SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
Security Technology Vision 2016:
Empowering Your
Cyber Defenders to
Enable Digital Trust
Executive Summary
www.accenture.com/SecurityVision @AccentureSecure
2 Security Technology Vision 2016
Empowering Your Cyber Defenders
to Enable Digital Trust
Fighter pilots depend on artificial intelligence, cockpit automation
and the latest virtual reality visualization technologies to elevate
their reaction times and abilities to peak levels. In the next five
years, security professionals will employ similar technologies to
predict, detect, respond to and remediate digital attacks. At the
same time, enterprises will also rely on new, more flexible staffing
models to make sure they have the “top gun” security expertise
they need, when they need it.
Underpinning all of this change will
be the mandate to boost security’s
effectiveness in supporting the
business’ efforts to attain digital
trust, as new technologies, workforce
models and the rapid pace of change
in the digital economy raise potent
new digital risk issues. Digital
businesses will encounter new risks
that traditional enterprises never
experienced. Consequently, security
professionals must assume a more
proactive stance as they engage
with business owners to identify new
risks, achieving even greater levels of
security effectiveness. The need for this
shift is already apparent: attackers are
overwhelming organizations that lack
enough highly skilled people with “eyes
on glass” to make sense of it all and
defend the enterprise. In fact, recent
studies show that up to 45 percent of
organizations say they have increasing
difficulty finding qualified people.1
And organizations don’t just lack skilled
analysts, either: they need qualified
people in all security-related functions,
including strategy.
In response, leading organizations
are adopting disruptive innovations
like intelligent automation and
the liquid workforce. Intelligent
automation will enable future security
teams to link artificial intelligence
(AI) models—thinking machines
capable of assessing situations and
taking action—with automation and
interactive visualization in ways
that enhance security professional
capabilities. And the liquid workforce,
with its crowdsourcing and freelance
staffing options, will make it easier
for enterprises to access talent for
short-term projects. However, these
disruptive innovations also represent
potential security threats because they
can open new attack surfaces within
organizations that hackers can exploit.
1
“The 2015 (ISC)2
Global Information Security Workforce Study,” Frost & Sullivan.
www.accenture.com/SecurityVision @AccentureSecure
3 Security Technology Vision 2016
www.accenture.com/SecurityVision @AccentureSecure
4 Security Technology Vision 2016
2020: A day in the Life of a Security Professional
Intelligent automation, the liquid workforce, and visualization
will fundamentally change the kinds of work people do and the
style of working they adopt when keeping the company’s digital
assets safe from encroaching attackers. These trends will have
a pronounced effect on the ways security professionals approach
their jobs. Looking ahead to 2020, the following perspective
describes the probable changes security defenders can expect,
given the anticipated pace of technological change over the
next five years.
Aided by artificial intelligence, visualization enables
organizations to understand a tsunami of data quickly,
cutting through “noise” and finding clarity.
www.accenture.com/SecurityVision @AccentureSecure
5 Security Technology Vision 2016
Intelligent Automation
Steps Up
Organizations will increasingly use
AI models capable of understanding
specific concepts and predicting future
actions. Such models will allow security
teams to shift from simply detecting
risks to actively normalizing, validating,
contextualizing and prioritizing threats.
AI will also enable automated responses
to activities. Essentially, intelligent
automation will turn a proficient analyst
into a highly skilled one. Equipped
with AI-infused process automation,
tomorrow’s professionals will be more
competent and find it easier to plug
themselves into an unfamiliar security
organization. That’s because they will
work with a mature set of defined and
automated security processes and have
a clear understanding of what is critical
within the business, enabling them to
respond to threats effectively.
The Role of Artificial
Intelligence in the Breach
Security will employ AI to understand the
larger context of a breach and anticipate
its subsequent evolution. By combining
AI with security function automation,
it becomes possible to automate and
guide the process—to the point where
ancillary tasks become trivial to execute.
This will enable staff to concentrate
on major threats by real threat actors
instead of being distracted by minor
issues. Automation will also introduce
new engagement models and give
defenders increasingly sophisticated
ways to respond to attackers. These
include the near-real-time manipulation
of data that subtly changes what
adversaries see as they target an
organization, bringing active defense
to the forefront of cyberdefense.
Today’s fighter pilots augment their
skills and training with cockpit
automation that elevates their
capabilities and enables them to fly
massively complex aircraft routinely
and safely. Likewise, automation will
allow tomorrow’s security professional
with average capabilities and training to
perform like a highly skilled practitioner.
By standardizing excellent performance
with automation, companies can begin
to get their arms around the growing
shortage of skilled security people.
How Artificial Intelligence
will Enable Visualization
By 2020, visualization will be a core
element of enterprise cybersecurity
strategy, harnessing the innate human
