SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
Trend  5:  
Digital  Trust
People  First:    
The  Primacy  of  People  
in  the  Digital  Age
People  First:  The  Primacy  of  People  in  the  Digital  Age
Copyright  ©  2016  Accenture.  All  rights  reserved.
The  Accenture  Technology  Vision  2016  identifies  five  technology  trends  fueled  by  the  
people  first principle  and  that  are  essential  to  business  success  in  the  digital  economy.  
Intelligent  
Automation
Liquid  
Workforce  
Platform  
Economy
Predictable  
Disruption
Digital  
Trust
3
Why  are  we  talking  about  Digital  Trust?  
Copyright  ©  2016  Accenture.  All  rights  reserved. 4
Company  operations  
are  affected:
In  the  age  of  mass  personalization  
and  IoT,  information  is  inherently  
more  personal.  This  data  underpins  
a  company’s  operations.
Security  needs  
to  be  data-­centric:
Tomorrow's  standard  will  be  security  
that  follows  data  and  continuously  
ensures  connected  devices  are  
uncompromised,  authenticated  users  
are  who  they  say  they  are,  and  
security  is  ‘baked-­in’  to  new  offerings.
Costs  are  rising:
Digital  businesses  that  rely  
on  data  insights  and  
intelligent  automation  are  
exposed  to  unprecedented  
and  systemic  risks.
5Copyright © 2016 Accenture. All rights reserved.
Address Digital Risk with Trust
End result? Trust helps brands build strong
and enduring customer relationships.
Trust and the Customer Journey
Customer
Journey:
Role of Trust:
Consider Purchase Integrate Maintain Advocate
Differentiation
Transparency of
ethics and security
practices can set your
brand apart from
others.
High Ethical
Standards
Adhering to high ethical
and security standards
may require similar
updates on connected
platforms.
Maintain Strong
Relationships
Customers become
partners and build on top
of your platforms; you
have more leeway to
experiment.
Trust Attracts
Customers
As products and
services become more
trustworthy, customers
become advocates.
Apple  Relies  On  Trust  To  Enter  New  Markets
Its  efforts  to  be  transparent  in  how  it  uses  and  
secures  customer  data  is  testimony  to  the  value  this  
leading  brand  places  on  trust:  strong  security  and  
ethics  that  are  ‘baked  in’  give  customers  confidence  that  
their  digital  footprints  are  secure  and  private,  easing  the  
transition  to  and  adoption  of  the  Apple  ecosystem.
As  Apple  has  shown,  trust  differentiates  competitors  in  the  
digital  economy  where  businesses  can  reach  vastly  more  
people,  iterate  quicker,  and  make  faster,  better  decisions  
than  ever  before.
When  customers  trust  a  service,  product,  or  brand,  
they  look  to  it  for  guidance  into  the  digital  future
6Copyright  ©  2016  Accenture.  All  rights  reserved. 6
Homekit
Healthkit
Researchkit
In  today’s  digital  
business  environment,  
trust  is  built  on  two  
major  components:  
Ethics  and  Security
7
83%  of  respondents  to  the  
Accenture  Technology  Vision  
2016  survey  agreed  that  
“Trust  is  the  cornerstone  
of  the  digital  economy.”
Copyright  ©  2016  Accenture.  All  rights  reserved. 7
But  achieving  trust  requires  more  than  
strong  ethics,  it  demands  robust  security
Copyright  ©  2016  Accenture.  All  rights  reserved. Source:    Accenture  Technology  Survey
7  out  of  10  organizations  suffered  from  
at  least  twice  as  many  privacy  or  security  
breaches  compared  to  two  years  ago.
81%  agree  that  organizations  need  to  move  from  
an  exclusively  perimeter-­based  security  model  
(e.g.  firewalls,  intrusion  detection  systems)  to  
include  human  factors-­based  security  (e.g.,  
cognitive  fingerprinting,  hardware  authentication).
8
Robust  cybersecurity is  moving  away  from  
perimeter-­based  tools  and  closer  to  data
Copyright  ©  2016  Accenture.  All  rights  reserved. 9
Cloud-­based  access  controls  that  offer  
visibility,  governance,  and  protection  for  data.
Adallom
Measures  human  behavior  to  
recognize  or  verify  person’s  identity.
BehavioSec
Authenticates  users,  detects  threats  
by  analyzing  users’  interaction  with  
online  and  mobile  apps.
BioCatch
Cloud-­access  security  broker  that  
traverses  perimeter  security  and  
