SlideShare a Scribd company logo
1 of 14
Download to read offline
Trend  5:  
Digital  Trust
People  First:    
The  Primacy  of  People  
in  the  Digital  Age
People  First:  The  Primacy  of  People  in  the  Digital  Age
Copyright  ©  2016  Accenture.  All  rights  reserved.
The  Accenture  Technology  Vision  2016  identifies  five  technology  trends  fueled  by  the  
people  first principle  and  that  are  essential  to  business  success  in  the  digital  economy.  
Intelligent  
Automation
Liquid  
Workforce  
Platform  
Economy
Predictable  
Disruption
Digital  
Trust
3
Why  are  we  talking  about  Digital  Trust?  
Copyright  ©  2016  Accenture.  All  rights  reserved. 4
Company  operations  
are  affected:
In  the  age  of  mass  personalization  
and  IoT,  information  is  inherently  
more  personal.  This  data  underpins  
a  company’s  operations.
Security  needs  
to  be  data-­centric:
Tomorrow's  standard  will  be  security  
that  follows  data  and  continuously  
ensures  connected  devices  are  
uncompromised,  authenticated  users  
are  who  they  say  they  are,  and  
security  is  ‘baked-­in’  to  new  offerings.
Costs  are  rising:
Digital  businesses  that  rely  
on  data  insights  and  
intelligent  automation  are  
exposed  to  unprecedented  
and  systemic  risks.
5Copyright © 2016 Accenture. All rights reserved.
Address Digital Risk with Trust
End result? Trust helps brands build strong
and enduring customer relationships.
Trust and the Customer Journey
Customer
Journey:
Role of Trust:
Consider Purchase Integrate Maintain Advocate
Differentiation
Transparency of
ethics and security
practices can set your
brand apart from
others.
High Ethical
Standards
Adhering to high ethical
and security standards
may require similar
updates on connected
platforms.
Maintain Strong
Relationships
Customers become
partners and build on top
of your platforms; you
have more leeway to
experiment.
Trust Attracts
Customers
As products and
services become more
trustworthy, customers
become advocates.
Apple  Relies  On  Trust  To  Enter  New  Markets
Its  efforts  to  be  transparent  in  how  it  uses  and  
secures  customer  data  is  testimony  to  the  value  this  
leading  brand  places  on  trust:  strong  security  and  
ethics  that  are  ‘baked  in’  give  customers  confidence  that  
their  digital  footprints  are  secure  and  private,  easing  the  
transition  to  and  adoption  of  the  Apple  ecosystem.
As  Apple  has  shown,  trust  differentiates  competitors  in  the  
digital  economy  where  businesses  can  reach  vastly  more  
people,  iterate  quicker,  and  make  faster,  better  decisions  
than  ever  before.
When  customers  trust  a  service,  product,  or  brand,  
they  look  to  it  for  guidance  into  the  digital  future
6Copyright  ©  2016  Accenture.  All  rights  reserved. 6
Homekit
Healthkit
Researchkit
In  today’s  digital  
business  environment,  
trust  is  built  on  two  
major  components:  
Ethics  and  Security
7
83%  of  respondents  to  the  
Accenture  Technology  Vision  
2016  survey  agreed  that  
“Trust  is  the  cornerstone  
of  the  digital  economy.”
Copyright  ©  2016  Accenture.  All  rights  reserved. 7
But  achieving  trust  requires  more  than  
strong  ethics,  it  demands  robust  security
Copyright  ©  2016  Accenture.  All  rights  reserved. Source:    Accenture  Technology  Survey
7  out  of  10  organizations  suffered  from  
at  least  twice  as  many  privacy  or  security  
breaches  compared  to  two  years  ago.
81%  agree  that  organizations  need  to  move  from  
an  exclusively  perimeter-­based  security  model  
(e.g.  firewalls,  intrusion  detection  systems)  to  
include  human  factors-­based  security  (e.g.,  
cognitive  fingerprinting,  hardware  authentication).
8
Robust  cybersecurity is  moving  away  from  
perimeter-­based  tools  and  closer  to  data
Copyright  ©  2016  Accenture.  All  rights  reserved. 9
Cloud-­based  access  controls  that  offer  
visibility,  governance,  and  protection  for  data.
Adallom
Measures  human  behavior  to  
recognize  or  verify  person’s  identity.
BehavioSec
Authenticates  users,  detects  threats  
by  analyzing  users’  interaction  with  
online  and  mobile  apps.
BioCatch
Cloud-­access  security  broker  that  
traverses  perimeter  security  and  
