Transcript
Page 1: Continuous cyber attacks: Building the next-gen infrastructure

Copyright © 2016 Accenture All rights reserved.

Continuous Cyber Attacks:Building the Next-Gen Infrastructure for the New Normal

Page 2: Continuous cyber attacks: Building the next-gen infrastructure

Copyright © 2016 Accenture All rights reserved. 2Copyright © 2016 Accenture All rights reserved.

Digital infrastructure plays a critical role in combatting cyber attacks

What is an effective digital infrastructure?

How can it best be maintained?

How can leaders choose from among the wide range of tools and technology solutions available?

1

2

3

Page 3: Continuous cyber attacks: Building the next-gen infrastructure

Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved.

A comprehensive view of digital security integrates cyber defense into the enterprise environmentA next-generation security infrastructure should:• Provide greater information visibility, context and meaning regarding

security events.

• Give technical analysts the ability to understand the impact of security events in relation to business operations.

• Offer flexible and open access to data and features.

• Drive much deeper integration levels as security infrastructures quickly becomes completely defined by software.

• Leverage automation for faster response times and scalability.

3

Page 4: Continuous cyber attacks: Building the next-gen infrastructure

Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved.

Create the self-defending enterprise.

To deliver a quantum leap in performance.

Focus attention on technology maturity.

To promote security based on business context.

Align threat intelligence with the business environment.

To prepare defenses for what's coming and hunt for what already might be in the environment.

Implement deceptions to trap intruders.

To enable higher fidelity detection of adversaries, learn from their attacks and limit damage.

Leverage automation. To focus security staff on more challenging issues.

Feed the analytics engines.To identify subtle threats based on shifting behaviors in networks and devices.

Creating a next-generation security infrastructure requires the following actions

4

Page 5: Continuous cyber attacks: Building the next-gen infrastructure

Copyright © 2016 Accenture All rights reserved. 5Copyright © 2016 Accenture All rights reserved.

Organizations should rethink their focus on tools to extract the most benefit from them• Infrastructure siloes prevent organizations from

realizing the full potential from the tools and technology deployed.

• Instead, orchestrate existing infrastructure capabilities to disrupt attacks.

• Assess new tools with an eye to replacing multiple older technologies with a single new one.

Page 6: Continuous cyber attacks: Building the next-gen infrastructure

Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved.

Build a next-generation security infrastructure to help achieve operational excellence• Experiment: Pilot new security technologies and automation

solutions, develop use cases and simulate sophisticated attacks.

• Create cross-functional teams: Instead of having separate groups managing the network, the servers and security, organize these experts so they can interact, collaborate and increase the effectiveness of security automation.

• Team to develop talent: Help staff become specialists, while ensuring that the business, infrastructure and security teams know about all projects so they can benefit from each other’s innovations.

• Raise security’s internal profile: Make sure the chief information security officer’s level of influence over the infrastructure is commensurate with that of the IT leader.

6

Page 7: Continuous cyber attacks: Building the next-gen infrastructure

Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved.

Adopt a comprehensive view to the organization’s infrastructure security requirements

7

Look beyond tools. Invest only in technologies with

proven performance.

Ensure all business units remain aligned

and are ready to respond

to cyber attacks.

Page 8: Continuous cyber attacks: Building the next-gen infrastructure

Copyright © 2016 Accenture All rights reserved.Copyright © 2016 Accenture All rights reserved.

Thank YouPlease visit Accenture.com/cyberdefensestrategiesfor additional information.

#CyberDefense

Follow us on Twitter @AccentureSecure

8

Page 9: Continuous cyber attacks: Building the next-gen infrastructure

Copyright © 2016 Accenture All rights reserved. 9Copyright © 2016 Accenture All rights reserved.

About AccentureAccenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions—underpinned by the world’s largest delivery network—Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With approximately 373,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com.

Copyright © 2015 Accenture All rights reserved.


Recommended