SlideShare uma empresa Scribd logo
1 de 8
ACCENTURE
HIGH PERFORMANCE
SECURITY REPORT 2016
FOR COMMUNICATIONS
Copyright © 2016 Accenture. All Rights Reserved. 2
SECURE THE ENTERPRISE
of large enterprise
security executives have
confidence in their cyber
security strategies
of organizations have
completely embedded
cybersecurity into their
cultures
Copyright © 2016 Accenture. All Rights Reserved. 3
FAILURE RATES ARE ALARMINGLY HIGH
THOUSANDS to MILLIONS
of random breach attempts per week
More than 90 focused attacks
per year; of those, 1 in 3 result in a
security breach
That’s 2 to 3 effective attacks per
month
Internal breaches are
PARTICULARLY PROBLEMATIC
49% say greatest security impact comes
from malicious insiders
Yet MORE THAN 1/2 LACK
CONFIDENCE in their organizations’
internal monitoring
Many security breaches go
undetected FOR TOO LONG
Detecting a breach takes months
for 63% of COMPANIES
Internal security teams
discover only 65% of
EFFECTIVE BREACHES
Copyright © 2016 Accenture. All Rights Reserved.
FOCUS FOR SUCCESS
 Are you confident that you
have identified all priority
business data assets and
their location?
 Are you able to defend the
organization from a
motivated adversary?
 Do you have the tools and
techniques to react and
respond to a targeted
attack?
 Do you know what the
adversary is really after?
 How often does your
organization ‘practice’ its
plan to get better at
responses?
 How do these attacks affect
your business?
 Do you have the right
alignment, structure, team
members,
and other resources to
execute on your mission?
Copyright © 2016 Accenture. All Rights Reserved. 5
AND OUTMANEUVER
Only 45% of respondents have confidence in their cybersecurity capabilities regarding any of the seven key
domains below, but investment in these areas is critical to improving defenses and strengthening resilience.
Copyright © 2016 Accenture. All Rights Reserved. 6
CYBERSECURITY APPROACH
PRESSURE TEST
SECURITY CAPABILITIES
by engaging “white hat” external hackers
to simulate attacks
MAKE SECURITY EVERYONE’S JOB
by fostering a culture of cybersecurity
& prioritizing training of all employees
PROTECT FROM THE INSIDE OUT
by prioritizing protection of organization’s
key assets
LEAD FROM THE TOP
by materially engaging with enterprise
leadership & improving the board’s cyber literacy
INVEST TO INNOVATE
AND OUTMANEUVER,
continually innovating to stay ahead
of attackers
GROW CONFIDENTLY
by keeping security connected to the bottom
line and to real business needs
Copyright © 2016 Accenture. All Rights Reserved. 7
HIGH PERFORMANCE SECURITY RESEARCH 2016
The survey objective was to understand the extent to which companies prioritize security,
how comprehensive security plans are, how resilient companies are with regard to security,
and the level of spend for security.
The survey aimed to measure security capabilities across seven cybersecurity strategy
domains identified by Accenture: business alignment, cyber response readiness, strategic
threat intelligence, cyber resilience, investment efficiency, governance and leadership, and
the extended ecosystem.
More than 50 percent of respondents were key decision-makers in cybersecurity strategy
and spending, including security, IT and business executives at director level and above at
companies with revenues of US $1 billion or more.
In 2016 Accenture surveyed 2,000 executives from 12 industries and 15 countries globally,
including 75 executives from the Communications industry.
Copyright © 2016 Accenture. All Rights Reserved. 8
#CyberSecurity
@AccentureSecure
THANK YOU
accenture.com/cybersecurityreport

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
Mastering Operational Flexibility
Mastering Operational FlexibilityMastering Operational Flexibility
Mastering Operational Flexibility
 
Leading the Digital Enterprise
Leading the Digital EnterpriseLeading the Digital Enterprise
Leading the Digital Enterprise
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
A new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growthA new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growth
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationHarnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open Innovation
 
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leader
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to Leader
 
Agricultural Chemicals 2016 Supply Chain Benchmarking Study
Agricultural Chemicals 2016 Supply Chain Benchmarking StudyAgricultural Chemicals 2016 Supply Chain Benchmarking Study
Agricultural Chemicals 2016 Supply Chain Benchmarking Study
 
Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceTechnology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Service
 
2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Technology Vision 2016 – Overview
Technology Vision 2016 – OverviewTechnology Vision 2016 – Overview
Technology Vision 2016 – Overview
 
Thriving on Disruption: How Utilities Can Become Fearless in the Face of Deva...
Thriving on Disruption: How Utilities Can Become Fearless in the Face of Deva...Thriving on Disruption: How Utilities Can Become Fearless in the Face of Deva...
Thriving on Disruption: How Utilities Can Become Fearless in the Face of Deva...
 
