SlideShare una empresa de Scribd logo
1 de 39
Reinventing the Internet for Trust
Results for: Insurance
SECURING THE
DIGITALECONOMY
EXECUTIVE
SUMMARY
Copyright © 2018 Accenture All rights reserved. 3
COMPANIES ARE LARGELY DEPENDENT ON THE INTERNET FOR
BUSINESS GROWTH; IN FIVE YEARS, AVERAGE TARGETED
GROWTH DEPENDENT ON THE INTERNET WILL DOUBLE.
Q1, Q2, Q3
90% rank business growth through
internet-enabled initiatives in their top
three strategic priorities
77% of businesses became largely
dependent on the internet over the past
10 years
Average targeted growth dependent
on the Internet economy (%)
Base = Total sample; n=100
19
26
34
q3_1 q3_2 q3_3
Next year Next three years Next five years
92% say a trustworthy
internet economy is
very or extremely
critical to their
organization’s future
growth.
82% believe that
without a dramatic
improvement to the
security of the
internet, the
advancement of the
internet economy will
be severely hindered.
Copyright © 2018 Accenture All rights reserved. 4
BUT AS BUSINESS DEPENDENCE ON THE INTERNET INCREASES,
CONFIDENCE IN INTERNET SECURITY REMAINS COMPARATIVELY
LOW.
Q6, Q2, Q5, Q4, Q7
CEO Confidence in Internet Security x
Dependence on the Internet
(Overall sample n=1711)
57% acknowledge their
organization's dependence on
the internet is growing and as
a result exposure to
cybersecurity risks are also
increasing.
58% The internet is getting
increasingly unstable from a
cybersecurity standpoint and I
am not sure how to react.
39% Our future growth will be
stifled because we cannot
grow securely in the internet
economy.
Concerns about the future
of internet security
Base = Total sample; n=100
10% 19%
30%
25%
23%
76%
100% 100%
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
2008 2013 2018 2023 2038e
C-level confidence Dependence on Internet
Log. (C-level confidence) Dependence on internet
Weibull distribution
80% No one organization can solve the cyber security challenges of
the internet economy on its own; it will require an organized group
effort.
77% Protecting companies from weaknesses in third parties is
increasingly difficult given the complexity of today’s sprawling
internet ecosystems.
73% The rate of adoption and innovation has outpaced the security
features needed to ensure a resilient cyber economy.
Copyright © 2018 Accenture All rights reserved. 5
Q13, Q7 Base = Total sample; n=100
HOW CAN CEOS SUPPORT A TRUSTWORTHY INTERNET
ECONOMY TO UNLOCK THE ECONOMIC POTENTIAL?
38%
52%
8%
1%1%
Strongly agree Agree
Neither agree nor disagree Disagree
Strongly disagree
The economic potential of the internet, and
IoT, would be unleashed if we could build a
more trustworthy internet economy. Governance
Business Architecture
Technology
Key Issues
CEO ACTION AND INFLUENCE MATTERS
Technology:
Advance business and enhance safety.
Business Architecture:
Connect and protect with a model run on digital trust.
Governance:
Join forces with other companies and govern globally.
GOVERNANCE
Technology:
Advance business and enhance safety.
Business Architecture:
Connect and protect with a model run on digital trust.
Governance:
By joining forces with other CEOs, public sector leaders
and regulators, leaders can develop much-needed
guidelines and oversight mechanisms.
Taking business resiliency to the next level requires
more than addressing each new attack; it requires an
ambitious new vision for the internet economy that
must be built by all relevant stakeholders.
Copyright © 2018 Accenture All rights reserved. 8
Q30, Q13, Q26 Base = Total sample; n=100
Organizations should proactively create and share
cybersecurity solutions for themselves and their
industry.
In the next three years, organizations in different
sectors will work together more (sharing knowledge,
services, products) to improve Cyber Resilience
overall.
In the next three years, organizations in the same
sector will work together more (sharing knowledge,
services, products) to improve Cyber Resilience for
the sector overall.
COLLABORATION BOTH WITHIN AND AMONG INDUSTRIES WILL BE
CRITICAL TO THE FUTURE SECURITY OF THE INTERNET; THE PRIVATE
SECTOR AND SECURITY ORGANIZATIONS MUST TAKE THE LEAD.
64%
63%
59%
58%
51%
46%
42%
28%
33%
32%
33%
40%
43%
47%
34%
40%
3%
5%
8%
2%
6%
7%
24%
32%
National security
organizations
Industry associations and
alliances
Privacy-advocacy groups
Private sector-large
companies
Private sector-
small/medium companies
Law enforcement
Government
Non-profit organizations
Central/lead role Peripheral role No role
What do you believe should be the role of each of the
following organizations in enforcing standards/practices
and principles?
87%
86%
84%
92%
CEO
Copyright © 2018 Accenture All rights reserved. 9
53%
47%
Yes, definitely
Yes, probably
Q22, Q9, Q23, Q24, Q13 Base = Total sample; n=100
Are you willing to invest in
building a trustworthy internet
economy?
How likely are you/your organization
to lead the governance of a new
design for trustworthy technology that
enables the internet economy?
How likely are you/your
organization to join an
organized effort?
C-suite members important to have
from your organization as part of an
initiative to build a trustworthy
internet economy.
35%
54%
11%
Definitely would
Very likely
Likely
34%
61%
4%1%
Extremely likely
Very likely
Somewhat likely
Not very likely
100
%
89% 54%95%
ORGANIZATIONS ARE READY TO SUPPORT, AND EVEN LEAD, EFFORTS TO
BUILD A TRUSTWORTHY INTERNET ECONOMY; CEOS ARE IMPORTANT TO
THIS INITIATIVE.
82% of organizations are committed to building a trustworthy internet economy with
significant and ongoing funding.
21%
27%
45%
24%
29%
48%
less than 24% breaches from
indirect attacks
24%-49% breaches from
indirect attacks
more than 49% breaches
from indirect attacks
Definitely would join Extremely likely to lead
Copyright © 2018 Accenture All rights reserved. 10
COMPANIES THAT HAVE EXPERIENCED MORE BREACHES FROM INDIRECT
ATTACKS ARE MORE LIKELY TO JOIN AND LEAD EFFORTS FOR A
TRUSTWORTHY INTERNET ECONOMY.
Likelihood to join or lead an organized effort to govern a trustworthy
internet economy
Overall results, data cuts not avaliable due to small sample size
Resolution: Governance
2x
Q22, Q9, Q23 by Q15 Base Q34: less than 24 % n=720, 24%-49%
n=461, more than 49% n=253
Copyright © 2018 Accenture All rights reserved. 11
64%
58%
45%
42%
39%
35%
Incentives
Certifications
Honor system
Self-policing by board
Penalties
Audits
Q27, Q28 Base = Total sample; n=100
Would you welcome stricter business regulations on
cybersecurity imposed by a central organization or governing
body?
Overall results, data cuts not avaliable due to small sample size
LIKEWISE, COMPANIES THAT HAVE EXPERIENCED MORE BREACHES FROM
INDIRECT ATTACKS ARE MORE WILLING TO WELCOME STRICTER
CYBERSECURITY REGULATIONS.
What are the most effective methods for enforcing standards/practices
and principles?
Multiple responses.
53%
61%
70%
less than 24% breaches
from indirect attacks
24%-49% breaches from
indirect attacks
more than 49% breaches
from indirect attacks
1 - Yes
Base Q28: less than 24 % n=720, 24%-49%
n=461, more than 49% n=253
Copyright © 2018 Accenture All rights reserved. 12
70%
69%
66%
56%
54%
52%
48%
44%
41%
Improve security within my organization
Improve trust among our customers/clients
Improve security for my business partners or
ecosystem
Improve trust among our partner network
Knowing that the internet economy would be
more secure overall
Increase shareholder value
Maximize the potential of the internet
economy for my organization
Being able to set the standards for a
trustworthy internet economy
Gain shared intelligence
Q25 Base = Total sample; n=100
Please rank the following in terms of what would motivate you/your organization to take a
leadership role to ensure the principles of trustworthy technology are upheld.
(Top 5 ranked)
IT IS IN THE BEST INTEREST OF COMPANIES TO LEAD (OR JOIN) A
COLLABORATIVE EFFORT TOWARD A MORE SECURE DIGITAL ECONOMY.
BUSINESS ARCHITECTURE
Technology:
Advance business and enhance safety.
Business Architecture:
By protecting their own organizations and extending
protection through their value chains, CEOs will
safeguard the business ecosystem.
Governance:
Join forces with other companies and govern globally.
Copyright © 2018 Accenture All rights reserved. 14
32%
46%
22%
Organizations must
protect the open internet
and open exchange of
information associated
with it at all costs.
There must be a careful
balance between security
achieved through closed
systems and an open
internet and exchange o
The most important
outcome is security, even
if it means closed
systems between
organizations.
Q8, Q10 Base = Total sample; n=100
View of the trade-off between competing outcomes
 71% Develop trusted organization
groups where businesses have
communities of commerce and users
are validated and held to high
standards.
 69% Raise the overall security of the
internet for all users and require all
participating organizations to meet
these standards.
 64% Protect technologies that are most
vulnerable.
Top 3 most important elements for a new, more trustworthy
internet economy
A TRUSTWORTHY INTERNET ECONOMY REQUIRES THE OVERALL
SECURITY OF THE INTERNET TO RISE WHILE ADDRESSING PRIORITY
AREAS.
Copyright © 2018 Accenture Security. All rights reserved. 15
ORGANIZATIONS MUST ALWAYS CHOOSE SECURE GROWTH OVER TIME-TO-
