SlideShare uma empresa Scribd logo
1 de 19
The Cyber Security Leap:
From Laggard to Leader
How Australian organisations can learn from the Leapfrogs
2Copyright © 2015 Accenture All rights reserved. 2Copyright © 2015 Accenture All rights reserved.
How do some organisation achieve better
security performance?
We compared organisation that were able to “leapfrog” their
security effectiveness against others that remained static.
Defining a Leapfrog organisation
Key findings
Implications
About the research
3Copyright © 2015 Accenture All rights reserved. 3Copyright © 2015 Accenture All rights reserved.
Leapfrog organisation improved their security
effectiveness an average of 53% over two years
Success characteristics can be summarised across three areas
Research and analysis conducted by Accenture in Collaboration with the Ponemon Institute, LLC.
All data in this presentation taken from “The Cyber Security Leap: From Laggard to Leader, 2015
• Security is a business
priority aligned with the
enterprise’s goals
• Focus on innovation
• Outsourcing is a
component of the
security program
• Respond proactively to
major changes to the
threat landscape
• Open communications with
CEOs and corporate boards
• Establish dedicated
security budgets that have
steadily increased
• Chief Information Security
Officer (CISO) has authority
to define and manage the
security strategy
• Deploy enterprise risk
management
procedures
• Embrace new and
disruptive security
technologies as part
of the strategy
Strategy Technology Governance
4Copyright © 2015 Accenture All rights reserved. 4Copyright © 2015 Accenture All rights reserved.
Leapfrog organisation improved their security
effectiveness an average of 53% over two years
Success characteristics can be summarised across three areas
• Security is a business
priority aligned with the
enterprise’s goals
• Focus on innovation
• Outsourcing is a
component of the
security program
• Respond proactively to
major changes to the
threat landscape
• Open communications with
CEOs and corporate boards
• Establish dedicated
security budgets that have
steadily increased
• Chief Information Security
Officer (CISO) has authority
to define and manage the
security strategy
Strategy Governance
• Deploy enterprise risk
management
procedures
• Embrace new and
disruptive security
technologies as part
of the strategy
Technology
Research and analysis conducted by Accenture in Collaboration with the Ponemon Institute, LLC.
All data in this presentation taken from “The Cyber Security Leap: From Laggard to Leader, 2015
5Copyright © 2015 Accenture All rights reserved. 5Copyright © 2015 Accenture All rights reserved.
Leapfrog organisation improved their security
effectiveness an average of 53% over two years
Success characteristics can be summarised across three areas
• Security is a business
priority aligned with the
enterprise’s goals
• Focus on innovation
• Outsourcing is a
component of the
security program
• Respond proactively to
major changes to the
threat landscape
• Open communications with
CEOs and corporate boards
• Establish dedicated
security budgets that have
steadily increased
• Chief Information Security
Officer (CISO) has authority
to define and manage the
security strategy
• Deploy enterprise risk
management
procedures
• Embrace new and
disruptive security
technologies as part
of the strategy
Strategy Technology Governance
Research and analysis conducted by Accenture in Collaboration with the Ponemon Institute, LLC.
All data in this presentation taken from “The Cyber Security Leap: From Laggard to Leader, 2015
6Copyright © 2015 Accenture All rights reserved. 6Copyright © 2015 Accenture All rights reserved.
Organisations with static security effectiveness
demonstrated different characteristics
• Operate security under a veil of stealth, secrecy and
underfunding
• Prioritise external threats
• Focus on prevention rather than quick detection or containment
• Drive security investments by compliance with regulations and
policies
• View security as diminishing employee productivity
• Believe security budgets are inadequate for meeting the
company’s security mission
7Copyright © 2015 Accenture All rights reserved. 7Copyright © 2015 Accenture All rights reserved.
Leapfrog organisations value innovation as
a way to strengthen their security posture
Higher value placed on
security innovation
33%
Higher level of security
innovation change in
the past two years
45%
More security
innovation
20%
8Copyright © 2015 Accenture All rights reserved. 8Copyright © 2015 Accenture All rights reserved.
Establishing a security strategy as a
business priority separates Leapfrog from
Static organisations
Security and business objectives aligned
70%
55%
69%
45%
63%
40%
Security is priority
Security strategy exists
LEAPFROG
STATIC
LEAPFROG
STATIC
LEAPFROG
STATIC
9Copyright © 2015 Accenture All rights reserved. 9Copyright © 2015 Accenture All rights reserved.
Security outsourcing is often a component of
