SlideShare a Scribd company logo
MOST INSURERS ARE CONFIDENT IN THEIR ABILITY
TO PROTECT THE ENTERPRISE. YET, NEARLY 1 IN 3
FOCUSED BREACH ATTEMPTS SUCCEED.
MANY COMPANIES
INVEST INEFFECTIVELY
IN CYBERSECURITY...
DEFINE
CYBERSECURITY
SUCCESS
Improve alignment of
cybersecurity strategies
with business imperatives
and improve ability to
detect and prohibit more
advanced attacks.
BUSINESS ALIGNMENT
Only 32% of businesses are able
to identify high-value assets and
business processes.
Understand scenarios that
business, identify key drivers,
decision points and barriers
to strategy development.
SECURITY
CAPABILITIES
Engage “white-hat”
external hackers for attack
simulations to establish a
realistic assessment of
internal capabilities.
PROTECT FROM
THE INSIDE OUT
Prioritize protection of the
organization’s key assets
and focus on the internal
incursions with greatest
potential impact.
...AND RELY TOO MUCH ON
COMPLIANCE.
would spend extra budget on the same
things they're doing now
30%
16%
would invest in cybersecurity training
Compliance frameworks and
foundations but don’t protect a
company from breaches.
KEEP
INNOVATING
Improve overall maturity
of the security team and
its skills in protecting
the business from
devastating losses.
Improve cybersecurity
strategy alignment with
business imperatives.
Continuously improve
your ability to detect
and prevent advanced
attack scenarios.
Invest in state-of-the-art
programs that enable
outmaneuvering
adversaries vs. investing
more in existing programs.
MAKE SECURITY
EVERYONE’S JOB
96% of breaches not
detected by security team
members, are found by
employees. Prioritize
training for all employees.
LEAD FROM
THE TOP
CISOs must materially
engage with enterprise
leadership and make the
case that cybersecurity is a
critical priority in protecting
company value.
INVEST TO INNOVATE
AND OUTMANEUVER
BUILD CONFIDENCE
IN THE SECURITY
ORGANIZATION
ABOUT ACCENTURE
Accenture is a leading global professional services
company, providing a broad range of services and
solutions in strategy, consulting, digital, technology and
operations. Combining unmatched experience and
specialized skills across more than 40 industries and all
business functions—underpinned by the world’s largest
delivery network—Accenture works at the intersection of
business and technology to help clients improve their
performance and create sustainable value for their
stakeholders. With approximately 384,000 people serving
clients in more than 120 countries, Accenture drives
innovation to improve the way the world works and lives.
Visit us at www.accenture.com.
REBOOT YOUR APPROACH
DEAL EFFECTIVELY
WITH THREATS
GOVERNANCE AND
LEADERSHIP
Only 37% of businesses have a clear
cybersecurity chain of command.
Focus on cybersecurity
accountability, nurture a
security-minded culture and
create a clear-cut cybersecurity
chain of command.
STRATEGIC THREAT
CONTEXT
Only 38% of businesses are competent in
business-relevant threat monitoring.
Align the security program with the
business strategy by analyzing
competitive and geo-political risks,
peer monitoring and other areas of
cybersecurity threats.
CYBER RESILIENCE
Only 37% of businesses have systems
and processes that are properly
designed in accordance with cyber
resilience requirements.
Understand the threat landscape,
design key asset protection
approaches and use “design for
resilience” techniques to limit a
cyber attack’s impact.
CYBER RESPONSE
READINESS
Only 34% of businesses have proper
cyber incident escalation paths.
Develop a robust response
plan, strong cyber incident
communications, tested plans
to protect and recover key assets
THE EXTENDED ECOSYSTEM
Only 38% of businesses are competent
at dealing with third-party cybersecurity,
only 36% are competent at cybersecurity
regulatory compliance.
Be ready to cooperate during crisis
management, develop third-party
cybersecurity clauses and
agreements and focus on
regulatory compliance.
INVESTMENT EFFICIENCY
Only 33% of cybersecurity investments
protect key assets.
of and compare cybersecurity
investments against industry
benchmarks, organizational
business objectives and
cybersecurity trends.
4 of 5
their abilities to protect their
organizations from cyber attacks
Accenture’s 2016 global survey on high performance
security reveals several such contradictions.
72%
say they have completely
embedded cybersecurity into
their cultures
1 in 3
targeted attacks result in a security
attacks per month
113
targeted cyber attacks are faced by the
average organization per year in the
insurance industry
FOLLOW US ON TWITTER:
@AccentureSecure
FOR MORE INFORMATION, VISIT:
www.accenture.com/cybersecurityreport
Copyright © 2017 Accenture
All rights reserved.
Accenture, its logo, and
High Performance Delivered are
trademarks of Accenture.
1 2 3
4 5 6
2
1
3
INVEST IN YOUR CYBERSECURITY CAPABILITY
ACROSS 7 DOMAINS TO IMPROVE DEFENSES
AND STRENGTHEN RESILIENCE.
FACING THE
CYBERSECURITY
CONUNDRUM
HIGH PERFORMANCE
SECURITY REPORT 2016

