SlideShare une entreprise Scribd logo
1  sur  15
Copyright © 2015 Accenture All rights reserved.
Continuous Cyber Attacks:
Engaging Business Leaders for the New Normal
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
Organizations face a cybercrime
wave that is increasing in
intensity and sophistication
Cyber defenses are threatened from well-funded,
highly motivated digital adversaries
Sophisticated hackers are using state-of-the-art
techniques
It’s never been easier or more lucrative for
adversaries to cash in on their efforts
Cyber-thieves operate across borders and rarely
face prosecution
2
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
Business leaders must establish
a holistic, end-to-end security
strategy to protect the organization
• Regulatory compliance is not enough
• Purchasing the latest security products can drain the budget
without improving overall defense
3
A solid cyber defense approach requires a shift in
approach: the organization’s business side must
partner with the security organization
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
The following 3 approaches
can help an organization
minimize cyber-crime risk
Make the business a better security
“customer”
Strengthen the partnership between
the business and security
Continuously exercise organizational
defenses
4
1
2
3
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
1Make the business a better
security “customer”
• A solid cyber defense requires
companies to interlock an
organization’s business stakeholders,
its risk management office and the
security team
• Develop a true relationship that asks
all employees to own responsibility
for security
5
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
When the business side fails to
cooperate with the security team,
multiple challenges emerge
• Security lacks sufficient top
management access
• The front lines remain unengaged in
security issues
• Ambiguity regarding who “owns” the
systems under attack
6
1
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
Strengthening the relationship
between the business and security
transforms the organization’s
security posture
Leaders take
responsibility to
keep security on the
agenda
Recognize the
complexity
of the challenge
7
Work together to identify
the organization’s
critical data
Evolve the
organizational culture
to attract and retain top-
tier security talent
2
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
Strengthen the partnership
between the business and
security
• Put security on the agenda
• Focus on cyber defense innovation
• Embrace and implement new ideas
• Develop security strategies approved by
leaders
• Make information security a business priority
• Inform employees on business security
requirements
8
2
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
Strengthen the partnership
between the business and
security
Recognize the complexity of the
challenge
• Determine the best way to manage cyber
losses
• Develop a complete scope of potential
damage areas, including data, business
operations, company brand, consumer
confidence
• Recognize that future costs could rise
• Prioritize the protection of critical information
9
2
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
Strengthen the partnership
between the business and
security
Work together to identify the
organization’s critical data
• Analyze the organization as a hacker
would to identify vulnerabilities
• Focus efforts on the truly critical assets
to reduce risk
• Delete or encrypt online information
• Reduce data volume where possible
10
2
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
Strengthen the partnership
between the business and
security
Seek top-tier security talent
• Think proactively and creatively to attract and
retain scarce, expert security resources
• Build the executive team’s confidence in
security leaders
• Work with universities to develop cyber
defense recruits
• Look for expertise outside of normal channels
• Consider dual-track career paths for cyber
defense experts who seek higher managerial
roles
11
2
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
Exercise defenses with a
sparring partner to develop
organizational resilience
Relentlessly test defenses with a third-party
sparring partner who can realistically mimic
hackers
Assume security is compromised and
constantly hunt for intruders across the
environment
Be prepared to react rapidly in removing
attackers from the environment before they
can achieve their objectives
Copyright © 2015 Accenture All rights reserved.
3
12
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
The current digital attack waves
are dangerous for businesses
and governments. Leaders should
take action now to make their
organizations more resilient.
Copyright © 2015 Accenture All rights reserved. 13
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
Thank You
Please visit
www.accenture.com/cyberdefense
for additional information.
#CyberDefense
Follow us on Twitter
@AccentureSecure
14
Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved.
About Accenture
Accenture is a leading global professional services company,
providing a broad range of services and solutions in strategy,
consulting, digital, technology and operations. Combining
unmatched experience and specialized skills across more than 40
industries and all business functions—underpinned by the world’s
largest delivery network—Accenture works at the intersection of
business and technology to help clients improve their performance
and create sustainable value for their stakeholders. With more
than 358,000 people serving clients in more than 120 countries,
Accenture drives innovation to improve the way the world works
and lives. Visit us at www.accenture.com.
Copyright © 2015 Accenture All rights reserved. 15

