SlideShare a Scribd company logo
1 of 13
Download to read offline
COSTOF
CYBERCRIME
STUDY
INSIGHTSONTHE
SECURITYINVESTMENTS
THATMAKEADIFFERENCE
INFINANCIALSERVICES
SECURITY BREACHES
CONTINUE TO PLAGUE
FINANCIAL SERVICES
Average annualized cost
of cyber crime (USD)
$18.28Average number of security
breaches each year
125
+9.6%Increase in the last year
… AND THE COST
OF BREACHES
CONTINUES TO RISE
… FINANCIAL SERVICES IS
SLIGHTLY BETTER THAN
GLOBAL PEERS
Average number of security
breaches each year
130
Copyright © 2018 Accenture Security. All rights reserved. 2
Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
5.04
5.07
6.47
7.10
7.34
7.36
8.28
9.30
10.22
11.05
12.47
13.17
14.46
17.20
$18.28
$0 4 8 12 16 20
Hospitality
Education
Life science
Communications
Consumer products
Transportation
Public sector
Retail
Industrial/manufacturing
Services
Healthcare
Technology and software
Aerospace and defense
Utilities and energy
Financial services
Average annualized
cost by industry sector
US$ millions
Legend
n = 351 interviews
in the Financial Services
Industry
Total annualized cost
($1 million omitted)
Copyright © 2018 Accenture Security. All rights reserved. 3
FINANCIAL SERVICES HAS THE HIGHEST COST
OF CYBER CRIME
Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
Copyright © 2018 Accenture Security. All rights reserved. 4
IN FINANCIAL SERVICES, DENIAL OF SERVICES,
PHISHING & SOCIAL ENGINEERING ARE THE
TWO MOST COSTLY ATTACK TYPES
Average cost
per attack
$ thousands
Legend
n = 351 interviews
in the Financial
Services Industry
1,015
5,462
43,034
87,460
89,686
114,700
169,059
196,610
$227,865
$0K 50 100 150 200 250
Botnets
Malware
Stolen devices
Malicious code
Ransomware
Web-based attacks
Malicious insiders
Phishing & social
engineering
Denial of services
Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
Copyright © 2018 Accenture Security. All rights reserved. 5
MALICIOUS CODE AND MALICIOUS INSIDERS
CONTINUE TO TOP THE LIST – TAKING THE
LONGEST TO RESOLVE
Length of time to resolve
an attack in days
Estimated average time is
measured for each attack
type in days
Legend
n = 351 Interviews in the
Financial Services Industry
FY 2016
FY 2017
2.8
6.2
14.7
14.7
20.0
26.0
23.9
58.8
65.8
1.8
4.3
13.2
15.0
19.9
23.0
25.0
58.8
56.7
0 Days 10 20 30 40 50 60 70
Botnets
Malware
Stolen devices
Denial of service
Phishing & social
engineering
Ransomware
Web-based attack
Malicious insiders
Malicious code
Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
Copyright © 2018 Accenture Security. All rights reserved. 6
DETECTION ACCOUNTS FOR 41% OF SECURITY
COSTS FOR FINANCIAL SERVICES COMPANIES …
16
Containment
19
Recovery
13
Investigation
41
Detection
11
Incident Management
and Ex-post Response
Percentage cost
by internal activities
Legend
n = 351 interviews in the
Financial Services
Detection
Containment
Recovery
Investigation
Incident management
and ex-post response
Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
Copyright © 2018 Accenture Security. All rights reserved. 7
… BUT INFORMATION LOSS IS ONE OF THE
MOST EXPENSIVE CONSEQUENCES OF
CYBER ATTACKS IN FINANCIAL SERVICES
Percentage cost
by consequence
Legend
n = 351 interviews in
the Financial Services
Industry
Business disruption
Information loss
Revenue loss
52
Information
Loss
13
Revenue
Loss
35
Business
Disruption
Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
Copyright © 2018 Accenture Security. All rights reserved. 8
SPENDING LEVELS BALANCED FOR KEY
SECURITY TECHNOLOGIES – AI-BASED 3RD &
ADVANCED ANALYTICS 4TH FOR COST SAVINGS
+1
-1
+1
-1
=
=
+1
-1
=
0 1 2 3 4 5 6 7 8 9
Automated policy management
Enterprise deployment of
governance, risk & compliance
Extensive use of data
