SlideShare une entreprise Scribd logo
1  sur  12
Continuous Cyber Attacks:
Achieving Operational
Excellence for the New Normal
Copyright © 2016 Accenture. All rights reserved.
Strategy and technology alone do not
guarantee an effective cyber defense
The best strategy, supported by the latest technology,
can fail if not executed properly.
Risks to effective cyber defense include:
•Increased exposure to attack
(cloud, Internet of Things, connected devices)
•High turnover within security team
•Lack of visibility to critical assets
•Frequent IT changes not communicated
•Length of time taken to detect breaches
Copyright © 2016 Accenture. All rights reserved.
Shortage of critical technologies and skills
hamper organizations’ security approach
• Operations lack rigor and consistency
• Stakeholders remain unaware of their vulnerability
• Employees don’t follow standard security practices
• Security work generates “noise” that masks valid threats
• Out-dated tools and processes can limit effectiveness
of the security team
Copyright © 2016 Accenture. All rights reserved.
Drive improved security operations
from actionable threat intelligence
Steps that can create security operational excellence:
1.Assess effectiveness of current security processes
2.Invest in attracting and retaining skilled security talent
3.Automate intelligently to leverage scarce resources
4.Understand how threat data pertains to the business
5.Identify what isn’t known
6.Create a plan to address knowledge gaps
7.Find an effective sparring partner to improve security capabilities
Copyright © 2016 Accenture. All rights reserved.
Cyber defense strategies and supporting technology
will only work if executed properly
Leading organizations
focus on creating a
highly efficient
operating model
that balances
security operations,
new technology
implementation,
testing of security
posture and feedback
to update defenses.
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Security
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
Copyright © 2016 Accenture. All rights reserved.
Achieving operational excellence in cyber defense
requires a comprehensive approach
Our model helps
organizations prepare
and protect for threats,
defend and detect
breaches, and then
respond to and recover
from incidents.
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Security
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
Copyright © 2016 Accenture. All rights reserved.
Start with a big-picture strategy of how security
supports business performance
• Forward-thinking
capabilities to help
scale activities
• IT strategy that provides
greater understanding
of assets, data sets,
technical and
business functions
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Security
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
Copyright © 2016 Accenture. All rights reserved.
Forward-thinking capabilities help scale activities effectively
• High-powered analytics
to predict and detect
incidents, and identify
behavior changes that
indicate security risks
• Emphasis on
visualization to
identify anomalies
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Security
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
Copyright © 2016 Accenture. All rights reserved.
Concentrate on intelligent incident response
• Platforms that guide
operators in hunting
for threats
• Train the same way
the company fights
attackers, to prepare
for real-world
adversaries
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Security
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
Powerpoint Title
The goal
Create a highly efficient operating model that
balances security operations, new technology
implementation, testing of security posture and
feedback to update defenses.
Powerpoint Title
Thank You
Please visit Accenture.com/CyberDefensePlan
for additional information.
#CyberDefense
Follow us on Twitter @AccentureSecure
About Accenture
Accenture is a leading global professional services company, providing a broad range of
services and solutions in strategy, consulting, digital, technology and operations. Combining
unmatched experience and specialized skills across more than 40 industries and all business
functions—underpinned by the world’s largest delivery network—Accenture works at the
intersection of business and technology to help clients improve their performance and create
sustainable value for their stakeholders. With approximately 373,000 people serving clients in
more than 120 countries, Accenture drives innovation to improve the way the world works and
lives. Visit us at www.accenture.com.
Accenture, its logo, and High performance. Delivered. are trademarks of Accenture.
Copyright © 2016 Accenture
All rights reserved.

Contenu connexe

Tendances

The Future of Applications: Three Strategies for the High-velocity, Software-...
The Future of Applications: Three Strategies for the High-velocity, Software-...The Future of Applications: Three Strategies for the High-velocity, Software-...
The Future of Applications: Three Strategies for the High-velocity, Software-...Accenture Technology
 
Accenture Enkitec Group: Oracle database and Engineered Systems
Accenture Enkitec Group: Oracle database and Engineered SystemsAccenture Enkitec Group: Oracle database and Engineered Systems
Accenture Enkitec Group: Oracle database and Engineered SystemsAccenture Operations
 
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...Accenture Technology
 
Staking a claim in the Platform Economy with SAP
Staking a claim in the Platform Economy with SAPStaking a claim in the Platform Economy with SAP
Staking a claim in the Platform Economy with SAPAccenture Technology
 