MARKET; COMPANIES THAT EXPERIENCE MORE INDIRECT ATTACKS ARE
MORE WILLING TO EMBED SECURITY BY DESIGN IN PRODUCTS AND
SERVICES.
Organizations must recognize the trade-off between time-to-market and ensuring secure sustainable growth
through technology, and always choose secure growth.
q34
47%
39%
12%
2%
Strongly agree Agree Neither agree nor disagree Disagree
36%
39%
53%
less than 24%
breaches from indirect
attacks
24%-49% breaches
from indirect attacks
more than 49%
breaches from indirect
attacks
1 - Strongly agree
Base Q34: less than 24 % n=720, 24%-49%
n=461, more than 49% n=253
Overall results, data cuts not avaliable due to small sample size
19%
55%
Increasing
Increasing significantly
16Copyright © 2018 Accenture Security. All rights reserved. Q15, Q16, Q6
Expected increase in indirect
attacks over the next three years
Percent of
successful
breaches from...
Base = Total sample; n=100
72% say a cyberattacks
initiated through partner
organizations targeted at my
organization are difficult to
control and one of their top
three concerns regarding
internet security.
INDIRECT ATTACKS, INITIATED THROUGH PARTNER ORGANIZATIONS,
REPRESENT A LARGE SHARE OF ATTACKS AND MOST EXPECT THEM TO
INCREASE.
Indirect
attacks:
27%
Copyright © 2018 Accenture All rights reserved. 17
87%
11%
2%
Yes
No
I don't know
Q17, Q18, Q20 Base = Total sample; n=100
Does your organization oversee and monitor
the cybersecurity of business partner
organizations?
76%
22%
2%
Yes, always
Yes, but only if we really
need them
No, we do not see
cybersecurity of our
companies as our
responsibility
Do you currently help companies in your
ecosystem boost their cyber resilience
capabilities?
56%
54%
51%
49%
45%
44%
43%
My organization collaborates with strategic
partners to test our cybersecurity resilience.
My organization is contributing to creating a
cybersecurity standard for my industry.
My organization collaborates with strategic
partners to share knowledge of threats.
My organization partners with one or more
start-ups to co-innovate security
solutions/capabilities.
My organization shares threat information
among the security community within my
industry.
My organization is a member of a cybersecurity
consortium/platform.
My organization has created an internal
cybersecurity committee/task force.
In which of the following ways does your organization
collaborate to increase your understanding of
cybersecurity threats?
CLOSING OFF AREAS OF EXPOSURE INVOLVES BOTH MONITORING AND
COLLABORATING.
Copyright © 2018 Accenture All rights reserved. 18
69%
62%
59%
58%
57%
52%
29%
38%
35%
41%
34%
41%
2%
0%
6%
1%
9%
7%
Supporting a small and medium
business mentoring program that
includes cybersecurity initiatives
Championing efforts (e.g.,
encouraging organizations to support
a more secure internet)
Supporting a task force (but not
leading)
Providing advice to any initiatives
Leading an initiative/task force
Funding internet solutions beyond
your organization
Yes, we have taken action No action, but we plan to No, we have not and do not plan to take action
Q19, Q13 Base = Total sample; n=100
Has your organization taken any of the following actions to develop a more
trustworthy internet economy?
Innovation is largely powered by
small organizations. It is the
responsibility of large
organizations to foster a digital
ecosystem that includes small and
medium businesses to help them
operate in a trustworthy digital
environment, in the interest of all.
COMPANIES ARE TAKING ACTION TO FOSTER INNOVATION AND DEVELOP A
MORE SECURE INTERNET.
86% agreee that:
Copyright © 2018 Accenture All rights reserved. 19
71%
63%
48%
36%
Innovation can flourish through the
trustworthy exchange of information
between organizations, both large and
small
Cyber security would be more
consistently managed across
companies and we will experience
fewer indirect attacks
Our growth in the internet economy
can reach its full potential
A unified collection of organizations
can agree on harsh responses to
attacks
Q11, Q12 Base = Total sample; n=100
How do you believe building a trustworthy internet economy will
benefit your organization?
Multiple responses.
91%
87%
85%
More secure transactions will not only benefit
businesses, but also consumers, government,
and other stakeholders will enjoy secure
information exchange and transactions.
Smaller organizations and non-profits that
would never be able to amass such an effort
will benefit from a more secure infrastructure
built by a larger group of organizations.
Security across the internet economy will
benefit all companies because it is only as
strong as its weakest link.
Strongly agree/ agree
How do you believe building a trustworthy internet
economy will benefit society at large?
Strongly agree/ agree
A TRUSTWORTHY INTERNET ECONOMY WILL NOT ONLY BENEFIT THE
COMPANIES THAT LEAD THE EFFORT, IT WILL BENEFIT THE BROADER
SOCIETY.
TECHNOLOGY
Technology:
By embracing and developing technologies that can
advance their businesses and enhance digital safety,
CEOs can drive a trust turnaround for the Internet and
secure the future of the digital economy.
Business Architecture:
Connect and protect with a model run on digital trust.
Governance:
Join forces with other companies and govern globally.
53% 60% 60% 48% 40%
39%
32% 33%
42%
46%
74% 75%
79%
73% 73%
Artificial Intelligence (Ai) Internet of Things (IOT),
Industrial Internet of Things
(IIOT)
Smart/Connected Devices Blockchain/Distributed
Ledgers
Extended Reality
(Augmented Reality, Virtual
Reality)
Already adopted Planning to adopt within 2 years Increase Cyber security risk
Copyright © 2018 Accenture All rights reserved. 21
COMPANIES ARE ADOPTING NEW TECHNOLOGIES TO GROW THEIR
BUSINESSES AND NEED TO DEMAND THE APPROPRIATE SECURITY.
Q31, Q32, Q30
Base = Total sample; n=100
Top 5 technologies companies have adopted or are planning to adopt in the next 2 years
Base = Adopted/planning; base varies due to selections in q31
93% agree:
An ambitious emerging
technology agenda demands a
trustworthy internet economy.
Copyright © 2018 Accenture All rights reserved. 22
Q34, Q35 Base = Total sample; n=100
Issue
THE IMPERATIVE IS EVIDENT AND TECHNOLOGY WILL PLAY A PROMINENT
ROLE IN SOLVING SECURITY ISSUES.
Best Practices
67% Security issues for my business
have grown out of control due to
new technologies, such as the
Internet of Things and Industrial
Internet of Things (IoT/IIoT).
68% Overall, technology is moving
too fast for our business model
to adapt.
76% My organization is adopting new
and emerging technologies
faster than our ability to ensure
security issues are addressed.
92% Security needs to be embedded into
technology. This is particularly
important with regard to the IoT/IIoT.
91% Companies that adopt a trustworthy
internet economy model will enjoy the
benefits of maximizing growth in a
more secure environment.
90% Organizations must push for better
internet security and a trustworthy
infrastructure to enable innovation
through technology adoption to
flourish.
Proposed Solutions
84% My organization keeps a careful eye
on the latest security issues
emerging in the internet economy as
well as ways to create a more
trustworthy and secure environment.
90% My organization always prioritizes
cybersecurity even in the face of
time-to-market pressures.
87% Solutions involving Digital Identity, Blockchain, and AI are promising with regard to
their potential to reduce cybersecurity issues in the network/internet.
It will be one of the pivotal tools
Copyright © 2018 Accenture All rights reserved. 23
THE POTENTIAL OF AI TO ENABLE A MORE SECURE INTERNET IS
SIGNIFICANT; COMPANIES THAT ARE ADVANCED IN APPLYING AI
FOR CYBERSECURITY UNDERSTAND ITS PIVOTAL ROLE.
75%
23%
2%
Completely trust
Partially trust
Do not trust at all
Q36b, Q37, Q38 Base = Total sample; n=100;
Trust security decisions based on AI
Are confident AI (including
machine learning) can continue
to provide results, particularly
for security, over time without
demands on management and
relearning.
97%
47%
Overall
It will be useful for internet
security, but I am not sure how big
its role will be just yet
46%
Overall
Potential value of AI to secure
commerce on the internet
71%
Among those
advanced in using AI
for cybersecurity*
Companies using AI in ALL of the following: security monitoring, behavioral
analysis/insider threat detection, and other security reasons Q36) (n=24 .
Copyright © 2018 Accenture All rights reserved. 24
A PARADOX—EVEN THOUGH RESPONDENTS BELIEVE
CONTROLLED DIGITAL ID WILL LIMIT THEIR ABILITY TO PROVIDE
CUSTOMIZED PRODUCTS/SERVICES, THEY SUPPORT CUSTOMER
CONTROL.
27%
48%
12%
13%
Yes, severely hindered
Yes, somewhat hindered
Yes, mildly hindered
No, not at all hindered
Q39, Q41, Q40 Base = Total sample; n=100
Will your ability to provide insight-based, customized
products/services be hindered if digital identities are
more carefully controlled by individuals?
33%
62%
3%
1%
1%
Yes, customers should own all
aspects of their digital identities
Yes, customers should own PII
(personally identifiable information)
and PHI (public health information)
but companie
No, current levels of security are
suitable to protect digital identity
I don't know enough about digital
identities to know
Not applicable to my business
Should individuals to have greater control over their
digital identity in exchange for a more secure