operates  at  the  device  level.
Bitglass
Wrappers  to  segregate  work  from  
personal  apps  and  apply  app-­based  
encryption  and  security  policies.
Bluebox
Uses  virtual  application  wrappers  
to  isolate  threats  and  stop  breaches.
Bromium
Assigns  policies  and  rights  to  data  
files,  effectively  locking  out  hackers  
and  malicious  insiders.
Covertix
Leverage  sensor  data  and  other  
context  to invisibly authenticate  users.
Crysp
Workload-­ and  app-­based  security  
policies  that  transverse  the  cloud  
and  adapt  to  infrastructure  changes.  
Illumio
Mobile-­first  authentication  &  fraud  
prevention  across  mobile  apps,  mobile  
browsers,  and  desktop  browsers.
InAuth
Uses  predictive  analytics  on  mobile  
devices  to  detect,  isolate,  and  stop  attacks
Lookout
Cloud  and  mobile  identity  management  with  
granular  controls  for  applications  and  data
Okta
Applies  machine  learning  &  AI  to  
cloud  security  and  IoT to  find  patterns  
in  attack  vectors  attacker  behavior.
SparkCognition
15-­second  visibility  and  control  
over  every  endpoint.
Tanium
Digital  Trust:  100-­Day  Plan
10Copyright  ©  2016  Accenture.  All  rights  reserved.
1. Survey  stakeholders  to  quantify  the  level  of  trust  across  your  
business  portfolio.
2. Search  customer  service  logs  for  the  word  ‘trust’  and  run  sentiment  
analysis  to  learn  how  customers  perceive  your  brand;;  make  a  top-­five  
list  of  the  least  trustworthy  offerings.
3. Take  an  inventory  of  data-­driven  business  processes;;  describe  the  
current  and  potential  opportunities  for  enhanced   security  and  data  
ethics  for  each.
4. Identify  the  executive(s)  responsible  for  building  and  maintaining  trust,  
digital  ethics,  and  security  with  vendors,  partners,  and  customers.
5. Research  what  your  competitors  do  to  build  customer  trust.  Record  
what  builds  and  erodes  trust.  
6. Partner  with  an  academic  institution,  non-­profit,  or  industry  group  to  
dive  deeper  into  one  aspect  of  digital  ethics.  Publish  findings/advice  
for  others.
7. Compile  a  list  of  opportunities  for  security  to  move  closer  to  data.
Digital  Trust:  365-­Day  Plan
11Copyright  ©  2016  Accenture.  All  rights  reserved.
1. From  the  top-­five  list  of  the  least  trustworthy  products,  
do  a  complete  customer  journey  analysis.  Identify  areas  
to  build  trust.
2. Discuss  hiring  a  chief  digital  officer,  chief  trust  officer,  
or  chief  ethics  officer.  
3. Pick  one  product/service  to  maximize  trust.  Build  
metrics  for  tracking  improvement  over  time.  Report  
results  to  product  teams  and  challenge  them  to  meet  
aggressive  targets.
4. Start  tracking  metrics  for  trust  and  both  data  and  digital  
ethics.  Use  this  data  to  include  trust  and  ethical  
practices  in  your  company’s  annual  CSR  report.
5. Implement  a  portfolio  of  solutions  to  move  security  
closer  to  data.  Describe  how  their  implementation  has  
mitigated  downside  risk.  Share  this  report  with  your  CIO  
and  CFO  in  an  effort  to  reduce  insurance  premiums.
Predictions
Copyright  ©  2016  Accenture.  All  rights  reserved. 12
The  Trust  Bust
High-­profile  digital  ethics  failures  
will  create  new  governing  bodies,  
new  regulations  and  a  new  
category  of  jobs.
The  CEO  gets  a  Twin
Trust  becomes  paramount,  
and  a  new  leader  emerges  -­
the  Chief  Ethics  Officer.
Key  Takeaways
Copyright  ©  2016  Accenture.  All  rights  reserved. 13
Ethics  and  security  must  be  
primary  considerations  in  any  
digital  transformation.  
Exposure  to  risk  scales  
in  proportion  to  digital  
business  operations.  
To  protect  against  downside  risk,  
businesses  must  foster  strong  ethical,  
effectively  use  security  to  protect  against  
external  threats,  and  build  trusting  
relationships  with  ecosystem  stakeholders.  
In  procuring  new  technologies,  
security  and  ethics  must  be  
evaluation  criteria.  
Look  for  opportunities  to  build  
trust  at  every  engagement  point  
along  the  customer  journey.  
Copyright  ©  2016  Accenture.  All  rights  reserved.
Thank  you
#techvision2016
www.accenture.com/technologyvision

