SlideShare a Scribd company logo
1 of 15
Security Implications
Each year, our Technology Vision pinpoints the emerging technology trends that will impact large
enterprises in the next 3-5 years based on our insights and research.
Security is a pervasive issue for organizations in the We Economy. To help executives understand and
plan for the future, we are pleased to release a dedicated report identifying the key Security Implications of
this year’s Technology Vision.
Accenture Technology Vision 2015
Digital Business Era: Stretch Your Boundaries
Copyright © 2015 Accenture All rights reserved.
Digital Business Era: Stretch Your Boundaries
Succeeding in the We Economy
3
Edge
Autonomy
Data
Integrity
Big Data
Security
Security
Platforms
Customer
Trust
1 2 3 4 5
5 Security Implications
Copyright © 2015 Accenture All rights reserved.
1
Edge Autonomy:
Enabling autonomous devices
at the edge
Copyright © 2015 Accenture All rights reserved.
The Accenture Technology Vision 2015 highlights how the rapidly growing
Internet of Things (IoT) is introducing billions of embedded sensors, smart
machines, wearable devices and connected industrial equipment. Businesses
are beginning to interconnect these “things” to enable the delivery of intelligent
products and services through the digital ecosystem. In time, this connected
intelligence will be used to deliver what customers really want: results, or what
Accenture calls the Outcome Economy.
There are 4 key actions to take to enable edge autonomy:
1.Prioritize protecting edge devices
2.Boost security for edge device infrastructure
3.Include system context in security planning
4.Manage edge intelligence with new governance model
Edge Autonomy:
Enabling autonomous devices at the edge.
#cybersecurity
www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
2
Data Integrity:
Making data-driven decisions at Internet
of Things scale.
6Copyright © 2015 Accenture All rights reserved.
As the IoT proliferates, businesses will use data passed between interconnected
devices, applications and processes to determine customer context, and then
collaborate through platforms to provide the intelligent products and services that
customers desire in the Outcome Economy. A connected digital ecosystem,
combined with edge computing and smart M2M communications, will expand the
ability to use data collected from IoT devices to drive significantly faster decisions.
To optimize decisions, businesses will require edge data that is accurate,
authentic and complete. Accenture proposes three key strategies:
1.Protect data on edge devices
2.Implement assurance that scales
3.Tie IoT protocols to business models
Data Integrity:
Making data-driven decisions at Internet of Things scale.
#cybersecurity
www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
3
Securing the three Vs.
8
Big Data Security:
Copyright © 2015 Accenture All rights reserved.
Businesses are experiencing exponential growth in data as more devices get
deployed at the edge and business processes become increasingly digital—
causing their data repositories to reach capacity. For Intelligent Enterprises to
fully reap the benefits of software intelligence and embrace a collaborative
workforce model of humans and machines (or what Accenture deems Workforce
Reimagined), it will be critical to securely process and protect big data.
Traditional database management systems cannot scale enough to handle the
data volume, acquisition velocity or data variety–what is often referred to as the
three Vs. Enterprises should focus on two key areas:
1.Secure big data processing platforms
2.Embed security into data
Big Data Security:
Securing the three Vs.
#cybersecurity
www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
4
Security Platforms:
Maximizing protection across digital
ecosystem platforms.
10Copyright © 2015 Accenture All rights reserved.
With the evolution of the IoT and digital industry ecosystems, platform-based
businesses will offer new opportunities for growth and profitability.
Platform security is a vital capability to operating in the digital ecosystem.
Businesses must understand the potential cyber-physical risks of delivering
platform-based services and augment existing security efforts with digital platform
intelligence. Accenture outlines 5 approaches to maximize security platforms:
1.Understand physical security risks
2.Evolve data security intelligently
3.Plan security into the platform
4.Utilize existing platforms to augment security intelligence
5.Shift to security DevOps
Security Platforms:
Maximizing protection across digital ecosystem platforms.
#cybersecurity
www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
5
Customer Trust:
Building customer trust in a digital
economy
Copyright © 2015 Accenture All rights reserved.
One of the key determinants of success for digital businesses will be the ability to
deliver products and services that are highly personalized based on individual their
specific habits and preferences. Accenture calls this trend the Internet of Me.
To maximize customer data and deliver personalization, businesses must apply
more stringent security measures to protect privacy—and ultimately build and
maintain trust with customers. We share 5 strategies to build customer trust:
1.Build trust by taking transparency seriously
2.Follow basic data protection guidelines
3.Take advantage of privacy-preserving analytics
4.Innovate to appeal to privacy-wary customers
5.Empower customers with tools
Customer Trust:
Building customer trust in a digital economy.
#cybersecurity
www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
Digital Business Era: Stretch Your Boundaries
14
Edge
Autonomy
Data
Integrity
Big Data
Security
Security
Platforms
Customer
Trust
1 2 3 4 5
5 Security Implications
Copyright © 2015 Accenture All rights reserved.
15
Accenture Technology Vision 2015
Digital Business Era: Stretch Your Boundaries
Security Implications
www.accenture.com/securityvision
www.accenture.com/technologyvision
#techvision2015 #cybersecurity
@accenturelabs
Copyright © 2015 Accenture All rights reserved.

