SlideShare a Scribd company logo
1 of 13
Download to read offline
GAININGGROUND
ONTHECYBER
ATTACKER
2018 State of Cyber Resilience
NEW YORK
Copyright © 2018 Accenture. All rights reserved.
SECURITY TEAMS
HAVE MADE PROGRESS
DEFENDING AGAINST
CYBER ATTACKS.
But more needs to be done.
In 2018, NYC-based companies were able to prevent 72% of targeted attacks
compared to global average of 87%.
IMPROVING CYBER RESILIENCE IN NEW YORK
Copyright © 2018 Accenture Security. All rights reserved. 3
72%
87%
28%
13%
New York
Global
Security breaches prevented Security breaches not prevented
NYC-BASED COMPANIES ARE BECOMING FASTER
AND MORE EFFECTIVE AT FINDING BREACHES
WHEN THEY DO OCCUR
In 2018, 64% of breaches are identified within seven days, higher than the
global average of 55%.
New York19%
12%
45%
43%
23%
34%
13%
11%
New York
Global
Less than one day 1 - 7 days 1 - 4 weeks More than one month 4
MOST ORGANIZATIONS ARE ABLE TO REMEDIATE
A BREACH IN 60 DAYS OR LESS
In 2018, 87% of organizations remediate a breach in < 60 days, higher
than the global average of 74%.
New York47%
38%
40%
36%
9%
23%
4%
4%
New York
Global
Within 30 days 31 - 60 days 61 - 90 days More than 90 days 5
Copyright © 2018 Accenture. All rights reserved. 6
INTERNAL ATTACKS ACCOUNT FOR THE MOST
FREQUENT SECURITY BREACHES
72%
48%
48%
70%
56%
43%
Internal attack (e.g.,
malicious insiders)
Hacker attack
Configuration error
that affected security
NYC
Global
Copyright © 2018 Accenture Security. All rights reserved. 7
INVESTMENTS IN CYBERSECURITY TODAY WILL
SECURE THE FUTURE OF THE ORGANIZATION
In 2018, NYC-based organizations spend more on cybersecurity on average,
compared to global counterparts.
22%
17%
14%
19%
19%
15%
8%
14%
% of total IT budget
% of total OT budget
% of total annual
revenue
% of operational costs
NYC
Global
8
BUDGET AUTHORIZATION RESTS AT THE HIGHEST
LEVELS OF THE ORGANIZATION
32%
22%
16%
7%
16%
32%
27%
12%
11%
9%
CEO/Executive Committee
Board of Directors
Chief Financial Officer
Chief Operating Officer
Chief Information Security
Officer/Chief Security Officer
NYC
Global
Copyright © 2018 Accenture Security. All rights reserved.
9
WITH MORE BUDGET, SECURITY INVESTMENTS
WOULD BE DIRECTED TOWARD TECHNOLOGIES
AND INNOVATIONS
68%
64%
46%
50%
40%
15%
62%
59%
54%
52%
36%
13%
Filling known gaps in cybersecurity
technology
Adding new innovations in
cybersecurity
Filling known gaps in capabilities
(other than staffing and technology)
Filling security staffing gaps
Better reporting tools
End user training
NYC
Global
Copyright © 2018 Accenture Security. All rights reserved.
GAIN GROUND ON THE CYBER ATTACKER
Copyright © 2018 Accenture. All rights reserved.
FIVE WAYS TO
BECOME CYBER
RESILIENT.
New York
1. Build a strong foundation: Identify high value assets and harden them.
Ensure controls are deployed across the organizational value chain, not just
the corporate function.
2. Pressure test resilience like an attacker: Enhance defense teams and
provide analysis on where improvements need to be made.
3. Employ breakthrough technologies: Free up investment capacity to invest
in technologies that can automate your defenses. Utilize automated
orchestration capabilities, advanced behavioral analytics, and artificial
intelligence / machine learning.
4. Be proactive and use threat hunting: Develop strategic and tactical threat
intelligence tailored to your environment to identify potential risks. Monitor
for anomalous activity at the most likely points of attack.
5. Evolve the role of CISO: Develop the next generation CISO – steeped in
the business and balancing security based on business risk tolerance.
FIVE STEPS TO ACHIEVE CYBER RESILIENCE
Copyright © 2018 Accenture. All rights reserved. 11
Copyright © 2018 Accenture. All rights reserved. 12
ABOUT THE RESEARCH
In 2018, Accenture Security surveyed 4,600
executives (100 of which were based in New
York City) to understand the extent to
which organizations prioritize security, how
comprehensive their security plans are, what
security capabilities they have, and their level
of spend on security.
Respondents represented organizations with
annual revenues of $1bn or more—from 19
industries and 15 countries across North and
South America, Europe and Asia Pacific.
More than 98 percent of respondents were
sole or key decision-makers in cybersecurity
strategy and spending for their organization. LEARN MORE
accenture.com/stateofcyber
2018 State of Cyber Resilience
Copyright © 2018 Accenture. All rights reserved. 13
ACCENTURE IN THE UNITED STATES
Accenture is a leading professional services company providing
a broad range of services and solutions in strategy, consulting,
digital, technology and operations. Serving 95 of the Fortune
100 and more than 70 percent of the Fortune 500, Accenture
employs an innovation-led approach to help clients imagine and
invent their future. The company has more than 50,000 people
and operations in 42 cities in the United States. Accenture was
named one of the leading companies to Change the World by
Fortune magazine and is consistently recognized as a FORTUNE
Blue Ribbon Company. With an unwavering commitment to
inclusion and diversity, the company appears regularly on
FORTUNE’s 100 Best Companies to Work For and DiversityInc’s
Top 50 Companies for Diversity lists. Visit us at
accenture.com/US.
ACCENTURE SECURITY
Accenture Security helps organizations build resilience from the
inside out, so they can confidently focus on innovation and
growth. Leveraging its global network of cybersecurity labs, deep
industry understanding across client value chains and services
that span the security lifecycle, Accenture protects organization’s
valuable assets, end-to-end. With services that include strategy
and risk management, cyber defense, digital identity, application
security and managed security, Accenture enables businesses
around the world to defend against known sophisticated threats,
and the unknown. Follow us @AccentureSecure on Twitter or visit
the Accenture Security blog.
FOR MORE INFORMATION,
PLEASE CONTACT:
JOHN CONNOLLY
Accenture
+1 917 452 0837
john.a.connolly@accenture.com

