SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
TAKE A SECURITY LEAP FORWARD
How do corporations achieve better
security performance in an 
ever-changing threat environment?
Leapfrog organizations* align their security
approach with business objectives to improve
security effectiveness across strategy, technology
and governance.
STRATEGY
START YOUR SECURITY LEAP FORWARD
Pinpoints anomalies
in network traffic
Establish security
protocols over big data
Secure (encrypt) data stored
in cloud environments
6.00 7.18 4.94 6.33 7.45 8.55
(Rankings on a 10 point scale, 1 = low; 10 = high)= Leapfrog
26%
Enterprise risk
management
procedures
35%
Regular reporting
to the board
of directors
Benchmark
security
operations
Metrics to
evaluate security
operations
20% 34%
Leapfrog companies
have dedicated
budget for security
Increased security
budget over the
past two years
CISO defines
security strategy
and initiatives
CISO directly
reports to a
senior executive
CISO is accountable
for budgets or
discretionary spending
81% 57% 71% 71% 65%
Limit insecure devices from
accessing security systems
Controls insecure mobile
devices including BYOD
Provide advance warning
about threats and attackers
7.56 8.27 7.76 7.16 7.18 6.03
By implementing best practices across security strategy, technology and governance, Leapfrog
organizations improved their security effectiveness an average of 53%.
Steps you can take to help make security a competitive advantage:
Leapfrog companies recognize the importance of establishing and following strong governance practices and
controls for their security organization, and are well ahead of Static companies on the following key
governance attributes:
Leapfrog companies use enabling technologies for security more often than Static companies. Taking a proactive
stance helps protect their data onsite, in the cloud and across big data platforms. They put more emphasis on
pinpointing network traffic anomalies, and in providing advance warning on threats and attackers.
Security Strategy in Leapfrog Organizations
Leapfrog companies move
forward with a solid security
strategy, treat security as a
priority and align security with
the organization’s goals.
Innovation is a core component in aligning security strategies with business objectives. Leapfrog organizations
recognize the need to focus on innovation to strengthen their security position and keep pace with evolving needs
to deliver at scale, anywhere.
The role of the Chief Information Security Officer (CISO) in
Leapfrog companies reflects the focus and importance those
companies place on security.
Leapfrog companies provide dedicated
budget and increase budgets for
security improvements.
Higher value placed on
security innovation by
Leapfrog companies
33%
Higher level of security
innovation change in the past
two years in Leapfrog companies
45%
More security
innovation within
Leapfrog companies
20%
LEAPFROG 70%
STATIC 55%
Security strategy exists
69%
45%
LEAPFROG
STATIC
Security is priority
Leapfrog organizations focus more on securing their network, sensitive data and the cloud, while the Static
organizations tend to focus on locking things down, which can prevent business growth.
Embrace
innovative solutions
Streamline your IT
security infrastructure
Create greater visibility
into business processes
Eliminate
security silos
Evolve the C-suite into
security champions
Certain characteristics of the Leapfrog organizations complement each other, and may help those looking to
emulate their successes.
*All source data from Ponemon Institute research, “The Cyber Security Leap: From Laggard to Leader,” 2015,
N = 110 Leapfrog organizations and 137 Static organizations
55%
Leapfrog organizations have a
sanctioned cyber security
strategy AND outsource core
security operations
50%
Leapfrog organizations make
information security a priority
AND align security and
business objectives
59%
Leapfrog CISOs have
dedicated budget
AND accountability
for spending
TECHNOLOGY
63%
40%
LEAPFROG
STATIC
Security and business objectives aligned
GOVERNANCE
= Static
© 2015 Accenture
All rights reserved.

