Enviar pesquisa
Carregar
Security Technology Vision 2016
•
Transferir como PPTX, PDF
•
0 gostou
•
111 visualizações
M
Melissa Gilpin
Seguir
Empowering your cyber defenders to enable digital trust
Leia menos
Leia mais
Negócios
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 9
Baixar agora
Recomendados
Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Service
Accenture Operations
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
Accenture Operations
Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energy
accenture
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
accenture
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Accenture Technology
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Technology
Accenture High Performance Security Report 2016 For Communications
Accenture High Performance Security Report 2016 For Communications
accenture
Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open Innovation
Accenture Operations
Recomendados
Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Service
Accenture Operations
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
Accenture Operations
Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energy
accenture
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
accenture
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Accenture Technology
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Technology
Accenture High Performance Security Report 2016 For Communications
Accenture High Performance Security Report 2016 For Communications
accenture
Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open Innovation
Accenture Operations
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Accenture Technology
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure
Accenture Operations
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for Insurance
Accenture Insurance
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Accenture Technology
Technology Vision 2016 - Infographic
Technology Vision 2016 - Infographic
Accenture Technology
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Operations
Security Technology Vision 2016
Security Technology Vision 2016
Accenture Technology
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
Accenture Operations
A new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growth
accenture
Accenture Liquid Application Studio
Accenture Liquid Application Studio
Accenture Technology
High Performance Security Report - High Technology
High Performance Security Report - High Technology
Accenture Security
Symantec Consulting Infographic
Symantec Consulting Infographic
Jenna Whelan
Leading the Digital Enterprise
Leading the Digital Enterprise
accenture
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leader
Accenture Australia
Accenture Enkitec Group: Oracle database and Engineered Systems
Accenture Enkitec Group: Oracle database and Engineered Systems
Accenture Operations
Cyber Eleven flyer
Cyber Eleven flyer
Timmy Chou
Steven Greschner - About Me
Steven Greschner - About Me
NextNet Partners
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
Accenture Australia
Going Deep: Mining Experiential and Behavioral Data in VR
Going Deep: Mining Experiential and Behavioral Data in VR
Accenture Technology
MAHESH KHILNANI-resume
MAHESH KHILNANI-resume
MAHESH KHILNANI
Eximdesk Trade PPT
Eximdesk Trade PPT
eximdesk
Shaun-Flak_12_08_15_Customer Relations Manager
Shaun-Flak_12_08_15_Customer Relations Manager
Shaun Flak
Mais conteúdo relacionado
Mais procurados
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Accenture Technology
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure
Accenture Operations
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for Insurance
Accenture Insurance
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Accenture Technology
Technology Vision 2016 - Infographic
Technology Vision 2016 - Infographic
Accenture Technology
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Operations
Security Technology Vision 2016
Security Technology Vision 2016
Accenture Technology
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
Accenture Operations
A new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growth
accenture
Accenture Liquid Application Studio
Accenture Liquid Application Studio
Accenture Technology
High Performance Security Report - High Technology
High Performance Security Report - High Technology
Accenture Security
Symantec Consulting Infographic
Symantec Consulting Infographic
Jenna Whelan
Leading the Digital Enterprise
Leading the Digital Enterprise
accenture
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leader
Accenture Australia
Accenture Enkitec Group: Oracle database and Engineered Systems
Accenture Enkitec Group: Oracle database and Engineered Systems
Accenture Operations
Cyber Eleven flyer
Cyber Eleven flyer
Timmy Chou
Steven Greschner - About Me
Steven Greschner - About Me
NextNet Partners
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
Accenture Australia
Going Deep: Mining Experiential and Behavioral Data in VR
