.
The impact of security threats is increasingly devastating.
With the explosion of the IoT, cloud and mobile, digital technology is now pervasive.
The opportunities for attack are surging, opening up new areas of vulnerability for security,
privacy and data integrity.
5 out of 6
organizations with
2,500+ employees
attacked**
317 million
new pieces of
malware created
in 2014**
23% rise
in data breaches in
2014*, and a 50%
spike in successful
attacks since
2012**
$7.7 million
damage per
company in
2015*
Business leaders know it’s not enough to focus purely on prevention of
security breaches.
To truly defend and empower your organization, you also need to detect,
intercept and remediate even the most unthinkable threats.
Boardroom priority: “How resilient are we?”
Copyright © 2016 Accenture. All rights reserved. 3
“The impact of security risks is
understated because a lot goes
unreported. The costs of prevention
and remediation are massive and
the brands of organizations and the
reputations of their top leaders are
put at stake.”
Omar Abbosh,
Chief Strategy Officer, Accenture
Build resilience, outpace attackers and turn to what matters most: innovation and
business growth … uninterrupted.
A persistently vigilant business is a resilient business
Copyright © 2016 Accenture. All rights reserved. 4
Defend the Business from
Hostile Adversaries
Empower Business Growth
& Secure Operations
Confidently address growing boardroom
and C-suite security priorities (shareholder
value, revenue and compliance).
Interlock security strategy with business
strategy and spend appropriately on what’s
most important.
Gain security-situational awareness across
expanding business boundaries and
develop rapid-response capabilities to
minimize losses through next-generation
technology such as security automation and
relentless improvement.
Initiate organizational change and transform
security to be digital friendly, taking into
account user centricity, Internet scale and
digital technologies (IoT, big data etc.).
Continuously test environmental robustness
by “training like you fight.”
Manage technology and process security
risks outside of direct organizational
control while leveraging security “As-a-
Service” for greater agility.
Go beyond risk-based tactics to sophisticated, intelligent digital strategies that
are embedded into the fabric of the enterprise and engineered for the future.
Replace vulnerability with capability
Copyright © 2016 Accenture. All rights reserved. 5
Market Maker
Reactionary
and Ad Hoc
Embedded and
Optimized
Threat-centric,
Risk-based
Compliance-
based
MATURITYLEVEL
2015–16
2013–14
2017
Pre-2010
2018 & Beyond
1.0 2.0 3.0 4.0
2018 and Beyond:
Market Maker
Achieving resilience through
innovative security programs
that have a cross-industry impact.
2017: Embedded
and Optimized
Consistently embedding security
and optimizing the business for
agility, freeing staff to innovate.
Today: Threat-centric,
Risk-based
Proactively identifying and
addressing threats in the context
of enterprise risk.
YEARS
Success hinges on a
360-degree approach
and a relentless
focus on business
impact
Copyright © 2016 Accenture. All rights reserved. 6
Business driven
Threat centric
Digitally protected
Adaptive responses
Agile delivery
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Identity
Incident Response
Remediation
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Our mindset: Continuous innovation, empowered
by technology, our culture and ecosystem
Copyright © 2016 Accenture. All rights reserved. 7
Contextual &
behavioral analytics
Culture of non-stop
innovation
Ecosystem
collaboration
Helps clients quickly
identify active threats to
their businesses.
Accelerates R&D and allows
us to focus on innovating
today while anticipating
tomorrow’s threats and
opportunities.
Leverages a vendor-
independent approach
and the best partnerships
and thinking.
At speed, at scale, on demand
Around the world and around the clock, we speed the pace of your
security journey and help you deliver high performance.
Copyright © 2016 Accenture. All rights reserved.
Trusted advisors. Continuously innovating.
Focused on outcomes.
Copyright © 2016 Accenture. All rights reserved. 9
Comprehensive, holistic solutions
Our holistic capabilities—from security
strategy to operations—and 360-degree
approach that takes into account people,
process and technology, address the full
spectrum of security challenges you face.
A partner that helps you thrive
Combining our deep industry and
technology expertise, we collaborate
closely with you to understand your
business, its values and vulnerabilities so
we can help tightly synch your security
strategy with your business goals.
Culture of continuous innovation
Innovating non stop to stay one step ahead.
Collaborating across our network of R&D
labs, centers of excellence and alliance
ecosystem, to develop breakthrough
solutions built to adapt to and thrive in a
sophisticated threat landscape.
Leaders in next-gen Cyber Defense
Investing in advanced automation,
behavioral analytics and threat-centric
solutions to continuously test, identify and
eliminate exploitable security gaps in real
time and at scale.
Business resilience at speed and scale
Managing security around the world and around
the clock, our global scale, end-to-end
capabilities and proven practices speed the
pace of your security journey and help you
deliver high performance—uninterrupted.
Business outcome focused
Driving measurable business outcomes
for clients with transformation-led solutions
that address increasingly complex needs.
Contacts
Copyright © 2016 Accenture. All rights reserved. 10
Bill Phelps
Security Consulting & Managed
Services
bill.phelps@accenture.com
Andrew Vautier
Security Strategy Center of Excellence
Accenture Chief Information Security Officer
andrew.vautier@accenture.com
Steven Culp
Finance & Risk
steven.r.culp@accenture.com
Ryan LaSalle
Security Consulting & Managed
Services
FusionX
ryan.m.lasalle@accenture.com
Kevin Richards
Security Strategy, North America
k.richards@accenture.com
Adam Burden
Application Security
adam.p.burden@accenture.com
Accenture Strategy Accenture Operations Accenture Financial Services
Accenture Technology

