Cyber Security: Take a Security Leap Forward

accenture
TAKE A SECURITY LEAP FORWARD
How do corporations achieve better
security performance in an 
ever-changing threat environment?
Leapfrog organizations* align their security
approach with business objectives to improve
security effectiveness across strategy, technology
and governance.
STRATEGY
START YOUR SECURITY LEAP FORWARD
Pinpoints anomalies
in network traffic
Establish security
protocols over big data
Secure (encrypt) data stored
in cloud environments
6.00 7.18 4.94 6.33 7.45 8.55
(Rankings on a 10 point scale, 1 = low; 10 = high)= Leapfrog
26%
Enterprise risk
management
procedures
35%
Regular reporting
to the board
of directors
Benchmark
security
operations
Metrics to
evaluate security
operations
20% 34%
Leapfrog companies
have dedicated
budget for security
Increased security
budget over the
past two years
CISO defines
security strategy
and initiatives
CISO directly
reports to a
senior executive
CISO is accountable
for budgets or
discretionary spending
81% 57% 71% 71% 65%
Limit insecure devices from
accessing security systems
Controls insecure mobile
devices including BYOD
Provide advance warning
about threats and attackers
7.56 8.27 7.76 7.16 7.18 6.03
By implementing best practices across security strategy, technology and governance, Leapfrog
organizations improved their security effectiveness an average of 53%.
Steps you can take to help make security a competitive advantage:
Leapfrog companies recognize the importance of establishing and following strong governance practices and
controls for their security organization, and are well ahead of Static companies on the following key
governance attributes:
Leapfrog companies use enabling technologies for security more often than Static companies. Taking a proactive
stance helps protect their data onsite, in the cloud and across big data platforms. They put more emphasis on
pinpointing network traffic anomalies, and in providing advance warning on threats and attackers.
Security Strategy in Leapfrog Organizations
Leapfrog companies move
forward with a solid security
strategy, treat security as a
priority and align security with
the organization’s goals.
Innovation is a core component in aligning security strategies with business objectives. Leapfrog organizations
recognize the need to focus on innovation to strengthen their security position and keep pace with evolving needs
to deliver at scale, anywhere.
The role of the Chief Information Security Officer (CISO) in
Leapfrog companies reflects the focus and importance those
companies place on security.
Leapfrog companies provide dedicated
budget and increase budgets for
security improvements.
Higher value placed on
security innovation by
Leapfrog companies
33%
Higher level of security
innovation change in the past
two years in Leapfrog companies
45%
More security
innovation within
Leapfrog companies
20%
LEAPFROG 70%
STATIC 55%
Security strategy exists
69%
45%
LEAPFROG
STATIC
Security is priority
Leapfrog organizations focus more on securing their network, sensitive data and the cloud, while the Static
organizations tend to focus on locking things down, which can prevent business growth.
Embrace
innovative solutions
Streamline your IT
security infrastructure
Create greater visibility
into business processes
Eliminate
security silos
Evolve the C-suite into
security champions
Certain characteristics of the Leapfrog organizations complement each other, and may help those looking to
emulate their successes.
*All source data from Ponemon Institute research, “The Cyber Security Leap: From Laggard to Leader,” 2015,
N = 110 Leapfrog organizations and 137 Static organizations
55%
Leapfrog organizations have a
sanctioned cyber security
strategy AND outsource core
security operations
50%
Leapfrog organizations make
information security a priority
AND align security and
business objectives
59%
Leapfrog CISOs have
dedicated budget
AND accountability
for spending
TECHNOLOGY
63%
40%
LEAPFROG
STATIC
Security and business objectives aligned
GOVERNANCE
= Static
© 2015 Accenture
All rights reserved.

