SlideShare a Scribd company logo
The Cyber Security Leap:
From Laggard to Leader
How Australian organisations can learn from the Leapfrogs
2Copyright © 2015 Accenture All rights reserved. 2Copyright © 2015 Accenture All rights reserved.
How do some organisation achieve better
security performance?
We compared organisation that were able to “leapfrog” their
security effectiveness against others that remained static.
Defining a Leapfrog organisation
Key findings
Implications
About the research
3Copyright © 2015 Accenture All rights reserved. 3Copyright © 2015 Accenture All rights reserved.
Leapfrog organisation improved their security
effectiveness an average of 53% over two years
Success characteristics can be summarised across three areas
Research and analysis conducted by Accenture in Collaboration with the Ponemon Institute, LLC.
All data in this presentation taken from “The Cyber Security Leap: From Laggard to Leader, 2015
• Security is a business
priority aligned with the
enterprise’s goals
• Focus on innovation
• Outsourcing is a
component of the
security program
• Respond proactively to
major changes to the
threat landscape
• Open communications with
CEOs and corporate boards
• Establish dedicated
security budgets that have
steadily increased
• Chief Information Security
Officer (CISO) has authority
to define and manage the
security strategy
• Deploy enterprise risk
management
procedures
• Embrace new and
disruptive security
technologies as part
of the strategy
Strategy Technology Governance
4Copyright © 2015 Accenture All rights reserved. 4Copyright © 2015 Accenture All rights reserved.
Leapfrog organisation improved their security
effectiveness an average of 53% over two years
Success characteristics can be summarised across three areas
• Security is a business
priority aligned with the
enterprise’s goals
• Focus on innovation
• Outsourcing is a
component of the
security program
• Respond proactively to
major changes to the
threat landscape
• Open communications with
CEOs and corporate boards
• Establish dedicated
security budgets that have
steadily increased
• Chief Information Security
Officer (CISO) has authority
to define and manage the
security strategy
Strategy Governance
• Deploy enterprise risk
management
procedures
• Embrace new and
disruptive security
technologies as part
of the strategy
Technology
Research and analysis conducted by Accenture in Collaboration with the Ponemon Institute, LLC.
All data in this presentation taken from “The Cyber Security Leap: From Laggard to Leader, 2015
5Copyright © 2015 Accenture All rights reserved. 5Copyright © 2015 Accenture All rights reserved.
Leapfrog organisation improved their security
effectiveness an average of 53% over two years
Success characteristics can be summarised across three areas
• Security is a business
priority aligned with the
enterprise’s goals
• Focus on innovation
• Outsourcing is a
component of the
security program
• Respond proactively to
major changes to the
threat landscape
• Open communications with
CEOs and corporate boards
• Establish dedicated
security budgets that have
steadily increased
• Chief Information Security
Officer (CISO) has authority
to define and manage the
security strategy
• Deploy enterprise risk
management
procedures
• Embrace new and
disruptive security
technologies as part
of the strategy
Strategy Technology Governance
Research and analysis conducted by Accenture in Collaboration with the Ponemon Institute, LLC.
All data in this presentation taken from “The Cyber Security Leap: From Laggard to Leader, 2015
6Copyright © 2015 Accenture All rights reserved. 6Copyright © 2015 Accenture All rights reserved.
Organisations with static security effectiveness
demonstrated different characteristics
• Operate security under a veil of stealth, secrecy and
underfunding
• Prioritise external threats
• Focus on prevention rather than quick detection or containment
• Drive security investments by compliance with regulations and
policies
• View security as diminishing employee productivity
• Believe security budgets are inadequate for meeting the
company’s security mission
7Copyright © 2015 Accenture All rights reserved. 7Copyright © 2015 Accenture All rights reserved.
Leapfrog organisations value innovation as
a way to strengthen their security posture
Higher value placed on
security innovation
33%
Higher level of security
innovation change in
the past two years
45%
More security
innovation
20%
8Copyright © 2015 Accenture All rights reserved. 8Copyright © 2015 Accenture All rights reserved.
Establishing a security strategy as a
business priority separates Leapfrog from
Static organisations
Security and business objectives aligned
70%
55%
69%
45%
63%
40%
Security is priority
Security strategy exists
LEAPFROG
STATIC
LEAPFROG
STATIC
LEAPFROG
STATIC
9Copyright © 2015 Accenture All rights reserved. 9Copyright © 2015 Accenture All rights reserved.
Security outsourcing is often a component of
