SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Intelligent Security: 
Defending the Digital 
Business 
Defending the 
Digital Business
Executive Summary 
Today 
Key Business Challenges 
•Missing link between business goals and security capabilities 
•Compliance providing a false sense of security 
•Enterprises are reaping the benefits of enhancing business functionality through cloud, mobile, 
and social, but struggle governing the extensions to the enterprise 
•Increasingly sophist security talent to address current security needs 
A new 
tomorrow 
Approach to Intelligent Security 
• Assess the security program’s capability and identify leap-ahead opportunities 
• Manage complexity and integrate the enterprise 
• Become agile 
• Accelerate toward security intelligence 
• Develop end-to-end delivery and flexible sourcing strategies 
How 
to get 
there 
Security Call to Action 
•The first step is assessing current posture and adopting a business-aligned security strategy 
•Retain staff experienced with security architecture planning and design, tools and integration to 
drive successful outcomes 
•Establishing an end-to-end delivery capability, underpinned by a pre-integrated security solution 
set allows organizations to modularly select for their specific threat areas and adoption pace 
•Move to extract more value from the data they already collect and analyze 
Copyright © 2014 Accenture All rights reserved. 2
Key business challenges 
Copyright © 2014 Accenture All rights reserved. 3
Business challenges to security for today’s enterprise 
Despite all the effort and resources that organizations invest in traditional 
information security approaches, many still fall prey to the latest cyber threats, 
or find they are unprepared to deal with rapidly blurring enterprise boundaries 
Five most common issues companies will have taking a proactive security stance 
Keeping 
pace with 
persistent 
threats 
Governing 
the extended 
enterprise 
despite blurring 
boundaries 
Thinking 
outside the 
compliance 
(check) box 
Missing the 
link between 
business and 
security 
Addressing 
the security 
supply/demand 
imbalance 
Copyright © 2014 Accenture All rights reserved. 4
Missing the link between 1 business and security 
Protecting the business should be the first and foremost goal of any security 
program, but most enterprises do not make it a core competency 
• Untethered programs can drift and become 
largely ineffective 
• Some security executives might struggle 
to draw a clear line between the protection 
provided and its impact on the company’s 
customer satisfaction, loyalty and revenue 
• The Security team may lack a logical road 
map for changing the organization’s view of 
the security function as simply an inhibitor 
or cost center 
Business Security 
Copyright © 2014 Accenture All rights reserved. 5
Thinking outside of the compliance (check) box 
2 
Unfortunately, compliance does not ensure security. Instead, enterprises 
should view compliance as the minimum acceptable cyber security “bar” 
they need to clear… 
Compliance 
•Audit centric 
•Controls based 
•Driven largely by regulatory 
requirements 
•Sample based 
•Scope limited by audit domain 
•Evaluated on a quarterly 
or annual basis 
Security 
•Business centric 
•Controls based 
•Driven by business 
requirements 
•Scope is holistic-includes 
enterprise, 3rd parties, 
suppliers, partners 
•Evaluated on near-real 
time basis 
Copyright © 2014 Accenture All rights reserved. 6
Governing the extended enterprise despite 
blurring boundaries 
3 
While business adoption has been widespread and rapid, many security 
organizations struggle to establish the appropriate frameworks, policies 
and controls to protect the expansions and contractions now common in 
extended IT environments 
Typical Day in the Extended Enterprise 
Cloud 
Real-time provisioning of servers to support 
testing of a cloud CRM system 
Mobile 
Granting mobile access to new capabilities 
for field representatives 
Social network 
Rollout of a business social network for 
sales, product and marketing collaboration 
• What are the appropriate 
frameworks and policies? 
• Should I allow personal devices? 
Which devices and do I let 
everyone do it? 
• How do I enable and monitor aaS 
components being introduced to 
my environment? 
• How will I reach my customers with 
the correct messages? 
• What do I need to do to make sure 
exposed by this new enterprise? 
Copyright © 2014 Accenture All rights reserved. 7
4 Keeping pace with persistent threats 
As the threats become more persistent, they become harder to identify 
Most organizations focus on: 
• Monitoring – Difficulty in prioritizing critical events and handling uncertainty 
