SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
2018StateofCyberResilience
GAINING
GROUND
ONTHE CYBER
ATTACKER
HealthcareIndustry
Copyright © 2019 Accenture Security. All rights reserved.
Copyright © 2019 Accenture Security. All rights reserved.
CLOSING THE GAP ON CYBER ATTACKS
Organizations are improving cyber resilience and showing they can perform better
under greater pressure as the number of targeted attacks more than doubles.
Organizations reduced the rate of successful attacks
from 30% to 13%.
In the past 12 months, how many attempted / successful breaches
have you identified and how many were successful? Average.
2017 2018
106
32
232
30
Targeted
attacks
Security
breaches
24
155
Healthcare Payer and Provider
Targeted
attacks
Security
breaches
Copyright © 2019 Accenture Security. All rights reserved.
CLOSING THE GAP ON CYBER ATTACKS
Despite the rising number of cyber attacks, security teams continue to identify nearly two-thirds of all breach
attempts, 63% on average, and twice as many of them are now able to detect 76% or more cyber attacks.
Proportion of cyber attacks discovered by security teams
GLOBAL
2018
2017
HEALTHCARE PAYER AND PROVIDER
14%
24%
Less than 50%
30%
28%
51%-65%
45%
22%
66%-75%
10%
23%
76% or more
13%
32%
Less than 50%
34%
26%
51%-65%
44%
13%
66%-75%
9%
29%
76% or more
Global mean: 63%
Healthcare payer or
provider mean: 62%
Copyright © 2019 Accenture Security. All rights reserved.
CLOSING THE GAP ON CYBER ATTACKS
Collaboration is helping with attacks undetected by security teams.
For the breaches that are not detected by your security team,
how do you most frequently learn about them? (Ranked top 3)
66%
74%
60%
64%
57%
50%
56%
59%
53%
51%
Internally by
our employees
Externally by a peer/
competitor in our industry
Externally by the media
White hats
Law enforcement
Healthcare payer and provider
Global
Cyber attacks
discovered
outside of
security teams
Copyright © 2019 Accenture Security. All rights reserved.
CLOSING THE GAP ON CYBER ATTACKS
The majority of security teams are also more effective at finding security breaches faster—
from months and years to just days and weeks.
Improvements in detection speed of security
breaches
Thinking about the past year, how long, on average,
did it take for a successful breach to be detected?
2017
2018
12% 43% 34% 11%
GLOBAL
HEALTHCARE PAYER AND PROVIDER
14% 47% 27% 13%
Less than
one day
1-7 days 1-4 weeks More than
one month
Copyright © 2019 Accenture Security. All rights reserved.
IMPROVING CYBER RESILIENCE
We evaluated 33 cybersecurity capabilities across seven domains
Business
Exposure
High Value Assets &
Business Processes
Physical & Safety
Risks
Cyber Attack
Scenarios
IT Risk Support
Cybersecurity
Strategy
Cyber Response
Readiness
Cyber Response
Plans
Cyber Incident
Escalation Plans
Cyber Incident
Communication
Stakeholder
Involvement
Recovery of Key
Assets
Strategic Threat
Context
What-If Analysis
Business Relevant
Threat Monitoring
Peer Situation
Monitoring
Threat Vector
Monitoring
Resilience
Readiness
Recovery Ability
Design for
Resilience
Exposure Driven
Design
Continuous
Improvement
Threat Landscape
Alignment
Investment
Efficiency
Securing Future
Architecture
Security in Project
Funding
Protection of Key
Assets
Security in
Investment Funding
Risk Analysis &
Budgeting
Governance &
Leadership
High Value Assets &
Business Processes
Physical & Safety
Risks
Actual IT Support
Scenarios of
Material Impact
Key Protection
Assumptions
Extended
Ecosystem
Contractual
Dependability
Operational
Cooperation
Contractual
Assurance
Regulatory
Compliance Focus
Copyright © 2019 Accenture Security. All rights reserved.
CLOSING THE GAP ON CYBER ATTACKS
Being better at detection, prevention and collaboration is not all that security teams can be proud of—
they have also realized an impressive 42 percent improvement in security capabilities.
Cybersecurity capabilities rated high performing
1
11 capabilities rated high performing
Capabilities rated high
performing:
2018 Global: 19
2018 Healthcare
payer and provider: 19
33
2017
2018 19 capabilities rated high performing
Copyright © 2019 Accenture Security. All rights reserved.
CLOSING THE GAP ON CYBER ATTACKS
In terms of delivering the next wave of improvements, it is easy to focus exclusively on counteracting
external attacks, but organizations should not neglect the enemy within.
Most damaging security breaches ranked by frequency and impact
28% of respondents ranked ‘External
Attacks’ as having the greatest impact on
their organization while 33% ranked
‘Internal Attacks’ as 0% the most frequent.
Most Frequent
GreatestImpact
