SlideShare a Scribd company logo
Copyright © 2016 Accenture All rights reserved.
Continuous
Cyber Attacks:
Building the Next-Gen
Infrastructure for the
New Normal
Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved.
Digital infrastructure plays
a critical role in combatting
cyber attacks
What is an effective digital infrastructure?
How can it best be maintained?
How can leaders choose from among the
wide range of tools and technology
solutions available?
2
1
2
3
Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved.
A comprehensive view of digital
security integrates cyber defense
into the enterprise environment
A next-generation security infrastructure should:
• Provide greater information visibility, context and meaning
regarding security events.
• Give technical analysts the ability to understand the impact of
security events in relation to business operations.
• Offer flexible and open access to data and features.
• Drive much deeper integration levels as security infrastructures
quickly becomes completely defined by software.
• Leverage automation for faster response times and scalability.
3
Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved.
Create the self-defending
enterprise.
To deliver a quantum leap in
performance.
Focus attention on
technology maturity.
To promote security based on
business context.
Align threat intelligence with
the business environment.
To prepare defenses for what's
coming and hunt for what already
might be in the environment.
Implement deceptions
to trap intruders.
To enable higher fidelity detection of
adversaries, learn from their attacks
and limit damage.
Leverage automation.
To focus security staff on more
challenging issues.
Feed the analytics engines.
To identify subtle threats based on
shifting behaviors in networks and
devices.
Creating a next-generation
security infrastructure requires the
following actions
4
Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved.
Organizations should rethink their
focus on tools to extract the most
benefit from them
• Infrastructure siloes prevent organizations from
realizing the full potential from the tools and
technology deployed.
• Instead, orchestrate existing infrastructure
capabilities to disrupt attacks.
• Assess new tools with an eye to replacing
multiple older technologies with a single new one.
5
Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved.
Build a next-generation security
infrastructure to help achieve
operational excellence
• Experiment: Pilot new security technologies and automation
solutions, develop use cases and simulate sophisticated attacks.
• Create cross-functional teams: Instead of having separate
groups managing the network, the servers and security, organize
these experts so they can interact, collaborate and increase the
effectiveness of security automation.
• Team to develop talent: Help staff become specialists, while
ensuring that the business, infrastructure and security teams
know about all projects so they can benefit from each other’s
innovations.
• Raise security’s internal profile: Make sure the chief
information security officer’s level of influence over the
infrastructure is commensurate with that of the IT leader.
6
Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved.
Adopt a comprehensive view to
the organization’s infrastructure
security requirements
7
Look beyond tools. Invest only in
technologies with
proven performance.
Ensure all business
units remain aligned
and are ready to
respond
to cyber attacks.
Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved.
Thank You
Please visit Accenture.com/cyberdefensestrategies
for additional information.
#CyberDefense
Follow us on Twitter @AccentureSecure
8
Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved.
About Accenture
Accenture is a leading global professional services company,
providing a broad range of services and solutions in strategy,
consulting, digital, technology and operations. Combining
unmatched experience and specialized skills across more than 40
industries and all business functions—underpinned by the world’s
largest delivery network—Accenture works at the intersection of
business and technology to help clients improve their performance
and create sustainable value for their stakeholders.
With approximately 373,000 people serving clients in more than
120 countries, Accenture drives innovation to improve the way the
world works and lives. Visit us at www.accenture.com.
Copyright © 2015 Accenture All rights reserved. 9

More Related Content

PDF
The State of Cybersecurity and Digital Trust 2016
PPTX
Accenture Security Services: Defending and empowering the resilient digital b...
PPTX
How to Make Your Enterprise Cyber Resilient
PPTX
Security Technology Vision 2016
PPTX
Collective Ingenuity against Cyber Attacks
PPTX
Accenture High Performance Security Report 2016 For Communications
PDF
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
PPTX
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
The State of Cybersecurity and Digital Trust 2016
Accenture Security Services: Defending and empowering the resilient digital b...
How to Make Your Enterprise Cyber Resilient
Security Technology Vision 2016
Collective Ingenuity against Cyber Attacks
Accenture High Performance Security Report 2016 For Communications
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal

What's hot (20)

PDF
FusionX & Accenture: One Global Security Team
PPTX
Cloud in the Boardroom
PPTX
Intelligent Infrastructures: Unlocking the Digital Business
PPTX
The cyber security leap: From laggard to leader
PPTX
Accenture High Performance Security Report 2016 for Insurance
PPT
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
PPTX
Harnessing the Power of Entrepreneurs to Open Innovation
PPTX
Security Technology Vision 2016
PDF
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
PPT
Technology Factor: Accelerating Your Journey to As a Service
PDF
Outside the (Black) Box: Protecting Core Operations in Energy
PPT
The New World of As a Service
PPTX
The Cyber Security Leap: From Laggard to Leader
PDF
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
POT
Accenture Liquid Application Studio
PPTX
Leading the Digital Enterprise
PDF
Agricultural Chemicals 2016 Supply Chain Benchmarking Study
PDF
Security Implications of Accenture Technology Vision 2015 - Executive Report
PPTX
Accenture Regulatory Compliance Platform
PPT
Technology Factor: Accelerating Your Journey to As a Service
FusionX & Accenture: One Global Security Team
Cloud in the Boardroom
Intelligent Infrastructures: Unlocking the Digital Business
The cyber security leap: From laggard to leader
Accenture High Performance Security Report 2016 for Insurance
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Harnessing the Power of Entrepreneurs to Open Innovation
Security Technology Vision 2016
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Technology Factor: Accelerating Your Journey to As a Service
Outside the (Black) Box: Protecting Core Operations in Energy
The New World of As a Service
The Cyber Security Leap: From Laggard to Leader
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Accenture Liquid Application Studio
Leading the Digital Enterprise
Agricultural Chemicals 2016 Supply Chain Benchmarking Study
Security Implications of Accenture Technology Vision 2015 - Executive Report
Accenture Regulatory Compliance Platform
Technology Factor: Accelerating Your Journey to As a Service
Ad

Viewers also liked (13)

PPTX
Building Digital Trust : The role of data ethics in the digital age
PDF
The Promise of as-a-Service
PPTX
Accenture Security Framework for AWS: Monetary Authority of Singapore Guidelines
PDF
Accenture Cloud-based Lab Reviews Case Study
PPTX
Accenture Enkitec Group: Oracle database and Engineered Systems
PDF
Digital Trust - Tech Vision 2016 Trend 5
PDF
Driving Growth and Competitiveness: Can The Power of Cloud Lift M&A Value Int...
PDF
Technology Vision 2017 - Overview
PPTX
Guarding and Growing Personal Data Value
PDF
The Six Distinctions of Procurement
PDF
Sustaining Competitiveness in a Digital Age: How Trust Can Make or Break The ...
PDF
Technology Vision 2016 - Overview
PPTX
Security Technology Vision 2016
Building Digital Trust : The role of data ethics in the digital age
The Promise of as-a-Service
Accenture Security Framework for AWS: Monetary Authority of Singapore Guidelines
Accenture Cloud-based Lab Reviews Case Study
Accenture Enkitec Group: Oracle database and Engineered Systems
Digital Trust - Tech Vision 2016 Trend 5
Driving Growth and Competitiveness: Can The Power of Cloud Lift M&A Value Int...
Technology Vision 2017 - Overview
Guarding and Growing Personal Data Value
The Six Distinctions of Procurement
Sustaining Competitiveness in a Digital Age: How Trust Can Make or Break The ...
Technology Vision 2016 - Overview
Security Technology Vision 2016
Ad

Similar to Continuous cyber attacks: Building the next-gen infrastructure (20)

