SlideShare a Scribd company logo
6
Most read
7
Most read
8
Most read
Defending and empowering
the resilient digital business
Accenture
Security Services
Sophisticated, well-funded cybercriminals are
outpacing digital businesses
Copyright © 2016 Accenture. All rights reserved. 2
*Source: Ponemon Institute Study 2015
**Source: “Internet Security Threat Report,” Symantec, April 2015, Volume 20.
The impact of security threats is increasingly devastating.
With the explosion of the IoT, cloud and mobile, digital technology is now pervasive.
The opportunities for attack are surging, opening up new areas of vulnerability for security,
privacy and data integrity.
5 out of 6
organizations with
2,500+ employees
attacked**
317 million
new pieces of
malware created
in 2014**
23% rise
in data breaches in
2014*, and a 50%
spike in successful
attacks since
2012**
$7.7 million
damage per
company in
2015*
Business leaders know it’s not enough to focus purely on prevention of
security breaches.
To truly defend and empower your organization, you also need to detect,
intercept and remediate even the most unthinkable threats.
Boardroom priority: “How resilient are we?”
Copyright © 2016 Accenture. All rights reserved. 3
“The impact of security risks is
understated because a lot goes
unreported. The costs of prevention
and remediation are massive and
the brands of organizations and the
reputations of their top leaders are
put at stake.”
Omar Abbosh,
Chief Strategy Officer, Accenture
Build resilience, outpace attackers and turn to what matters most: innovation and
business growth … uninterrupted.
A persistently vigilant business is a resilient business
Copyright © 2016 Accenture. All rights reserved. 4
Defend the Business from
Hostile Adversaries
Empower Business Growth
& Secure Operations
Confidently address growing boardroom
and C-suite security priorities (shareholder
value, revenue and compliance).
Interlock security strategy with business
strategy and spend appropriately on what’s
most important.
Gain security-situational awareness across
expanding business boundaries and
develop rapid-response capabilities to
minimize losses through next-generation
technology such as security automation and
relentless improvement.
Initiate organizational change and transform
security to be digital friendly, taking into
account user centricity, Internet scale and
digital technologies (IoT, big data etc.).
Continuously test environmental robustness
by “training like you fight.”
Manage technology and process security
risks outside of direct organizational
control while leveraging security “As-a-
Service” for greater agility.
Go beyond risk-based tactics to sophisticated, intelligent digital strategies that
are embedded into the fabric of the enterprise and engineered for the future.
Replace vulnerability with capability
Copyright © 2016 Accenture. All rights reserved. 5
Market Maker
Reactionary
and Ad Hoc
Embedded and
Optimized
Threat-centric,
Risk-based
Compliance-
based
MATURITYLEVEL
2015–16
2013–14
2017
Pre-2010
2018 & Beyond
1.0 2.0 3.0 4.0
2018 and Beyond:
Market Maker
Achieving resilience through
innovative security programs
that have a cross-industry impact.
2017: Embedded
and Optimized
Consistently embedding security
and optimizing the business for
agility, freeing staff to innovate.
Today: Threat-centric,
Risk-based
Proactively identifying and
addressing threats in the context
of enterprise risk.
YEARS
Success hinges on a
360-degree approach
and a relentless
focus on business
impact
Copyright © 2016 Accenture. All rights reserved. 6
Business driven
Threat centric
Digitally protected
Adaptive responses
Agile delivery
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Identity
Incident Response
Remediation
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Our mindset: Continuous innovation, empowered
by technology, our culture and ecosystem
Copyright © 2016 Accenture. All rights reserved. 7
Contextual &
behavioral analytics
Culture of non-stop
innovation
Ecosystem
collaboration
Helps clients quickly
identify active threats to
their businesses.
Accelerates R&D and allows
us to focus on innovating
today while anticipating
tomorrow’s threats and
opportunities.
Leverages a vendor-
independent approach
and the best partnerships
and thinking.
At speed, at scale, on demand
Around the world and around the clock, we speed the pace of your
security journey and help you deliver high performance.
Copyright © 2016 Accenture. All rights reserved.
Trusted advisors. Continuously innovating.
Focused on outcomes.
Copyright © 2016 Accenture. All rights reserved. 9
Comprehensive, holistic solutions
Our holistic capabilities—from security
strategy to operations—and 360-degree
approach that takes into account people,
process and technology, address the full
spectrum of security challenges you face.
A partner that helps you thrive
Combining our deep industry and
technology expertise, we collaborate
closely with you to understand your
business, its values and vulnerabilities so
we can help tightly synch your security
strategy with your business goals.
Culture of continuous innovation
Innovating non stop to stay one step ahead.
Collaborating across our network of R&D
labs, centers of excellence and alliance
ecosystem, to develop breakthrough
solutions built to adapt to and thrive in a
sophisticated threat landscape.
Leaders in next-gen Cyber Defense
Investing in advanced automation,
behavioral analytics and threat-centric
solutions to continuously test, identify and
eliminate exploitable security gaps in real
time and at scale.
Business resilience at speed and scale
Managing security around the world and around
the clock, our global scale, end-to-end
capabilities and proven practices speed the
pace of your security journey and help you
deliver high performance—uninterrupted.
Business outcome focused
Driving measurable business outcomes
for clients with transformation-led solutions
that address increasingly complex needs.
Contacts
Copyright © 2016 Accenture. All rights reserved. 10
Bill Phelps
Security Consulting & Managed
Services
bill.phelps@accenture.com
Andrew Vautier
Security Strategy Center of Excellence
Accenture Chief Information Security Officer
andrew.vautier@accenture.com
Steven Culp
Finance & Risk
steven.r.culp@accenture.com
Ryan LaSalle
Security Consulting & Managed
Services
FusionX
ryan.m.lasalle@accenture.com
Kevin Richards
Security Strategy, North America
k.richards@accenture.com
Adam Burden
Application Security
adam.p.burden@accenture.com
Accenture Strategy Accenture Operations Accenture Financial Services
Accenture Technology