More Related Content

Viewers also liked

Design in Business: It’s Not About Creating Something Pretty. It’s About Crea...
Design in Business: It’s Not About Creating Something Pretty. It’s About Crea...Design in Business: It’s Not About Creating Something Pretty. It’s About Crea...
Design in Business: It’s Not About Creating Something Pretty. It’s About Crea...accenture
 
AI is the New UI - Tech Vision 2017 Trend 1
AI is the New UI - Tech Vision 2017 Trend 1AI is the New UI - Tech Vision 2017 Trend 1
AI is the New UI - Tech Vision 2017 Trend 1Accenture Technology
 
Gender Pay Parity Prototype for the 'Gig' Economy - Accenture Labs
Gender Pay Parity Prototype for the 'Gig' Economy - Accenture LabsGender Pay Parity Prototype for the 'Gig' Economy - Accenture Labs
Gender Pay Parity Prototype for the 'Gig' Economy - Accenture LabsAccenture Technology
 
Accenture at Oracle OpenWorld 2015
Accenture at Oracle OpenWorld 2015Accenture at Oracle OpenWorld 2015
Accenture at Oracle OpenWorld 2015Accenture Technology
 
Growth Game Changer
Growth Game ChangerGrowth Game Changer
Growth Game Changeraccenture
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital ageAccenture Technology
 
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture Insurance
 
Accenture Technology Vision 2016. Focus on Pega® Technology.
Accenture Technology Vision 2016. Focus on Pega® Technology.Accenture Technology Vision 2016. Focus on Pega® Technology.
Accenture Technology Vision 2016. Focus on Pega® Technology.Accenture Technology
 
Being digital: Embracing the future of work
Being digital: Embracing the future of workBeing digital: Embracing the future of work
Being digital: Embracing the future of workaccenture
 
Why Software as a Service (SaaS) requires a new approach to Application Manag...
Why Software as a Service (SaaS) requires a new approach to Application Manag...Why Software as a Service (SaaS) requires a new approach to Application Manag...
Why Software as a Service (SaaS) requires a new approach to Application Manag...Accenture Technology
 
Going Deep: Mining Experiential and Behavioral Data in VR
Going Deep: Mining Experiential and Behavioral Data in VRGoing Deep: Mining Experiential and Behavioral Data in VR
Going Deep: Mining Experiential and Behavioral Data in VRAccenture Technology
 
Five Steps to Digital Success in the Insurance Sector
Five Steps to Digital Success in the Insurance SectorFive Steps to Digital Success in the Insurance Sector
Five Steps to Digital Success in the Insurance Sectoraccenture
 

Viewers also liked (15)

AI and the Future of Growth
AI and the Future of GrowthAI and the Future of Growth
AI and the Future of Growth
 
Design in Business: It’s Not About Creating Something Pretty. It’s About Crea...
Design in Business: It’s Not About Creating Something Pretty. It’s About Crea...Design in Business: It’s Not About Creating Something Pretty. It’s About Crea...
Design in Business: It’s Not About Creating Something Pretty. It’s About Crea...
 
AI is the New UI - Tech Vision 2017 Trend 1
AI is the New UI - Tech Vision 2017 Trend 1AI is the New UI - Tech Vision 2017 Trend 1
AI is the New UI - Tech Vision 2017 Trend 1
 
Gender Pay Parity Prototype for the 'Gig' Economy - Accenture Labs
Gender Pay Parity Prototype for the 'Gig' Economy - Accenture LabsGender Pay Parity Prototype for the 'Gig' Economy - Accenture Labs
Gender Pay Parity Prototype for the 'Gig' Economy - Accenture Labs
 
Accenture at Oracle OpenWorld 2015
Accenture at Oracle OpenWorld 2015Accenture at Oracle OpenWorld 2015
Accenture at Oracle OpenWorld 2015
 
Change Management
Change ManagementChange Management
Change Management
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Growth Game Changer
Growth Game ChangerGrowth Game Changer
Growth Game Changer
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital age
 
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for Insurance
 
Accenture Technology Vision 2016. Focus on Pega® Technology.
Accenture Technology Vision 2016. Focus on Pega® Technology.Accenture Technology Vision 2016. Focus on Pega® Technology.
Accenture Technology Vision 2016. Focus on Pega® Technology.
 