Assault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities GridAssault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities Gridaccenture
 
Chemicals: Smarter Investments, Outstanding Results
Chemicals: Smarter Investments, Outstanding ResultsChemicals: Smarter Investments, Outstanding Results
Chemicals: Smarter Investments, Outstanding Resultsaccenture
 
Making the most of Guidewire to transform your insurance organization
Making the most of Guidewire to transform your insurance organizationMaking the most of Guidewire to transform your insurance organization
Making the most of Guidewire to transform your insurance organizationAccenture Insurance
 
Intelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons LearnedIntelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons LearnedAccenture Technology
 
The Digitization of Human Resources
The Digitization of Human ResourcesThe Digitization of Human Resources
The Digitization of Human ResourcesAccenture Technology
 
Blockchain for Business Operations
Blockchain for Business OperationsBlockchain for Business Operations
Blockchain for Business OperationsAccenture Operations
 
Workforce of the Future
Workforce of the FutureWorkforce of the Future
Workforce of the Futureaccenture
 
Being digital: Fast-forward to the right digital strategy
Being digital: Fast-forward to the right digital strategyBeing digital: Fast-forward to the right digital strategy
Being digital: Fast-forward to the right digital strategyaccenture
 
The Digital Emperor Has No Clothes
The Digital Emperor Has No ClothesThe Digital Emperor Has No Clothes
The Digital Emperor Has No Clothesaccenture
 
Navigating the Crude Cycle: 10 Strategic Actions for National Oil Companies
Navigating the Crude Cycle: 10 Strategic Actions for National Oil CompaniesNavigating the Crude Cycle: 10 Strategic Actions for National Oil Companies
Navigating the Crude Cycle: 10 Strategic Actions for National Oil Companiesaccenture
 
Consumer Oriented Service Delivery Models - Success Connect
Consumer Oriented Service Delivery Models - Success ConnectConsumer Oriented Service Delivery Models - Success Connect
Consumer Oriented Service Delivery Models - Success ConnectAccenture Technology
 
Accenture Learning Academy
Accenture Learning AcademyAccenture Learning Academy
Accenture Learning Academyaccenture
 
100 day plan - Technology Vision Australian Perspective
100 day plan - Technology Vision Australian Perspective100 day plan - Technology Vision Australian Perspective
100 day plan - Technology Vision Australian Perspectiveaccenture
 
Corrosion Management
Corrosion ManagementCorrosion Management
Corrosion Managementaccenture
 
Digital Shoring for Networked Innovation
Digital Shoring for Networked InnovationDigital Shoring for Networked Innovation
Digital Shoring for Networked Innovationaccenture
 

Tendances (20)

The Future of Applications: Three Strategies for the High-velocity, Software-...
The Future of Applications: Three Strategies for the High-velocity, Software-...The Future of Applications: Three Strategies for the High-velocity, Software-...
The Future of Applications: Three Strategies for the High-velocity, Software-...
 
Accenture Enkitec Group: Oracle database and Engineered Systems
Accenture Enkitec Group: Oracle database and Engineered SystemsAccenture Enkitec Group: Oracle database and Engineered Systems
Accenture Enkitec Group: Oracle database and Engineered Systems
 
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
 
Cloud in the Boardroom
Cloud in the BoardroomCloud in the Boardroom
Cloud in the Boardroom
 
Staking a claim in the Platform Economy with SAP
Staking a claim in the Platform Economy with SAPStaking a claim in the Platform Economy with SAP
Staking a claim in the Platform Economy with SAP
 
Assault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities GridAssault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities Grid
 
Chemicals: Smarter Investments, Outstanding Results
Chemicals: Smarter Investments, Outstanding ResultsChemicals: Smarter Investments, Outstanding Results
Chemicals: Smarter Investments, Outstanding Results
 
Making the most of Guidewire to transform your insurance organization
Making the most of Guidewire to transform your insurance organizationMaking the most of Guidewire to transform your insurance organization
Making the most of Guidewire to transform your insurance organization
 
Intelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons LearnedIntelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons Learned
 
The Digitization of Human Resources
The Digitization of Human ResourcesThe Digitization of Human Resources
The Digitization of Human Resources
 
Blockchain for Business Operations
Blockchain for Business OperationsBlockchain for Business Operations
Blockchain for Business Operations
 
Workforce of the Future
Workforce of the FutureWorkforce of the Future
Workforce of the Future
 