internet?
93% Customers should have a right to
decide how to secure their DI.
71% Consumers cannot trust their
DI when too much of their data is
available without restrictions.
66% Tighter controls over digital
identities are not good for my
business.
92% My organization’s access to
digital identities is important to our
ability to offer innovative customer
solutions.
74% Our ability to monetize data
available in digital identities is at odds
with having strict controls around
access to DI.
Respondents agree:
Copyright © 2018 Accenture All rights reserved. 25
THE MAIN BENEFITS OF BLOCKCHAIN ARE SECURITY, SPEED
AND TRACEABILITY. THE MAJORITY BELIEVE IT IS ALREADY
HELPING WITH INTERNET SECURITY.
70%
58%
50%
39%
30%
28%
25%
Increase security
Increase speed
Real-time track
and trace
Reduce costs
Single source of
truth
Smart contracts
and automation
Distributed
architecture
Q42, Q44, Q43 Base = Total sample; n=100
Advantages of blockchain technology?
(Top three)
53%
46%
1%
Yes, it is
helping already
Yes, but it is
still in
development
and not yet
mature enough
(currently
lacking
technological
maturity)
I don't
understand
enough about
blockchain to
really know
Blockchain as a part of the solution to
network/internet security
Percent of infrastructure expected to be on
blockchain by 2030 (average)
Average percent of
infrastructure on blockchain
by 2030
44%
DEMOGRAPHICS
Industry
Copyright © 2018 Accenture All rights reserved.
27
THIS STUDY WAS FIELDED OCTOBER - NOVEMBER 2018
Country (HQ)
Revenue
Title
5
10
5
5
5
5
10
10
5
10
5
10
15
Australia
Brazil
Canada
China
France
Germany
India
Italy
Japan
Spain
Switzerland
United Kingdom
United States
67
21
7
5
CEO
Chief Operating…
Chief Innovation…
Chief Strategy…
44
39
7
10
$5 billion - $10 billion
$10 billion - $30…
$30 billion
More than $30 billion
100Insurance
RESULTS
Copyright © 2018 Accenture All rights reserved. 29
DEPENDENCE ON THE INTERNET AS A WAY TO EXECUTE BUSINESS
TRANSACTIONS HAS SPIKED WITHIN THE LAST 10 YEARS.
23%
48%
27%
2%
More than 10 years ago
6-10 years ago
Within the past 1-5 years
Within the past year
Q2 Base = Total sample; n=100
Approximately when did your business become largely dependent on the internet (for
revenue, operations, etc.) to execute transactions on behalf of your business?
Copyright © 2018 Accenture All rights reserved. 30
BUT THE INTERNET IS BEING USED IN A WAY THAT IT WAS NOT DESIGNED
TO SUPPORT, LEADING TO COMPROMISED CYBERSECURITY.
37%
36%
34%
33%
30%
30%
40%
44%
48%
40%
53%
43%
20%
16%
15%
17%
11%
17%
2%
4%
2%
5%
6%
2%
Protecting companies from weaknesses in third parties is
increasingly difficult given the complexity of today’s sprawling
internet ecosystems.
No one organization can solve the cyber security challenges of
the internet economy on its own; it will require an organized
group effort.
Without a dramatic improvement to the security of the internet,
the advancement of the internet economy will be severely
hindered.
The rate of adoption and innovation has outpaced the security
features needed to ensure a resilient cyber economy.
The exchange of data across the internet has become digitally
fragmented as countries restrict the free flow of data across
borders in an attempt to secure information exchange.
My organization struggles with the trade-off between an open
internet economy and the security issues that come with it.
Strongly agree Agree Neither agree nor disagree Disagree Strongly disagree I don't know
Q7 Base = Total sample; n=100
Please indicate your agreement with each of the following statements:
Copyright © 2018 Accenture All rights reserved. 31
PUTTING DATA PRIVACY AND SECURITY FIRST AS WELL AS A UNIFIED
FRONT ARE THE TOP THREE PRIORITIES FOR GOVERNANCE.
59%
59%
43%
41%
34%
33%
31%
“An attack on one is an attack on all”—
member organizations will come to the aid
and support of affected members
Balance between growth and security (or
growth only in context of security)
Shared sacrifice (all members will make
contribution according to experience/asset
levels – but all contribute)
Privacy of clients/customers will be
separated/delineated from shared data
Those with the most risk bear the most
responsibility
Pledge to not engage questionable ethical
activity (e.g. “hack-backs”)
Free flow of information/data between
network members
Q21 Base = Total sample; n=100
Which of the following are the most important governing principles to enable a trustworthy internet economy? (Top three)
Copyright © 2018 Accenture All rights reserved. 32
RESPONDENTS REALIZE THE IMPORTANCE OF HAVING THE CEO AS PART
OF ANY INITIATIVE TO BUILD A TRUSTWORTHY INTERNET ECONOMY.
54%
54%
48%
46%
40%
35%
28%
11%
4%
CEO
Chief Security Officer
CISO (Chief Information Security
Officer)
Chief Innovation Officer
Chief Information Officer
Chief Strategy Officer
COO
CFO
Other C-suite executives
Q24 Base = Total sample; n=100
Which C-suite members would be important to have from your organization as part of an initiative to build a trustworthy internet economy?
Multiple responses.
Copyright © 2018 Accenture All rights reserved. 33
A TRUSTWORTHY INTERNET ECONOMY REQUIRES THE OVERALL
SECURITY OF THE INTERNET TO RISE WHILE ADDRESSING PRIORITY
AREAS.
30%
25%
16%
14%
13%
1%
1%
69%
71%
64%
44%
46%
1%
1%
Raise the overall security of the internet
for all users and require all participating
organizations to meet these standards
Develop trusted organization groups
where businesses have communities of
commerce and users are validated…
Protect technologies that are most
vulnerable (e.g., IoT)
Enlist governments to be part of the
solution
Exclude potentially malicious intenders
I don’t know
None of the above
Top
Top Three
Q8 Base = Total sample; n=100
In your opinion, if organizations were to design a new, more trustworthy
internet economy, what would be the most important elements?
Copyright © 2018 Accenture All rights reserved. 34
RESPONDENTS GENERALLY WANT STRICTER BUSINESS REGULATIONS ON
CYBERSECURITY TO BE IMPOSED.
58%
40%
2%
Yes
Maybe
No
Q28 Base = Total sample; n=100
Would you welcome stricter business regulations on cybersecurity imposed by a central organization or governing body?
Copyright © 2018 Accenture All rights reserved. 35
A MORE TRUSTWORTHY INTERNET ECONOMY ALLOWS COMPANIES TO
ADOPT NEW TECHNOLOGIES WITH LESS SECURITY RISKS.
51%
47%
2%
Yes, definitely
Maybe
I doubt it
Q33 Base = Total sample; n=100
Do you believe a more trustworthy internet economy could help mitigate the security risks inherent in the adoption of these new technologies for your
business?
Copyright © 2018 Accenture All rights reserved. 36
73%
69%
68%
68%
68%
66%
61%
49%
49%
46%
22%
Fraud Detection
Behavioral Analysis/Insider Threat
Detection
Performance analysis
Big Data Analysis/Data insights (e.g.,
data processing)
Security Monitoring
Enhancing IT and help desk
functions
Chat bot applications (customer
service)
Autonomous platform processing
(Connected Car, Drone, Robot)
Other security reasons
Plant/Manufacturing Operations
Other non-security reasons
For which of the following is your organization using artificial intelligence (AI)?
AI IS AN IMPORTANT TOOL FOR SECURITY; NEARLY ALL COMPANIES APPLY
AI IN SOME WAY FOR CYBERSECURITY.
Base = Total sample; n=100
Q36
94% use AI for
security reasons
including security
monitoring and
behavioral
analysis/insider
threat detection.
Copyright © 2018 Accenture All rights reserved. 37
EVEN THOUGH RESPONDENTS UNDERSTAND THAT CONTROLLED DIGITAL
IDENTITIES WILL LIMIT THEIR ABILITY TO USE CONSUMER INFORMATION
FOR THEIR BUSINESS, THEY SUPPORT CUSTOMER CONTROL.
49%
48%
42%
25%
21%
43%
45%
32%
41%
50%
7%
7%
19%
13%
17%
1%
0%
6%
13%
9%
My organization’s access to digital
identities is important to our ability
to offer innovative customer
solutions.
Customers should have a right to
decide how to secure their digital
identities.
Our ability to monetize data
available in digital identities is at
odds with having strict controls
around access to digital identities.
Tighter controls over digital
identities are not good for my
business.
Consumers cannot trust their
digital identities when too much of
their data is available without
restrictions.
Strongly agree Agree Neither agree nor disagree Disagree Strongly disagree I don't know
Q41 Base = Total sample; n=100
Please indicate your agreement with each of the following statements:
Copyright © 2018 Accenture All rights reserved. 38
RESPONDENTS BELIEVE THE MOST COMPELLING BENEFIT OF
BLOCKCHAIN IS SECURITY.
33%
17%
12%
11%
10%
9%
8%
70%
58%
28%
50%
25%
39%
30%
Increase security
Increase speed
Smart contracts and automation
Real-time track and trace
Distributed architecture
Reduce costs
Single source of truth
Top
Top Three
Q42 Base = Total sample; n=100
What do you see as the most compelling advantages of blockchain technology?
Copyright © 2018 Accenture All rights reserved. 39
HOWEVER, MANY BELIEVE BLOCKCHAIN COULD BE HACKED IN THE
FUTURE.
25%
53%
20%
2%
Blockchain technology has already
been hacked and could not be
hacked again
Blockchain technology has not been
hacked though could be hacked in
the future
Blockchain technology is secure
and cannot be hacked
I am not familiar with the security of
blockchain technology
Q45 Base = Total sample; n=100
Which of the following statements best reflects your understanding of the security of blockchain technology?