Copyright © 2019 Accenture Security. All rights reserved.
INTERNAL ATTACKS & HACKER ATTACKS
ARE THE MOST FREQUENT ATTACKS
and cause the greatest impact on the organization
Among the types of breaches your organization has experienced,
please rank them from most to least frequent. (Ranked top 3)
Among the successful breaches, please indicate which of the following
causes had the greatest impact on your organization. (Ranked top 3)
70%
56%
44%
43%
39%
26%
24%
62%
61%
44%
45%
37%
28%
23%
Internal attack
Hacker attack
Accidentally published
information
Configuration error
that affected security
Legacy infrastructure that
is challenging to secure
Lost/stolen media
Lost/stolen computer
61%
58%
53%
45%
36%
25%
21%
66%
63%
56%
30%
40%
27%
17%
Internal attack
Hacker attack
Accidentally published
information
Configuration error
that affected security
Legacy infrastructure that
is challenging to secure
Lost/stolen media
Lost/stolen computer
Healthcare
payer and
provider
Global
Copyright © 2019 Accenture Security. All rights reserved.
CLOSING THE GAP ON CYBER ATTACKS
Organizations need to protect their most valuable assets, from the inside out, and across the entire value chain.
Which of the following is your cybersecurity program actively protecting?
Multiple responses
Areas
cybersecurity
program is
actively
protecting
63%
57%
56%
56%
48%
47%
32%
61%
54%
50%
55%
41%
48%
33%
Healthcare payer
and provider
GlobalCorporate IT
(all systems in the corporate office)
Cloud service providers)
Operational technologies (i.e.
manufacturing industrial control systems))
Customer or partner environments
(i.e. hosted websites, collaborations portals)
Products and services
(i.e., wearables, xx)
Field operations (branches,
franchises, subsidiaries)
Third Parties
Percentage of
organization actively
protected by
cybersecurity program
2018 Global: 67%
2018 Healthcare
payer and provider: 66%
Copyright © 2019 Accenture Security. All rights reserved.
CLOSING THE GAP ON CYBER ATTACKS
Cybersecurity standards should extend beyond the organization.
Which of the following statements best represents the degree to which you hold
your ecosystem partners and/or strategic partners to cybersecurity standards?
We do not review cybersecurity
standards of partners
We review cybersecurity standards of partners,
but do not impose any standards or requirements
We hold partners to a minimum standard for
cybersecurity, that is below our business
standards, and audit regularly
We hold partners to the same cybersecurity
standards as our business, and audit regularly
We hold partners to higher cybersecurity
standards than our business
Healthcare payer and provider
Global
Degree to
which
ecosystem
partners are
held to
cybersecurity
standards
6%
14%
16%
46%
18%
5%
13%
21%
47%
13%
Copyright © 2019 Accenture Security. All rights reserved.
CLOSING THE GAP ON CYBER ATTACKS
If the current rate of progress is maintained, organizations could reach a sustainable level of
cyber resilience in the next two to three years.
Forecast of average cybersecurity capabilities reaching a sustainable level of cyber resilience
Healthcare payer and provider
Global18%
34%
59%
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
2016e 2017 2018 2019e 2020e 2021e
*Cyber resilience embedded into the business
Log. (Global Measured
capacity average)
* Estimate based on current rate of improvement
Copyright © 2019 Accenture Security. All rights reserved.
CLOSING THE GAP ON CYBER ATTACKS
Cybersecurity investment is important to keep the momentum of improved security resilience.
Significant increase in investment (double or more) in cybersecurity
Next 3 years
Past 3 years
22%
31%
GlobalGLOBAL
22%
27%
GlobalHEALTHCARE PAYER AND PROVIDER
Copyright © 2019 Accenture Security. All rights reserved.
CLOSING THE GAP ON CYBER ATTACKS
Focusing on the right success measures ensures security objectives are aligned with the business.
How do you measure the success of your cybersecurity program?
Multiple responses
Healthcare payer
and provider
Global
Measures of
success for
cybersecurity
programs
62%
57%
56%
53%
51%
41%
40%
38%
60%
58%
56%
46%
45%
40%
48%
39%
Cyber IT resiliency (i.e., how many times an
enterprise system went down and for how long)
Cyber recovery/restoration time (i.e., how
long it takes to restore normal activity)
Cyber response time (i.e., how long it
takes to identify and mobilize)
Cyber OT resiliency (i.e., how many times an operational
technology system stopped and for how long)
Cyber compliance with national standards
Trend measurement (incidents increasing/decreasing)
Repetition (portion of breaches that come from