Recommended

The Cyber Security Leap: From Laggard to Leader by
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to Leaderaccenture
6.7K views19 slides
Technology Vision 2016 – Overview by
Technology Vision 2016 – OverviewTechnology Vision 2016 – Overview
Technology Vision 2016 – Overviewaccenture
1.5K views21 slides
FusionX & Accenture: One Global Security Team by
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Teamaccenture
4.1K views10 slides
From Regulatory-driven Risk Operating Models to Improved ECM and Client Cent... by
From Regulatory-driven Risk  Operating Models to Improved ECM and Client Cent...From Regulatory-driven Risk  Operating Models to Improved ECM and Client Cent...
From Regulatory-driven Risk Operating Models to Improved ECM and Client Cent...accenture
1.9K views16 slides
Converting Cost to Growth -- Strategic Cost Reduction in Banking by
Converting Cost to Growth -- Strategic Cost Reduction in BankingConverting Cost to Growth -- Strategic Cost Reduction in Banking
Converting Cost to Growth -- Strategic Cost Reduction in Bankingaccenture
1.5K views7 slides
The cyber security leap: From laggard to leader by
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderAccenture Australia
13.8K views19 slides

More Related Content

What's hot

Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ... by
Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...
Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...accenture
3.7K views38 slides
Mobility Research 2014: Mobility Fueling the Digital Surge by
Mobility Research 2014: Mobility Fueling the Digital SurgeMobility Research 2014: Mobility Fueling the Digital Surge
Mobility Research 2014: Mobility Fueling the Digital Surgeaccenture
5.4K views10 slides
Considerations for an Effective Internal Model Method Implementation by
Considerations for an Effective Internal Model Method ImplementationConsiderations for an Effective Internal Model Method Implementation
Considerations for an Effective Internal Model Method Implementationaccenture
4.4K views10 slides
Accenture 2015 Global Risk Management Study: North American Banking Report Ke... by
Accenture 2015 Global Risk Management Study: North American Banking Report Ke...Accenture 2015 Global Risk Management Study: North American Banking Report Ke...
Accenture 2015 Global Risk Management Study: North American Banking Report Ke...accenture
3.8K views24 slides
Smarter Investments, Outstanding Results: Resources Industries Digital Transf... by
Smarter Investments, Outstanding Results: Resources Industries Digital Transf...Smarter Investments, Outstanding Results: Resources Industries Digital Transf...
Smarter Investments, Outstanding Results: Resources Industries Digital Transf...accenture
14.3K views15 slides
Thriving on Disruption by
Thriving on Disruption Thriving on Disruption
Thriving on Disruption accenture
11.2K views10 slides

What's hot(20)

Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ... by accenture
Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...
Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...
accenture3.7K views
Mobility Research 2014: Mobility Fueling the Digital Surge by accenture
Mobility Research 2014: Mobility Fueling the Digital SurgeMobility Research 2014: Mobility Fueling the Digital Surge
Mobility Research 2014: Mobility Fueling the Digital Surge
accenture5.4K views
Considerations for an Effective Internal Model Method Implementation by accenture
Considerations for an Effective Internal Model Method ImplementationConsiderations for an Effective Internal Model Method Implementation
Considerations for an Effective Internal Model Method Implementation
accenture4.4K views
Accenture 2015 Global Risk Management Study: North American Banking Report Ke... by accenture
Accenture 2015 Global Risk Management Study: North American Banking Report Ke...Accenture 2015 Global Risk Management Study: North American Banking Report Ke...
Accenture 2015 Global Risk Management Study: North American Banking Report Ke...
accenture3.8K views
Smarter Investments, Outstanding Results: Resources Industries Digital Transf... by accenture
Smarter Investments, Outstanding Results: Resources Industries Digital Transf...Smarter Investments, Outstanding Results: Resources Industries Digital Transf...
Smarter Investments, Outstanding Results: Resources Industries Digital Transf...
accenture14.3K views
Thriving on Disruption by accenture
Thriving on Disruption Thriving on Disruption
Thriving on Disruption
accenture11.2K views
The New World of As a Service - Infographic by accenture
The New World of As a Service - InfographicThe New World of As a Service - Infographic
The New World of As a Service - Infographic
accenture4.3K views
CPG Companies: Evolving Your Analytics-driven Organizations by accenture
CPG Companies: Evolving Your Analytics-driven OrganizationsCPG Companies: Evolving Your Analytics-driven Organizations
CPG Companies: Evolving Your Analytics-driven Organizations
accenture6.6K views
IT Security: Implications for the Technology Vision 2015 by accenture
IT Security: Implications for the Technology Vision 2015IT Security: Implications for the Technology Vision 2015
IT Security: Implications for the Technology Vision 2015
accenture5.9K views
Accenture 2015 Global Risk Management Study: North American Banking infographic by accenture
Accenture 2015 Global Risk Management Study: North American Banking infographicAccenture 2015 Global Risk Management Study: North American Banking infographic
Accenture 2015 Global Risk Management Study: North American Banking infographic
accenture2.3K views
How Industrial Equipment Companies are Mining Fuel for Growth by accenture
How Industrial Equipment Companies are Mining Fuel for GrowthHow Industrial Equipment Companies are Mining Fuel for Growth
How Industrial Equipment Companies are Mining Fuel for Growth
accenture3K views
Road to Digital Compliance by accenture
Road to Digital ComplianceRoad to Digital Compliance
Road to Digital Compliance
accenture2.6K views
Top Ten Challenges for Investment Banks 2015: Regulation: Challenge 1 by accenture
Top Ten Challenges for Investment Banks 2015: Regulation: Challenge 1Top Ten Challenges for Investment Banks 2015: Regulation: Challenge 1
Top Ten Challenges for Investment Banks 2015: Regulation: Challenge 1
accenture1.7K views
People-Centric Growth: The Primacy of People in the Digital Age by accenture
People-Centric Growth: The Primacy of People in the Digital AgePeople-Centric Growth: The Primacy of People in the Digital Age
People-Centric Growth: The Primacy of People in the Digital Age
accenture12K views
Agricultural Chemicals 2016 Supply Chain Benchmarking Study by accenture
Agricultural Chemicals 2016 Supply Chain Benchmarking StudyAgricultural Chemicals 2016 Supply Chain Benchmarking Study
Agricultural Chemicals 2016 Supply Chain Benchmarking Study
accenture5.7K views
Securing the Industrial Enterprise by accenture
Securing the Industrial EnterpriseSecuring the Industrial Enterprise
Securing the Industrial Enterprise
accenture5.5K views
Intelligent Infrastructures: Unlocking the Digital Business by accenture
Intelligent Infrastructures: Unlocking the Digital BusinessIntelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital Business
accenture6.6K views
Are you Ready to be an Insurer of Things? by accenture
Are you Ready to be an Insurer of Things?Are you Ready to be an Insurer of Things?
Are you Ready to be an Insurer of Things?
accenture2K views
Mastering Operational Flexibility by accenture
Mastering Operational FlexibilityMastering Operational Flexibility
Mastering Operational Flexibility
accenture10.8K views
Accenture Regulatory Compliance Platform by accenture
Accenture Regulatory Compliance PlatformAccenture Regulatory Compliance Platform
Accenture Regulatory Compliance Platform
accenture5.2K views

Similar to Cyber Security: Take a Security Leap Forward

The Cyber Security Leap by
The Cyber Security LeapThe Cyber Security Leap
The Cyber Security LeapAccenture New Zealand
119 views19 slides
The Cyber Security Leap: From Laggard to Leader by
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderAccenture Insurance
967 views20 slides
Security of the future - Adapting Approaches to What We Need by
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Needsimplyme12345
161 views13 slides
7-lessons-learned-from-bsimm by
7-lessons-learned-from-bsimm7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimmMarie Peters
70 views1 slide
2018 State of Cyber Resilience Report - Ireland by
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - IrelandAccenture Security
242 views43 slides
Final 2021 security_priorities_infographic (1) by
Final 2021 security_priorities_infographic (1)Final 2021 security_priorities_infographic (1)
Final 2021 security_priorities_infographic (1)IDG
173 views1 slide

Similar to Cyber Security: Take a Security Leap Forward(20)

Security of the future - Adapting Approaches to What We Need by simplyme12345
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
simplyme12345161 views
7-lessons-learned-from-bsimm by Marie Peters
7-lessons-learned-from-bsimm7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm
Marie Peters70 views
2018 State of Cyber Resilience Report - Ireland by Accenture Security
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland
Accenture Security242 views
Final 2021 security_priorities_infographic (1) by IDG
Final 2021 security_priorities_infographic (1)Final 2021 security_priorities_infographic (1)
Final 2021 security_priorities_infographic (1)
IDG 173 views
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps by VMware Tanzu
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
VMware Tanzu609 views
The Importance of Cybersecurity for Digital Transformation by NUS-ISS
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
NUS-ISS30 views
Integrating-Cyber-Security-for-Increased-Effectiveness by Ayham Kochaji
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
Ayham Kochaji150 views
New technologies - Amer Haza'a by Fahmi Albaheth
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
Fahmi Albaheth361 views
Security Governance by Risknavigator 2010 by Lennart Bredberg
Security Governance by Risknavigator 2010Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010
Lennart Bredberg65 views
MCGlobalTech Consulting Service Presentation by William McBorrough
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
William McBorrough447 views
Fortify-Application_Security_Foundation_Training.pptx by VictoriaChavesta
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta86 views