Contenu connexe

Tendances

McKinsey | When Things Get Complex: Complex Systems, Challenges and Where to ...
McKinsey | When Things Get Complex: Complex Systems, Challenges and Where to ...McKinsey | When Things Get Complex: Complex Systems, Challenges and Where to ...
McKinsey | When Things Get Complex: Complex Systems, Challenges and Where to ...Intland Software GmbH
 
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloudaccenture
 
High Performers in IT: Defined by Digital
High Performers in IT: Defined by DigitalHigh Performers in IT: Defined by Digital
High Performers in IT: Defined by Digitalaccenture
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
Accenture-IXO-Industry-Insights-AutoOES.pdf
Accenture-IXO-Industry-Insights-AutoOES.pdfAccenture-IXO-Industry-Insights-AutoOES.pdf
Accenture-IXO-Industry-Insights-AutoOES.pdfNatliaVial
 
DXC Technology Corporate Overview
DXC Technology Corporate OverviewDXC Technology Corporate Overview
DXC Technology Corporate OverviewDXC Technology
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoaccenture
 
The Rise of Forerunners | Accenture
The Rise of Forerunners | AccentureThe Rise of Forerunners | Accenture
The Rise of Forerunners | Accentureaccenture
 
Transforming the employee experience with Teams
Transforming the employee experience with TeamsTransforming the employee experience with Teams
Transforming the employee experience with Teamsaccenture
 
Future Ready Enterprise Systems ASEAN | Accenture
Future Ready Enterprise Systems ASEAN | AccentureFuture Ready Enterprise Systems ASEAN | Accenture
Future Ready Enterprise Systems ASEAN | Accentureaccenture
 
Research and Development Solutions | Accenture
Research and Development Solutions | AccentureResearch and Development Solutions | Accenture
Research and Development Solutions | Accentureaccenture
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operationsaccenture
 
Managed It Services
Managed It ServicesManaged It Services
Managed It ServicesGss America
 
From Visibility to Value
From Visibility to ValueFrom Visibility to Value
From Visibility to Valueaccenture
 
Accenture Tech Vision 2020 - Trend 5
Accenture Tech Vision 2020 - Trend 5Accenture Tech Vision 2020 - Trend 5
Accenture Tech Vision 2020 - Trend 5accenture
 
Accenture BPO brochure
Accenture BPO brochureAccenture BPO brochure
Accenture BPO brochureLawrence K
 
Tech Adoption and Strategy for Innovation & Growth
Tech Adoption and Strategy for Innovation & GrowthTech Adoption and Strategy for Innovation & Growth
Tech Adoption and Strategy for Innovation & Growthaccenture
 
PwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity ManagementPwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity ManagementCA Technologies
 

Tendances (20)

McKinsey | When Things Get Complex: Complex Systems, Challenges and Where to ...
McKinsey | When Things Get Complex: Complex Systems, Challenges and Where to ...McKinsey | When Things Get Complex: Complex Systems, Challenges and Where to ...
McKinsey | When Things Get Complex: Complex Systems, Challenges and Where to ...
 