• Static controls – Standard controls don’t help once the attacker is in 
For which cyber-threat are you prepared? 
Opportunistic Acts Mob Determined actors 
Attacker profile: 
•Will move on if thwarted 
•Will make mistakes 
•Can be creative 
Attacker profile: 
•Emotional and not disciplined 
•Not after the crown jewels 
•Not well backed 
Attacker profile: 
•Failure is not an option 
•Need only one vulnerability 
•Stick with it mentality 
Copyright © 2014 Accenture All rights reserved. 8
5 Addressing the security supply/demand imbalance 
Most organizations lack sufficient security talent 
to address their current needs 
Skill Shortages 
•Lack of the appropriate 
skills to execute required 
tasks 
•Hiring premiums for cyber 
security resources 
Career Development 
•Skilled resources are eager 
to keep skills sharp and 
maintain exposure to new 
technologies 
Firefighting 
•Misalignment of security 
programs to strategic 
business objectives cause 
practitioners to burn-out from 
constant troubleshooting 
Copyright © 2014 Accenture All rights reserved. 9
Net result 
Compliance driven 
(or audit scope driven) 
security scope can 
cause organizations 
to implicitly and 
unknowingly accept 
a significant amount 
of cyber-security risk 
Implicitly accepted risk Enterprise security risk 
Enterprise security risk 
Compliance risk Compliance risk 
Specific regulatory risk Specific regulatory risk 
Perceived Risk Actual Risk 
Copyright © 2014 Accenture All rights reserved. 10
Approach to Intelligent Security 
Copyright © 2014 Accenture All rights reserved. 11
Vision for Intelligent Security 
As organizations shift from a compliance-centered security mindset to an active 
cyber security stance, security teams need to adapt to keep pace with evolving 
business objectives 
• Driven by a comprehensive 
security strategy that is aligned to 
business goals and objectives 
• Core business assets protected by 
robust enterprise security controls 
• Layered on top are extended 
enterprise safeguards focused on 
enabling cloud, mobile and social 
network adoption 
• Advanced analytics incorporate 
cyber threat intelligence to enable 
proactive, accelerated action 
• Security metrics to measure 
enablement of business outcomes 
Copyright © 2014 Accenture All rights reserved. 12
Taking the next steps to address Intelligent Security for 
the digital enterprise 
Leading companies develop effective cyber security measures to handle 
vulnerabilities and mount an active defense calculated to meet and deflect 
attacker advances 
Assess security 
capability, identify 
opportunities 
Determine where 
the organization 
currently stands 
and the level of 
resources required 
to support 
meaningful 
transformation 
Manage 
complexity and 
integrate the 
enterprise 
Evolve the security 
program vision: 
establish an end-to-end 
enterprise 
security program 
and integrate it with 
existing enterprise 
architecture 
processes to reduce 
complexity levels 
and produce 
outcomes valued 
by the business 
Become agile 
Embrace the cloud 
and other emerging 
technologies to boost 
IT agility and reach 
customers faster, 
capitalize on 
efficiency and cost 
benefits and do so 
within risk tolerances 
Accelerate 
toward security 
intelligence 
Adapt to handle new 
threats to the 
enterprise by 
developing threat-centered 
operations 
by developing a 
deep understanding 
of adversaries, their 
goals and 
techniques 
Develop 
end-to-end 
delivery and 
sourcing 
Plan a delivery and 
operational strategy 
for each of the 
security services 
they offer to make 
a clear-eyed 
assessment of 
internal 
competencies for 
designing, building 
and deploying 
elements of a cyber-security 
program 
Copyright © 2014 Accenture All rights reserved. 13
Assess the security program’s capability and identify 
leap-ahead opportunities 
Before leaders can adopt a business-centered cyber security stance, they 
need to determine where their organizations currently stand and the level 
of resources required to support meaningful transformation 
Phase 1 
Threat Understanding 
•Standardize security operational processes 
•Rationalize security tools 
•Implement threat and vulnerability model 
Phase 2 
Contextualize and Detect 
•Map assets to threats and impact, utilizing analytics 
techniques to detect indicators of compromise or attack 
•Optimize and automate both technology and IT process 
•Integrate security analytics and intelligence with security 
operations, align to business outcomes 
Phase 3 
Active Defense and Response 
•Isolate and research threat actor activities 
•Adapt security capability to address evolving threat language 
•Trigger orchestrated, adaptive responses that pre-empt threats 
