SlideShare a Scribd company logo
CYBER SECURITY
IN AUSTRALIA AND
NEW ZEALAND:
HOW
OPERATIONAL
EFFECTIVENESS
IS KEY
STRATEGY AND TECHNOLOGY ALONE
DO NOT GUARANTEE AN EFFECTIVE
CYBER DEFENCE
The best strategy, supported by the latest technology,
can fail if not executed properly.
Risks to effective cyber defence include:
• Increased exposure to attack
(cloud, Internet of Things, connected devices)
• High turnover within security team
• Lack of visibility to critical assets
• Frequent IT changes not communicated
• Length of time taken to detect breaches
Copyright © 2016 Accenture. All rights reserved. 2
SHORTAGE OF CRITICAL TECHNOLOGIES
AND SKILLS HAMPER ORGANISATIONS’
SECURITY APPROACH
• Operations lack rigor and consistency
• Stakeholders remain unaware of their vulnerability
• Employees don’t follow standard security practices
• Security work generates “noise” that masks valid threats
• Out-dated tools and processes can limit effectiveness
of the security team
Copyright © 2016 Accenture. All rights reserved. 3
DRIVE IMPROVED SECURITY
OPERATIONS FROM ACTIONABLE
THREAT INTELLIGENCE
Steps that can create security operational excellence:
1. Assess effectiveness of current security processes
2. Invest in attracting and retaining skilled security talent
3. Automate intelligently to leverage scarce resources
4. Understand how threat data pertains to the business
5. Identify what isn’t known
6. Create a plan to address knowledge gaps
7. Find an effective sparring partner to improve security capabilities
Copyright © 2016 Accenture. All rights reserved. 4
CYBER DEFENCE STRATEGIES AND
SUPPORTING TECHNOLOGY WILL ONLY
WORK IF EXECUTED PROPERLY
Leading organisations focus on creating a highly efficient
operating model that balances security operations,
new technology implementation, testing of security
posture and feedback to update defences.
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Security
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
5Copyright © 2016 Accenture. All rights reserved.
ACHIEVING OPERATIONAL EXCELLENCE
IN CYBER DEFENCE REQUIRES A
COMPREHENSIVE APPROACH
Our model helps organisations prepare and protect for
threats, defend and detect breaches, and then respond to
and recover from incidents.
Application &
Data Security
Platform &
Infrastructure Security
Digital Security
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Security
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
6Copyright © 2016 Accenture. All rights reserved.
START WITH A BIG-PICTURE STRATEGY
OF HOW SECURITY SUPPORTS
BUSINESS PERFORMANCE
• Forward-thinking capabilities to help
scale activities
• IT strategy that provides greater understanding
of assets, data sets, technical and
business functions
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Security
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
7Copyright © 2016 Accenture. All rights reserved.
FORWARD-THINKING CAPABILITIES
HELP SCALE ACTIVITIES EFFECTIVELY
• High-powered analytics to predict and detect incidents,
and identify behavior changes that indicate security risks
• Emphasis on visualisation to
identify anomalies
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Security
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
8Copyright © 2016 Accenture. All rights reserved.
CONCENTRATE ON INTELLIGENT
INCIDENT RESPONSE
• Platforms that guide operators in hunting for threats
• Train the same way the company fights attackers, to
prepare for real-world adversaries
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Security
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
9Copyright © 2016 Accenture. All rights reserved.
THE GOAL
Create a highly efficient operating model
that balances security operations, new
technology implementation, testing of
security posture and feedback to update
defences.
Copyright © 2016 Accenture. All rights reserved. 10
THANK YOU
For further information:
• Visit Accenture.com/operationaleffectiveness
• Follow us on Twitter @AccentureSecure
• Contact APAC Security Lead, Joshua Kennedy-White
Copyright © 2016 Accenture. All rights reserved. 11
ABOUT ACCENTURE
Accenture is a leading global professional services company, providing a
broad range of services and solutions in strategy, consulting, digital,
technology and operations. Combining unmatched experience and
specialized skills across more than 40 industries and all business
functions—underpinned by the world’s largest delivery network—
Accenture works at the intersection of business and technology to help
clients improve their performance and create sustainable value for their
stakeholders. With approximately 373,000 people serving clients in more
than 120 countries, Accenture drives innovation to improve the way the
world works and lives. Visit us at www.accenture.com.
Accenture, its logo, and High performance. Delivered. are trademarks of Accenture.
Copyright © 2016 Accenture
All rights reserved.