Smart Spending is not Just About The Numbers
Smart Spending is not Just About The NumbersSmart Spending is not Just About The Numbers
Smart Spending is not Just About The Numbers
 
Accenture Liquid Application Studio
Accenture Liquid Application StudioAccenture Liquid Application Studio
Accenture Liquid Application Studio
 
Chemicals: Smarter Investments, Outstanding Results
Chemicals: Smarter Investments, Outstanding ResultsChemicals: Smarter Investments, Outstanding Results
Chemicals: Smarter Investments, Outstanding Results
 
Assault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities GridAssault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities Grid
 

Destaque

Destaque (19)

Technology Vision 2017 - Overview
Technology Vision 2017 - OverviewTechnology Vision 2017 - Overview
Technology Vision 2017 - Overview
 
Seeing beyond the Loyalty Illusion: It’s Time You Invest More Wisely
Seeing beyond the Loyalty Illusion: It’s Time You Invest More Wisely Seeing beyond the Loyalty Illusion: It’s Time You Invest More Wisely
Seeing beyond the Loyalty Illusion: It’s Time You Invest More Wisely
 
The Promise of as-a-Service
The Promise of as-a-ServiceThe Promise of as-a-Service
The Promise of as-a-Service
 
AI and the Future of Growth
AI and the Future of GrowthAI and the Future of Growth
AI and the Future of Growth
 
Smarter Investments, Outstanding Results: Resources Industries Digital Transf...
Smarter Investments, Outstanding Results: Resources Industries Digital Transf...Smarter Investments, Outstanding Results: Resources Industries Digital Transf...
Smarter Investments, Outstanding Results: Resources Industries Digital Transf...
 
Digital Security
Digital SecurityDigital Security
Digital Security
 
Video Transforming
Video TransformingVideo Transforming
Video Transforming
 
The ‘Data Driven Video Business’
The ‘Data Driven Video Business’The ‘Data Driven Video Business’
The ‘Data Driven Video Business’
 
Video is Changing the World
Video is Changing the WorldVideo is Changing the World
Video is Changing the World
 
Design in Business: It’s Not About Creating Something Pretty. It’s About Crea...
Design in Business: It’s Not About Creating Something Pretty. It’s About Crea...Design in Business: It’s Not About Creating Something Pretty. It’s About Crea...
Design in Business: It’s Not About Creating Something Pretty. It’s About Crea...
 
Harnessing Revolution: Creating The Future Workforce
Harnessing Revolution: Creating The Future WorkforceHarnessing Revolution: Creating The Future Workforce
Harnessing Revolution: Creating The Future Workforce
 
Reporte de Seguridad de Cisco 2016
Reporte de Seguridad de Cisco 2016Reporte de Seguridad de Cisco 2016
Reporte de Seguridad de Cisco 2016
 
Considerations for an Effective Internal Model Method Implementation
Considerations for an Effective Internal Model Method ImplementationConsiderations for an Effective Internal Model Method Implementation
Considerations for an Effective Internal Model Method Implementation
 
Finance Reporting Offering
Finance Reporting OfferingFinance Reporting Offering
Finance Reporting Offering
 
Regulatory Reporting Dashboard
Regulatory Reporting DashboardRegulatory Reporting Dashboard
Regulatory Reporting Dashboard
 
Open Innovation: Smart Solutions for R&D Pipelines
Open Innovation: Smart Solutions for R&D PipelinesOpen Innovation: Smart Solutions for R&D Pipelines
Open Innovation: Smart Solutions for R&D Pipelines
 
Accenture Technology Vision for Banking
Accenture Technology Vision for BankingAccenture Technology Vision for Banking
Accenture Technology Vision for Banking
 
2017 Consumer Survey: Healthcare Cybersecurity and Digital Trust
2017 Consumer Survey: Healthcare Cybersecurity and Digital Trust2017 Consumer Survey: Healthcare Cybersecurity and Digital Trust
2017 Consumer Survey: Healthcare Cybersecurity and Digital Trust
 
Corrosion Management
Corrosion ManagementCorrosion Management
Corrosion Management
 

Semelhante a Accenture High Performance Security Report 2016 For Communications

Semelhante a Accenture High Performance Security Report 2016 For Communications (20)