Más contenido relacionado

La actualidad más candente

2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of CybercrimeIDG
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilienceaccenture
 
Accenture Banking Security Index
Accenture Banking Security IndexAccenture Banking Security Index
Accenture Banking Security Indexaccenture
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Reportaccenture
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilienceaccenture
 
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018Accenture Australia
 
Third Annual State of Cyber Resilience | Portugal
Third Annual State of Cyber Resilience | PortugalThird Annual State of Cyber Resilience | Portugal
Third Annual State of Cyber Resilience | Portugalaccenture
 
2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research UpdateGridCyberSec
 
Accenture 2019 Global Risk Management Study Financial Services Summary
Accenture 2019 Global Risk Management Study Financial Services SummaryAccenture 2019 Global Risk Management Study Financial Services Summary
Accenture 2019 Global Risk Management Study Financial Services Summaryaccenture
 
Accenture Saudi Arabia Innovation Maturity Index​
Accenture Saudi Arabia Innovation Maturity Index​Accenture Saudi Arabia Innovation Maturity Index​
Accenture Saudi Arabia Innovation Maturity Index​accenture
 
Digital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and OpportunityDigital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and Opportunityaccenture
 
Cloud Insights 2018
Cloud Insights 2018Cloud Insights 2018
Cloud Insights 2018IDG
 
Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]IDG
 
Securing Consumer Trust
Securing Consumer TrustSecuring Consumer Trust
Securing Consumer Trustaccenture
 
2018 Security Priorities
2018 Security Priorities 2018 Security Priorities
2018 Security Priorities IDG
 
Unfolding the next growth chapter in the Middle East
Unfolding the next growth chapter in the Middle East Unfolding the next growth chapter in the Middle East
Unfolding the next growth chapter in the Middle East Accenture Middle East
 
2018 Global State of Information Security Survey
2018 Global State of Information Security Survey2018 Global State of Information Security Survey
2018 Global State of Information Security SurveyIDG
 
2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New Yorkaccenture
 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryAccenture Insurance
 

La actualidad más candente (20)

2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of Cybercrime
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
Accenture Banking Security Index
Accenture Banking Security IndexAccenture Banking Security Index
Accenture Banking Security Index
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
 
Third Annual State of Cyber Resilience | Portugal
Third Annual State of Cyber Resilience | PortugalThird Annual State of Cyber Resilience | Portugal
Third Annual State of Cyber Resilience | Portugal
 
2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update2015 Energy Industry Cybersecurity Research Update
2015 Energy Industry Cybersecurity Research Update
 
Accenture 2019 Global Risk Management Study Financial Services Summary
Accenture 2019 Global Risk Management Study Financial Services SummaryAccenture 2019 Global Risk Management Study Financial Services Summary
Accenture 2019 Global Risk Management Study Financial Services Summary
 
Accenture Saudi Arabia Innovation Maturity Index​
Accenture Saudi Arabia Innovation Maturity Index​Accenture Saudi Arabia Innovation Maturity Index​
Accenture Saudi Arabia Innovation Maturity Index​
 
Digital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and OpportunityDigital Technology in Mining: Progress and Opportunity
Digital Technology in Mining: Progress and Opportunity
 
Cybersecurity report-vol-8
Cybersecurity report-vol-8Cybersecurity report-vol-8
Cybersecurity report-vol-8
 
Cloud Insights 2018
Cloud Insights 2018Cloud Insights 2018
Cloud Insights 2018
 
Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]
 
Securing Consumer Trust
Securing Consumer TrustSecuring Consumer Trust
Securing Consumer Trust
 
2018 Security Priorities
2018 Security Priorities 2018 Security Priorities
2018 Security Priorities
 
Unfolding the next growth chapter in the Middle East
Unfolding the next growth chapter in the Middle East Unfolding the next growth chapter in the Middle East
Unfolding the next growth chapter in the Middle East
 
2018 Global State of Information Security Survey
2018 Global State of Information Security Survey2018 Global State of Information Security Survey
2018 Global State of Information Security Survey
 
2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York
 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industry
 

Similar a Securing the Digital Economy: Reinventing the Internet for Trust

Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience InsuranceAccenture Insurance
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber ResilienceAccenture Security
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilienceaccenture
 
People First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital InsurancePeople First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital InsuranceAccenture México
 
Fast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance OperationsFast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance OperationsAccenture Operations
 
TCS Global Cloud Study – United Kingdom & Ireland
TCS Global Cloud Study – United Kingdom & Ireland TCS Global Cloud Study – United Kingdom & Ireland
TCS Global Cloud Study – United Kingdom & Ireland Tata Consultancy Services
 
2018 State of Cyber Reslience in Healthcare
2018 State of Cyber Reslience in Healthcare2018 State of Cyber Reslience in Healthcare
2018 State of Cyber Reslience in Healthcareaccenture
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise ReportOkta-Inc
 
Thinking out of the toolbox full deck
Thinking out of the toolbox full deckThinking out of the toolbox full deck
Thinking out of the toolbox full deckSusanna Harper
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
Security in the driver's seat: Achieving cyber resilience in automotive
Security in the driver's seat: Achieving cyber resilience in automotiveSecurity in the driver's seat: Achieving cyber resilience in automotive
Security in the driver's seat: Achieving cyber resilience in automotiveaccenture
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for InsuranceAccenture Insurance
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseThe Economist Media Businesses
 

Similar a Securing the Digital Economy: Reinventing the Internet for Trust (20)

Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber Resilience
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilience
 
People First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital InsurancePeople First: The Primacy of the People in the Age of Digital Insurance
People First: The Primacy of the People in the Age of Digital Insurance
 
Fast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance OperationsFast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance Operations
 
TCS Global Cloud Study – United Kingdom & Ireland
TCS Global Cloud Study – United Kingdom & Ireland TCS Global Cloud Study – United Kingdom & Ireland
TCS Global Cloud Study – United Kingdom & Ireland
 
2018 State of Cyber Reslience in Healthcare
2018 State of Cyber Reslience in Healthcare2018 State of Cyber Reslience in Healthcare
2018 State of Cyber Reslience in Healthcare
 
EMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-Security
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
 
Thinking out of the toolbox full deck
Thinking out of the toolbox full deckThinking out of the toolbox full deck
Thinking out of the toolbox full deck
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Security in the driver's seat: Achieving cyber resilience in automotive
Security in the driver's seat: Achieving cyber resilience in automotiveSecurity in the driver's seat: Achieving cyber resilience in automotive
Security in the driver's seat: Achieving cyber resilience in automotive
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
Cloud complexity: the need for resilience
Cloud complexity: the need for resilienceCloud complexity: the need for resilience
Cloud complexity: the need for resilience
 
TCS Global Cloud Study – North America
TCS Global Cloud Study – North AmericaTCS Global Cloud Study – North America
TCS Global Cloud Study – North America
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
 
TCS Global Cloud Study – Key Findings
TCS Global Cloud Study – Key Findings TCS Global Cloud Study – Key Findings
TCS Global Cloud Study – Key Findings
 

Más de Accenture Insurance

Future-ready Insurance Systems – An Insurer’s Guide to Optimizing Technology ...
Future-ready Insurance Systems – An Insurer’s Guide to Optimizing Technology ...Future-ready Insurance Systems – An Insurer’s Guide to Optimizing Technology ...
Future-ready Insurance Systems – An Insurer’s Guide to Optimizing Technology ...Accenture Insurance
 
