SlideShare une entreprise Scribd logo
1  sur  12
CYBER SECURITY
IN AUSTRALIA AND
NEW ZEALAND:
HOW
OPERATIONAL
EFFECTIVENESS
IS KEY
STRATEGY AND TECHNOLOGY ALONE
DO NOT GUARANTEE AN EFFECTIVE
CYBER DEFENCE
The best strategy, supported by the latest technology,
can fail if not executed properly.
Risks to effective cyber defence include:
• Increased exposure to attack
(cloud, Internet of Things, connected devices)
• High turnover within security team
• Lack of visibility to critical assets
• Frequent IT changes not communicated
• Length of time taken to detect breaches
Copyright © 2016 Accenture. All rights reserved. 2
SHORTAGE OF CRITICAL TECHNOLOGIES
AND SKILLS HAMPER ORGANISATIONS’
SECURITY APPROACH
• Operations lack rigor and consistency
• Stakeholders remain unaware of their vulnerability
• Employees don’t follow standard security practices
• Security work generates “noise” that masks valid threats
• Out-dated tools and processes can limit effectiveness
of the security team
Copyright © 2016 Accenture. All rights reserved. 3
DRIVE IMPROVED SECURITY
OPERATIONS FROM ACTIONABLE
THREAT INTELLIGENCE
Steps that can create security operational excellence:
1. Assess effectiveness of current security processes
2. Invest in attracting and retaining skilled security talent
3. Automate intelligently to leverage scarce resources
4. Understand how threat data pertains to the business
5. Identify what isn’t known
6. Create a plan to address knowledge gaps
7. Find an effective sparring partner to improve security capabilities
Copyright © 2016 Accenture. All rights reserved. 4
CYBER DEFENCE STRATEGIES AND
SUPPORTING TECHNOLOGY WILL ONLY
WORK IF EXECUTED PROPERLY
Leading organisations focus on creating a highly efficient
operating model that balances security operations,
new technology implementation, testing of security
posture and feedback to update defences.
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Security
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
5Copyright © 2016 Accenture. All rights reserved.
ACHIEVING OPERATIONAL EXCELLENCE
IN CYBER DEFENCE REQUIRES A
COMPREHENSIVE APPROACH
Our model helps organisations prepare and protect for
threats, defend and detect breaches, and then respond to
and recover from incidents.
Application &
Data Security
Platform &
Infrastructure Security
Digital Security
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Security
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
6Copyright © 2016 Accenture. All rights reserved.
START WITH A BIG-PICTURE STRATEGY
OF HOW SECURITY SUPPORTS
BUSINESS PERFORMANCE
• Forward-thinking capabilities to help
scale activities
• IT strategy that provides greater understanding
of assets, data sets, technical and
business functions
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Security
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
7Copyright © 2016 Accenture. All rights reserved.
FORWARD-THINKING CAPABILITIES
HELP SCALE ACTIVITIES EFFECTIVELY
• High-powered analytics to predict and detect incidents,
and identify behavior changes that indicate security risks
• Emphasis on visualisation to
identify anomalies
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Security
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
8Copyright © 2016 Accenture. All rights reserved.
CONCENTRATE ON INTELLIGENT
INCIDENT RESPONSE
• Platforms that guide operators in hunting for threats
• Train the same way the company fights attackers, to
prepare for real-world adversaries
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Security
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
9Copyright © 2016 Accenture. All rights reserved.
THE GOAL
Create a highly efficient operating model
that balances security operations, new
technology implementation, testing of
security posture and feedback to update
defences.
Copyright © 2016 Accenture. All rights reserved. 10
THANK YOU
For further information:
• Visit Accenture.com/operationaleffectiveness
• Follow us on Twitter @AccentureSecure
• Contact APAC Security Lead, Joshua Kennedy-White
Copyright © 2016 Accenture. All rights reserved. 11
ABOUT ACCENTURE
Accenture is a leading global professional services company, providing a
broad range of services and solutions in strategy, consulting, digital,
technology and operations. Combining unmatched experience and
specialized skills across more than 40 industries and all business
functions—underpinned by the world’s largest delivery network—
Accenture works at the intersection of business and technology to help
clients improve their performance and create sustainable value for their
stakeholders. With approximately 373,000 people serving clients in more
than 120 countries, Accenture drives innovation to improve the way the
world works and lives. Visit us at www.accenture.com.
Accenture, its logo, and High performance. Delivered. are trademarks of Accenture.
Copyright © 2016 Accenture
All rights reserved.

