www.accenture.com
Open in
urlscan Pro
2600:9000:21f3:1000:d:5159:5a00:93a1
Public Scan
Submitted URL: https://accntu.re/3r2mSS8
Effective URL: https://www.accenture.com/us-en/insights/security/state-cybersecurity
Submission: On May 30 via api from US — Scanned from DE
Effective URL: https://www.accenture.com/us-en/insights/security/state-cybersecurity
Submission: On May 30 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Skip to main content Skip to footer Menu Accenture Accenture Close Menu * What we do Back What we do Capabilities Capabilities Cloud Cybersecurity Data and Artificial Intelligence Digital Engineering and Manufacturing Emerging Technology Enterprise Platforms Finance and Risk Management Learning Marketing and Experience Metaverse Private Equity Sales and Commerce Strategic Managed Services Strategy Supply Chain Sustainability Talent and Organization Technology Transformation Industries Industries Aerospace and Defense Automotive Banking Capital Markets Chemicals Communications and Media Consumer Goods and Services Energy Health High Tech Industrial Insurance Life Sciences Natural Resources Public Service Retail Software and Platforms Travel US Federal Government Utilities * What we think * Who we are Back About Accenture Our organization Our organization Leaders Locations 360° Value Report Media & Investors Media & Investors Media Relations Investor Relations * Careers Back Careers home Find a job Find a job Search all jobs Areas of expertise Entry level jobs & internships Experienced professionals Executive leaders Military & Veterans Life at Accenture Life at Accenture Rewards & benefits Training & development Stories of change How we hire How we hire Recruitment process * Contact Us * Careers * Locations * linkedin * facebook * instagram Search USA Current Country: United States * Default (English) * All COUNTRIES & LANGUAGES * Argentina (Spanish) * Australia (English) * Austria (German) * Belgium (English) * Brazil (Portuguese) * Bulgaria (English) * Canada (English) * Canada (French) * Chile (Spanish) * China/Hong Kong SAR (English) * China/Mainland (Chinese) * China/Mainland (English) * Colombia (Spanish) * Costa Rica (English) * Czech Republic (English) * Denmark (English) * Finland (English) * France (French) * Germany (German) * Greece (English) * Hungary (English) * India (English) * Indonesia (English) * Ireland (English) * Israel (English) * Italy (Italian) * Japan (Japanese) * Latvia (English) * Luxembourg (English) * Malaysia (English) * Mauritius (English) * Mexico (Spanish) * Morocco (English) * Netherlands (English) * New Zealand (English) * Norway (English) * Philippines (English) * Poland (English) * Poland (Polish) * Portugal (Portuguese) * Romania (English) * Saudi Arabia (English) * Singapore (English) * Slovakia (English) * South Africa (English) * Spain (Spanish) * Sweden (English) * Switzerland (English) * Thailand (English) * UAE (English) * United Kingdom (English) * USA (English) RESEARCH REPORT STATE OF CYBERSECURITY RESILIENCE 2023 How cybersecurity boosts enterprise reinvention to drive business resilience 10-MINUTE READ IN BRIEF * Disruption is testing global organizations’ approach to risk and resilience as most large organizations transform, faster and more frequently. * Our latest cybersecurity research reveals some organizations are using cybersecurity as a differentiator to deliver better business outcomes. * We reveal cyber transformers are nearly 6X more likely to experience more effective digital transformations than the rest—and what they do differently. Read the full report SECURING TRANSFORMATION SUCCESS The world has shifted and cybersecurity is shifting with it. The desire to transform, faster and more frequently, is prompting some organizations to use cybersecurity as a differentiator to deliver better business outcomes. Our research revealed that organizations that closely align their cybersecurity programs to business objectives are 18% more likely to increase their ability to drive revenue growth, increase market share and improve customer satisfaction, trust and employee productivity. What’s more, organizations that embed key cybersecurity actions into their digital transformation efforts and apply strong cybersecurity operational practices across the organization—we call them cyber transformers—are nearly six times more likely to experience more effective digital transformations than those that don’t do both. Yet, some organizations aren’t engaging cybersecurity early enough to meet future challenges and opportunities. We found that, when it comes to embedding security controls, 18% of our survey respondents still deploy them after they’ve finalized a transformation effort—and that’s only if vulnerabilities are detected. By converting cybersecurity from an incident-driven reaction into part of the fabric of transformation efforts, organizations can boost cybersecurity resilience and position themselves to reinvent the whole enterprise, safely. CYBERSECURITY AS A CHANGEMAKER We surveyed 3,000 executives from 15 industries and 14 countries. Our research revealed that more than one-half of organizations are beginning to recognize the importance of being secure from the start in any transformation effort. We discovered that most organizations undergoing digital transformation increase their chances of being fully satisfied with the level of cybersecurity embedded in their digital transformation efforts by 10 percentage points if they follow three cybersecurity actions. THREE ACTIONS TO ACCELERATE TRANSFORMATION 1. Require cybersecurity controls before all new solutions are deployed. 2. Apply cybersecurity incrementally as each digital transformation milestone is achieved. 