High Performance Security Report - High Technology
High Performance Security Report - High TechnologyHigh Performance Security Report - High Technology
High Performance Security Report - High Technology
 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industry
 
Understanding the 8 Keys to Security Success
Understanding the 8 Keys to Security SuccessUnderstanding the 8 Keys to Security Success
Understanding the 8 Keys to Security Success
 
Healthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber ResilienceHealthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber Resilience
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilience
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber Resilience
 
Accenture Security Report 2016 Infographic for Insurance
Accenture Security Report 2016 Infographic for InsuranceAccenture Security Report 2016 Infographic for Insurance
Accenture Security Report 2016 Infographic for Insurance
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
 
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
 
The Science of Security
The Science of SecurityThe Science of Security
The Science of Security
 
Threat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security ConferenceThreat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security Conference
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Grupo 4 - TEMA II.pptx
Grupo 4  - TEMA II.pptxGrupo 4  - TEMA II.pptx
Grupo 4 - TEMA II.pptx
 
A Beginner's Guide To Cybersecurity For Startups
A Beginner's Guide To Cybersecurity For StartupsA Beginner's Guide To Cybersecurity For Startups
A Beginner's Guide To Cybersecurity For Startups
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
 

Mais de accenture

Mais de accenture (20)

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Accenture High Performance Security Report 2016 For Communications

  • 2. Copyright © 2016 Accenture. All Rights Reserved. 2 SECURE THE ENTERPRISE of large enterprise security executives have confidence in their cyber security strategies of organizations have completely embedded cybersecurity into their cultures
  • 3. Copyright © 2016 Accenture. All Rights Reserved. 3 FAILURE RATES ARE ALARMINGLY HIGH THOUSANDS to MILLIONS of random breach attempts per week More than 90 focused attacks per year; of those, 1 in 3 result in a security breach That’s 2 to 3 effective attacks per month Internal breaches are PARTICULARLY PROBLEMATIC 49% say greatest security impact comes from malicious insiders Yet MORE THAN 1/2 LACK CONFIDENCE in their organizations’ internal monitoring Many security breaches go undetected FOR TOO LONG Detecting a breach takes months for 63% of COMPANIES Internal security teams discover only 65% of EFFECTIVE BREACHES
  • 4. Copyright © 2016 Accenture. All Rights Reserved. FOCUS FOR SUCCESS  Are you confident that you have identified all priority business data assets and their location?  Are you able to defend the organization from a motivated adversary?  Do you have the tools and techniques to react and respond to a targeted attack?  Do you know what the adversary is really after?  How often does your organization ‘practice’ its plan to get better at responses?  How do these attacks affect your business?  Do you have the right alignment, structure, team members, and other resources to execute on your mission?
  • 5. Copyright © 2016 Accenture. All Rights Reserved. 5 AND OUTMANEUVER Only 45% of respondents have confidence in their cybersecurity capabilities regarding any of the seven key domains below, but investment in these areas is critical to improving defenses and strengthening resilience.
  • 6. Copyright © 2016 Accenture. All Rights Reserved. 6 CYBERSECURITY APPROACH PRESSURE TEST SECURITY CAPABILITIES by engaging “white hat” external hackers to simulate attacks MAKE SECURITY EVERYONE’S JOB by fostering a culture of cybersecurity & prioritizing training of all employees PROTECT FROM THE INSIDE OUT by prioritizing protection of organization’s key assets LEAD FROM THE TOP by materially engaging with enterprise leadership & improving the board’s cyber literacy INVEST TO INNOVATE AND OUTMANEUVER, continually innovating to stay ahead of attackers GROW CONFIDENTLY by keeping security connected to the bottom line and to real business needs
  • 7. Copyright © 2016 Accenture. All Rights Reserved. 7 HIGH PERFORMANCE SECURITY RESEARCH 2016 The survey objective was to understand the extent to which companies prioritize security, how comprehensive security plans are, how resilient companies are with regard to security, and the level of spend for security. The survey aimed to measure security capabilities across seven cybersecurity strategy domains identified by Accenture: business alignment, cyber response readiness, strategic threat intelligence, cyber resilience, investment efficiency, governance and leadership, and the extended ecosystem. More than 50 percent of respondents were key decision-makers in cybersecurity strategy and spending, including security, IT and business executives at director level and above at companies with revenues of US $1 billion or more. In 2016 Accenture surveyed 2,000 executives from 12 industries and 15 countries globally, including 75 executives from the Communications industry.
  • 8. Copyright © 2016 Accenture. All Rights Reserved. 8 #CyberSecurity @AccentureSecure THANK YOU accenture.com/cybersecurityreport