SlideShare a Scribd company logo
Security Technology Vision 2016
Empowering Your
Cyber Defenders to
Enable Digital Trust
The digital economy introduces new risks and threats
to challenge cyber defender capabilities…
Pace of
change
New
technologies
Changing
workforce models
Increased
connectedness
Huge scale
of software
operations
Expanded
attack surfaces
More sophisticated,
higher volume
of attacks
Ongoing
privacy concerns
Copyright © 2016 Accenture All rights reserved. 2
… and attackers are overwhelming
organizations that lack skilled resources
to properly defend the enterprise
• Attackers use increasingly sophisticated tools and
techniques to target businesses
• 45 percent of companies say they have difficulty
finding qualified security personnel
Copyright © 2016 Accenture All rights reserved. 3
Underpinning all of this change is the mandate
to boost security’s effectiveness in supporting
the business’ efforts to attain digital trust.
Technology alone cannot resolve
enterprise security threats
To establish robust security capabilities,
organizations need the right skills at the right level at
the right time and to:
• Scale quickly to meet new challenges in cyber defense
• Attract and retain highly skilled resources
• Elevate their existing workforce with enhanced skills
and supporting technology to reach new levels of
performance
Copyright © 2016 Accenture All rights reserved. 4
In the next five years intelligent automation and the liquid
workforce will bring significant changes in how security
professionals work and how they use technology to defend
and empower the enterprise
Intelligent
Automation
Outsized impact on the security workforce
Liquid
Workforce
Copyright © 2016 Accenture All rights reserved. 5
Intelligent automation applies artificial intelligence,
process automation and visualization to enhance a
security professional’s capabilities
Artificial intelligence (AI)
• Helps security professionals understand the larger context
of a threat
• Supports process automation, allowing security teams
to execute automated actions as threats emerge and evolve
Visualization
• Harnesses the human ability to recognize patterns quickly
and pick out anomalies
• Helps professionals quickly understand cascades of data
• Provides real-time views of the entire enterprise with
advanced graphics processing
Copyright © 2016 Accenture All rights reserved. 6
The liquid workforce reduces challenges in accessing
scarce security talent by enabling more flexible
workforce arrangements
• Freelancing, crowdsourcing and broad-based collaboration
will offer a much larger pool of security expertise to
organizations.
• Outsourcing security jobs will require that organizations
leverage service providers they trust and who bring well-
vetted resources to the table.
• Accenture believes 40% of a business’ entire workforce will
be freelance by 2020.
• Enterprises should maintain a core of highly-skilled security
people that are augmented with outside resources.
Copyright © 2016 Accenture All rights reserved. 7
What are the next steps leadership should take to
prepare for the future security workforce?
Identify repetitive and low-impact activities that can be automated to
scale security effectiveness.
Look for security challenges where automated decisions make sense
and where quick action can reduce the cost of security incidents.
Increase visual literacy and focus on presenting security-related data in
compelling and insightful ways.
Evaluate where a liquid workforce approach could help: address chronic
staffing issues, fill a short-term skilled role, or support teams with a
broader perspective on data.
Copyright © 2016 Accenture All rights reserved. 8
To find out more please visit
www.accenture.com/SecurityVision
Copyright © 2016 Accenture All rights reserved. 9

More Related Content

What's hot

Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceTechnology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Service
Accenture Operations
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
Accenture Operations
 
Accenture Liquid Application Studio
Accenture Liquid Application StudioAccenture Liquid Application Studio
Accenture Liquid Application Studio
Accenture Technology
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
Accenture Technology
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
accenture
 
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for Insurance
Accenture Insurance
 
Going Deep: Mining Experiential and Behavioral Data in VR
Going Deep: Mining Experiential and Behavioral Data in VRGoing Deep: Mining Experiential and Behavioral Data in VR
Going Deep: Mining Experiential and Behavioral Data in VR
Accenture Technology
 
Accenture High Performance Security Report 2016 For Communications
Accenture High Performance  Security Report 2016 For CommunicationsAccenture High Performance  Security Report 2016 For Communications
Accenture High Performance Security Report 2016 For Communications
accenture
 
Collective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber AttacksCollective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber Attacks
Accenture Operations
 
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Operations
 
Technology Vision 2016 - Infographic
Technology Vision 2016 - InfographicTechnology Vision 2016 - Infographic
Technology Vision 2016 - Infographic
Accenture Technology
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Accenture Technology
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.
accenture
 
2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York
accenture
 
Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energy
accenture
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
accenture
 