repeated attempts of the same type)
Business risk improvement
Copyright © 2019 Accenture Security. All rights reserved.
CLOSING THE GAP ON CYBER ATTACKS
Breakthrough technologies are essential to securing the organization’s future and driving the next round of cyber
resilience.
In which of the following new and emerging technologies are you investing to evolve your security program?
Multiple responses
Emerging
technologies
organizations
invest in to
evolve security
programs
Healthcare payer
and provider
Global
55%
54%
48%
45%
45%
44%
43%
41%
40%
43%
57%
43%
50%
49%
45%
40%
44%
38%
IoT security
Security intelligence platforms
Blockchain
Threat hunting
Continuous control
monitoring and reporting
Managed security services
Machine learning/artificial
intelligence
Password-less authentication
Robotic process automation
(RPA)
New technologies such as artificial
intelligence, machine/deep learning
user behavior analytics, blockchain,
etc. are essential to securing the
future of the organization.
2018 Global: 83%
2018 Healthcare payer and provider: 85%
DEMOGRAPHICS
Copyright © 2019 Accenture Security. All rights reserved.
THIS STUDY WAS FIELDED FEBRUARY 2018
Healthcare
payer and provider
sample size: 202
Location Global Healthcare
Australia 401 12
Brazil 130 11
Canada 150 10
France 401 13
Germany 400 12
Ireland 124 10
Italy 302 14
Japan 400 12
Netherlands 115 10
Norway 114 10
Singapore 126 10
Spain 250 15
United Arab
Emirates
132 15
United
Kingdom
450 18
United States 1174 25
Industry Global Healthcare
Aerospace & Defense 100 0
AFS 152 0
Automotive 101 0
Banking & Capital Markets 410 0
Chemicals 202 0
Comm & Media 410 0
CP&S 410 0
Energy (Oil & Gas) 200 0
Healthcare (payer) 100 100
Healthcare (provider) 102 102
High Technology 411 0
Industrial Equipment 313 0
Insurance 411 0
Life Sciences 200 0
Public Service 301 0
Retail 411 0
Software & Platforms 221 0
Utilities 214 0
Title Global Healthcare
CISO 1513 68
Chief Security
Officer
1429 63
Chief
Compliance
Officer
829 37
Chief Risk
Officer
535 23
Chief Security
Architect
133 4
Corporate
Security Officer
78 7
Civilian -
Political
Appointee
50 0
Civilian - Senior
Executive
Service (SES)
49 0
Civilian - GS-13
to GS-15
27 0
Military - Officer
(O-7 to O-10)
23 0
Military - Officer
(O-4 to O-6)
3 0
Title Global Healthcare
$50 bn or more 58 3
$20 bn-$49.9
bn
276 14
$10 bn-$19.9 bn 891 38
$6 bn-$9.9 bn 1,432 54
$1 bn-$5.9 bn 2,012 93
Copyright © 2019 Accenture. All rights reserved. 18
ABOUT THE RESEARCH
In 2017, Accenture Security surveyed 2,000
executives to understand the extent to
which organizations prioritize security, how
comprehensive their security plans are, what
security capabilities they have, and their level
of spend on security.
Just over a year later, Accenture Security
undertook a similar survey, this time
interviewing 4,600 executives—representing
organizations with annual revenues of $1bn
or more—from 19 industries and 15 countries
across North and South America, Europe and
Asia Pacific.
More than 98 percent of respondents were
sole or key decision-makers in cybersecurity
strategy and spending for their organization.
LEARN MORE
accenture.com/stateofcyber
2018 State of Cyber Resilience
Copyright © 2019 Accenture. All rights reserved. 19
About Accenture
Accenture is a leading global professional services company, providing a broad
range of services and solutions in strategy, consulting, digital, technology and
operations. Combining unmatched experience and specialized skills across more
than 40 industries and all business functions—underpinned by the world’s largest
delivery network—Accenture works at the intersection of business and technology
to help clients improve their performance and create sustainable value for their
stakeholders. With approximately 442,000 people serving clients in more than 120
countries, Accenture drives innovation to improve the way the world works and
lives. Visit us at www.accenture.com
About Accenture Security
Accenture Security helps organizations build resilience from the inside out, so they
can confidently focus on innovation and growth. Leveraging its global network of
cybersecurity labs, deep industry understanding across client value chains and
services that span the security lifecycle, Accenture protects organization’s valuable
assets, end-to-end. With services that include strategy and risk management, cyber
defense, digital identity, application security and managed security, Accenture
enables businesses around the world to defend against known sophisticated threats,
and the unknown. Follow us @AccentureSecure on Twitter or visit the Accenture
Security blog.