More Related Content

What's hot

Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalAccenture Technology
 
Securing Consumer Trust
Securing Consumer TrustSecuring Consumer Trust
Securing Consumer Trustaccenture
 
Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services accenture
 
Homme+Machine : Réinventer Notre Manière de Travailler | Accenture
Homme+Machine : Réinventer Notre Manière de Travailler | AccentureHomme+Machine : Réinventer Notre Manière de Travailler | Accenture
Homme+Machine : Réinventer Notre Manière de Travailler | Accentureaccenture
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportAccenture Technology
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.accenture
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientAccenture Operations
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...Accenture Technology
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Accenture Operations
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderAccenture Australia
 
Accenture 2015 Global Risk Management Study: Risk Masters infographic
Accenture 2015 Global Risk Management Study: Risk Masters infographicAccenture 2015 Global Risk Management Study: Risk Masters infographic
Accenture 2015 Global Risk Management Study: Risk Masters infographicaccenture
 
Accenture 2019 Global Risk Management Study Financial Services Summary
Accenture 2019 Global Risk Management Study Financial Services SummaryAccenture 2019 Global Risk Management Study Financial Services Summary
Accenture 2019 Global Risk Management Study Financial Services Summaryaccenture
 
Agricultural Chemicals 2016 Supply Chain Benchmarking Study
Agricultural Chemicals 2016 Supply Chain Benchmarking StudyAgricultural Chemicals 2016 Supply Chain Benchmarking Study
Agricultural Chemicals 2016 Supply Chain Benchmarking Studyaccenture
 
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...accenture
 
Digital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and OpportunityDigital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and Opportunityaccenture
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.accenture
 
Accenture Compliance Risk Study 2017 for Financial Services: Presentation
Accenture Compliance Risk Study 2017 for Financial Services: PresentationAccenture Compliance Risk Study 2017 for Financial Services: Presentation
Accenture Compliance Risk Study 2017 for Financial Services: Presentationaccenture
 
Accenture Saudi Arabia Innovation Maturity Index​
Accenture Saudi Arabia Innovation Maturity Index​Accenture Saudi Arabia Innovation Maturity Index​
Accenture Saudi Arabia Innovation Maturity Index​accenture
 

What's hot (20)

Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Securing Consumer Trust
Securing Consumer TrustSecuring Consumer Trust
Securing Consumer Trust
 
Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services
 
Homme+Machine : Réinventer Notre Manière de Travailler | Accenture
Homme+Machine : Réinventer Notre Manière de Travailler | AccentureHomme+Machine : Réinventer Notre Manière de Travailler | Accenture
Homme+Machine : Réinventer Notre Manière de Travailler | Accenture
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leader
 
Accenture 2015 Global Risk Management Study: Risk Masters infographic
Accenture 2015 Global Risk Management Study: Risk Masters infographicAccenture 2015 Global Risk Management Study: Risk Masters infographic
Accenture 2015 Global Risk Management Study: Risk Masters infographic
 