More Related Content

PDF
What CIOs Need To Tell Their Boards About Cyber Security
PDF
Cyber security: Five leadership issues worthy of board and executive attention
PDF
MP_OneSheet_VulnThreat
PDF
A CIRO's-eye view of Digital Risk Management
PDF
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
PDF
Improving Cyber Security Literacy in Boards & Executives
PPTX
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
PDF
The Cyber Security Readiness of Canadian Organizations
What CIOs Need To Tell Their Boards About Cyber Security
Cyber security: Five leadership issues worthy of board and executive attention
MP_OneSheet_VulnThreat
A CIRO's-eye view of Digital Risk Management
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
Improving Cyber Security Literacy in Boards & Executives
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
The Cyber Security Readiness of Canadian Organizations

What's hot (20)

PDF
EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...
PDF
Implement Effective Cybersecurity Practices In 2021 With Top LA Prevention Re...
PDF
Coso deloitte-managing-cyber-risk-in-a-digital-age
PDF
Avoiding The Seven Deadly Sins of IT
PDF
Executive Summary of the 2016 Scalar Security Study
PPTX
Cyber risk tips for boards and executive teams
PDF
Leveraging Board Governance for Cybersecurity
PDF
Cybersecurity in the Boardroom
PDF
Scalar security study2017_slideshare_rev[1]
DOCX
Tanium Taps Incident Response Expert as Chief Security Architect
PPT
CEOs leading Recovery from Cyber Attack
PDF
Convince your board - cyber attack prevention is better than cure
PDF
Before the Breach: Using threat intelligence to stop attackers in their tracks
PDF
Understanding the Insider Threat to your organisation
PDF
Industry Check: Where Real Companies Stand With Threat Intelligence
PDF
Ri cyber-security-for-your-small-business
PPT
Role of The Board In IT Governance & Cyber Security-Steve Howse
PPT
Online Security Breach Compromises 77 Million Client Accounts
PPTX
Linked in misti_rs_1.0
EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...
Implement Effective Cybersecurity Practices In 2021 With Top LA Prevention Re...
Coso deloitte-managing-cyber-risk-in-a-digital-age
Avoiding The Seven Deadly Sins of IT
Executive Summary of the 2016 Scalar Security Study
Cyber risk tips for boards and executive teams
Leveraging Board Governance for Cybersecurity
Cybersecurity in the Boardroom
Scalar security study2017_slideshare_rev[1]
Tanium Taps Incident Response Expert as Chief Security Architect
CEOs leading Recovery from Cyber Attack
Convince your board - cyber attack prevention is better than cure
Before the Breach: Using threat intelligence to stop attackers in their tracks
Understanding the Insider Threat to your organisation
Industry Check: Where Real Companies Stand With Threat Intelligence
Ri cyber-security-for-your-small-business
Role of The Board In IT Governance & Cyber Security-Steve Howse
Online Security Breach Compromises 77 Million Client Accounts
Linked in misti_rs_1.0
Ad