Contenu connexe

Tendances

Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4accenture
 
Being digital: Embracing the future of work
Being digital: Embracing the future of workBeing digital: Embracing the future of work
Being digital: Embracing the future of workaccenture
 
Guarding and Growing Personal Data Value
Guarding and Growing Personal Data ValueGuarding and Growing Personal Data Value
Guarding and Growing Personal Data Valueaccenture
 
Seeing Beyond the Loyalty Illusion in Italy: It’s Time you Invest More Wisely
Seeing Beyond the Loyalty Illusion in Italy: It’s Time you Invest More Wisely Seeing Beyond the Loyalty Illusion in Italy: It’s Time you Invest More Wisely
Seeing Beyond the Loyalty Illusion in Italy: It’s Time you Invest More Wisely accenture
 
Accenture Workforce of the Future: Humanizing Work through Digital
Accenture Workforce of the Future: Humanizing Work through DigitalAccenture Workforce of the Future: Humanizing Work through Digital
Accenture Workforce of the Future: Humanizing Work through Digitalaccenture
 
Assault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities GridAssault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities Gridaccenture
 
Accenture's 2017 Technology Vision for Insurance
Accenture's 2017 Technology Vision for InsuranceAccenture's 2017 Technology Vision for Insurance
Accenture's 2017 Technology Vision for InsuranceAccenture Insurance
 
Seeing Beyond the Loyalty Illusion in the UK: It’s Time You Invest More Wisely
Seeing Beyond the Loyalty Illusion in the UK: It’s Time You Invest More WiselySeeing Beyond the Loyalty Illusion in the UK: It’s Time You Invest More Wisely
Seeing Beyond the Loyalty Illusion in the UK: It’s Time You Invest More Wiselyaccenture
 
Banking Technology Vision 2017
Banking Technology Vision 2017Banking Technology Vision 2017
Banking Technology Vision 2017accenture
 
Liquid Workforce - Tech Vision 2016 Trend 2
Liquid Workforce - Tech Vision 2016 Trend 2Liquid Workforce - Tech Vision 2016 Trend 2
Liquid Workforce - Tech Vision 2016 Trend 2accenture
 
Accenture Technology Vision for Oracle 2014
Accenture Technology Vision for Oracle 2014Accenture Technology Vision for Oracle 2014
Accenture Technology Vision for Oracle 2014Accenture Technology
 
Liquid Workforce - Tech Vision 2016 Trend 2
Liquid Workforce - Tech Vision 2016 Trend 2Liquid Workforce - Tech Vision 2016 Trend 2
Liquid Workforce - Tech Vision 2016 Trend 2Accenture Technology
 
IT Security: Implications for the Technology Vision 2015
IT Security: Implications for the Technology Vision 2015IT Security: Implications for the Technology Vision 2015
IT Security: Implications for the Technology Vision 2015accenture
 