Accenture 2019 Global Risk Management Study Financial Services Summary
Accenture 2019 Global Risk Management Study Financial Services SummaryAccenture 2019 Global Risk Management Study Financial Services Summary
Accenture 2019 Global Risk Management Study Financial Services Summary
 
Agricultural Chemicals 2016 Supply Chain Benchmarking Study
Agricultural Chemicals 2016 Supply Chain Benchmarking StudyAgricultural Chemicals 2016 Supply Chain Benchmarking Study
Agricultural Chemicals 2016 Supply Chain Benchmarking Study
 
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
 
Digital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and OpportunityDigital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and Opportunity
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
 
Accenture Compliance Risk Study 2017 for Financial Services: Presentation
Accenture Compliance Risk Study 2017 for Financial Services: PresentationAccenture Compliance Risk Study 2017 for Financial Services: Presentation
Accenture Compliance Risk Study 2017 for Financial Services: Presentation
 
Accenture Saudi Arabia Innovation Maturity Index​
Accenture Saudi Arabia Innovation Maturity Index​Accenture Saudi Arabia Innovation Maturity Index​
Accenture Saudi Arabia Innovation Maturity Index​
 

Similar to 2018 State of Cyber Resilience - New York

State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018Accenture Australia
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber ResilienceAccenture Security
 
Securing the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustSecuring the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustAccenture Insurance
 
The Science of Security
The Science of SecurityThe Science of Security
The Science of Securityaccenture
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey Rahul Neel Mani
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience InsuranceAccenture Insurance
 
People First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital InsurancePeople First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital InsuranceAccenture México
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseThe Economist Media Businesses
 
Cybersecurity at a premium: The state of cyber resilience in insurance
Cybersecurity at a premium: The state of cyber resilience in insuranceCybersecurity at a premium: The state of cyber resilience in insurance
Cybersecurity at a premium: The state of cyber resilience in insuranceaccenture
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Pierre Audoin Consultants
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Matthew Rosenquist
 
State of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetState of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetCrowdStrike
 
Proactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital DisruptionProactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital DisruptionMike Wons
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for InsuranceAccenture Insurance
 
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture Insurance
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Technology
 

Similar to 2018 State of Cyber Resilience - New York (20)

State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber Resilience
 
Securing the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustSecuring the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for Trust
 
The Science of Security
The Science of SecurityThe Science of Security
The Science of Security
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
Cybersecurity report-vol-8
Cybersecurity report-vol-8Cybersecurity report-vol-8
Cybersecurity report-vol-8
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance
 
People First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital InsurancePeople First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital Insurance
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
 
Cybersecurity at a premium: The state of cyber resilience in insurance
Cybersecurity at a premium: The state of cyber resilience in insuranceCybersecurity at a premium: The state of cyber resilience in insurance
Cybersecurity at a premium: The state of cyber resilience in insurance
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises?
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
State of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetState of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers Mindset
 
Proactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital DisruptionProactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital Disruption
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for Insurance
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 

More from accenture

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024accenture
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileaccenture
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial Systemaccenture
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyaccenture
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023accenture
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operationsaccenture
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Studyaccenture
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023accenture
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented changeaccenture
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% meaccenture
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023accenture
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoaccenture
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industryaccenture
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023accenture
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accentureaccenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accentureaccenture
 

More from accenture (20)

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 

Recently uploaded

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Recently uploaded (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