Contenu connexe

En vedette

Guarding and Growing Personal Data Value
Guarding and Growing Personal Data ValueGuarding and Growing Personal Data Value
Guarding and Growing Personal Data Valueaccenture
 
Setting up The Centre of Excellence for Rpa
Setting up The Centre of Excellence for RpaSetting up The Centre of Excellence for Rpa
Setting up The Centre of Excellence for RpaMohit Sharma (GAICD)
 
The digital government: shaped around its citizens
The digital government: shaped around its citizensThe digital government: shaped around its citizens
The digital government: shaped around its citizensAccenture Australia
 
Buying RPA - From Hype to Reality
Buying RPA - From Hype to RealityBuying RPA - From Hype to Reality
Buying RPA - From Hype to RealitySymphony Ventures
 
The Real World of Robotics Process Automation (RPA)
The Real World of Robotics Process Automation (RPA)The Real World of Robotics Process Automation (RPA)
The Real World of Robotics Process Automation (RPA)CGI Suomi
 
What, Why and How of Governance in RPA
What, Why and How of Governance  in RPAWhat, Why and How of Governance  in RPA
What, Why and How of Governance in RPAMohit Sharma (GAICD)
 
Lessons learned and business case for a rapid RPA
Lessons learned and business case for a rapid RPALessons learned and business case for a rapid RPA
Lessons learned and business case for a rapid RPAMohit Sharma (GAICD)
 

En vedette (11)

Guarding and Growing Personal Data Value
Guarding and Growing Personal Data ValueGuarding and Growing Personal Data Value
Guarding and Growing Personal Data Value
 
Technology Vision 2017 - Overview
Technology Vision 2017 - OverviewTechnology Vision 2017 - Overview
Technology Vision 2017 - Overview
 
28022017 Simen Munter Mindfields
28022017 Simen Munter Mindfields28022017 Simen Munter Mindfields
28022017 Simen Munter Mindfields
 
Setting up The Centre of Excellence for Rpa
Setting up The Centre of Excellence for RpaSetting up The Centre of Excellence for Rpa
Setting up The Centre of Excellence for Rpa
 
The digital government: shaped around its citizens
The digital government: shaped around its citizensThe digital government: shaped around its citizens
The digital government: shaped around its citizens
 
28022017 Mohit Sharma
28022017 Mohit Sharma28022017 Mohit Sharma
28022017 Mohit Sharma
 
Buying RPA - From Hype to Reality
Buying RPA - From Hype to RealityBuying RPA - From Hype to Reality
Buying RPA - From Hype to Reality
 
Network Transformation Roadmap
Network Transformation RoadmapNetwork Transformation Roadmap
Network Transformation Roadmap
 
The Real World of Robotics Process Automation (RPA)
The Real World of Robotics Process Automation (RPA)The Real World of Robotics Process Automation (RPA)
The Real World of Robotics Process Automation (RPA)
 
What, Why and How of Governance in RPA
What, Why and How of Governance  in RPAWhat, Why and How of Governance  in RPA
What, Why and How of Governance in RPA
 
Lessons learned and business case for a rapid RPA
Lessons learned and business case for a rapid RPALessons learned and business case for a rapid RPA
Lessons learned and business case for a rapid RPA
 

Dernier

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Cyber security in australia and new zealand

