SlideShare a Scribd company logo
1 of 8
Download to read offline
Executive Report
Security
Implications of
the Accenture
Technology
Vision 2015
The digital business era and the
rapidly growing Internet of Things
(IoT) are adding billions of devices
and data connections between
businesses, smart machines
and consumers. As connections,
data and interactions grow,
security becomes an increasingly
important and pervasive issue.
#techvision2015
2
Leading businesses are stretching their boundaries
and creating the fabric that connects customers,
services and devices through the IoT1
. Security
implications emerge that should be proactively
addressed by enterprises looking to operate in the
broad digital ecosystem and the “We Economy.”
Accenture Technology Labs identified five security
implications businesses should address to stretch
their digital boundaries:
Edge Autonomy
Enabling autonomous devices at the edge
Data Integrity
Making data-driven decisions at Internet of
Things scale
Big Data Security
Securing volume, variety and velocity
Security Platforms
Maximizing protection across digital
ecosystem platforms
Customer Trust
Building customer trust in a digital economy
3
SECURITY IMPLICATIONS OF THE ACCENTURE TECHNOLOGY VISION 2015
Edge Autonomy
Many of the smart devices entering the
marketplace are considered on the edge, such as
embedded sensors, smart meters and wearable
devices. These devices typically have fixed
functions, perform specific tasks and are set up
outside a business’ security perimeter. Some
devices connect directly to the Internet. Security
concerns for edge devices include physical
tampering, data integrity, device authentication
and privilege management.
What should organizations do? Enterprises using
edge devices must extend their security footprint
beyond their existing borders and take a holistic
approach to security planning before deploying
these types of devices. Options to evaluate include
physical protection, data encryption, network
access control, trust zones for device operation,
whitelisting for device access and intrusion
detection. Although edge devices are operating
with more autonomy, organizations must maintain
supervisory control over the devices. Security
planning should include breach scenarios
and recovery.
Data Integrity
Edge devices and the IoT generate increasingly larger
amounts of data for organizations to collect, process
and analyze. To reap the most benefit, enterprises
should ensure they can rely on the integrity of that
data. This becomes increasingly important as smart
tools trigger automatic action and make more
informed decisions.
What should organizations do? Data assurance is
key, and should be confirmed through every stage of
the data life cycle, from creation to disposal. For
devices that do not have effective security controls
built in, evaluate IoT gateways and agents to perform
these functions. Establish security policies for the
data to be collected, including how to handle
personal information. Data quality tools and audit
frameworks should scale to match the speed and
volume of operations. Remember to evaluate the
communications protocols being used; IoT protocols
offer different security capabilities, depending on the
underlying network protocol.
#techvision2015
4
Big Data Security
With the exponential growth in data, it’s critical
for organizations to securely process and protect
what they collect. Many traditional database
management systems cannot scale to handle the
three Vs of big data: volume, acquisition velocity
and data variety. Large data repositories being
formed also become targets for attack. Some
cloud-based storage policies make it difficult to
use data encryption effectively because of an “all
or nothing” approach.
What should organizations do? Apply the
principles of information security across all aspects
of data collection and management. Processing
tools should be carefully evaluated for security
features. Consider the variety of data elements to
be collected; some may not be sensitive on their
own, but become so when combined with other
pieces of information. Segregate the data collected
based on sensitivity level and compliance
requirements, and protect that data with
attribute-based encryption. Secure big data
platforms and monitor the access to that data.
Evaluate products that offer end-to-end
data encryption.
Security Platforms
As digital industry ecosystems develop with the IoT,
platform-based businesses offer opportunities for
growth and profitability. Digital platforms will
support machine-to-machine communications and
advanced analytics, with intelligent enterprises
benefitting from shared, cross-industry data. With
these platform capabilities, businesses must
increase their focus on security, leveraging the
platform to augment existing security intelligence.
Increased processing power, data science and
cognitive technology can help organizations
prepare for the growing wave of complex
cyber-attacks.
What should organizations do? Evaluate all digital
platforms, including cross-industry, for
vulnerabilities and monitor them for irregular
behavior. Select platforms that provide cyber-threat
assessment indicators. Threat modeling can help
organizations understand what adversaries might
target within the platforms. Identify security
threats from data collected from numerous systems
and devices into a broader ecosystem. Look for
changes in system performance or in customer
behavior that could signal threats. Use ecosystem
partners to brainstorm security challenges and
evaluate how the platform can monitor devices for
abnormal activity.
5
SECURITY IMPLICATIONS OF THE ACCENTURE TECHNOLOGY VISION 2015
Customer Trust
To succeed in the “Internet of Me” era, digital
businesses will need to deliver highly personalized
products and services, based on customers’ specific
habits and preferences. To meet these expectations,
businesses collect personally identifiable
information, and subsequently hold an increased
responsibility to protect the customer information
that is gathered. Organizations must apply more
stringent security measures to protect customers’
privacy, in order to build and maintain trust.
What should organizations do? Become
transparent about what data is collected and how
it will be used. Establish responsible data
management practices to protect the information.
When processing data, use privacy-preserving
analytics techniques. Innovative approaches can
appeal to privacy-wary customers, such as applying
enhanced services to protect customer data, using
anonymous services, or deploying global identity
validation services so customers have more control
over their data.
#techvision2015
6
Forward-thinking business
leaders who address the security
implications of the broad
digital ecosystem will be better
positioned to capitalize on the
growth opportunities available.
Establish security approaches
and potential threat responses
with your business planning,
to maximize protection across
digital ecosystem platforms and
build trust with both ecosystem
partners and customers.
7
SECURITY IMPLICATIONS OF THE ACCENTURE TECHNOLOGY VISION 2015
Copyright © 2015 Accenture
All rights reserved.
Accenture, its logo, and
High Performance Delivered
are trademarks of Accenture.
For more information:
Prith Banerjee
Managing Director, Accenture Technology R&D
prithviraj.banerjee@accenture.com
Lisa O’Connor
Managing Director, Accenture Technology Labs
Security R&D
lisa.oconnor@accenture.com
Malek Ben Salem
Research & Development Principal,
Accenture Security
malek.ben.salem@accenture.com
www.accenture.com/securityvision
About Accenture
Accenture is a global management consulting,
technology services and outsourcing company,
with approximately 319,000 people serving
clients in more than 120 countries. Combining
unparalleled experience, comprehensive
capabilities across all industries and business
functions, and extensive research on the world’s
most successful companies, Accenture collaborates
with clients to help them become high-performance
businesses and governments. The company
generated net revenues of US$30.0 billion for
the fiscal year ended Aug. 31, 2014. Its home
page is www.accenture.com.
CONTACTS
1
The Accenture Technology Vision 2015
(http://www.accenture.com/us-en/Pages/
insight-technology-vision-2015.aspx)