Contenu connexe

Tendances

Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationHarnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationAccenture Operations
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...Accenture Technology
 
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderAccenture Australia
 
Intelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital BusinessIntelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital Businessaccenture
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportAccenture Technology
 
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture Insurance
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Teamaccenture
 
Mastering Operational Flexibility
Mastering Operational FlexibilityMastering Operational Flexibility
Mastering Operational Flexibilityaccenture
 
2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New Yorkaccenture
 
Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energyaccenture
 
Financial Services - New Approach to Data Management in the Digital Era
Financial Services - New Approach to Data Management in the Digital EraFinancial Services - New Approach to Data Management in the Digital Era
Financial Services - New Approach to Data Management in the Digital Eraaccenture
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...Accenture Technology
 
A new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growthA new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growthaccenture
 
The New World of As a Service
The New World of As a ServiceThe New World of As a Service
The New World of As a Serviceaccenture
 
Intelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital BusinessIntelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital Businessaccenture
 
Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceTechnology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Serviceaccenture
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016Melissa Gilpin
 
Corrosion Management
Corrosion ManagementCorrosion Management
Corrosion Managementaccenture
 

Tendances (19)

Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationHarnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open Innovation
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leader
 
Cloud in the Boardroom
Cloud in the BoardroomCloud in the Boardroom
Cloud in the Boardroom
 
Intelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital BusinessIntelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital Business
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for Insurance
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
 
Mastering Operational Flexibility
Mastering Operational FlexibilityMastering Operational Flexibility
Mastering Operational Flexibility
 
2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York
 
Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energy
 
Financial Services - New Approach to Data Management in the Digital Era
Financial Services - New Approach to Data Management in the Digital EraFinancial Services - New Approach to Data Management in the Digital Era
Financial Services - New Approach to Data Management in the Digital Era
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
A new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growthA new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growth
 
The New World of As a Service
The New World of As a ServiceThe New World of As a Service
The New World of As a Service
 
Intelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital BusinessIntelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital Business
 
Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceTechnology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Service
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Corrosion Management
Corrosion ManagementCorrosion Management
Corrosion Management
 

En vedette

Accenture Technology Vision for Oracle - 2016
Accenture Technology Vision for Oracle - 2016Accenture Technology Vision for Oracle - 2016
Accenture Technology Vision for Oracle - 2016Accenture Technology
 
Staking a claim in the Platform Economy with SAP
Staking a claim in the Platform Economy with SAPStaking a claim in the Platform Economy with SAP
Staking a claim in the Platform Economy with SAPAccenture Technology
 
Intelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons LearnedIntelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons LearnedAccenture Technology
 
The Coming of Age for Artificial Intelligence
The Coming of Age for Artificial Intelligence The Coming of Age for Artificial Intelligence
The Coming of Age for Artificial Intelligence Accenture Technology
 
Guarding and Growing Personal Data Value
Guarding and Growing Personal Data ValueGuarding and Growing Personal Data Value
Guarding and Growing Personal Data Valueaccenture
 
Assault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities GridAssault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities Gridaccenture
 
Increasing Agility to Fuel Growth in the Communications Industry
Increasing Agility to Fuel Growth in the Communications IndustryIncreasing Agility to Fuel Growth in the Communications Industry
Increasing Agility to Fuel Growth in the Communications Industryaccenture
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital ageAccenture Technology
 
Sustaining Competitiveness in a Digital Age: How Trust Can Make or Break The ...
Sustaining Competitiveness in a Digital Age: How Trust Can Make or Break The ...Sustaining Competitiveness in a Digital Age: How Trust Can Make or Break The ...
Sustaining Competitiveness in a Digital Age: How Trust Can Make or Break The ...accenture
 
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...Accenture Technology
 
Why Software as a Service (SaaS) requires a new approach to Application Manag...
Why Software as a Service (SaaS) requires a new approach to Application Manag...Why Software as a Service (SaaS) requires a new approach to Application Manag...
Why Software as a Service (SaaS) requires a new approach to Application Manag...Accenture Technology
 
Leading the Digital Enterprise
Leading the Digital EnterpriseLeading the Digital Enterprise
Leading the Digital Enterpriseaccenture
 