Viewers also liked (14)

PPTX
Accenture High Performance Security Report 2016 for Insurance
PDF
Join In The Race Or Be Left Behind: How ‘Change’ Is Changing The Competitive ...
PDF
Time to join the revolution: Agile change in financial services
PDF
ISLAM DAN KEGAGALAN DEMOKRASI: Menelusuri Jejak Politik Indonesia Hingga Peng...
PPTX
What is Persona development and how to create effective user persona?
PDF
Data-Centric Insurance: How the London market can embrace analytics and regai...
PDF
Design in business: It’s not about creating something pretty. It’s about crea...
PDF
thinking-lean-bpm-lean-and-six-sigmaall-together-now
PDF
SCB-Indikatorer Februari 2017
PDF
Team personas: A new look at personas for the enterprise context
PDF
JCIHK Recommended course - supervising skills - Be the SUPERvisor
PPTX
Comparative report on life insurance study in thailand, indonesia and vietnam...
PDF
Getting it right from the start: Taking a strategic approach to client onboar...
PPTX
Global Research: The Connected Industrial Workforce
Accenture High Performance Security Report 2016 for Insurance
Join In The Race Or Be Left Behind: How ‘Change’ Is Changing The Competitive ...
Time to join the revolution: Agile change in financial services
ISLAM DAN KEGAGALAN DEMOKRASI: Menelusuri Jejak Politik Indonesia Hingga Peng...
What is Persona development and how to create effective user persona?
Data-Centric Insurance: How the London market can embrace analytics and regai...
Design in business: It’s not about creating something pretty. It’s about crea...
thinking-lean-bpm-lean-and-six-sigmaall-together-now
SCB-Indikatorer Februari 2017
Team personas: A new look at personas for the enterprise context
JCIHK Recommended course - supervising skills - Be the SUPERvisor
Comparative report on life insurance study in thailand, indonesia and vietnam...
Getting it right from the start: Taking a strategic approach to client onboar...
Global Research: The Connected Industrial Workforce
Ad

Similar to Accenture Security Report 2016 Infographic for Insurance (20)

PPTX
Accenture High Performance Security Report 2016 For Communications
PPTX
High Performance Security Report - High Technology
PDF
Healthcare Payers: 2018 State of Cyber Resilience
PDF
Healthcare Providers: 2018 State of Cyber Resilience
PPTX
Accenture Security Services: Defending and empowering the resilient digital b...
PDF
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
PPTX
State of Cyber Resilience In Australia 2018
PPTX
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
PPTX
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
PPTX
2018 State of Cyber Resilience Insurance
PPT
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
PPTX
2018 State of Cyber Resilience
PDF
Accenture Banking Security Index
PDF
2018 State of Cyber Resilience - New York
PPTX
Securing Consumer Trust
PDF
Insuring your future: Cybersecurity and the insurance industry
PPTX
How to Make Your Enterprise Cyber Resilient
PDF
2018 State of Cyber Reslience in Healthcare
PDF
Cybersecurity report-vol-8
PDF
Integrating-Cyber-Security-for-Increased-Effectiveness
Accenture High Performance Security Report 2016 For Communications
High Performance Security Report - High Technology
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber Resilience
Accenture Security Services: Defending and empowering the resilient digital b...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
State of Cyber Resilience In Australia 2018
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
2018 State of Cyber Resilience Insurance
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
2018 State of Cyber Resilience
Accenture Banking Security Index
2018 State of Cyber Resilience - New York
Securing Consumer Trust
Insuring your future: Cybersecurity and the insurance industry
How to Make Your Enterprise Cyber Resilient
2018 State of Cyber Reslience in Healthcare
Cybersecurity report-vol-8
Integrating-Cyber-Security-for-Increased-Effectiveness

More from Accenture Insurance (20)