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
 
High Performers in IT: Defined by Digital
High Performers in IT: Defined by DigitalHigh Performers in IT: Defined by Digital
High Performers in IT: Defined by Digital
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Accenture-IXO-Industry-Insights-AutoOES.pdf
Accenture-IXO-Industry-Insights-AutoOES.pdfAccenture-IXO-Industry-Insights-AutoOES.pdf
Accenture-IXO-Industry-Insights-AutoOES.pdf
 
DXC Technology Corporate Overview
DXC Technology Corporate OverviewDXC Technology Corporate Overview
DXC Technology Corporate Overview
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
The Rise of Forerunners | Accenture
The Rise of Forerunners | AccentureThe Rise of Forerunners | Accenture
The Rise of Forerunners | Accenture
 
Transforming the employee experience with Teams
Transforming the employee experience with TeamsTransforming the employee experience with Teams
Transforming the employee experience with Teams
 
Future Ready Enterprise Systems ASEAN | Accenture
Future Ready Enterprise Systems ASEAN | AccentureFuture Ready Enterprise Systems ASEAN | Accenture
Future Ready Enterprise Systems ASEAN | Accenture
 
Research and Development Solutions | Accenture
Research and Development Solutions | AccentureResearch and Development Solutions | Accenture
Research and Development Solutions | Accenture
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Managed It Services
Managed It ServicesManaged It Services
Managed It Services
 
From Visibility to Value
From Visibility to ValueFrom Visibility to Value
From Visibility to Value
 
MULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTUREMULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTURE
 
Accenture Tech Vision 2020 - Trend 5
Accenture Tech Vision 2020 - Trend 5Accenture Tech Vision 2020 - Trend 5
Accenture Tech Vision 2020 - Trend 5
 
Accenture BPO brochure
Accenture BPO brochureAccenture BPO brochure
Accenture BPO brochure
 
Tech Adoption and Strategy for Innovation & Growth
Tech Adoption and Strategy for Innovation & GrowthTech Adoption and Strategy for Innovation & Growth
Tech Adoption and Strategy for Innovation & Growth
 
Lead Through Disruption Guide PDF
Lead Through Disruption Guide PDFLead Through Disruption Guide PDF
Lead Through Disruption Guide PDF
 
PwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity ManagementPwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity Management
 

En vedette

Developing a Roadmap for Digital Transformation
Developing a Roadmap for Digital TransformationDeveloping a Roadmap for Digital Transformation
Developing a Roadmap for Digital TransformationJohn Sinke
 
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture - Making the Move: Enabling Security in the CloudAlert Logic
 
Accenture strategy-patient-engagement-consumer-loyalty - copy
Accenture strategy-patient-engagement-consumer-loyalty - copyAccenture strategy-patient-engagement-consumer-loyalty - copy
Accenture strategy-patient-engagement-consumer-loyalty - copyJim Fisher
 
Get Your Shift Together: Aligning Everyone to KPIs that Matter
Get Your Shift Together: Aligning Everyone to KPIs that MatterGet Your Shift Together: Aligning Everyone to KPIs that Matter
Get Your Shift Together: Aligning Everyone to KPIs that MatterJulie Holmes
 
KPMG Automatonophobia
KPMG AutomatonophobiaKPMG Automatonophobia
KPMG AutomatonophobiaUiPath
 
IT Automation: Rise of the Process Robots
IT Automation: Rise of the Process RobotsIT Automation: Rise of the Process Robots
IT Automation: Rise of the Process RobotsCapgemini
 