Leapfrog organisations’ strategies
Outsourcing core security operations can greatly increase
security effectiveness by providing access to advanced
technology and expert resources.
Leapfrog Static
Has strategy & does
not outsource
security operations
23%
15%
55%
32%
Has strategy &
outsources security
operations
10Copyright © 2015 Accenture All rights reserved. 10Copyright © 2015 Accenture All rights reserved.
Leapfrog organisations proactively use
advanced technologies to secure their network
and cloud environments
LeapfrogStatic (Rankings on a 10 point scale, 1 = low; 10 = high)
Secure (encrypt)
data stored in
cloud environments
7.186.00
Establish security
protocols over
big data
6.334.94
Pinpoints
anomalies in
network traffic
8.557.45
Provide advance
warning about
threats and
attackers
8.277.56
11Copyright © 2015 Accenture All rights reserved. 11Copyright © 2015 Accenture All rights reserved.
Leapfrog organisations focus more on securing
network, sensitive data and the cloud; Static
organisations focus more on locking things down.
Control insecure
mobile devices
including BYOD
7.167.76
Limit insecure
devices from
accessing
security systems
6.037.18
LeapfrogStatic (Rankings on a 10 point scale, 1 = low; 10 = high)
12Copyright © 2015 Accenture All rights reserved. 12Copyright © 2015 Accenture All rights reserved.
Establishing strong governance and controls
supports Leapfrog security effectiveness
Important governance components include dedicated budget,
use of benchmarks and metrics and regular communications
with board of directors.
Metrics to
evaluate
security
operations
20%
26%
Enterprise risk
management
procedures
35%
Regular
reporting to the
board of
directors
34%
Benchmark
Security
operations
13Copyright © 2015 Accenture All rights reserved. 13Copyright © 2015 Accenture All rights reserved.
The CISO role in Leapfrog organisations reflects
the importance placed on security
While both types of organisations have a CISO,
the level of responsibility is notably different.
CISO defines
security strategy
and initiatives
Leapfrog 71%
Static 60%
CISO directly
reports to a
senior executive
71%
58%
CISO is accountable
for budgets or
discretionary spending
65%
55%
14Copyright © 2015 Accenture All rights reserved. 14Copyright © 2015 Accenture All rights reserved.
Security effectiveness can be notably improved
over a short period of time, by applying lessons
learned from three priority areas
Strategy Technology Governance
15Copyright © 2015 Accenture All rights reserved. 15Copyright © 2015 Accenture All rights reserved.
Suggestions for developing or improving
your security strategy
• Establish a security strategy that encourages innovation, has
dedicated budget and programs, a strong eco-system and a clear
vision for how innovation gets on-boarded into production.
• Develop the ability to adapt quickly
and proactively to the changing threat landscape
• Help the organisation embrace digital disruption
• Align security and organisational priorities
• Treat security as a business priority
16Copyright © 2015 Accenture All rights reserved. 16Copyright © 2015 Accenture All rights reserved.
Suggested areas for technology focus
• Seek out technology and capabilities
that enhance the user experience
and productivity
• Balance prevention, detection and
response better—lessen the focus
on prevention
• Better exploit data within the
organisation to gain an advantage in
detection and response times—move
toward security intelligence
17Copyright © 2015 Accenture All rights reserved. 17Copyright © 2015 Accenture All rights reserved.
Governance measures to improve performance
• Foster a working relationship between
CISO and the board to take effective
action; educate and collaborate to
articulate and prioritise business risk
• Use benchmarks and metrics to
continually assess the strategy and
evolve the organisation’s posture
• Outsource security operations as
appropriate for best use of available
expert resources
• Eliminate fire-fighting and use
resources effectively
18Copyright © 2015 Accenture All rights reserved. 18Copyright © 2015 Accenture All rights reserved.
Organisations studied represent various
industries and sizes across Australia, NA, Europe,
Middle East and Asia Pacific
16%
14%
14%
10%
8%
9%
6%
6%
5%
5%
4%
4% 9%
11%
28%
24%
18%
11%
Less than
1,000
1,000 to
5,000
5,001 to
10,000
10,001 to
25,000
25,000 to
75,000
More than
75,000Financial
services
Industries represented Organisation size
Public
sector
Services
Retail
Energy and
utilities
Industrial
Health &
pharmaceutical
Consumer
Technology
and software
Transportation
Other
Hospitality
Education and research, 1%
Communications, 1%
19Copyright © 2015 Accenture All rights reserved. 19Copyright © 2015 Accenture All rights reserved.
For more information:
- Visit accenture.com.au/security
- Contact Accenture APAC Security Lead, Jean-Marie Abi-Ghanem:
j.abi-ghanem@accenture.com
19Copyright © 2015 Accenture All rights reserved.