Contenu connexe

Tendances

Strategic Enabler: The New Healthcare CFO
Strategic Enabler: The New Healthcare CFOStrategic Enabler: The New Healthcare CFO
Strategic Enabler: The New Healthcare CFOaccenture
 
Job One: Reimagine Today's State Government Workforce
Job One: Reimagine Today's State Government WorkforceJob One: Reimagine Today's State Government Workforce
Job One: Reimagine Today's State Government Workforceaccenture
 
Looking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance DeadlineLooking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance Deadlineaccenture
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Redefining Public Sector Finance in a Digital World
Redefining Public Sector Finance in a Digital WorldRedefining Public Sector Finance in a Digital World
Redefining Public Sector Finance in a Digital Worldaccenture
 
Accenture Banking Security Index
Accenture Banking Security IndexAccenture Banking Security Index
Accenture Banking Security Indexaccenture
 
The Connected Refinery – Accenture 2017 Digital Refining Survey
The Connected Refinery – Accenture 2017 Digital Refining SurveyThe Connected Refinery – Accenture 2017 Digital Refining Survey
The Connected Refinery – Accenture 2017 Digital Refining Surveyaccenture
 
Securing the Industrial Enterprise
Securing the Industrial EnterpriseSecuring the Industrial Enterprise
Securing the Industrial Enterpriseaccenture
 
Back Office Transformation | Accenture
Back Office Transformation | AccentureBack Office Transformation | Accenture
Back Office Transformation | Accentureaccenture
 
Homme+Machine : Réinventer Notre Manière de Travailler | Accenture
Homme+Machine : Réinventer Notre Manière de Travailler | AccentureHomme+Machine : Réinventer Notre Manière de Travailler | Accenture
Homme+Machine : Réinventer Notre Manière de Travailler | Accentureaccenture
 
Accenture Compliance Risk Study 2017: Financial Services
Accenture Compliance Risk Study 2017: Financial ServicesAccenture Compliance Risk Study 2017: Financial Services
Accenture Compliance Risk Study 2017: Financial Servicesaccenture
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - IrelandAccenture Security
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
Accenture Saudi Arabia Innovation Maturity Index​
Accenture Saudi Arabia Innovation Maturity Index​Accenture Saudi Arabia Innovation Maturity Index​
Accenture Saudi Arabia Innovation Maturity Index​accenture
 
Accenture 2019 Global Risk Management Study Financial Services Summary
Accenture 2019 Global Risk Management Study Financial Services SummaryAccenture 2019 Global Risk Management Study Financial Services Summary
Accenture 2019 Global Risk Management Study Financial Services Summaryaccenture
 
Digital Disruption: Embracing the Future of Work
Digital Disruption: Embracing the Future of Work Digital Disruption: Embracing the Future of Work
Digital Disruption: Embracing the Future of Work accenture
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Decoding Organizational DNA
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNAaccenture
 
Twenty-First Century Cures: Information Blocking
Twenty-First Century Cures: Information BlockingTwenty-First Century Cures: Information Blocking
Twenty-First Century Cures: Information Blockingaccenture
 
Digital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and OpportunityDigital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and Opportunityaccenture
 

Tendances (20)

Strategic Enabler: The New Healthcare CFO
Strategic Enabler: The New Healthcare CFOStrategic Enabler: The New Healthcare CFO
Strategic Enabler: The New Healthcare CFO
 
Job One: Reimagine Today's State Government Workforce
Job One: Reimagine Today's State Government WorkforceJob One: Reimagine Today's State Government Workforce
Job One: Reimagine Today's State Government Workforce
 