More Related Content

Viewers also liked

Guarding and Growing Personal Data Value
Guarding and Growing Personal Data ValueGuarding and Growing Personal Data Value
Guarding and Growing Personal Data Value
accenture
 
Technology Vision 2017 - Overview
Technology Vision 2017 - OverviewTechnology Vision 2017 - Overview
Technology Vision 2017 - Overview
Accenture Technology
 
28022017 Simen Munter Mindfields
28022017 Simen Munter Mindfields28022017 Simen Munter Mindfields
28022017 Simen Munter Mindfields
Mohit Sharma (GAICD)
 
Setting up The Centre of Excellence for Rpa
Setting up The Centre of Excellence for RpaSetting up The Centre of Excellence for Rpa
Setting up The Centre of Excellence for Rpa
Mohit Sharma (GAICD)
 
The digital government: shaped around its citizens
The digital government: shaped around its citizensThe digital government: shaped around its citizens
The digital government: shaped around its citizens
Accenture Australia
 
28022017 Mohit Sharma
28022017 Mohit Sharma28022017 Mohit Sharma
28022017 Mohit Sharma
Mohit Sharma (GAICD)
 
Buying RPA - From Hype to Reality
Buying RPA - From Hype to RealityBuying RPA - From Hype to Reality
Buying RPA - From Hype to Reality
Symphony Ventures
 
Network Transformation Roadmap
Network Transformation RoadmapNetwork Transformation Roadmap
Network Transformation Roadmap
Accenture Australia
 
The Real World of Robotics Process Automation (RPA)
The Real World of Robotics Process Automation (RPA)The Real World of Robotics Process Automation (RPA)
The Real World of Robotics Process Automation (RPA)
CGI Suomi
 
What, Why and How of Governance in RPA
What, Why and How of Governance  in RPAWhat, Why and How of Governance  in RPA
What, Why and How of Governance in RPA
Mohit Sharma (GAICD)
 
Lessons learned and business case for a rapid RPA
Lessons learned and business case for a rapid RPALessons learned and business case for a rapid RPA
Lessons learned and business case for a rapid RPA
Mohit Sharma (GAICD)
 

Viewers also liked (11)

Guarding and Growing Personal Data Value
Guarding and Growing Personal Data ValueGuarding and Growing Personal Data Value
Guarding and Growing Personal Data Value
 
Technology Vision 2017 - Overview
Technology Vision 2017 - OverviewTechnology Vision 2017 - Overview
Technology Vision 2017 - Overview
 
28022017 Simen Munter Mindfields
28022017 Simen Munter Mindfields28022017 Simen Munter Mindfields
28022017 Simen Munter Mindfields
 
Setting up The Centre of Excellence for Rpa
Setting up The Centre of Excellence for RpaSetting up The Centre of Excellence for Rpa
Setting up The Centre of Excellence for Rpa
 
The digital government: shaped around its citizens
The digital government: shaped around its citizensThe digital government: shaped around its citizens
The digital government: shaped around its citizens
 
28022017 Mohit Sharma
28022017 Mohit Sharma28022017 Mohit Sharma
28022017 Mohit Sharma
 
Buying RPA - From Hype to Reality
Buying RPA - From Hype to RealityBuying RPA - From Hype to Reality
Buying RPA - From Hype to Reality
 
Network Transformation Roadmap
Network Transformation RoadmapNetwork Transformation Roadmap
Network Transformation Roadmap
 
The Real World of Robotics Process Automation (RPA)
The Real World of Robotics Process Automation (RPA)The Real World of Robotics Process Automation (RPA)
The Real World of Robotics Process Automation (RPA)
 
What, Why and How of Governance in RPA
What, Why and How of Governance  in RPAWhat, Why and How of Governance  in RPA
What, Why and How of Governance in RPA
 