More from accenture

The Industrialist: Trends & Innovations - September 2023 by
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023accenture
178 views12 slides
Accenture Technology Vision - How the trends apply to higher education by
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
1.7K views25 slides
The Industrialist: Trends & Innovations - July 2023 by
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023accenture
176 views12 slides
Accenture Technology Vision - How the trends apply to higher education by
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
1.9K views25 slides
Engineering Services: con gli ingegneri per creare valore sostenibile by
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileaccenture
1.5K views5 slides
Digital Euro: Implications for the Financial System by
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial Systemaccenture
369 views36 slides

More from accenture(20)

The Industrialist: Trends & Innovations - September 2023 by accenture
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
accenture178 views
Accenture Technology Vision - How the trends apply to higher education by accenture
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
accenture1.7K views
The Industrialist: Trends & Innovations - July 2023 by accenture
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
accenture176 views
Accenture Technology Vision - How the trends apply to higher education by accenture
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
accenture1.9K views
Engineering Services: con gli ingegneri per creare valore sostenibile by accenture
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
accenture1.5K views
Digital Euro: Implications for the Financial System by accenture
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
accenture369 views
More deals, less money: the Black founder funding journey by accenture
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
accenture3.2K views
The Industrialist: Trends & Innovations - June 2023 by accenture
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
accenture121 views
Reinventing Enterprise Operations by accenture
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
accenture1.3K views
Semiconductor Gender Parity Study by accenture
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
accenture1.7K views
The Industrialist: Trends & Innovations - March 2023 by accenture
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
accenture192 views
Nonprofit reinvention in a time of unprecedented change by accenture
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
accenture5.7K views
Free to be 100% me by accenture
Free to be 100% meFree to be 100% me
Free to be 100% me
accenture359 views
The Industrialist: Trends & Innovations - February 2023 by accenture
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
accenture218 views
Mundo gamer e a oportunidade de entrada pela abordagem do movimento by accenture
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
accenture752 views
Pathways to Profitability for the Communications Industry by accenture
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
accenture6.4K views
The Industrialist: Trends & Innovations - January 2023 by accenture
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
accenture222 views
Reimagining the Agenda | Accenture by accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
accenture30.2K views
Climate Leadership Eleventh Hour | Accenture by accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
accenture2K views
Value Untangled Slideshare by accenture
Value Untangled SlideshareValue Untangled Slideshare
Value Untangled Slideshare
accenture1.9K views

Recently uploaded

Lilypad @ Labweek, Istanbul, 2023.pdf by
Lilypad @ Labweek, Istanbul, 2023.pdfLilypad @ Labweek, Istanbul, 2023.pdf
Lilypad @ Labweek, Istanbul, 2023.pdfAlly339821
9 views45 slides
Perth MeetUp November 2023 by
Perth MeetUp November 2023 Perth MeetUp November 2023
Perth MeetUp November 2023 Michael Price
19 views44 slides
STPI OctaNE CoE Brochure.pdf by
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdfmadhurjyapb
13 views1 slide
Voice Logger - Telephony Integration Solution at Aegis by
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at AegisNirmal Sharma
31 views1 slide
Melek BEN MAHMOUD.pdf by
Melek BEN MAHMOUD.pdfMelek BEN MAHMOUD.pdf
Melek BEN MAHMOUD.pdfMelekBenMahmoud
14 views1 slide
virtual reality.pptx by
virtual reality.pptxvirtual reality.pptx
virtual reality.pptxG036GaikwadSnehal
11 views15 slides

Recently uploaded(20)