New Rules for Culture Change – Accenture Strategy
New Rules for Culture Change – Accenture StrategyNew Rules for Culture Change – Accenture Strategy
New Rules for Culture Change – Accenture Strategyaccenture
 
Accenture Cloud-based Lab Reviews Case Study
Accenture Cloud-based Lab Reviews Case StudyAccenture Cloud-based Lab Reviews Case Study
Accenture Cloud-based Lab Reviews Case StudyAccenture Operations
 
Strategic Workforce Planning Finally Gets Strategic
Strategic Workforce Planning Finally Gets StrategicStrategic Workforce Planning Finally Gets Strategic
Strategic Workforce Planning Finally Gets Strategicaccenture
 

En vedette (18)

Accenture Technology Vision for Oracle - 2016
Accenture Technology Vision for Oracle - 2016Accenture Technology Vision for Oracle - 2016
Accenture Technology Vision for Oracle - 2016
 
Staking a claim in the Platform Economy with SAP
Staking a claim in the Platform Economy with SAPStaking a claim in the Platform Economy with SAP
Staking a claim in the Platform Economy with SAP
 
Intelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons LearnedIntelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons Learned
 
The Coming of Age for Artificial Intelligence
The Coming of Age for Artificial Intelligence The Coming of Age for Artificial Intelligence
The Coming of Age for Artificial Intelligence
 
AI and the Future of Growth
AI and the Future of GrowthAI and the Future of Growth
AI and the Future of Growth
 
Guarding and Growing Personal Data Value
Guarding and Growing Personal Data ValueGuarding and Growing Personal Data Value
Guarding and Growing Personal Data Value
 
Assault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities GridAssault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities Grid
 
Increasing Agility to Fuel Growth in the Communications Industry
Increasing Agility to Fuel Growth in the Communications IndustryIncreasing Agility to Fuel Growth in the Communications Industry
Increasing Agility to Fuel Growth in the Communications Industry
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital age
 
Sustaining Competitiveness in a Digital Age: How Trust Can Make or Break The ...
Sustaining Competitiveness in a Digital Age: How Trust Can Make or Break The ...Sustaining Competitiveness in a Digital Age: How Trust Can Make or Break The ...
Sustaining Competitiveness in a Digital Age: How Trust Can Make or Break The ...
 
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
 
Why Software as a Service (SaaS) requires a new approach to Application Manag...
Why Software as a Service (SaaS) requires a new approach to Application Manag...Why Software as a Service (SaaS) requires a new approach to Application Manag...
Why Software as a Service (SaaS) requires a new approach to Application Manag...
 
Leading the Digital Enterprise
Leading the Digital EnterpriseLeading the Digital Enterprise
Leading the Digital Enterprise
 
Technology Vision 2017 - Overview
Technology Vision 2017 - OverviewTechnology Vision 2017 - Overview
Technology Vision 2017 - Overview
 
New Rules for Culture Change – Accenture Strategy
New Rules for Culture Change – Accenture StrategyNew Rules for Culture Change – Accenture Strategy
New Rules for Culture Change – Accenture Strategy
 
Accenture Cloud-based Lab Reviews Case Study
Accenture Cloud-based Lab Reviews Case StudyAccenture Cloud-based Lab Reviews Case Study
Accenture Cloud-based Lab Reviews Case Study
 
Strategic Workforce Planning Finally Gets Strategic
Strategic Workforce Planning Finally Gets StrategicStrategic Workforce Planning Finally Gets Strategic
Strategic Workforce Planning Finally Gets Strategic
 
Migrating to SAP S/4HANA
Migrating to SAP S/4HANAMigrating to SAP S/4HANA
Migrating to SAP S/4HANA
 

Similaire à Continuous Cyber Attacks: Engaging Business Leaders for the New Normal

Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.accenture
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.accenture
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to Leaderaccenture
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber ResilienceAccenture Security
 
Healthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber ResilienceHealthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber Resilienceaccenture
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilienceaccenture
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamAccenture Operations
 
The Science of Security
The Science of SecurityThe Science of Security
The Science of Securityaccenture
 