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leader
Accenture Australia
 
Increasing Agility to Fuel Growth in the Communications Industry
Increasing Agility to Fuel Growth in the Communications IndustryIncreasing Agility to Fuel Growth in the Communications Industry
Increasing Agility to Fuel Growth in the Communications Industry
accenture
 
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
accenture
 
Digital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and OpportunityDigital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and Opportunity
accenture
 

What's hot (20)

Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceTechnology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Service
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
Accenture Liquid Application Studio
Accenture Liquid Application StudioAccenture Liquid Application Studio
Accenture Liquid Application Studio
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
 
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for Insurance
 
Going Deep: Mining Experiential and Behavioral Data in VR
Going Deep: Mining Experiential and Behavioral Data in VRGoing Deep: Mining Experiential and Behavioral Data in VR
Going Deep: Mining Experiential and Behavioral Data in VR
 
Accenture High Performance Security Report 2016 For Communications
Accenture High Performance  Security Report 2016 For CommunicationsAccenture High Performance  Security Report 2016 For Communications
Accenture High Performance Security Report 2016 For Communications
 
Collective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber AttacksCollective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber Attacks
 
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
 
Technology Vision 2016 - Infographic
Technology Vision 2016 - InfographicTechnology Vision 2016 - Infographic
Technology Vision 2016 - Infographic
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.
 
2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York
 
Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energy
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
 
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leader
 
Increasing Agility to Fuel Growth in the Communications Industry
Increasing Agility to Fuel Growth in the Communications IndustryIncreasing Agility to Fuel Growth in the Communications Industry
Increasing Agility to Fuel Growth in the Communications Industry
 
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
 
Digital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and OpportunityDigital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and Opportunity
 

Viewers also liked

Guarding and Growing Personal Data Value
Guarding and Growing Personal Data ValueGuarding and Growing Personal Data Value
Guarding and Growing Personal Data Value
accenture
 
Difendere e far crescere il valore dei dati personali
Difendere e far crescere il valore dei dati personaliDifendere e far crescere il valore dei dati personali
Difendere e far crescere il valore dei dati personali
Accenture Italia
 
Continui attacchi informatici: raggiungere l'eccellenza operativa per la nuov...
Continui attacchi informatici: raggiungere l'eccellenza operativa per la nuov...Continui attacchi informatici: raggiungere l'eccellenza operativa per la nuov...
Continui attacchi informatici: raggiungere l'eccellenza operativa per la nuov...
Accenture Italia
 
Security Technology Vision 2016 - Accenture Italia
Security Technology Vision 2016 - Accenture ItaliaSecurity Technology Vision 2016 - Accenture Italia
Security Technology Vision 2016 - Accenture Italia
Accenture Italia
 
Continui attacchi informatici : coinvolgere i business leader per la nuova n...
Continui attacchi informatici : coinvolgere i business leader per la nuova n...Continui attacchi informatici : coinvolgere i business leader per la nuova n...
Continui attacchi informatici : coinvolgere i business leader per la nuova n...
Accenture Italia
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital age
Accenture Technology
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
Accenture Technology
 

Viewers also liked (7)

Guarding and Growing Personal Data Value
Guarding and Growing Personal Data ValueGuarding and Growing Personal Data Value
Guarding and Growing Personal Data Value
 
Difendere e far crescere il valore dei dati personali
Difendere e far crescere il valore dei dati personaliDifendere e far crescere il valore dei dati personali
Difendere e far crescere il valore dei dati personali
 
Continui attacchi informatici: raggiungere l'eccellenza operativa per la nuov...
Continui attacchi informatici: raggiungere l'eccellenza operativa per la nuov...Continui attacchi informatici: raggiungere l'eccellenza operativa per la nuov...
Continui attacchi informatici: raggiungere l'eccellenza operativa per la nuov...
 