Leapfrog organisations’ strategies
Outsourcing core security operations can greatly increase
security effectiveness by providing access to advanced
technology and expert resources.
Leapfrog Static
Has strategy & does
not outsource
security operations
23%
15%
55%
32%
Has strategy &
outsources security
operations
10Copyright © 2015 Accenture All rights reserved. 10Copyright © 2015 Accenture All rights reserved.
Leapfrog organisations proactively use
advanced technologies to secure their network
and cloud environments
LeapfrogStatic (Rankings on a 10 point scale, 1 = low; 10 = high)
Secure (encrypt)
data stored in
cloud environments
7.186.00
Establish security
protocols over
big data
6.334.94
Pinpoints
anomalies in
network traffic
8.557.45
Provide advance
warning about
threats and
attackers
8.277.56
11Copyright © 2015 Accenture All rights reserved. 11Copyright © 2015 Accenture All rights reserved.
Leapfrog organisations focus more on securing
network, sensitive data and the cloud; Static
organisations focus more on locking things down.
Control insecure
mobile devices
including BYOD
7.167.76
Limit insecure
devices from
accessing
security systems
6.037.18
LeapfrogStatic (Rankings on a 10 point scale, 1 = low; 10 = high)
12Copyright © 2015 Accenture All rights reserved. 12Copyright © 2015 Accenture All rights reserved.
Establishing strong governance and controls
supports Leapfrog security effectiveness
Important governance components include dedicated budget,
use of benchmarks and metrics and regular communications
with board of directors.
Metrics to
evaluate
security
operations
20%
26%
Enterprise risk
management
procedures
35%
Regular
reporting to the
board of
directors
34%
Benchmark
Security
operations
13Copyright © 2015 Accenture All rights reserved. 13Copyright © 2015 Accenture All rights reserved.
The CISO role in Leapfrog organisations reflects
the importance placed on security
While both types of organisations have a CISO,
the level of responsibility is notably different.
CISO defines
security strategy
and initiatives
Leapfrog 71%
Static 60%
CISO directly
reports to a
senior executive
71%
58%
CISO is accountable
for budgets or
discretionary spending
65%
55%
14Copyright © 2015 Accenture All rights reserved. 14Copyright © 2015 Accenture All rights reserved.
Security effectiveness can be notably improved
over a short period of time, by applying lessons
learned from three priority areas
Strategy Technology Governance
15Copyright © 2015 Accenture All rights reserved. 15Copyright © 2015 Accenture All rights reserved.
Suggestions for developing or improving
your security strategy
• Establish a security strategy that encourages innovation, has
dedicated budget and programs, a strong eco-system and a clear
vision for how innovation gets on-boarded into production.
• Develop the ability to adapt quickly
and proactively to the changing threat landscape
• Help the organisation embrace digital disruption
• Align security and organisational priorities
• Treat security as a business priority
16Copyright © 2015 Accenture All rights reserved. 16Copyright © 2015 Accenture All rights reserved.
Suggested areas for technology focus
• Seek out technology and capabilities
that enhance the user experience
and productivity
• Balance prevention, detection and
response better—lessen the focus
on prevention
• Better exploit data within the
organisation to gain an advantage in
detection and response times—move
toward security intelligence
17Copyright © 2015 Accenture All rights reserved. 17Copyright © 2015 Accenture All rights reserved.
Governance measures to improve performance
• Foster a working relationship between
CISO and the board to take effective
action; educate and collaborate to
articulate and prioritise business risk
• Use benchmarks and metrics to
continually assess the strategy and
evolve the organisation’s posture
• Outsource security operations as
appropriate for best use of available
expert resources
• Eliminate fire-fighting and use
resources effectively
18Copyright © 2015 Accenture All rights reserved. 18Copyright © 2015 Accenture All rights reserved.
Organisations studied represent various
industries and sizes across Australia, NA, Europe,
Middle East and Asia Pacific
16%
14%
14%
10%
8%
9%
6%
6%
5%
5%
4%
4% 9%
11%
28%
24%
18%
11%
Less than
1,000
1,000 to
5,000
5,001 to
10,000
10,001 to
25,000
25,000 to
75,000
More than
75,000Financial
services
Industries represented Organisation size
Public
sector
Services
Retail
Energy and
utilities
Industrial
Health &
pharmaceutical
Consumer
Technology
and software
Transportation
Other
Hospitality
Education and research, 1%
Communications, 1%
19Copyright © 2015 Accenture All rights reserved. 19Copyright © 2015 Accenture All rights reserved.
For more information:
- Visit accenture.com.au/security
- Contact Accenture APAC Security Lead, Jean-Marie Abi-Ghanem:
j.abi-ghanem@accenture.com
19Copyright © 2015 Accenture All rights reserved.

