SlideShare a Scribd company logo
ACCENTURE
HIGH PERFORMANCE
SECURITY REPORT 2016
FOR HIGH TECHNOLOGY
Copyright © 2017 Accenture. All Rights Reserved. 2
SECURE THE ENTERPRISE
of large enterprise
security executives have
confidence in their cyber
security strategies
of organizations have
completely embedded
cybersecurity into their
cultures
Copyright © 2017 Accenture. All Rights Reserved. 3
FAILURE RATES ARE ALARMINGLY HIGH
THOUSANDS to MILLIONS
of random breach attempts per week
MORE THAN 144 focused
attacks per year; of those,
1 in 4 result in a security breach
That’s 3 effective attacks per month
Internal breaches are
PARTICULARLY PROBLEMATIC
41% say greatest security impact comes
from malicious insiders
Yet NEARLY 60% LACK CONFIDENCE
in their organizations’ internal monitoring
Many security breaches go
undetected FOR TOO LONG
Detecting a breach takes months
for 40% of COMPANIES
Internal security teams
discover only 67% of
EFFECTIVE BREACHES
Copyright © 2017 Accenture. All Rights Reserved.
FOCUS FOR SUCCESS
 Are you confident that you
have identified all priority
business data assets and
their location?
 Are you able to defend the
organization from a
motivated adversary?
 Do you have the tools and
techniques to react and
respond to a targeted
attack?
 Do you know what the
adversary is really after?
 How often does your
organization ‘practice’ its
plan to get better at
responses?
 How do these attacks affect
your business?
 Do you have the right
alignment, structure, team
members,
and other resources to
execute on your mission?
Copyright © 2017 Accenture. All Rights Reserved. 5
AND OUTMANEUVER
Only 44% of respondents have confidence in their cybersecurity capabilities regarding any of the seven key
domains below, but investment in these areas is critical to improving defenses and strengthening resilience.
Copyright © 2017 Accenture. All Rights Reserved. 6
CYBERSECURITY APPROACH
PRESSURE TEST
SECURITY CAPABILITIES
by engaging “white hat” external hackers
to simulate attacks
MAKE SECURITY EVERYONE’S JOB
by fostering a culture of cybersecurity
& prioritizing training of all employees
PROTECT FROM THE INSIDE OUT
by prioritizing protection of organization’s
key assets
LEAD FROM THE TOP
by materially engaging with enterprise
leadership & improving the board’s cyber literacy
INVEST TO INNOVATE
AND OUTMANEUVER,
continually innovating to stay ahead
of attackers
GROW CONFIDENTLY
by keeping security connected to the bottom
line and to real business needs
Copyright © 2017 Accenture. All Rights Reserved. 7
HIGH PERFORMANCE SECURITY RESEARCH 2016
The survey objective was to understand the extent to which companies prioritize security,
how comprehensive security plans are, how resilient companies are with regard to security,
and the level of spend for security.
The survey aimed to measure security capabilities across seven cybersecurity strategy
domains identified by Accenture: business alignment, cyber response readiness, strategic
threat intelligence, cyber resilience, investment efficiency, governance and leadership, and
the extended ecosystem.
More than 50 percent of respondents were key decision-makers in cybersecurity strategy
and spending, including security, IT and business executives at director level and above at
companies with revenues of US $1 billion or more.
In 2016 Accenture surveyed 2,000 executives from 12 industries and 15 countries globally,
including 183 executives from the High Technology industry.
Copyright © 2017 Accenture. All Rights Reserved. 8
#CyberSecurity
@AccentureSecure
THANK YOU
accenture.com/cybersecurityreport

More Related Content

PDF
Выдержит ли ваш бизнес натиск ransomware?
PDF
Planning a move from Perspective to CORE
PPTX
Ernst & Young visuals security survey 2012
PDF
7-lessons-learned-from-bsimm
PDF
Risk Intelligence: Threats are the New Risk
PDF
State of Endpoint Security: The Buyers Mindset
PPTX
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
PDF
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Выдержит ли ваш бизнес натиск ransomware?
Planning a move from Perspective to CORE
Ernst & Young visuals security survey 2012
7-lessons-learned-from-bsimm
Risk Intelligence: Threats are the New Risk
State of Endpoint Security: The Buyers Mindset
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk

What's hot (20)

