建立广泛的网络弹性.pdf

返回 相关 举报
建立广泛的网络弹性.pdf_第1页
第1页 / 共35页
建立广泛的网络弹性.pdf_第2页
第2页 / 共35页
建立广泛的网络弹性.pdf_第3页
第3页 / 共35页
建立广泛的网络弹性.pdf_第4页
第4页 / 共35页
建立广泛的网络弹性.pdf_第5页
第5页 / 共35页
亲,该文档总共35页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述
1 SECURING THE FUTURE ENTERPRISE TODAY 2018When everything is digital, everything is at riskSecuring the Future Enterprise Today 2018BUILD PERVASIVE CYBER RESILIENCE NOW2 SECURING THE FUTURE ENTERPRISE TODAY 2018ContentsWhen everything is digital, everything is at riskTodays security strategies are winning the last warHow to protect the futureGrow future business with confidence41115303 SECURING THE FUTURE ENTERPRISE TODAY 2018COMPANIES ARE RACING INTO THE DIGITAL FUTUREADOPTING TECHNOLOGY-ENABLED OPERATING AND BUSINESS MODELS THAT DRIVE BOTTOM- AND TOP-LINE GROWTH.They are not prepared for the new cyber risks that come with the connected, data-driven future enterprise. To be cyber resilient, organizations need to infuse security into everything they doand every new thing they are preparing to do.4 SECURING THE FUTURE ENTERPRISE TODAY 2018Companies everywhere are betting on a wholesale shift to tech-enabled business and operating models that promise to deliver bottom-line savings and top-line growth. They are building an enterprise that is faster, smarter, leaner, and more responsivewhat Accenture calls “rotating to the new.” This future business relies upon constant, intimate digital connections with suppliers, partners, and customers to stay relevant and competitive. It uses intelligent technologies and big data in all facets of business operationsfrom C-suite decision making to crafting custom offers for Internet shoppers in pursuit of profitable growth. It deploys autonomous machines and automated processes to simultaneously augment the workforce, raise productivity and decrease cost.When everything is digital, everything is at riskThe connected, intelligent, and autonomous enterprise comes with additional cyber risk. All that sensitive data, connectivity, and automation multiplies the opportunities for hackers by expanding the “surface area” exposed to cyber attack. And, because digital systems are so embedded in daily operations, the potential damage from even a single security incident is magnified. The future is arriving now, along with more cyber riskVirtually everything that makes the future business more efficient, fast-moving, and competitive involves some type 5 SECURING THE FUTURE ENTERPRISE TODAY 2018of digital system or network connection that is open to the introduction of corruptive elements and vulnerable to incidents. Both the data and the programs that provide intelligence, for example, can be hacked. A subtle change in an AI algorithm or the data used by a machine learning systemto evaluate loan applications, for examplemight go undetected, leaving the company to take actions based upon tainted output. Nefarious interference in a robot or an autonomous vehicle system could be life-threatening. As many companies have learned the hard way, breaches of customers sensitive and personally identifiable information can not only disrupt business, but also destroy the trust needed to retain customers (both B2B and consumer) in the new world of digital business.CONNECTEDALWAYS ON, ALWAYS VULNERABLEThe future business relies on 24/7 connectivity to carry out internal processes, work with partners, and reach customers. Companies are linked electronically across value chains and supply chains with a growing universe of suppliers, partners, distributors, customers, and other external partiesincreasingly over wireless networks and over long distances. In addition, with the rise of the Internet of Things (IoT), companies are also using digital connections to retrieve data and manage equipment in the physical world. In a recent Accenture survey of more than 1,400 C-suite executives, including Chief Information Security Officers When everything is digital, everything is at risk6 SECURING THE FUTURE ENTERPRISE TODAY 2018(CISOs), respondents cited several types of technology-related connections that they believe will raise cyber risk as they are more widely adopted. Topping the list is IoT technology, which 77 percent of respondents said will increase cyber risk moderately or significantly. Companies are installing IoT technology to control factory machines and manage physical environmentsturning off the lights and heat in a meeting room when sensors detect that it is unoccupied, for example. IoT is also being used extensively in supply chains to increase operational efficiencies, manage and track assets and monitor vital processes; IoT also helps companies get a better grasp on quality control, on-time deliveries, and product forecasting.Cloud computingusing remote computing and storage facilities and serviceswas cited by 74 percent of respondents as posing a growing risk. Increasingly, companies rely on cloud setups to gain greater flexibility in IT operations and to access specialized services, such as AI analysis. Cloud computing is also used behind the scenes in many smartphone apps to do the data crunching that a phone cant, creating another potential vulnerability in the Bring Your Own Device (BYOD)/virtual work environment.Top executives are also highly concerned about the potential dangers of sharing data with third parties. In our survey, more than 70 percent of respondents said they expect data exchanges with strategic partners and other third parties to raise cyber risk, and 80 percent of C-suite leaders anticipate that the number of third parties and strategic partners in their ecosystems will increase in the next three years. Companies also expect to make and sell many more connected consumer deviceseverything from connected cars and “smart” When everything is digital, everything is at risk7 SECURING THE FUTURE ENTERPRISE TODAY 2018appliances to wearable health monitors and even