ability to zero in on patterns quickly
and pick out anomalies. Visualization
will allow security teams to understand
at a glance how contextually valid a
threat is and which areas of the business
it affects. By shifting away from log and
text interpretations and replacing them
with visual comprehension, organizations
will be able to scale their ability to
interpret security events. AI supports
the interpretation of patterns and
behaviors that could constitute risks,
and with enough “learning” it can
validate legitimate threats and
enable the cyber hunt.
Aided by AI, visualization enables
organizations to understand a tsunami
of data quickly, cutting through “noise”
and finding clarity. Today, visualization
remains nascent, but within two years,
the security professional will be able to
visualize the entire enterprise. And
within three years, the power of
advanced graphics processing units
will enable leading companies to do
this in real time.
www.accenture.com/SecurityVision @AccentureSecure
6 Security Technology Vision 2016
The Liquid Workforce Enables Concrete
Security Staffing Solutions
While organizations are investing in the tools and technologies
they need to keep pace in the digital era, most are neglecting
a critical factor—their people. In order to capitalize on the
opportunities presented by technology innovations, future
organizations will focus on helping their people become a
more fluid, agile and flexible workforce. From a security
perspective, firms currently face challenges in both finding
and keeping new staff excited and intellectually engaged
in problem-solving activities.
The liquid workforce model could
be the answer, since the use of
freelancers and crowdsourcing—
where organizations solicit services
from a crowd of people, rather
than from traditional employees or
suppliers—are major elements of the
approach. In fact, Accenture believes
40 percent of a business’ entire
workforce will be freelance by 2020.
The outsourcing of security jobs
requires an immense amount of
trust—the sort that only emerges
from a strong relationship between
an organization and its service provider.
Where such relationships exist or can
be created in the future, a role for
freelancers and crowdsourcing will
emerge within the security function.
Tomorrow’s liquid workforce will
enable companies to benefit from
a far greater pool of security
experience and expertise than
may be available today.
However, while crowdsourcing can
provide clear benefits, it can also
expose a company to risk. In fact,
a recent “bug hunter” who discovered
an exploit in a popular social
networking site caused tangible
damage by abusing his discovery
after reporting it to the company.
One possible response to such risks
involves Synack, a company that offers
freelance penetration tests via a private
network of skilled, rigorously vetted
security researchers from around
the world. Synack employs specific
technologies that enable clients to
control the scope and degree of
access the tests allow.
Over the next five years, enterprises
need to find ways to reduce the
potential cybersecurity risks to
acceptable levels. Successful
companies will likely employ a core
team of security people with high-
powered skills that they will augment
using crowdsourced and freelance
labor to meet the demands of the
digital business more efficiently
and effectively.
www.accenture.com/SecurityVision @AccentureSecure
7 Security Technology Vision 2016
Conclusion
The sheer volume, velocity and variety of data that security
organizations process in the future will dwarf today’s already
massive information overload. Lurking within this deluge,
increasingly sophisticated attackers will test every defense
to its limit, even as new business technologies transform the
ways organizations work, exposing them to unexpected threats.
In response, security professionals must seek new ways to keep
up with the rapid pace of change. Innovations like intelligent
automation, visualization and the liquid workforce will all play
prominent roles in tomorrow’s security landscape, transforming
an enterprise’s security program to prepare it for 2020.
This document makes descriptive reference to trademarks that
may be owned by others.The use of such trademarks herein is not
an assertion of ownership of such trademarks by Accenture and is
not intended to represent or imply the existence of an association
between Accenture and the lawful owners of such trademarks.
Copyright © 2016 Accenture
All rights reserved.
Accenture, its logo, and
High Performance Delivered
are trademarks of Accenture.
About Accenture
Accenture is a leading global professional services company,
providing a broad range of services and solutions in strategy,
consulting, digital, technology and operations. Combining
unmatched experience and specialized skills across more
than 40 industries and all business functions—underpinned
by the world’s largest delivery network—Accenture works at
the intersection of business and technology to help clients
improve their performance and create sustainable value for their
stakeholders. With approximately 373,000 people serving clients
in more than 120 countries, Accenture drives innovation to
improve the way the world works and lives.
Visit us at www.accenture.com.
www.accenture.com/SecurityVision
@AccentureSecure
Contributors
Marc Carrel-Billiard
Global Managing Director,
Accenture Technology R&D
marc.carrel-billiard@accenture.com
Lisa O’Connor
Managing Director,
Accenture Technology Labs,
Security R&D
lisa.oconnor@accenture.com
Matthew Carver
Senior Manager,
Accenture Technology Labs,
Security R&D
matthew.carver@accenture.com
Malek Ben Salem
Principal,
Accenture Technology Labs,
Security R&D
malek.ben.salem@accenture.com
Joshua Patterson
Principal,
Accenture Technology Labs,
Security R&D
joshua.patterson@accenture.com