More Related Content

What's hot

Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationHarnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationAccenture Operations
 
IT Security: Implications for the Technology Vision 2015
IT Security: Implications for the Technology Vision 2015IT Security: Implications for the Technology Vision 2015
IT Security: Implications for the Technology Vision 2015accenture
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalAccenture Technology
 
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderAccenture Australia
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Teamaccenture
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to Leaderaccenture
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5accenture
 
The Accenture Technology Vision 2016 for Utilities
The Accenture Technology Vision 2016 for UtilitiesThe Accenture Technology Vision 2016 for Utilities
The Accenture Technology Vision 2016 for Utilitiesaccenture
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016Accenture Operations
 
The Collaboration Imperative in Utility Distribution
The Collaboration Imperative in Utility DistributionThe Collaboration Imperative in Utility Distribution
The Collaboration Imperative in Utility Distributionaccenture
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Why Software as a Service (SaaS) requires a new approach to Application Manag...
Why Software as a Service (SaaS) requires a new approach to Application Manag...Why Software as a Service (SaaS) requires a new approach to Application Manag...
Why Software as a Service (SaaS) requires a new approach to Application Manag...Accenture Technology
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Accenture Operations
 
Boost your AIQ: Transforming to an AI Business
Boost your AIQ: Transforming to an AI BusinessBoost your AIQ: Transforming to an AI Business
Boost your AIQ: Transforming to an AI Businessaccenture
 
NYC Companies See the Value of Emerging Tech, But Are They Ready?
NYC Companies See the Value of Emerging Tech, But Are They Ready?NYC Companies See the Value of Emerging Tech, But Are They Ready?
NYC Companies See the Value of Emerging Tech, But Are They Ready?accenture
 
The Untapped Power of the Digital Supply Chain Collaboration Platform
The Untapped Power of the Digital Supply Chain Collaboration PlatformThe Untapped Power of the Digital Supply Chain Collaboration Platform
The Untapped Power of the Digital Supply Chain Collaboration Platformaccenture
 

What's hot (20)

Cloud in the Boardroom
Cloud in the BoardroomCloud in the Boardroom
Cloud in the Boardroom
 
Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationHarnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open Innovation
 
IT Security: Implications for the Technology Vision 2015
IT Security: Implications for the Technology Vision 2015IT Security: Implications for the Technology Vision 2015
IT Security: Implications for the Technology Vision 2015
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leader
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to Leader
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
The Accenture Technology Vision 2016 for Utilities
The Accenture Technology Vision 2016 for UtilitiesThe Accenture Technology Vision 2016 for Utilities
The Accenture Technology Vision 2016 for Utilities
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
The Collaboration Imperative in Utility Distribution
The Collaboration Imperative in Utility DistributionThe Collaboration Imperative in Utility Distribution
The Collaboration Imperative in Utility Distribution
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Why Software as a Service (SaaS) requires a new approach to Application Manag...
Why Software as a Service (SaaS) requires a new approach to Application Manag...Why Software as a Service (SaaS) requires a new approach to Application Manag...
Why Software as a Service (SaaS) requires a new approach to Application Manag...
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure
 
Tech Vision 2019: Infographic
Tech Vision 2019: InfographicTech Vision 2019: Infographic
Tech Vision 2019: Infographic
 
Boost your AIQ: Transforming to an AI Business
Boost your AIQ: Transforming to an AI BusinessBoost your AIQ: Transforming to an AI Business
Boost your AIQ: Transforming to an AI Business
 
NYC Companies See the Value of Emerging Tech, But Are They Ready?
NYC Companies See the Value of Emerging Tech, But Are They Ready?NYC Companies See the Value of Emerging Tech, But Are They Ready?
NYC Companies See the Value of Emerging Tech, But Are They Ready?
 
The Untapped Power of the Digital Supply Chain Collaboration Platform
The Untapped Power of the Digital Supply Chain Collaboration PlatformThe Untapped Power of the Digital Supply Chain Collaboration Platform
The Untapped Power of the Digital Supply Chain Collaboration Platform
 

Viewers also liked

Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Den Reymer
 
Accenture and SAP Business Solutions Group
Accenture and SAP Business Solutions GroupAccenture and SAP Business Solutions Group
Accenture and SAP Business Solutions GroupAccenture Technology
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Symantec
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistMatthew Rosenquist
 
Security Maturity Models.
Security Maturity Models.Security Maturity Models.
Security Maturity Models.Priyanka Aash
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Sarfaraz Chougule
 
Accenture Liquid Application Studio
Accenture Liquid Application StudioAccenture Liquid Application Studio
Accenture Liquid Application StudioAccenture Technology
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitectureKris Kimmerle
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Technology Vision 2017 infographic
Technology Vision 2017 infographicTechnology Vision 2017 infographic
Technology Vision 2017 infographicAccenture Technology
 

Viewers also liked (10)

Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
 
Accenture and SAP Business Solutions Group
Accenture and SAP Business Solutions GroupAccenture and SAP Business Solutions Group
Accenture and SAP Business Solutions Group
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
Security Maturity Models.
Security Maturity Models.Security Maturity Models.
Security Maturity Models.
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
Accenture Liquid Application Studio
Accenture Liquid Application StudioAccenture Liquid Application Studio
Accenture Liquid Application Studio
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Technology Vision 2017 infographic
Technology Vision 2017 infographicTechnology Vision 2017 infographic
Technology Vision 2017 infographic
 

Similar to Security Implications of Accenture Technology Vision 2015 - Executive Report

Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfRahimMakhani2
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet accenture
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economyaccenture
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityCitrix
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxS .Ali Raza
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecurityCigniti Technologies Ltd
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
BCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationBCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationGareth Niblett
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Ulf Mattsson
 
Acumen insurance Data Warehouse
Acumen insurance Data WarehouseAcumen insurance Data Warehouse
Acumen insurance Data WarehouseNIIT Technologies
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Accenture Technology
 
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final  [Auto-saved].pptxGroup 4 IT INfrastructure Group presentation Final  [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptxOdedeleIfeoluwa
 
Top Technology Trends in Insurance Domain.pdf
Top Technology Trends in Insurance Domain.pdfTop Technology Trends in Insurance Domain.pdf
Top Technology Trends in Insurance Domain.pdfledumsd
 
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...lithanhall
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 

Similar to Security Implications of Accenture Technology Vision 2015 - Executive Report (20)

Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
BCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationBCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber Innovation
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
Acumen insurance Data Warehouse
Acumen insurance Data WarehouseAcumen insurance Data Warehouse
Acumen insurance Data Warehouse
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final  [Auto-saved].pptxGroup 4 IT INfrastructure Group presentation Final  [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
 