The Accenture Technology Vision 2016 for Utilities
The Accenture Technology Vision 2016 for UtilitiesThe Accenture Technology Vision 2016 for Utilities
The Accenture Technology Vision 2016 for Utilitiesaccenture
 
Leading In The Spotlight 2016 Accenture Strategy C-Suite Survey
Leading In The Spotlight 2016 Accenture Strategy C-Suite SurveyLeading In The Spotlight 2016 Accenture Strategy C-Suite Survey
Leading In The Spotlight 2016 Accenture Strategy C-Suite Surveyaccenture
 
The Digital Health Tech Vision 2016
The Digital Health Tech Vision 2016The Digital Health Tech Vision 2016
The Digital Health Tech Vision 2016accenture
 
Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3Accenture Technology
 
New Rules for Culture Change – Accenture Strategy
New Rules for Culture Change – Accenture StrategyNew Rules for Culture Change – Accenture Strategy
New Rules for Culture Change – Accenture Strategyaccenture
 
Fintech New York: Partnerships, Platforms and Open Innovation
Fintech New York: Partnerships, Platforms and Open InnovationFintech New York: Partnerships, Platforms and Open Innovation
Fintech New York: Partnerships, Platforms and Open Innovationaccenture
 
Digital Health Technology Vision 2017
Digital Health Technology Vision 2017Digital Health Technology Vision 2017
Digital Health Technology Vision 2017accenture
 

Tendances (20)

Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4
 
Being digital: Embracing the future of work
Being digital: Embracing the future of workBeing digital: Embracing the future of work
Being digital: Embracing the future of work
 
Guarding and Growing Personal Data Value
Guarding and Growing Personal Data ValueGuarding and Growing Personal Data Value
Guarding and Growing Personal Data Value
 
Seeing Beyond the Loyalty Illusion in Italy: It’s Time you Invest More Wisely
Seeing Beyond the Loyalty Illusion in Italy: It’s Time you Invest More Wisely Seeing Beyond the Loyalty Illusion in Italy: It’s Time you Invest More Wisely
Seeing Beyond the Loyalty Illusion in Italy: It’s Time you Invest More Wisely
 
Accenture Workforce of the Future: Humanizing Work through Digital
Accenture Workforce of the Future: Humanizing Work through DigitalAccenture Workforce of the Future: Humanizing Work through Digital
Accenture Workforce of the Future: Humanizing Work through Digital
 
Assault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities GridAssault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities Grid
 
Accenture's 2017 Technology Vision for Insurance
Accenture's 2017 Technology Vision for InsuranceAccenture's 2017 Technology Vision for Insurance
Accenture's 2017 Technology Vision for Insurance
 
Seeing Beyond the Loyalty Illusion in the UK: It’s Time You Invest More Wisely
Seeing Beyond the Loyalty Illusion in the UK: It’s Time You Invest More WiselySeeing Beyond the Loyalty Illusion in the UK: It’s Time You Invest More Wisely
Seeing Beyond the Loyalty Illusion in the UK: It’s Time You Invest More Wisely
 
Banking Technology Vision 2017
Banking Technology Vision 2017Banking Technology Vision 2017
Banking Technology Vision 2017
 
Liquid Workforce - Tech Vision 2016 Trend 2
Liquid Workforce - Tech Vision 2016 Trend 2Liquid Workforce - Tech Vision 2016 Trend 2
Liquid Workforce - Tech Vision 2016 Trend 2
 
Accenture Technology Vision for Oracle 2014
Accenture Technology Vision for Oracle 2014Accenture Technology Vision for Oracle 2014
Accenture Technology Vision for Oracle 2014
 
Liquid Workforce - Tech Vision 2016 Trend 2
Liquid Workforce - Tech Vision 2016 Trend 2Liquid Workforce - Tech Vision 2016 Trend 2
Liquid Workforce - Tech Vision 2016 Trend 2
 