More Related Content

PDF
Accenture Security CG&S Cyber Resilience
PPT
Network security
PDF
Accenture Tech Vision 2020 for SAP Solutions
PDF
Executive Perspective Building an OT Security Program from the Top Down
PDF
Driving Growth and Competitiveness: Can The Power of Cloud Lift M&A Value Int...
PDF
Cyber security investments 2021
PPTX
Roadmap to security operations excellence
PPTX
Accenture Program Project and Service Management
Accenture Security CG&S Cyber Resilience
Network security
Accenture Tech Vision 2020 for SAP Solutions
Executive Perspective Building an OT Security Program from the Top Down
Driving Growth and Competitiveness: Can The Power of Cloud Lift M&A Value Int...
Cyber security investments 2021
Roadmap to security operations excellence
Accenture Program Project and Service Management

What's hot (20)

PPTX
Material MDM in the Oil & Gas Industry - A Verdantis Case Study
PDF
Driving change, leading with the SAP®ecosystem
PDF
Security Transformation Services
PDF
Zero trust strategy: cloud security by design
PPTX
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
PPT
Roadmap to IT Security Best Practices
PDF
Reinventing the Last Mile: Win the Race to the Top (AU)
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PDF
PwC Point of View on Cybersecurity Management
PDF
Growth-Driving Enterprise Innovation Model | Accenture
PDF
Security Automation and Machine Learning
PDF
OT Security Architecture & Resilience: Designing for Security Success
PDF
Information Security Awareness for everyone
PDF
Rothke secure360 building a security operations center (soc)
PPTX
Cyber security: A roadmap to secure solutions
PPT
CyberSecurity.ppt
PDF
IT Security & Governance Template
PDF
Cybersecurity roadmap : Global healthcare security architecture
PDF
Engineering Services: con gli ingegneri per creare valore sostenibile
PPTX
PPT-Security-for-Management.pptx
Material MDM in the Oil & Gas Industry - A Verdantis Case Study
Driving change, leading with the SAP®ecosystem
Security Transformation Services
Zero trust strategy: cloud security by design
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Roadmap to IT Security Best Practices
Reinventing the Last Mile: Win the Race to the Top (AU)
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PwC Point of View on Cybersecurity Management
Growth-Driving Enterprise Innovation Model | Accenture
Security Automation and Machine Learning
OT Security Architecture & Resilience: Designing for Security Success
Information Security Awareness for everyone
Rothke secure360 building a security operations center (soc)
Cyber security: A roadmap to secure solutions
CyberSecurity.ppt
IT Security & Governance Template
Cybersecurity roadmap : Global healthcare security architecture
Engineering Services: con gli ingegneri per creare valore sostenibile
PPT-Security-for-Management.pptx
Ad