PDF
Business case for information security program
PDF
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
PDF
The Cyber Security Leap
PDF
Security Awareness: The Best Defence
DOCX
Why security is the kidney not the tail of the dog v3
PDF
EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...
PPTX
Episode IV: A New Scope
PPTX
How to Spend Your Cloud Security Dollar
PPTX
Importance Of A Security Policy
DOCX
Sample Incident Response Plan
PDF
What attackers know about your mobile apps that you don’t: Banking & FinTech
PDF
Managing Indicator Deprecation in ThreatConnect
PDF
7 Undeniable Truths to Making Software Security Better
PPTX
ciso-platform-annual-summit-2013-defending-against-APT
PPTX
Healthcare's Losing Battle Against the Hyper-Connected Machines
PDF
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
PDF
Synopsys Security Event Israel Presentation: Case Study: OSS Management – The...
PDF
OrgAnalytix - Discover the formula of your Team Chemistry
PDF
Hexis Cybersecurity Mission Possible: Taming Rogue Ghost Alerts
PPSX
Fraud management in cloud simulation
Business case for information security program
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
The Cyber Security Leap
Security Awareness: The Best Defence
Why security is the kidney not the tail of the dog v3
EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...
Episode IV: A New Scope
How to Spend Your Cloud Security Dollar
Importance Of A Security Policy
Sample Incident Response Plan
What attackers know about your mobile apps that you don’t: Banking & FinTech
Managing Indicator Deprecation in ThreatConnect
7 Undeniable Truths to Making Software Security Better
ciso-platform-annual-summit-2013-defending-against-APT
Healthcare's Losing Battle Against the Hyper-Connected Machines
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
Synopsys Security Event Israel Presentation: Case Study: OSS Management – The...
OrgAnalytix - Discover the formula of your Team Chemistry
Hexis Cybersecurity Mission Possible: Taming Rogue Ghost Alerts
Fraud management in cloud simulation
Ad

Viewers also liked (6)

PPTX
Intelligent Automation - 3 Lessons Learned
PDF
Telecom Companies: Building Blocks for the Digital Revolution
PDF
Ecosystem Power Plays - Tech Vision 2017 Trend 2
PDF
Your Role in the Ecosystem
PDF
AI is the New UI - Tech Vision 2017 Trend 1
PDF
The Promise of as-a-Service
Intelligent Automation - 3 Lessons Learned
Telecom Companies: Building Blocks for the Digital Revolution
Ecosystem Power Plays - Tech Vision 2017 Trend 2
Your Role in the Ecosystem
AI is the New UI - Tech Vision 2017 Trend 1
The Promise of as-a-Service
Ad

Similar to High Performance Security Report - High Technology (20)

PPTX
Accenture High Performance Security Report 2016 for Insurance
PPTX
Accenture High Performance Security Report 2016 For Communications
PDF
Accenture Security Report 2016 Infographic for Insurance
PPTX
Accenture Security Services: Defending and empowering the resilient digital b...
PDF
Healthcare Providers: 2018 State of Cyber Resilience
PDF
Healthcare Payers: 2018 State of Cyber Resilience
PDF
Outside the (Black) Box: Protecting Core Operations in Energy
PPTX
State of Cyber Resilience In Australia 2018
PPT
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
PPT
Intelligent Security: Defending the Digital Business
PPTX
2018 State of Cyber Resilience
PPTX
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
PPTX
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
PDF
2018 State of Cyber Resilience - New York
PDF
Accenture Banking Security Index
PPTX
2018 State of Cyber Resilience Insurance
PDF
The State of Cybersecurity and Digital Trust 2016
PDF
Insuring your future: Cybersecurity and the insurance industry
PPTX
2017 Cost Of Cyber Crime Study | Insights On The Security Investments That Ma...
PPTX
The Cyber Security Leap: From Laggard to Leader
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 For Communications
Accenture Security Report 2016 Infographic for Insurance
Accenture Security Services: Defending and empowering the resilient digital b...
Healthcare Providers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilience
Outside the (Black) Box: Protecting Core Operations in Energy
State of Cyber Resilience In Australia 2018
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Intelligent Security: Defending the Digital Business
2018 State of Cyber Resilience
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
2018 State of Cyber Resilience - New York
Accenture Banking Security Index
2018 State of Cyber Resilience Insurance
The State of Cybersecurity and Digital Trust 2016
Insuring your future: Cybersecurity and the insurance industry
2017 Cost Of Cyber Crime Study | Insights On The Security Investments That Ma...
The Cyber Security Leap: From Laggard to Leader