IT Security: Implications for the Technology Vision 2015
IT Security: Implications for the Technology Vision 2015IT Security: Implications for the Technology Vision 2015
IT Security: Implications for the Technology Vision 2015
 
The Accenture Technology Vision 2016 for Utilities
The Accenture Technology Vision 2016 for UtilitiesThe Accenture Technology Vision 2016 for Utilities
The Accenture Technology Vision 2016 for Utilities
 
Leading In The Spotlight 2016 Accenture Strategy C-Suite Survey
Leading In The Spotlight 2016 Accenture Strategy C-Suite SurveyLeading In The Spotlight 2016 Accenture Strategy C-Suite Survey
Leading In The Spotlight 2016 Accenture Strategy C-Suite Survey
 
The Digital Health Tech Vision 2016
The Digital Health Tech Vision 2016The Digital Health Tech Vision 2016
The Digital Health Tech Vision 2016
 
Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3
 
New Rules for Culture Change – Accenture Strategy
New Rules for Culture Change – Accenture StrategyNew Rules for Culture Change – Accenture Strategy
New Rules for Culture Change – Accenture Strategy
 
Fintech New York: Partnerships, Platforms and Open Innovation
Fintech New York: Partnerships, Platforms and Open InnovationFintech New York: Partnerships, Platforms and Open Innovation
Fintech New York: Partnerships, Platforms and Open Innovation
 
Digital Health Technology Vision 2017
Digital Health Technology Vision 2017Digital Health Technology Vision 2017
Digital Health Technology Vision 2017
 

En vedette

Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital ageAccenture Technology
 
2016 Edelman TRUST BAROMETER - Global Results
2016 Edelman TRUST BAROMETER - Global Results2016 Edelman TRUST BAROMETER - Global Results
2016 Edelman TRUST BAROMETER - Global ResultsEdelman
 
The Digitization of Human Resources
The Digitization of Human ResourcesThe Digitization of Human Resources
The Digitization of Human ResourcesAccenture Technology
 
Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4Accenture Technology
 
2017 Edelman TRUST BAROMETER™- Global Results
2017 Edelman TRUST BAROMETER™- Global Results2017 Edelman TRUST BAROMETER™- Global Results
2017 Edelman TRUST BAROMETER™- Global ResultsEdelman
 

En vedette (7)

Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital age
 
2016 Edelman TRUST BAROMETER - Global Results
2016 Edelman TRUST BAROMETER - Global Results2016 Edelman TRUST BAROMETER - Global Results
2016 Edelman TRUST BAROMETER - Global Results
 
The Digitization of Human Resources
The Digitization of Human ResourcesThe Digitization of Human Resources
The Digitization of Human Resources
 
Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4
 
Multidomain MDM at Amadeus
Multidomain MDM at AmadeusMultidomain MDM at Amadeus
Multidomain MDM at Amadeus
 
2017 Edelman TRUST BAROMETER™- Global Results
2017 Edelman TRUST BAROMETER™- Global Results2017 Edelman TRUST BAROMETER™- Global Results
2017 Edelman TRUST BAROMETER™- Global Results
 

Similaire à Digital Trust - Tech Vision 2016 Trend 5

People First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital InsurancePeople First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital InsuranceAccenture México
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportAccenture Technology
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersCisco Mobility
 
How Insurers Can Tame Data to Drive Innovation
How Insurers Can Tame Data to Drive InnovationHow Insurers Can Tame Data to Drive Innovation
How Insurers Can Tame Data to Drive InnovationCognizant
 
10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app control10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app controlAneel Mitra
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecuritySPLICE Software
 
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...lithanhall
 
Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New BlockSean Dickson
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsisVasuki Kashyap
 
Seclore Corporate Profile
Seclore Corporate ProfileSeclore Corporate Profile
Seclore Corporate Profilepatelhiranya
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Technology
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 

Similaire à Digital Trust - Tech Vision 2016 Trend 5 (20)