operates  at  the  device  level.
Bitglass
Wrappers  to  segregate  work  from  
personal  apps  and  apply  app-­based  
encryption  and  security  policies.
Bluebox
Uses  virtual  application  wrappers  
to  isolate  threats  and  stop  breaches.
Bromium
Assigns  policies  and  rights  to  data  
files,  effectively  locking  out  hackers  
and  malicious  insiders.
Covertix
Leverage  sensor  data  and  other  
context  to invisibly authenticate  users.
Crysp
Workload-­ and  app-­based  security  
policies  that  transverse  the  cloud  
and  adapt  to  infrastructure  changes.  
Illumio
Mobile-­first  authentication  &  fraud  
prevention  across  mobile  apps,  mobile  
browsers,  and  desktop  browsers.
InAuth
Uses  predictive  analytics  on  mobile  
devices  to  detect,  isolate,  and  stop  attacks
Lookout
Cloud  and  mobile  identity  management  with  
granular  controls  for  applications  and  data
Okta
Applies  machine  learning  &  AI  to  
cloud  security  and  IoT to  find  patterns  
in  attack  vectors  attacker  behavior.
SparkCognition
15-­second  visibility  and  control  
over  every  endpoint.
Tanium
Digital  Trust:  100-­Day  Plan
10Copyright  ©  2016  Accenture.  All  rights  reserved.
1. Survey  stakeholders  to  quantify  the  level  of  trust  across  your  
business  portfolio.
2. Search  customer  service  logs  for  the  word  ‘trust’  and  run  sentiment  
analysis  to  learn  how  customers  perceive  your  brand;;  make  a  top-­five  
list  of  the  least  trustworthy  offerings.
3. Take  an  inventory  of  data-­driven  business  processes;;  describe  the  
current  and  potential  opportunities  for  enhanced   security  and  data  
ethics  for  each.
4. Identify  the  executive(s)  responsible  for  building  and  maintaining  trust,  
digital  ethics,  and  security  with  vendors,  partners,  and  customers.
5. Research  what  your  competitors  do  to  build  customer  trust.  Record  
what  builds  and  erodes  trust.  
6. Partner  with  an  academic  institution,  non-­profit,  or  industry  group  to  
dive  deeper  into  one  aspect  of  digital  ethics.  Publish  findings/advice  
for  others.
7. Compile  a  list  of  opportunities  for  security  to  move  closer  to  data.
Digital  Trust:  365-­Day  Plan
11Copyright  ©  2016  Accenture.  All  rights  reserved.
1. From  the  top-­five  list  of  the  least  trustworthy  products,  
do  a  complete  customer  journey  analysis.  Identify  areas  
to  build  trust.
2. Discuss  hiring  a  chief  digital  officer,  chief  trust  officer,  
or  chief  ethics  officer.  
3. Pick  one  product/service  to  maximize  trust.  Build  
metrics  for  tracking  improvement  over  time.  Report  
results  to  product  teams  and  challenge  them  to  meet  
aggressive  targets.
4. Start  tracking  metrics  for  trust  and  both  data  and  digital  
ethics.  Use  this  data  to  include  trust  and  ethical  
practices  in  your  company’s  annual  CSR  report.
5. Implement  a  portfolio  of  solutions  to  move  security  
closer  to  data.  Describe  how  their  implementation  has  
mitigated  downside  risk.  Share  this  report  with  your  CIO  
and  CFO  in  an  effort  to  reduce  insurance  premiums.
Predictions
Copyright  ©  2016  Accenture.  All  rights  reserved. 12
The  Trust  Bust
High-­profile  digital  ethics  failures  
will  create  new  governing  bodies,  
new  regulations  and  a  new  
category  of  jobs.
The  CEO  gets  a  Twin
Trust  becomes  paramount,  
and  a  new  leader  emerges  -­
the  Chief  Ethics  Officer.
Key  Takeaways
Copyright  ©  2016  Accenture.  All  rights  reserved. 13
Ethics  and  security  must  be  
primary  considerations  in  any  
digital  transformation.  
Exposure  to  risk  scales  
in  proportion  to  digital  
business  operations.  
To  protect  against  downside  risk,  
businesses  must  foster  strong  ethical,  
effectively  use  security  to  protect  against  
external  threats,  and  build  trusting  
relationships  with  ecosystem  stakeholders.  
In  procuring  new  technologies,  
security  and  ethics  must  be  
evaluation  criteria.  
Look  for  opportunities  to  build  
trust  at  every  engagement  point  
along  the  customer  journey.  
Copyright  ©  2016  Accenture.  All  rights  reserved.
Thank  you
#techvision2016
www.accenture.com/technologyvision