Copyright © 2014 Accenture All rights reserved. 14
Manage complexity and integrate the enterprise 
Establish an end-to-end enterprise security program and integrate it with 
existing enterprise architecture processes to reduce complexity levels and 
produce outcomes valued by the business 
• Establish a new vision of how security integrates and works with IT and the business, 
effectively creating a security operating model 
• Integrate the security operating model into the overall enterprise architecture, technology 
and processes 
Copyright © 2014 Accenture All rights reserved. 15
Become Agile 
Embrace the cloud and other emerging technologies to boost IT agility and 
reach customers faster, capitalize on efficiency and cost benefits and do so 
within risk tolerances 
Consistently apply technical 
controls for and from the cloud 
to the extended enterprise 
Craft contractual arrangements 
to address third-party service 
provider risk 
Share responsibilities with 
cloud, mobile and social 
providers to improve agility 
in security operations 
1 
2 
3 
Threat-centric 
Strategy 
…drive strategy 
based on how 
the business 
may be attacked 
Threat-centric 
Architecture 
…seek to 
understand the 
shifting threat 
landscape 
Threat-centric 
Operations 
…adapt to 
pre-empt threats 
targeting the 
business 
Copyright © 2014 Accenture All rights reserved. 16
Accelerate toward security intelligence 
Leaders adapt to handle new threats to the enterprise by developing 
threat-centered operations—developing a deep understanding of 
adversaries, their goals and techniques 
• Employ advanced analytics to deliver “context awareness” 
• Assume an active defense stance that increases the level of effort required by an attacker 
and delivers adaptive, intelligent responses 
– Leverage existing instrumentation in the enterprises with threat intelligence feeds and additional 
security event data sources to improve event triage and response performance 
– Identify business initiatives / activities of interest to Threat Actors 
– Incorporation of Threat Management teams in Security Monitoring & Response 
Advanced security analytics 
provide graphic tools to help 
teams analyze large data sets 
visually, supporting rapid, active 
defense responses 
Common User Names – a visualization of the 
top 100 users names used in a brute force attack 
Copyright © 2014 Accenture All rights reserved. 17
Develop end-to-end delivery and flexible sourcing strategies 
Effective security organizations plan a delivery and operational strategy 
for each of the security services they offer 
Considerations 
for Delivery 
and Sourcing 
Determine which services to keep in-house vs. outsource 
to external provider 
Assess the enterprise’s internal competencies for designing, 
building and deploying elements of a cyber-security program 
Justify sourcing decisions based on the overall risk tolerance, 
business case and commercial strategy based on security - 
business alignment 
Selecting partners that will help meet security-business goals 
Dynamic sourcing approach to address security coverage while 
helping leadership focus energy on active defense and proactive 
security capabilities and business enablement 
Copyright © 2014 Accenture All rights reserved. 18
Security call to action 
Copyright © 2014 Accenture All rights reserved. 19
Taking action 
In industries worldwide, security leaders seek effective ways to improve their 
ability to defend against cyber security threats, reduce the risk of inadvertent 
data disclosures, achieve and maintain regulatory compliance, and ultimately 
enhance the value they deliver to their business counterparts and shareholders 
Assess current posture and adopt 
a business-aligned security strategy 
Retain staff experienced with security 
architecture planning and design, tools 
and integration to drive successful 
outcomes 
Establish an end-to-end delivery 
capability, underpinned by a pre-integrated 
security solution set allows organizations 
to modularly select for their specific threat 
areas and adoption pace 
Move to extract more value from the data 
they already collect and analyze 
Focus on managing the risk environment 
instead of concentrating strictly on compliance 
at the expense of strategically securing 
business growth, value and innovation 
Create a clear and complete picture 
of defense strategies and synthesized 
security data to help security leaders make 
rapid, intelligent security decisions based on 
business goals 
Copyright © 2014 Accenture All rights reserved. 20
Visit 
www.accenture.com/IntelligentInfrastructures 
for more information 
Copyright © 2014 Accenture All rights reserved. 21

