SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
ACHIEVING CYBER RESILIENCE IN
CONSUMER GOODS AND SERVICES
CONSPICUOUS
SECURITY
CONSUMPTION
Copyright © 2018 Accenture. All rights reserved. 2
CISOs in CG&S companies need to
address new threats from across the
value chain in:
• Product development
• Manufacturing
• Supply chain
• Customer operations
Inconsistent security maturity
Decades of M&A have taken their toll
of CG&S executives said that
“cyberattacks are a bit of a black box,
we do not quite know how or when
they will affect our organization.”
70%
Copyright © 2018 Accenture. All rights reserved. 3
Build a business that is secure by design
Security technologies identified had a
negative value gap where the percentage
spending level is higher than the relative
value to the business.*
5/9
CG&S companies are under
pressure because:
• Spending priorities show that
investments are misdirected toward
security capabilities that fail to deliver
efficiency and effectiveness
• Security executives do not have the
visibility into the non-IT asset landscape
or the authority to impact risk outcomes
in these areas of the business
Copyright © 2018 Accenture. All rights reserved. 4
Three areas that can positively impact the
CG&S risk posture include:
Secure the journey to cloud
Build trust in direct-to-customer initiatives
Manage operational technology risk
Copyright © 2018 Accenture. All rights reserved. 5
Secure the journey to the cloud
of CG&S companies identified “better security”
as a benefit to be gained from cloud migration.
53%
To reduce costs, many CG&S
companies are moving to the
cloud. It offers an opportunity to:
• Re-examine the business—especially
applications, infrastructure, operations
and development processes
• Prioritize security around core assets
• “Design in” a control structure to
mitigate risks
Copyright © 2018 Accenture. All rights reserved. 6
Build trust in direct-to-consumer initiatives
of security breaches
experienced by CG&S
organizations have been
linked with customer
data in the last 12
months.
50%
A customer facing, data-driven
strategy can better inform the
business. It offers an opportunity to:
• Introduce cybersecurity early on in the process
to proactively mitigate risk
• Influence consumers’ purchasing decisions
through improved digital trust and privacy
• Be better prepared for regulatory demands
Copyright © 2018 Accenture. All rights reserved. 7
Manage operational technology risk
of CG&S executives said that
they had suffered interruption of
physical operations/shutdown
of assets as a result of a breach.
43%
As OT networks become less
isolated from IT networks, so their
vulnerabilities grow. Issues include:
• A lack of security accountability
• Inconsistent security processes
• Inconsistent technical controls
• Incomplete asset visibility
Copyright © 2018 Accenture. All rights reserved. 8
The nature of cyberattacks is shifting
of CG&S executives think they are protecting
their physical infrastructures/assets with their
cybersecurity strategy.
ONLY
26%
Source: The untold story of NotPetya the most devastating attack in cyber history, Wired,
August 22, 2018. https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-
crashed-the-world/
In 2017, malware Petya had a
significant financial impact.
Sample losses include:
US$129M
British manufacturer
US$188M
Global Snack company
Copyright © 2018 Accenture. All rights reserved. 9
Security is
everyone’s business
of CG&S executives say that
cybersecurity budget
authorization is with the
CEO/Executive Committee,
more than the global average.
34%
of CG&S executives recognize
they need to improve on cyber
threat analytics and 46% on
security monitoring—the
“basics” of security programs.
50%
A cultural mind-set shift is
required so that:
• CISOs can become trusted business
partners
• Business leaders responsible for funding can
better understand security priorities
• Security can be a business and revenue
enabler as well as driving out risk
Copyright © 2018 Accenture Security. All rights reserved. 10
Put Security First
Actions to achieve cyber resilience
01
02
03
Organize security around business outcomes
Identify your “crown jewels”
Invest appropriately to tackle security hygiene
Introduce mandatory security checkpoints in the development or engineering,
procurement and budgeting processes to anticipate new risks.
Understand and account for existing assets across the organization and
determine risk-based priorities.
Become brilliant at the basics by tackling security hygiene and risk management
programs.
04 Institutionalize security practices
Embed security disciplines that address today’s needs and have the potential to
serve tomorrow’s demands.
Copyright © 2018 Accenture. All rights reserved. 11
About the research
11
410 Consumer Goods &
Services respondents
93 Companies with
revenues >US$10 bn
Survey
Respondents
• Chief Information Officer
• Chief Security Officer
• Chief Compliance Officer
• Chief Risk Officer
• Corporate Security Officer
Australia | Brazil | Canada | France
Germany | Ireland | Italy | Japan
Netherlands | Norway | Singapore
Spain | United Arab Emirates
United Kingdom | United States
15 Countries:
Survey conducted 2018
12
Read the full report:
www.accenture.com/cgs-cyber-resilience
About Accenture
Accenture is a leading global professional services
company, providing a broad range of services and
solutions in strategy, consulting, digital, technology and
operations. Combining unmatched experience and
specialized skills across more than 40 industries and all
business functions—underpinned by the world’s largest
delivery network—Accenture works at the intersection of
business and technology to help clients improve their
performance and create sustainable value for their
stakeholders. With 459,000 people serving clients in
more than 120 countries, Accenture drives innovation to
improve the way the world works and lives.
Visit us at www.accenture.com.
Stay Connected
Note: Unless otherwise stated, the statistics in this point of view represent retail respondents in
the survey report “Gaining ground on the attacker: 2018 State of Cyber Resilience,” Accenture
2018.
*Source: 2017 Cost of Cybercrime Study, Accenture and the Ponemon Institute
Copyright © 2018 Accenture. All rights reserved. Accenture, its logo, and New Applied Now are
trademarks of Accenture.
/showcase/accenture-consumer-goods
/showcase/accentureconsulting
@AccentureCPG
@AccentureConslt