More Related Content

What's hot

What's hot (20)

The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leader
 
Agricultural Chemicals 2016 Supply Chain Benchmarking Study
Agricultural Chemicals 2016 Supply Chain Benchmarking StudyAgricultural Chemicals 2016 Supply Chain Benchmarking Study
Agricultural Chemicals 2016 Supply Chain Benchmarking Study
 
Being digital: Bold times for the oil and gas industry
Being digital: Bold times for the oil and gas industryBeing digital: Bold times for the oil and gas industry
Being digital: Bold times for the oil and gas industry
 
People-Centric Growth: The Primacy of People in the Digital Age
People-Centric Growth: The Primacy of People in the Digital AgePeople-Centric Growth: The Primacy of People in the Digital Age
People-Centric Growth: The Primacy of People in the Digital Age
 
Communication & Technology Companies - Ecosystem vs. Ecosystem
Communication & Technology Companies - Ecosystem vs. EcosystemCommunication & Technology Companies - Ecosystem vs. Ecosystem
Communication & Technology Companies - Ecosystem vs. Ecosystem
 
Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationHarnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open Innovation
 
The Digitally Enabled Grid: How can utilities survive the energy demand disru...
The Digitally Enabled Grid: How can utilities survive the energy demand disru...The Digitally Enabled Grid: How can utilities survive the energy demand disru...
The Digitally Enabled Grid: How can utilities survive the energy demand disru...
 
Being digital: Embracing the future of work
Being digital: Embracing the future of workBeing digital: Embracing the future of work
Being digital: Embracing the future of work
 
Automotive’s Latest Model: Redefining Competitiveness Through The Circular Ec...
Automotive’s Latest Model: Redefining Competitiveness Through The Circular Ec...Automotive’s Latest Model: Redefining Competitiveness Through The Circular Ec...
Automotive’s Latest Model: Redefining Competitiveness Through The Circular Ec...
 
Driving the future: Why other industries are steering automotive
Driving the future: Why other industries are steering automotiveDriving the future: Why other industries are steering automotive
Driving the future: Why other industries are steering automotive
 
Open Innovation: Smart Solutions for R&D Pipelines
Open Innovation: Smart Solutions for R&D PipelinesOpen Innovation: Smart Solutions for R&D Pipelines
Open Innovation: Smart Solutions for R&D Pipelines
 
Unlocking the True Benefit of Software Defined Networking
Unlocking the True Benefit of Software Defined NetworkingUnlocking the True Benefit of Software Defined Networking
Unlocking the True Benefit of Software Defined Networking
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
The Collaboration Imperative in Utility Distribution
The Collaboration Imperative in Utility DistributionThe Collaboration Imperative in Utility Distribution
The Collaboration Imperative in Utility Distribution
 