Weitere ähnliche Inhalte

Was ist angesagt?

Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Accenture Technology
 
Technology Vision 2016 – Overview
Technology Vision 2016 – OverviewTechnology Vision 2016 – Overview
Technology Vision 2016 – Overviewaccenture
 
Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceTechnology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceAccenture Operations
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Accenture Operations
 
The New World of As a Service - Infographic
The New World of As a Service - InfographicThe New World of As a Service - Infographic
The New World of As a Service - Infographicaccenture
 
Corrosion Management
Corrosion ManagementCorrosion Management
Corrosion Managementaccenture
 
Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationHarnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationAccenture Operations
 
Making the most of Guidewire to transform your insurance organization
Making the most of Guidewire to transform your insurance organizationMaking the most of Guidewire to transform your insurance organization
Making the most of Guidewire to transform your insurance organizationAccenture Insurance
 
Accenture Learning Academy
Accenture Learning AcademyAccenture Learning Academy
Accenture Learning Academyaccenture
 
Navigating the Crude Cycle: 4 lines of attack for US E&P energy companies to ...
Navigating the Crude Cycle: 4 lines of attack for US E&P energy companies to ...Navigating the Crude Cycle: 4 lines of attack for US E&P energy companies to ...
Navigating the Crude Cycle: 4 lines of attack for US E&P energy companies to ...accenture
 
Mastering Operational Flexibility
Mastering Operational FlexibilityMastering Operational Flexibility
Mastering Operational Flexibilityaccenture
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilienceaccenture
 
Push to Pull: From Supply Chains to Patient-Centric Value Networks
Push to Pull: From Supply Chains  to Patient-Centric Value NetworksPush to Pull: From Supply Chains  to Patient-Centric Value Networks
Push to Pull: From Supply Chains to Patient-Centric Value Networksaccenture
 
Intelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital BusinessIntelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital Businessaccenture
 
CPG Companies: Evolving Your Analytics-driven Organizations
CPG Companies: Evolving Your Analytics-driven OrganizationsCPG Companies: Evolving Your Analytics-driven Organizations
CPG Companies: Evolving Your Analytics-driven Organizationsaccenture
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalAccenture Technology
 
The New World of As a Service
The New World of As a ServiceThe New World of As a Service
The New World of As a Serviceaccenture
 
Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceTechnology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Serviceaccenture
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportAccenture Technology
 

Was ist angesagt? (19)

Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
Technology Vision 2016 – Overview
Technology Vision 2016 – OverviewTechnology Vision 2016 – Overview
Technology Vision 2016 – Overview
 
Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceTechnology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Service
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure
 
The New World of As a Service - Infographic
The New World of As a Service - InfographicThe New World of As a Service - Infographic
The New World of As a Service - Infographic
 
Corrosion Management
Corrosion ManagementCorrosion Management
Corrosion Management
 
Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationHarnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open Innovation
 
Making the most of Guidewire to transform your insurance organization
Making the most of Guidewire to transform your insurance organizationMaking the most of Guidewire to transform your insurance organization
Making the most of Guidewire to transform your insurance organization
 
Accenture Learning Academy
Accenture Learning AcademyAccenture Learning Academy
Accenture Learning Academy
 
Navigating the Crude Cycle: 4 lines of attack for US E&P energy companies to ...
Navigating the Crude Cycle: 4 lines of attack for US E&P energy companies to ...Navigating the Crude Cycle: 4 lines of attack for US E&P energy companies to ...
Navigating the Crude Cycle: 4 lines of attack for US E&P energy companies to ...
 
