SlideShare a Scribd company logo
1 of 2
Download to read offline
REDEFINING SECURITY PERFORMANCE AND HOW TO ACHIEVE IT
WHAT IS THE ACCENTURE SECURITY INDEX?
ROOM FOR IMPROVEMENT IN BANKING
RANGE OF CYBERSECURITY CAPABILITIES RATED
HIGHLY COMPETENT IN BANKING
Across 15 countries,
average organization has
high performance in only
11 cybersecurity capabilities
Banking on the top –
has high performance in
15 cybersecurity capabilities
Source: Accenture Security and Oxford Economics
A comprehensive benchmark measuring 33 cybersecurity capabilities,
helping companies understand how effective their security measures
are and identifying measures to take to reduce threats.
Source: Accenture Security and Oxford Economics
33 30 25 20 15 10 5
% of companies in each range of cybersecurity capabilities (Sample = 2,000)
30%
21%
20%
19%
14%
15%
7%
7%
5%
4%
Number of cybersecurity capabilities rated highly competent
% of Banks in each range of cybersecurity capabilities (Sample=275)
22%
16%
7%
0–5
Range
6–10
11–15
16–20
21–25
26–30
31–33
12%
8%
SECURITY INDEX SCORE – INDUSTRY
(% Share of high performance security capabilities)
45%
44%
44%
39%
38%
37%
32%
32%
31%
28%
27%
19%
Communications
Banking&
CapitalMarkets
High Technology
Consumer Products
Insurance
Healthcare (payer)
Retail
Healthcare (provider)
Utilities
Industrial Equipment
Energy (Oil and Gas)
Life Sciences
ABOUT ACCENTURE SECURITY
Accenture Security helps organizations build resilience
from the inside out, so they can confidently focus on
innovation and growth. Leveraging its global network of
cybersecurity labs, deep industry understanding across
client value chains and services that span the security
lifecycle, Accenture protects organizations’ valuable
assets, end-to-end. With services that include strategy
and risk management, cyber defense, digital identity,
application security and managed security, Accenture
enables businesses around the world to defend
against known sophisticated threats, and the unknown.
Follow us @AccentureSecure on Twitter or visit the
Accenture Security blog.
FOLLOW US ON TWITTER:
@AccentureSecure
TO LEARN MORE ABOUT THE
ACCENTURE SECURITY INDEX, VISIT:
www.accenture.com/securityindex
Copyright © 2017 Accenture
All rights reserved.
Accenture, its logo, and
High Performance Delivered are
trademarks of Accenture.
UNDERSTANDING AREAS FOR CYBERSECURITY IMPROVEMENT IN BANKING
Five capabilities with highest proportion (Sample = 2,000 senior security executives)Five capabilities with lowest proportion
1. Business
alignment b. Physical and safety risks 37%
c. IT risk support 41%
d. Cyber-attack scenarios 33%
e. Cybersecurity strategy 36%
27%
2. Cyber response
readiness b. Cyber incident escalation paths 34%
c. Ability to ensure stakeholder involvement 31%
d. Cyber incident communication 38%
e. Protection and recovery of key assets 36%
a. Cyber response plan 41%
3. Strategic threat
context b. Business relevant threat monitoring 34%
c. Peer monitoring as a source for information on threats to your business 36%
38%
a. What-if threat analysis 34%
7. Extended
ecosystem b. Third-party cybersecurity clauses 29%
c. Cybersecurity regulatory compliance 32%
d. Cooperation during crisis management 33%
a. Third-party cybersecurity 30%
4. Resilience
readiness
d. Maintaining resilience readiness 37%
e. Threat landscape and resilience alignment 33%
a. Cyber incidence recovery 38%
b. Design for resilience and limit impact 31%
c. Design for protection of key assets 31%
5. Investment
efficiency
d. Inclusion of cybersecurity in security investments 32%
e. Risk analysis and budgeting 38%
a. Cybersecurity architecture approach 39%
b. Cybersecurity investments for protecting key assets 29%
c. Including cybersecurity funding in IT project plans 31%
6. Governance and
leadership
d. Cybersecurity accountability 41%
e. Security-minded culture 38%
a. Cybersecurity in chain of command 31%
b. Cybersecurity incentives 33%
c. Measuring and reporting cybersecurity 36%
51%
45%
41%
48%
34%
44%
42%
46%
47%
46%
41%
46%
47%
47%
36%
37%
45%
44%
50%
42%
46%
40%
40%
48%
50%
50%
40%
41%
53%
50%
40%
41%
46%
Cybersecurity
domain
Cybersecurity
capability
Proportion with
high competence
0% 50%
Proportion
of Banks
with high
competence
14%
4%
8%
12%
7%
10%
11%
8%
11%
5%
7%
10%
9%
13%
7%
5%
12%
14%
13%
9%
8%
9%
9%
16%
12%
11%
11%
10%
12%
12%
9%
8%
10%
Difference
d. Threat vector monitoring