Being digital: Embracing the future of work
Being digital: Embracing the future of workBeing digital: Embracing the future of work
Being digital: Embracing the future of work
 
Why Software as a Service (SaaS) requires a new approach to Application Manag...
Why Software as a Service (SaaS) requires a new approach to Application Manag...Why Software as a Service (SaaS) requires a new approach to Application Manag...
Why Software as a Service (SaaS) requires a new approach to Application Manag...
 
Going Deep: Mining Experiential and Behavioral Data in VR
Going Deep: Mining Experiential and Behavioral Data in VRGoing Deep: Mining Experiential and Behavioral Data in VR
Going Deep: Mining Experiential and Behavioral Data in VR
 
Five Steps to Digital Success in the Insurance Sector
Five Steps to Digital Success in the Insurance SectorFive Steps to Digital Success in the Insurance Sector
Five Steps to Digital Success in the Insurance Sector
 

More from Accenture Technology

Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Technology
 
Helping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayHelping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayAccenture Technology
 
Accenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Technology
 
Helping you get back to the workplace confidently
Helping you get back to the workplace confidentlyHelping you get back to the workplace confidently
Helping you get back to the workplace confidentlyAccenture Technology
 
Driving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldDriving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldAccenture Technology
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology
 
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology
 
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology
 
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology
 
Elevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayElevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayAccenture Technology
 
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAutomating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAccenture Technology
 
Technology Vision 2019 for Workday
Technology Vision 2019 for WorkdayTechnology Vision 2019 for Workday
Technology Vision 2019 for WorkdayAccenture Technology
 
Accenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology
 

More from Accenture Technology (20)

Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020
 
Helping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayHelping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + Workday
 
Accenture Labs Innovation Stories
Accenture Labs Innovation StoriesAccenture Labs Innovation Stories
Accenture Labs Innovation Stories
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
 
Accenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP Solutions
 
Highlights on the five key trends
Highlights on the five key trendsHighlights on the five key trends
Highlights on the five key trends
 
Helping you get back to the workplace confidently
Helping you get back to the workplace confidentlyHelping you get back to the workplace confidently
Helping you get back to the workplace confidently
 
Driving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldDriving Workday transformation in a virtual world
Driving Workday transformation in a virtual world
 
Accenture + Red Hat
Accenture + Red HatAccenture + Red Hat
Accenture + Red Hat
 
Accenture and Mercedes Case Study
Accenture and Mercedes Case StudyAccenture and Mercedes Case Study
Accenture and Mercedes Case Study
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: Infographic
 
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: Overview
 
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and Me
 
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNA
 
Elevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayElevating the Workforce Experience with Workday
Elevating the Workforce Experience with Workday
 
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAutomating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
 
Technology Vision for SAP 2019
Technology Vision for SAP 2019Technology Vision for SAP 2019
Technology Vision for SAP 2019
 
Technology Vision 2019 for Workday
Technology Vision 2019 for WorkdayTechnology Vision 2019 for Workday
Technology Vision 2019 for Workday
 
Accenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for Pega
 

Recently uploaded

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

IT Security: Implications for the Technology Vision 2015

  • 2. Each year, our Technology Vision pinpoints the emerging technology trends that will impact large enterprises in the next 3-5 years based on our insights and research. Security is a pervasive issue for organizations in the We Economy. To help executives understand and plan for the future, we are pleased to release a dedicated report identifying the key Security Implications of this year’s Technology Vision. Accenture Technology Vision 2015 Digital Business Era: Stretch Your Boundaries Copyright © 2015 Accenture All rights reserved.
  • 3. Digital Business Era: Stretch Your Boundaries Succeeding in the We Economy 3 Edge Autonomy Data Integrity Big Data Security Security Platforms Customer Trust 1 2 3 4 5 5 Security Implications Copyright © 2015 Accenture All rights reserved.
  • 4. 1 Edge Autonomy: Enabling autonomous devices at the edge Copyright © 2015 Accenture All rights reserved.
  • 5. The Accenture Technology Vision 2015 highlights how the rapidly growing Internet of Things (IoT) is introducing billions of embedded sensors, smart machines, wearable devices and connected industrial equipment. Businesses are beginning to interconnect these “things” to enable the delivery of intelligent products and services through the digital ecosystem. In time, this connected intelligence will be used to deliver what customers really want: results, or what Accenture calls the Outcome Economy. There are 4 key actions to take to enable edge autonomy: 1.Prioritize protecting edge devices 2.Boost security for edge device infrastructure 3.Include system context in security planning 4.Manage edge intelligence with new governance model Edge Autonomy: Enabling autonomous devices at the edge. #cybersecurity www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
  • 6. 2 Data Integrity: Making data-driven decisions at Internet of Things scale. 6Copyright © 2015 Accenture All rights reserved.
  • 7. As the IoT proliferates, businesses will use data passed between interconnected devices, applications and processes to determine customer context, and then collaborate through platforms to provide the intelligent products and services that customers desire in the Outcome Economy. A connected digital ecosystem, combined with edge computing and smart M2M communications, will expand the ability to use data collected from IoT devices to drive significantly faster decisions. To optimize decisions, businesses will require edge data that is accurate, authentic and complete. Accenture proposes three key strategies: 1.Protect data on edge devices 2.Implement assurance that scales 3.Tie IoT protocols to business models Data Integrity: Making data-driven decisions at Internet of Things scale. #cybersecurity www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
  • 8. 3 Securing the three Vs. 8 Big Data Security: Copyright © 2015 Accenture All rights reserved.
  • 9. Businesses are experiencing exponential growth in data as more devices get deployed at the edge and business processes become increasingly digital— causing their data repositories to reach capacity. For Intelligent Enterprises to fully reap the benefits of software intelligence and embrace a collaborative workforce model of humans and machines (or what Accenture deems Workforce Reimagined), it will be critical to securely process and protect big data. Traditional database management systems cannot scale enough to handle the data volume, acquisition velocity or data variety–what is often referred to as the three Vs. Enterprises should focus on two key areas: 1.Secure big data processing platforms 2.Embed security into data Big Data Security: Securing the three Vs. #cybersecurity www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
  • 10. 4 Security Platforms: Maximizing protection across digital ecosystem platforms. 10Copyright © 2015 Accenture All rights reserved.
  • 11. With the evolution of the IoT and digital industry ecosystems, platform-based businesses will offer new opportunities for growth and profitability. Platform security is a vital capability to operating in the digital ecosystem. Businesses must understand the potential cyber-physical risks of delivering platform-based services and augment existing security efforts with digital platform intelligence. Accenture outlines 5 approaches to maximize security platforms: 1.Understand physical security risks 2.Evolve data security intelligently 3.Plan security into the platform 4.Utilize existing platforms to augment security intelligence 5.Shift to security DevOps Security Platforms: Maximizing protection across digital ecosystem platforms. #cybersecurity www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
  • 12. 5 Customer Trust: Building customer trust in a digital economy Copyright © 2015 Accenture All rights reserved.
  • 13. One of the key determinants of success for digital businesses will be the ability to deliver products and services that are highly personalized based on individual their specific habits and preferences. Accenture calls this trend the Internet of Me. To maximize customer data and deliver personalization, businesses must apply more stringent security measures to protect privacy—and ultimately build and maintain trust with customers. We share 5 strategies to build customer trust: 1.Build trust by taking transparency seriously 2.Follow basic data protection guidelines 3.Take advantage of privacy-preserving analytics 4.Innovate to appeal to privacy-wary customers 5.Empower customers with tools Customer Trust: Building customer trust in a digital economy. #cybersecurity www.accenture.com/securityvisionCopyright © 2015 Accenture All rights reserved.
  • 14. Digital Business Era: Stretch Your Boundaries 14 Edge Autonomy Data Integrity Big Data Security Security Platforms Customer Trust 1 2 3 4 5 5 Security Implications Copyright © 2015 Accenture All rights reserved.
  • 15. 15 Accenture Technology Vision 2015 Digital Business Era: Stretch Your Boundaries Security Implications www.accenture.com/securityvision www.accenture.com/technologyvision #techvision2015 #cybersecurity @accenturelabs Copyright © 2015 Accenture All rights reserved.