Security Technology Vision 2016 - Accenture Italia
Security Technology Vision 2016 - Accenture ItaliaSecurity Technology Vision 2016 - Accenture Italia
Security Technology Vision 2016 - Accenture Italia
 
Continui attacchi informatici : coinvolgere i business leader per la nuova n...
Continui attacchi informatici : coinvolgere i business leader per la nuova n...Continui attacchi informatici : coinvolgere i business leader per la nuova n...
Continui attacchi informatici : coinvolgere i business leader per la nuova n...
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital age
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 

Similar to Security Technology Vision 2016

For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Accenture Technology
 
Intelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital BusinessIntelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital Business
accenture
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
Brencil Kaimba
 
Small Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdfSmall Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdf
elizabethrdusek
 
Small Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptxSmall Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptx
elizabethrdusek
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations Center
EMC
 
People First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital InsurancePeople First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital Insurance
Accenture México
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
accenture
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program  Hire A Great Iso!!How Do You Create A Successful Information Security Program  Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!Tammy Clark
 
Mobile, Cloud, Security, Cognitive and Analytics
Mobile, Cloud, Security, Cognitive and AnalyticsMobile, Cloud, Security, Cognitive and Analytics
Mobile, Cloud, Security, Cognitive and Analytics
Kate Morphett
 
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Aujas
 
SOC Service in India.pdf
SOC Service in India.pdfSOC Service in India.pdf
SOC Service in India.pdf
ACS Networks & Technologies
 
Accenture Technology Vision for Banking
Accenture Technology Vision for BankingAccenture Technology Vision for Banking
Accenture Technology Vision for Banking
accenture
 
Sonia randhawa speaks on cybersecurity and innovation
Sonia randhawa speaks on cybersecurity and innovationSonia randhawa speaks on cybersecurity and innovation
Sonia randhawa speaks on cybersecurity and innovation
Sonia Randhawa
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
Fahmi Albaheth
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
Netmagic Solutions Pvt. Ltd.
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
Netmagic Solutions Pvt. Ltd.
 
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
Accenture Technology
 
7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan
Envision Technology Advisors
 

Similar to Security Technology Vision 2016 (20)

For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Intelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital BusinessIntelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital Business
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Small Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdfSmall Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdf
 
Small Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptxSmall Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptx
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations Center
 
People First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital InsurancePeople First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital Insurance
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program  Hire A Great Iso!!How Do You Create A Successful Information Security Program  Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!
 
Mobile, Cloud, Security, Cognitive and Analytics
Mobile, Cloud, Security, Cognitive and AnalyticsMobile, Cloud, Security, Cognitive and Analytics
Mobile, Cloud, Security, Cognitive and Analytics
 
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
 
SOC Service in India.pdf
SOC Service in India.pdfSOC Service in India.pdf
SOC Service in India.pdf
 
Accenture Technology Vision for Banking
Accenture Technology Vision for BankingAccenture Technology Vision for Banking
Accenture Technology Vision for Banking
 
Sonia randhawa speaks on cybersecurity and innovation
Sonia randhawa speaks on cybersecurity and innovationSonia randhawa speaks on cybersecurity and innovation
Sonia randhawa speaks on cybersecurity and innovation
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
 
7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan
 

More from Accenture Technology

Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020
Accenture Technology
 
Helping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayHelping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + Workday
Accenture Technology
 
Accenture Labs Innovation Stories
Accenture Labs Innovation StoriesAccenture Labs Innovation Stories
Accenture Labs Innovation Stories
Accenture Technology
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
Accenture Technology
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
Accenture Technology
 
Accenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP Solutions
Accenture Technology
 
Highlights on the five key trends
Highlights on the five key trendsHighlights on the five key trends
Highlights on the five key trends
Accenture Technology
 
Helping you get back to the workplace confidently
Helping you get back to the workplace confidentlyHelping you get back to the workplace confidently
Helping you get back to the workplace confidently
Accenture Technology
 
Driving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldDriving Workday transformation in a virtual world
Driving Workday transformation in a virtual world
Accenture Technology
 
Accenture + Red Hat
Accenture + Red HatAccenture + Red Hat
Accenture + Red Hat
Accenture Technology
 
Accenture and Mercedes Case Study
Accenture and Mercedes Case StudyAccenture and Mercedes Case Study
Accenture and Mercedes Case Study
Accenture Technology
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: Infographic
Accenture Technology
 
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: Overview
Accenture Technology
 
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and Me
Accenture Technology
 
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology
 
Elevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayElevating the Workforce Experience with Workday
Elevating the Workforce Experience with Workday
Accenture Technology
 
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAutomating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Accenture Technology
 
Technology Vision for SAP 2019
Technology Vision for SAP 2019Technology Vision for SAP 2019
Technology Vision for SAP 2019
Accenture Technology
 
Technology Vision 2019 for Workday
Technology Vision 2019 for WorkdayTechnology Vision 2019 for Workday
Technology Vision 2019 for Workday
Accenture Technology
 
Accenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for Pega
Accenture Technology
 

More from Accenture Technology (20)

Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020
 
Helping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayHelping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + Workday
 