People First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital InsurancePeople First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital Insurance
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
How Insurers Can Tame Data to Drive Innovation
How Insurers Can Tame Data to Drive InnovationHow Insurers Can Tame Data to Drive Innovation
How Insurers Can Tame Data to Drive Innovation
 
10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app control10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app control
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data Security
 
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
 
Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New Block
 
The 10 most trusted authentication solution providers 2018
The 10 most trusted authentication solution providers 2018The 10 most trusted authentication solution providers 2018
The 10 most trusted authentication solution providers 2018
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
Seclore Corporate Profile
Seclore Corporate ProfileSeclore Corporate Profile
Seclore Corporate Profile
 
Digital Insurance
Digital InsuranceDigital Insurance
Digital Insurance
 
Machine Learning In Insurance
Machine Learning In InsuranceMachine Learning In Insurance
Machine Learning In Insurance
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 

Plus de Accenture Technology

Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Technology
 
Helping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayHelping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayAccenture Technology
 
Accenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Technology
 
Helping you get back to the workplace confidently
Helping you get back to the workplace confidentlyHelping you get back to the workplace confidently
Helping you get back to the workplace confidentlyAccenture Technology
 
Driving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldDriving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldAccenture Technology
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology
 
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology
 
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology
 
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology
 
Elevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayElevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayAccenture Technology
 
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAutomating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAccenture Technology
 
Technology Vision 2019 for Workday
Technology Vision 2019 for WorkdayTechnology Vision 2019 for Workday
Technology Vision 2019 for WorkdayAccenture Technology
 
Accenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology
 

Plus de Accenture Technology (20)

Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020
 
Helping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayHelping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + Workday
 
Accenture Labs Innovation Stories
Accenture Labs Innovation StoriesAccenture Labs Innovation Stories
Accenture Labs Innovation Stories
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
 
Accenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP Solutions
 
Highlights on the five key trends
Highlights on the five key trendsHighlights on the five key trends
Highlights on the five key trends
 
Helping you get back to the workplace confidently
Helping you get back to the workplace confidentlyHelping you get back to the workplace confidently
Helping you get back to the workplace confidently
 
Driving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldDriving Workday transformation in a virtual world
Driving Workday transformation in a virtual world
 
Accenture + Red Hat
Accenture + Red HatAccenture + Red Hat
Accenture + Red Hat
 
Accenture and Mercedes Case Study
Accenture and Mercedes Case StudyAccenture and Mercedes Case Study
Accenture and Mercedes Case Study
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: Infographic
 
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: Overview
 
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and Me
 
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNA
 
Elevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayElevating the Workforce Experience with Workday
Elevating the Workforce Experience with Workday
 
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAutomating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
 
Technology Vision for SAP 2019
Technology Vision for SAP 2019Technology Vision for SAP 2019
Technology Vision for SAP 2019
 
Technology Vision 2019 for Workday
Technology Vision 2019 for WorkdayTechnology Vision 2019 for Workday
Technology Vision 2019 for Workday
 
Accenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for Pega
 

Dernier

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 

Dernier (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 

Digital Trust - Tech Vision 2016 Trend 5

  • 2. People  First:     The  Primacy  of  People   in  the  Digital  Age
  • 3. People  First:  The  Primacy  of  People  in  the  Digital  Age Copyright  ©  2016  Accenture.  All  rights  reserved. The  Accenture  Technology  Vision  2016  identifies  five  technology  trends  fueled  by  the   people  first principle  and  that  are  essential  to  business  success  in  the  digital  economy.   Intelligent   Automation Liquid   Workforce   Platform   Economy Predictable   Disruption Digital   Trust 3
  • 4. Why  are  we  talking  about  Digital  Trust?   Copyright  ©  2016  Accenture.  All  rights  reserved. 4 Company  operations   are  affected: In  the  age  of  mass  personalization   and  IoT,  information  is  inherently   more  personal.  This  data  underpins   a  company’s  operations. Security  needs   to  be  data-­centric: Tomorrow's  standard  will  be  security   that  follows  data  and  continuously   ensures  connected  devices  are   uncompromised,  authenticated  users   are  who  they  say  they  are,  and   security  is  ‘baked-­in’  to  new  offerings. Costs  are  rising: Digital  businesses  that  rely   on  data  insights  and   intelligent  automation  are   exposed  to  unprecedented   and  systemic  risks.
  • 5. 5Copyright © 2016 Accenture. All rights reserved. Address Digital Risk with Trust End result? Trust helps brands build strong and enduring customer relationships. Trust and the Customer Journey Customer Journey: Role of Trust: Consider Purchase Integrate Maintain Advocate Differentiation Transparency of ethics and security practices can set your brand apart from others. High Ethical Standards Adhering to high ethical and security standards may require similar updates on connected platforms. Maintain Strong Relationships Customers become partners and build on top of your platforms; you have more leeway to experiment. Trust Attracts Customers As products and services become more trustworthy, customers become advocates.
  • 6. Apple  Relies  On  Trust  To  Enter  New  Markets Its  efforts  to  be  transparent  in  how  it  uses  and   secures  customer  data  is  testimony  to  the  value  this   leading  brand  places  on  trust:  strong  security  and   ethics  that  are  ‘baked  in’  give  customers  confidence  that   their  digital  footprints  are  secure  and  private,  easing  the   transition  to  and  adoption  of  the  Apple  ecosystem. As  Apple  has  shown,  trust  differentiates  competitors  in  the   digital  economy  where  businesses  can  reach  vastly  more   people,  iterate  quicker,  and  make  faster,  better  decisions   than  ever  before. When  customers  trust  a  service,  product,  or  brand,   they  look  to  it  for  guidance  into  the  digital  future 6Copyright  ©  2016  Accenture.  All  rights  reserved. 6 Homekit Healthkit Researchkit
  • 7. In  today’s  digital   business  environment,   trust  is  built  on  two   major  components:   Ethics  and  Security 7 83%  of  respondents  to  the   Accenture  Technology  Vision   2016  survey  agreed  that   “Trust  is  the  cornerstone   of  the  digital  economy.” Copyright  ©  2016  Accenture.  All  rights  reserved. 7
  • 8. But  achieving  trust  requires  more  than   strong  ethics,  it  demands  robust  security Copyright  ©  2016  Accenture.  All  rights  reserved. Source:    Accenture  Technology  Survey 7  out  of  10  organizations  suffered  from   at  least  twice  as  many  privacy  or  security   breaches  compared  to  two  years  ago. 81%  agree  that  organizations  need  to  move  from   an  exclusively  perimeter-­based  security  model   (e.g.  firewalls,  intrusion  detection  systems)  to   include  human  factors-­based  security  (e.g.,   cognitive  fingerprinting,  hardware  authentication). 8