Más contenido relacionado

La actualidad más candente

Modernizing Integration with Data Virtualization
Modernizing Integration with Data VirtualizationModernizing Integration with Data Virtualization
Modernizing Integration with Data VirtualizationDenodo
 
Supply Chain Transformation on the Cloud |Accenture
Supply Chain Transformation on the Cloud |AccentureSupply Chain Transformation on the Cloud |Accenture
Supply Chain Transformation on the Cloud |Accentureaccenture
 
The Rise of Forerunners | Accenture
The Rise of Forerunners | AccentureThe Rise of Forerunners | Accenture
The Rise of Forerunners | Accentureaccenture
 
Ever–ready for every opportunity
Ever–ready for every opportunityEver–ready for every opportunity
Ever–ready for every opportunityaccenture
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
DXC Presentation.pptx
DXC Presentation.pptxDXC Presentation.pptx
DXC Presentation.pptxTechMeetups
 
Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...
Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...
Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...Amazon Web Services
 
Accelerate Cloud Migration to AWS Cloud with Cognizant Cloud Steps
Accelerate Cloud Migration to AWS Cloud with Cognizant Cloud StepsAccelerate Cloud Migration to AWS Cloud with Cognizant Cloud Steps
Accelerate Cloud Migration to AWS Cloud with Cognizant Cloud StepsAmazon Web Services
 
End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to GreatEnd-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Greataccenture
 
Accenture Regulatory Services
Accenture Regulatory ServicesAccenture Regulatory Services
Accenture Regulatory Servicesaccenture
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookMargarete McGrath
 
Business Composability
Business ComposabilityBusiness Composability
Business ComposabilityCOMPETENSIS
 
Zero trust strategy: cloud security by design
Zero trust strategy: cloud security by designZero trust strategy: cloud security by design
Zero trust strategy: cloud security by designaccenture
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
Shadow IT - What is it, why it happens and how to resolve
Shadow IT - What is it, why it happens and how to resolveShadow IT - What is it, why it happens and how to resolve
Shadow IT - What is it, why it happens and how to resolveFreshservice
 
Security Modelling in ArchiMate
Security Modelling in ArchiMateSecurity Modelling in ArchiMate
Security Modelling in ArchiMatePECB
 
Rethinking Accenture's network
Rethinking Accenture's networkRethinking Accenture's network
Rethinking Accenture's networkaccenture
 
Research and Development Solutions | Accenture
Research and Development Solutions | AccentureResearch and Development Solutions | Accenture
Research and Development Solutions | Accentureaccenture
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 

La actualidad más candente (20)

Modernizing Integration with Data Virtualization
Modernizing Integration with Data VirtualizationModernizing Integration with Data Virtualization
Modernizing Integration with Data Virtualization
 
Supply Chain Transformation on the Cloud |Accenture
Supply Chain Transformation on the Cloud |AccentureSupply Chain Transformation on the Cloud |Accenture
Supply Chain Transformation on the Cloud |Accenture
 
The Rise of Forerunners | Accenture
The Rise of Forerunners | AccentureThe Rise of Forerunners | Accenture
The Rise of Forerunners | Accenture
 
Ever–ready for every opportunity
Ever–ready for every opportunityEver–ready for every opportunity
Ever–ready for every opportunity
 
Understanding SASE
Understanding SASE Understanding SASE
Understanding SASE
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
DXC Presentation.pptx
DXC Presentation.pptxDXC Presentation.pptx
DXC Presentation.pptx
 
Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...
Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...
Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...
 