Being digital: Fast-forward to the right digital strategy
Being digital: Fast-forward to the right digital strategyBeing digital: Fast-forward to the right digital strategy
Being digital: Fast-forward to the right digital strategy
 
The Digital Emperor Has No Clothes
The Digital Emperor Has No ClothesThe Digital Emperor Has No Clothes
The Digital Emperor Has No Clothes
 
Navigating the Crude Cycle: 10 Strategic Actions for National Oil Companies
Navigating the Crude Cycle: 10 Strategic Actions for National Oil CompaniesNavigating the Crude Cycle: 10 Strategic Actions for National Oil Companies
Navigating the Crude Cycle: 10 Strategic Actions for National Oil Companies
 
Consumer Oriented Service Delivery Models - Success Connect
Consumer Oriented Service Delivery Models - Success ConnectConsumer Oriented Service Delivery Models - Success Connect
Consumer Oriented Service Delivery Models - Success Connect
 
Accenture Learning Academy
Accenture Learning AcademyAccenture Learning Academy
Accenture Learning Academy
 
100 day plan - Technology Vision Australian Perspective
100 day plan - Technology Vision Australian Perspective100 day plan - Technology Vision Australian Perspective
100 day plan - Technology Vision Australian Perspective
 
Corrosion Management
Corrosion ManagementCorrosion Management
Corrosion Management
 
Digital Shoring for Networked Innovation
Digital Shoring for Networked InnovationDigital Shoring for Networked Innovation
Digital Shoring for Networked Innovation
 

En vedette

Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalAccenture Technology
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Accenture Operations
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Accenture Technology
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital ageAccenture Technology
 
The Coming of Age for Artificial Intelligence
The Coming of Age for Artificial Intelligence The Coming of Age for Artificial Intelligence
The Coming of Age for Artificial Intelligence Accenture Technology
 
Guarding and Growing Personal Data Value
Guarding and Growing Personal Data ValueGuarding and Growing Personal Data Value
Guarding and Growing Personal Data Valueaccenture
 
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloudaccenture
 
Increasing Agility to Fuel Growth in the Communications Industry
Increasing Agility to Fuel Growth in the Communications IndustryIncreasing Agility to Fuel Growth in the Communications Industry
Increasing Agility to Fuel Growth in the Communications Industryaccenture
 
Driving Growth and Competitiveness: Can The Power of Cloud Lift M&A Value Int...
Driving Growth and Competitiveness: Can The Power of Cloud Lift M&A Value Int...Driving Growth and Competitiveness: Can The Power of Cloud Lift M&A Value Int...
Driving Growth and Competitiveness: Can The Power of Cloud Lift M&A Value Int...accenture
 
Banking on Digital: Generating Value from Digital Investments
Banking on Digital: Generating Value from Digital InvestmentsBanking on Digital: Generating Value from Digital Investments
Banking on Digital: Generating Value from Digital Investmentsaccenture
 
New Rules for Culture Change – Accenture Strategy
New Rules for Culture Change – Accenture StrategyNew Rules for Culture Change – Accenture Strategy
New Rules for Culture Change – Accenture Strategyaccenture
 
Accenture Cloud-based Lab Reviews Case Study
Accenture Cloud-based Lab Reviews Case StudyAccenture Cloud-based Lab Reviews Case Study
Accenture Cloud-based Lab Reviews Case StudyAccenture Operations
 
The Promise of Artificial Intelligence: Redefining management in the workforc...
The Promise of Artificial Intelligence: Redefining management in the workforc...The Promise of Artificial Intelligence: Redefining management in the workforc...
The Promise of Artificial Intelligence: Redefining management in the workforc...accenture
 
Liquid Workforce - Tech Vision 2016 Trend 2
Liquid Workforce - Tech Vision 2016 Trend 2Liquid Workforce - Tech Vision 2016 Trend 2
Liquid Workforce - Tech Vision 2016 Trend 2Accenture Technology
 
A New Blueprint for HR
A New Blueprint for HRA New Blueprint for HR
A New Blueprint for HRaccenture
 

En vedette (18)

Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Technology Vision 2017 - Overview
Technology Vision 2017 - OverviewTechnology Vision 2017 - Overview
Technology Vision 2017 - Overview
 
AI and the Future of Growth
AI and the Future of GrowthAI and the Future of Growth
AI and the Future of Growth
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital age
 
The Coming of Age for Artificial Intelligence
The Coming of Age for Artificial Intelligence The Coming of Age for Artificial Intelligence
The Coming of Age for Artificial Intelligence
 
