SlideShare a Scribd company logo
GAINING
GROUND
ON THE CYBER
ATTACKER
2018 State of Cyber Resilience
Australia
Copyright © 2018 Accenture. All rights reserved. 2
SECURITY TEAMS
HAVE MADE PROGRESS
DEFENDING AGAINST
CYBER ATTACKS.
But more needs to be done.
As the number of attacks more than doubles, monitoring, detection and prevention
improves cyber resilience and helps organizations perform better under pressure.
IMPROVING CYBER RESILIENCE
IN AUSTRALIA
Organizations reduced the rate of successful
attacks from 30% to 13%.
In the past 12 months, how many attempted / successful
breaches have you identified and how many were successful?
Average.
29
144
1
2018
Security breaches
Targeted attacks
106
232
32 30
2017 2018
Targeted attacks Security breaches
Copyright © 2018 Accenture Security. All rights reserved. 3
Australia
GAIN GROUND ON THE CYBER ATTACKER
Copyright © 2018 Accenture. All rights reserved. 4
FIVE WAYS TO
BECOME CYBER
RESILIENT.
Australia
Despite progress, the
basics still need attention
Copyright © 2018 Accenture. All rights reserved. 5
1
say the organization
is not protected by their
cybersecurity program.
38%
Be brilliant at the basics.
Protect valuable assets, from the inside out, across
the value chain.
• Harden your high-value assets
• Protect legacy applications
• Practice your response
More damaging security
breaches accelerate the
need for cyber resilience
Copyright © 2018 Accenture. All rights reserved. 6
2
65%
say it is not possible to
appear “strong, prepared
and competent” if security
is breached
Test your resilience,
like an attacker.
Enhance conventional red attack
and blue defense team testing.
• Coached incident simulation
• Threat intelligence
• Experienced player-coaches
More need to invest
in critical technologies
against new threats
Copyright © 2018 Accenture. All rights reserved.
3
say new technologies are
essential to securing the
future of the organization.
79%
7
Employ advanced technologies
to automate defenses.
Prepare for attackers who use
advanced technology.
• Automated orchestration capabilities enable
teams to respond in near real-time
• Advanced identity access management
controls user access to data
Confidence remains high
but a proactive approach
is needed
Copyright © 2018 Accenture. All rights reserved.
4
say cyber attacks
are still a “bit of a black box;
we do not know how or when they
will affect our organization.”
67%
8
Use intelligence and data to be
proactive with threat hunting.
Find the attackers before they find you.
• Adopt a continuous response model
• Develop strategic and tactical
threat intelligence
• Monitor for anomalous and
suspicious activity
Higher CEO and board
engagement place new
demands on the CISO
Copyright © 2018 Accenture. All rights reserved.
5
Who does the CISO
report directly to?
9
The CISO needs to adapt.
Evolve the role of the CISO to be more integrated
with the business.
• Business adept and tech-savvy
• At home in the C-suite and the
security center
• Able to infuse a ‘security first’
culture everywhere
22%
25%
36%
1 2 3
Board CEO CIO
Copyright © 2018 Accenture. All rights reserved. 10
SECURITY FROM THE INSIDE OUT
Security teams perform better, despite
more attacks.
Leaders should embrace the good news
Investments are proving to be wise. Organizations
show they can perform better under greater pressure.
But transformation does not end here
Improvements must continue. Organizations could achieve
cyber resilience within two to three years.
Copyright © 2018 Accenture. All rights reserved. 11
ABOUT THE RESEARCH
In 2017, Accenture Security surveyed 2,000
executives to understand the extent to
which organizations prioritize security, how
comprehensive their security plans are, what
security capabilities they have, and their level of
spend on security.
Just over a year later, Accenture Security
undertook a similar survey, this time interviewing
4,600 executives—representing organizations
with annual revenues of $1bn
or more—from 19 industries and 15 countries
across North and South America, Europe and
Asia Pacific.
More than 98 percent of respondents were sole or
key decision-makers in cybersecurity strategy and
spending for their organization.
LEARN MORE
accenture.com/stateofcyber
2018 State of Cyber Resilience
Copyright © 2018 Accenture. All rights reserved. 12
About Accenture
Accenture is a leading global professional services company, providing a broad range of
services and solutions in strategy, consulting, digital, technology and operations.
Combining unmatched experience and specialized skills across more than 40 industries
and all business functions—underpinned by the world’s largest delivery network—
Accenture works at the intersection of business and technology to help clients improve
their performance and create sustainable value for their stakeholders. With approximately
442,000 people serving clients in more than 120 countries, Accenture drives innovation to
improve the way the world works and lives. Visit us at www.accenture.com
About Accenture Security
Accenture Security helps organizations build resilience from the inside out, so they can
confidently focus on innovation and growth. Leveraging its global network of cybersecurity
labs, deep industry understanding across client value chains and services that span the
security lifecycle, Accenture protects organization’s valuable assets, end-to-end. With
services that include strategy and risk management, cyber defense, digital identity,
application security and managed security, Accenture enables businesses around the world
to defend against known sophisticated threats, and the unknown. Follow us
@AccentureSecure on Twitter or visit the Accenture Security blog.

