www.accenture.com Open in urlscan Pro
2600:9000:21f3:fc00:d:5159:5a00:93a1  Public Scan

Submitted URL: https://accntu.re/3r2mSS8
Effective URL: https://www.accenture.com/us-en/insights/security/state-cybersecurity
Submission: On May 28 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Skip to main content Skip to footer
Menu

Accenture
Accenture
Close Menu

 * What we do
   
   Back
   What we do
   
   Capabilities Capabilities
   Cloud Cybersecurity Data and Artificial Intelligence Digital Engineering and
   Manufacturing Emerging Technology Enterprise Platforms Finance and Risk
   Management Learning Marketing and Experience Metaverse Private Equity Sales
   and Commerce Strategic Managed Services Strategy Supply Chain Sustainability
   Talent and Organization Technology Transformation
   Industries Industries
   Aerospace and Defense Automotive Banking Capital Markets Chemicals
   Communications and Media Consumer Goods and Services Energy Health High Tech
   Industrial Insurance Life Sciences Natural Resources Public Service Retail
   Software and Platforms Travel US Federal Government Utilities
 * What we think
 * Who we are
   
   Back
   About Accenture
   
   Our organization Our organization
   Leaders Locations 360° Value Report
   Media & Investors Media & Investors
   Media Relations Investor Relations
 * Careers
   
   Back
   Careers home
   
   Find a job Find a job
   Search all jobs Areas of expertise Entry level jobs & internships Experienced
   professionals Executive leaders Military & Veterans
   Life at Accenture Life at Accenture
   Rewards & benefits Training & development Stories of change
   How we hire How we hire
   Recruitment process

 * Contact Us
 * Careers
 * Locations

 * linkedin
   
 * facebook
   
 * instagram
   

Search

USA

Current Country: United States

 * Default (English)
 * All COUNTRIES & LANGUAGES
 * Argentina (Spanish)
 * Australia (English)
 * Austria (German)
 * Belgium (English)
 * Brazil (Portuguese)
 * Bulgaria (English)
 * Canada (English)
 * Canada (French)
 * Chile (Spanish)
 * China/Hong Kong SAR (English)
 * China/Mainland (Chinese)
 * China/Mainland (English)
 * Colombia (Spanish)
 * Costa Rica (English)
 * Czech Republic (English)
 * Denmark (English)
 * Finland (English)
 * France (French)
 * Germany (German)
 * Greece (English)
 * Hungary (English)
 * India (English)
 * Indonesia (English)
 * Ireland (English)
 * Israel (English)
 * Italy (Italian)
 * Japan (Japanese)
 * Latvia (English)
 * Luxembourg (English)
 * Malaysia (English)
 * Mauritius (English)
 * Mexico (Spanish)
 * Morocco (English)
 * Netherlands (English)
 * New Zealand (English)
 * Norway (English)
 * Philippines (English)
 * Poland (English)
 * Poland (Polish)
 * Portugal (Portuguese)
 * Romania (English)
 * Saudi Arabia (English)
 * Singapore (English)
 * Slovakia (English)
 * South Africa (English)
 * Spain (Spanish)
 * Sweden (English)
 * Switzerland (English)
 * Thailand (English)
 * UAE (English)
 * United Kingdom (English)
 * USA (English)



RESEARCH REPORT


STATE OF CYBERSECURITY RESILIENCE 2023

How cybersecurity boosts enterprise reinvention to drive business resilience

10-MINUTE READ




IN BRIEF

 * Disruption is testing global organizations’ approach to risk and resilience
   as most large organizations transform, faster and more frequently.
 * Our latest cybersecurity research reveals some organizations are using
   cybersecurity as a differentiator to deliver better business outcomes.
 * We reveal cyber transformers are nearly 6X more likely to experience more
   effective digital transformations than the rest—and what they do differently.