Deloitte - Automate this: The business leader’s guide to robotic and intellig...
Deloitte - Automate this: The business leader’s guide to robotic and intellig...Deloitte - Automate this: The business leader’s guide to robotic and intellig...
Deloitte - Automate this: The business leader’s guide to robotic and intellig...UiPath
 
6σ, lean and RPA
6σ, lean and RPA6σ, lean and RPA
6σ, lean and RPAUiPath
 
Capgemini Consulting RPA: the next revolution of Corporate Functions
Capgemini Consulting RPA: the next revolution of Corporate FunctionsCapgemini Consulting RPA: the next revolution of Corporate Functions
Capgemini Consulting RPA: the next revolution of Corporate FunctionsUiPath
 
Sei pronto a passare al continuous delivery?
Sei pronto a passare al continuous delivery?Sei pronto a passare al continuous delivery?
Sei pronto a passare al continuous delivery?Accenture Italia
 
RPA and Artificial Intelligence Brochure EQ - U2 b
RPA and Artificial Intelligence Brochure EQ - U2 bRPA and Artificial Intelligence Brochure EQ - U2 b
RPA and Artificial Intelligence Brochure EQ - U2 bZoe Gammie
 
Accenture digital transformation - re-imagine from the outside-in
Accenture   digital transformation - re-imagine from the outside-inAccenture   digital transformation - re-imagine from the outside-in
Accenture digital transformation - re-imagine from the outside-inRick Bouter
 
A case study on Accenture
A case study on AccentureA case study on Accenture
A case study on AccentureDeeban Babu
 
What You Need to Know About Robotic Process Automation: How It Works & Real-W...
What You Need to Know About Robotic Process Automation: How It Works & Real-W...What You Need to Know About Robotic Process Automation: How It Works & Real-W...
What You Need to Know About Robotic Process Automation: How It Works & Real-W...Captricity
 
An Introduction to RPA
An Introduction to RPAAn Introduction to RPA
An Introduction to RPASteve Burke
 
Unlocking the True Benefit of Software Defined Networking
Unlocking the True Benefit of Software Defined NetworkingUnlocking the True Benefit of Software Defined Networking
Unlocking the True Benefit of Software Defined Networkingaccenture
 
What is Robotic Process Automation? (RPA)
What is Robotic Process Automation? (RPA)What is Robotic Process Automation? (RPA)
What is Robotic Process Automation? (RPA)Newton Day Uploads
 

En vedette (20)

Developing a Roadmap for Digital Transformation
Developing a Roadmap for Digital TransformationDeveloping a Roadmap for Digital Transformation
Developing a Roadmap for Digital Transformation
 
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
 
Digital Business - Accenture
Digital Business - AccentureDigital Business - Accenture
Digital Business - Accenture
 
Accenture strategy-patient-engagement-consumer-loyalty - copy
Accenture strategy-patient-engagement-consumer-loyalty - copyAccenture strategy-patient-engagement-consumer-loyalty - copy
Accenture strategy-patient-engagement-consumer-loyalty - copy
 
Accenture technology vision 2012 final
Accenture technology vision 2012 finalAccenture technology vision 2012 final
Accenture technology vision 2012 final
 
Get Your Shift Together: Aligning Everyone to KPIs that Matter
Get Your Shift Together: Aligning Everyone to KPIs that MatterGet Your Shift Together: Aligning Everyone to KPIs that Matter
Get Your Shift Together: Aligning Everyone to KPIs that Matter
 
Enterprise Security & SSO
Enterprise Security & SSOEnterprise Security & SSO
Enterprise Security & SSO
 
KPMG Automatonophobia
KPMG AutomatonophobiaKPMG Automatonophobia
KPMG Automatonophobia
 
IT Automation: Rise of the Process Robots
IT Automation: Rise of the Process RobotsIT Automation: Rise of the Process Robots
IT Automation: Rise of the Process Robots
 
Deloitte - Automate this: The business leader’s guide to robotic and intellig...
Deloitte - Automate this: The business leader’s guide to robotic and intellig...Deloitte - Automate this: The business leader’s guide to robotic and intellig...
Deloitte - Automate this: The business leader’s guide to robotic and intellig...
 
