Security as the enabler of your Digital Enterprise
-
Upload
noortje-martens -
Category
Business
-
view
81 -
download
5
Transcript of Security as the enabler of your Digital Enterprise
Security as the Enabler of Your Digital Enterprise
Technology Innovation Forum
29 March 2017
2Copyright © 2016 Accenture. All rights reserved.
Agenda
1. Introduction Accenture Security
2. High Performance Security Research for the Netherlands
3. Demonstration: Accenture Cyber Defence Platform
4. Open Discussion
Copyright © 2016 Accenture. All rights reserved. 3
Introduction to Accenture Security
Copyright © 2016 Accenture. All rights reserved.
“When you invent
The ship, you
also invent
the shipwreck.”
– Paul Virilio
Copyright © 2016 Accenture. All rights reserved. 3
Copyright © 2016 Accenture. All rights reserved.
Accenture Security Services
20+ yearsof experience helping clients
secure their organizations
330+ clientsspanning 67 countries
5,000+security professionals
Washington, DC
Cyber Labs
Centers of Excellence
Cyber Fusion Centers
Tel Aviv
Buenos Aires
ManilaBangalore
Prague
Accenture offers the global reach to be a trusted partner to the world’s largest organizations
6Copyright © 2016 Accenture. All rights reserved.
Introduction Accenture Security
What differentiates Accenture Security
COMPREHENSIVE AND PROVEN END-TO-END SOLUTIONS
• Accenture serves as a single, trusted partner that can rationalize a client’s diverse ecosystem.
• Our comprehensive portfolio of services takes security beyond an organization’s traditional on premise landscape by securing cloud, mobile and industrial operations environments.
TAILORED SOLUTIONS FOR OUR CLIENT’S INDUSTRIES AND BUSINESSES
• Our 5,000+ security professionals deliver intelligent security services that are aligned specifically to each client’s industry and unique business goals.
• Accenture’s heritage as strategists and solution integrators gives us unmatched industry experience.
CONTINUOUS INNOVATION RESULTING IN LEADING-EDGE SOLUTIONS
• Accelerates R&D and allows us to focus on innovating today, while anticipating tomorrow’s threats and opportunities.
• Includes teams of thousands of people across 70 countries.
• Includes 56 industry-open innovation vendor relationships and nine university research partnerships.
Comprehensive end-to-end security services
Strategy & Risk
Cyber Defense
Digital Identity
Application Security
Managed Services
7Copyright © 2016 Accenture. All rights reserved.
Introduction Accenture Security
Innovate through targeted acquisitions
FusionX
Accenture Security Cimation
Maglan
Accenture SecurityAccenture Security consulting and delivery capabilities consist of highly trained security professionals. We have proven methodologies, cutting edge R&D centers and partnerships with market leading technology vendors.
FusionXFusionX further strengthens Accenture’s Cyber Defense capabilities and helps clients accurately assess their ability to protect against, detect and, where necessary, respond to sophisticatedand sustained cyber attacks.
CimationCimation supports the integration of enterprise IT systems and operational technology (OT) needed by resources industries to capitalize on opportunities such as automation solutions, production optimization, asset analytics and ICS cyber security.
MaglanMaglan widens Accenture’s capabilities in advanced offensive cyber simulation; vulnerability research, threat intelligence and malware analysis to help organizations actively combat cyber attacks and maximize their defensive capabilities.
Copyright © 2016 Accenture. All rights reserved. 8
High PerformanceSecurity Research for The NetherlandsHighlights from December 2016 report
9Copyright © 2016 Accenture. All rights reserved. 9
Cybersecurity StrategyRisks Addressed (Ranked 1,2,3)
56%
54%
50% 49%
27%25% 22%
18%
Q1. Which of the following business risks are you addressing with your cybersecurity strategy? [RANK TOP 3]
The line denotes the Global average
55%
48%
54%
36%
30%34%
20%23%
Protecting companyinformation
Protecting companyreputation
Preventing servicedisruption
Protecting customerinformation
Mitigating againstfinancial losses
Mitigating againstlegal/compliance
issues
Protecting employeeprivacy
Providing customersatisfaction
10Copyright © 2016 Accenture. All rights reserved.
