accenture security services: defending and empowering the resilient digital business
TRANSCRIPT
Defending and empowering the resilient digital business
Accenture Security Services
Copyright © 2016 Accenture. All rights reserved. 2
Sophisticated, well-funded cybercriminals are outpacing digital businesses
*Source: Ponemon Institute Study 2015**Source: “Internet Security Threat Report,” Symantec, April 2015, Volume 20.
The impact of security threats is increasingly devastating.With the explosion of the IoT, cloud and mobile, digital technology is now pervasive. The opportunities for attack are surging, opening up new areas of vulnerability for security, privacy and data integrity.
5 out of 6 organizations with 2,500+ employees attacked**
317 millionnew pieces of malware created in 2014**
23% risein data breaches in 2014*, and a 50% spike in successful attacks since 2012**
$7.7 milliondamage per company in 2015*
Copyright © 2016 Accenture. All rights reserved. 3
Business leaders know it’s not enough to focus purely on prevention of security breaches.
To truly defend and empower your organization, you also need to detect, intercept and remediate even the most unthinkable threats.
Boardroom priority: “How resilient are we?”
“The impact of security risks is understated because a lot goes unreported. The costs of prevention and remediation are massive and the brands of organizations and the reputations of their top leaders are put at stake.”
Omar Abbosh, Chief Strategy Officer, Accenture
Copyright © 2016 Accenture. All rights reserved. 4
Build resilience, outpace attackers and turn to what matters most: innovation and business growth … uninterrupted.
A persistently vigilant business is a resilient business
Defend the Business from Hostile Adversaries
Empower Business Growth & Secure Operations
Confidently address growing boardroom and C-suite security priorities (shareholder value, revenue and compliance).
Interlock security strategy with business strategy and spend appropriately on what’s most important.
Gain security-situational awareness across expanding business boundaries and develop rapid-response capabilities to minimize losses through next-generation technology such as security automation and relentless improvement.
Initiate organizational change and transform security to be digital friendly, taking into account user centricity, Internet scale and digital technologies (IoT, big data etc.).
Continuously test environmental robustness by “training like you fight.”
Manage technology and process security risks outside of direct organizational control while leveraging security “As-a-Service” for greater agility.
Copyright © 2016 Accenture. All rights reserved. 5
Go beyond risk-based tactics to sophisticated, intelligent digital strategies that are embedded into the fabric of the enterprise and engineered for the future.
Replace vulnerability with capability
Market Maker
Reactionary and Ad Hoc
Embedded andOptimized
Threat-centric,Risk-based
Compliance-based
MAT
UR
ITY
LEVE
L
2015–16
2013–14
2017
Pre-2010
2018 & Beyond
1.0 2.0 3.0 4.0
2018 and Beyond: Market Maker
Achieving resilience through innovative security programs
that have a cross-industry impact.
2017: Embedded and Optimized
Consistently embedding security and optimizing the business for agility, freeing staff to innovate.
Today: Threat-centric, Risk-based
Proactively identifying and addressing threats in the context
of enterprise risk.
YEARS
Copyright © 2016 Accenture. All rights reserved. 6
Success hinges on a 360-degree approach and a relentless focus on business impact
Business driven
Threat centric
Digitally protected
Adaptive responses
Agile delivery
Strategy & Business Alignment
Assessment & Architecture
Governance, Risk & Compliance
People & Culture Change
Application & Data Security
Platform & Infrastructure Security
Digital Identity
Incident Response
Remediation
Vulnerability Management
& Threat Intelligence
Advanced Adversary Simulations
Security Monitoring
Cyber Threat Analytics
Copyright © 2016 Accenture. All rights reserved. 7
Our mindset: Continuous innovation, empowered by technology, our culture and ecosystem
Contextual & behavioral analytics
Culture of non-stop innovation
Ecosystem collaboration
Helps clients quickly identify active threats to their businesses.
Accelerates R&D and allows us to focus on innovating today while anticipating tomorrow’s threats and opportunities.
Leverages a vendor-independent approach and the best partnerships and thinking.
At speed, at scale, on demandAround the world and around the clock, we speed the pace of your security journey and help you deliver high performance.
Copyright © 2016 Accenture. All rights reserved.
Copyright © 2016 Accenture. All rights reserved. 9
Trusted advisors. Continuously innovating. Focused on outcomes.
Comprehensive, holistic solutionsOur holistic capabilities—from security strategy to operations—and 360-degree approach that takes into account people, process and technology, address the full spectrum of security challenges you face.
A partner that helps you thriveCombining our deep industry and technology expertise, we collaborate closely with you to understand your business, its values and vulnerabilities so we can help tightly synch your security strategy with your business goals.
Culture of continuous innovationInnovating non stop to stay one step ahead. Collaborating across our network of R&D labs, centers of excellence and alliance ecosystem, to develop breakthrough solutions built to adapt to and thrive in a sophisticated threat landscape.
Leaders in next-gen Cyber DefenseInvesting in advanced automation, behavioral analytics and threat-centric solutions to continuously test, identify and eliminate exploitable security gaps in real time and at scale.
Business resilience at speed and scaleManaging security around the world and around the clock, our global scale, end-to-end capabilities and proven practices speed the pace of your security journey and help you deliver high performance—uninterrupted.
Business outcome focusedDriving measurable business outcomes for clients with transformation-led solutions that address increasingly complex needs.
Contacts
Copyright © 2016 Accenture. All rights reserved. 10
Bill PhelpsSecurity Consulting & Managed [email protected]
Andrew VautierSecurity Strategy Center of ExcellenceAccenture Chief Information Security [email protected]
Steven CulpFinance & Risk [email protected]
Ryan LaSalleSecurity Consulting & Managed [email protected]
Kevin RichardsSecurity Strategy, North America [email protected]
Adam BurdenApplication [email protected]
Accenture Strategy Accenture Operations Accenture Financial Services
Accenture Technology