More Related Content

What's hot

Smarter Investments, Outstanding Results: Resources Industries Digital Transf...
Smarter Investments, Outstanding Results: Resources Industries Digital Transf...Smarter Investments, Outstanding Results: Resources Industries Digital Transf...
Smarter Investments, Outstanding Results: Resources Industries Digital Transf...
accenture
 
Cyber Security: Take a Security Leap Forward
Cyber Security: Take a Security Leap ForwardCyber Security: Take a Security Leap Forward
Cyber Security: Take a Security Leap Forward
accenture
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Accenture Technology
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
Accenture Operations
 
Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationHarnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open Innovation
Accenture Operations
 
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for Insurance
Accenture Insurance
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
Accenture Technology
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
Accenture Operations
 
Being digital: Fast-forward to the right digital strategy
Being digital: Fast-forward to the right digital strategyBeing digital: Fast-forward to the right digital strategy
Being digital: Fast-forward to the right digital strategy
accenture
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Accenture Technology
 
People-Centric Growth: The Primacy of People in the Digital Age
People-Centric Growth: The Primacy of People in the Digital AgePeople-Centric Growth: The Primacy of People in the Digital Age
People-Centric Growth: The Primacy of People in the Digital Age
accenture
 
Assault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities GridAssault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities Grid
accenture
 
Stand Out or Stand Back
Stand Out or Stand BackStand Out or Stand Back
Stand Out or Stand Back
accenture
 
Intelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital BusinessIntelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital Business
accenture
 
Increasing Agility to Fuel Growth in the Communications Industry
Increasing Agility to Fuel Growth in the Communications IndustryIncreasing Agility to Fuel Growth in the Communications Industry
Increasing Agility to Fuel Growth in the Communications Industry
accenture
 
Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3
accenture
 
Digital Shoring for Networked Innovation
Digital Shoring for Networked InnovationDigital Shoring for Networked Innovation
Digital Shoring for Networked Innovation
accenture
 
A new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growthA new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growth
accenture
 
Intelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons LearnedIntelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons Learned
Accenture Technology
 
#ListenLearnLead - 2015 International Women's Day Research
#ListenLearnLead - 2015 International Women's Day Research#ListenLearnLead - 2015 International Women's Day Research
#ListenLearnLead - 2015 International Women's Day Research
accenture
 

What's hot (20)

Smarter Investments, Outstanding Results: Resources Industries Digital Transf...
Smarter Investments, Outstanding Results: Resources Industries Digital Transf...Smarter Investments, Outstanding Results: Resources Industries Digital Transf...
Smarter Investments, Outstanding Results: Resources Industries Digital Transf...
 
Cyber Security: Take a Security Leap Forward
Cyber Security: Take a Security Leap ForwardCyber Security: Take a Security Leap Forward
Cyber Security: Take a Security Leap Forward
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationHarnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open Innovation
 
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for Insurance
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
Being digital: Fast-forward to the right digital strategy
Being digital: Fast-forward to the right digital strategyBeing digital: Fast-forward to the right digital strategy
Being digital: Fast-forward to the right digital strategy
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
People-Centric Growth: The Primacy of People in the Digital Age
People-Centric Growth: The Primacy of People in the Digital AgePeople-Centric Growth: The Primacy of People in the Digital Age
People-Centric Growth: The Primacy of People in the Digital Age
 
Assault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities GridAssault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities Grid
 
Stand Out or Stand Back
Stand Out or Stand BackStand Out or Stand Back
Stand Out or Stand Back
 
Intelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital BusinessIntelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital Business
 