Accenture Technology Vision 2014—Every Business is a Digital Business
Accenture Technology Vision 2014—Every Business is a Digital BusinessAccenture Technology Vision 2014—Every Business is a Digital Business
Accenture Technology Vision 2014—Every Business is a Digital Business
 
Not your Father’s Business Model – Competitiveness in the Age of Digital
Not your Father’s Business Model – Competitiveness in the Age of DigitalNot your Father’s Business Model – Competitiveness in the Age of Digital
Not your Father’s Business Model – Competitiveness in the Age of Digital
 
Accenture Technology Vision for Industrial 2016
Accenture Technology Vision for Industrial 2016Accenture Technology Vision for Industrial 2016
Accenture Technology Vision for Industrial 2016
 
Artificial intelligence: Driving future growth in Singapore- Accenture
Artificial intelligence: Driving future growth in Singapore- AccentureArtificial intelligence: Driving future growth in Singapore- Accenture
Artificial intelligence: Driving future growth in Singapore- Accenture
 
Banking Technology Vision 2017
Banking Technology Vision 2017Banking Technology Vision 2017
Banking Technology Vision 2017
 
Accenture 2015 Global Risk Management Study: North American Banking Report Ke...
Accenture 2015 Global Risk Management Study: North American Banking Report Ke...Accenture 2015 Global Risk Management Study: North American Banking Report Ke...
Accenture 2015 Global Risk Management Study: North American Banking Report Ke...
 

Viewers also liked

Viewers also liked (20)

Technology Vision 2016 – Overview
Technology Vision 2016 – OverviewTechnology Vision 2016 – Overview
Technology Vision 2016 – Overview
 
At a Human Services Tipping Point: How Leaders Move from Ideas to Outcomes
At a Human Services Tipping Point: How Leaders Move from Ideas to OutcomesAt a Human Services Tipping Point: How Leaders Move from Ideas to Outcomes
At a Human Services Tipping Point: How Leaders Move from Ideas to Outcomes
 
Partner Transformation for Hybrid Cloud Management
Partner Transformation for Hybrid Cloud ManagementPartner Transformation for Hybrid Cloud Management
Partner Transformation for Hybrid Cloud Management
 
Igniting Growth in Consumer Technology
Igniting Growth in Consumer TechnologyIgniting Growth in Consumer Technology
Igniting Growth in Consumer Technology
 
Liquid Workforce - Tech Vision 2016 Trend 2
Liquid Workforce - Tech Vision 2016 Trend 2Liquid Workforce - Tech Vision 2016 Trend 2
Liquid Workforce - Tech Vision 2016 Trend 2
 
Massachusetts Department of Children and Families Mobile Strategy
Massachusetts Department of Children and Families Mobile StrategyMassachusetts Department of Children and Families Mobile Strategy
Massachusetts Department of Children and Families Mobile Strategy
 
Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3
 
Data Governance – Lessons Learnt der Projektpraxis
Data Governance – Lessons Learnt der ProjektpraxisData Governance – Lessons Learnt der Projektpraxis
Data Governance – Lessons Learnt der Projektpraxis
 
Insights from the 2015 Public Sector Summit at Harvard
Insights from the 2015 Public Sector Summit at HarvardInsights from the 2015 Public Sector Summit at Harvard
Insights from the 2015 Public Sector Summit at Harvard
 
Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4Predictable Disruption - Tech Vision 2016 Trend 4
Predictable Disruption - Tech Vision 2016 Trend 4
 
What Does Good Risk Culture Actually Look Like?
What Does Good Risk Culture Actually Look Like?What Does Good Risk Culture Actually Look Like?
What Does Good Risk Culture Actually Look Like?
 