Going Deep: Mining Experiential and Behavioral Data in VR
Accenture Technology
Mais procurados
(19)
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for Insurance
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Technology Vision 2016 - Infographic
Technology Vision 2016 - Infographic
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Security Technology Vision 2016
Security Technology Vision 2016
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
A new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growth
Accenture Liquid Application Studio
Accenture Liquid Application Studio
High Performance Security Report - High Technology
High Performance Security Report - High Technology
Symantec Consulting Infographic
Symantec Consulting Infographic
Leading the Digital Enterprise
Leading the Digital Enterprise
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leader
Accenture Enkitec Group: Oracle database and Engineered Systems
Accenture Enkitec Group: Oracle database and Engineered Systems
Cyber Eleven flyer
Cyber Eleven flyer
Steven Greschner - About Me
Steven Greschner - About Me
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
Going Deep: Mining Experiential and Behavioral Data in VR
Going Deep: Mining Experiential and Behavioral Data in VR
Destaque
MAHESH KHILNANI-resume
MAHESH KHILNANI-resume
MAHESH KHILNANI
Eximdesk Trade PPT
Eximdesk Trade PPT
eximdesk
Shaun-Flak_12_08_15_Customer Relations Manager
Shaun-Flak_12_08_15_Customer Relations Manager
Shaun Flak
App design
App design
원규 최
Portfolio Aude Mazaud
Portfolio Aude Mazaud
amazaud
Resume
Resume
haridas Jana
Presentation On Slum
Presentation On Slum
Janak Dhungana
ATL GROUP_INTRODUCTION_EN
ATL GROUP_INTRODUCTION_EN
Camelia Lovin
Philippines Trade Compliance
Philippines Trade Compliance
eximdesk
7 tips van om KBC om van kennisdeling een succes te maken
7 tips van om KBC om van kennisdeling een succes te maken
KBCBankEnVerzekering
Globale conjunctuurvooruitzichten en belgische competitiviteit - Koen De Leus
Globale conjunctuurvooruitzichten en belgische competitiviteit - Koen De Leus
KBCBankEnVerzekering
Prueba tercera parcial
Prueba tercera parcial
DEYSITATIANAIB
pamflett
pamflett
Fredrik Anthony
Seguridad vial
Seguridad vial
Janeris Hernandez
Tonja.powerpoint
Tonja.powerpoint
tonjawhit
Daniel Scobie
Daniel Scobie
Daniel Scobie
Global Education Manual
Global Education Manual
ART Fusion
Art5 parede
Art5 parede
Yuri Leandro
DB16-Full-Report
DB16-Full-Report
María García Lecuona
Destaque
(19)
MAHESH KHILNANI-resume
MAHESH KHILNANI-resume
Eximdesk Trade PPT
Eximdesk Trade PPT
Shaun-Flak_12_08_15_Customer Relations Manager
Shaun-Flak_12_08_15_Customer Relations Manager
App design
App design
Portfolio Aude Mazaud
Portfolio Aude Mazaud
Resume
Resume
Presentation On Slum
Presentation On Slum
ATL GROUP_INTRODUCTION_EN
ATL GROUP_INTRODUCTION_EN
Philippines Trade Compliance
Philippines Trade Compliance
7 tips van om KBC om van kennisdeling een succes te maken
7 tips van om KBC om van kennisdeling een succes te maken
Globale conjunctuurvooruitzichten en belgische competitiviteit - Koen De Leus
Globale conjunctuurvooruitzichten en belgische competitiviteit - Koen De Leus
Prueba tercera parcial
Prueba tercera parcial
pamflett
pamflett
Seguridad vial
Seguridad vial
Tonja.powerpoint
Tonja.powerpoint
Daniel Scobie
Daniel Scobie
Global Education Manual
Global Education Manual
Art5 parede
Art5 parede
DB16-Full-Report
DB16-Full-Report
Semelhante a Security Technology Vision 2016
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Accenture Technology
Intelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital Business
accenture
Governance of security operation centers
Governance of security operation centers
Brencil Kaimba
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.
accenture
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations Center
EMC
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
accenture
People First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital Insurance
Accenture México
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
Accenture Technology
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
accenture
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
nooralmousa
How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!
Tammy Clark
Mobile, Cloud, Security, Cognitive and Analytics
Mobile, Cloud, Security, Cognitive and Analytics
Kate Morphett
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Aujas
SOC Service in India.pdf
SOC Service in India.pdf
ACS Networks & Technologies
Accenture Technology Vision for Banking
Accenture Technology Vision for Banking
accenture
Sonia randhawa speaks on cybersecurity and innovation
Sonia randhawa speaks on cybersecurity and innovation
Sonia Randhawa
New technologies - Amer Haza'a
New technologies - Amer Haza'a
Fahmi Albaheth
Security operations center inhouse vs outsource
Security operations center inhouse vs outsource
Netmagic Solutions Pvt. Ltd.
Security operations center inhouse vs outsource
Security operations center inhouse vs outsource
Netmagic Solutions Pvt. Ltd.
