Date post: | 14-Jan-2017 |
Category: |
Technology |
Upload: | accenture-technology |
View: | 362 times |
Download: | 0 times |
Continuous Cyber Attacks: Achieving Operational Excellence for the New Normal
External Risk Factors increase an organization's exposure to attack, from:
Defined strategy of how security supports business performance
Forward-thinking capabilities to help scale activities
IT strategy that provides greater understanding of assets, data sets, technical and business functions
High-powered analytics to predict and detect incidents, and identify behavior changes that indicate security risks
1. Assess e�ectiveness of current security processes
2. Invest in attracting and retaining skilled security talent
3. Automate intelligently to leverage scarce resources
4. Understand how threat data pertains to the business
5. Identify what isn’t known
6. Create a plan to address knowledge gaps
7. Find an e�ective sparring partner that will improve security capabilities
Emphasis on visualization to identify anomalies quickly from large volumes of data
Platforms that guide operators in hunting for threats
Training that mimics attackers, to prepare for real-world adversaries
• Volume of connected devices
• Expansion of Internet of Things
• Growth of cloud computing
© 2016 Accenture. All rights reserved. Accenture, its logo, and High performance. Delivered. are trademarks of Accenture.
Follow us on Twitter: @AccentureSecure
For more information, visit: Accenture.com/CyberDefensePlan
• Lack of rigor and consistency in security practices
• High turnover within security team
• Frequent IT changes not communicated
• Insu�cient visibility to critical assets
• Length of time taken to detect breaches
Internal Risk Factors increase due to:
The best cyber defense strategy, supported with the latest technology, can still fail if not executed properly.
Best practices that drive improved security operations:
Create a highly e�cient operating model that balances security operations, new technology implementation, testing of security posture and feedback to update defenses.
Steps to improve security operations:
RESPOND
PREP
ARE PROTECT
DEFEND &
DET
ECT
Incident Response
Remediation
Strategy & Business Alignment
Assessment & Architecture
Governance, Risk & Compliance
People & Culture Change
Application & Data Security
Platform & Infrastructure Security
Digital Identity
Vulnerability Management & Threat Intelligence
Advanced Adversary Simulations
Security Monitoring
Cyber Threat Analytics
T RA
NS
FO
RM
ATIO
N
S T R A T E G Y
MA
NA
GE D
S E C U R I T Y & C Y B E R D E F E N S E