Beyond the Everyday Bank
Beyond the Everyday BankBeyond the Everyday Bank
Beyond the Everyday Bank
 
US Federal Workforce: A Pulse Check on Today’s Human Capital Challenges
US Federal Workforce:  A Pulse Check on Today’s Human  Capital ChallengesUS Federal Workforce:  A Pulse Check on Today’s Human  Capital Challenges
US Federal Workforce: A Pulse Check on Today’s Human Capital Challenges
 
Smart Move: Intelligent Technologies Make Their Mark on Public Service
Smart Move: Intelligent Technologies Make Their Mark on Public ServiceSmart Move: Intelligent Technologies Make Their Mark on Public Service
Smart Move: Intelligent Technologies Make Their Mark on Public Service
 
From Regulatory-driven Risk Operating Models to Improved ECM and Client Cent...
From Regulatory-driven Risk  Operating Models to Improved ECM and Client Cent...From Regulatory-driven Risk  Operating Models to Improved ECM and Client Cent...
From Regulatory-driven Risk Operating Models to Improved ECM and Client Cent...
 
Accenture Regulatory Compliance Platform
Accenture Regulatory Compliance PlatformAccenture Regulatory Compliance Platform
Accenture Regulatory Compliance Platform
 
Procurement in 2017: The Road Ahead
Procurement in 2017: The Road AheadProcurement in 2017: The Road Ahead
Procurement in 2017: The Road Ahead
 
Accenture HealthTech Innovation Challenge
Accenture HealthTech Innovation ChallengeAccenture HealthTech Innovation Challenge
Accenture HealthTech Innovation Challenge
 
Evolving landscape of technology deals: Semiconductor Industry
Evolving landscape of technology deals: Semiconductor Industry Evolving landscape of technology deals: Semiconductor Industry
Evolving landscape of technology deals: Semiconductor Industry
 
Fundamental Review of the Trading Book
Fundamental Review of the Trading BookFundamental Review of the Trading Book
Fundamental Review of the Trading Book
 

Similar to Digital Trust - Tech Vision 2016 Trend 5

Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New Block
Sean Dickson
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
Vasuki Kashyap
 

Similar to Digital Trust - Tech Vision 2016 Trend 5 (20)

People First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital InsurancePeople First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital Insurance
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
How Insurers Can Tame Data to Drive Innovation
How Insurers Can Tame Data to Drive InnovationHow Insurers Can Tame Data to Drive Innovation
How Insurers Can Tame Data to Drive Innovation
 
10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app control10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app control
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data Security
 
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
 
Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New Block
 
The 10 most trusted authentication solution providers 2018
The 10 most trusted authentication solution providers 2018The 10 most trusted authentication solution providers 2018
The 10 most trusted authentication solution providers 2018
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
Seclore Corporate Profile
Seclore Corporate ProfileSeclore Corporate Profile
Seclore Corporate Profile
 
Digital Insurance
Digital InsuranceDigital Insurance
Digital Insurance
 
Machine Learning In Insurance
Machine Learning In InsuranceMachine Learning In Insurance
Machine Learning In Insurance
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
Top 10 Trends for Winners in Mobile 2016
Top 10 Trends for Winners in Mobile 2016Top 10 Trends for Winners in Mobile 2016
Top 10 Trends for Winners in Mobile 2016
 

More from accenture

More from accenture (20)