Mais conteúdo relacionado

Mais procurados

Smarter Investments, Outstanding Results: Resources Industries Digital Transf...
Smarter Investments, Outstanding Results: Resources Industries Digital Transf...Smarter Investments, Outstanding Results: Resources Industries Digital Transf...
Smarter Investments, Outstanding Results: Resources Industries Digital Transf...accenture
 
Cyber Security: Take a Security Leap Forward
Cyber Security: Take a Security Leap ForwardCyber Security: Take a Security Leap Forward
Cyber Security: Take a Security Leap Forwardaccenture
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...Accenture Technology
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016Accenture Operations
 
Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationHarnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationAccenture Operations
 
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture Insurance
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportAccenture Technology
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientAccenture Operations
 
Being digital: Fast-forward to the right digital strategy
Being digital: Fast-forward to the right digital strategyBeing digital: Fast-forward to the right digital strategy
Being digital: Fast-forward to the right digital strategyaccenture
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Accenture Technology
 
People-Centric Growth: The Primacy of People in the Digital Age
People-Centric Growth: The Primacy of People in the Digital AgePeople-Centric Growth: The Primacy of People in the Digital Age
People-Centric Growth: The Primacy of People in the Digital Ageaccenture
 
Assault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities GridAssault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities Gridaccenture
 
Stand Out or Stand Back
Stand Out or Stand BackStand Out or Stand Back
Stand Out or Stand Backaccenture
 
Intelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital BusinessIntelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital Businessaccenture
 
Increasing Agility to Fuel Growth in the Communications Industry
Increasing Agility to Fuel Growth in the Communications IndustryIncreasing Agility to Fuel Growth in the Communications Industry
Increasing Agility to Fuel Growth in the Communications Industryaccenture
 
Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3accenture
 
Digital Shoring for Networked Innovation
Digital Shoring for Networked InnovationDigital Shoring for Networked Innovation
Digital Shoring for Networked Innovationaccenture
 
A new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growthA new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growthaccenture
 
Intelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons LearnedIntelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons LearnedAccenture Technology
 
#ListenLearnLead - 2015 International Women's Day Research
#ListenLearnLead - 2015 International Women's Day Research#ListenLearnLead - 2015 International Women's Day Research
#ListenLearnLead - 2015 International Women's Day Researchaccenture
 

Mais procurados (20)

Smarter Investments, Outstanding Results: Resources Industries Digital Transf...
Smarter Investments, Outstanding Results: Resources Industries Digital Transf...Smarter Investments, Outstanding Results: Resources Industries Digital Transf...
Smarter Investments, Outstanding Results: Resources Industries Digital Transf...
 
Cyber Security: Take a Security Leap Forward
Cyber Security: Take a Security Leap ForwardCyber Security: Take a Security Leap Forward
Cyber Security: Take a Security Leap Forward
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationHarnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open Innovation
 
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for Insurance
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
Being digital: Fast-forward to the right digital strategy
Being digital: Fast-forward to the right digital strategyBeing digital: Fast-forward to the right digital strategy
Being digital: Fast-forward to the right digital strategy
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
People-Centric Growth: The Primacy of People in the Digital Age
People-Centric Growth: The Primacy of People in the Digital AgePeople-Centric Growth: The Primacy of People in the Digital Age
People-Centric Growth: The Primacy of People in the Digital Age
 