loss prevention
Extensive deployment of
encryption technologies
Advanced perimeter controls
Extensive use of cyber analytics
and user behavior analytics
Automation, orchestration
and machine learning (AI-based)
Advanced identity and
access governance
Security intelligence systems
Value gap
Rank orderings by
spending levels
and cost savings
Legend
1 = Highest rank
9 = Lowest rank
Rank by percentage
spending
Rank by cost savings
Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017 Note: Artificial Intelligence = AI
Copyright © 2018 Accenture Security. All rights reserved. 9
… ONLY 26% HAVE DEPLOYED AI-BASED
SECURITY TECHNOLOGIES AND 31% ADVANCED
ANALYTICS
26
29
31
52
55
55
62
67
71%
Automation, orchestration
and machine learning (AI-based)
Automated policy management
Extensive use of cyber analytics
and user behavior analytics
Extensive use of
data loss prevention
Enterprise deployment of
governance, risk & compliance
Extensive deployment of
encryption technologies
Advanced perimeter controls
Advanced identity and
access governance
Security intelligence systems
0% 10 20 30 40 50 60 70
Nine key security
technologies deployed
in Financial Services
Legend
n = 351 interviews
in the Financial Services
Industry
Percentage
deployment
frequency
Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
Copyright © 2018 Accenture Security. All rights reserved. 10
PRIORITIZE BREAKTHROUGH INNOVATIONS
LIKE AI AND ANALYTICS
Organizations should:
1. Better balance investments in security technologies
2. Use compliance technology—but don’t
bet the business on it
3. Grasp the innovation opportunity
1
2
3
Copyright © 2018 Accenture Security. All rights reserved. 11
WE RECOMMEND THREE
STEPS TO IMPROVE
CYBERSECURITY
EFFECTIVENESS
Become brilliant at the basics
Build cybersecurity on a strong foundation
Undertake extreme pressure testing
Identify vulnerabilities more rigorously
Invest in breakthrough innovation
Enhance program effectiveness and scale value
1
2
3
Copyright © 2018 Accenture Security. All rights reserved. 12
ABOUT THE RESEARCH
COST OF CYBER CRIME 2017
2,182
interviews
7countries
Australia
France
Germany
Italy
Japan
United
Kingdom
United States
254
companies
8-year
research
program
Jointly developed with:
Examining the economic impact of cyber attacks
About Accenture
Accenture is a leading global professional services
company, providing a broad range of services and
solutions in strategy, consulting, digital, technology
and operations. Combining unmatched experience
and specialized skills across more than 40 industries
and all business functions—underpinned by the
world’s largest delivery network—Accenture works
at the intersection of business and technology
to help clients improve their performance and
create sustainable value for their stakeholders.
With approximately 425,000 people serving clients
in more than 120 countries, Accenture drives
innovation to improve the way the world works
and lives. Visit us at www.accenture.com
About Accenture Security
Accenture Security helps organizations build
resilience from the inside out, so they can
confidently focus on innovation and growth.
Leveraging its global network of cybersecurity labs,
deep industry understanding across client value
chains and services that span the security lifecycle,
Accenture protects organization’s valuable assets,
end-to-end. With services that include strategy
and risk management, cyber defense, digital
identity, application security and managed security,
Accenture enables businesses around the world
to defend against known sophisticated threats,
and the unknown. Follow us @AccentureSecure on
Twitter or visit the Accenture Security blog.
Learn more:
http://accenture.com/security