3. Assign a cybersecurity representative to the core transformation team and a point person to orchestrate cybersecurity across all transformation initiatives. CYBER TRANSFORMERS OUTPERFORM THE REST We identified a group we call cyber transformers—30% of respondents—who are already proving how prioritizing cybersecurity makes a difference. > Cyber transformers build transformation foundations in two ways. They not only > embed three key cybersecurity actions into their transformation efforts but > also apply strong cybersecurity operational practices from the start. STRONG CYBERSECURITY OPERATIONAL PRACTICES Cyber transformers outperform the rest when they: * Excel at integrating cybersecurity and risk management. * Leverage cybersecurity as-a-service more frequently to enhance security operations. * Rely more heavily on automation. As a result, cyber transformers are nearly 6X more likely to experience more effective digital transformations than the rest. WHAT IT TAKES TO BE A CYBER TRANSFORMER Strong cybersecurity operational practices set cyber transformers apart from the rest. 1. Cyber transformers excel at risk management. Cyber transformers are six times more likely than the rest to apply leading risk management practices (65% vs. 11%) 2. Cyber transformers more frequently use cybersecurity as-a-service to enhance operations. Forty percent of cyber transformers use third parties or managed services providers to administer cybersecurity operations and address talent shortages, versus 24% of the rest. 3. Cyber transformers are more committed to protecting their ecosystem. Forty-five percent of cyber transformers more often incorporate their ecosystem or supply chain partners into their incident response plan versus 37% of the rest; 41% also require them to meet strict cybersecurity standards versus 29% of the rest. 4. Cyber transformers rely heavily on automation. A majority (89%) of cyber transformers rely heavily on automation, compared with just 57% of the rest. Cybersecurity is essential to maintain dynamic protection in every transformation program. As our cyber transformers show, business leaders have an opportunity to make cybersecurity’s impact extend beyond protecting the business in the here and now, to actively influence continuous, dynamic reinvention. Read the full report WRITTEN BY Paolo Dal Cin Global Lead – Accenture Security LinkedIn Jacky Fox Lead – Security, EMEA LinkedIn James Nunn-Price Senior Managing Director – Growth Markets Security Lead LinkedIn Harpreet Sidhu Senior Managing Director – Accenture Security, North America Lead LET THERE BE CHANGE * Preference Center * Careers * About Us * Contact Us * Locations * Sitemap * Privacy Statement * Terms & Conditions * Cookie Policy/Settings * Accessibility Statement * Do Not Sell/Share My Personal Information (for CA) © 2024 Accenture. All Rights Reserved. Welcome to accenture.com! In order to provide a more relevant experience for you, we use cookies to enable some website functionality. Cookies help us see which articles most interest you; allow you to easily share articles on social media; permit us to deliver content, jobs and ads tailored to your interests and locations; and provide many other site benefits. For more information, please review our Cookies Policy and Privacy Statement. Cookies Settings Reject All Accept All Cookies PRIVACY PREFERENCE CENTER Any web site that you visit may store or retrieve personal information, mostly through the use of cookies. The stored or retrieved information might be about you, your preferences or your device and is used for the purposes specified per cookies category below. The data controller of your data processed through our cookies is Accenture PLC. In addition, some cookies we use are from (and controlled by) third-party companies, such as, Facebook, Microsoft, Marketo Munchkin Tracking, Twitter, Knotch, Youtube, Instagram, Yoptima and Linkedin Analytics to provide us with web analytics and intelligence about our sites. You can accept the cookies as per your preferences by activating the sliders per cookies category. By accepting cookies, the functionalities described per cookies category will be activated and by not accepting cookies, such functionalities will not be activated. Because we respect your right to privacy, you can choose not to allow some types of cookies and you have the right to withdraw your consent by adapting your preferences in our cookie consent manager. Click on the different category headings to find out more and change our default settings. Please read our Cookies Policy for more information. Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are essential in order to enable you to move around the site and use its features, such as accessing secure areas of the site. Without these cookies, services you have asked for cannot be provided. Cookie Details FIRST PARTY ANALYTICS COOKIES First Party Analytics Cookies These cookies allow us to employ data analytics so we can measure and improve the performance of our site and provide more relevant content to you. These cookies don't collect information that identifies a visitor down to an individual level that is available to us. These cookies are not passing personally identifiable information to any external third party other than in limited cases when we engage a service provider to act on our behalf but who is then unable to use the data for their own purposes. Cookie Details PERFORMANCE COOKIES AND FUNCTIONAL COOKIES Performance Cookies and Functional Cookies Performance cookies are generally third-party cookies from vendors we work with or who work on our behalf that collect information about your visit and use of the Accenture website, for instance which pages you visit the most often, and if you get error messages from web pages. These cookies don't collect information that identifies a visitor. All information these cookies collect is anonymous and is only used to improve how the website works. Third party vendors may have access to this data and may use it to improve their overall services and offerings. Functionality cookies allow a site to remember choices you make (such as your user name, language or the region you are in) and provide more enhanced, personal features. These cookies cannot track your browsing activity on other websites. They don’t gather any information about you that could be used for advertising or remembering where you’ve been on the Internet outside our site. Cookie Details ADVERTISING AND SOCIAL MEDIA COOKIES Advertising and Social Media Cookies Third-party advertising and social media cookies are used to (1) deliver advertisements more relevant to you and your interests; (2) limit the number of times you see an advertisement; (3) help measure the effectiveness of the advertising campaign; and (4) understand people’s behavior after they view an advertisement. They are usually placed on behalf of advertising networks with the site operator’s permission. They remember that you have visited a site and quite often they will be linked to site functionality provided by the other organization. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools or play certain videos on our site. Cookie Details Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Reject All Confirm My Choices