More Related Content

What's hot

What's hot (20)

2021 IDG Security Priorities Study
2021 IDG Security Priorities Study2021 IDG Security Priorities Study
2021 IDG Security Priorities Study
 
2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of Cybercrime
 
Healthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber ResilienceHealthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber Resilience
 
Accenture 2015 Global Risk Management Study: North American Banking infographic
Accenture 2015 Global Risk Management Study: North American Banking infographicAccenture 2015 Global Risk Management Study: North American Banking infographic
Accenture 2015 Global Risk Management Study: North American Banking infographic
 
2018 Global State of Information Security Survey
2018 Global State of Information Security Survey2018 Global State of Information Security Survey
2018 Global State of Information Security Survey
 
2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
Strengthening Security with Continuous Monitoring
Strengthening Security with Continuous MonitoringStrengthening Security with Continuous Monitoring
Strengthening Security with Continuous Monitoring
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilience
 
The Connected Refinery – Accenture 2017 Digital Refining Survey
The Connected Refinery – Accenture 2017 Digital Refining SurveyThe Connected Refinery – Accenture 2017 Digital Refining Survey
The Connected Refinery – Accenture 2017 Digital Refining Survey
 
6 Steps to Bringing a Security Offering to Market
6 Steps to Bringing a Security Offering to Market6 Steps to Bringing a Security Offering to Market
6 Steps to Bringing a Security Offering to Market
 
2018 Insight Intelligent Technology Pulse Survey
2018 Insight Intelligent Technology Pulse Survey2018 Insight Intelligent Technology Pulse Survey
2018 Insight Intelligent Technology Pulse Survey
 
2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York
 
The Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector ITThe Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector IT
 
Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber risk
 
The Impacts of COVID-19 on Enterprise IT
The Impacts of COVID-19 on Enterprise ITThe Impacts of COVID-19 on Enterprise IT
The Impacts of COVID-19 on Enterprise IT
 
Accenture Saudi Arabia Innovation Maturity Index​
Accenture Saudi Arabia Innovation Maturity Index​Accenture Saudi Arabia Innovation Maturity Index​
Accenture Saudi Arabia Innovation Maturity Index​
 
CSO Pandemic Impact Survey, 2020
CSO Pandemic Impact Survey, 2020CSO Pandemic Impact Survey, 2020
CSO Pandemic Impact Survey, 2020
 
Cyber Security Infographic
Cyber Security InfographicCyber Security Infographic
Cyber Security Infographic
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland
 

Similar to Accenture Banking Security Index

State of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon InstituteState of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon Institute
Jeremiah Grossman
 
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
Ben Browning
 

Similar to Accenture Banking Security Index (20)

2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance
 
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdftrellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
 
The State of Cyber Defense Report by Kroll - CY 2023
The State of Cyber Defense Report by Kroll - CY 2023The State of Cyber Defense Report by Kroll - CY 2023
The State of Cyber Defense Report by Kroll - CY 2023
 
Quantifying Cyber Risk
Quantifying Cyber Risk Quantifying Cyber Risk
Quantifying Cyber Risk
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
 
Telindus cybersecurity survey_report
Telindus cybersecurity survey_reportTelindus cybersecurity survey_report
Telindus cybersecurity survey_report
 
The state of incident response
The state of incident responseThe state of incident response
The state of incident response
 
Infosec 2014: Intelligence as a Service: The Future of Frontline Security
Infosec 2014: Intelligence as a Service: The Future of Frontline SecurityInfosec 2014: Intelligence as a Service: The Future of Frontline Security
Infosec 2014: Intelligence as a Service: The Future of Frontline Security
 
F041123639
F041123639F041123639
F041123639
 
w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018
 
Make risk and cybersecurity a boardroom agenda
Make risk and cybersecurity a boardroom agendaMake risk and cybersecurity a boardroom agenda
Make risk and cybersecurity a boardroom agenda
 
State of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon InstituteState of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon Institute
 
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, EthiopiaPresentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
How Will Your Cloud Strategy Impact Your Cyber Strategy?
How Will Your Cloud Strategy Impact Your Cyber Strategy?How Will Your Cloud Strategy Impact Your Cyber Strategy?
How Will Your Cloud Strategy Impact Your Cyber Strategy?
 