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 

Digital Trust - Tech Vision 2016 Trend 5

  • 2. People  First:     The  Primacy  of  People   in  the  Digital  Age
  • 3. People  First:  The  Primacy  of  People  in  the  Digital  Age Copyright  ©  2016  Accenture.  All  rights  reserved. The  Accenture  Technology  Vision  2016  identifies  five  technology  trends  fueled  by  the   people  first principle  and  that  are  essential  to  business  success  in  the  digital  economy.   Intelligent   Automation Liquid   Workforce   Platform   Economy Predictable   Disruption Digital   Trust 3
  • 4. Why  are  we  talking  about  Digital  Trust?   Copyright  ©  2016  Accenture.  All  rights  reserved. 4 Company  operations   are  affected: In  the  age  of  mass  personalization   and  IoT,  information  is  inherently   more  personal.  This  data  underpins   a  company’s  operations. Security  needs   to  be  data-­centric: Tomorrow's  standard  will  be  security   that  follows  data  and  continuously   ensures  connected  devices  are   uncompromised,  authenticated  users   are  who  they  say  they  are,  and   security  is  ‘baked-­in’  to  new  offerings. Costs  are  rising: Digital  businesses  that  rely   on  data  insights  and   intelligent  automation  are   exposed  to  unprecedented   and  systemic  risks.
  • 5. 5Copyright © 2016 Accenture. All rights reserved. Address Digital Risk with Trust End result? Trust helps brands build strong and enduring customer relationships. Trust and the Customer Journey Customer Journey: Role of Trust: Consider Purchase Integrate Maintain Advocate Differentiation Transparency of ethics and security practices can set your brand apart from others. High Ethical Standards Adhering to high ethical and security standards may require similar updates on connected platforms. Maintain Strong Relationships Customers become partners and build on top of your platforms; you have more leeway to experiment. Trust Attracts Customers As products and services become more trustworthy, customers become advocates.
  • 6. Apple  Relies  On  Trust  To  Enter  New  Markets Its  efforts  to  be  transparent  in  how  it  uses  and   secures  customer  data  is  testimony  to  the  value  this   leading  brand  places  on  trust:  strong  security  and   ethics  that  are  ‘baked  in’  give  customers  confidence  that   their  digital  footprints  are  secure  and  private,  easing  the   transition  to  and  adoption  of  the  Apple  ecosystem. As  Apple  has  shown,  trust  differentiates  competitors  in  the   digital  economy  where  businesses  can  reach  vastly  more   people,  iterate  quicker,  and  make  faster,  better  decisions   than  ever  before. When  customers  trust  a  service,  product,  or  brand,   they  look  to  it  for  guidance  into  the  digital  future 6Copyright  ©  2016  Accenture.  All  rights  reserved. 6 Homekit Healthkit Researchkit
  • 7. In  today’s  digital   business  environment,   trust  is  built  on  two   major  components:   Ethics  and  Security 7 83%  of  respondents  to  the   Accenture  Technology  Vision   2016  survey  agreed  that   “Trust  is  the  cornerstone   of  the  digital  economy.” Copyright  ©  2016  Accenture.  All  rights  reserved. 7
  • 8. But  achieving  trust  requires  more  than   strong  ethics,  it  demands  robust  security Copyright  ©  2016  Accenture.  All  rights  reserved. Source:    Accenture  Technology  Survey 7  out  of  10  organizations  suffered  from   at  least  twice  as  many  privacy  or  security   breaches  compared  to  two  years  ago. 81%  agree  that  organizations  need  to  move  from   an  exclusively  perimeter-­based  security  model   (e.g.  firewalls,  intrusion  detection  systems)  to   include  human  factors-­based  security  (e.g.,   cognitive  fingerprinting,  hardware  authentication). 8