Looking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance DeadlineLooking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance Deadline
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Redefining Public Sector Finance in a Digital World
Redefining Public Sector Finance in a Digital WorldRedefining Public Sector Finance in a Digital World
Redefining Public Sector Finance in a Digital World
 
Accenture Banking Security Index
Accenture Banking Security IndexAccenture Banking Security Index
Accenture Banking Security Index
 
The Connected Refinery – Accenture 2017 Digital Refining Survey
The Connected Refinery – Accenture 2017 Digital Refining SurveyThe Connected Refinery – Accenture 2017 Digital Refining Survey
The Connected Refinery – Accenture 2017 Digital Refining Survey
 
Securing the Industrial Enterprise
Securing the Industrial EnterpriseSecuring the Industrial Enterprise
Securing the Industrial Enterprise
 
Back Office Transformation | Accenture
Back Office Transformation | AccentureBack Office Transformation | Accenture
Back Office Transformation | Accenture
 
Homme+Machine : Réinventer Notre Manière de Travailler | Accenture
Homme+Machine : Réinventer Notre Manière de Travailler | AccentureHomme+Machine : Réinventer Notre Manière de Travailler | Accenture
Homme+Machine : Réinventer Notre Manière de Travailler | Accenture
 
Accenture Compliance Risk Study 2017: Financial Services
Accenture Compliance Risk Study 2017: Financial ServicesAccenture Compliance Risk Study 2017: Financial Services
Accenture Compliance Risk Study 2017: Financial Services
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Accenture Saudi Arabia Innovation Maturity Index​
Accenture Saudi Arabia Innovation Maturity Index​Accenture Saudi Arabia Innovation Maturity Index​
Accenture Saudi Arabia Innovation Maturity Index​
 
Accenture 2019 Global Risk Management Study Financial Services Summary
Accenture 2019 Global Risk Management Study Financial Services SummaryAccenture 2019 Global Risk Management Study Financial Services Summary
Accenture 2019 Global Risk Management Study Financial Services Summary
 
Digital Disruption: Embracing the Future of Work
Digital Disruption: Embracing the Future of Work Digital Disruption: Embracing the Future of Work
Digital Disruption: Embracing the Future of Work
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Decoding Organizational DNA
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNA
 
Twenty-First Century Cures: Information Blocking
Twenty-First Century Cures: Information BlockingTwenty-First Century Cures: Information Blocking
Twenty-First Century Cures: Information Blocking
 
Digital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and OpportunityDigital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and Opportunity
 

Similaire à 2018 State of Cyber Reslience in Healthcare

2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience InsuranceAccenture Insurance
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for InsuranceAccenture Insurance
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey Rahul Neel Mani
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseThe Economist Media Businesses
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016Accenture Operations
 
Securing the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustSecuring the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustAccenture Insurance
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Eoin Keary
 
Cybersecurity at a premium: The state of cyber resilience in insurance
Cybersecurity at a premium: The state of cyber resilience in insuranceCybersecurity at a premium: The state of cyber resilience in insurance
Cybersecurity at a premium: The state of cyber resilience in insuranceaccenture
 
Most expensive IT Security Incidents
Most expensive IT Security IncidentsMost expensive IT Security Incidents
Most expensive IT Security IncidentsARP
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber ResilienceAccenture Security
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilienceaccenture
 
Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare Accenture Security
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Reportaccenture
 
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdftrellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdfw2sdvzdjtz
 
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Microsoft
 

Similaire à 2018 State of Cyber Reslience in Healthcare (20)

2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
Securing the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustSecuring the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for Trust
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020
 
Cybersecurity at a premium: The state of cyber resilience in insurance
Cybersecurity at a premium: The state of cyber resilience in insuranceCybersecurity at a premium: The state of cyber resilience in insurance
Cybersecurity at a premium: The state of cyber resilience in insurance
 
Cyber threat forecast 2018..
Cyber threat forecast 2018..Cyber threat forecast 2018..
Cyber threat forecast 2018..
 