Contenu connexe

En vedette

Going Deep: Mining Experiential and Behavioral Data in VR
Going Deep: Mining Experiential and Behavioral Data in VRGoing Deep: Mining Experiential and Behavioral Data in VR
Going Deep: Mining Experiential and Behavioral Data in VRAccenture Technology
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital ageAccenture Technology
 
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...Accenture Technology
 
Accenture Technology Vision 2016. Focus on Pega® Technology.
Accenture Technology Vision 2016. Focus on Pega® Technology.Accenture Technology Vision 2016. Focus on Pega® Technology.
Accenture Technology Vision 2016. Focus on Pega® Technology.Accenture Technology
 
SAP S/4 HANA Industry Road-Maps: Map the journey to your digital future
SAP S/4 HANA Industry Road-Maps: Map the journey to your digital futureSAP S/4 HANA Industry Road-Maps: Map the journey to your digital future
SAP S/4 HANA Industry Road-Maps: Map the journey to your digital futureAccenture Technology
 
Strategic IT Sourcing: What’s the Future?
Strategic IT Sourcing: What’s the Future? Strategic IT Sourcing: What’s the Future?
Strategic IT Sourcing: What’s the Future? Accenture Technology
 
Staking a claim in the Platform Economy with SAP
Staking a claim in the Platform Economy with SAPStaking a claim in the Platform Economy with SAP
Staking a claim in the Platform Economy with SAPAccenture Technology
 
Accenture Technology Vision for Oracle - 2016
Accenture Technology Vision for Oracle - 2016Accenture Technology Vision for Oracle - 2016
Accenture Technology Vision for Oracle - 2016Accenture Technology
 
Design for Humans - Tech Vision 2017 Trend 4
Design for Humans - Tech Vision 2017 Trend 4Design for Humans - Tech Vision 2017 Trend 4
Design for Humans - Tech Vision 2017 Trend 4Accenture Technology
 
Intelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons LearnedIntelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons LearnedAccenture Technology
 
Accenture DevOps: Delivering applications at the pace of business
Accenture DevOps: Delivering applications at the pace of businessAccenture DevOps: Delivering applications at the pace of business
Accenture DevOps: Delivering applications at the pace of businessAccenture Technology
 
Ecosystem Power Plays - Tech Vision 2017 Trend 2
Ecosystem Power Plays - Tech Vision 2017 Trend 2Ecosystem Power Plays - Tech Vision 2017 Trend 2
Ecosystem Power Plays - Tech Vision 2017 Trend 2Accenture Technology
 
Siteworx & Triblio Social Selling Presentation
Siteworx & Triblio Social Selling PresentationSiteworx & Triblio Social Selling Presentation
Siteworx & Triblio Social Selling PresentationTriblio
 
Introduction to SaaStr Attendees
Introduction to SaaStr AttendeesIntroduction to SaaStr Attendees
Introduction to SaaStr AttendeesZapStitch
 
Building a Results-Based Monitoring and Evaluation System 建立面向结果的监测与评价系统
Building a Results-Based Monitoring and Evaluation System 建立面向结果的监测与评价系统Building a Results-Based Monitoring and Evaluation System 建立面向结果的监测与评价系统
Building a Results-Based Monitoring and Evaluation System 建立面向结果的监测与评价系统Dadang Solihin
 

En vedette (17)

Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Going Deep: Mining Experiential and Behavioral Data in VR
Going Deep: Mining Experiential and Behavioral Data in VRGoing Deep: Mining Experiential and Behavioral Data in VR
Going Deep: Mining Experiential and Behavioral Data in VR
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital age
 
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
 
Accenture Technology Vision 2016. Focus on Pega® Technology.
Accenture Technology Vision 2016. Focus on Pega® Technology.Accenture Technology Vision 2016. Focus on Pega® Technology.
Accenture Technology Vision 2016. Focus on Pega® Technology.
 