Increasing Agility to Fuel Growth in the Communications Industry
Increasing Agility to Fuel Growth in the Communications IndustryIncreasing Agility to Fuel Growth in the Communications Industry
Increasing Agility to Fuel Growth in the Communications Industry
 
Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3
 
Digital Shoring for Networked Innovation
Digital Shoring for Networked InnovationDigital Shoring for Networked Innovation
Digital Shoring for Networked Innovation
 
A new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growthA new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growth
 
Intelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons LearnedIntelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons Learned
 
#ListenLearnLead - 2015 International Women's Day Research
#ListenLearnLead - 2015 International Women's Day Research#ListenLearnLead - 2015 International Women's Day Research
#ListenLearnLead - 2015 International Women's Day Research
 

Similar to The cyber security leap: From laggard to leader

Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Accenture Technology
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Accenture Operations
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises?
Pierre Audoin Consultants
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to Leader
Accenture Insurance
 
Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2
Security Executive Council
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
William McBorrough
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
accenture
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
accenture
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
William McBorrough
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
Donald Tabone
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber Resilience
Accenture Security
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
George Goodall
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
simplyme12345
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
Fahmi Albaheth
 
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
VMware Tanzu
 
7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan
Envision Technology Advisors
 
Healthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber ResilienceHealthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber Resilience
accenture
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
Prime Infoserv
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
Naushad Rajani. - CISA, CISSP, CCSP, PMP, DCPP (Privacy)
 
Quantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate LeadershipQuantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate Leadership
Netskope
 

Similar to The cyber security leap: From laggard to leader (20)

Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises?
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to Leader
 
Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber Resilience
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
 
7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan
 
Healthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber ResilienceHealthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber Resilience
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
 
Quantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate LeadershipQuantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate Leadership
 

More from Accenture Australia

State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
Accenture Australia
 
AI: The future of AU
AI: The future of AUAI: The future of AU
AI: The future of AU
Accenture Australia
 
Network Transformation Roadmap
Network Transformation RoadmapNetwork Transformation Roadmap
Network Transformation Roadmap
Accenture Australia
 
Getting Robots Right
Getting Robots RightGetting Robots Right
Getting Robots Right
Accenture Australia
 
The digital government: shaped around its citizens
The digital government: shaped around its citizensThe digital government: shaped around its citizens
The digital government: shaped around its citizens
Accenture Australia
 
Digital HR technology comes of age. The digitisation of human resources
Digital HR technology comes of age. The digitisation of human resourcesDigital HR technology comes of age. The digitisation of human resources
Digital HR technology comes of age. The digitisation of human resources
Accenture Australia
 

More from Accenture Australia (6)

State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
 
AI: The future of AU
AI: The future of AUAI: The future of AU
AI: The future of AU
 
Network Transformation Roadmap
Network Transformation RoadmapNetwork Transformation Roadmap
Network Transformation Roadmap
 
Getting Robots Right
Getting Robots RightGetting Robots Right
Getting Robots Right
 
The digital government: shaped around its citizens
The digital government: shaped around its citizensThe digital government: shaped around its citizens
The digital government: shaped around its citizens
 
Digital HR technology comes of age. The digitisation of human resources
Digital HR technology comes of age. The digitisation of human resourcesDigital HR technology comes of age. The digitisation of human resources
Digital HR technology comes of age. The digitisation of human resources
 

Recently uploaded

Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
zechu97
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Avirahi City Dholera
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 

Recently uploaded (20)

Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 

The cyber security leap: From laggard to leader

  • 1. The Cyber Security Leap: From Laggard to Leader How Australian organisations can learn from the Leapfrogs
  • 2. 2Copyright © 2015 Accenture All rights reserved. 2Copyright © 2015 Accenture All rights reserved. How do some organisation achieve better security performance? We compared organisation that were able to “leapfrog” their security effectiveness against others that remained static. Defining a Leapfrog organisation Key findings Implications About the research
  • 3. 3Copyright © 2015 Accenture All rights reserved. 3Copyright © 2015 Accenture All rights reserved. Leapfrog organisation improved their security effectiveness an average of 53% over two years Success characteristics can be summarised across three areas Research and analysis conducted by Accenture in Collaboration with the Ponemon Institute, LLC. All data in this presentation taken from “The Cyber Security Leap: From Laggard to Leader, 2015 • Security is a business priority aligned with the enterprise’s goals • Focus on innovation • Outsourcing is a component of the security program • Respond proactively to major changes to the threat landscape • Open communications with CEOs and corporate boards • Establish dedicated security budgets that have steadily increased • Chief Information Security Officer (CISO) has authority to define and manage the security strategy • Deploy enterprise risk management procedures • Embrace new and disruptive security technologies as part of the strategy Strategy Technology Governance
  • 4. 4Copyright © 2015 Accenture All rights reserved. 4Copyright © 2015 Accenture All rights reserved. Leapfrog organisation improved their security effectiveness an average of 53% over two years Success characteristics can be summarised across three areas • Security is a business priority aligned with the enterprise’s goals • Focus on innovation • Outsourcing is a component of the security program • Respond proactively to major changes to the threat landscape • Open communications with CEOs and corporate boards • Establish dedicated security budgets that have steadily increased • Chief Information Security Officer (CISO) has authority to define and manage the security strategy Strategy Governance • Deploy enterprise risk management procedures • Embrace new and disruptive security technologies as part of the strategy Technology Research and analysis conducted by Accenture in Collaboration with the Ponemon Institute, LLC. All data in this presentation taken from “The Cyber Security Leap: From Laggard to Leader, 2015
  • 5. 5Copyright © 2015 Accenture All rights reserved. 5Copyright © 2015 Accenture All rights reserved. Leapfrog organisation improved their security effectiveness an average of 53% over two years Success characteristics can be summarised across three areas • Security is a business priority aligned with the enterprise’s goals • Focus on innovation • Outsourcing is a component of the security program • Respond proactively to major changes to the threat landscape • Open communications with CEOs and corporate boards • Establish dedicated security budgets that have steadily increased • Chief Information Security Officer (CISO) has authority to define and manage the security strategy • Deploy enterprise risk management procedures • Embrace new and disruptive security technologies as part of the strategy Strategy Technology Governance Research and analysis conducted by Accenture in Collaboration with the Ponemon Institute, LLC. All data in this presentation taken from “The Cyber Security Leap: From Laggard to Leader, 2015
  • 6. 6Copyright © 2015 Accenture All rights reserved. 6Copyright © 2015 Accenture All rights reserved. Organisations with static security effectiveness demonstrated different characteristics • Operate security under a veil of stealth, secrecy and underfunding • Prioritise external threats • Focus on prevention rather than quick detection or containment • Drive security investments by compliance with regulations and policies • View security as diminishing employee productivity • Believe security budgets are inadequate for meeting the company’s security mission
  • 7. 7Copyright © 2015 Accenture All rights reserved. 7Copyright © 2015 Accenture All rights reserved. Leapfrog organisations value innovation as a way to strengthen their security posture Higher value placed on security innovation 33% Higher level of security innovation change in the past two years 45% More security innovation 20%
  • 8. 8Copyright © 2015 Accenture All rights reserved. 8Copyright © 2015 Accenture All rights reserved. Establishing a security strategy as a business priority separates Leapfrog from Static organisations Security and business objectives aligned 70% 55% 69% 45% 63% 40% Security is priority Security strategy exists LEAPFROG STATIC LEAPFROG STATIC LEAPFROG STATIC
  • 9. 9Copyright © 2015 Accenture All rights reserved. 9Copyright © 2015 Accenture All rights reserved. Security outsourcing is often a component of Leapfrog organisations’ strategies Outsourcing core security operations can greatly increase security effectiveness by providing access to advanced technology and expert resources. Leapfrog Static Has strategy & does not outsource security operations 23% 15% 55% 32% Has strategy & outsources security operations