Lessons learned and business case for a rapid RPA
Lessons learned and business case for a rapid RPALessons learned and business case for a rapid RPA
Lessons learned and business case for a rapid RPA
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 

Cyber security in australia and new zealand

  • 1. CYBER SECURITY IN AUSTRALIA AND NEW ZEALAND: HOW OPERATIONAL EFFECTIVENESS IS KEY
  • 2. STRATEGY AND TECHNOLOGY ALONE DO NOT GUARANTEE AN EFFECTIVE CYBER DEFENCE The best strategy, supported by the latest technology, can fail if not executed properly. Risks to effective cyber defence include: • Increased exposure to attack (cloud, Internet of Things, connected devices) • High turnover within security team • Lack of visibility to critical assets • Frequent IT changes not communicated • Length of time taken to detect breaches Copyright © 2016 Accenture. All rights reserved. 2
  • 3. SHORTAGE OF CRITICAL TECHNOLOGIES AND SKILLS HAMPER ORGANISATIONS’ SECURITY APPROACH • Operations lack rigor and consistency • Stakeholders remain unaware of their vulnerability • Employees don’t follow standard security practices • Security work generates “noise” that masks valid threats • Out-dated tools and processes can limit effectiveness of the security team Copyright © 2016 Accenture. All rights reserved. 3
  • 4. DRIVE IMPROVED SECURITY OPERATIONS FROM ACTIONABLE THREAT INTELLIGENCE Steps that can create security operational excellence: 1. Assess effectiveness of current security processes 2. Invest in attracting and retaining skilled security talent 3. Automate intelligently to leverage scarce resources 4. Understand how threat data pertains to the business 5. Identify what isn’t known 6. Create a plan to address knowledge gaps 7. Find an effective sparring partner to improve security capabilities Copyright © 2016 Accenture. All rights reserved. 4
  • 5. CYBER DEFENCE STRATEGIES AND SUPPORTING TECHNOLOGY WILL ONLY WORK IF EXECUTED PROPERLY Leading organisations focus on creating a highly efficient operating model that balances security operations, new technology implementation, testing of security posture and feedback to update defences. Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation 5Copyright © 2016 Accenture. All rights reserved.
  • 6. ACHIEVING OPERATIONAL EXCELLENCE IN CYBER DEFENCE REQUIRES A COMPREHENSIVE APPROACH Our model helps organisations prepare and protect for threats, defend and detect breaches, and then respond to and recover from incidents. Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation 6Copyright © 2016 Accenture. All rights reserved.
  • 7. START WITH A BIG-PICTURE STRATEGY OF HOW SECURITY SUPPORTS BUSINESS PERFORMANCE • Forward-thinking capabilities to help scale activities • IT strategy that provides greater understanding of assets, data sets, technical and business functions Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation 7Copyright © 2016 Accenture. All rights reserved.
  • 8. FORWARD-THINKING CAPABILITIES HELP SCALE ACTIVITIES EFFECTIVELY • High-powered analytics to predict and detect incidents, and identify behavior changes that indicate security risks • Emphasis on visualisation to identify anomalies Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation 8Copyright © 2016 Accenture. All rights reserved.
  • 9. CONCENTRATE ON INTELLIGENT INCIDENT RESPONSE • Platforms that guide operators in hunting for threats • Train the same way the company fights attackers, to prepare for real-world adversaries Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Security Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics Incident Response Remediation 9Copyright © 2016 Accenture. All rights reserved.
  • 10. THE GOAL Create a highly efficient operating model that balances security operations, new technology implementation, testing of security posture and feedback to update defences. Copyright © 2016 Accenture. All rights reserved. 10
  • 11. THANK YOU For further information: • Visit Accenture.com/operationaleffectiveness • Follow us on Twitter @AccentureSecure • Contact APAC Security Lead, Joshua Kennedy-White Copyright © 2016 Accenture. All rights reserved. 11
  • 12. ABOUT ACCENTURE Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions—underpinned by the world’s largest delivery network— Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With approximately 373,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com. Accenture, its logo, and High performance. Delivered. are trademarks of Accenture. Copyright © 2016 Accenture All rights reserved.