PDF
Assessing the Business Value of SDN Datacenter Security Solutions
PDF
Securing the Industrial Enterprise
PDF
br-security-connected-top-5-trends
PDF
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
PPTX
Challenges In Modern IT Infrastructure.pptx
PDF
The data center impact of cloud, analytics, mobile, social and security rlw03...
PPTX
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
PPTX
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
PPT
Intelligent Security: Defending the Digital Business
PPTX
New Bandicam Crack Download Free Unlimited 2025 - setup
PPTX
Revo Uninstaller Pro Crack Download Free Setup
PPTX
Nitro Pro Crack 14.36.1.0 + Keygen Free Download [Latest]
PPTX
EndNote Crack X20.6.5 With Product Key Free latest 2025 Download
PPTX
PowerISO Crack + Serial Key Latest Version
PPTX
CCleaner Professional Key 2025 with Crack [Latest]
PPTX
Driver Easy Pro 6.1.1 With License Key 2025 [Latest Version]
PDF
How to Build a Secure IT Infrastructure in 2025.
PDF
OT Security Architecture & Resilience: Designing for Security Success
PDF
Cyber Security small
PDF
Toward Continuous Cybersecurity with Network Automation
Assessing the Business Value of SDN Datacenter Security Solutions
Securing the Industrial Enterprise
br-security-connected-top-5-trends
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
Challenges In Modern IT Infrastructure.pptx
The data center impact of cloud, analytics, mobile, social and security rlw03...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Intelligent Security: Defending the Digital Business
New Bandicam Crack Download Free Unlimited 2025 - setup
Revo Uninstaller Pro Crack Download Free Setup
Nitro Pro Crack 14.36.1.0 + Keygen Free Download [Latest]
EndNote Crack X20.6.5 With Product Key Free latest 2025 Download
PowerISO Crack + Serial Key Latest Version
CCleaner Professional Key 2025 with Crack [Latest]
Driver Easy Pro 6.1.1 With License Key 2025 [Latest Version]
How to Build a Secure IT Infrastructure in 2025.
OT Security Architecture & Resilience: Designing for Security Success
Cyber Security small
Toward Continuous Cybersecurity with Network Automation

More from Accenture Operations (20)

PDF
Making Finance the Predictive Powerhouse | SlideShare | Accenture
PDF
Making Finance the Predictive Powerhouse | SlideShare | Accenture
PDF
Making Finance the Predictive Powerhouse | SlideShare | Accenture
PDF
Network Operations | SlideShare | Accenture
PDF
Network Operations | SlideShare | Accenture
PDF
Start your Sustainability Journey | SlideShare | Accenture
PDF
Start your Sustainability Journey | SlideShare | Accenture
PDF
The Changing Role of Compliance | Accenture
PDF
The Changing Role of Compliance | Accenture
PPTX
Driving change: Unlocking data to transform the front office
PDF
Marketing Operations | SlideShare | Accenture
PDF
The Value Multiplier | SlideShare | Accenture
PDF
Intelligent Talent & HR Operations | SlideShare | Accenture
PDF
Intelligent Marketing Operations | SlideShare | Accenture
PDF
Elevate with Intelligent Supply Chain | SlideShare | Accenture
PDF
Fast-Track to Future-Ready Finance Operations
PDF
Elevate Every Decision with Intelligent Procurement
PDF
Elevate Every Decision with Digital Inside Sales
PDF
Fast Track to Future Ready Banking Operations
PDF
Fast-Track to Future-Ready Insurance Operations
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Network Operations | SlideShare | Accenture
Network Operations | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | Accenture
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | Accenture
Driving change: Unlocking data to transform the front office
Marketing Operations | SlideShare | Accenture
The Value Multiplier | SlideShare | Accenture
Intelligent Talent & HR Operations | SlideShare | Accenture
Intelligent Marketing Operations | SlideShare | Accenture
Elevate with Intelligent Supply Chain | SlideShare | Accenture
Fast-Track to Future-Ready Finance Operations
Elevate Every Decision with Intelligent Procurement
Elevate Every Decision with Digital Inside Sales
Fast Track to Future Ready Banking Operations
Fast-Track to Future-Ready Insurance Operations

Recently uploaded (20)

PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PDF
WRN_Investor_Presentation_August 2025.pdf
PPTX
DMT - Profile Brief About Business .pptx
PPT
Data mining for business intelligence ch04 sharda
PDF
Types of control:Qualitative vs Quantitative
PPTX
5 Stages of group development guide.pptx
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PDF
Nidhal Samdaie CV - International Business Consultant
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PDF
Business model innovation report 2022.pdf
PPTX
Probability Distribution, binomial distribution, poisson distribution
PDF
Hindu Circuler Economy - Model (Concept)
PDF
A Brief Introduction About Julia Allison
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PPTX
Amazon (Business Studies) management studies
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PDF
Lecture 3 - Risk Management and Compliance.pdf
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
WRN_Investor_Presentation_August 2025.pdf
DMT - Profile Brief About Business .pptx
Data mining for business intelligence ch04 sharda
Types of control:Qualitative vs Quantitative
5 Stages of group development guide.pptx
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
Nidhal Samdaie CV - International Business Consultant
unit 1 COST ACCOUNTING AND COST SHEET
Business model innovation report 2022.pdf
Probability Distribution, binomial distribution, poisson distribution
Hindu Circuler Economy - Model (Concept)
A Brief Introduction About Julia Allison
Reconciliation AND MEMORANDUM RECONCILATION
Power and position in leadershipDOC-20250808-WA0011..pdf
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Amazon (Business Studies) management studies
340036916-American-Literature-Literary-Period-Overview.ppt
Lecture 3 - Risk Management and Compliance.pdf

Continuous cyber attacks: Building the next-gen infrastructure

  • 1. Copyright © 2016 Accenture All rights reserved. Continuous Cyber Attacks: Building the Next-Gen Infrastructure for the New Normal
  • 2. Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved. Digital infrastructure plays a critical role in combatting cyber attacks What is an effective digital infrastructure? How can it best be maintained? How can leaders choose from among the wide range of tools and technology solutions available? 2 1 2 3
  • 3. Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved. A comprehensive view of digital security integrates cyber defense into the enterprise environment A next-generation security infrastructure should: • Provide greater information visibility, context and meaning regarding security events. • Give technical analysts the ability to understand the impact of security events in relation to business operations. • Offer flexible and open access to data and features. • Drive much deeper integration levels as security infrastructures quickly becomes completely defined by software. • Leverage automation for faster response times and scalability. 3
  • 4. Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved. Create the self-defending enterprise. To deliver a quantum leap in performance. Focus attention on technology maturity. To promote security based on business context. Align threat intelligence with the business environment. To prepare defenses for what's coming and hunt for what already might be in the environment. Implement deceptions to trap intruders. To enable higher fidelity detection of adversaries, learn from their attacks and limit damage. Leverage automation. To focus security staff on more challenging issues. Feed the analytics engines. To identify subtle threats based on shifting behaviors in networks and devices. Creating a next-generation security infrastructure requires the following actions 4
  • 5. Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved. Organizations should rethink their focus on tools to extract the most benefit from them • Infrastructure siloes prevent organizations from realizing the full potential from the tools and technology deployed. • Instead, orchestrate existing infrastructure capabilities to disrupt attacks. • Assess new tools with an eye to replacing multiple older technologies with a single new one. 5
  • 6. Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved. Build a next-generation security infrastructure to help achieve operational excellence • Experiment: Pilot new security technologies and automation solutions, develop use cases and simulate sophisticated attacks. • Create cross-functional teams: Instead of having separate groups managing the network, the servers and security, organize these experts so they can interact, collaborate and increase the effectiveness of security automation. • Team to develop talent: Help staff become specialists, while ensuring that the business, infrastructure and security teams know about all projects so they can benefit from each other’s innovations. • Raise security’s internal profile: Make sure the chief information security officer’s level of influence over the infrastructure is commensurate with that of the IT leader. 6
  • 7. Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved. Adopt a comprehensive view to the organization’s infrastructure security requirements 7 Look beyond tools. Invest only in technologies with proven performance. Ensure all business units remain aligned and are ready to respond to cyber attacks.
  • 8. Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved. Thank You Please visit Accenture.com/cyberdefensestrategies for additional information. #CyberDefense Follow us on Twitter @AccentureSecure 8
  • 9. Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved. About Accenture Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions—underpinned by the world’s largest delivery network—Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With approximately 373,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com. Copyright © 2015 Accenture All rights reserved. 9