  • 9. Robust  cybersecurity is  moving  away  from   perimeter-­based  tools  and  closer  to  data Copyright  ©  2016  Accenture.  All  rights  reserved. 9 Cloud-­based  access  controls  that  offer   visibility,  governance,  and  protection  for  data. Adallom Measures  human  behavior  to   recognize  or  verify  person’s  identity. BehavioSec Authenticates  users,  detects  threats   by  analyzing  users’  interaction  with   online  and  mobile  apps. BioCatch Cloud-­access  security  broker  that   traverses  perimeter  security  and   operates  at  the  device  level. Bitglass Wrappers  to  segregate  work  from   personal  apps  and  apply  app-­based   encryption  and  security  policies. Bluebox Uses  virtual  application  wrappers   to  isolate  threats  and  stop  breaches. Bromium Assigns  policies  and  rights  to  data   files,  effectively  locking  out  hackers   and  malicious  insiders. Covertix Leverage  sensor  data  and  other   context  to invisibly authenticate  users. Crysp Workload-­ and  app-­based  security   policies  that  transverse  the  cloud   and  adapt  to  infrastructure  changes.   Illumio Mobile-­first  authentication  &  fraud   prevention  across  mobile  apps,  mobile   browsers,  and  desktop  browsers. InAuth Uses  predictive  analytics  on  mobile   devices  to  detect,  isolate,  and  stop  attacks Lookout Cloud  and  mobile  identity  management  with   granular  controls  for  applications  and  data Okta Applies  machine  learning  &  AI  to   cloud  security  and  IoT to  find  patterns   in  attack  vectors  attacker  behavior. SparkCognition 15-­second  visibility  and  control   over  every  endpoint. Tanium
  • 10. Digital  Trust:  100-­Day  Plan 10Copyright  ©  2016  Accenture.  All  rights  reserved. 1. Survey  stakeholders  to  quantify  the  level  of  trust  across  your   business  portfolio. 2. Search  customer  service  logs  for  the  word  ‘trust’  and  run  sentiment   analysis  to  learn  how  customers  perceive  your  brand;;  make  a  top-­five   list  of  the  least  trustworthy  offerings. 3. Take  an  inventory  of  data-­driven  business  processes;;  describe  the   current  and  potential  opportunities  for  enhanced   security  and  data   ethics  for  each. 4. Identify  the  executive(s)  responsible  for  building  and  maintaining  trust,   digital  ethics,  and  security  with  vendors,  partners,  and  customers. 5. Research  what  your  competitors  do  to  build  customer  trust.  Record   what  builds  and  erodes  trust.   6. Partner  with  an  academic  institution,  non-­profit,  or  industry  group  to   dive  deeper  into  one  aspect  of  digital  ethics.  Publish  findings/advice   for  others. 7. Compile  a  list  of  opportunities  for  security  to  move  closer  to  data.
  • 11. Digital  Trust:  365-­Day  Plan 11Copyright  ©  2016  Accenture.  All  rights  reserved. 1. From  the  top-­five  list  of  the  least  trustworthy  products,   do  a  complete  customer  journey  analysis.  Identify  areas   to  build  trust. 2. Discuss  hiring  a  chief  digital  officer,  chief  trust  officer,   or  chief  ethics  officer.   3. Pick  one  product/service  to  maximize  trust.  Build   metrics  for  tracking  improvement  over  time.  Report   results  to  product  teams  and  challenge  them  to  meet   aggressive  targets. 4. Start  tracking  metrics  for  trust  and  both  data  and  digital   ethics.  Use  this  data  to  include  trust  and  ethical   practices  in  your  company’s  annual  CSR  report. 5. Implement  a  portfolio  of  solutions  to  move  security   closer  to  data.  Describe  how  their  implementation  has   mitigated  downside  risk.  Share  this  report  with  your  CIO   and  CFO  in  an  effort  to  reduce  insurance  premiums.
  • 12. Predictions Copyright  ©  2016  Accenture.  All  rights  reserved. 12 The  Trust  Bust High-­profile  digital  ethics  failures   will  create  new  governing  bodies,   new  regulations  and  a  new   category  of  jobs. The  CEO  gets  a  Twin Trust  becomes  paramount,   and  a  new  leader  emerges  -­ the  Chief  Ethics  Officer.
  • 13. Key  Takeaways Copyright  ©  2016  Accenture.  All  rights  reserved. 13 Ethics  and  security  must  be   primary  considerations  in  any   digital  transformation.   Exposure  to  risk  scales   in  proportion  to  digital   business  operations.   To  protect  against  downside  risk,   businesses  must  foster  strong  ethical,   effectively  use  security  to  protect  against   external  threats,  and  build  trusting   relationships  with  ecosystem  stakeholders.   In  procuring  new  technologies,   security  and  ethics  must  be   evaluation  criteria.   Look  for  opportunities  to  build   trust  at  every  engagement  point   along  the  customer  journey.  
  • 14. Copyright  ©  2016  Accenture.  All  rights  reserved. Thank  you #techvision2016 www.accenture.com/technologyvision

Notes de l'éditeur

  1. Source: ”Apple Tells U.S. Judge ‘Impossible' to Unlock New iPhones,” Reuters, October 20, 2015.