More Related Content

What's hot

2018 State of Cyber Reslience in Healthcare
2018 State of Cyber Reslience in Healthcare2018 State of Cyber Reslience in Healthcare
2018 State of Cyber Reslience in Healthcare
accenture
 
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 ReportNinth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
accenture
 
Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services
accenture
 
Homme+Machine : Réinventer Notre Manière de Travailler | Accenture
Homme+Machine : Réinventer Notre Manière de Travailler | AccentureHomme+Machine : Réinventer Notre Manière de Travailler | Accenture
Homme+Machine : Réinventer Notre Manière de Travailler | Accenture
accenture
 
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
accenture
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Accenture Technology
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
accenture
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Accenture Technology
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Technology
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
Accenture Operations
 
Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energy
accenture
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
accenture
 
Accenture High Performance Security Report 2016 For Communications
Accenture High Performance  Security Report 2016 For CommunicationsAccenture High Performance  Security Report 2016 For Communications
Accenture High Performance Security Report 2016 For Communications
accenture
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure
Accenture Operations
 
Accenture Compliance Risk Study 2017: Financial Services
Accenture Compliance Risk Study 2017: Financial ServicesAccenture Compliance Risk Study 2017: Financial Services
Accenture Compliance Risk Study 2017: Financial Services
accenture
 
Collective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber AttacksCollective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber Attacks
Accenture Operations
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Accenture Technology
 
Securing the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustSecuring the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for Trust
Accenture Insurance
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
Accenture Technology
 
Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise
Mourad Khalil
 

What's hot (20)

2018 State of Cyber Reslience in Healthcare
2018 State of Cyber Reslience in Healthcare2018 State of Cyber Reslience in Healthcare
2018 State of Cyber Reslience in Healthcare
 
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 ReportNinth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
 
Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services
 
Homme+Machine : Réinventer Notre Manière de Travailler | Accenture
Homme+Machine : Réinventer Notre Manière de Travailler | AccentureHomme+Machine : Réinventer Notre Manière de Travailler | Accenture
Homme+Machine : Réinventer Notre Manière de Travailler | Accenture
 
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energy
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
 
Accenture High Performance Security Report 2016 For Communications
Accenture High Performance  Security Report 2016 For CommunicationsAccenture High Performance  Security Report 2016 For Communications
Accenture High Performance Security Report 2016 For Communications
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure
 
Accenture Compliance Risk Study 2017: Financial Services
Accenture Compliance Risk Study 2017: Financial ServicesAccenture Compliance Risk Study 2017: Financial Services
Accenture Compliance Risk Study 2017: Financial Services
 
Collective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber AttacksCollective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber Attacks
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Securing the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustSecuring the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for Trust
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise
 

Similar to State of Cyber Resilience In Australia 2018

Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilience
accenture
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber Resilience
Accenture Security
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
accenture
 
The Science of Security
The Science of SecurityThe Science of Security
The Science of Security
accenture
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 
Cybersecurity report-vol-8
Cybersecurity report-vol-8Cybersecurity report-vol-8
Cybersecurity report-vol-8
Mohamed Abdelhakim
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
Rahul Neel Mani
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.
accenture
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Étude mondiale d'EY sur la cybersécurité (2018)
Étude mondiale d'EY sur la cybersécurité (2018)Étude mondiale d'EY sur la cybersécurité (2018)
Étude mondiale d'EY sur la cybersécurité (2018)
Paperjam_redaction
 
Proactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital DisruptionProactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital Disruption
Mike Wons
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises?
Pierre Audoin Consultants
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
Security in the driver's seat: Achieving cyber resilience in automotive
Security in the driver's seat: Achieving cyber resilience in automotiveSecurity in the driver's seat: Achieving cyber resilience in automotive
Security in the driver's seat: Achieving cyber resilience in automotive
accenture
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber Resilience
Christian F. Nissen
 