Accelerate Cloud Migration to AWS Cloud with Cognizant Cloud Steps
Accelerate Cloud Migration to AWS Cloud with Cognizant Cloud StepsAccelerate Cloud Migration to AWS Cloud with Cognizant Cloud Steps
Accelerate Cloud Migration to AWS Cloud with Cognizant Cloud Steps
 
End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to GreatEnd-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Great
 
Accenture Regulatory Services
Accenture Regulatory ServicesAccenture Regulatory Services
Accenture Regulatory Services
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
Business Composability
Business ComposabilityBusiness Composability
Business Composability
 
Zero trust strategy: cloud security by design
Zero trust strategy: cloud security by designZero trust strategy: cloud security by design
Zero trust strategy: cloud security by design
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
Shadow IT - What is it, why it happens and how to resolve
Shadow IT - What is it, why it happens and how to resolveShadow IT - What is it, why it happens and how to resolve
Shadow IT - What is it, why it happens and how to resolve
 
Security Modelling in ArchiMate
Security Modelling in ArchiMateSecurity Modelling in ArchiMate
Security Modelling in ArchiMate
 
Rethinking Accenture's network
Rethinking Accenture's networkRethinking Accenture's network
Rethinking Accenture's network
 
Research and Development Solutions | Accenture
Research and Development Solutions | AccentureResearch and Development Solutions | Accenture
Research and Development Solutions | Accenture
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 

Similar a Accenture Security CG&S Cyber Resilience

Securing Consumer Trust
Securing Consumer TrustSecuring Consumer Trust
Securing Consumer Trustaccenture
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber ResilienceAccenture Security
 
Healthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber ResilienceHealthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber Resilienceaccenture
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilienceaccenture
 
Security in the driver's seat: Achieving cyber resilience in automotive
Security in the driver's seat: Achieving cyber resilience in automotiveSecurity in the driver's seat: Achieving cyber resilience in automotive
Security in the driver's seat: Achieving cyber resilience in automotiveaccenture
 
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018Accenture Australia
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Securing the Industrial Enterprise
Securing the Industrial EnterpriseSecuring the Industrial Enterprise
Securing the Industrial Enterpriseaccenture
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondNandita Nityanandam
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.accenture
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.accenture
 
Fast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance OperationsFast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance OperationsAccenture Operations
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Pierre Audoin Consultants
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
Securing the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustSecuring the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustAccenture Insurance
 
Thinking out of the toolbox full deck
Thinking out of the toolbox full deckThinking out of the toolbox full deck
Thinking out of the toolbox full deckSusanna Harper
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
 

Similar a Accenture Security CG&S Cyber Resilience (20)

Securing Consumer Trust
Securing Consumer TrustSecuring Consumer Trust
Securing Consumer Trust
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber Resilience
 
Healthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber ResilienceHealthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber Resilience
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilience
 
Security in the driver's seat: Achieving cyber resilience in automotive
Security in the driver's seat: Achieving cyber resilience in automotiveSecurity in the driver's seat: Achieving cyber resilience in automotive
Security in the driver's seat: Achieving cyber resilience in automotive
 
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Securing the Industrial Enterprise
Securing the Industrial EnterpriseSecuring the Industrial Enterprise
Securing the Industrial Enterprise
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
 
Fast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance OperationsFast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance Operations
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises?
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
Securing the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustSecuring the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for Trust
 
Qradar Business Case
Qradar Business CaseQradar Business Case
Qradar Business Case
 
Thinking out of the toolbox full deck
Thinking out of the toolbox full deckThinking out of the toolbox full deck
Thinking out of the toolbox full deck
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 

Más de accenture

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024accenture
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileaccenture
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial Systemaccenture
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyaccenture
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023accenture
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operationsaccenture
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Studyaccenture
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023accenture
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented changeaccenture
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% meaccenture
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023accenture
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoaccenture
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industryaccenture
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023accenture
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accentureaccenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accentureaccenture
 

Más de accenture (20)

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 

Último

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Accenture Security CG&S Cyber Resilience