Open Insurance - Unlocking Ecosystem Opportunities For Tomorrow’s Insurance I...
Open Insurance - Unlocking Ecosystem Opportunities For Tomorrow’s Insurance I...Open Insurance - Unlocking Ecosystem Opportunities For Tomorrow’s Insurance I...
Open Insurance - Unlocking Ecosystem Opportunities For Tomorrow’s Insurance I...Accenture Insurance
 
Technology Vision for Insurance 2020
Technology Vision for Insurance 2020Technology Vision for Insurance 2020
Technology Vision for Insurance 2020Accenture Insurance
 
Unlocking Value from Unstructured Data
Unlocking Value from Unstructured DataUnlocking Value from Unstructured Data
Unlocking Value from Unstructured DataAccenture Insurance
 
Open Insurance - Unlocking Ecosystem Opportunities For Tomorrow’s Insurance I...
Open Insurance - Unlocking Ecosystem Opportunities For Tomorrow’s Insurance I...Open Insurance - Unlocking Ecosystem Opportunities For Tomorrow’s Insurance I...
Open Insurance - Unlocking Ecosystem Opportunities For Tomorrow’s Insurance I...Accenture Insurance
 
Accelerating Growth with Data-Driven Customer Experience
Accelerating Growth with Data-Driven Customer ExperienceAccelerating Growth with Data-Driven Customer Experience
Accelerating Growth with Data-Driven Customer ExperienceAccenture Insurance
 
Scale Innovation and Achieve Value with Future Systems
Scale Innovation and Achieve Value with Future SystemsScale Innovation and Achieve Value with Future Systems
Scale Innovation and Achieve Value with Future SystemsAccenture Insurance
 
Striking Balance With Whole-Brain Leadership
Striking Balance With Whole-Brain LeadershipStriking Balance With Whole-Brain Leadership
Striking Balance With Whole-Brain LeadershipAccenture Insurance
 
Workforce 2025 Infographic - Capital Markets Skills and Roles of the Future
Workforce 2025 Infographic - Capital Markets Skills and Roles of the FutureWorkforce 2025 Infographic - Capital Markets Skills and Roles of the Future
Workforce 2025 Infographic - Capital Markets Skills and Roles of the FutureAccenture Insurance
 
Workforce 2025 Infographic - Banking Skills and Roles of the Future
Workforce 2025 Infographic - Banking Skills and Roles of the FutureWorkforce 2025 Infographic - Banking Skills and Roles of the Future
Workforce 2025 Infographic - Banking Skills and Roles of the FutureAccenture Insurance
 
Workforce 2025 Infographic - Insurance Skills and Roles of the Future
Workforce 2025 Infographic - Insurance Skills and Roles of the FutureWorkforce 2025 Infographic - Insurance Skills and Roles of the Future
Workforce 2025 Infographic - Insurance Skills and Roles of the FutureAccenture Insurance
 
Workforce 2025 - Financial Services Skills & Roles Of The Future
Workforce 2025 - Financial Services Skills & Roles Of The FutureWorkforce 2025 - Financial Services Skills & Roles Of The Future
Workforce 2025 - Financial Services Skills & Roles Of The FutureAccenture Insurance
 
Three Preconditions To Pivoting Wisely
Three Preconditions To Pivoting WiselyThree Preconditions To Pivoting Wisely
Three Preconditions To Pivoting WiselyAccenture Insurance
 
Accelerating Growth With Applied Customer Engagement
Accelerating Growth With Applied Customer EngagementAccelerating Growth With Applied Customer Engagement
Accelerating Growth With Applied Customer EngagementAccenture Insurance
 
Breathe New Life into Life Insurance
Breathe New Life into Life InsuranceBreathe New Life into Life Insurance
Breathe New Life into Life InsuranceAccenture Insurance
 
Way Beyond Marketing - The Rise of the Hyper-Relevant CMO
Way Beyond Marketing - The Rise of the Hyper-Relevant CMOWay Beyond Marketing - The Rise of the Hyper-Relevant CMO
Way Beyond Marketing - The Rise of the Hyper-Relevant CMOAccenture Insurance
 

Más de Accenture Insurance (20)

Future-ready Insurance Systems – An Insurer’s Guide to Optimizing Technology ...
Future-ready Insurance Systems – An Insurer’s Guide to Optimizing Technology ...Future-ready Insurance Systems – An Insurer’s Guide to Optimizing Technology ...
Future-ready Insurance Systems – An Insurer’s Guide to Optimizing Technology ...
 
Open Insurance - Unlocking Ecosystem Opportunities For Tomorrow’s Insurance I...
Open Insurance - Unlocking Ecosystem Opportunities For Tomorrow’s Insurance I...Open Insurance - Unlocking Ecosystem Opportunities For Tomorrow’s Insurance I...
Open Insurance - Unlocking Ecosystem Opportunities For Tomorrow’s Insurance I...
 
Technology Vision for Insurance 2020
Technology Vision for Insurance 2020Technology Vision for Insurance 2020
Technology Vision for Insurance 2020
 
Unlocking Value from Unstructured Data
Unlocking Value from Unstructured DataUnlocking Value from Unstructured Data
Unlocking Value from Unstructured Data
 
Open Insurance - Unlocking Ecosystem Opportunities For Tomorrow’s Insurance I...
Open Insurance - Unlocking Ecosystem Opportunities For Tomorrow’s Insurance I...Open Insurance - Unlocking Ecosystem Opportunities For Tomorrow’s Insurance I...
Open Insurance - Unlocking Ecosystem Opportunities For Tomorrow’s Insurance I...
 
Accelerating Growth with Data-Driven Customer Experience
Accelerating Growth with Data-Driven Customer ExperienceAccelerating Growth with Data-Driven Customer Experience
Accelerating Growth with Data-Driven Customer Experience
 
Scale Innovation and Achieve Value with Future Systems
Scale Innovation and Achieve Value with Future SystemsScale Innovation and Achieve Value with Future Systems
Scale Innovation and Achieve Value with Future Systems
 
AI: Built To Scale
AI: Built To ScaleAI: Built To Scale
AI: Built To Scale
 
Striking Balance With Whole-Brain Leadership
Striking Balance With Whole-Brain LeadershipStriking Balance With Whole-Brain Leadership
Striking Balance With Whole-Brain Leadership
 
Decoding Transformation
Decoding TransformationDecoding Transformation
Decoding Transformation
 
Workforce 2025 Infographic - Capital Markets Skills and Roles of the Future
Workforce 2025 Infographic - Capital Markets Skills and Roles of the FutureWorkforce 2025 Infographic - Capital Markets Skills and Roles of the Future
Workforce 2025 Infographic - Capital Markets Skills and Roles of the Future
 
Workforce 2025 Infographic - Banking Skills and Roles of the Future
Workforce 2025 Infographic - Banking Skills and Roles of the FutureWorkforce 2025 Infographic - Banking Skills and Roles of the Future
Workforce 2025 Infographic - Banking Skills and Roles of the Future
 
Workforce 2025 Infographic - Insurance Skills and Roles of the Future
Workforce 2025 Infographic - Insurance Skills and Roles of the FutureWorkforce 2025 Infographic - Insurance Skills and Roles of the Future
Workforce 2025 Infographic - Insurance Skills and Roles of the Future
 
Workforce 2025 - Financial Services Skills & Roles Of The Future
Workforce 2025 - Financial Services Skills & Roles Of The FutureWorkforce 2025 - Financial Services Skills & Roles Of The Future
Workforce 2025 - Financial Services Skills & Roles Of The Future
 
Make your Wise Pivot to the New
Make your Wise Pivot to the NewMake your Wise Pivot to the New
Make your Wise Pivot to the New
 
Three Preconditions To Pivoting Wisely
Three Preconditions To Pivoting WiselyThree Preconditions To Pivoting Wisely
Three Preconditions To Pivoting Wisely
 
Accelerating Growth With Applied Customer Engagement
Accelerating Growth With Applied Customer EngagementAccelerating Growth With Applied Customer Engagement
Accelerating Growth With Applied Customer Engagement
 
Breathe New Life into Life Insurance
Breathe New Life into Life InsuranceBreathe New Life into Life Insurance
Breathe New Life into Life Insurance
 
Experience the Power of More
Experience the Power of MoreExperience the Power of More
Experience the Power of More
 
Way Beyond Marketing - The Rise of the Hyper-Relevant CMO
Way Beyond Marketing - The Rise of the Hyper-Relevant CMOWay Beyond Marketing - The Rise of the Hyper-Relevant CMO
Way Beyond Marketing - The Rise of the Hyper-Relevant CMO
 

Último

Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 

Último (20)

Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 

Securing the Digital Economy: Reinventing the Internet for Trust

  • 1. Reinventing the Internet for Trust Results for: Insurance SECURING THE DIGITALECONOMY
  • 3. Copyright © 2018 Accenture All rights reserved. 3 COMPANIES ARE LARGELY DEPENDENT ON THE INTERNET FOR BUSINESS GROWTH; IN FIVE YEARS, AVERAGE TARGETED GROWTH DEPENDENT ON THE INTERNET WILL DOUBLE. Q1, Q2, Q3 90% rank business growth through internet-enabled initiatives in their top three strategic priorities 77% of businesses became largely dependent on the internet over the past 10 years Average targeted growth dependent on the Internet economy (%) Base = Total sample; n=100 19 26 34 q3_1 q3_2 q3_3 Next year Next three years Next five years
  • 4. 92% say a trustworthy internet economy is very or extremely critical to their organization’s future growth. 82% believe that without a dramatic improvement to the security of the internet, the advancement of the internet economy will be severely hindered. Copyright © 2018 Accenture All rights reserved. 4 BUT AS BUSINESS DEPENDENCE ON THE INTERNET INCREASES, CONFIDENCE IN INTERNET SECURITY REMAINS COMPARATIVELY LOW. Q6, Q2, Q5, Q4, Q7 CEO Confidence in Internet Security x Dependence on the Internet (Overall sample n=1711) 57% acknowledge their organization's dependence on the internet is growing and as a result exposure to cybersecurity risks are also increasing. 58% The internet is getting increasingly unstable from a cybersecurity standpoint and I am not sure how to react. 39% Our future growth will be stifled because we cannot grow securely in the internet economy. Concerns about the future of internet security Base = Total sample; n=100 10% 19% 30% 25% 23% 76% 100% 100% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 2008 2013 2018 2023 2038e C-level confidence Dependence on Internet Log. (C-level confidence) Dependence on internet Weibull distribution
  • 5. 80% No one organization can solve the cyber security challenges of the internet economy on its own; it will require an organized group effort. 77% Protecting companies from weaknesses in third parties is increasingly difficult given the complexity of today’s sprawling internet ecosystems. 73% The rate of adoption and innovation has outpaced the security features needed to ensure a resilient cyber economy. Copyright © 2018 Accenture All rights reserved. 5 Q13, Q7 Base = Total sample; n=100 HOW CAN CEOS SUPPORT A TRUSTWORTHY INTERNET ECONOMY TO UNLOCK THE ECONOMIC POTENTIAL? 38% 52% 8% 1%1% Strongly agree Agree Neither agree nor disagree Disagree Strongly disagree The economic potential of the internet, and IoT, would be unleashed if we could build a more trustworthy internet economy. Governance Business Architecture Technology Key Issues
  • 6. CEO ACTION AND INFLUENCE MATTERS Technology: Advance business and enhance safety. Business Architecture: Connect and protect with a model run on digital trust. Governance: Join forces with other companies and govern globally.
  • 7. GOVERNANCE Technology: Advance business and enhance safety. Business Architecture: Connect and protect with a model run on digital trust. Governance: By joining forces with other CEOs, public sector leaders and regulators, leaders can develop much-needed guidelines and oversight mechanisms.
  • 8. Taking business resiliency to the next level requires more than addressing each new attack; it requires an ambitious new vision for the internet economy that must be built by all relevant stakeholders. Copyright © 2018 Accenture All rights reserved. 8 Q30, Q13, Q26 Base = Total sample; n=100 Organizations should proactively create and share cybersecurity solutions for themselves and their industry. In the next three years, organizations in different sectors will work together more (sharing knowledge, services, products) to improve Cyber Resilience overall. In the next three years, organizations in the same sector will work together more (sharing knowledge, services, products) to improve Cyber Resilience for the sector overall. COLLABORATION BOTH WITHIN AND AMONG INDUSTRIES WILL BE CRITICAL TO THE FUTURE SECURITY OF THE INTERNET; THE PRIVATE SECTOR AND SECURITY ORGANIZATIONS MUST TAKE THE LEAD. 64% 63% 59% 58% 51% 46% 42% 28% 33% 32% 33% 40% 43% 47% 34% 40% 3% 5% 8% 2% 6% 7% 24% 32% National security organizations Industry associations and alliances Privacy-advocacy groups Private sector-large companies Private sector- small/medium companies Law enforcement Government Non-profit organizations Central/lead role Peripheral role No role What do you believe should be the role of each of the following organizations in enforcing standards/practices and principles? 87% 86% 84% 92%
  • 9. CEO Copyright © 2018 Accenture All rights reserved. 9 53% 47% Yes, definitely Yes, probably Q22, Q9, Q23, Q24, Q13 Base = Total sample; n=100 Are you willing to invest in building a trustworthy internet economy? How likely are you/your organization to lead the governance of a new design for trustworthy technology that enables the internet economy? How likely are you/your organization to join an organized effort? C-suite members important to have from your organization as part of an initiative to build a trustworthy internet economy. 35% 54% 11% Definitely would Very likely Likely 34% 61% 4%1% Extremely likely Very likely Somewhat likely Not very likely 100 % 89% 54%95% ORGANIZATIONS ARE READY TO SUPPORT, AND EVEN LEAD, EFFORTS TO BUILD A TRUSTWORTHY INTERNET ECONOMY; CEOS ARE IMPORTANT TO THIS INITIATIVE. 82% of organizations are committed to building a trustworthy internet economy with significant and ongoing funding.
  • 10. 21% 27% 45% 24% 29% 48% less than 24% breaches from indirect attacks 24%-49% breaches from indirect attacks more than 49% breaches from indirect attacks Definitely would join Extremely likely to lead Copyright © 2018 Accenture All rights reserved. 10 COMPANIES THAT HAVE EXPERIENCED MORE BREACHES FROM INDIRECT ATTACKS ARE MORE LIKELY TO JOIN AND LEAD EFFORTS FOR A TRUSTWORTHY INTERNET ECONOMY. Likelihood to join or lead an organized effort to govern a trustworthy internet economy Overall results, data cuts not avaliable due to small sample size Resolution: Governance 2x Q22, Q9, Q23 by Q15 Base Q34: less than 24 % n=720, 24%-49% n=461, more than 49% n=253
  • 11. Copyright © 2018 Accenture All rights reserved. 11 64% 58% 45% 42% 39% 35% Incentives Certifications Honor system Self-policing by board Penalties Audits Q27, Q28 Base = Total sample; n=100 Would you welcome stricter business regulations on cybersecurity imposed by a central organization or governing body? Overall results, data cuts not avaliable due to small sample size LIKEWISE, COMPANIES THAT HAVE EXPERIENCED MORE BREACHES FROM INDIRECT ATTACKS ARE MORE WILLING TO WELCOME STRICTER CYBERSECURITY REGULATIONS. What are the most effective methods for enforcing standards/practices and principles? Multiple responses. 53% 61% 70% less than 24% breaches from indirect attacks 24%-49% breaches from indirect attacks more than 49% breaches from indirect attacks 1 - Yes Base Q28: less than 24 % n=720, 24%-49% n=461, more than 49% n=253
  • 12. Copyright © 2018 Accenture All rights reserved. 12 70% 69% 66% 56% 54% 52% 48% 44% 41% Improve security within my organization Improve trust among our customers/clients Improve security for my business partners or ecosystem Improve trust among our partner network Knowing that the internet economy would be more secure overall Increase shareholder value Maximize the potential of the internet economy for my organization Being able to set the standards for a trustworthy internet economy Gain shared intelligence Q25 Base = Total sample; n=100 Please rank the following in terms of what would motivate you/your organization to take a leadership role to ensure the principles of trustworthy technology are upheld. (Top 5 ranked) IT IS IN THE BEST INTEREST OF COMPANIES TO LEAD (OR JOIN) A COLLABORATIVE EFFORT TOWARD A MORE SECURE DIGITAL ECONOMY.
  • 13. BUSINESS ARCHITECTURE Technology: Advance business and enhance safety. Business Architecture: By protecting their own organizations and extending protection through their value chains, CEOs will safeguard the business ecosystem. Governance: Join forces with other companies and govern globally.
  • 14. Copyright © 2018 Accenture All rights reserved. 14 32% 46% 22% Organizations must protect the open internet and open exchange of information associated with it at all costs. There must be a careful balance between security achieved through closed systems and an open internet and exchange o The most important outcome is security, even if it means closed systems between organizations. Q8, Q10 Base = Total sample; n=100 View of the trade-off between competing outcomes  71% Develop trusted organization groups where businesses have communities of commerce and users are validated and held to high standards.  69% Raise the overall security of the internet for all users and require all participating organizations to meet these standards.  64% Protect technologies that are most vulnerable. Top 3 most important elements for a new, more trustworthy internet economy A TRUSTWORTHY INTERNET ECONOMY REQUIRES THE OVERALL SECURITY OF THE INTERNET TO RISE WHILE ADDRESSING PRIORITY AREAS.