People First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital InsurancePeople First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital Insurance
Accenture México
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
Strategic Treasurer
 
WatchGuard Corporate Presentation.pptx
WatchGuard  Corporate Presentation.pptxWatchGuard  Corporate Presentation.pptx
WatchGuard Corporate Presentation.pptx
RachatrinTongrungroj1
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
Accenture Insurance
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
International Federation of Accountants
 

Similar to State of Cyber Resilience In Australia 2018 (20)

Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilience
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber Resilience
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
The Science of Security
The Science of SecurityThe Science of Security
The Science of Security
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Cybersecurity report-vol-8
Cybersecurity report-vol-8Cybersecurity report-vol-8
Cybersecurity report-vol-8
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Étude mondiale d'EY sur la cybersécurité (2018)
Étude mondiale d'EY sur la cybersécurité (2018)Étude mondiale d'EY sur la cybersécurité (2018)
Étude mondiale d'EY sur la cybersécurité (2018)
 
Proactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital DisruptionProactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital Disruption
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises?
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
Security in the driver's seat: Achieving cyber resilience in automotive
Security in the driver's seat: Achieving cyber resilience in automotiveSecurity in the driver's seat: Achieving cyber resilience in automotive
Security in the driver's seat: Achieving cyber resilience in automotive
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber Resilience
 
People First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital InsurancePeople First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital Insurance
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
 
WatchGuard Corporate Presentation.pptx
WatchGuard  Corporate Presentation.pptxWatchGuard  Corporate Presentation.pptx
WatchGuard Corporate Presentation.pptx
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 

More from Accenture Australia

AI: The future of AU
AI: The future of AUAI: The future of AU
AI: The future of AU
Accenture Australia
 
Network Transformation Roadmap
Network Transformation RoadmapNetwork Transformation Roadmap
Network Transformation Roadmap
Accenture Australia
 
Getting Robots Right
Getting Robots RightGetting Robots Right
Getting Robots Right
Accenture Australia
 
The digital government: shaped around its citizens
The digital government: shaped around its citizensThe digital government: shaped around its citizens
The digital government: shaped around its citizens
Accenture Australia
 
Digital HR technology comes of age. The digitisation of human resources
Digital HR technology comes of age. The digitisation of human resourcesDigital HR technology comes of age. The digitisation of human resources
Digital HR technology comes of age. The digitisation of human resources
Accenture Australia
 
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leader
Accenture Australia
 

More from Accenture Australia (6)

AI: The future of AU
AI: The future of AUAI: The future of AU
AI: The future of AU
 
Network Transformation Roadmap
Network Transformation RoadmapNetwork Transformation Roadmap
Network Transformation Roadmap
 
Getting Robots Right
Getting Robots RightGetting Robots Right
Getting Robots Right
 
The digital government: shaped around its citizens
The digital government: shaped around its citizensThe digital government: shaped around its citizens
The digital government: shaped around its citizens
 
Digital HR technology comes of age. The digitisation of human resources
Digital HR technology comes of age. The digitisation of human resourcesDigital HR technology comes of age. The digitisation of human resources
Digital HR technology comes of age. The digitisation of human resources
 
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leader
 

Recently uploaded

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 

Recently uploaded (20)