Weitere ähnliche Inhalte

Mehr von Accenture Technology

Helping you get back to the workplace confidently
Helping you get back to the workplace confidentlyHelping you get back to the workplace confidently
Helping you get back to the workplace confidentlyAccenture Technology
 
Driving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldDriving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldAccenture Technology
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology
 
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology
 
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology
 
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology
 
Elevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayElevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayAccenture Technology
 
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAutomating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAccenture Technology
 
Technology Vision 2019 for Workday
Technology Vision 2019 for WorkdayTechnology Vision 2019 for Workday
Technology Vision 2019 for WorkdayAccenture Technology
 
Accenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology
 
Oracle Technology Vision Accenture Technology Vision for Oracle 2019
Oracle Technology Vision Accenture Technology Vision for Oracle 2019Oracle Technology Vision Accenture Technology Vision for Oracle 2019
Oracle Technology Vision Accenture Technology Vision for Oracle 2019Accenture Technology
 
Delivering applications at the pace of business
Delivering applications at the pace of businessDelivering applications at the pace of business
Delivering applications at the pace of businessAccenture Technology
 
Cloud 4 Marketing - Accenture Google Cloud Business Group
Cloud 4 Marketing - Accenture Google Cloud Business GroupCloud 4 Marketing - Accenture Google Cloud Business Group
Cloud 4 Marketing - Accenture Google Cloud Business GroupAccenture Technology
 
Next Gen App Development - Accenture Google Cloud Business Group
Next Gen App Development - Accenture Google Cloud Business Group Next Gen App Development - Accenture Google Cloud Business Group
Next Gen App Development - Accenture Google Cloud Business Group Accenture Technology
 
Intelligent Agent - Accenture Google Cloud Business Group
Intelligent Agent - Accenture Google Cloud Business GroupIntelligent Agent - Accenture Google Cloud Business Group
Intelligent Agent - Accenture Google Cloud Business GroupAccenture Technology
 
SAP on GCP - Accenture Google Cloud Business Group
SAP on GCP - Accenture Google Cloud Business GroupSAP on GCP - Accenture Google Cloud Business Group
SAP on GCP - Accenture Google Cloud Business GroupAccenture Technology
 

Mehr von Accenture Technology (20)

Highlights on the five key trends
Highlights on the five key trendsHighlights on the five key trends
Highlights on the five key trends
 
Helping you get back to the workplace confidently
Helping you get back to the workplace confidentlyHelping you get back to the workplace confidently
Helping you get back to the workplace confidently
 
Driving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldDriving Workday transformation in a virtual world
Driving Workday transformation in a virtual world
 
Accenture + Red Hat
Accenture + Red HatAccenture + Red Hat
Accenture + Red Hat
 
Accenture and Mercedes Case Study
Accenture and Mercedes Case StudyAccenture and Mercedes Case Study
Accenture and Mercedes Case Study
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: Infographic
 
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: Overview
 
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and Me
 
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNA
 
Elevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayElevating the Workforce Experience with Workday
Elevating the Workforce Experience with Workday
 
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAutomating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
 
Technology Vision for SAP 2019
Technology Vision for SAP 2019Technology Vision for SAP 2019
Technology Vision for SAP 2019
 
Technology Vision 2019 for Workday
Technology Vision 2019 for WorkdayTechnology Vision 2019 for Workday
Technology Vision 2019 for Workday
 
Accenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for Pega
 
Oracle Technology Vision Accenture Technology Vision for Oracle 2019
Oracle Technology Vision Accenture Technology Vision for Oracle 2019Oracle Technology Vision Accenture Technology Vision for Oracle 2019
Oracle Technology Vision Accenture Technology Vision for Oracle 2019
 
Delivering applications at the pace of business
Delivering applications at the pace of businessDelivering applications at the pace of business
Delivering applications at the pace of business
 
Cloud 4 Marketing - Accenture Google Cloud Business Group
Cloud 4 Marketing - Accenture Google Cloud Business GroupCloud 4 Marketing - Accenture Google Cloud Business Group
Cloud 4 Marketing - Accenture Google Cloud Business Group
 
Next Gen App Development - Accenture Google Cloud Business Group
Next Gen App Development - Accenture Google Cloud Business Group Next Gen App Development - Accenture Google Cloud Business Group
Next Gen App Development - Accenture Google Cloud Business Group
 