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
 
Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint Webinar
 

More from accenture

More from accenture (20)

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Accenture Banking Security Index

  • 1. REDEFINING SECURITY PERFORMANCE AND HOW TO ACHIEVE IT WHAT IS THE ACCENTURE SECURITY INDEX? ROOM FOR IMPROVEMENT IN BANKING RANGE OF CYBERSECURITY CAPABILITIES RATED HIGHLY COMPETENT IN BANKING Across 15 countries, average organization has high performance in only 11 cybersecurity capabilities Banking on the top – has high performance in 15 cybersecurity capabilities Source: Accenture Security and Oxford Economics A comprehensive benchmark measuring 33 cybersecurity capabilities, helping companies understand how effective their security measures are and identifying measures to take to reduce threats. Source: Accenture Security and Oxford Economics 33 30 25 20 15 10 5 % of companies in each range of cybersecurity capabilities (Sample = 2,000) 30% 21% 20% 19% 14% 15% 7% 7% 5% 4% Number of cybersecurity capabilities rated highly competent % of Banks in each range of cybersecurity capabilities (Sample=275) 22% 16% 7% 0–5 Range 6–10 11–15 16–20 21–25 26–30 31–33 12% 8% SECURITY INDEX SCORE – INDUSTRY (% Share of high performance security capabilities) 45% 44% 44% 39% 38% 37% 32% 32% 31% 28% 27% 19% Communications Banking& CapitalMarkets High Technology Consumer Products Insurance Healthcare (payer) Retail Healthcare (provider) Utilities Industrial Equipment Energy (Oil and Gas) Life Sciences
  • 2. ABOUT ACCENTURE SECURITY Accenture Security helps organizations build resilience from the inside out, so they can confidently focus on innovation and growth. Leveraging its global network of cybersecurity labs, deep industry understanding across client value chains and services that span the security lifecycle, Accenture protects organizations’ valuable assets, end-to-end. With services that include strategy and risk management, cyber defense, digital identity, application security and managed security, Accenture enables businesses around the world to defend against known sophisticated threats, and the unknown. Follow us @AccentureSecure on Twitter or visit the Accenture Security blog. FOLLOW US ON TWITTER: @AccentureSecure TO LEARN MORE ABOUT THE ACCENTURE SECURITY INDEX, VISIT: www.accenture.com/securityindex Copyright © 2017 Accenture All rights reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture. UNDERSTANDING AREAS FOR CYBERSECURITY IMPROVEMENT IN BANKING Five capabilities with highest proportion (Sample = 2,000 senior security executives)Five capabilities with lowest proportion 1. Business alignment b. Physical and safety risks 37% c. IT risk support 41% d. Cyber-attack scenarios 33% e. Cybersecurity strategy 36% 27% 2. Cyber response readiness b. Cyber incident escalation paths 34% c. Ability to ensure stakeholder involvement 31% d. Cyber incident communication 38% e. Protection and recovery of key assets 36% a. Cyber response plan 41% 3. Strategic threat context b. Business relevant threat monitoring 34% c. Peer monitoring as a source for information on threats to your business 36% 38% a. What-if threat analysis 34% 7. Extended ecosystem b. Third-party cybersecurity clauses 29% c. Cybersecurity regulatory compliance 32% d. Cooperation during crisis management 33% a. Third-party cybersecurity 30% 4. Resilience readiness d. Maintaining resilience readiness 37% e. Threat landscape and resilience alignment 33% a. Cyber incidence recovery 38% b. Design for resilience and limit impact 31% c. Design for protection of key assets 31% 5. Investment efficiency d. Inclusion of cybersecurity in security investments 32% e. Risk analysis and budgeting 38% a. Cybersecurity architecture approach 39% b. Cybersecurity investments for protecting key assets 29% c. Including cybersecurity funding in IT project plans 31% 6. Governance and leadership d. Cybersecurity accountability 41% e. Security-minded culture 38% a. Cybersecurity in chain of command 31% b. Cybersecurity incentives 33% c. Measuring and reporting cybersecurity 36% 51% 45% 41% 48% 34% 44% 42% 46% 47% 46% 41% 46% 47% 47% 36% 37% 45% 44% 50% 42% 46% 40% 40% 48% 50% 50% 40% 41% 53% 50% 40% 41% 46% Cybersecurity domain Cybersecurity capability Proportion with high competence 0% 50% Proportion of Banks with high competence 14% 4% 8% 12% 7% 10% 11% 8% 11% 5% 7% 10% 9% 13% 7% 5% 12% 14% 13% 9% 8% 9% 9% 16% 12% 11% 11% 10% 12% 12% 9% 8% 10% Difference d. Threat vector monitoring