Assault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities GridAssault and Batteries: Protecting All Aspects of The Utilities Grid
Assault and Batteries: Protecting All Aspects of The Utilities Grid
 
Stand Out or Stand Back
Stand Out or Stand BackStand Out or Stand Back
Stand Out or Stand Back
 
Intelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital BusinessIntelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital Business
 
Increasing Agility to Fuel Growth in the Communications Industry
Increasing Agility to Fuel Growth in the Communications IndustryIncreasing Agility to Fuel Growth in the Communications Industry
Increasing Agility to Fuel Growth in the Communications Industry
 
Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3Platform Economy - Tech Vision 2016 Trend 3
Platform Economy - Tech Vision 2016 Trend 3
 
Digital Shoring for Networked Innovation
Digital Shoring for Networked InnovationDigital Shoring for Networked Innovation
Digital Shoring for Networked Innovation
 
A new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growthA new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growth
 
Intelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons LearnedIntelligent Automation - 3 Lessons Learned
Intelligent Automation - 3 Lessons Learned
 
#ListenLearnLead - 2015 International Women's Day Research
#ListenLearnLead - 2015 International Women's Day Research#ListenLearnLead - 2015 International Women's Day Research
#ListenLearnLead - 2015 International Women's Day Research
 

Semelhante a The cyber security leap: From laggard to leader

Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalAccenture Technology
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalAccenture Operations
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Pierre Audoin Consultants
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderAccenture Insurance
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-levelDonald Tabone
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber ResilienceAccenture Security
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseGeorge Goodall
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Needsimplyme12345
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsVMware Tanzu
 
Healthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber ResilienceHealthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber Resilienceaccenture
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 
Quantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate LeadershipQuantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate LeadershipNetskope
 

Semelhante a The cyber security leap: From laggard to leader (20)

Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises?
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to Leader
 
Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2Insight into Security Leader Success Part 2
Insight into Security Leader Success Part 2
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber Resilience
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
 
7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan
 
Healthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber ResilienceHealthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber Resilience
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
 
Quantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate LeadershipQuantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate Leadership
 

Mais de Accenture Australia

State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018Accenture Australia
 
The digital government: shaped around its citizens
The digital government: shaped around its citizensThe digital government: shaped around its citizens
The digital government: shaped around its citizensAccenture Australia
 
Digital HR technology comes of age. The digitisation of human resources
Digital HR technology comes of age. The digitisation of human resourcesDigital HR technology comes of age. The digitisation of human resources
Digital HR technology comes of age. The digitisation of human resourcesAccenture Australia
 

Mais de Accenture Australia (6)

State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
 
AI: The future of AU
AI: The future of AUAI: The future of AU
AI: The future of AU
 
Network Transformation Roadmap
Network Transformation RoadmapNetwork Transformation Roadmap
Network Transformation Roadmap
 
Getting Robots Right
Getting Robots RightGetting Robots Right
Getting Robots Right
 
The digital government: shaped around its citizens
The digital government: shaped around its citizensThe digital government: shaped around its citizens
The digital government: shaped around its citizens
 
Digital HR technology comes of age. The digitisation of human resources
Digital HR technology comes of age. The digitisation of human resourcesDigital HR technology comes of age. The digitisation of human resources
Digital HR technology comes of age. The digitisation of human resources
 

Último

Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 

Último (20)

Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 

The cyber security leap: From laggard to leader

  • 1. The Cyber Security Leap: From Laggard to Leader How Australian organisations can learn from the Leapfrogs
  • 2. 2Copyright © 2015 Accenture All rights reserved. 2Copyright © 2015 Accenture All rights reserved. How do some organisation achieve better security performance? We compared organisation that were able to “leapfrog” their security effectiveness against others that remained static. Defining a Leapfrog organisation Key findings Implications About the research
  • 3. 3Copyright © 2015 Accenture All rights reserved. 3Copyright © 2015 Accenture All rights reserved. Leapfrog organisation improved their security effectiveness an average of 53% over two years Success characteristics can be summarised across three areas Research and analysis conducted by Accenture in Collaboration with the Ponemon Institute, LLC. All data in this presentation taken from “The Cyber Security Leap: From Laggard to Leader, 2015 • Security is a business priority aligned with the enterprise’s goals • Focus on innovation • Outsourcing is a component of the security program • Respond proactively to major changes to the threat landscape • Open communications with CEOs and corporate boards • Establish dedicated security budgets that have steadily increased • Chief Information Security Officer (CISO) has authority to define and manage the security strategy • Deploy enterprise risk management procedures • Embrace new and disruptive security technologies as part of the strategy Strategy Technology Governance
  • 4. 4Copyright © 2015 Accenture All rights reserved. 4Copyright © 2015 Accenture All rights reserved. Leapfrog organisation improved their security effectiveness an average of 53% over two years Success characteristics can be summarised across three areas • Security is a business priority aligned with the enterprise’s goals • Focus on innovation • Outsourcing is a component of the security program • Respond proactively to major changes to the threat landscape • Open communications with CEOs and corporate boards • Establish dedicated security budgets that have steadily increased • Chief Information Security Officer (CISO) has authority to define and manage the security strategy Strategy Governance • Deploy enterprise risk management procedures • Embrace new and disruptive security technologies as part of the strategy Technology Research and analysis conducted by Accenture in Collaboration with the Ponemon Institute, LLC. All data in this presentation taken from “The Cyber Security Leap: From Laggard to Leader, 2015
  • 5. 5Copyright © 2015 Accenture All rights reserved. 5Copyright © 2015 Accenture All rights reserved. Leapfrog organisation improved their security effectiveness an average of 53% over two years Success characteristics can be summarised across three areas • Security is a business priority aligned with the enterprise’s goals • Focus on innovation • Outsourcing is a component of the security program • Respond proactively to major changes to the threat landscape • Open communications with CEOs and corporate boards • Establish dedicated security budgets that have steadily increased • Chief Information Security Officer (CISO) has authority to define and manage the security strategy • Deploy enterprise risk management procedures • Embrace new and disruptive security technologies as part of the strategy Strategy Technology Governance Research and analysis conducted by Accenture in Collaboration with the Ponemon Institute, LLC. All data in this presentation taken from “The Cyber Security Leap: From Laggard to Leader, 2015
  • 6. 6Copyright © 2015 Accenture All rights reserved. 6Copyright © 2015 Accenture All rights reserved. Organisations with static security effectiveness demonstrated different characteristics • Operate security under a veil of stealth, secrecy and underfunding • Prioritise external threats • Focus on prevention rather than quick detection or containment • Drive security investments by compliance with regulations and policies • View security as diminishing employee productivity • Believe security budgets are inadequate for meeting the company’s security mission
  • 7. 7Copyright © 2015 Accenture All rights reserved. 7Copyright © 2015 Accenture All rights reserved. Leapfrog organisations value innovation as a way to strengthen their security posture Higher value placed on security innovation 33% Higher level of security innovation change in the past two years 45% More security innovation 20%
  • 8. 8Copyright © 2015 Accenture All rights reserved. 8Copyright © 2015 Accenture All rights reserved. Establishing a security strategy as a business priority separates Leapfrog from Static organisations Security and business objectives aligned 70% 55% 69% 45% 63% 40% Security is priority Security strategy exists LEAPFROG STATIC LEAPFROG STATIC LEAPFROG STATIC
  • 9. 9Copyright © 2015 Accenture All rights reserved. 9Copyright © 2015 Accenture All rights reserved. Security outsourcing is often a component of Leapfrog organisations’ strategies Outsourcing core security operations can greatly increase security effectiveness by providing access to advanced technology and expert resources. Leapfrog Static Has strategy & does not outsource security operations 23% 15% 55% 32% Has strategy & outsources security operations