Accenture Labs Innovation Stories
Accenture Labs Innovation StoriesAccenture Labs Innovation Stories
Accenture Labs Innovation Stories
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
 
Accenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP Solutions
 
Highlights on the five key trends
Highlights on the five key trendsHighlights on the five key trends
Highlights on the five key trends
 
Helping you get back to the workplace confidently
Helping you get back to the workplace confidentlyHelping you get back to the workplace confidently
Helping you get back to the workplace confidently
 
Driving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldDriving Workday transformation in a virtual world
Driving Workday transformation in a virtual world
 
Accenture + Red Hat
Accenture + Red HatAccenture + Red Hat
Accenture + Red Hat
 
Accenture and Mercedes Case Study
Accenture and Mercedes Case StudyAccenture and Mercedes Case Study
Accenture and Mercedes Case Study
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: Infographic
 
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: Overview
 
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and Me
 
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNA
 
Elevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayElevating the Workforce Experience with Workday
Elevating the Workforce Experience with Workday
 
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAutomating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
 
Technology Vision for SAP 2019
Technology Vision for SAP 2019Technology Vision for SAP 2019
Technology Vision for SAP 2019
 
Technology Vision 2019 for Workday
Technology Vision 2019 for WorkdayTechnology Vision 2019 for Workday
Technology Vision 2019 for Workday
 
Accenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for Pega
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

Security Technology Vision 2016

  • 1. Security Technology Vision 2016 Empowering Your Cyber Defenders to Enable Digital Trust
  • 2. The digital economy introduces new risks and threats to challenge cyber defender capabilities… Pace of change New technologies Changing workforce models Increased connectedness Huge scale of software operations Expanded attack surfaces More sophisticated, higher volume of attacks Ongoing privacy concerns Copyright © 2016 Accenture All rights reserved. 2
  • 3. … and attackers are overwhelming organizations that lack skilled resources to properly defend the enterprise • Attackers use increasingly sophisticated tools and techniques to target businesses • 45 percent of companies say they have difficulty finding qualified security personnel Copyright © 2016 Accenture All rights reserved. 3 Underpinning all of this change is the mandate to boost security’s effectiveness in supporting the business’ efforts to attain digital trust.
  • 4. Technology alone cannot resolve enterprise security threats To establish robust security capabilities, organizations need the right skills at the right level at the right time and to: • Scale quickly to meet new challenges in cyber defense • Attract and retain highly skilled resources • Elevate their existing workforce with enhanced skills and supporting technology to reach new levels of performance Copyright © 2016 Accenture All rights reserved. 4
  • 5. In the next five years intelligent automation and the liquid workforce will bring significant changes in how security professionals work and how they use technology to defend and empower the enterprise Intelligent Automation Outsized impact on the security workforce Liquid Workforce Copyright © 2016 Accenture All rights reserved. 5
  • 6. Intelligent automation applies artificial intelligence, process automation and visualization to enhance a security professional’s capabilities Artificial intelligence (AI) • Helps security professionals understand the larger context of a threat • Supports process automation, allowing security teams to execute automated actions as threats emerge and evolve Visualization • Harnesses the human ability to recognize patterns quickly and pick out anomalies • Helps professionals quickly understand cascades of data • Provides real-time views of the entire enterprise with advanced graphics processing Copyright © 2016 Accenture All rights reserved. 6
  • 7. The liquid workforce reduces challenges in accessing scarce security talent by enabling more flexible workforce arrangements • Freelancing, crowdsourcing and broad-based collaboration will offer a much larger pool of security expertise to organizations. • Outsourcing security jobs will require that organizations leverage service providers they trust and who bring well- vetted resources to the table. • Accenture believes 40% of a business’ entire workforce will be freelance by 2020. • Enterprises should maintain a core of highly-skilled security people that are augmented with outside resources. Copyright © 2016 Accenture All rights reserved. 7
  • 8. What are the next steps leadership should take to prepare for the future security workforce? Identify repetitive and low-impact activities that can be automated to scale security effectiveness. Look for security challenges where automated decisions make sense and where quick action can reduce the cost of security incidents. Increase visual literacy and focus on presenting security-related data in compelling and insightful ways. Evaluate where a liquid workforce approach could help: address chronic staffing issues, fill a short-term skilled role, or support teams with a broader perspective on data. Copyright © 2016 Accenture All rights reserved. 8
  • 9. To find out more please visit www.accenture.com/SecurityVision Copyright © 2016 Accenture All rights reserved. 9