Recently uploaded (20)

PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPT
Teaching material agriculture food technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Empathic Computing: Creating Shared Understanding
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
cuic standard and advanced reporting.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
KodekX | Application Modernization Development
PPTX
Cloud computing and distributed systems.
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Building Integrated photovoltaic BIPV_UPV.pdf
Teaching material agriculture food technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Empathic Computing: Creating Shared Understanding
Advanced methodologies resolving dimensionality complications for autism neur...
cuic standard and advanced reporting.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Machine learning based COVID-19 study performance prediction
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Understanding_Digital_Forensics_Presentation.pptx
MYSQL Presentation for SQL database connectivity
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KodekX | Application Modernization Development
Cloud computing and distributed systems.
“AI and Expert System Decision Support & Business Intelligence Systems”

High Performance Security Report - High Technology

  • 2. Copyright © 2017 Accenture. All Rights Reserved. 2 SECURE THE ENTERPRISE of large enterprise security executives have confidence in their cyber security strategies of organizations have completely embedded cybersecurity into their cultures
  • 3. Copyright © 2017 Accenture. All Rights Reserved. 3 FAILURE RATES ARE ALARMINGLY HIGH THOUSANDS to MILLIONS of random breach attempts per week MORE THAN 144 focused attacks per year; of those, 1 in 4 result in a security breach That’s 3 effective attacks per month Internal breaches are PARTICULARLY PROBLEMATIC 41% say greatest security impact comes from malicious insiders Yet NEARLY 60% LACK CONFIDENCE in their organizations’ internal monitoring Many security breaches go undetected FOR TOO LONG Detecting a breach takes months for 40% of COMPANIES Internal security teams discover only 67% of EFFECTIVE BREACHES
  • 4. Copyright © 2017 Accenture. All Rights Reserved. FOCUS FOR SUCCESS  Are you confident that you have identified all priority business data assets and their location?  Are you able to defend the organization from a motivated adversary?  Do you have the tools and techniques to react and respond to a targeted attack?  Do you know what the adversary is really after?  How often does your organization ‘practice’ its plan to get better at responses?  How do these attacks affect your business?  Do you have the right alignment, structure, team members, and other resources to execute on your mission?
  • 5. Copyright © 2017 Accenture. All Rights Reserved. 5 AND OUTMANEUVER Only 44% of respondents have confidence in their cybersecurity capabilities regarding any of the seven key domains below, but investment in these areas is critical to improving defenses and strengthening resilience.
  • 6. Copyright © 2017 Accenture. All Rights Reserved. 6 CYBERSECURITY APPROACH PRESSURE TEST SECURITY CAPABILITIES by engaging “white hat” external hackers to simulate attacks MAKE SECURITY EVERYONE’S JOB by fostering a culture of cybersecurity & prioritizing training of all employees PROTECT FROM THE INSIDE OUT by prioritizing protection of organization’s key assets LEAD FROM THE TOP by materially engaging with enterprise leadership & improving the board’s cyber literacy INVEST TO INNOVATE AND OUTMANEUVER, continually innovating to stay ahead of attackers GROW CONFIDENTLY by keeping security connected to the bottom line and to real business needs
  • 7. Copyright © 2017 Accenture. All Rights Reserved. 7 HIGH PERFORMANCE SECURITY RESEARCH 2016 The survey objective was to understand the extent to which companies prioritize security, how comprehensive security plans are, how resilient companies are with regard to security, and the level of spend for security. The survey aimed to measure security capabilities across seven cybersecurity strategy domains identified by Accenture: business alignment, cyber response readiness, strategic threat intelligence, cyber resilience, investment efficiency, governance and leadership, and the extended ecosystem. More than 50 percent of respondents were key decision-makers in cybersecurity strategy and spending, including security, IT and business executives at director level and above at companies with revenues of US $1 billion or more. In 2016 Accenture surveyed 2,000 executives from 12 industries and 15 countries globally, including 183 executives from the High Technology industry.
  • 8. Copyright © 2017 Accenture. All Rights Reserved. 8 #CyberSecurity @AccentureSecure THANK YOU accenture.com/cybersecurityreport