Q4 Among the successful breaches, please indicate the type of breaches that had the greatest impact on your organization. [HAD A SUCCESSFUL BREACH]
Type of Successful BreachesMost Impactful (Ranked #1)
43%
26%
19%
4%6%
*(e.g., malicious insiders)**(e.g., insider errors/failure to follow processes and policies)
The line denotes the Global average
1%1%
32%
19%22%
6%
13%
3% 4%
Internal* Accidentally published** Hacker Legacy infrastructure Configuration error Lost/stolen media Lost/stolen computer
11Copyright © 2016 Accenture. All rights reserved.
Confidence in OrganizationExtremely Confident / Confident (Ranked 7, 6 on 7pt. Scale)
Q9 How confident are you that your organization can do the following?
47%44%
42% 41% 39%38%
36%
The line denotes the Global average
37%
25%
35%
41%38%
20%
40%
Measure the impact of abreach
Identify the cause of abreach
Manage financial risk dueto a cybersecurity event
Know the frequency ofbreaches
Manage reputational riskdue to a cybersecurity
event
Monitor for breaches Minimize disruption froma cybersecurity event
Copyright © 2016 Accenture. All rights reserved.
With the evolving regulations and the potential impact of security incidents on brand reputation, financial loss and shareholder value, strengthening cyber security is clearly now a board-level priority.
“Business leaders know it’s not enough to focus purely on prevention of security breaches.”
“To truly defend and empower your organization against failures and recover, you need to detect, intercept and remediate even the most advanced threats.“
Strategy &
Business Alignment
Assessment &
Architecture
Governance, Risk
& Compliance
People & Culture Change
Application &
Data Security
Platform &
Infrastructure Security
Digital Identity
Vulnerability Management
& Threat Intelligence
Advanced Adversary
Simulations
Security Monitoring
Cyber Threat
Analytics
Incident Response
Remediation
Copyright © 2016 Accenture. All rights reserved. 13
Do you recognize this in the context of your organization?
Copyright © 2016 Accenture. All rights reserved. 14
Demonstration:
Accenture Cyber Defence Platform
15Copyright © 2016 Accenture. All rights reserved.
Building Strong Cyber Defense is very Challenging
Threat
The Cyber threat landscape
is overwhelming in volume,
complex and growing
Defense Strategy
It is no longer enough to only
try and prevent or to stick to
compliance alone. A
balanced approach is
needed that covers Identify,
Protect, Detect, Respond
and Recovery capabilities.
Technology
Dynamic and expanding
landscape of technology
vendors and products make
it difficult to build a stable
architecture (product fatigue)
People
Talent with end-to-end
knowledge of monitoring,
hunting, and response to
address the problem are
hard to hire, train and retain
IT Agility
IT evolution happens at a
pace most SOC teams
cannot keep up with. A
sound understanding of the
key assets to be protected is
often lacking
Process and Organization
It is very difficult to achieve
process and organizational
excellence in execution of
security discipline and
continuous improvement
The Accenture Cyber Defense Platform addresses these challenges,
helping clients achieve resilience against cyber threats.
16Copyright © 2016 Accenture. All rights reserved.
Introducing our Security Operating Center in a Box
Plug and play monitoring of security threats across the enterprise, providing rapid security incident detection
and response services, for any scale of organization.
17Copyright © 2016 Accenture. All rights reserved.
Improved Business Value through Awareness
Increased Business Value at Lower Costs
• Ability to detect advanced attacks through
centralized security monitoring for a wide variety of data sources
• Improves the efficiency of incident handling and response
• Very short time to value through our highlyautomated rapid deployment process
• Requires low capital investment and yields lower cost of service
Continuous Innovation and Automation
Security and Operational Excellence
• Accenture brings market leading solutions
and latest innovations from our Cyber
Fusion Centers, R&D (Techlabs) and client experiences
• Centralized security monitoring for a wide
variety of systems and data sources
• Offers flexibility to accommodate changing
business requirements (scalable, no vendor lock-in, incorporation of new tools).