Guarding and Growing Personal Data Value
Guarding and Growing Personal Data ValueGuarding and Growing Personal Data Value
Guarding and Growing Personal Data Value
 
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
 
Increasing Agility to Fuel Growth in the Communications Industry
Increasing Agility to Fuel Growth in the Communications IndustryIncreasing Agility to Fuel Growth in the Communications Industry
Increasing Agility to Fuel Growth in the Communications Industry
 
Driving Growth and Competitiveness: Can The Power of Cloud Lift M&A Value Int...
Driving Growth and Competitiveness: Can The Power of Cloud Lift M&A Value Int...Driving Growth and Competitiveness: Can The Power of Cloud Lift M&A Value Int...
Driving Growth and Competitiveness: Can The Power of Cloud Lift M&A Value Int...
 
Banking on Digital: Generating Value from Digital Investments
Banking on Digital: Generating Value from Digital InvestmentsBanking on Digital: Generating Value from Digital Investments
Banking on Digital: Generating Value from Digital Investments
 
New Rules for Culture Change – Accenture Strategy
New Rules for Culture Change – Accenture StrategyNew Rules for Culture Change – Accenture Strategy
New Rules for Culture Change – Accenture Strategy
 
Accenture Cloud-based Lab Reviews Case Study
Accenture Cloud-based Lab Reviews Case StudyAccenture Cloud-based Lab Reviews Case Study
Accenture Cloud-based Lab Reviews Case Study
 
The Promise of Artificial Intelligence: Redefining management in the workforc...
The Promise of Artificial Intelligence: Redefining management in the workforc...The Promise of Artificial Intelligence: Redefining management in the workforc...
The Promise of Artificial Intelligence: Redefining management in the workforc...
 
Liquid Workforce - Tech Vision 2016 Trend 2
Liquid Workforce - Tech Vision 2016 Trend 2Liquid Workforce - Tech Vision 2016 Trend 2
Liquid Workforce - Tech Vision 2016 Trend 2
 
A New Blueprint for HR
A New Blueprint for HRA New Blueprint for HR
A New Blueprint for HR
 

Similaire à For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for the New Normal

For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...Accenture Technology
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Technology
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.accenture
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.accenture
 
Expert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxExpert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxkathyzink87
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016Melissa Gilpin
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021InsightsSuccess3
 
Accuvant Intro
Accuvant IntroAccuvant Intro
Accuvant Introdchadwick
 
FINTECH: Industries we Serve
FINTECH: Industries we ServeFINTECH: Industries we Serve
FINTECH: Industries we ServeThe TNS Group
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakMarc St-Pierre
 
Gartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhangGartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhangColloqueRISQ
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterEMC
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!Heather Salmons Newswanger
 
AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED Srinivasan M.S
 

Similaire à For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for the New Normal (20)

For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
 
Expert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxExpert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptx
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Cybersecurity.pdf
Cybersecurity.pdfCybersecurity.pdf
Cybersecurity.pdf
 
The 10 most trusted cyber threat solution providers
The 10 most trusted cyber threat solution providersThe 10 most trusted cyber threat solution providers
The 10 most trusted cyber threat solution providers
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021
 
Accuvant Intro
Accuvant IntroAccuvant Intro
Accuvant Intro
 
FINTECH: Industries we Serve
FINTECH: Industries we ServeFINTECH: Industries we Serve
FINTECH: Industries we Serve
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
 
Decode_Portfolio2016
Decode_Portfolio2016Decode_Portfolio2016
Decode_Portfolio2016
 
Gartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhangGartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhang
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations Center
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!
 
AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED
 

Plus de Accenture Technology

Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Technology
 
Helping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayHelping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayAccenture Technology
 
Accenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Technology
 
Helping you get back to the workplace confidently
Helping you get back to the workplace confidentlyHelping you get back to the workplace confidently
Helping you get back to the workplace confidentlyAccenture Technology
 
Driving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldDriving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldAccenture Technology
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology
 
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology
 
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology
 
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology
 
Elevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayElevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayAccenture Technology
 
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAutomating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAccenture Technology
 
Technology Vision 2019 for Workday
Technology Vision 2019 for WorkdayTechnology Vision 2019 for Workday
Technology Vision 2019 for WorkdayAccenture Technology
 
Accenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology
 

Plus de Accenture Technology (20)

Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020
 
Helping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayHelping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + Workday
 