Viewers also liked (20)

PDF
Developing a Roadmap for Digital Transformation
PPTX
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
PPTX
Digital Business - Accenture
PDF
Accenture strategy-patient-engagement-consumer-loyalty - copy
PDF
Accenture technology vision 2012 final
PPTX
Get Your Shift Together: Aligning Everyone to KPIs that Matter
PPT
Enterprise Security & SSO
PDF
KPMG Automatonophobia
PPTX
IT Automation: Rise of the Process Robots
PDF
Deloitte - Automate this: The business leader’s guide to robotic and intellig...
PDF
6σ, lean and RPA
PDF
Capgemini Consulting RPA: the next revolution of Corporate Functions
PPTX
Sei pronto a passare al continuous delivery?
PDF
RPA and Artificial Intelligence Brochure EQ - U2 b
PDF
Accenture digital transformation - re-imagine from the outside-in
PDF
A case study on Accenture
PDF
What You Need to Know About Robotic Process Automation: How It Works & Real-W...
PPTX
An Introduction to RPA
PPTX
Unlocking the True Benefit of Software Defined Networking
PPSX
What is Robotic Process Automation? (RPA)
Developing a Roadmap for Digital Transformation
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
Digital Business - Accenture
Accenture strategy-patient-engagement-consumer-loyalty - copy
Accenture technology vision 2012 final
Get Your Shift Together: Aligning Everyone to KPIs that Matter
Enterprise Security & SSO
KPMG Automatonophobia
IT Automation: Rise of the Process Robots
Deloitte - Automate this: The business leader’s guide to robotic and intellig...
6σ, lean and RPA
Capgemini Consulting RPA: the next revolution of Corporate Functions
Sei pronto a passare al continuous delivery?
RPA and Artificial Intelligence Brochure EQ - U2 b
Accenture digital transformation - re-imagine from the outside-in
A case study on Accenture
What You Need to Know About Robotic Process Automation: How It Works & Real-W...
An Introduction to RPA
Unlocking the True Benefit of Software Defined Networking
What is Robotic Process Automation? (RPA)
Ad

Similar to Accenture Security Services: Defending and empowering the resilient digital business (20)

PPT
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
PDF
Leveraging Threat Intelligence to Elevate Endpoint Security
PDF
Enable your employees to work securely from anywhere with digital workplace
PDF
Vaishali Mutalik_ Building a Cyber-Resilient Future through Strategic Leaders...
PPTX
FINTECH: Industries we Serve
PDF
The 10 most promising enterprise security solution providers 2019
DOCX
Future-Proof Your Company: The Ultimate Guide to Innovative Cybersecurity Sol...
PDF
The 10 most trusted cyber threat solution providers
PDF
Small Business Playbook for Security and Compliance Success.pdf
PPTX
Small Business Playbook for Security and Compliance Success.pptx
PDF
How Cybersecurity Consulting Businesses Mitigate Risks in Digital Transformat...
PDF
Microsoft Security adoptionguide for the enterprise
PDF
Cybersecurity Challenges - Identifying Key Threats and Trends.pdf
PPTX
Cyber threat Intelligence Dubai - Ahad.pptx
PDF
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
PDF
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
PDF
Why Cybersecurity Services Are Non-Negotiable in Today’s Digital World.pdf
PDF
Protect your hybrid workforce across the attack chain
PDF
PPTX
CyberSecurity Services and Why Cybersecurity is required
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Leveraging Threat Intelligence to Elevate Endpoint Security
Enable your employees to work securely from anywhere with digital workplace
Vaishali Mutalik_ Building a Cyber-Resilient Future through Strategic Leaders...
FINTECH: Industries we Serve
The 10 most promising enterprise security solution providers 2019
Future-Proof Your Company: The Ultimate Guide to Innovative Cybersecurity Sol...
The 10 most trusted cyber threat solution providers
Small Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pptx
How Cybersecurity Consulting Businesses Mitigate Risks in Digital Transformat...
Microsoft Security adoptionguide for the enterprise
Cybersecurity Challenges - Identifying Key Threats and Trends.pdf
Cyber threat Intelligence Dubai - Ahad.pptx
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
Why Cybersecurity Services Are Non-Negotiable in Today’s Digital World.pdf
Protect your hybrid workforce across the attack chain
CyberSecurity Services and Why Cybersecurity is required