  • 10. 10Copyright © 2015 Accenture All rights reserved. 10Copyright © 2015 Accenture All rights reserved. Leapfrog organisations proactively use advanced technologies to secure their network and cloud environments LeapfrogStatic (Rankings on a 10 point scale, 1 = low; 10 = high) Secure (encrypt) data stored in cloud environments 7.186.00 Establish security protocols over big data 6.334.94 Pinpoints anomalies in network traffic 8.557.45 Provide advance warning about threats and attackers 8.277.56
  • 11. 11Copyright © 2015 Accenture All rights reserved. 11Copyright © 2015 Accenture All rights reserved. Leapfrog organisations focus more on securing network, sensitive data and the cloud; Static organisations focus more on locking things down. Control insecure mobile devices including BYOD 7.167.76 Limit insecure devices from accessing security systems 6.037.18 LeapfrogStatic (Rankings on a 10 point scale, 1 = low; 10 = high)
  • 12. 12Copyright © 2015 Accenture All rights reserved. 12Copyright © 2015 Accenture All rights reserved. Establishing strong governance and controls supports Leapfrog security effectiveness Important governance components include dedicated budget, use of benchmarks and metrics and regular communications with board of directors. Metrics to evaluate security operations 20% 26% Enterprise risk management procedures 35% Regular reporting to the board of directors 34% Benchmark Security operations
  • 13. 13Copyright © 2015 Accenture All rights reserved. 13Copyright © 2015 Accenture All rights reserved. The CISO role in Leapfrog organisations reflects the importance placed on security While both types of organisations have a CISO, the level of responsibility is notably different. CISO defines security strategy and initiatives Leapfrog 71% Static 60% CISO directly reports to a senior executive 71% 58% CISO is accountable for budgets or discretionary spending 65% 55%
  • 14. 14Copyright © 2015 Accenture All rights reserved. 14Copyright © 2015 Accenture All rights reserved. Security effectiveness can be notably improved over a short period of time, by applying lessons learned from three priority areas Strategy Technology Governance
  • 15. 15Copyright © 2015 Accenture All rights reserved. 15Copyright © 2015 Accenture All rights reserved. Suggestions for developing or improving your security strategy • Establish a security strategy that encourages innovation, has dedicated budget and programs, a strong eco-system and a clear vision for how innovation gets on-boarded into production. • Develop the ability to adapt quickly and proactively to the changing threat landscape • Help the organisation embrace digital disruption • Align security and organisational priorities • Treat security as a business priority
  • 16. 16Copyright © 2015 Accenture All rights reserved. 16Copyright © 2015 Accenture All rights reserved. Suggested areas for technology focus • Seek out technology and capabilities that enhance the user experience and productivity • Balance prevention, detection and response better—lessen the focus on prevention • Better exploit data within the organisation to gain an advantage in detection and response times—move toward security intelligence
  • 17. 17Copyright © 2015 Accenture All rights reserved. 17Copyright © 2015 Accenture All rights reserved. Governance measures to improve performance • Foster a working relationship between CISO and the board to take effective action; educate and collaborate to articulate and prioritise business risk • Use benchmarks and metrics to continually assess the strategy and evolve the organisation’s posture • Outsource security operations as appropriate for best use of available expert resources • Eliminate fire-fighting and use resources effectively
  • 18. 18Copyright © 2015 Accenture All rights reserved. 18Copyright © 2015 Accenture All rights reserved. Organisations studied represent various industries and sizes across Australia, NA, Europe, Middle East and Asia Pacific 16% 14% 14% 10% 8% 9% 6% 6% 5% 5% 4% 4% 9% 11% 28% 24% 18% 11% Less than 1,000 1,000 to 5,000 5,001 to 10,000 10,001 to 25,000 25,000 to 75,000 More than 75,000Financial services Industries represented Organisation size Public sector Services Retail Energy and utilities Industrial Health & pharmaceutical Consumer Technology and software Transportation Other Hospitality Education and research, 1% Communications, 1%
  • 19. 19Copyright © 2015 Accenture All rights reserved. 19Copyright © 2015 Accenture All rights reserved. For more information: - Visit accenture.com.au/security - Contact Accenture APAC Security Lead, Jean-Marie Abi-Ghanem: j.abi-ghanem@accenture.com 19Copyright © 2015 Accenture All rights reserved.

Notas do Editor

  1. Leapfrog companies place a 33% greater value on security innovation. Leapfroggers rate the importance of security innovation as 8.1, while static companies rate it as 6.1 on average. Furthermore, 36% of leapfroggers have a dedicated budget for security innovation, compared to only 21% of static companies. So leapfroggers are 71% more likely to value security innovation.
  2. Leapfroggers place a 20% higher value on the importance of using metrics: The importance of deploying metrics is rated at 7.8 by leapfroggers vs. 6.5 by static companies.