More Related Content Similar to Accenture Security Services: Defending and empowering the resilient digital business (20) More from Accenture Technology (20) Accenture Security Services: Defending and empowering the resilient digital business2. Sophisticated, well-funded cybercriminals are
outpacing digital businesses
Copyright © 2016 Accenture. All rights reserved. 2
*Source: Ponemon Institute Study 2015
**Source: “Internet Security Threat Report,” Symantec, April 2015, Volume 20.
The impact of security threats is increasingly devastating.
With the explosion of the IoT, cloud and mobile, digital technology is now pervasive.
The opportunities for attack are surging, opening up new areas of vulnerability for security,
privacy and data integrity.
5 out of 6
organizations with
2,500+ employees
attacked**
317 million
new pieces of
malware created
in 2014**
23% rise
in data breaches in
2014*, and a 50%
spike in successful
attacks since
2012**
$7.7 million
damage per
company in
2015*
3. Business leaders know it’s not enough to focus purely on prevention of
security breaches.
To truly defend and empower your organization, you also need to detect,
intercept and remediate even the most unthinkable threats.
Boardroom priority: “How resilient are we?”
Copyright © 2016 Accenture. All rights reserved. 3
“The impact of security risks is
understated because a lot goes
unreported. The costs of prevention
and remediation are massive and
the brands of organizations and the
reputations of their top leaders are
put at stake.”
Omar Abbosh,
Chief Strategy Officer, Accenture
4. Build resilience, outpace attackers and turn to what matters most: innovation and
business growth … uninterrupted.
A persistently vigilant business is a resilient business
Copyright © 2016 Accenture. All rights reserved. 4
Defend the Business from
Hostile Adversaries
Empower Business Growth
& Secure Operations
Confidently address growing boardroom
and C-suite security priorities (shareholder
value, revenue and compliance).
Interlock security strategy with business
strategy and spend appropriately on what’s
most important.
Gain security-situational awareness across
expanding business boundaries and
develop rapid-response capabilities to
minimize losses through next-generation
technology such as security automation and
relentless improvement.
Initiate organizational change and transform
security to be digital friendly, taking into
account user centricity, Internet scale and
digital technologies (IoT, big data etc.).
Continuously test environmental robustness
by “training like you fight.”
Manage technology and process security
risks outside of direct organizational
control while leveraging security “As-a-
Service” for greater agility.
5. Go beyond risk-based tactics to sophisticated, intelligent digital strategies that
are embedded into the fabric of the enterprise and engineered for the future.
Replace vulnerability with capability
Copyright © 2016 Accenture. All rights reserved. 5
Market Maker
Reactionary
and Ad Hoc
Embedded and
Optimized
Threat-centric,
Risk-based
Compliance-
based
MATURITYLEVEL
2015–16
2013–14
2017
Pre-2010
2018 & Beyond
1.0 2.0 3.0 4.0
2018 and Beyond:
Market Maker
Achieving resilience through
innovative security programs
that have a cross-industry impact.
2017: Embedded
and Optimized
Consistently embedding security
and optimizing the business for
agility, freeing staff to innovate.
Today: Threat-centric,
Risk-based
Proactively identifying and
addressing threats in the context
of enterprise risk.
YEARS
6. Success hinges on a
360-degree approach
and a relentless
focus on business
impact
Copyright © 2016 Accenture. All rights reserved. 6
Business driven
Threat centric
Digitally protected
Adaptive responses
Agile delivery
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Identity
Incident Response
Remediation
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
7. Our mindset: Continuous innovation, empowered
by technology, our culture and ecosystem
Copyright © 2016 Accenture. All rights reserved. 7
Contextual &
behavioral analytics
Culture of non-stop
innovation
Ecosystem
collaboration
Helps clients quickly
identify active threats to
their businesses.
Accelerates R&D and allows
us to focus on innovating
today while anticipating
tomorrow’s threats and
opportunities.
Leverages a vendor-
independent approach
and the best partnerships
and thinking.
8. At speed, at scale, on demand
Around the world and around the clock, we speed the pace of your
security journey and help you deliver high performance.
Copyright © 2016 Accenture. All rights reserved.
9. Trusted advisors. Continuously innovating.
Focused on outcomes.
Copyright © 2016 Accenture. All rights reserved. 9
Comprehensive, holistic solutions
Our holistic capabilities—from security
strategy to operations—and 360-degree
approach that takes into account people,
process and technology, address the full
spectrum of security challenges you face.
A partner that helps you thrive
Combining our deep industry and
technology expertise, we collaborate
closely with you to understand your
business, its values and vulnerabilities so
we can help tightly synch your security
strategy with your business goals.
Culture of continuous innovation
Innovating non stop to stay one step ahead.
Collaborating across our network of R&D
labs, centers of excellence and alliance
ecosystem, to develop breakthrough
solutions built to adapt to and thrive in a
sophisticated threat landscape.
Leaders in next-gen Cyber Defense
Investing in advanced automation,
behavioral analytics and threat-centric
solutions to continuously test, identify and
eliminate exploitable security gaps in real
time and at scale.
Business resilience at speed and scale
Managing security around the world and around
the clock, our global scale, end-to-end
capabilities and proven practices speed the
pace of your security journey and help you
deliver high performance—uninterrupted.
Business outcome focused
Driving measurable business outcomes
for clients with transformation-led solutions
that address increasingly complex needs.
10. Contacts
Copyright © 2016 Accenture. All rights reserved. 10
Bill Phelps
Security Consulting & Managed
Services
bill.phelps@accenture.com
Andrew Vautier
Security Strategy Center of Excellence
Accenture Chief Information Security Officer
andrew.vautier@accenture.com
Steven Culp
Finance & Risk
steven.r.culp@accenture.com
Ryan LaSalle
Security Consulting & Managed
Services
FusionX
ryan.m.lasalle@accenture.com
Kevin Richards
Security Strategy, North America
k.richards@accenture.com
Adam Burden
Application Security
adam.p.burden@accenture.com
Accenture Strategy Accenture Operations Accenture Financial Services
Accenture Technology