• Leverages standardized best practice
processes enabling quick and cost
effective operations
• Shared resource pool of security
specialists who are skilled, experienced,
and certified on the relevant technologies and processes
18Copyright © 2016 Accenture. All rights reserved.
Combining Best of Breed Solution Components
Copyright © 2017 Accenture All rights reserved 18
Accenture Managed Cyber Defense Services
perform the 24/7 security eyes on glass monitoring
and incident management. Comes with a rich use
case library and continuous innovation and expansion of data source coverage.
Splunk with Splunk Enterprise
Security
provides log storage, near real time
monitoring, search and investigation
capabilities, visualization and reporting through a market leading solution.
Accenture Cyber Defense Platform (ACDP)
Recorded Future (optional)
delivers the up to date Threat Intelligence for
the SOC analysts and client for fast
prioritization and automated alerting of active threats.
ServiceNow
provides the shared SOC workflow for incident
management and service performance reporting
Accenture
Cloud +Platform
Accenture Cloud Platform with
Amazon Web Services
provides cost effective, secure
and scalable architecture. A
dedicated Splunk instance for
every client, in the AWS region of choice.
Copyright © 2016 Accenture. All rights reserved.
Demonstration
21Copyright © 2016 Accenture. All rights reserved.
Advanced Use Case Demonstration
Accenture has built a Splunk App that integrates Palo Alto Networks’ Firewalls and Traps, Tanium’s endpoint
visibility and response software to provide a closed loop solution covering protection, detection and
response capabilities
Security analytics, incident management & evolution with
SPLUNK
Perimeter defense, traffic evaluation& threat intelligence with
PALO ALTO
Endpoint Protection, Asset management& incident response with
TANIUM
22Copyright © 2016 Accenture. All rights reserved.
Use Case Demonstration
The architecture for the demonstration environment was built to highlight the capabilities of the solution
specific to the two use cases. This simplified view shows the architecture.
END POINT LAYER MANAGEMENT LAYER ANALYTICS LAYER
Wildfire
Managed asset(s)
• Palo Alto Traps
• Tanium Endpoint
Unmanaged asset(s)
Cyber Defense Platform App
Copyright © 2016 Accenture. All rights reserved. 23
Discussion:
How does your organization detect security incidents?
Copyright © 2016 Accenture. All rights reserved.
Prague Cyber Fusion Center
30% year-
on-year
headcount
increase
Supporting clients in Europe, Americas, Africa and Asia
Cyber Security Testing and Red Teaming
Security Monitoring and Incident Management
Threat Hunting and Security Analytics
Threat Intelligence and Threat Management
Malware Analysis
Next Gen Network Sec
Attrition
< 10%
Cyber Fusion Centre located
in Prague
International Team
34%
Launch of Key Capabilities for digital
identity, application and cyber security – including
enhanced managed SOC and endpoint security
• Accenture Liquid Workforce
• Specialized Security
expertise on demand
600+Security
Assessments
per year
Cyber Security
Professionals
90+
Serving clients across the globe
Launch of ACIPAccenture’s managed Threat
Hunting service delivery Interdisciplinary skills to protect your assets
Managed
SOC
7
Copyright © 2016 Accenture. All rights reserved.
At our state-of-the-art client visit center, you can see first-hand how we innovate and incubate industrialized, scalable, solutions and deliver security-as-a-Service, 24/7.
We bring together inter-disciplinary capabilities from across the globe, including strategic consulting, transformation, cyber defense and managed services.
Bangalore Cyber Fusion Center
Take a Virtual Tour:
Accenture Cyber Fusion Center in Bengaluru.
Click here.
26Copyright © 2016 Accenture. All rights reserved.
27Copyright © 2016 Accenture. All rights reserved.
Color Palette
Primary palette:
Text and background colors Accent colors