  • 1. CYBER SECURITY IN AUSTRALIA AND NEW ZEALAND: HOW OPERATIONAL EFFECTIVENESS IS KEY
  • 2. STRATEGY AND TECHNOLOGY ALONE DO NOT GUARANTEE AN EFFECTIVE CYBER DEFENCE The best strategy, supported by the latest technology, can fail if not executed properly. Risks to effective cyber defence include: • Increased exposure to attack (cloud, Internet of Things, connected devices) • High turnover within security team • Lack of visibility to critical assets • Frequent IT changes not communicated • Length of time taken to detect breaches Copyright © 2016 Accenture. All rights reserved. 2
  • 3. SHORTAGE OF CRITICAL TECHNOLOGIES AND SKILLS HAMPER ORGANISATIONS’ SECURITY APPROACH • Operations lack rigor and consistency • Stakeholders remain unaware of their vulnerability • Employees don’t follow standard security practices • Security work generates “noise” that masks valid threats • Out-dated tools and processes can limit effectiveness of the security team Copyright © 2016 Accenture. All rights reserved. 3
  • 4. DRIVE IMPROVED SECURITY OPERATIONS FROM ACTIONABLE THREAT INTELLIGENCE Steps that can create security operational excellence: 1. Assess effectiveness of current security processes 2. Invest in attracting and retaining skilled security talent 3. Automate intelligently to leverage scarce resources 4. Understand how threat data pertains to the business 5. Identify what isn’t known 6. Create a plan to address knowledge gaps 7. Find an effective sparring partner to improve security capabilities Copyright © 2016 Accenture. All rights reserved. 4
  • 5. CYBER DEFENCE STRATEGIES AND SUPPORTING TECHNOLOGY WILL ONLY WORK IF EXECUTED PROPERLY Leading organisations focus on creating a highly efficient operating model that balances security operations, new technology implementation, testing of security posture and feedback to update defences. Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation 5Copyright © 2016 Accenture. All rights reserved.
  • 6. ACHIEVING OPERATIONAL EXCELLENCE IN CYBER DEFENCE REQUIRES A COMPREHENSIVE APPROACH Our model helps organisations prepare and protect for threats, defend and detect breaches, and then respond to and recover from incidents. Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation 6Copyright © 2016 Accenture. All rights reserved.
  • 7. START WITH A BIG-PICTURE STRATEGY OF HOW SECURITY SUPPORTS BUSINESS PERFORMANCE • Forward-thinking capabilities to help scale activities • IT strategy that provides greater understanding of assets, data sets, technical and business functions Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation 7Copyright © 2016 Accenture. All rights reserved.
  • 8. FORWARD-THINKING CAPABILITIES HELP SCALE ACTIVITIES EFFECTIVELY • High-powered analytics to predict and detect incidents, and identify behavior changes that indicate security risks • Emphasis on visualisation to identify anomalies Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation 8Copyright © 2016 Accenture. All rights reserved.
  • 9. CONCENTRATE ON INTELLIGENT INCIDENT RESPONSE • Platforms that guide operators in hunting for threats • Train the same way the company fights attackers, to prepare for real-world adversaries Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation 9Copyright © 2016 Accenture. All rights reserved.
  • 10. THE GOAL Create a highly efficient operating model that balances security operations, new technology implementation, testing of security posture and feedback to update defences. Copyright © 2016 Accenture. All rights reserved. 10
  • 11. THANK YOU For further information: • Visit Accenture.com/operationaleffectiveness • Follow us on Twitter @AccentureSecure • Contact APAC Security Lead, Joshua Kennedy-White Copyright © 2016 Accenture. All rights reserved. 11
  • 12. ABOUT ACCENTURE Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions—underpinned by the world’s largest delivery network— Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With approximately 373,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com. Accenture, its logo, and High performance. Delivered. are trademarks of Accenture. Copyright © 2016 Accenture All rights reserved.