PPTX
Future-ready Insurance Systems – An Insurer’s Guide to Optimizing Technology ...
PPTX
Open Insurance - Unlocking Ecosystem Opportunities For Tomorrow’s Insurance I...
PPTX
Technology Vision for Insurance 2020
PDF
Unlocking Value from Unstructured Data
PPTX
Open Insurance - Unlocking Ecosystem Opportunities For Tomorrow’s Insurance I...
PDF
Accelerating Growth with Data-Driven Customer Experience
PDF
Scale Innovation and Achieve Value with Future Systems
PDF
AI: Built To Scale
PDF
Striking Balance With Whole-Brain Leadership
PDF
Decoding Transformation
PDF
Workforce 2025 Infographic - Capital Markets Skills and Roles of the Future
PDF
Workforce 2025 Infographic - Banking Skills and Roles of the Future
PDF
Workforce 2025 Infographic - Insurance Skills and Roles of the Future
PPTX
Workforce 2025 - Financial Services Skills & Roles Of The Future
PDF
Make your Wise Pivot to the New
PDF
Three Preconditions To Pivoting Wisely
PDF
Accelerating Growth With Applied Customer Engagement
PDF
Breathe New Life into Life Insurance
PDF
Experience the Power of More
PDF
Way Beyond Marketing - The Rise of the Hyper-Relevant CMO
Future-ready Insurance Systems – An Insurer’s Guide to Optimizing Technology ...
Open Insurance - Unlocking Ecosystem Opportunities For Tomorrow’s Insurance I...
Technology Vision for Insurance 2020
Unlocking Value from Unstructured Data
Open Insurance - Unlocking Ecosystem Opportunities For Tomorrow’s Insurance I...
Accelerating Growth with Data-Driven Customer Experience
Scale Innovation and Achieve Value with Future Systems
AI: Built To Scale
Striking Balance With Whole-Brain Leadership
Decoding Transformation
Workforce 2025 Infographic - Capital Markets Skills and Roles of the Future
Workforce 2025 Infographic - Banking Skills and Roles of the Future
Workforce 2025 Infographic - Insurance Skills and Roles of the Future
Workforce 2025 - Financial Services Skills & Roles Of The Future
Make your Wise Pivot to the New
Three Preconditions To Pivoting Wisely
Accelerating Growth With Applied Customer Engagement
Breathe New Life into Life Insurance
Experience the Power of More
Way Beyond Marketing - The Rise of the Hyper-Relevant CMO

Recently uploaded (20)

PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PPT
Data mining for business intelligence ch04 sharda
PDF
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
PDF
Laughter Yoga Basic Learning Workshop Manual
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PDF
Nidhal Samdaie CV - International Business Consultant
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PDF
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
PDF
Business model innovation report 2022.pdf
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PPTX
HR Introduction Slide (1).pptx on hr intro
PDF
MSPs in 10 Words - Created by US MSP Network
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PDF
DOC-20250806-WA0002._20250806_112011_0000.pdf
DOCX
Euro SEO Services 1st 3 General Updates.docx
PPTX
Lecture (1)-Introduction.pptx business communication
PDF
Roadmap Map-digital Banking feature MB,IB,AB
340036916-American-Literature-Literary-Period-Overview.ppt
Ôn tập tiếng anh trong kinh doanh nâng cao
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
Data mining for business intelligence ch04 sharda
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
Laughter Yoga Basic Learning Workshop Manual
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
Nidhal Samdaie CV - International Business Consultant
unit 1 COST ACCOUNTING AND COST SHEET
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
Business model innovation report 2022.pdf
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
HR Introduction Slide (1).pptx on hr intro
MSPs in 10 Words - Created by US MSP Network
Belch_12e_PPT_Ch18_Accessible_university.pptx
DOC-20250806-WA0002._20250806_112011_0000.pdf
Euro SEO Services 1st 3 General Updates.docx
Lecture (1)-Introduction.pptx business communication
Roadmap Map-digital Banking feature MB,IB,AB