Accenture Labs Innovation Stories
Accenture Labs Innovation StoriesAccenture Labs Innovation Stories
Accenture Labs Innovation Stories
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
 
Accenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP Solutions
 
Highlights on the five key trends
Highlights on the five key trendsHighlights on the five key trends
Highlights on the five key trends
 
Helping you get back to the workplace confidently
Helping you get back to the workplace confidentlyHelping you get back to the workplace confidently
Helping you get back to the workplace confidently
 
Driving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldDriving Workday transformation in a virtual world
Driving Workday transformation in a virtual world
 
Accenture + Red Hat
Accenture + Red HatAccenture + Red Hat
Accenture + Red Hat
 
Accenture and Mercedes Case Study
Accenture and Mercedes Case StudyAccenture and Mercedes Case Study
Accenture and Mercedes Case Study
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: Infographic
 
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: Overview
 
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and Me
 
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNA
 
Elevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayElevating the Workforce Experience with Workday
Elevating the Workforce Experience with Workday
 
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAutomating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
 
Technology Vision for SAP 2019
Technology Vision for SAP 2019Technology Vision for SAP 2019
Technology Vision for SAP 2019
 
Technology Vision 2019 for Workday
Technology Vision 2019 for WorkdayTechnology Vision 2019 for Workday
Technology Vision 2019 for Workday
 
Accenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for Pega
 

Dernier

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Dernier (20)

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for the New Normal

  • 1. Continuous Cyber Attacks: Achieving Operational Excellence for the New Normal
  • 2. Copyright © 2016 Accenture. All rights reserved. Strategy and technology alone do not guarantee an effective cyber defense The best strategy, supported by the latest technology, can fail if not executed properly. Risks to effective cyber defense include: •Increased exposure to attack (cloud, Internet of Things, connected devices) •High turnover within security team •Lack of visibility to critical assets •Frequent IT changes not communicated •Length of time taken to detect breaches
  • 3. Copyright © 2016 Accenture. All rights reserved. Shortage of critical technologies and skills hamper organizations’ security approach • Operations lack rigor and consistency • Stakeholders remain unaware of their vulnerability • Employees don’t follow standard security practices • Security work generates “noise” that masks valid threats • Out-dated tools and processes can limit effectiveness of the security team
  • 4. Copyright © 2016 Accenture. All rights reserved. Drive improved security operations from actionable threat intelligence Steps that can create security operational excellence: 1.Assess effectiveness of current security processes 2.Invest in attracting and retaining skilled security talent 3.Automate intelligently to leverage scarce resources 4.Understand how threat data pertains to the business 5.Identify what isn’t known 6.Create a plan to address knowledge gaps 7.Find an effective sparring partner to improve security capabilities
  • 5. Copyright © 2016 Accenture. All rights reserved. Cyber defense strategies and supporting technology will only work if executed properly Leading organizations focus on creating a highly efficient operating model that balances security operations, new technology implementation, testing of security posture and feedback to update defenses. Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation
  • 6. Copyright © 2016 Accenture. All rights reserved. Achieving operational excellence in cyber defense requires a comprehensive approach Our model helps organizations prepare and protect for threats, defend and detect breaches, and then respond to and recover from incidents. Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation
  • 7. Copyright © 2016 Accenture. All rights reserved. Start with a big-picture strategy of how security supports business performance • Forward-thinking capabilities to help scale activities • IT strategy that provides greater understanding of assets, data sets, technical and business functions Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation
  • 8. Copyright © 2016 Accenture. All rights reserved. Forward-thinking capabilities help scale activities effectively • High-powered analytics to predict and detect incidents, and identify behavior changes that indicate security risks • Emphasis on visualization to identify anomalies Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation
  • 9. Copyright © 2016 Accenture. All rights reserved. Concentrate on intelligent incident response • Platforms that guide operators in hunting for threats • Train the same way the company fights attackers, to prepare for real-world adversaries Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation
  • 10. Powerpoint Title The goal Create a highly efficient operating model that balances security operations, new technology implementation, testing of security posture and feedback to update defenses.
  • 11. Powerpoint Title Thank You Please visit Accenture.com/CyberDefensePlan for additional information. #CyberDefense Follow us on Twitter @AccentureSecure
  • 12. About Accenture Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions—underpinned by the world’s largest delivery network—Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With approximately 373,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com. Accenture, its logo, and High performance. Delivered. are trademarks of Accenture. Copyright © 2016 Accenture All rights reserved.