More Related Content

What's hot

Security operation center
Security operation centerSecurity operation center
Security operation centerMuthuKumaran267
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsSarah Cirelli
 
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1Denise Tawwab
 
CMMC, ISO/IEC 27701, and ISO/IEC 27001 — Best Practices and Differences
CMMC, ISO/IEC 27701, and ISO/IEC 27001 — Best Practices and DifferencesCMMC, ISO/IEC 27701, and ISO/IEC 27001 — Best Practices and Differences
CMMC, ISO/IEC 27701, and ISO/IEC 27001 — Best Practices and DifferencesPECB
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsPaul Feldman
 
Grc governance, risk management & compliance
Grc  governance, risk management & complianceGrc  governance, risk management & compliance
Grc governance, risk management & complianceHR Globe Consulting
 
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 ReportNinth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Reportaccenture
 
What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance BOC Group
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Reportaccenture
 
CISSP Preview - For the next generation of Security Leaders
CISSP Preview - For the next generation of Security LeadersCISSP Preview - For the next generation of Security Leaders
CISSP Preview - For the next generation of Security LeadersNUS-ISS
 
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond AlertingProactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond AlertingCrowdStrike
 
How to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeCrowdStrike
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Cohesive Networks
 
Compliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCompliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCorporater
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 

What's hot (20)

Security operation center
Security operation centerSecurity operation center
Security operation center
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
 
Compliance Risk Assessment
Compliance Risk AssessmentCompliance Risk Assessment
Compliance Risk Assessment
 
Lpm + rgpd
Lpm + rgpdLpm + rgpd
Lpm + rgpd
 
CMMC, ISO/IEC 27701, and ISO/IEC 27001 — Best Practices and Differences
CMMC, ISO/IEC 27701, and ISO/IEC 27001 — Best Practices and DifferencesCMMC, ISO/IEC 27701, and ISO/IEC 27001 — Best Practices and Differences
CMMC, ISO/IEC 27701, and ISO/IEC 27001 — Best Practices and Differences
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
 
Grc governance, risk management & compliance
Grc  governance, risk management & complianceGrc  governance, risk management & compliance
Grc governance, risk management & compliance
 
What is iso 27001 isms
What is iso 27001 ismsWhat is iso 27001 isms
What is iso 27001 isms
 
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 ReportNinth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
 
What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
CISSP Preview - For the next generation of Security Leaders
CISSP Preview - For the next generation of Security LeadersCISSP Preview - For the next generation of Security Leaders
CISSP Preview - For the next generation of Security Leaders
 
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond AlertingProactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
 
How to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrike
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
GRC Fundamentals
GRC FundamentalsGRC Fundamentals
GRC Fundamentals
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
 
Compliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCompliance Management | Compliance Solutions
Compliance Management | Compliance Solutions
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 

Similar to Cost of Cyber Crime: Financial Services

I Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - ItaliaI Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - ItaliaAccenture Italia
 
2017 cost of cyber crime study accenture
2017 cost of cyber crime study   accenture2017 cost of cyber crime study   accenture
2017 cost of cyber crime study accenturejob Titri company
 
Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Thoughtworks
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for InsuranceAccenture Insurance
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilienceaccenture
 
Securing Consumer Trust
Securing Consumer TrustSecuring Consumer Trust
Securing Consumer Trustaccenture
 
Healthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber ResilienceHealthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber Resilienceaccenture
 
Third party risk management with cyber threat intelligence
Third party risk management with cyber threat intelligenceThird party risk management with cyber threat intelligence
Third party risk management with cyber threat intelligenceCharles Steve
 
Evolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEvolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEY
 
CWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurityCWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurityCapgemini
 
Cybersecurity in the Workplace is Everyone's Business
 Cybersecurity in the Workplace is Everyone's Business  Cybersecurity in the Workplace is Everyone's Business
Cybersecurity in the Workplace is Everyone's Business Symantec
 

Similar to Cost of Cyber Crime: Financial Services (20)

I Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - ItaliaI Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - Italia
 
2017 cost of cyber crime study accenture
2017 cost of cyber crime study   accenture2017 cost of cyber crime study   accenture
2017 cost of cyber crime study accenture
 
Cost of Cybercrime 2017
Cost of Cybercrime 2017Cost of Cybercrime 2017
Cost of Cybercrime 2017
 
Cost of Cyber Crime UK Data
Cost of Cyber Crime UK DataCost of Cyber Crime UK Data
Cost of Cyber Crime UK Data
 
Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
2017 global-cyber-risk-transfer-report-final
2017 global-cyber-risk-transfer-report-final2017 global-cyber-risk-transfer-report-final
2017 global-cyber-risk-transfer-report-final
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilience
 
The 10 most admired electronic security solution providers
The 10 most admired electronic security solution providersThe 10 most admired electronic security solution providers
The 10 most admired electronic security solution providers
 
Securing Consumer Trust
Securing Consumer TrustSecuring Consumer Trust
Securing Consumer Trust
 
Healthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber ResilienceHealthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber Resilience
 
Third party risk management with cyber threat intelligence
Third party risk management with cyber threat intelligenceThird party risk management with cyber threat intelligence
Third party risk management with cyber threat intelligence
 
Evolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEvolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architecture
 
CWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurityCWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurity
 
Cybersecurity in the Workplace is Everyone's Business
 Cybersecurity in the Workplace is Everyone's Business  Cybersecurity in the Workplace is Everyone's Business
Cybersecurity in the Workplace is Everyone's Business
 

More from accenture

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024accenture
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileaccenture
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial Systemaccenture
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyaccenture
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023accenture
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operationsaccenture
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Studyaccenture
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023accenture
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented changeaccenture
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% meaccenture
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023accenture
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoaccenture
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industryaccenture
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023accenture
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accentureaccenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accentureaccenture
 

More from accenture (20)