2018 State of Cyber Resilience - New York

  • 2. Copyright © 2018 Accenture. All rights reserved. SECURITY TEAMS HAVE MADE PROGRESS DEFENDING AGAINST CYBER ATTACKS. But more needs to be done.
  • 3. In 2018, NYC-based companies were able to prevent 72% of targeted attacks compared to global average of 87%. IMPROVING CYBER RESILIENCE IN NEW YORK Copyright © 2018 Accenture Security. All rights reserved. 3 72% 87% 28% 13% New York Global Security breaches prevented Security breaches not prevented
  • 4. NYC-BASED COMPANIES ARE BECOMING FASTER AND MORE EFFECTIVE AT FINDING BREACHES WHEN THEY DO OCCUR In 2018, 64% of breaches are identified within seven days, higher than the global average of 55%. New York19% 12% 45% 43% 23% 34% 13% 11% New York Global Less than one day 1 - 7 days 1 - 4 weeks More than one month 4
  • 5. MOST ORGANIZATIONS ARE ABLE TO REMEDIATE A BREACH IN 60 DAYS OR LESS In 2018, 87% of organizations remediate a breach in < 60 days, higher than the global average of 74%. New York47% 38% 40% 36% 9% 23% 4% 4% New York Global Within 30 days 31 - 60 days 61 - 90 days More than 90 days 5
  • 6. Copyright © 2018 Accenture. All rights reserved. 6 INTERNAL ATTACKS ACCOUNT FOR THE MOST FREQUENT SECURITY BREACHES 72% 48% 48% 70% 56% 43% Internal attack (e.g., malicious insiders) Hacker attack Configuration error that affected security NYC Global
  • 7. Copyright © 2018 Accenture Security. All rights reserved. 7 INVESTMENTS IN CYBERSECURITY TODAY WILL SECURE THE FUTURE OF THE ORGANIZATION In 2018, NYC-based organizations spend more on cybersecurity on average, compared to global counterparts. 22% 17% 14% 19% 19% 15% 8% 14% % of total IT budget % of total OT budget % of total annual revenue % of operational costs NYC Global
  • 8. 8 BUDGET AUTHORIZATION RESTS AT THE HIGHEST LEVELS OF THE ORGANIZATION 32% 22% 16% 7% 16% 32% 27% 12% 11% 9% CEO/Executive Committee Board of Directors Chief Financial Officer Chief Operating Officer Chief Information Security Officer/Chief Security Officer NYC Global Copyright © 2018 Accenture Security. All rights reserved.
  • 9. 9 WITH MORE BUDGET, SECURITY INVESTMENTS WOULD BE DIRECTED TOWARD TECHNOLOGIES AND INNOVATIONS 68% 64% 46% 50% 40% 15% 62% 59% 54% 52% 36% 13% Filling known gaps in cybersecurity technology Adding new innovations in cybersecurity Filling known gaps in capabilities (other than staffing and technology) Filling security staffing gaps Better reporting tools End user training NYC Global Copyright © 2018 Accenture Security. All rights reserved.
  • 10. GAIN GROUND ON THE CYBER ATTACKER Copyright © 2018 Accenture. All rights reserved. FIVE WAYS TO BECOME CYBER RESILIENT. New York
  • 11. 1. Build a strong foundation: Identify high value assets and harden them. Ensure controls are deployed across the organizational value chain, not just the corporate function. 2. Pressure test resilience like an attacker: Enhance defense teams and provide analysis on where improvements need to be made. 3. Employ breakthrough technologies: Free up investment capacity to invest in technologies that can automate your defenses. Utilize automated orchestration capabilities, advanced behavioral analytics, and artificial intelligence / machine learning. 4. Be proactive and use threat hunting: Develop strategic and tactical threat intelligence tailored to your environment to identify potential risks. Monitor for anomalous activity at the most likely points of attack. 5. Evolve the role of CISO: Develop the next generation CISO – steeped in the business and balancing security based on business risk tolerance. FIVE STEPS TO ACHIEVE CYBER RESILIENCE Copyright © 2018 Accenture. All rights reserved. 11
  • 12. Copyright © 2018 Accenture. All rights reserved. 12 ABOUT THE RESEARCH In 2018, Accenture Security surveyed 4,600 executives (100 of which were based in New York City) to understand the extent to which organizations prioritize security, how comprehensive their security plans are, what security capabilities they have, and their level of spend on security. Respondents represented organizations with annual revenues of $1bn or more—from 19 industries and 15 countries across North and South America, Europe and Asia Pacific. More than 98 percent of respondents were sole or key decision-makers in cybersecurity strategy and spending for their organization. LEARN MORE accenture.com/stateofcyber 2018 State of Cyber Resilience
  • 13. Copyright © 2018 Accenture. All rights reserved. 13 ACCENTURE IN THE UNITED STATES Accenture is a leading professional services company providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Serving 95 of the Fortune 100 and more than 70 percent of the Fortune 500, Accenture employs an innovation-led approach to help clients imagine and invent their future. The company has more than 50,000 people and operations in 42 cities in the United States. Accenture was named one of the leading companies to Change the World by Fortune magazine and is consistently recognized as a FORTUNE Blue Ribbon Company. With an unwavering commitment to inclusion and diversity, the company appears regularly on FORTUNE’s 100 Best Companies to Work For and DiversityInc’s Top 50 Companies for Diversity lists. Visit us at accenture.com/US. ACCENTURE SECURITY Accenture Security helps organizations build resilience from the inside out, so they can confidently focus on innovation and growth. Leveraging its global network of cybersecurity labs, deep industry understanding across client value chains and services that span the security lifecycle, Accenture protects organization’s valuable assets, end-to-end. With services that include strategy and risk management, cyber defense, digital identity, application security and managed security, Accenture enables businesses around the world to defend against known sophisticated threats, and the unknown. Follow us @AccentureSecure on Twitter or visit the Accenture Security blog. FOR MORE INFORMATION, PLEASE CONTACT: JOHN CONNOLLY Accenture +1 917 452 0837 john.a.connolly@accenture.com