SAP S/4 HANA Industry Road-Maps: Map the journey to your digital future
SAP S/4 HANA Industry Road-Maps: Map the journey to your digital futureSAP S/4 HANA Industry Road-Maps: Map the journey to your digital future
SAP S/4 HANA Industry Road-Maps: Map the journey to your digital future
 
Strategic IT Sourcing: What’s the Future?
Strategic IT Sourcing: What’s the Future? Strategic IT Sourcing: What’s the Future?
Strategic IT Sourcing: What’s the Future?
 
Staking a claim in the Platform Economy with SAP
Staking a claim in the Platform Economy with SAPStaking a claim in the Platform Economy with SAP
Staking a claim in the Platform Economy with SAP
 
Accenture Technology Vision for Oracle - 2016
Accenture Technology Vision for Oracle - 2016Accenture Technology Vision for Oracle - 2016
Accenture Technology Vision for Oracle - 2016
 
Design for Humans - Tech Vision 2017 Trend 4
Design for Humans - Tech Vision 2017 Trend 4Design for Humans - Tech Vision 2017 Trend 4
Design for Humans - Tech Vision 2017 Trend 4
 
Intelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons LearnedIntelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons Learned
 
Accenture DevOps: Delivering applications at the pace of business
Accenture DevOps: Delivering applications at the pace of businessAccenture DevOps: Delivering applications at the pace of business
Accenture DevOps: Delivering applications at the pace of business
 
Ecosystem Power Plays - Tech Vision 2017 Trend 2
Ecosystem Power Plays - Tech Vision 2017 Trend 2Ecosystem Power Plays - Tech Vision 2017 Trend 2
Ecosystem Power Plays - Tech Vision 2017 Trend 2
 
AI and the Future of Growth
AI and the Future of GrowthAI and the Future of Growth
AI and the Future of Growth
 
Siteworx & Triblio Social Selling Presentation
Siteworx & Triblio Social Selling PresentationSiteworx & Triblio Social Selling Presentation
Siteworx & Triblio Social Selling Presentation
 
Introduction to SaaStr Attendees
Introduction to SaaStr AttendeesIntroduction to SaaStr Attendees
Introduction to SaaStr Attendees
 
Building a Results-Based Monitoring and Evaluation System 建立面向结果的监测与评价系统
Building a Results-Based Monitoring and Evaluation System 建立面向结果的监测与评价系统Building a Results-Based Monitoring and Evaluation System 建立面向结果的监测与评价系统
Building a Results-Based Monitoring and Evaluation System 建立面向结果的监测与评价系统
 

Plus de Accenture Technology

Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Technology
 
Helping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayHelping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayAccenture Technology
 
Accenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Technology
 
Helping you get back to the workplace confidently
Helping you get back to the workplace confidentlyHelping you get back to the workplace confidently
Helping you get back to the workplace confidentlyAccenture Technology
 
Driving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldDriving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldAccenture Technology
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology
 
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology
 
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology
 
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology
 
Elevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayElevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayAccenture Technology
 
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAutomating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAccenture Technology
 
Technology Vision 2019 for Workday
Technology Vision 2019 for WorkdayTechnology Vision 2019 for Workday
Technology Vision 2019 for WorkdayAccenture Technology
 
Accenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology
 

Plus de Accenture Technology (20)

Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020
 
Helping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayHelping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + Workday
 
Accenture Labs Innovation Stories
Accenture Labs Innovation StoriesAccenture Labs Innovation Stories
Accenture Labs Innovation Stories
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
 
Accenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP Solutions
 
Highlights on the five key trends
Highlights on the five key trendsHighlights on the five key trends
Highlights on the five key trends
 
Helping you get back to the workplace confidently
Helping you get back to the workplace confidentlyHelping you get back to the workplace confidently
Helping you get back to the workplace confidently
 
Driving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldDriving Workday transformation in a virtual world
Driving Workday transformation in a virtual world
 
Accenture + Red Hat
Accenture + Red HatAccenture + Red Hat
Accenture + Red Hat
 
Accenture and Mercedes Case Study
Accenture and Mercedes Case StudyAccenture and Mercedes Case Study
Accenture and Mercedes Case Study
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: Infographic
 
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: Overview
 
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and Me
 
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNA
 
Elevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayElevating the Workforce Experience with Workday
Elevating the Workforce Experience with Workday
 