6σ, lean and RPA
6σ, lean and RPA6σ, lean and RPA
6σ, lean and RPA
 
Capgemini Consulting RPA: the next revolution of Corporate Functions
Capgemini Consulting RPA: the next revolution of Corporate FunctionsCapgemini Consulting RPA: the next revolution of Corporate Functions
Capgemini Consulting RPA: the next revolution of Corporate Functions
 
Sei pronto a passare al continuous delivery?
Sei pronto a passare al continuous delivery?Sei pronto a passare al continuous delivery?
Sei pronto a passare al continuous delivery?
 
RPA and Artificial Intelligence Brochure EQ - U2 b
RPA and Artificial Intelligence Brochure EQ - U2 bRPA and Artificial Intelligence Brochure EQ - U2 b
RPA and Artificial Intelligence Brochure EQ - U2 b
 
Accenture digital transformation - re-imagine from the outside-in
Accenture   digital transformation - re-imagine from the outside-inAccenture   digital transformation - re-imagine from the outside-in
Accenture digital transformation - re-imagine from the outside-in
 
A case study on Accenture
A case study on AccentureA case study on Accenture
A case study on Accenture
 
What You Need to Know About Robotic Process Automation: How It Works & Real-W...
What You Need to Know About Robotic Process Automation: How It Works & Real-W...What You Need to Know About Robotic Process Automation: How It Works & Real-W...
What You Need to Know About Robotic Process Automation: How It Works & Real-W...
 
An Introduction to RPA
An Introduction to RPAAn Introduction to RPA
An Introduction to RPA
 
Unlocking the True Benefit of Software Defined Networking
Unlocking the True Benefit of Software Defined NetworkingUnlocking the True Benefit of Software Defined Networking
Unlocking the True Benefit of Software Defined Networking
 
What is Robotic Process Automation? (RPA)
What is Robotic Process Automation? (RPA)What is Robotic Process Automation? (RPA)
What is Robotic Process Automation? (RPA)
 

Similaire à Defending Digital Business

For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...Accenture Technology
 
Enable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceEnable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceNeetaSahay1
 
FINTECH: Industries we Serve
FINTECH: Industries we ServeFINTECH: Industries we Serve
FINTECH: Industries we ServeThe TNS Group
 
Microsoft Security adoptionguide for the enterprise
Microsoft Security adoptionguide for the enterpriseMicrosoft Security adoptionguide for the enterprise
Microsoft Security adoptionguide for the enterprisessuserd58af7
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxAhad
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfAhad
 
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfCIO Look Magazine
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainDavid J Rosenthal
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report SummaryAccenture Technology
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Matthew Rosenquist
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityNiamh Hughes
 
Cyber Security Audit.pdf
Cyber Security Audit.pdfCyber Security Audit.pdf
Cyber Security Audit.pdfVograce
 
India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021InsightsSuccess3
 
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfCrucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfseoteameits
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilienceSymantec
 

Similaire à Defending Digital Business (20)

For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Enable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplaceEnable your employees to work securely from anywhere with digital workplace
Enable your employees to work securely from anywhere with digital workplace
 
FINTECH: Industries we Serve
FINTECH: Industries we ServeFINTECH: Industries we Serve
FINTECH: Industries we Serve
 
The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019
 
The 10 most trusted cyber threat solution providers
The 10 most trusted cyber threat solution providersThe 10 most trusted cyber threat solution providers
The 10 most trusted cyber threat solution providers
 
Microsoft Security adoptionguide for the enterprise
Microsoft Security adoptionguide for the enterpriseMicrosoft Security adoptionguide for the enterprise
Microsoft Security adoptionguide for the enterprise
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptx
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
 
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
16231
1623116231
16231
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber security
 
Cyber Security Audit.pdf
Cyber Security Audit.pdfCyber Security Audit.pdf
Cyber Security Audit.pdf
 
India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021
 
Cyber threat forecast 2018..
Cyber threat forecast 2018..Cyber threat forecast 2018..
Cyber threat forecast 2018..
 