  • 9. Robust  cybersecurity is  moving  away  from   perimeter-­based  tools  and  closer  to  data Copyright  ©  2016  Accenture.  All  rights  reserved. 9 Cloud-­based  access  controls  that  offer   visibility,  governance,  and  protection  for  data. Adallom Measures  human  behavior  to   recognize  or  verify  person’s  identity. BehavioSec Authenticates  users,  detects  threats   by  analyzing  users’  interaction  with   online  and  mobile  apps. BioCatch Cloud-­access  security  broker  that   traverses  perimeter  security  and   operates  at  the  device  level. Bitglass Wrappers  to  segregate  work  from   personal  apps  and  apply  app-­based   encryption  and  security  policies. Bluebox Uses  virtual  application  wrappers   to  isolate  threats  and  stop  breaches. Bromium Assigns  policies  and  rights  to  data   files,  effectively  locking  out  hackers   and  malicious  insiders. Covertix Leverage  sensor  data  and  other   context  to invisibly authenticate  users. Crysp Workload-­ and  app-­based  security   policies  that  transverse  the  cloud   and  adapt  to  infrastructure  changes.   Illumio Mobile-­first  authentication  &  fraud   prevention  across  mobile  apps,  mobile   browsers,  and  desktop  browsers. InAuth Uses  predictive  analytics  on  mobile   devices  to  detect,  isolate,  and  stop  attacks Lookout Cloud  and  mobile  identity  management  with   granular  controls  for  applications  and  data Okta Applies  machine  learning  &  AI  to   cloud  security  and  IoT to  find  patterns   in  attack  vectors  attacker  behavior. SparkCognition 15-­second  visibility  and  control   over  every  endpoint. Tanium
  • 10. Digital  Trust:  100-­Day  Plan 10Copyright  ©  2016  Accenture.  All  rights  reserved. 1. Survey  stakeholders  to  quantify  the  level  of  trust  across  your   business  portfolio. 2. Search  customer  service  logs  for  the  word  ‘trust’  and  run  sentiment   analysis  to  learn  how  customers  perceive  your  brand;;  make  a  top-­five   list  of  the  least  trustworthy  offerings. 3. Take  an  inventory  of  data-­driven  business  processes;;  describe  the   current  and  potential  opportunities  for  enhanced   security  and  data   ethics  for  each. 4. Identify  the  executive(s)  responsible  for  building  and  maintaining  trust,   digital  ethics,  and  security  with  vendors,  partners,  and  customers. 5. Research  what  your  competitors  do  to  build  customer  trust.  Record   what  builds  and  erodes  trust.   6. Partner  with  an  academic  institution,  non-­profit,  or  industry  group  to   dive  deeper  into  one  aspect  of  digital  ethics.  Publish  findings/advice   for  others. 7. Compile  a  list  of  opportunities  for  security  to  move  closer  to  data.
  • 11. Digital  Trust:  365-­Day  Plan 11Copyright  ©  2016  Accenture.  All  rights  reserved. 1. From  the  top-­five  list  of  the  least  trustworthy  products,   do  a  complete  customer  journey  analysis.  Identify  areas   to  build  trust. 2. Discuss  hiring  a  chief  digital  officer,  chief  trust  officer,   or  chief  ethics  officer.   3. Pick  one  product/service  to  maximize  trust.  Build   metrics  for  tracking  improvement  over  time.  Report   results  to  product  teams  and  challenge  them  to  meet   aggressive  targets. 4. Start  tracking  metrics  for  trust  and  both  data  and  digital   ethics.  Use  this  data  to  include  trust  and  ethical   practices  in  your  company’s  annual  CSR  report. 5. Implement  a  portfolio  of  solutions  to  move  security   closer  to  data.  Describe  how  their  implementation  has   mitigated  downside  risk.  Share  this  report  with  your  CIO   and  CFO  in  an  effort  to  reduce  insurance  premiums.
  • 12. Predictions Copyright  ©  2016  Accenture.  All  rights  reserved. 12 The  Trust  Bust High-­profile  digital  ethics  failures   will  create  new  governing  bodies,   new  regulations  and  a  new   category  of  jobs. The  CEO  gets  a  Twin Trust  becomes  paramount,   and  a  new  leader  emerges  -­ the  Chief  Ethics  Officer.
  • 13. Key  Takeaways Copyright  ©  2016  Accenture.  All  rights  reserved. 13 Ethics  and  security  must  be   primary  considerations  in  any   digital  transformation.   Exposure  to  risk  scales   in  proportion  to  digital   business  operations.   To  protect  against  downside  risk,   businesses  must  foster  strong  ethical,   effectively  use  security  to  protect  against   external  threats,  and  build  trusting   relationships  with  ecosystem  stakeholders.   In  procuring  new  technologies,   security  and  ethics  must  be   evaluation  criteria.   Look  for  opportunities  to  build   trust  at  every  engagement  point   along  the  customer  journey.  
  • 14. Copyright  ©  2016  Accenture.  All  rights  reserved. Thank  you #techvision2016 www.accenture.com/technologyvision