Mastering Operational Flexibility
Mastering Operational FlexibilityMastering Operational Flexibility
Mastering Operational Flexibility
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilience
 
Push to Pull: From Supply Chains to Patient-Centric Value Networks
Push to Pull: From Supply Chains  to Patient-Centric Value NetworksPush to Pull: From Supply Chains  to Patient-Centric Value Networks
Push to Pull: From Supply Chains to Patient-Centric Value Networks
 
Intelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital BusinessIntelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital Business
 
CPG Companies: Evolving Your Analytics-driven Organizations
CPG Companies: Evolving Your Analytics-driven OrganizationsCPG Companies: Evolving Your Analytics-driven Organizations
CPG Companies: Evolving Your Analytics-driven Organizations
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
The New World of As a Service
The New World of As a ServiceThe New World of As a Service
The New World of As a Service
 
Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceTechnology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Service
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 

Andere mochten auch

Viyya Ssms Overview 2009
Viyya Ssms Overview 2009Viyya Ssms Overview 2009
Viyya Ssms Overview 2009guestee358
 
120229 Fm Tec Intelligent Security Containers Quick Info 2012
120229 Fm Tec Intelligent Security Containers Quick Info 2012120229 Fm Tec Intelligent Security Containers Quick Info 2012
120229 Fm Tec Intelligent Security Containers Quick Info 2012Bindner
 
Abb85fb57f02f7b85c8eba91f28b7c99 (1)
Abb85fb57f02f7b85c8eba91f28b7c99 (1)Abb85fb57f02f7b85c8eba91f28b7c99 (1)
Abb85fb57f02f7b85c8eba91f28b7c99 (1)Galina Yaceiko
 

Andere mochten auch (6)

Its & complex safety
Its & complex safetyIts & complex safety
Its & complex safety
 
Viyya Ssms Overview 2009
Viyya Ssms Overview 2009Viyya Ssms Overview 2009
Viyya Ssms Overview 2009
 
International Conference on Building Security Capacity
International Conference on Building Security CapacityInternational Conference on Building Security Capacity
International Conference on Building Security Capacity
 
120229 Fm Tec Intelligent Security Containers Quick Info 2012
120229 Fm Tec Intelligent Security Containers Quick Info 2012120229 Fm Tec Intelligent Security Containers Quick Info 2012
120229 Fm Tec Intelligent Security Containers Quick Info 2012
 
Seminar ppt...; )
Seminar ppt...; )Seminar ppt...; )
Seminar ppt...; )
 
Abb85fb57f02f7b85c8eba91f28b7c99 (1)
Abb85fb57f02f7b85c8eba91f28b7c99 (1)Abb85fb57f02f7b85c8eba91f28b7c99 (1)
Abb85fb57f02f7b85c8eba91f28b7c99 (1)
 

Ähnlich wie Defending Digital Business with Intelligent Security

5 Reasons Why a Managed SOC is a Security Must-Have.pptx
5 Reasons Why a Managed SOC is a Security Must-Have.pptx5 Reasons Why a Managed SOC is a Security Must-Have.pptx
5 Reasons Why a Managed SOC is a Security Must-Have.pptxAiCyberWatch
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxMark Simos
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Securing Solutions Amid The Journey To Digital Transformation.pdf
Securing Solutions Amid The Journey To Digital Transformation.pdfSecuring Solutions Amid The Journey To Digital Transformation.pdf
Securing Solutions Amid The Journey To Digital Transformation.pdfCiente
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...Accenture Technology
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalAccenture Operations
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!Heather Salmons Newswanger
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Accounting_Whitepapers
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by FirstMutualHoldings
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesJohn Rapa
 

Ähnlich wie Defending Digital Business with Intelligent Security (20)

5 Reasons Why a Managed SOC is a Security Must-Have.pptx
5 Reasons Why a Managed SOC is a Security Must-Have.pptx5 Reasons Why a Managed SOC is a Security Must-Have.pptx
5 Reasons Why a Managed SOC is a Security Must-Have.pptx
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptx
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan
 
Securing Solutions Amid The Journey To Digital Transformation.pdf
Securing Solutions Amid The Journey To Digital Transformation.pdfSecuring Solutions Amid The Journey To Digital Transformation.pdf
Securing Solutions Amid The Journey To Digital Transformation.pdf
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!
 