Read the full report



SECURING TRANSFORMATION SUCCESS

The world has shifted and cybersecurity is shifting with it. The desire to
transform, faster and more frequently, is prompting some organizations to use
cybersecurity as a differentiator to deliver better business outcomes. Our
research revealed that organizations that closely align their cybersecurity
programs to business objectives are 18% more likely to increase their ability to
drive revenue growth, increase market share and improve customer satisfaction,
trust and employee productivity.

What’s more, organizations that embed key cybersecurity actions into their
digital transformation efforts and apply strong cybersecurity operational
practices across the organization—we call them cyber transformers—are nearly six
times more likely to experience more effective digital transformations than
those that don’t do both.



Yet, some organizations aren’t engaging cybersecurity early enough to meet
future challenges and opportunities. We found that, when it comes to embedding
security controls, 18% of our survey respondents still deploy them after they’ve
finalized a transformation effort—and that’s only if vulnerabilities are
detected.




By converting cybersecurity from an incident-driven reaction into part of the
fabric of transformation efforts, organizations can boost cybersecurity
resilience and position themselves to reinvent the whole enterprise, safely.


CYBERSECURITY AS A CHANGEMAKER

We surveyed 3,000 executives from 15 industries and 14 countries. Our research
revealed that more than one-half of organizations are beginning to recognize the
importance of being secure from the start in any transformation effort.

We discovered that most organizations undergoing digital transformation increase
their chances of being fully satisfied with the level of cybersecurity embedded
in their digital transformation efforts by 10 percentage points if they follow
three cybersecurity actions.


THREE ACTIONS TO ACCELERATE TRANSFORMATION

1. Require cybersecurity controls before all new solutions are deployed.

2. Apply cybersecurity incrementally as each digital transformation milestone is
achieved.

3. Assign a cybersecurity representative to the core transformation team and a
point person to orchestrate cybersecurity across all transformation initiatives.


CYBER TRANSFORMERS OUTPERFORM THE REST

We identified a group we call cyber transformers—30% of respondents—who are
already proving how prioritizing cybersecurity makes a difference.

> Cyber transformers build transformation foundations in two ways. They not only
> embed three key cybersecurity actions into their transformation efforts but
> also apply strong cybersecurity operational practices from the start.




STRONG CYBERSECURITY OPERATIONAL PRACTICES

Cyber transformers outperform the rest when they:

 * Excel at integrating cybersecurity and risk management.
 * Leverage cybersecurity as-a-service more frequently to enhance security
   operations.
   
 * Rely more heavily on automation.

As a result, cyber transformers are nearly 6X more likely to experience more
effective digital transformations than the rest.


WHAT IT TAKES TO BE A CYBER TRANSFORMER

Strong cybersecurity operational practices set cyber transformers apart from the
rest.

1. Cyber transformers excel at risk management.

Cyber transformers are six times more likely than the rest to apply leading risk
management practices (65% vs. 11%)

2. Cyber transformers more frequently use cybersecurity as-a-service to enhance
operations.

Forty percent of cyber transformers use third parties or managed services
providers to administer cybersecurity operations and address talent shortages,
versus 24% of the rest.

3. Cyber transformers are more committed to protecting their ecosystem.

Forty-five percent of cyber transformers more often incorporate their ecosystem
or supply chain partners into their incident response plan versus 37% of the
rest; 41% also require them to meet strict cybersecurity standards versus 29% of
the rest.

4. Cyber transformers rely heavily on automation.

A majority (89%) of cyber transformers rely heavily on automation, compared with
just 57% of the rest.

Cybersecurity is essential to maintain dynamic protection in every
transformation program. As our cyber transformers show, business leaders have an
opportunity to make cybersecurity’s impact extend beyond protecting the business
in the here and now, to actively influence continuous, dynamic reinvention.