More from Accenture Technology (20)

PDF
Accenture Labs Innovation Stories 2020
PPTX
Helping people to be ‘net better off’ with Accenture + Workday
PPTX
Accenture Labs Innovation Stories
PDF
Resetting Tech Culture
PDF
Resetting Tech Culture
PDF
Highlights on the five key trends
PDF
Helping you get back to the workplace confidently
PDF
Driving Workday transformation in a virtual world
PPTX
Accenture + Red Hat
PDF
Accenture and Mercedes Case Study
PDF
Accenture Technology Vision 2020: Infographic
PDF
Accenture Technology Vision 2020: Overview
PDF
Accenture Technology Vision 2020: AI and Me
PDF
Accenture Technology Vision 2020: Innovation DNA
PDF
Elevating the Workforce Experience with Workday
PPTX
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
PPTX
Technology Vision for SAP 2019
PDF
Technology Vision 2019 for Workday
PDF
Accenture Technology Vision 2019 for Pega
PPTX
Oracle Technology Vision Accenture Technology Vision for Oracle 2019
Accenture Labs Innovation Stories 2020
Helping people to be ‘net better off’ with Accenture + Workday
Accenture Labs Innovation Stories
Resetting Tech Culture
Resetting Tech Culture
Highlights on the five key trends
Helping you get back to the workplace confidently
Driving Workday transformation in a virtual world
Accenture + Red Hat
Accenture and Mercedes Case Study
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: Innovation DNA
Elevating the Workforce Experience with Workday
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Technology Vision for SAP 2019
Technology Vision 2019 for Workday
Accenture Technology Vision 2019 for Pega
Oracle Technology Vision Accenture Technology Vision for Oracle 2019

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPT
Teaching material agriculture food technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
cuic standard and advanced reporting.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
KodekX | Application Modernization Development
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Machine learning based COVID-19 study performance prediction
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
MYSQL Presentation for SQL database connectivity
Mobile App Security Testing_ A Comprehensive Guide.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Spectral efficient network and resource selection model in 5G networks
20250228 LYD VKU AI Blended-Learning.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Teaching material agriculture food technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
cuic standard and advanced reporting.pdf
Review of recent advances in non-invasive hemoglobin estimation
Agricultural_Statistics_at_a_Glance_2022_0.pdf
KodekX | Application Modernization Development
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation_ Review paper, used for researhc scholars
Machine learning based COVID-19 study performance prediction
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Unlocking AI with Model Context Protocol (MCP)
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

Accenture Security Services: Defending and empowering the resilient digital business