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018Accenture Australia
 
Are you Ready to be an Insurer of Things?
Are you Ready to be an Insurer of Things?Are you Ready to be an Insurer of Things?
Are you Ready to be an Insurer of Things?accenture
 
Securing Solutions Amid The Journey To Digital Transformation.pdf
Securing Solutions Amid The Journey To Digital Transformation.pdfSecuring Solutions Amid The Journey To Digital Transformation.pdf
Securing Solutions Amid The Journey To Digital Transformation.pdfCiente
 
IT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsIT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsAndrew S. Baker (ASB)
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesJohn Rapa
 
Securing Consumer Trust
Securing Consumer TrustSecuring Consumer Trust
Securing Consumer Trustaccenture
 
Tech Conferences To Share Ways Of Building A Robust Cybersecurity Culture
Tech Conferences To Share Ways Of Building A Robust Cybersecurity CultureTech Conferences To Share Ways Of Building A Robust Cybersecurity Culture
Tech Conferences To Share Ways Of Building A Robust Cybersecurity CultureInternet 2Conf
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Pierre Audoin Consultants
 

Similaire à Continuous Cyber Attacks: Engaging Business Leaders for the New Normal (20)

Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to Leader
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber Resilience
 
The Cyber Security Leap
The Cyber Security LeapThe Cyber Security Leap
The Cyber Security Leap
 
Healthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber ResilienceHealthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber Resilience
 
Strategic Cybersecurity
Strategic CybersecurityStrategic Cybersecurity
Strategic Cybersecurity
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilience
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
 
The Science of Security
The Science of SecurityThe Science of Security
The Science of Security
 
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
 
Are you Ready to be an Insurer of Things?
Are you Ready to be an Insurer of Things?Are you Ready to be an Insurer of Things?
Are you Ready to be an Insurer of Things?
 
Securing Solutions Amid The Journey To Digital Transformation.pdf
Securing Solutions Amid The Journey To Digital Transformation.pdfSecuring Solutions Amid The Journey To Digital Transformation.pdf
Securing Solutions Amid The Journey To Digital Transformation.pdf
 
IT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsIT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and Tools
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial Services
 
Securing Consumer Trust
Securing Consumer TrustSecuring Consumer Trust
Securing Consumer Trust
 
Tech Conferences To Share Ways Of Building A Robust Cybersecurity Culture
Tech Conferences To Share Ways Of Building A Robust Cybersecurity CultureTech Conferences To Share Ways Of Building A Robust Cybersecurity Culture
Tech Conferences To Share Ways Of Building A Robust Cybersecurity Culture
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises?
 

Plus de Accenture Technology

Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Technology
 
Helping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayHelping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayAccenture Technology
 
Accenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Technology
 
Helping you get back to the workplace confidently
Helping you get back to the workplace confidentlyHelping you get back to the workplace confidently
Helping you get back to the workplace confidentlyAccenture Technology
 
Driving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldDriving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldAccenture Technology
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology
 
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology
 
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology
 
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology
 
Elevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayElevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayAccenture Technology
 
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAutomating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAccenture Technology
 
Technology Vision 2019 for Workday
Technology Vision 2019 for WorkdayTechnology Vision 2019 for Workday
Technology Vision 2019 for WorkdayAccenture Technology
 
Accenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology
 

Plus de Accenture Technology (20)

Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020
 
Helping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayHelping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + Workday
 
Accenture Labs Innovation Stories
Accenture Labs Innovation StoriesAccenture Labs Innovation Stories
Accenture Labs Innovation Stories
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
 
Accenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP Solutions
 
Highlights on the five key trends
Highlights on the five key trendsHighlights on the five key trends
Highlights on the five key trends
 
Helping you get back to the workplace confidently
Helping you get back to the workplace confidentlyHelping you get back to the workplace confidently
Helping you get back to the workplace confidently
 
Driving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldDriving Workday transformation in a virtual world
Driving Workday transformation in a virtual world
 
Accenture + Red Hat
Accenture + Red HatAccenture + Red Hat
Accenture + Red Hat
 
Accenture and Mercedes Case Study
Accenture and Mercedes Case StudyAccenture and Mercedes Case Study
Accenture and Mercedes Case Study
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: Infographic
 