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 

State of Cyber Resilience In Australia 2018

  • 1. GAINING GROUND ON THE CYBER ATTACKER 2018 State of Cyber Resilience Australia
  • 2. Copyright © 2018 Accenture. All rights reserved. 2 SECURITY TEAMS HAVE MADE PROGRESS DEFENDING AGAINST CYBER ATTACKS. But more needs to be done.
  • 3. As the number of attacks more than doubles, monitoring, detection and prevention improves cyber resilience and helps organizations perform better under pressure. IMPROVING CYBER RESILIENCE IN AUSTRALIA Organizations reduced the rate of successful attacks from 30% to 13%. In the past 12 months, how many attempted / successful breaches have you identified and how many were successful? Average. 29 144 1 2018 Security breaches Targeted attacks 106 232 32 30 2017 2018 Targeted attacks Security breaches Copyright © 2018 Accenture Security. All rights reserved. 3 Australia
  • 4. GAIN GROUND ON THE CYBER ATTACKER Copyright © 2018 Accenture. All rights reserved. 4 FIVE WAYS TO BECOME CYBER RESILIENT. Australia
  • 5. Despite progress, the basics still need attention Copyright © 2018 Accenture. All rights reserved. 5 1 say the organization is not protected by their cybersecurity program. 38% Be brilliant at the basics. Protect valuable assets, from the inside out, across the value chain. • Harden your high-value assets • Protect legacy applications • Practice your response
  • 6. More damaging security breaches accelerate the need for cyber resilience Copyright © 2018 Accenture. All rights reserved. 6 2 65% say it is not possible to appear “strong, prepared and competent” if security is breached Test your resilience, like an attacker. Enhance conventional red attack and blue defense team testing. • Coached incident simulation • Threat intelligence • Experienced player-coaches
  • 7. More need to invest in critical technologies against new threats Copyright © 2018 Accenture. All rights reserved. 3 say new technologies are essential to securing the future of the organization. 79% 7 Employ advanced technologies to automate defenses. Prepare for attackers who use advanced technology. • Automated orchestration capabilities enable teams to respond in near real-time • Advanced identity access management controls user access to data
  • 8. Confidence remains high but a proactive approach is needed Copyright © 2018 Accenture. All rights reserved. 4 say cyber attacks are still a “bit of a black box; we do not know how or when they will affect our organization.” 67% 8 Use intelligence and data to be proactive with threat hunting. Find the attackers before they find you. • Adopt a continuous response model • Develop strategic and tactical threat intelligence • Monitor for anomalous and suspicious activity
  • 9. Higher CEO and board engagement place new demands on the CISO Copyright © 2018 Accenture. All rights reserved. 5 Who does the CISO report directly to? 9 The CISO needs to adapt. Evolve the role of the CISO to be more integrated with the business. • Business adept and tech-savvy • At home in the C-suite and the security center • Able to infuse a ‘security first’ culture everywhere 22% 25% 36% 1 2 3 Board CEO CIO
  • 10. Copyright © 2018 Accenture. All rights reserved. 10 SECURITY FROM THE INSIDE OUT Security teams perform better, despite more attacks. Leaders should embrace the good news Investments are proving to be wise. Organizations show they can perform better under greater pressure. But transformation does not end here Improvements must continue. Organizations could achieve cyber resilience within two to three years.
  • 11. Copyright © 2018 Accenture. All rights reserved. 11 ABOUT THE RESEARCH In 2017, Accenture Security surveyed 2,000 executives to understand the extent to which organizations prioritize security, how comprehensive their security plans are, what security capabilities they have, and their level of spend on security. Just over a year later, Accenture Security undertook a similar survey, this time interviewing 4,600 executives—representing organizations with annual revenues of $1bn or more—from 19 industries and 15 countries across North and South America, Europe and Asia Pacific. More than 98 percent of respondents were sole or key decision-makers in cybersecurity strategy and spending for their organization. LEARN MORE accenture.com/stateofcyber 2018 State of Cyber Resilience
  • 12. Copyright © 2018 Accenture. All rights reserved. 12 About Accenture Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions—underpinned by the world’s largest delivery network— Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With approximately 442,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com About Accenture Security Accenture Security helps organizations build resilience from the inside out, so they can confidently focus on innovation and growth. Leveraging its global network of cybersecurity labs, deep industry understanding across client value chains and services that span the security lifecycle, Accenture protects organization’s valuable assets, end-to-end. With services that include strategy and risk management, cyber defense, digital identity, application security and managed security, Accenture enables businesses around the world to defend against known sophisticated threats, and the unknown. Follow us @AccentureSecure on Twitter or visit the Accenture Security blog.

Editor's Notes

  1. q8a – Attempted Breaches Average q8b - Successful Breaches Average
  2. q2 - Which of the following is your cybersecurity program actively protecting? Corporate IT Cloud Service Providers Customer or Partner Environments Operational technologies Produckts and services Field operations 3rd parties
  3. g7 - Please indicate your agreement with each of the following statements: Agree/Strongly agree It is not possible to appear strong prepared or competent if my organization is the victim of a major security breach.
  4. Please indicate your agreement with each of the following statements: Agree/Strongly agree New technologies such as artificial intelligence, machine/deep learning, user behavior analytics, blockchain, etc. are essential to securing the future of the organization.
  5. Please indicate your agreement with each of the following statements: Agree/Strongly agree Cyberattacks are still a bit of black box; we do not quite know how or when they will affect our organization
  6. gs7 -- To whom do you report to? Board of Directors CEO Chief Information Officer Chief Finance Officer Chief Risk Officer Chief Technology Officer Chief Operating Officer Chief Network Officer Chief Data Officer Chief Digital Officer Chief Administrator Officer Audit committee Corporate Counsel