Lead Through Disruption Guide PDF
Lead Through Disruption Guide PDFLead Through Disruption Guide PDF
Lead Through Disruption Guide PDF
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial Services
 

Mehr von accenture

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024accenture
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileaccenture
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial Systemaccenture
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyaccenture
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023accenture
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operationsaccenture
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Studyaccenture
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023accenture
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented changeaccenture
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% meaccenture
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023accenture
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoaccenture
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industryaccenture
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023accenture
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accentureaccenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accentureaccenture
 

Mehr von accenture (20)

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 

Kürzlich hochgeladen

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 

Kürzlich hochgeladen (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 

Defending Digital Business with Intelligent Security

  • 1. Intelligent Security: Defending the Digital Business Defending the Digital Business
  • 2. Executive Summary Today Key Business Challenges •Missing link between business goals and security capabilities •Compliance providing a false sense of security •Enterprises are reaping the benefits of enhancing business functionality through cloud, mobile, and social, but struggle governing the extensions to the enterprise •Increasingly sophist security talent to address current security needs A new tomorrow Approach to Intelligent Security • Assess the security program’s capability and identify leap-ahead opportunities • Manage complexity and integrate the enterprise • Become agile • Accelerate toward security intelligence • Develop end-to-end delivery and flexible sourcing strategies How to get there Security Call to Action •The first step is assessing current posture and adopting a business-aligned security strategy •Retain staff experienced with security architecture planning and design, tools and integration to drive successful outcomes •Establishing an end-to-end delivery capability, underpinned by a pre-integrated security solution set allows organizations to modularly select for their specific threat areas and adoption pace •Move to extract more value from the data they already collect and analyze Copyright © 2014 Accenture All rights reserved. 2
  • 3. Key business challenges Copyright © 2014 Accenture All rights reserved. 3
  • 4. Business challenges to security for today’s enterprise Despite all the effort and resources that organizations invest in traditional information security approaches, many still fall prey to the latest cyber threats, or find they are unprepared to deal with rapidly blurring enterprise boundaries Five most common issues companies will have taking a proactive security stance Keeping pace with persistent threats Governing the extended enterprise despite blurring boundaries Thinking outside the compliance (check) box Missing the link between business and security Addressing the security supply/demand imbalance Copyright © 2014 Accenture All rights reserved. 4
  • 5. Missing the link between 1 business and security Protecting the business should be the first and foremost goal of any security program, but most enterprises do not make it a core competency • Untethered programs can drift and become largely ineffective • Some security executives might struggle to draw a clear line between the protection provided and its impact on the company’s customer satisfaction, loyalty and revenue • The Security team may lack a logical road map for changing the organization’s view of the security function as simply an inhibitor or cost center Business Security Copyright © 2014 Accenture All rights reserved. 5
  • 6. Thinking outside of the compliance (check) box 2 Unfortunately, compliance does not ensure security. Instead, enterprises should view compliance as the minimum acceptable cyber security “bar” they need to clear… Compliance •Audit centric •Controls based •Driven largely by regulatory requirements •Sample based •Scope limited by audit domain •Evaluated on a quarterly or annual basis Security •Business centric •Controls based •Driven by business requirements •Scope is holistic-includes enterprise, 3rd parties, suppliers, partners •Evaluated on near-real time basis Copyright © 2014 Accenture All rights reserved. 6