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
Accenture Technology
Semelhante a Security Technology Vision 2016
(20)
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Intelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital Business
Governance of security operation centers
Governance of security operation centers
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations Center
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
People First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital Insurance
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!
Mobile, Cloud, Security, Cognitive and Analytics
Mobile, Cloud, Security, Cognitive and Analytics
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
SOC Service in India.pdf
SOC Service in India.pdf
Accenture Technology Vision for Banking
Accenture Technology Vision for Banking
Sonia randhawa speaks on cybersecurity and innovation
Sonia randhawa speaks on cybersecurity and innovation
New technologies - Amer Haza'a
New technologies - Amer Haza'a
Security operations center inhouse vs outsource
Security operations center inhouse vs outsource
Security operations center inhouse vs outsource
Security operations center inhouse vs outsource
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
Accenture Technology Vision for Workday 2016:People First: The primacy of pe...
Último
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
kapoorjyoti4444
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
Hector Del Castillo, CPM, CPMM
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
pr788182
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
CannaBusinessPlans
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
ssuserf63bd7
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
kapoorjyoti4444
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
pr788182
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
Roofing Contractor
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
pujan9679
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
pr788182
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
panmisemningshen123
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
pujan9679
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
Eric T. Tung
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon investment
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
pr788182
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon investment
Último
(20)
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
Security Technology Vision 2016
1.
Security Technology Vision
2016 Empowering Your Cyber Defenders to Enable Digital Trust
2.
The digital economy
introduces new risks and threats to challenge cyber defender capabilities… Pace of change New technologies Changing workforce models Increased connectedness Huge scale of software operations Expanded attack surfaces More sophisticated, higher volume of attacks Ongoing privacy concerns Copyright © 2016 Accenture All rights reserved. 2
3.
… and attackers
are overwhelming organizations that lack skilled resources to properly defend the enterprise • Attackers use increasingly sophisticated tools and techniques to target businesses • 45 percent of companies say they have difficulty finding qualified security personnel Copyright © 2016 Accenture All rights reserved. 3 Underpinning all of this change is the mandate to boost security’s effectiveness in supporting the business’ efforts to attain digital trust.
4.
Technology alone cannot
resolve enterprise security threats To establish robust security capabilities, organizations need the right skills at the right level at the right time and to: • Scale quickly to meet new challenges in cyber defense • Attract and retain highly skilled resources • Elevate their existing workforce with enhanced skills and supporting technology to reach new levels of performance Copyright © 2016 Accenture All rights reserved. 4
5.
In the next
five years intelligent automation and the liquid workforce will bring significant changes in how security professionals work and how they use technology to defend and empower the enterprise Intelligent Automation Outsized impact on the security workforce Liquid Workforce Copyright © 2016 Accenture All rights reserved. 5
6.
Intelligent automation applies
artificial intelligence, process automation and visualization to enhance a security professional’s capabilities Artificial intelligence (AI) • Helps security professionals understand the larger context of a threat • Supports process automation, allowing security teams to execute automated actions as threats emerge and evolve Visualization • Harnesses the human ability to recognize patterns quickly and pick out anomalies • Helps professionals quickly understand cascades of data • Provides real-time views of the entire enterprise with advanced graphics processing Copyright © 2016 Accenture All rights reserved. 6
7.
The liquid workforce
reduces challenges in accessing scarce security talent by enabling more flexible workforce arrangements • Freelancing, crowdsourcing and broad-based collaboration will offer a much larger pool of security expertise to organizations. • Outsourcing security jobs will require that organizations leverage service providers they trust and who bring well- vetted resources to the table. • Accenture believes 40% of a business’ entire workforce will be freelance by 2020. • Enterprises should maintain a core of highly-skilled security people that are augmented with outside resources. Copyright © 2016 Accenture All rights reserved. 7
8.
What are the
next steps leadership should take to prepare for the future security workforce? Identify repetitive and low-impact activities that can be automated to scale security effectiveness. Look for security challenges where automated decisions make sense and where quick action can reduce the cost of security incidents. Increase visual literacy and focus on presenting security-related data in compelling and insightful ways. Evaluate where a liquid workforce approach could help: address chronic staffing issues, fill a short-term skilled role, or support teams with a broader perspective on data. Copyright © 2016 Accenture All rights reserved. 8
9.
To find out
more please visit www.accenture.com/SecurityVision Copyright © 2016 Accenture All rights reserved. 9
Baixar agora