Internet-enabled pacemakers. These products introduce potential catastrophic cyber risksexpanding the risk from monetary and reputational loss to potential loss of life and physical disruptions.INTELLIGENTMORE DATA BRINGS MORE RISK TO PRIVACY AND IPIntelligent systems use a combination of advanced technologies, such as AI, and large data sets to take on tasks once performed by humans, and to do things that humans cannot easily dolike finding hidden patterns in massive files of social media data that point to changes in consumer preferences. Today, intelligent systems enable any business to acquire the analytical sophistication that was once reserved for the few large organizations that could hire ranks of data scientists. Using machine learning, for example, a visual processing program can teach itself how to sort parts on an assembly line or “listen” to a caller and answer a simple service question. In management, intelligent systems are helping companies make data-driven decisions. An increasingly important application of intelligent technologies is to drive sales by making the company “hyper-relevant” to customers. Gathering data from digital “touchpoints” (such as online stores), social media, and other online activity, companies can compile sophisticated profiles of individual consumers and detect emerging market trends. Using AI and machine learning, companies can extract ideas for new ways to boost salesa tweak in pricing, a design refresh, or a custom offer When everything is digital, everything is at risk8 SECURING THE FUTURE ENTERPRISE TODAY 2018for specific shoppers. Behind the scenes, intelligent systems enable continuous improvement in operationsoptimizing how production machinery is used or raising customer satisfaction in the call center by analyzing performance data, for example. Companies represented in our survey are well aware of the risks that they are assuming with the wider use of intelligent technologies. Three-quarters of executives said AI would raise cybersecurity risks moderately or significantly. For example, the same AI technology that enables banks to create sophisticated profiles of individual consumers to customize loan offers can also be used by hackers to track consumers online activity to steal account passwords. Given the intersection of AI, machine learning and big data within businesses, both security and privacy protection will become stretched as risk increases. Protecting larger amounts and new kinds of sensitive data is a major concern for executives. Three-quarters of respondents said they believe that storing business-critical information, such as corporate strategy, trade secrets, and intellectual property (IP) on their systems will increase cyber risk; 72 percent have similar concerns about the risks they face in trying to protect sensitive customer data. Companies collect more information about consumers and in many more categories than everdemographics, finances, buying histories, and lifestylesto craft the customized offers and better customer experiences that can stimulate incremental sales and build loyalty. If such data is stolen or abused, companies know that they could suffer severe damage to their business, including financial loss, fines, and reputational loss. When everything is digital, everything is at risk9 SECURING THE FUTURE ENTERPRISE TODAY 2018AUTONOMOUSSELF-DIRECTING SYSTEMS NEED PROTECTION In the future business, a good deal of work is done autonomouslyfrom robots and self-driving vehicles, to algorithms that enable companies to interact with intelligent systems without human intervention. The most obvious form of autonomous production is roboticsthe cognitive system used to perform difficult, repetitive, or dangerous tasks in Given the intersection of AI, machine learning and big data within businesses, both security and privacy protection will become stretched as risk increases.production processes. More than 60 percent of respondents say robotics will be a growing source of cyber risk. As was the case with IT systems, security was an afterthought in the creation of robots. Unlike IT systems, the danger is higher, as many robots are self-directed.Autonomous machines are spreading rapidly beyond the factory. Flying drones are being dispatched to inspect power lines and refinery pipes. In warehouses, autonomous machines are moving pallets and roaming the aisles, counting inventory.In the back office, autonomous systems are multiplying as robotic process automation is introduced to save time and cost and improve quality by standardizing and streamlining a wide range of business processes. Often, this involves autonomous machine-to-machine communication, such as When everything is digital, everything is at risk10 SECURING THE FUTURE ENTERPRISE TODAY 2018automatically generating an order in a suppliers computer when the procurement system signals that inventory is running low. Businesses also rely on application programming interfaces (APIs), which two-thirds of respondents say will increase cyber risk. Open APIs used in platform-based business models, such as the Apple app store or the Alibaba eCommerce platform, enable third-party developers to interact with the companys systems and data to design their own applicationssuch as iPhone games or AliExpress shopping apps. A less obvious form of autonomy involves employee activity. Increasingly, companies are using virtual work arrangements for contractors or employees who work remotely, often using their own devices. These “mobile workers” interact with company systems and data over public networks, raising cyber risk. More than two-thirds of respondents cited the virtual work environment and the mobile workforce practices as a source of greater cyber risk.When everything is digital, everything is at risk
展开阅读全文
相关资源
相关搜索
资源标签

copyright@ 2017-2022 报告吧 版权所有
经营许可证编号:宁ICP备17002310号 | 增值电信业务经营许可证编号:宁B2-20200018  | 宁公网安备64010602000642