  • 7. Governing the extended enterprise despite blurring boundaries 3 While business adoption has been widespread and rapid, many security organizations struggle to establish the appropriate frameworks, policies and controls to protect the expansions and contractions now common in extended IT environments Typical Day in the Extended Enterprise Cloud Real-time provisioning of servers to support testing of a cloud CRM system Mobile Granting mobile access to new capabilities for field representatives Social network Rollout of a business social network for sales, product and marketing collaboration • What are the appropriate frameworks and policies? • Should I allow personal devices? Which devices and do I let everyone do it? • How do I enable and monitor aaS components being introduced to my environment? • How will I reach my customers with the correct messages? • What do I need to do to make sure exposed by this new enterprise? Copyright © 2014 Accenture All rights reserved. 7
  • 8. 4 Keeping pace with persistent threats As the threats become more persistent, they become harder to identify Most organizations focus on: • Monitoring – Difficulty in prioritizing critical events and handling uncertainty • Static controls – Standard controls don’t help once the attacker is in For which cyber-threat are you prepared? Opportunistic Acts Mob Determined actors Attacker profile: •Will move on if thwarted •Will make mistakes •Can be creative Attacker profile: •Emotional and not disciplined •Not after the crown jewels •Not well backed Attacker profile: •Failure is not an option •Need only one vulnerability •Stick with it mentality Copyright © 2014 Accenture All rights reserved. 8
  • 9. 5 Addressing the security supply/demand imbalance Most organizations lack sufficient security talent to address their current needs Skill Shortages •Lack of the appropriate skills to execute required tasks •Hiring premiums for cyber security resources Career Development •Skilled resources are eager to keep skills sharp and maintain exposure to new technologies Firefighting •Misalignment of security programs to strategic business objectives cause practitioners to burn-out from constant troubleshooting Copyright © 2014 Accenture All rights reserved. 9
  • 10. Net result Compliance driven (or audit scope driven) security scope can cause organizations to implicitly and unknowingly accept a significant amount of cyber-security risk Implicitly accepted risk Enterprise security risk Enterprise security risk Compliance risk Compliance risk Specific regulatory risk Specific regulatory risk Perceived Risk Actual Risk Copyright © 2014 Accenture All rights reserved. 10
  • 11. Approach to Intelligent Security Copyright © 2014 Accenture All rights reserved. 11
  • 12. Vision for Intelligent Security As organizations shift from a compliance-centered security mindset to an active cyber security stance, security teams need to adapt to keep pace with evolving business objectives • Driven by a comprehensive security strategy that is aligned to business goals and objectives • Core business assets protected by robust enterprise security controls • Layered on top are extended enterprise safeguards focused on enabling cloud, mobile and social network adoption • Advanced analytics incorporate cyber threat intelligence to enable proactive, accelerated action • Security metrics to measure enablement of business outcomes Copyright © 2014 Accenture All rights reserved. 12
  • 13. Taking the next steps to address Intelligent Security for the digital enterprise Leading companies develop effective cyber security measures to handle vulnerabilities and mount an active defense calculated to meet and deflect attacker advances Assess security capability, identify opportunities Determine where the organization currently stands and the level of resources required to support meaningful transformation Manage complexity and integrate the enterprise Evolve the security program vision: establish an end-to-end enterprise security program and integrate it with existing enterprise architecture processes to reduce complexity levels and produce outcomes valued by the business Become agile Embrace the cloud and other emerging technologies to boost IT agility and reach customers faster, capitalize on efficiency and cost benefits and do so within risk tolerances Accelerate toward security intelligence Adapt to handle new threats to the enterprise by developing threat-centered operations by developing a deep understanding of adversaries, their goals and techniques Develop end-to-end delivery and sourcing Plan a delivery and operational strategy for each of the security services they offer to make a clear-eyed assessment of internal competencies for designing, building and deploying elements of a cyber-security program Copyright © 2014 Accenture All rights reserved. 13