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfCrucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 

Plus de Accenture Technology

Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Technology
 
Helping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayHelping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayAccenture Technology
 
Accenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Technology
 
Helping you get back to the workplace confidently
Helping you get back to the workplace confidentlyHelping you get back to the workplace confidently
Helping you get back to the workplace confidentlyAccenture Technology
 
Driving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldDriving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldAccenture Technology
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology
 
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology
 
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology
 
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology
 
Elevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayElevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayAccenture Technology
 
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAutomating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAccenture Technology
 
Technology Vision 2019 for Workday
Technology Vision 2019 for WorkdayTechnology Vision 2019 for Workday
Technology Vision 2019 for WorkdayAccenture Technology
 
Accenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology
 

Plus de Accenture Technology (20)

Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020
 
Helping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayHelping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + Workday
 
Accenture Labs Innovation Stories
Accenture Labs Innovation StoriesAccenture Labs Innovation Stories
Accenture Labs Innovation Stories
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
 
Accenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP Solutions
 
Highlights on the five key trends
Highlights on the five key trendsHighlights on the five key trends
Highlights on the five key trends
 
Helping you get back to the workplace confidently
Helping you get back to the workplace confidentlyHelping you get back to the workplace confidently
Helping you get back to the workplace confidently
 
Driving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldDriving Workday transformation in a virtual world
Driving Workday transformation in a virtual world
 
Accenture + Red Hat
Accenture + Red HatAccenture + Red Hat
Accenture + Red Hat
 
Accenture and Mercedes Case Study
Accenture and Mercedes Case StudyAccenture and Mercedes Case Study
Accenture and Mercedes Case Study
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: Infographic
 
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: Overview
 
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and Me
 
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNA
 
Elevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayElevating the Workforce Experience with Workday
Elevating the Workforce Experience with Workday
 
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAutomating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
 
Technology Vision for SAP 2019
Technology Vision for SAP 2019Technology Vision for SAP 2019
Technology Vision for SAP 2019
 
Technology Vision 2019 for Workday
Technology Vision 2019 for WorkdayTechnology Vision 2019 for Workday
Technology Vision 2019 for Workday
 
Accenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for Pega
 

Dernier

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Dernier (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Defending Digital Business