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: Overview
 
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and Me
 
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNA
 
Elevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayElevating the Workforce Experience with Workday
Elevating the Workforce Experience with Workday
 
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAutomating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
 
Technology Vision for SAP 2019
Technology Vision for SAP 2019Technology Vision for SAP 2019
Technology Vision for SAP 2019
 
Technology Vision 2019 for Workday
Technology Vision 2019 for WorkdayTechnology Vision 2019 for Workday
Technology Vision 2019 for Workday
 
Accenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for Pega
 

Dernier

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Dernier (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Continuous Cyber Attacks: Engaging Business Leaders for the New Normal

  • 1. Copyright © 2015 Accenture All rights reserved. Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
  • 2. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. Organizations face a cybercrime wave that is increasing in intensity and sophistication Cyber defenses are threatened from well-funded, highly motivated digital adversaries Sophisticated hackers are using state-of-the-art techniques It’s never been easier or more lucrative for adversaries to cash in on their efforts Cyber-thieves operate across borders and rarely face prosecution 2
  • 3. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. Business leaders must establish a holistic, end-to-end security strategy to protect the organization • Regulatory compliance is not enough • Purchasing the latest security products can drain the budget without improving overall defense 3 A solid cyber defense approach requires a shift in approach: the organization’s business side must partner with the security organization
  • 4. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. The following 3 approaches can help an organization minimize cyber-crime risk Make the business a better security “customer” Strengthen the partnership between the business and security Continuously exercise organizational defenses 4 1 2 3
  • 5. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. 1Make the business a better security “customer” • A solid cyber defense requires companies to interlock an organization’s business stakeholders, its risk management office and the security team • Develop a true relationship that asks all employees to own responsibility for security 5
  • 6. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. When the business side fails to cooperate with the security team, multiple challenges emerge • Security lacks sufficient top management access • The front lines remain unengaged in security issues • Ambiguity regarding who “owns” the systems under attack 6 1
  • 7. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. Strengthening the relationship between the business and security transforms the organization’s security posture Leaders take responsibility to keep security on the agenda Recognize the complexity of the challenge 7 Work together to identify the organization’s critical data Evolve the organizational culture to attract and retain top- tier security talent 2
  • 8. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. Strengthen the partnership between the business and security • Put security on the agenda • Focus on cyber defense innovation • Embrace and implement new ideas • Develop security strategies approved by leaders • Make information security a business priority • Inform employees on business security requirements 8 2
  • 9. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. Strengthen the partnership between the business and security Recognize the complexity of the challenge • Determine the best way to manage cyber losses • Develop a complete scope of potential damage areas, including data, business operations, company brand, consumer confidence • Recognize that future costs could rise • Prioritize the protection of critical information 9 2
  • 10. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. Strengthen the partnership between the business and security Work together to identify the organization’s critical data • Analyze the organization as a hacker would to identify vulnerabilities • Focus efforts on the truly critical assets to reduce risk • Delete or encrypt online information • Reduce data volume where possible 10 2
  • 11. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. Strengthen the partnership between the business and security Seek top-tier security talent • Think proactively and creatively to attract and retain scarce, expert security resources • Build the executive team’s confidence in security leaders • Work with universities to develop cyber defense recruits • Look for expertise outside of normal channels • Consider dual-track career paths for cyber defense experts who seek higher managerial roles 11 2
  • 12. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. Exercise defenses with a sparring partner to develop organizational resilience Relentlessly test defenses with a third-party sparring partner who can realistically mimic hackers Assume security is compromised and constantly hunt for intruders across the environment Be prepared to react rapidly in removing attackers from the environment before they can achieve their objectives Copyright © 2015 Accenture All rights reserved. 3 12
  • 13. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. The current digital attack waves are dangerous for businesses and governments. Leaders should take action now to make their organizations more resilient. Copyright © 2015 Accenture All rights reserved. 13
  • 14. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. Thank You Please visit www.accenture.com/cyberdefense for additional information. #CyberDefense Follow us on Twitter @AccentureSecure 14
  • 15. Copyright © 2015 Accenture All rights reserved.Copyright © 2015 Accenture All rights reserved. About Accenture Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions—underpinned by the world’s largest delivery network—Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With more than 358,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com. Copyright © 2015 Accenture All rights reserved. 15