Read the full report



WRITTEN BY

Paolo Dal Cin

Global Lead – Accenture Security

LinkedIn


Jacky Fox

Lead – Security, EMEA

LinkedIn


James Nunn-Price

Senior Managing Director – Growth Markets Security Lead

LinkedIn


Harpreet Sidhu

Senior Managing Director – Accenture Security, North America Lead

LET THERE BE CHANGE

 * Preference Center
 * Careers
 * About Us
 * Contact Us
 * Locations
 * Sitemap

 * Privacy Statement
 * Terms & Conditions
 * Cookie Policy/Settings
 * Accessibility Statement
 * Do Not Sell/Share My Personal Information (for CA)

© 2024 Accenture. All Rights Reserved.



Welcome to accenture.com! In order to provide a more relevant experience for
you, we use cookies to enable some website functionality. Cookies help us see
which articles most interest you; allow you to easily share articles on social
media; permit us to deliver content, jobs and ads tailored to your interests and
locations; and provide many other site benefits. For more information, please
review our Cookies Policy and Privacy Statement.
Cookies Settings Reject All Accept All Cookies



PRIVACY PREFERENCE CENTER

Any web site that you visit may store or retrieve personal information, mostly
through the use of cookies. The stored or retrieved information might be about
you, your preferences or your device and is used for the purposes specified per
cookies category below. The data controller of your data processed through our
cookies is Accenture PLC. In addition, some cookies we use are from (and
controlled by) third-party companies, such as, Facebook, Microsoft, Marketo
Munchkin Tracking, Twitter, Knotch, Youtube, Instagram, Yoptima and Linkedin
Analytics to provide us with web analytics and intelligence about our sites. You
can accept the cookies as per your preferences by activating the sliders per
cookies category. By accepting cookies, the functionalities described per
cookies category will be activated and by not accepting cookies, such
functionalities will not be activated. Because we respect your right to privacy,
you can choose not to allow some types of cookies and you have the right to
withdraw your consent by adapting your preferences in our cookie consent
manager. Click on the different category headings to find out more and change
our default settings. Please read our Cookies Policy for more information.
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are essential in order to enable you to move around the site and
use its features, such as accessing secure areas of the site. Without these
cookies, services you have asked for cannot be provided.

Cookie Details‎

FIRST PARTY ANALYTICS COOKIES

First Party Analytics Cookies

These cookies allow us to employ data analytics so we can measure and improve
the performance of our site and provide more relevant content to you. These
cookies don't collect information that identifies a visitor down to an
individual level that is available to us. These cookies are not passing
personally identifiable information to any external third party other than in
limited cases when we engage a service provider to act on our behalf but who is
then unable to use the data for their own purposes.

Cookie Details‎

PERFORMANCE COOKIES AND FUNCTIONAL COOKIES

Performance Cookies and Functional Cookies

Performance cookies are generally third-party cookies from vendors we work with
or who work on our behalf that collect information about your visit and use of
the Accenture website, for instance which pages you visit the most often, and if
you get error messages from web pages. These cookies don't collect information
that identifies a visitor. All information these cookies collect is anonymous
and is only used to improve how the website works. Third party vendors may have
access to this data and may use it to improve their overall services and
offerings.

Functionality cookies allow a site to remember choices you make (such as your
user name, language or the region you are in) and provide more enhanced,
personal features. These cookies cannot track your browsing activity on other
websites. They don’t gather any information about you that could be used for
advertising or remembering where you’ve been on the Internet outside our site.

Cookie Details‎

ADVERTISING AND SOCIAL MEDIA COOKIES

Advertising and Social Media Cookies

Third-party advertising and social media cookies are used to (1) deliver
advertisements more relevant to you and your interests; (2) limit the number of
times you see an advertisement; (3) help measure the effectiveness of the
advertising campaign; and (4) understand people’s behavior after they view an
advertisement. They are usually placed on behalf of advertising networks with
the site operator’s permission. They remember that you have visited a site and
quite often they will be linked to site functionality provided by the other
organization. This may impact the content and messages you see on other websites
you visit. If you do not allow these cookies you may not be able to use or see
these sharing tools or play certain videos on our site.

Cookie Details‎
Back Button


COOKIE LIST



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Reject All Confirm My Choices