Most expensive IT Security Incidents
Most expensive IT Security IncidentsMost expensive IT Security Incidents
Most expensive IT Security Incidents
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber Resilience
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
EMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-Security
 
Cyber-attacks
Cyber-attacksCyber-attacks
Cyber-attacks
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdftrellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
 
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
 

Plus de accenture

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024accenture
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileaccenture
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial Systemaccenture
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyaccenture
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023accenture
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operationsaccenture
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Studyaccenture
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023accenture
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented changeaccenture
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% meaccenture
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023accenture
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoaccenture
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industryaccenture
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023accenture
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accentureaccenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accentureaccenture
 

Plus de accenture (20)

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 

Dernier

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Dernier (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

2018 State of Cyber Reslience in Healthcare

  • 2. Copyright © 2019 Accenture Security. All rights reserved. CLOSING THE GAP ON CYBER ATTACKS Organizations are improving cyber resilience and showing they can perform better under greater pressure as the number of targeted attacks more than doubles. Organizations reduced the rate of successful attacks from 30% to 13%. In the past 12 months, how many attempted / successful breaches have you identified and how many were successful? Average. 2017 2018 106 32 232 30 Targeted attacks Security breaches 24 155 Healthcare Payer and Provider Targeted attacks Security breaches
  • 3. Copyright © 2019 Accenture Security. All rights reserved. CLOSING THE GAP ON CYBER ATTACKS Despite the rising number of cyber attacks, security teams continue to identify nearly two-thirds of all breach attempts, 63% on average, and twice as many of them are now able to detect 76% or more cyber attacks. Proportion of cyber attacks discovered by security teams GLOBAL 2018 2017 HEALTHCARE PAYER AND PROVIDER 14% 24% Less than 50% 30% 28% 51%-65% 45% 22% 66%-75% 10% 23% 76% or more 13% 32% Less than 50% 34% 26% 51%-65% 44% 13% 66%-75% 9% 29% 76% or more Global mean: 63% Healthcare payer or provider mean: 62%
  • 4. Copyright © 2019 Accenture Security. All rights reserved. CLOSING THE GAP ON CYBER ATTACKS Collaboration is helping with attacks undetected by security teams. For the breaches that are not detected by your security team, how do you most frequently learn about them? (Ranked top 3) 66% 74% 60% 64% 57% 50% 56% 59% 53% 51% Internally by our employees Externally by a peer/ competitor in our industry Externally by the media White hats Law enforcement Healthcare payer and provider Global Cyber attacks discovered outside of security teams
  • 5. Copyright © 2019 Accenture Security. All rights reserved. CLOSING THE GAP ON CYBER ATTACKS The majority of security teams are also more effective at finding security breaches faster— from months and years to just days and weeks. Improvements in detection speed of security breaches Thinking about the past year, how long, on average, did it take for a successful breach to be detected? 2017 2018 12% 43% 34% 11% GLOBAL HEALTHCARE PAYER AND PROVIDER 14% 47% 27% 13% Less than one day 1-7 days 1-4 weeks More than one month
  • 6. Copyright © 2019 Accenture Security. All rights reserved. IMPROVING CYBER RESILIENCE We evaluated 33 cybersecurity capabilities across seven domains Business Exposure High Value Assets & Business Processes Physical & Safety Risks Cyber Attack Scenarios IT Risk Support Cybersecurity Strategy Cyber Response Readiness Cyber Response Plans Cyber Incident Escalation Plans Cyber Incident Communication Stakeholder Involvement Recovery of Key Assets Strategic Threat Context What-If Analysis Business Relevant Threat Monitoring Peer Situation Monitoring Threat Vector Monitoring Resilience Readiness Recovery Ability Design for Resilience Exposure Driven Design Continuous Improvement Threat Landscape Alignment Investment Efficiency Securing Future Architecture Security in Project Funding Protection of Key Assets Security in Investment Funding Risk Analysis & Budgeting Governance & Leadership High Value Assets & Business Processes Physical & Safety Risks Actual IT Support Scenarios of Material Impact Key Protection Assumptions Extended Ecosystem Contractual Dependability Operational Cooperation Contractual Assurance Regulatory Compliance Focus