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 

Recently uploaded

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 

Recently uploaded (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 

Cost of Cyber Crime: Financial Services

  • 2. SECURITY BREACHES CONTINUE TO PLAGUE FINANCIAL SERVICES Average annualized cost of cyber crime (USD) $18.28Average number of security breaches each year 125 +9.6%Increase in the last year … AND THE COST OF BREACHES CONTINUES TO RISE … FINANCIAL SERVICES IS SLIGHTLY BETTER THAN GLOBAL PEERS Average number of security breaches each year 130 Copyright © 2018 Accenture Security. All rights reserved. 2 Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
  • 3. 5.04 5.07 6.47 7.10 7.34 7.36 8.28 9.30 10.22 11.05 12.47 13.17 14.46 17.20 $18.28 $0 4 8 12 16 20 Hospitality Education Life science Communications Consumer products Transportation Public sector Retail Industrial/manufacturing Services Healthcare Technology and software Aerospace and defense Utilities and energy Financial services Average annualized cost by industry sector US$ millions Legend n = 351 interviews in the Financial Services Industry Total annualized cost ($1 million omitted) Copyright © 2018 Accenture Security. All rights reserved. 3 FINANCIAL SERVICES HAS THE HIGHEST COST OF CYBER CRIME Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
  • 4. Copyright © 2018 Accenture Security. All rights reserved. 4 IN FINANCIAL SERVICES, DENIAL OF SERVICES, PHISHING & SOCIAL ENGINEERING ARE THE TWO MOST COSTLY ATTACK TYPES Average cost per attack $ thousands Legend n = 351 interviews in the Financial Services Industry 1,015 5,462 43,034 87,460 89,686 114,700 169,059 196,610 $227,865 $0K 50 100 150 200 250 Botnets Malware Stolen devices Malicious code Ransomware Web-based attacks Malicious insiders Phishing & social engineering Denial of services Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
  • 5. Copyright © 2018 Accenture Security. All rights reserved. 5 MALICIOUS CODE AND MALICIOUS INSIDERS CONTINUE TO TOP THE LIST – TAKING THE LONGEST TO RESOLVE Length of time to resolve an attack in days Estimated average time is measured for each attack type in days Legend n = 351 Interviews in the Financial Services Industry FY 2016 FY 2017 2.8 6.2 14.7 14.7 20.0 26.0 23.9 58.8 65.8 1.8 4.3 13.2 15.0 19.9 23.0 25.0 58.8 56.7 0 Days 10 20 30 40 50 60 70 Botnets Malware Stolen devices Denial of service Phishing & social engineering Ransomware Web-based attack Malicious insiders Malicious code Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
  • 6. Copyright © 2018 Accenture Security. All rights reserved. 6 DETECTION ACCOUNTS FOR 41% OF SECURITY COSTS FOR FINANCIAL SERVICES COMPANIES … 16 Containment 19 Recovery 13 Investigation 41 Detection 11 Incident Management and Ex-post Response Percentage cost by internal activities Legend n = 351 interviews in the Financial Services Detection Containment Recovery Investigation Incident management and ex-post response Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
  • 7. Copyright © 2018 Accenture Security. All rights reserved. 7 … BUT INFORMATION LOSS IS ONE OF THE MOST EXPENSIVE CONSEQUENCES OF CYBER ATTACKS IN FINANCIAL SERVICES Percentage cost by consequence Legend n = 351 interviews in the Financial Services Industry Business disruption Information loss Revenue loss 52 Information Loss 13 Revenue Loss 35 Business Disruption Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
  • 8. Copyright © 2018 Accenture Security. All rights reserved. 8 SPENDING LEVELS BALANCED FOR KEY SECURITY TECHNOLOGIES – AI-BASED 3RD & ADVANCED ANALYTICS 4TH FOR COST SAVINGS +1 -1 +1 -1 = = +1 -1 = 0 1 2 3 4 5 6 7 8 9 Automated policy management Enterprise deployment of governance, risk & compliance Extensive use of data loss prevention Extensive deployment of encryption technologies Advanced perimeter controls Extensive use of cyber analytics and user behavior analytics Automation, orchestration and machine learning (AI-based) Advanced identity and access governance Security intelligence systems Value gap Rank orderings by spending levels and cost savings Legend 1 = Highest rank 9 = Lowest rank Rank by percentage spending Rank by cost savings Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017 Note: Artificial Intelligence = AI
  • 9. Copyright © 2018 Accenture Security. All rights reserved. 9 … ONLY 26% HAVE DEPLOYED AI-BASED SECURITY TECHNOLOGIES AND 31% ADVANCED ANALYTICS 26 29 31 52 55 55 62 67 71% Automation, orchestration and machine learning (AI-based) Automated policy management Extensive use of cyber analytics and user behavior analytics Extensive use of data loss prevention Enterprise deployment of governance, risk & compliance Extensive deployment of encryption technologies Advanced perimeter controls Advanced identity and access governance Security intelligence systems 0% 10 20 30 40 50 60 70 Nine key security technologies deployed in Financial Services Legend n = 351 interviews in the Financial Services Industry Percentage deployment frequency Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
  • 10. Copyright © 2018 Accenture Security. All rights reserved. 10 PRIORITIZE BREAKTHROUGH INNOVATIONS LIKE AI AND ANALYTICS Organizations should: 1. Better balance investments in security technologies 2. Use compliance technology—but don’t bet the business on it 3. Grasp the innovation opportunity 1 2 3
  • 11. Copyright © 2018 Accenture Security. All rights reserved. 11 WE RECOMMEND THREE STEPS TO IMPROVE CYBERSECURITY EFFECTIVENESS Become brilliant at the basics Build cybersecurity on a strong foundation Undertake extreme pressure testing Identify vulnerabilities more rigorously Invest in breakthrough innovation Enhance program effectiveness and scale value 1 2 3
  • 12. Copyright © 2018 Accenture Security. All rights reserved. 12 ABOUT THE RESEARCH COST OF CYBER CRIME 2017 2,182 interviews 7countries Australia France Germany Italy Japan United Kingdom United States 254 companies 8-year research program Jointly developed with: Examining the economic impact of cyber attacks
  • 13. About Accenture Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions—underpinned by the world’s largest delivery network—Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With approximately 425,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com About Accenture Security Accenture Security helps organizations build resilience from the inside out, so they can confidently focus on innovation and growth. Leveraging its global network of cybersecurity labs, deep industry understanding across client value chains and services that span the security lifecycle, Accenture protects organization’s valuable assets, end-to-end. With services that include strategy and risk management, cyber defense, digital identity, application security and managed security, Accenture enables businesses around the world to defend against known sophisticated threats, and the unknown. Follow us @AccentureSecure on Twitter or visit the Accenture Security blog. Learn more: http://accenture.com/security