  • 10. 10Copyright © 2015 Accenture All rights reserved. 10Copyright © 2015 Accenture All rights reserved. Leapfrog organisations proactively use advanced technologies to secure their network and cloud environments LeapfrogStatic (Rankings on a 10 point scale, 1 = low; 10 = high) Secure (encrypt) data stored in cloud environments 7.186.00 Establish security protocols over big data 6.334.94 Pinpoints anomalies in network traffic 8.557.45 Provide advance warning about threats and attackers 8.277.56
  • 11. 11Copyright © 2015 Accenture All rights reserved. 11Copyright © 2015 Accenture All rights reserved. Leapfrog organisations focus more on securing network, sensitive data and the cloud; Static organisations focus more on locking things down. Control insecure mobile devices including BYOD 7.167.76 Limit insecure devices from accessing security systems 6.037.18 LeapfrogStatic (Rankings on a 10 point scale, 1 = low; 10 = high)
  • 12. 12Copyright © 2015 Accenture All rights reserved. 12Copyright © 2015 Accenture All rights reserved. Establishing strong governance and controls supports Leapfrog security effectiveness Important governance components include dedicated budget, use of benchmarks and metrics and regular communications with board of directors. Metrics to evaluate security operations 20% 26% Enterprise risk management procedures 35% Regular reporting to the board of directors 34% Benchmark Security operations
  • 13. 13Copyright © 2015 Accenture All rights reserved. 13Copyright © 2015 Accenture All rights reserved. The CISO role in Leapfrog organisations reflects the importance placed on security While both types of organisations have a CISO, the level of responsibility is notably different. CISO defines security strategy and initiatives Leapfrog 71% Static 60% CISO directly reports to a senior executive 71% 58% CISO is accountable for budgets or discretionary spending 65% 55%
  • 14. 14Copyright © 2015 Accenture All rights reserved. 14Copyright © 2015 Accenture All rights reserved. Security effectiveness can be notably improved over a short period of time, by applying lessons learned from three priority areas Strategy Technology Governance
  • 15. 15Copyright © 2015 Accenture All rights reserved. 15Copyright © 2015 Accenture All rights reserved. Suggestions for developing or improving your security strategy • Establish a security strategy that encourages innovation, has dedicated budget and programs, a strong eco-system and a clear vision for how innovation gets on-boarded into production. • Develop the ability to adapt quickly and proactively to the changing threat landscape • Help the organisation embrace digital disruption • Align security and organisational priorities • Treat security as a business priority
  • 16. 16Copyright © 2015 Accenture All rights reserved. 16Copyright © 2015 Accenture All rights reserved. Suggested areas for technology focus • Seek out technology and capabilities that enhance the user experience and productivity • Balance prevention, detection and response better—lessen the focus on prevention • Better exploit data within the organisation to gain an advantage in detection and response times—move toward security intelligence
  • 17. 17Copyright © 2015 Accenture All rights reserved. 17Copyright © 2015 Accenture All rights reserved. Governance measures to improve performance • Foster a working relationship between CISO and the board to take effective action; educate and collaborate to articulate and prioritise business risk • Use benchmarks and metrics to continually assess the strategy and evolve the organisation’s posture • Outsource security operations as appropriate for best use of available expert resources • Eliminate fire-fighting and use resources effectively
  • 18. 18Copyright © 2015 Accenture All rights reserved. 18Copyright © 2015 Accenture All rights reserved. Organisations studied represent various industries and sizes across Australia, NA, Europe, Middle East and Asia Pacific 16% 14% 14% 10% 8% 9% 6% 6% 5% 5% 4% 4% 9% 11% 28% 24% 18% 11% Less than 1,000 1,000 to 5,000 5,001 to 10,000 10,001 to 25,000 25,000 to 75,000 More than 75,000Financial services Industries represented Organisation size Public sector Services Retail Energy and utilities Industrial Health & pharmaceutical Consumer Technology and software Transportation Other Hospitality Education and research, 1% Communications, 1%
  • 19. 19Copyright © 2015 Accenture All rights reserved. 19Copyright © 2015 Accenture All rights reserved. For more information: - Visit accenture.com.au/security - Contact Accenture APAC Security Lead, Jean-Marie Abi-Ghanem: j.abi-ghanem@accenture.com 19Copyright © 2015 Accenture All rights reserved.

Editor's Notes

  1. Leapfrog companies place a 33% greater value on security innovation. Leapfroggers rate the importance of security innovation as 8.1, while static companies rate it as 6.1 on average. Furthermore, 36% of leapfroggers have a dedicated budget for security innovation, compared to only 21% of static companies. So leapfroggers are 71% more likely to value security innovation.
  2. Leapfroggers place a 20% higher value on the importance of using metrics: The importance of deploying metrics is rated at 7.8 by leapfroggers vs. 6.5 by static companies.