  • 7. Copyright © 2019 Accenture Security. All rights reserved. CLOSING THE GAP ON CYBER ATTACKS Being better at detection, prevention and collaboration is not all that security teams can be proud of— they have also realized an impressive 42 percent improvement in security capabilities. Cybersecurity capabilities rated high performing 1 11 capabilities rated high performing Capabilities rated high performing: 2018 Global: 19 2018 Healthcare payer and provider: 19 33 2017 2018 19 capabilities rated high performing
  • 8. Copyright © 2019 Accenture Security. All rights reserved. CLOSING THE GAP ON CYBER ATTACKS In terms of delivering the next wave of improvements, it is easy to focus exclusively on counteracting external attacks, but organizations should not neglect the enemy within. Most damaging security breaches ranked by frequency and impact 28% of respondents ranked ‘External Attacks’ as having the greatest impact on their organization while 33% ranked ‘Internal Attacks’ as 0% the most frequent. Most Frequent GreatestImpact
  • 9. Copyright © 2019 Accenture Security. All rights reserved. INTERNAL ATTACKS & HACKER ATTACKS ARE THE MOST FREQUENT ATTACKS and cause the greatest impact on the organization Among the types of breaches your organization has experienced, please rank them from most to least frequent. (Ranked top 3) Among the successful breaches, please indicate which of the following causes had the greatest impact on your organization. (Ranked top 3) 70% 56% 44% 43% 39% 26% 24% 62% 61% 44% 45% 37% 28% 23% Internal attack Hacker attack Accidentally published information Configuration error that affected security Legacy infrastructure that is challenging to secure Lost/stolen media Lost/stolen computer 61% 58% 53% 45% 36% 25% 21% 66% 63% 56% 30% 40% 27% 17% Internal attack Hacker attack Accidentally published information Configuration error that affected security Legacy infrastructure that is challenging to secure Lost/stolen media Lost/stolen computer Healthcare payer and provider Global
  • 10. Copyright © 2019 Accenture Security. All rights reserved. CLOSING THE GAP ON CYBER ATTACKS Organizations need to protect their most valuable assets, from the inside out, and across the entire value chain. Which of the following is your cybersecurity program actively protecting? Multiple responses Areas cybersecurity program is actively protecting 63% 57% 56% 56% 48% 47% 32% 61% 54% 50% 55% 41% 48% 33% Healthcare payer and provider GlobalCorporate IT (all systems in the corporate office) Cloud service providers) Operational technologies (i.e. manufacturing industrial control systems)) Customer or partner environments (i.e. hosted websites, collaborations portals) Products and services (i.e., wearables, xx) Field operations (branches, franchises, subsidiaries) Third Parties Percentage of organization actively protected by cybersecurity program 2018 Global: 67% 2018 Healthcare payer and provider: 66%
  • 11. Copyright © 2019 Accenture Security. All rights reserved. CLOSING THE GAP ON CYBER ATTACKS Cybersecurity standards should extend beyond the organization. Which of the following statements best represents the degree to which you hold your ecosystem partners and/or strategic partners to cybersecurity standards? We do not review cybersecurity standards of partners We review cybersecurity standards of partners, but do not impose any standards or requirements We hold partners to a minimum standard for cybersecurity, that is below our business standards, and audit regularly We hold partners to the same cybersecurity standards as our business, and audit regularly We hold partners to higher cybersecurity standards than our business Healthcare payer and provider Global Degree to which ecosystem partners are held to cybersecurity standards 6% 14% 16% 46% 18% 5% 13% 21% 47% 13%
  • 12. Copyright © 2019 Accenture Security. All rights reserved. CLOSING THE GAP ON CYBER ATTACKS If the current rate of progress is maintained, organizations could reach a sustainable level of cyber resilience in the next two to three years. Forecast of average cybersecurity capabilities reaching a sustainable level of cyber resilience Healthcare payer and provider Global18% 34% 59% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 2016e 2017 2018 2019e 2020e 2021e *Cyber resilience embedded into the business Log. (Global Measured capacity average) * Estimate based on current rate of improvement
  • 13. Copyright © 2019 Accenture Security. All rights reserved. CLOSING THE GAP ON CYBER ATTACKS Cybersecurity investment is important to keep the momentum of improved security resilience. Significant increase in investment (double or more) in cybersecurity Next 3 years Past 3 years 22% 31% GlobalGLOBAL 22% 27% GlobalHEALTHCARE PAYER AND PROVIDER