Top Technology Trends in Insurance Domain.pdf
Top Technology Trends in Insurance Domain.pdfTop Technology Trends in Insurance Domain.pdf
Top Technology Trends in Insurance Domain.pdf
 
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 

More from Accenture Technology

Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Technology
 
Helping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayHelping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayAccenture Technology
 
Accenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Technology
 
Helping you get back to the workplace confidently
Helping you get back to the workplace confidentlyHelping you get back to the workplace confidently
Helping you get back to the workplace confidentlyAccenture Technology
 
Driving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldDriving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldAccenture Technology
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology
 
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology
 
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology
 
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology
 
Elevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayElevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayAccenture Technology
 
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAutomating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAccenture Technology
 
Technology Vision 2019 for Workday
Technology Vision 2019 for WorkdayTechnology Vision 2019 for Workday
Technology Vision 2019 for WorkdayAccenture Technology
 
Accenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology
 

More from Accenture Technology (20)

Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020
 
Helping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayHelping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + Workday
 
Accenture Labs Innovation Stories
Accenture Labs Innovation StoriesAccenture Labs Innovation Stories
Accenture Labs Innovation Stories
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
 
Accenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP Solutions
 
Highlights on the five key trends
Highlights on the five key trendsHighlights on the five key trends
Highlights on the five key trends
 
Helping you get back to the workplace confidently
Helping you get back to the workplace confidentlyHelping you get back to the workplace confidently
Helping you get back to the workplace confidently
 
Driving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldDriving Workday transformation in a virtual world
Driving Workday transformation in a virtual world
 
Accenture + Red Hat
Accenture + Red HatAccenture + Red Hat
Accenture + Red Hat
 
Accenture and Mercedes Case Study
Accenture and Mercedes Case StudyAccenture and Mercedes Case Study
Accenture and Mercedes Case Study
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: Infographic
 
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: Overview
 
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and Me
 
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNA
 
Elevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayElevating the Workforce Experience with Workday
Elevating the Workforce Experience with Workday
 
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAutomating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
 
Technology Vision for SAP 2019
Technology Vision for SAP 2019Technology Vision for SAP 2019
Technology Vision for SAP 2019
 
Technology Vision 2019 for Workday
Technology Vision 2019 for WorkdayTechnology Vision 2019 for Workday
Technology Vision 2019 for Workday
 
Accenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for Pega
 

Recently uploaded

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 

Recently uploaded (20)