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAutomating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
 
Technology Vision for SAP 2019
Technology Vision for SAP 2019Technology Vision for SAP 2019
Technology Vision for SAP 2019
 
Technology Vision 2019 for Workday
Technology Vision 2019 for WorkdayTechnology Vision 2019 for Workday
Technology Vision 2019 for Workday
 
Accenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for Pega
 

Dernier

Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 

Dernier (20)

Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 

Security Technology Vision 2016 - Exec Summary

  • 1. Security Technology Vision 2016: Empowering Your Cyber Defenders to Enable Digital Trust Executive Summary
  • 2. www.accenture.com/SecurityVision @AccentureSecure 2 Security Technology Vision 2016 Empowering Your Cyber Defenders to Enable Digital Trust Fighter pilots depend on artificial intelligence, cockpit automation and the latest virtual reality visualization technologies to elevate their reaction times and abilities to peak levels. In the next five years, security professionals will employ similar technologies to predict, detect, respond to and remediate digital attacks. At the same time, enterprises will also rely on new, more flexible staffing models to make sure they have the “top gun” security expertise they need, when they need it. Underpinning all of this change will be the mandate to boost security’s effectiveness in supporting the business’ efforts to attain digital trust, as new technologies, workforce models and the rapid pace of change in the digital economy raise potent new digital risk issues. Digital businesses will encounter new risks that traditional enterprises never experienced. Consequently, security professionals must assume a more proactive stance as they engage with business owners to identify new risks, achieving even greater levels of security effectiveness. The need for this shift is already apparent: attackers are overwhelming organizations that lack enough highly skilled people with “eyes on glass” to make sense of it all and defend the enterprise. In fact, recent studies show that up to 45 percent of organizations say they have increasing difficulty finding qualified people.1 And organizations don’t just lack skilled analysts, either: they need qualified people in all security-related functions, including strategy. In response, leading organizations are adopting disruptive innovations like intelligent automation and the liquid workforce. Intelligent automation will enable future security teams to link artificial intelligence (AI) models—thinking machines capable of assessing situations and taking action—with automation and interactive visualization in ways that enhance security professional capabilities. And the liquid workforce, with its crowdsourcing and freelance staffing options, will make it easier for enterprises to access talent for short-term projects. However, these disruptive innovations also represent potential security threats because they can open new attack surfaces within organizations that hackers can exploit. 1 “The 2015 (ISC)2 Global Information Security Workforce Study,” Frost & Sullivan.
  • 4. www.accenture.com/SecurityVision @AccentureSecure 4 Security Technology Vision 2016 2020: A day in the Life of a Security Professional Intelligent automation, the liquid workforce, and visualization will fundamentally change the kinds of work people do and the style of working they adopt when keeping the company’s digital assets safe from encroaching attackers. These trends will have a pronounced effect on the ways security professionals approach their jobs. Looking ahead to 2020, the following perspective describes the probable changes security defenders can expect, given the anticipated pace of technological change over the next five years. Aided by artificial intelligence, visualization enables organizations to understand a tsunami of data quickly, cutting through “noise” and finding clarity.
  • 5. www.accenture.com/SecurityVision @AccentureSecure 5 Security Technology Vision 2016 Intelligent Automation Steps Up Organizations will increasingly use AI models capable of understanding specific concepts and predicting future actions. Such models will allow security teams to shift from simply detecting risks to actively normalizing, validating, contextualizing and prioritizing threats. AI will also enable automated responses to activities. Essentially, intelligent automation will turn a proficient analyst into a highly skilled one. Equipped with AI-infused process automation, tomorrow’s professionals will be more competent and find it easier to plug themselves into an unfamiliar security organization. That’s because they will work with a mature set of defined and automated security processes and have a clear understanding of what is critical within the business, enabling them to respond to threats effectively. The Role of Artificial Intelligence in the Breach Security will employ AI to understand the larger context of a breach and anticipate its subsequent evolution. By combining AI with security function automation, it becomes possible to automate and guide the process—to the point where ancillary tasks become trivial to execute. This will enable staff to concentrate on major threats by real threat actors instead of being distracted by minor issues. Automation will also introduce new engagement models and give defenders increasingly sophisticated ways to respond to attackers. These include the near-real-time manipulation of data that subtly changes what adversaries see as they target an organization, bringing active defense to the forefront of cyberdefense. Today’s fighter pilots augment their skills and training with cockpit automation that elevates their capabilities and enables them to fly massively complex aircraft