Lilypad @ Labweek, Istanbul, 2023.pdf by Ally339821
Lilypad @ Labweek, Istanbul, 2023.pdfLilypad @ Labweek, Istanbul, 2023.pdf
Lilypad @ Labweek, Istanbul, 2023.pdf
Ally3398219 views
Perth MeetUp November 2023 by Michael Price
Perth MeetUp November 2023 Perth MeetUp November 2023
Perth MeetUp November 2023
Michael Price19 views
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb13 views
Voice Logger - Telephony Integration Solution at Aegis by Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma31 views
AMAZON PRODUCT RESEARCH.pdf by JerikkLaureta
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta19 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson66 views
The details of description: Techniques, tips, and tangents on alternative tex... by BookNet Canada
The details of description: Techniques, tips, and tangents on alternative tex...The details of description: Techniques, tips, and tangents on alternative tex...
The details of description: Techniques, tips, and tangents on alternative tex...
BookNet Canada126 views
From chaos to control: Managing migrations and Microsoft 365 with ShareGate! by sammart93
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
sammart939 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker33 views
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
PharoJS - Zürich Smalltalk Group Meetup November 2023 by Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi126 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Case Study Copenhagen Energy and Business Central.pdf by Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana16 views
Web Dev - 1 PPT.pdf by gdsczhcet
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdf
gdsczhcet60 views
Transcript: The Details of Description Techniques tips and tangents on altern... by BookNet Canada
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...
BookNet Canada135 views

Cyber Security: Take a Security Leap Forward

  • 1. TAKE A SECURITY LEAP FORWARD How do corporations achieve better security performance in an  ever-changing threat environment? Leapfrog organizations* align their security approach with business objectives to improve security effectiveness across strategy, technology and governance. STRATEGY START YOUR SECURITY LEAP FORWARD Pinpoints anomalies in network traffic Establish security protocols over big data Secure (encrypt) data stored in cloud environments 6.00 7.18 4.94 6.33 7.45 8.55 (Rankings on a 10 point scale, 1 = low; 10 = high)= Leapfrog 26% Enterprise risk management procedures 35% Regular reporting to the board of directors Benchmark security operations Metrics to evaluate security operations 20% 34% Leapfrog companies have dedicated budget for security Increased security budget over the past two years CISO defines security strategy and initiatives CISO directly reports to a senior executive CISO is accountable for budgets or discretionary spending 81% 57% 71% 71% 65% Limit insecure devices from accessing security systems Controls insecure mobile devices including BYOD Provide advance warning about threats and attackers 7.56 8.27 7.76 7.16 7.18 6.03 By implementing best practices across security strategy, technology and governance, Leapfrog organizations improved their security effectiveness an average of 53%. Steps you can take to help make security a competitive advantage: Leapfrog companies recognize the importance of establishing and following strong governance practices and controls for their security organization, and are well ahead of Static companies on the following key governance attributes: Leapfrog companies use enabling technologies for security more often than Static companies. Taking a proactive stance helps protect their data onsite, in the cloud and across big data platforms. They put more emphasis on pinpointing network traffic anomalies, and in providing advance warning on threats and attackers. Security Strategy in Leapfrog Organizations Leapfrog companies move forward with a solid security strategy, treat security as a priority and align security with the organization’s goals. Innovation is a core component in aligning security strategies with business objectives. Leapfrog organizations recognize the need to focus on innovation to strengthen their security position and keep pace with evolving needs to deliver at scale, anywhere. The role of the Chief Information Security Officer (CISO) in Leapfrog companies reflects the focus and importance those companies place on security. Leapfrog companies provide dedicated budget and increase budgets for security improvements. Higher value placed on security innovation by Leapfrog companies 33% Higher level of security innovation change in the past two years in Leapfrog companies 45% More security innovation within Leapfrog companies 20% LEAPFROG 70% STATIC 55% Security strategy exists 69% 45% LEAPFROG STATIC Security is priority Leapfrog organizations focus more on securing their network, sensitive data and the cloud, while the Static organizations tend to focus on locking things down, which can prevent business growth. Embrace innovative solutions Streamline your IT security infrastructure Create greater visibility into business processes Eliminate security silos Evolve the C-suite into security champions Certain characteristics of the Leapfrog organizations complement each other, and may help those looking to emulate their successes. *All source data from Ponemon Institute research, “The Cyber Security Leap: From Laggard to Leader,” 2015, N = 110 Leapfrog organizations and 137 Static organizations 55% Leapfrog organizations have a sanctioned cyber security strategy AND outsource core security operations 50% Leapfrog organizations make information security a priority AND align security and business objectives 59% Leapfrog CISOs have dedicated budget AND accountability for spending TECHNOLOGY 63% 40% LEAPFROG STATIC Security and business objectives aligned GOVERNANCE = Static © 2015 Accenture All rights reserved.