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 

Security Implications of Accenture Technology Vision 2015 - Executive Report

  • 1. Executive Report Security Implications of the Accenture Technology Vision 2015
  • 2. The digital business era and the rapidly growing Internet of Things (IoT) are adding billions of devices and data connections between businesses, smart machines and consumers. As connections, data and interactions grow, security becomes an increasingly important and pervasive issue. #techvision2015 2
  • 3. Leading businesses are stretching their boundaries and creating the fabric that connects customers, services and devices through the IoT1 . Security implications emerge that should be proactively addressed by enterprises looking to operate in the broad digital ecosystem and the “We Economy.” Accenture Technology Labs identified five security implications businesses should address to stretch their digital boundaries: Edge Autonomy Enabling autonomous devices at the edge Data Integrity Making data-driven decisions at Internet of Things scale Big Data Security Securing volume, variety and velocity Security Platforms Maximizing protection across digital ecosystem platforms Customer Trust Building customer trust in a digital economy 3 SECURITY IMPLICATIONS OF THE ACCENTURE TECHNOLOGY VISION 2015
  • 4. Edge Autonomy Many of the smart devices entering the marketplace are considered on the edge, such as embedded sensors, smart meters and wearable devices. These devices typically have fixed functions, perform specific tasks and are set up outside a business’ security perimeter. Some devices connect directly to the Internet. Security concerns for edge devices include physical tampering, data integrity, device authentication and privilege management. What should organizations do? Enterprises using edge devices must extend their security footprint beyond their existing borders and take a holistic approach to security planning before deploying these types of devices. Options to evaluate include physical protection, data encryption, network access control, trust zones for device operation, whitelisting for device access and intrusion detection. Although edge devices are operating with more autonomy, organizations must maintain supervisory control over the devices. Security planning should include breach scenarios and recovery. Data Integrity Edge devices and the IoT generate increasingly larger amounts of data for organizations to collect, process and analyze. To reap the most benefit, enterprises should ensure they can rely on the integrity of that data. This becomes increasingly important as smart tools trigger automatic action and make more informed decisions. What should organizations do? Data assurance is key, and should be confirmed through every stage of the data life cycle, from creation to disposal. For devices that do not have effective security controls built in, evaluate IoT gateways and agents to perform these functions. Establish security policies for the data to be collected, including how to handle personal information. Data quality tools and audit frameworks should scale to match the speed and volume of operations. Remember to evaluate the communications protocols being used; IoT protocols offer different security capabilities, depending on the underlying network protocol. #techvision2015 4
  • 5. Big Data Security With the exponential growth in data, it’s critical for organizations to securely process and protect what they collect. Many traditional database management systems cannot scale to handle the three Vs of big data: volume, acquisition velocity and data variety. Large data repositories being formed also become targets for attack. Some cloud-based storage policies make it difficult to use data encryption effectively because of an “all or nothing” approach. What should organizations do? Apply the principles of information security across all aspects of data collection and management. Processing tools should be carefully evaluated for security features. Consider the variety of data elements to be collected; some may not be sensitive on their own, but become so when combined with other pieces of information. Segregate the data collected based on sensitivity level and compliance requirements, and protect that data with attribute-based encryption. Secure big data platforms and monitor the access to that data. Evaluate products that offer end-to-end data encryption. Security Platforms As digital industry ecosystems develop with the IoT, platform-based businesses offer opportunities for growth and profitability. Digital platforms will support machine-to-machine communications and advanced analytics, with intelligent enterprises benefitting from shared, cross-industry data. With these platform capabilities, businesses must increase their focus on security, leveraging the platform to augment existing security intelligence. Increased processing power, data science and cognitive technology can help organizations prepare for the growing wave of complex cyber-attacks. What should organizations do? Evaluate all digital platforms, including cross-industry, for vulnerabilities and monitor them for irregular behavior. Select platforms that provide cyber-threat assessment indicators. Threat modeling can help organizations understand what adversaries might target within the platforms. Identify security threats from data collected from numerous systems and devices into a broader ecosystem. Look for changes in system performance or in customer behavior that could signal threats. Use ecosystem partners to brainstorm security challenges and evaluate how the platform can monitor devices for abnormal activity. 5 SECURITY IMPLICATIONS OF THE ACCENTURE TECHNOLOGY VISION 2015
  • 6. Customer Trust To succeed in the “Internet of Me” era, digital businesses will need to deliver highly personalized products and services, based on customers’ specific habits and preferences. To meet these expectations, businesses collect personally identifiable information, and subsequently hold an increased responsibility to protect the customer information that is gathered. Organizations must apply more stringent security measures to protect customers’ privacy, in order to build and maintain trust. What should organizations do? Become transparent about what data is collected and how it will be used. Establish responsible data management practices to protect the information. When processing data, use privacy-preserving analytics techniques. Innovative approaches can appeal to privacy-wary customers, such as applying enhanced services to protect customer data, using anonymous services, or deploying global identity validation services so customers have more control over their data. #techvision2015 6
  • 7. Forward-thinking business leaders who address the security implications of the broad digital ecosystem will be better positioned to capitalize on the growth opportunities available. Establish security approaches and potential threat responses with your business planning, to maximize protection across digital ecosystem platforms and build trust with both ecosystem partners and customers. 7 SECURITY IMPLICATIONS OF THE ACCENTURE TECHNOLOGY VISION 2015
  • 8. Copyright © 2015 Accenture All rights reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture. For more information: Prith Banerjee Managing Director, Accenture Technology R&D prithviraj.banerjee@accenture.com Lisa O’Connor Managing Director, Accenture Technology Labs Security R&D lisa.oconnor@accenture.com Malek Ben Salem Research & Development Principal, Accenture Security malek.ben.salem@accenture.com www.accenture.com/securityvision About Accenture Accenture is a global management consulting, technology services and outsourcing company, with approximately 319,000 people serving clients in more than 120 countries. Combining unparalleled experience, comprehensive capabilities across all industries and business functions, and extensive research on the world’s most successful companies, Accenture collaborates with clients to help them become high-performance businesses and governments. The company generated net revenues of US$30.0 billion for the fiscal year ended Aug. 31, 2014. Its home page is www.accenture.com. CONTACTS 1 The Accenture Technology Vision 2015 (http://www.accenture.com/us-en/Pages/ insight-technology-vision-2015.aspx)