  • 1. Defending and empowering the resilient digital business Accenture Security Services
  • 2. Sophisticated, well-funded cybercriminals are outpacing digital businesses Copyright © 2016 Accenture. All rights reserved. 2 *Source: Ponemon Institute Study 2015 **Source: “Internet Security Threat Report,” Symantec, April 2015, Volume 20. The impact of security threats is increasingly devastating. With the explosion of the IoT, cloud and mobile, digital technology is now pervasive. The opportunities for attack are surging, opening up new areas of vulnerability for security, privacy and data integrity. 5 out of 6 organizations with 2,500+ employees attacked** 317 million new pieces of malware created in 2014** 23% rise in data breaches in 2014*, and a 50% spike in successful attacks since 2012** $7.7 million damage per company in 2015*
  • 3. Business leaders know it’s not enough to focus purely on prevention of security breaches. To truly defend and empower your organization, you also need to detect, intercept and remediate even the most unthinkable threats. Boardroom priority: “How resilient are we?” Copyright © 2016 Accenture. All rights reserved. 3 “The impact of security risks is understated because a lot goes unreported. The costs of prevention and remediation are massive and the brands of organizations and the reputations of their top leaders are put at stake.” Omar Abbosh, Chief Strategy Officer, Accenture
  • 4. Build resilience, outpace attackers and turn to what matters most: innovation and business growth … uninterrupted. A persistently vigilant business is a resilient business Copyright © 2016 Accenture. All rights reserved. 4 Defend the Business from Hostile Adversaries Empower Business Growth & Secure Operations Confidently address growing boardroom and C-suite security priorities (shareholder value, revenue and compliance). Interlock security strategy with business strategy and spend appropriately on what’s most important. Gain security-situational awareness across expanding business boundaries and develop rapid-response capabilities to minimize losses through next-generation technology such as security automation and relentless improvement. Initiate organizational change and transform security to be digital friendly, taking into account user centricity, Internet scale and digital technologies (IoT, big data etc.). Continuously test environmental robustness by “training like you fight.” Manage technology and process security risks outside of direct organizational control while leveraging security “As-a- Service” for greater agility.
  • 5. Go beyond risk-based tactics to sophisticated, intelligent digital strategies that are embedded into the fabric of the enterprise and engineered for the future. Replace vulnerability with capability Copyright © 2016 Accenture. All rights reserved. 5 Market Maker Reactionary and Ad Hoc Embedded and Optimized Threat-centric, Risk-based Compliance- based MATURITYLEVEL 2015–16 2013–14 2017 Pre-2010 2018 & Beyond 1.0 2.0 3.0 4.0 2018 and Beyond: Market Maker Achieving resilience through innovative security programs that have a cross-industry impact. 2017: Embedded and Optimized Consistently embedding security and optimizing the business for agility, freeing staff to innovate. Today: Threat-centric, Risk-based Proactively identifying and addressing threats in the context of enterprise risk. YEARS
  • 6. Success hinges on a 360-degree approach and a relentless focus on business impact Copyright © 2016 Accenture. All rights reserved. 6 Business driven Threat centric Digitally protected Adaptive responses Agile delivery Strategy & Business Alignment Assessment & Architecture Governance, Risk & Compliance People & Culture Change Application & Data Security Platform & Infrastructure Security Digital Identity Incident Response Remediation Vulnerability Management & Threat Intelligence Advanced Adversary Simulations Security Monitoring Cyber Threat Analytics
  • 7. Our mindset: Continuous innovation, empowered by technology, our culture and ecosystem Copyright © 2016 Accenture. All rights reserved. 7 Contextual & behavioral analytics Culture of non-stop innovation Ecosystem collaboration Helps clients quickly identify active threats to their businesses. Accelerates R&D and allows us to focus on innovating today while anticipating tomorrow’s threats and opportunities. Leverages a vendor- independent approach and the best partnerships and thinking.
  • 8. At speed, at scale, on demand Around the world and around the clock, we speed the pace of your security journey and help you deliver high performance. Copyright © 2016 Accenture. All rights reserved.
  • 9. Trusted advisors. Continuously innovating. Focused on outcomes. Copyright © 2016 Accenture. All rights reserved. 9 Comprehensive, holistic solutions Our holistic capabilities—from security strategy to operations—and 360-degree approach that takes into account people, process and technology, address the full spectrum of security challenges you face. A partner that helps you thrive Combining our deep industry and technology expertise, we collaborate closely with you to understand your business, its values and vulnerabilities so we can help tightly synch your security strategy with your business goals. Culture of continuous innovation Innovating non stop to stay one step ahead. Collaborating across our network of R&D labs, centers of excellence and alliance ecosystem, to develop breakthrough solutions built to adapt to and thrive in a sophisticated threat landscape. Leaders in next-gen Cyber Defense Investing in advanced automation, behavioral analytics and threat-centric solutions to continuously test, identify and eliminate exploitable security gaps in real time and at scale. Business resilience at speed and scale Managing security around the world and around the clock, our global scale, end-to-end capabilities and proven practices speed the pace of your security journey and help you deliver high performance—uninterrupted. Business outcome focused Driving measurable business outcomes for clients with transformation-led solutions that address increasingly complex needs.
  • 10. Contacts Copyright © 2016 Accenture. All rights reserved. 10 Bill Phelps Security Consulting & Managed Services bill.phelps@accenture.com Andrew Vautier Security Strategy Center of Excellence Accenture Chief Information Security Officer andrew.vautier@accenture.com Steven Culp Finance & Risk steven.r.culp@accenture.com Ryan LaSalle Security Consulting & Managed Services FusionX ryan.m.lasalle@accenture.com Kevin Richards Security Strategy, North America k.richards@accenture.com Adam Burden Application Security adam.p.burden@accenture.com Accenture Strategy Accenture Operations Accenture Financial Services Accenture Technology