  • 14. Assess the security program’s capability and identify leap-ahead opportunities Before leaders can adopt a business-centered cyber security stance, they need to determine where their organizations currently stand and the level of resources required to support meaningful transformation Phase 1 Threat Understanding •Standardize security operational processes •Rationalize security tools •Implement threat and vulnerability model Phase 2 Contextualize and Detect •Map assets to threats and impact, utilizing analytics techniques to detect indicators of compromise or attack •Optimize and automate both technology and IT process •Integrate security analytics and intelligence with security operations, align to business outcomes Phase 3 Active Defense and Response •Isolate and research threat actor activities •Adapt security capability to address evolving threat language •Trigger orchestrated, adaptive responses that pre-empt threats Copyright © 2014 Accenture All rights reserved. 14
  • 15. Manage complexity and integrate the enterprise Establish an end-to-end enterprise security program and integrate it with existing enterprise architecture processes to reduce complexity levels and produce outcomes valued by the business • Establish a new vision of how security integrates and works with IT and the business, effectively creating a security operating model • Integrate the security operating model into the overall enterprise architecture, technology and processes Copyright © 2014 Accenture All rights reserved. 15
  • 16. Become Agile Embrace the cloud and other emerging technologies to boost IT agility and reach customers faster, capitalize on efficiency and cost benefits and do so within risk tolerances Consistently apply technical controls for and from the cloud to the extended enterprise Craft contractual arrangements to address third-party service provider risk Share responsibilities with cloud, mobile and social providers to improve agility in security operations 1 2 3 Threat-centric Strategy …drive strategy based on how the business may be attacked Threat-centric Architecture …seek to understand the shifting threat landscape Threat-centric Operations …adapt to pre-empt threats targeting the business Copyright © 2014 Accenture All rights reserved. 16
  • 17. Accelerate toward security intelligence Leaders adapt to handle new threats to the enterprise by developing threat-centered operations—developing a deep understanding of adversaries, their goals and techniques • Employ advanced analytics to deliver “context awareness” • Assume an active defense stance that increases the level of effort required by an attacker and delivers adaptive, intelligent responses – Leverage existing instrumentation in the enterprises with threat intelligence feeds and additional security event data sources to improve event triage and response performance – Identify business initiatives / activities of interest to Threat Actors – Incorporation of Threat Management teams in Security Monitoring & Response Advanced security analytics provide graphic tools to help teams analyze large data sets visually, supporting rapid, active defense responses Common User Names – a visualization of the top 100 users names used in a brute force attack Copyright © 2014 Accenture All rights reserved. 17
  • 18. Develop end-to-end delivery and flexible sourcing strategies Effective security organizations plan a delivery and operational strategy for each of the security services they offer Considerations for Delivery and Sourcing Determine which services to keep in-house vs. outsource to external provider Assess the enterprise’s internal competencies for designing, building and deploying elements of a cyber-security program Justify sourcing decisions based on the overall risk tolerance, business case and commercial strategy based on security - business alignment Selecting partners that will help meet security-business goals Dynamic sourcing approach to address security coverage while helping leadership focus energy on active defense and proactive security capabilities and business enablement Copyright © 2014 Accenture All rights reserved. 18
  • 19. Security call to action Copyright © 2014 Accenture All rights reserved. 19
  • 20. Taking action In industries worldwide, security leaders seek effective ways to improve their ability to defend against cyber security threats, reduce the risk of inadvertent data disclosures, achieve and maintain regulatory compliance, and ultimately enhance the value they deliver to their business counterparts and shareholders Assess current posture and adopt a business-aligned security strategy Retain staff experienced with security architecture planning and design, tools and integration to drive successful outcomes Establish an end-to-end delivery capability, underpinned by a pre-integrated security solution set allows organizations to modularly select for their specific threat areas and adoption pace Move to extract more value from the data they already collect and analyze Focus on managing the risk environment instead of concentrating strictly on compliance at the expense of strategically securing business growth, value and innovation Create a clear and complete picture of defense strategies and synthesized security data to help security leaders make rapid, intelligent security decisions based on business goals Copyright © 2014 Accenture All rights reserved. 20
  • 21. Visit www.accenture.com/IntelligentInfrastructures for more information Copyright © 2014 Accenture All rights reserved. 21