  • 1. ACHIEVING CYBER RESILIENCE IN CONSUMER GOODS AND SERVICES CONSPICUOUS SECURITY CONSUMPTION
  • 2. Copyright © 2018 Accenture. All rights reserved. 2 CISOs in CG&S companies need to address new threats from across the value chain in: • Product development • Manufacturing • Supply chain • Customer operations Inconsistent security maturity Decades of M&A have taken their toll of CG&S executives said that “cyberattacks are a bit of a black box, we do not quite know how or when they will affect our organization.” 70%
  • 3. Copyright © 2018 Accenture. All rights reserved. 3 Build a business that is secure by design Security technologies identified had a negative value gap where the percentage spending level is higher than the relative value to the business.* 5/9 CG&S companies are under pressure because: • Spending priorities show that investments are misdirected toward security capabilities that fail to deliver efficiency and effectiveness • Security executives do not have the visibility into the non-IT asset landscape or the authority to impact risk outcomes in these areas of the business
  • 4. Copyright © 2018 Accenture. All rights reserved. 4 Three areas that can positively impact the CG&S risk posture include: Secure the journey to cloud Build trust in direct-to-customer initiatives Manage operational technology risk
  • 5. Copyright © 2018 Accenture. All rights reserved. 5 Secure the journey to the cloud of CG&S companies identified “better security” as a benefit to be gained from cloud migration. 53% To reduce costs, many CG&S companies are moving to the cloud. It offers an opportunity to: • Re-examine the business—especially applications, infrastructure, operations and development processes • Prioritize security around core assets • “Design in” a control structure to mitigate risks
  • 6. Copyright © 2018 Accenture. All rights reserved. 6 Build trust in direct-to-consumer initiatives of security breaches experienced by CG&S organizations have been linked with customer data in the last 12 months. 50% A customer facing, data-driven strategy can better inform the business. It offers an opportunity to: • Introduce cybersecurity early on in the process to proactively mitigate risk • Influence consumers’ purchasing decisions through improved digital trust and privacy • Be better prepared for regulatory demands
  • 7. Copyright © 2018 Accenture. All rights reserved. 7 Manage operational technology risk of CG&S executives said that they had suffered interruption of physical operations/shutdown of assets as a result of a breach. 43% As OT networks become less isolated from IT networks, so their vulnerabilities grow. Issues include: • A lack of security accountability • Inconsistent security processes • Inconsistent technical controls • Incomplete asset visibility
  • 8. Copyright © 2018 Accenture. All rights reserved. 8 The nature of cyberattacks is shifting of CG&S executives think they are protecting their physical infrastructures/assets with their cybersecurity strategy. ONLY 26% Source: The untold story of NotPetya the most devastating attack in cyber history, Wired, August 22, 2018. https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code- crashed-the-world/ In 2017, malware Petya had a significant financial impact. Sample losses include: US$129M British manufacturer US$188M Global Snack company
  • 9. Copyright © 2018 Accenture. All rights reserved. 9 Security is everyone’s business of CG&S executives say that cybersecurity budget authorization is with the CEO/Executive Committee, more than the global average. 34% of CG&S executives recognize they need to improve on cyber threat analytics and 46% on security monitoring—the “basics” of security programs. 50% A cultural mind-set shift is required so that: • CISOs can become trusted business partners • Business leaders responsible for funding can better understand security priorities • Security can be a business and revenue enabler as well as driving out risk
  • 10. Copyright © 2018 Accenture Security. All rights reserved. 10 Put Security First Actions to achieve cyber resilience 01 02 03 Organize security around business outcomes Identify your “crown jewels” Invest appropriately to tackle security hygiene Introduce mandatory security checkpoints in the development or engineering, procurement and budgeting processes to anticipate new risks. Understand and account for existing assets across the organization and determine risk-based priorities. Become brilliant at the basics by tackling security hygiene and risk management programs. 04 Institutionalize security practices Embed security disciplines that address today’s needs and have the potential to serve tomorrow’s demands.
  • 11. Copyright © 2018 Accenture. All rights reserved. 11 About the research 11 410 Consumer Goods & Services respondents 93 Companies with revenues >US$10 bn Survey Respondents • Chief Information Officer • Chief Security Officer • Chief Compliance Officer • Chief Risk Officer • Corporate Security Officer Australia | Brazil | Canada | France Germany | Ireland | Italy | Japan Netherlands | Norway | Singapore Spain | United Arab Emirates United Kingdom | United States 15 Countries: Survey conducted 2018
  • 12. 12 Read the full report: www.accenture.com/cgs-cyber-resilience About Accenture Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions—underpinned by the world’s largest delivery network—Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With 459,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com. Stay Connected Note: Unless otherwise stated, the statistics in this point of view represent retail respondents in the survey report “Gaining ground on the attacker: 2018 State of Cyber Resilience,” Accenture 2018. *Source: 2017 Cost of Cybercrime Study, Accenture and the Ponemon Institute Copyright © 2018 Accenture. All rights reserved. Accenture, its logo, and New Applied Now are trademarks of Accenture. /showcase/accenture-consumer-goods /showcase/accentureconsulting @AccentureCPG @AccentureConslt