Accenture Security Report 2016 Infographic for Insurance

  • 1. MOST INSURERS ARE CONFIDENT IN THEIR ABILITY TO PROTECT THE ENTERPRISE. YET, NEARLY 1 IN 3 FOCUSED BREACH ATTEMPTS SUCCEED. MANY COMPANIES INVEST INEFFECTIVELY IN CYBERSECURITY... DEFINE CYBERSECURITY SUCCESS Improve alignment of cybersecurity strategies with business imperatives and improve ability to detect and prohibit more advanced attacks. BUSINESS ALIGNMENT Only 32% of businesses are able to identify high-value assets and business processes. Understand scenarios that business, identify key drivers, decision points and barriers to strategy development. SECURITY CAPABILITIES Engage “white-hat” external hackers for attack simulations to establish a realistic assessment of internal capabilities. PROTECT FROM THE INSIDE OUT Prioritize protection of the organization’s key assets and focus on the internal incursions with greatest potential impact. ...AND RELY TOO MUCH ON COMPLIANCE. would spend extra budget on the same things they're doing now 30% 16% would invest in cybersecurity training Compliance frameworks and foundations but don’t protect a company from breaches. KEEP INNOVATING Improve overall maturity of the security team and its skills in protecting the business from devastating losses. Improve cybersecurity strategy alignment with business imperatives. Continuously improve your ability to detect and prevent advanced attack scenarios. Invest in state-of-the-art programs that enable outmaneuvering adversaries vs. investing more in existing programs. MAKE SECURITY EVERYONE’S JOB 96% of breaches not detected by security team members, are found by employees. Prioritize training for all employees. LEAD FROM THE TOP CISOs must materially engage with enterprise leadership and make the case that cybersecurity is a critical priority in protecting company value. INVEST TO INNOVATE AND OUTMANEUVER BUILD CONFIDENCE IN THE SECURITY ORGANIZATION ABOUT ACCENTURE Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions—underpinned by the world’s largest delivery network—Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With approximately 384,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com. REBOOT YOUR APPROACH DEAL EFFECTIVELY WITH THREATS GOVERNANCE AND LEADERSHIP Only 37% of businesses have a clear cybersecurity chain of command. Focus on cybersecurity accountability, nurture a security-minded culture and create a clear-cut cybersecurity chain of command. STRATEGIC THREAT CONTEXT Only 38% of businesses are competent in business-relevant threat monitoring. Align the security program with the business strategy by analyzing competitive and geo-political risks, peer monitoring and other areas of cybersecurity threats. CYBER RESILIENCE Only 37% of businesses have systems and processes that are properly designed in accordance with cyber resilience requirements. Understand the threat landscape, design key asset protection approaches and use “design for resilience” techniques to limit a cyber attack’s impact. CYBER RESPONSE READINESS Only 34% of businesses have proper cyber incident escalation paths. Develop a robust response plan, strong cyber incident communications, tested plans to protect and recover key assets THE EXTENDED ECOSYSTEM Only 38% of businesses are competent at dealing with third-party cybersecurity, only 36% are competent at cybersecurity regulatory compliance. Be ready to cooperate during crisis management, develop third-party cybersecurity clauses and agreements and focus on regulatory compliance. INVESTMENT EFFICIENCY Only 33% of cybersecurity investments protect key assets. of and compare cybersecurity investments against industry benchmarks, organizational business objectives and cybersecurity trends. 4 of 5 their abilities to protect their organizations from cyber attacks Accenture’s 2016 global survey on high performance security reveals several such contradictions. 72% say they have completely embedded cybersecurity into their cultures 1 in 3 targeted attacks result in a security attacks per month 113 targeted cyber attacks are faced by the average organization per year in the insurance industry FOLLOW US ON TWITTER: @AccentureSecure FOR MORE INFORMATION, VISIT: www.accenture.com/cybersecurityreport Copyright © 2017 Accenture All rights reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture. 1 2 3 4 5 6 2 1 3 INVEST IN YOUR CYBERSECURITY CAPABILITY ACROSS 7 DOMAINS TO IMPROVE DEFENSES AND STRENGTHEN RESILIENCE. FACING THE CYBERSECURITY CONUNDRUM HIGH PERFORMANCE SECURITY REPORT 2016