  • 1. Defending and empowering the resilient digital business Accenture Security Services
  • 2. Sophisticated, well-funded cybercriminals are outpacing digital businesses Copyright © 2016 Accenture. All rights reserved. 2 *Source: Ponemon Institute Study 2015 **Source: “Internet Security Threat Report,” Symantec, April 2015, Volume 20. The impact of security threats is increasingly devastating. With the explosion of the IoT, cloud and mobile, digital technology is now pervasive. The opportunities for attack are surging, opening up new areas of vulnerability for security, privacy and data integrity. 5 out of 6 organizations with 2,500+ employees attacked** 317 million new pieces of malware created in 2014** 23% rise in data breaches in 2014*, and a 50% spike in successful attacks since 2012** $7.7 million damage per company in 2015*
  • 3. Business leaders know it’s not enough to focus purely on prevention of security breaches. To truly defend and empower your organization, you also need to detect, intercept and remediate even the most unthinkable threats. Boardroom priority: “How resilient are we?” Copyright © 2016 Accenture. All rights reserved. 3 “The impact of security risks is understated because a lot goes unreported. The costs of prevention and remediation are massive and the brands of organizations and the reputations of their top leaders are put at stake.” Omar Abbosh, Chief Strategy Officer, Accenture
  • 4. Build resilience, outpace attackers and turn to what matters most: innovation and business growth … uninterrupted. A persistently vigilant business is a resilient business Copyright © 2016 Accenture. All rights reserved. 4 Defend the Business from Hostile Adversaries Empower Business Growth & Secure Operations Confidently address growing boardroom and C-suite security priorities (shareholder value, revenue and compliance). Interlock security strategy with business strategy and spend appropriately on what’s most important. Gain security-situational awareness across expanding business boundaries and develop rapid-response capabilities to minimize losses through next-generation technology such as security automation and relentless improvement. Initiate organizational change and transform security to be digital friendly, taking into account user centricity, Internet scale and digital technologies (IoT, big data etc.). Continuously test environmental robustness by “training like you fight.” Manage technology and process security risks outside of direct organizational control while leveraging security “As-a- Service” for greater agility.
  • 5. Go beyond risk-based tactics to sophisticated, intelligent digital strategies that are embedded into the fabric of the enterprise and engineered for the future. Replace vulnerability with capability Copyright © 2016 Accenture. All rights reserved. 5 Market Maker Reactionary and Ad Hoc Embedded and Optimized Threat-centric, Risk-based Compliance- based MATURITYLEVEL 2015–16 2013–14 2017 Pre-2010 2018 & Beyond 1.0 2.0 3.0 4.0 2018 and Beyond: Market Maker Achieving resilience through innovative security programs that have a cross-industry impact. 2017: Embedded and Optimized Consistently embedding security and optimizing the business for agility, freeing staff to innovate. Today: Threat-centric, Risk-based Proactively identifying and addressing threats in the context of enterprise risk. YEARS
  • 6. Success hinges on a 360-degree approach and a relentless focus on business impact Copyright © 2016 Accenture. All rights reserved. 6 Business driven Threat centric Digitally protected Adaptive responses Agile delivery Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Identity Incident Response Remediation Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics
  • 7. Our mindset: Continuous innovation, empowered by technology, our culture and ecosystem Copyright © 2016 Accenture. All rights reserved. 7 Contextual & behavioral analytics Culture of non-stop innovation Ecosystem collaboration Helps clients quickly identify active threats to their businesses. Accelerates R&D and allows us to focus on innovating today while anticipating tomorrow’s threats and opportunities. Leverages a vendor- independent approach and the best partnerships and thinking.
  • 8. At speed, at scale, on demand Around the world and around the clock, we speed the pace of your security journey and help you deliver high performance. Copyright © 2016 Accenture. All rights reserved.
  • 9. Trusted advisors. Continuously innovating. Focused on outcomes. Copyright © 2016 Accenture. All rights reserved. 9 Comprehensive, holistic solutions Our holistic capabilities—from security strategy to operations—and 360-degree approach that takes into account people, process and technology, address the full spectrum of security challenges you face. A partner that helps you thrive Combining our deep industry and technology expertise, we collaborate closely with you to understand your business, its values and vulnerabilities so we can help tightly synch your security strategy with your business goals. Culture of continuous innovation Innovating non stop to stay one step ahead. Collaborating across our network of R&D labs, centers of excellence and alliance ecosystem, to develop breakthrough solutions built to adapt to and thrive in a sophisticated threat landscape. Leaders in next-gen Cyber Defense Investing in advanced automation, behavioral analytics and threat-centric solutions to continuously test, identify and eliminate exploitable security gaps in real time and at scale. Business resilience at speed and scale Managing security around the world and around the clock, our global scale, end-to-end capabilities and proven practices speed the pace of your security journey and help you deliver high performance—uninterrupted. Business outcome focused Driving measurable business outcomes for clients with transformation-led solutions that address increasingly complex needs.
  • 10. Contacts Copyright © 2016 Accenture. All rights reserved. 10 Bill Phelps Security Consulting & Managed Services bill.phelps@accenture.com Andrew Vautier Security Strategy Center of Excellence Accenture Chief Information Security Officer andrew.vautier@accenture.com Steven Culp Finance & Risk steven.r.culp@accenture.com Ryan LaSalle Security Consulting & Managed Services FusionX ryan.m.lasalle@accenture.com Kevin Richards Security Strategy, North America k.richards@accenture.com Adam Burden Application Security adam.p.burden@accenture.com Accenture Strategy Accenture Operations Accenture Financial Services Accenture Technology