routinely and safely. Likewise, automation will allow tomorrow’s security professional with average capabilities and training to perform like a highly skilled practitioner. By standardizing excellent performance with automation, companies can begin to get their arms around the growing shortage of skilled security people. How Artificial Intelligence will Enable Visualization By 2020, visualization will be a core element of enterprise cybersecurity strategy, harnessing the innate human ability to zero in on patterns quickly and pick out anomalies. Visualization will allow security teams to understand at a glance how contextually valid a threat is and which areas of the business it affects. By shifting away from log and text interpretations and replacing them with visual comprehension, organizations will be able to scale their ability to interpret security events. AI supports the interpretation of patterns and behaviors that could constitute risks, and with enough “learning” it can validate legitimate threats and enable the cyber hunt. Aided by AI, visualization enables organizations to understand a tsunami of data quickly, cutting through “noise” and finding clarity. Today, visualization remains nascent, but within two years, the security professional will be able to visualize the entire enterprise. And within three years, the power of advanced graphics processing units will enable leading companies to do this in real time.
  • 6. www.accenture.com/SecurityVision @AccentureSecure 6 Security Technology Vision 2016 The Liquid Workforce Enables Concrete Security Staffing Solutions While organizations are investing in the tools and technologies they need to keep pace in the digital era, most are neglecting a critical factor—their people. In order to capitalize on the opportunities presented by technology innovations, future organizations will focus on helping their people become a more fluid, agile and flexible workforce. From a security perspective, firms currently face challenges in both finding and keeping new staff excited and intellectually engaged in problem-solving activities. The liquid workforce model could be the answer, since the use of freelancers and crowdsourcing— where organizations solicit services from a crowd of people, rather than from traditional employees or suppliers—are major elements of the approach. In fact, Accenture believes 40 percent of a business’ entire workforce will be freelance by 2020. The outsourcing of security jobs requires an immense amount of trust—the sort that only emerges from a strong relationship between an organization and its service provider. Where such relationships exist or can be created in the future, a role for freelancers and crowdsourcing will emerge within the security function. Tomorrow’s liquid workforce will enable companies to benefit from a far greater pool of security experience and expertise than may be available today. However, while crowdsourcing can provide clear benefits, it can also expose a company to risk. In fact, a recent “bug hunter” who discovered an exploit in a popular social networking site caused tangible damage by abusing his discovery after reporting it to the company. One possible response to such risks involves Synack, a company that offers freelance penetration tests via a private network of skilled, rigorously vetted security researchers from around the world. Synack employs specific technologies that enable clients to control the scope and degree of access the tests allow. Over the next five years, enterprises need to find ways to reduce the potential cybersecurity risks to acceptable levels. Successful companies will likely employ a core team of security people with high- powered skills that they will augment using crowdsourced and freelance labor to meet the demands of the digital business more efficiently and effectively.
  • 7. www.accenture.com/SecurityVision @AccentureSecure 7 Security Technology Vision 2016 Conclusion The sheer volume, velocity and variety of data that security organizations process in the future will dwarf today’s already massive information overload. Lurking within this deluge, increasingly sophisticated attackers will test every defense to its limit, even as new business technologies transform the ways organizations work, exposing them to unexpected threats. In response, security professionals must seek new ways to keep up with the rapid pace of change. Innovations like intelligent automation, visualization and the liquid workforce will all play prominent roles in tomorrow’s security landscape, transforming an enterprise’s security program to prepare it for 2020.
  • 8. This document makes descriptive reference to trademarks that may be owned by others.The use of such trademarks herein is not an assertion of ownership of such trademarks by Accenture and is not intended to represent or imply the existence of an association between Accenture and the lawful owners of such trademarks. Copyright © 2016 Accenture All rights reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture. About Accenture Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions—underpinned by the world’s largest delivery network—Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With approximately 373,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com. www.accenture.com/SecurityVision @AccentureSecure Contributors Marc Carrel-Billiard Global Managing Director, Accenture Technology R&D marc.carrel-billiard@accenture.com Lisa O’Connor Managing Director, Accenture Technology Labs, Security R&D lisa.oconnor@accenture.com Matthew Carver Senior Manager, Accenture Technology Labs, Security R&D matthew.carver@accenture.com Malek Ben Salem Principal, Accenture Technology Labs, Security R&D malek.ben.salem@accenture.com Joshua Patterson Principal, Accenture Technology Labs, Security R&D joshua.patterson@accenture.com