  • 14. Copyright © 2019 Accenture Security. All rights reserved. CLOSING THE GAP ON CYBER ATTACKS Focusing on the right success measures ensures security objectives are aligned with the business. How do you measure the success of your cybersecurity program? Multiple responses Healthcare payer and provider Global Measures of success for cybersecurity programs 62% 57% 56% 53% 51% 41% 40% 38% 60% 58% 56% 46% 45% 40% 48% 39% Cyber IT resiliency (i.e., how many times an enterprise system went down and for how long) Cyber recovery/restoration time (i.e., how long it takes to restore normal activity) Cyber response time (i.e., how long it takes to identify and mobilize) Cyber OT resiliency (i.e., how many times an operational technology system stopped and for how long) Cyber compliance with national standards Trend measurement (incidents increasing/decreasing) Repetition (portion of breaches that come from repeated attempts of the same type) Business risk improvement
  • 15. Copyright © 2019 Accenture Security. All rights reserved. CLOSING THE GAP ON CYBER ATTACKS Breakthrough technologies are essential to securing the organization’s future and driving the next round of cyber resilience. In which of the following new and emerging technologies are you investing to evolve your security program? Multiple responses Emerging technologies organizations invest in to evolve security programs Healthcare payer and provider Global 55% 54% 48% 45% 45% 44% 43% 41% 40% 43% 57% 43% 50% 49% 45% 40% 44% 38% IoT security Security intelligence platforms Blockchain Threat hunting Continuous control monitoring and reporting Managed security services Machine learning/artificial intelligence Password-less authentication Robotic process automation (RPA) New technologies such as artificial intelligence, machine/deep learning user behavior analytics, blockchain, etc. are essential to securing the future of the organization. 2018 Global: 83% 2018 Healthcare payer and provider: 85%
  • 17. Copyright © 2019 Accenture Security. All rights reserved. THIS STUDY WAS FIELDED FEBRUARY 2018 Healthcare payer and provider sample size: 202 Location Global Healthcare Australia 401 12 Brazil 130 11 Canada 150 10 France 401 13 Germany 400 12 Ireland 124 10 Italy 302 14 Japan 400 12 Netherlands 115 10 Norway 114 10 Singapore 126 10 Spain 250 15 United Arab Emirates 132 15 United Kingdom 450 18 United States 1174 25 Industry Global Healthcare Aerospace & Defense 100 0 AFS 152 0 Automotive 101 0 Banking & Capital Markets 410 0 Chemicals 202 0 Comm & Media 410 0 CP&S 410 0 Energy (Oil & Gas) 200 0 Healthcare (payer) 100 100 Healthcare (provider) 102 102 High Technology 411 0 Industrial Equipment 313 0 Insurance 411 0 Life Sciences 200 0 Public Service 301 0 Retail 411 0 Software & Platforms 221 0 Utilities 214 0 Title Global Healthcare CISO 1513 68 Chief Security Officer 1429 63 Chief Compliance Officer 829 37 Chief Risk Officer 535 23 Chief Security Architect 133 4 Corporate Security Officer 78 7 Civilian - Political Appointee 50 0 Civilian - Senior Executive Service (SES) 49 0 Civilian - GS-13 to GS-15 27 0 Military - Officer (O-7 to O-10) 23 0 Military - Officer (O-4 to O-6) 3 0 Title Global Healthcare $50 bn or more 58 3 $20 bn-$49.9 bn 276 14 $10 bn-$19.9 bn 891 38 $6 bn-$9.9 bn 1,432 54 $1 bn-$5.9 bn 2,012 93
  • 18. Copyright © 2019 Accenture. All rights reserved. 18 ABOUT THE RESEARCH In 2017, Accenture Security surveyed 2,000 executives to understand the extent to which organizations prioritize security, how comprehensive their security plans are, what security capabilities they have, and their level of spend on security. Just over a year later, Accenture Security undertook a similar survey, this time interviewing 4,600 executives—representing organizations with annual revenues of $1bn or more—from 19 industries and 15 countries across North and South America, Europe and Asia Pacific. More than 98 percent of respondents were sole or key decision-makers in cybersecurity strategy and spending for their organization. LEARN MORE accenture.com/stateofcyber 2018 State of Cyber Resilience
  • 19. Copyright © 2019 Accenture. All rights reserved. 19 About Accenture Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions—underpinned by the world’s largest delivery network—Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With approximately 442,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com About Accenture Security Accenture Security helps organizations build resilience from the inside out, so they can confidently focus on innovation and growth. Leveraging its global network of cybersecurity labs, deep industry understanding across client value chains and services that span the security lifecycle, Accenture protects organization’s valuable assets, end-to-end. With services that include strategy and risk management, cyber defense, digital identity, application security and managed security, Accenture enables businesses around the world to defend against known sophisticated threats, and the unknown. Follow us @AccentureSecure on Twitter or visit the Accenture Security blog.