  • 15. Copyright © 2018 Accenture Security. All rights reserved. 15 ORGANIZATIONS MUST ALWAYS CHOOSE SECURE GROWTH OVER TIME-TO- MARKET; COMPANIES THAT EXPERIENCE MORE INDIRECT ATTACKS ARE MORE WILLING TO EMBED SECURITY BY DESIGN IN PRODUCTS AND SERVICES. Organizations must recognize the trade-off between time-to-market and ensuring secure sustainable growth through technology, and always choose secure growth. q34 47% 39% 12% 2% Strongly agree Agree Neither agree nor disagree Disagree 36% 39% 53% less than 24% breaches from indirect attacks 24%-49% breaches from indirect attacks more than 49% breaches from indirect attacks 1 - Strongly agree Base Q34: less than 24 % n=720, 24%-49% n=461, more than 49% n=253 Overall results, data cuts not avaliable due to small sample size
  • 16. 19% 55% Increasing Increasing significantly 16Copyright © 2018 Accenture Security. All rights reserved. Q15, Q16, Q6 Expected increase in indirect attacks over the next three years Percent of successful breaches from... Base = Total sample; n=100 72% say a cyberattacks initiated through partner organizations targeted at my organization are difficult to control and one of their top three concerns regarding internet security. INDIRECT ATTACKS, INITIATED THROUGH PARTNER ORGANIZATIONS, REPRESENT A LARGE SHARE OF ATTACKS AND MOST EXPECT THEM TO INCREASE. Indirect attacks: 27%
  • 17. Copyright © 2018 Accenture All rights reserved. 17 87% 11% 2% Yes No I don't know Q17, Q18, Q20 Base = Total sample; n=100 Does your organization oversee and monitor the cybersecurity of business partner organizations? 76% 22% 2% Yes, always Yes, but only if we really need them No, we do not see cybersecurity of our companies as our responsibility Do you currently help companies in your ecosystem boost their cyber resilience capabilities? 56% 54% 51% 49% 45% 44% 43% My organization collaborates with strategic partners to test our cybersecurity resilience. My organization is contributing to creating a cybersecurity standard for my industry. My organization collaborates with strategic partners to share knowledge of threats. My organization partners with one or more start-ups to co-innovate security solutions/capabilities. My organization shares threat information among the security community within my industry. My organization is a member of a cybersecurity consortium/platform. My organization has created an internal cybersecurity committee/task force. In which of the following ways does your organization collaborate to increase your understanding of cybersecurity threats? CLOSING OFF AREAS OF EXPOSURE INVOLVES BOTH MONITORING AND COLLABORATING.
  • 18. Copyright © 2018 Accenture All rights reserved. 18 69% 62% 59% 58% 57% 52% 29% 38% 35% 41% 34% 41% 2% 0% 6% 1% 9% 7% Supporting a small and medium business mentoring program that includes cybersecurity initiatives Championing efforts (e.g., encouraging organizations to support a more secure internet) Supporting a task force (but not leading) Providing advice to any initiatives Leading an initiative/task force Funding internet solutions beyond your organization Yes, we have taken action No action, but we plan to No, we have not and do not plan to take action Q19, Q13 Base = Total sample; n=100 Has your organization taken any of the following actions to develop a more trustworthy internet economy? Innovation is largely powered by small organizations. It is the responsibility of large organizations to foster a digital ecosystem that includes small and medium businesses to help them operate in a trustworthy digital environment, in the interest of all. COMPANIES ARE TAKING ACTION TO FOSTER INNOVATION AND DEVELOP A MORE SECURE INTERNET. 86% agreee that:
  • 19. Copyright © 2018 Accenture All rights reserved. 19 71% 63% 48% 36% Innovation can flourish through the trustworthy exchange of information between organizations, both large and small Cyber security would be more consistently managed across companies and we will experience fewer indirect attacks Our growth in the internet economy can reach its full potential A unified collection of organizations can agree on harsh responses to attacks Q11, Q12 Base = Total sample; n=100 How do you believe building a trustworthy internet economy will benefit your organization? Multiple responses. 91% 87% 85% More secure transactions will not only benefit businesses, but also consumers, government, and other stakeholders will enjoy secure information exchange and transactions. Smaller organizations and non-profits that would never be able to amass such an effort will benefit from a more secure infrastructure built by a larger group of organizations. Security across the internet economy will benefit all companies because it is only as strong as its weakest link. Strongly agree/ agree How do you believe building a trustworthy internet economy will benefit society at large? Strongly agree/ agree A TRUSTWORTHY INTERNET ECONOMY WILL NOT ONLY BENEFIT THE COMPANIES THAT LEAD THE EFFORT, IT WILL BENEFIT THE BROADER SOCIETY.
  • 20. TECHNOLOGY Technology: By embracing and developing technologies that can advance their businesses and enhance digital safety, CEOs can drive a trust turnaround for the Internet and secure the future of the digital economy. Business Architecture: Connect and protect with a model run on digital trust. Governance: Join forces with other companies and govern globally.
  • 21. 53% 60% 60% 48% 40% 39% 32% 33% 42% 46% 74% 75% 79% 73% 73% Artificial Intelligence (Ai) Internet of Things (IOT), Industrial Internet of Things (IIOT) Smart/Connected Devices Blockchain/Distributed Ledgers Extended Reality (Augmented Reality, Virtual Reality) Already adopted Planning to adopt within 2 years Increase Cyber security risk Copyright © 2018 Accenture All rights reserved. 21 COMPANIES ARE ADOPTING NEW TECHNOLOGIES TO GROW THEIR BUSINESSES AND NEED TO DEMAND THE APPROPRIATE SECURITY. Q31, Q32, Q30 Base = Total sample; n=100 Top 5 technologies companies have adopted or are planning to adopt in the next 2 years Base = Adopted/planning; base varies due to selections in q31 93% agree: An ambitious emerging technology agenda demands a trustworthy internet economy.
  • 22. Copyright © 2018 Accenture All rights reserved. 22 Q34, Q35 Base = Total sample; n=100 Issue THE IMPERATIVE IS EVIDENT AND TECHNOLOGY WILL PLAY A PROMINENT ROLE IN SOLVING SECURITY ISSUES. Best Practices 67% Security issues for my business have grown out of control due to new technologies, such as the Internet of Things and Industrial Internet of Things (IoT/IIoT). 68% Overall, technology is moving too fast for our business model to adapt. 76% My organization is adopting new and emerging technologies faster than our ability to ensure security issues are addressed. 92% Security needs to be embedded into technology. This is particularly important with regard to the IoT/IIoT. 91% Companies that adopt a trustworthy internet economy model will enjoy the benefits of maximizing growth in a more secure environment. 90% Organizations must push for better internet security and a trustworthy infrastructure to enable innovation through technology adoption to flourish. Proposed Solutions 84% My organization keeps a careful eye on the latest security issues emerging in the internet economy as well as ways to create a more trustworthy and secure environment. 90% My organization always prioritizes cybersecurity even in the face of time-to-market pressures. 87% Solutions involving Digital Identity, Blockchain, and AI are promising with regard to their potential to reduce cybersecurity issues in the network/internet.
  • 23. It will be one of the pivotal tools Copyright © 2018 Accenture All rights reserved. 23 THE POTENTIAL OF AI TO ENABLE A MORE SECURE INTERNET IS SIGNIFICANT; COMPANIES THAT ARE ADVANCED IN APPLYING AI FOR CYBERSECURITY UNDERSTAND ITS PIVOTAL ROLE. 75% 23% 2% Completely trust Partially trust Do not trust at all Q36b, Q37, Q38 Base = Total sample; n=100; Trust security decisions based on AI Are confident AI (including machine learning) can continue to provide results, particularly for security, over time without demands on management and relearning. 97% 47% Overall It will be useful for internet security, but I am not sure how big its role will be just yet 46% Overall Potential value of AI to secure commerce on the internet 71% Among those advanced in using AI for cybersecurity* Companies using AI in ALL of the following: security monitoring, behavioral analysis/insider threat detection, and other security reasons Q36) (n=24 .
  • 24. Copyright © 2018 Accenture All rights reserved. 24 A PARADOX—EVEN THOUGH RESPONDENTS BELIEVE CONTROLLED DIGITAL ID WILL LIMIT THEIR ABILITY TO PROVIDE CUSTOMIZED PRODUCTS/SERVICES, THEY SUPPORT CUSTOMER CONTROL. 27% 48% 12% 13% Yes, severely hindered Yes, somewhat hindered Yes, mildly hindered No, not at all hindered Q39, Q41, Q40 Base = Total sample; n=100 Will your ability to provide insight-based, customized products/services be hindered if digital identities are more carefully controlled by individuals? 33% 62% 3% 1% 1% Yes, customers should own all aspects of their digital identities Yes, customers should own PII (personally identifiable information) and PHI (public health information) but companie No, current levels of security are suitable to protect digital identity I don't know enough about digital identities to know Not applicable to my business Should individuals to have greater control over their digital identity in exchange for a more secure internet? 93% Customers should have a right to decide how to secure their DI. 71% Consumers cannot trust their DI when too much of their data is available without restrictions. 66% Tighter controls over digital identities are not good for my business. 92% My organization’s access to digital identities is important to our ability to offer innovative customer solutions. 74% Our ability to monetize data available in digital identities is at odds with having strict controls around access to DI. Respondents agree:
  • 25. Copyright © 2018 Accenture All rights reserved. 25 THE MAIN BENEFITS OF BLOCKCHAIN ARE SECURITY, SPEED AND TRACEABILITY. THE MAJORITY BELIEVE IT IS ALREADY HELPING WITH INTERNET SECURITY. 70% 58% 50% 39% 30% 28% 25% Increase security Increase speed Real-time track and trace Reduce costs Single source of truth Smart contracts and automation Distributed architecture Q42, Q44, Q43 Base = Total sample; n=100 Advantages of blockchain technology? (Top three) 53% 46% 1% Yes, it is helping already Yes, but it is still in development and not yet mature enough (currently lacking technological maturity) I don't understand enough about blockchain to really know Blockchain as a part of the solution to network/internet security Percent of infrastructure expected to be on blockchain by 2030 (average) Average percent of infrastructure on blockchain by 2030 44%
  • 27. Industry Copyright © 2018 Accenture All rights reserved. 27 THIS STUDY WAS FIELDED OCTOBER - NOVEMBER 2018 Country (HQ) Revenue Title 5 10 5 5 5 5 10 10 5 10 5 10 15 Australia Brazil Canada China France Germany India Italy Japan Spain Switzerland United Kingdom United States 67 21 7 5 CEO Chief Operating… Chief Innovation… Chief Strategy… 44 39 7 10 $5 billion - $10 billion $10 billion - $30… $30 billion More than $30 billion 100Insurance
  • 29. Copyright © 2018 Accenture All rights reserved. 29 DEPENDENCE ON THE INTERNET AS A WAY TO EXECUTE BUSINESS TRANSACTIONS HAS SPIKED WITHIN THE LAST 10 YEARS. 23% 48% 27% 2% More than 10 years ago 6-10 years ago Within the past 1-5 years Within the past year Q2 Base = Total sample; n=100 Approximately when did your business become largely dependent on the internet (for revenue, operations, etc.) to execute transactions on behalf of your business?
  • 30. Copyright © 2018 Accenture All rights reserved. 30 BUT THE INTERNET IS BEING USED IN A WAY THAT IT WAS NOT DESIGNED TO SUPPORT, LEADING TO COMPROMISED CYBERSECURITY. 37% 36% 34% 33% 30% 30% 40% 44% 48% 40% 53% 43% 20% 16% 15% 17% 11% 17% 2% 4% 2% 5% 6% 2% Protecting companies from weaknesses in third parties is increasingly difficult given the complexity of today’s sprawling internet ecosystems. No one organization can solve the cyber security challenges of the internet economy on its own; it will require an organized group effort. Without a dramatic improvement to the security of the internet, the advancement of the internet economy will be severely hindered. The rate of adoption and innovation has outpaced the security features needed to ensure a resilient cyber economy. The exchange of data across the internet has become digitally fragmented as countries restrict the free flow of data across borders in an attempt to secure information exchange. My organization struggles with the trade-off between an open internet economy and the security issues that come with it. Strongly agree Agree Neither agree nor disagree Disagree Strongly disagree I don't know Q7 Base = Total sample; n=100 Please indicate your agreement with each of the following statements:
  • 31. Copyright © 2018 Accenture All rights reserved. 31 PUTTING DATA PRIVACY AND SECURITY FIRST AS WELL AS A UNIFIED FRONT ARE THE TOP THREE PRIORITIES FOR GOVERNANCE. 59% 59% 43% 41% 34% 33% 31% “An attack on one is an attack on all”— member organizations will come to the aid and support of affected members Balance between growth and security (or growth only in context of security) Shared sacrifice (all members will make contribution according to experience/asset levels – but all contribute) Privacy of clients/customers will be separated/delineated from shared data Those with the most risk bear the most responsibility Pledge to not engage questionable ethical activity (e.g. “hack-backs”) Free flow of information/data between network members Q21 Base = Total sample; n=100 Which of the following are the most important governing principles to enable a trustworthy internet economy? (Top three)
  • 32. Copyright © 2018 Accenture All rights reserved. 32 RESPONDENTS REALIZE THE IMPORTANCE OF HAVING THE CEO AS PART OF ANY INITIATIVE TO BUILD A TRUSTWORTHY INTERNET ECONOMY. 54% 54% 48% 46% 40% 35% 28% 11% 4% CEO Chief Security Officer CISO (Chief Information Security Officer) Chief Innovation Officer Chief Information Officer Chief Strategy Officer COO CFO Other C-suite executives Q24 Base = Total sample; n=100 Which C-suite members would be important to have from your organization as part of an initiative to build a trustworthy internet economy? Multiple responses.
  • 33. Copyright © 2018 Accenture All rights reserved. 33 A TRUSTWORTHY INTERNET ECONOMY REQUIRES THE OVERALL SECURITY OF THE INTERNET TO RISE WHILE ADDRESSING PRIORITY AREAS. 30% 25% 16% 14% 13% 1% 1% 69% 71% 64% 44% 46% 1% 1% Raise the overall security of the internet for all users and require all participating organizations to meet these standards Develop trusted organization groups where businesses have communities of commerce and users are validated… Protect technologies that are most vulnerable (e.g., IoT) Enlist governments to be part of the solution Exclude potentially malicious intenders I don’t know None of the above Top Top Three Q8 Base = Total sample; n=100 In your opinion, if organizations were to design a new, more trustworthy internet economy, what would be the most important elements?
  • 34. Copyright © 2018 Accenture All rights reserved. 34 RESPONDENTS GENERALLY WANT STRICTER BUSINESS REGULATIONS ON CYBERSECURITY TO BE IMPOSED. 58% 40% 2% Yes Maybe No Q28 Base = Total sample; n=100 Would you welcome stricter business regulations on cybersecurity imposed by a central organization or governing body?
  • 35. Copyright © 2018 Accenture All rights reserved. 35 A MORE TRUSTWORTHY INTERNET ECONOMY ALLOWS COMPANIES TO ADOPT NEW TECHNOLOGIES WITH LESS SECURITY RISKS. 51% 47% 2% Yes, definitely Maybe I doubt it Q33 Base = Total sample; n=100 Do you believe a more trustworthy internet economy could help mitigate the security risks inherent in the adoption of these new technologies for your business?
  • 36. Copyright © 2018 Accenture All rights reserved. 36 73% 69% 68% 68% 68% 66% 61% 49% 49% 46% 22% Fraud Detection Behavioral Analysis/Insider Threat Detection Performance analysis Big Data Analysis/Data insights (e.g., data processing) Security Monitoring Enhancing IT and help desk functions Chat bot applications (customer service) Autonomous platform processing (Connected Car, Drone, Robot) Other security reasons Plant/Manufacturing Operations Other non-security reasons For which of the following is your organization using artificial intelligence (AI)? AI IS AN IMPORTANT TOOL FOR SECURITY; NEARLY ALL COMPANIES APPLY AI IN SOME WAY FOR CYBERSECURITY. Base = Total sample; n=100 Q36 94% use AI for security reasons including security monitoring and behavioral analysis/insider threat detection.
  • 37. Copyright © 2018 Accenture All rights reserved. 37 EVEN THOUGH RESPONDENTS UNDERSTAND THAT CONTROLLED DIGITAL IDENTITIES WILL LIMIT THEIR ABILITY TO USE CONSUMER INFORMATION FOR THEIR BUSINESS, THEY SUPPORT CUSTOMER CONTROL. 49% 48% 42% 25% 21% 43% 45% 32% 41% 50% 7% 7% 19% 13% 17% 1% 0% 6% 13% 9% My organization’s access to digital identities is important to our ability to offer innovative customer solutions. Customers should have a right to decide how to secure their digital identities. Our ability to monetize data available in digital identities is at odds with having strict controls around access to digital identities. Tighter controls over digital identities are not good for my business. Consumers cannot trust their digital identities when too much of their data is available without restrictions. Strongly agree Agree Neither agree nor disagree Disagree Strongly disagree I don't know Q41 Base = Total sample; n=100 Please indicate your agreement with each of the following statements:
  • 38. Copyright © 2018 Accenture All rights reserved. 38 RESPONDENTS BELIEVE THE MOST COMPELLING BENEFIT OF BLOCKCHAIN IS SECURITY. 33% 17% 12% 11% 10% 9% 8% 70% 58% 28% 50% 25% 39% 30% Increase security Increase speed Smart contracts and automation Real-time track and trace Distributed architecture Reduce costs Single source of truth Top Top Three Q42 Base = Total sample; n=100 What do you see as the most compelling advantages of blockchain technology?
  • 39. Copyright © 2018 Accenture All rights reserved. 39 HOWEVER, MANY BELIEVE BLOCKCHAIN COULD BE HACKED IN THE FUTURE. 25% 53% 20% 2% Blockchain technology has already been hacked and could not be hacked again Blockchain technology has not been hacked though could be hacked in the future Blockchain technology is secure and cannot be hacked I am not familiar with the security of blockchain technology Q45 Base = Total sample; n=100 Which of the following statements best reflects your understanding of the security of blockchain technology?

Notas del editor

  1. internet Weibull cumulative distribution alpha 1.1, beta 3.5
  2. Change to pie charts or some integrated view
  3. Change to pie charts or some integrated view
  4. q15 - Approximately what percentage of the successful breaches are from indirect attacks? Konrad, please populate this so we can see what it looks like. The total percent should equal 100% for all and the % indirect is the average by industry from Q15.