Intelligent Agent - Accenture Google Cloud Business Group
Intelligent Agent - Accenture Google Cloud Business GroupIntelligent Agent - Accenture Google Cloud Business Group
Intelligent Agent - Accenture Google Cloud Business Group
 
SAP on GCP - Accenture Google Cloud Business Group
SAP on GCP - Accenture Google Cloud Business GroupSAP on GCP - Accenture Google Cloud Business Group
SAP on GCP - Accenture Google Cloud Business Group
 

Kürzlich hochgeladen

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Kürzlich hochgeladen (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Cyber Security: Take a Security Leap Forward

  • 1. TAKE A SECURITY LEAP FORWARD How do corporations achieve better security performance in an  ever-changing threat environment? Leapfrog organizations* align their security approach with business objectives to improve security effectiveness across strategy, technology and governance. STRATEGY START YOUR SECURITY LEAP FORWARD Pinpoints anomalies in network traffic Establish security protocols over big data Secure (encrypt) data stored in cloud environments 6.00 7.18 4.94 6.33 7.45 8.55 (Rankings on a 10 point scale, 1 = low; 10 = high)= Leapfrog 26% Enterprise risk management procedures 35% Regular reporting to the board of directors Benchmark security operations Metrics to evaluate security operations 20% 34% Leapfrog companies have dedicated budget for security Increased security budget over the past two years CISO defines security strategy and initiatives CISO directly reports to a senior executive CISO is accountable for budgets or discretionary spending 81% 57% 71% 71% 65% Limit insecure devices from accessing security systems Controls insecure mobile devices including BYOD Provide advance warning about threats and attackers 7.56 8.27 7.76 7.16 7.18 6.03 By implementing best practices across security strategy, technology and governance, Leapfrog organizations improved their security effectiveness an average of 53%. Steps you can take to help make security a competitive advantage: Leapfrog companies recognize the importance of establishing and following strong governance practices and controls for their security organization, and are well ahead of Static companies on the following key governance attributes: Leapfrog companies use enabling technologies for security more often than Static companies. Taking a proactive stance helps protect their data onsite, in the cloud and across big data platforms. They put more emphasis on pinpointing network traffic anomalies, and in providing advance warning on threats and attackers. Security Strategy in Leapfrog Organizations Leapfrog companies move forward with a solid security strategy, treat security as a priority and align security with the organization’s goals. Innovation is a core component in aligning security strategies with business objectives. Leapfrog organizations recognize the need to focus on innovation to strengthen their security position and keep pace with evolving needs to deliver at scale, anywhere. The role of the Chief Information Security Officer (CISO) in Leapfrog companies reflects the focus and importance those companies place on security. Leapfrog companies provide dedicated budget and increase budgets for security improvements. Higher value placed on security innovation by Leapfrog companies 33% Higher level of security innovation change in the past two years in Leapfrog companies 45% More security innovation within Leapfrog companies 20% LEAPFROG 70% STATIC 55% Security strategy exists 69% 45% LEAPFROG STATIC Security is priority Leapfrog organizations focus more on securing their network, sensitive data and the cloud, while the Static organizations tend to focus on locking things down, which can prevent business growth. Embrace innovative solutions Streamline your IT security infrastructure Create greater visibility into business processes Eliminate security silos Evolve the C-suite into security champions Certain characteristics of the Leapfrog organizations complement each other, and may help those looking to emulate their successes. *All source data from Ponemon Institute research, “The Cyber Security Leap: From Laggard to Leader,” 2015, N = 110 Leapfrog organizations and 137 Static organizations 55% Leapfrog organizations have a sanctioned cyber security strategy AND outsource core security operations 50% Leapfrog organizations make information security a priority AND align security and business objectives 59% Leapfrog CISOs have dedicated budget AND accountability for spending TECHNOLOGY 63% 40% LEAPFROG STATIC Security and business objectives aligned GOVERNANCE = Static © 2015 Accenture All rights reserved.