SlideShare a Scribd company logo
1 of 13
Download to read offline
COSTOF
CYBERCRIME
STUDY
INSIGHTSONTHE
SECURITYINVESTMENTS
THATMAKEADIFFERENCE
INFINANCIALSERVICES
SECURITY BREACHES
CONTINUE TO PLAGUE
FINANCIAL SERVICES
Average annualized cost
of cyber crime (USD)
$18.28Average number of security
breaches each year
125
+9.6%Increase in the last year
… AND THE COST
OF BREACHES
CONTINUES TO RISE
… FINANCIAL SERVICES IS
SLIGHTLY BETTER THAN
GLOBAL PEERS
Average number of security
breaches each year
130
Copyright © 2018 Accenture Security. All rights reserved. 2
Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
5.04
5.07
6.47
7.10
7.34
7.36
8.28
9.30
10.22
11.05
12.47
13.17
14.46
17.20
$18.28
$0 4 8 12 16 20
Hospitality
Education
Life science
Communications
Consumer products
Transportation
Public sector
Retail
Industrial/manufacturing
Services
Healthcare
Technology and software
Aerospace and defense
Utilities and energy
Financial services
Average annualized
cost by industry sector
US$ millions
Legend
n = 351 interviews
in the Financial Services
Industry
Total annualized cost
($1 million omitted)
Copyright © 2018 Accenture Security. All rights reserved. 3
FINANCIAL SERVICES HAS THE HIGHEST COST
OF CYBER CRIME
Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
Copyright © 2018 Accenture Security. All rights reserved. 4
IN FINANCIAL SERVICES, DENIAL OF SERVICES,
PHISHING & SOCIAL ENGINEERING ARE THE
TWO MOST COSTLY ATTACK TYPES
Average cost
per attack
$ thousands
Legend
n = 351 interviews
in the Financial
Services Industry
1,015
5,462
43,034
87,460
89,686
114,700
169,059
196,610
$227,865
$0K 50 100 150 200 250
Botnets
Malware
Stolen devices
Malicious code
Ransomware
Web-based attacks
Malicious insiders
Phishing & social
engineering
Denial of services
Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
Copyright © 2018 Accenture Security. All rights reserved. 5
MALICIOUS CODE AND MALICIOUS INSIDERS
CONTINUE TO TOP THE LIST – TAKING THE
LONGEST TO RESOLVE
Length of time to resolve
an attack in days
Estimated average time is
measured for each attack
type in days
Legend
n = 351 Interviews in the
Financial Services Industry
FY 2016
FY 2017
2.8
6.2
14.7
14.7
20.0
26.0
23.9
58.8
65.8
1.8
4.3
13.2
15.0
19.9
23.0
25.0
58.8
56.7
0 Days 10 20 30 40 50 60 70
Botnets
Malware
Stolen devices
Denial of service
Phishing & social
engineering
Ransomware
Web-based attack
Malicious insiders
Malicious code
Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
Copyright © 2018 Accenture Security. All rights reserved. 6
DETECTION ACCOUNTS FOR 41% OF SECURITY
COSTS FOR FINANCIAL SERVICES COMPANIES …
16
Containment
19
Recovery
13
Investigation
41
Detection
11
Incident Management
and Ex-post Response
Percentage cost
by internal activities
Legend
n = 351 interviews in the
Financial Services
Detection
Containment
Recovery
Investigation
Incident management
and ex-post response
Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
Copyright © 2018 Accenture Security. All rights reserved. 7
… BUT INFORMATION LOSS IS ONE OF THE
MOST EXPENSIVE CONSEQUENCES OF
CYBER ATTACKS IN FINANCIAL SERVICES
Percentage cost
by consequence
Legend
n = 351 interviews in
the Financial Services
Industry
Business disruption
Information loss
Revenue loss
52
Information
Loss
13
Revenue
Loss
35
Business
Disruption
Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
Copyright © 2018 Accenture Security. All rights reserved. 8
SPENDING LEVELS BALANCED FOR KEY
SECURITY TECHNOLOGIES – AI-BASED 3RD &
ADVANCED ANALYTICS 4TH FOR COST SAVINGS
+1
-1
+1
-1
=
=
+1
-1
=
0 1 2 3 4 5 6 7 8 9
Automated policy management
Enterprise deployment of
governance, risk & compliance
Extensive use of data
loss prevention
Extensive deployment of
encryption technologies
Advanced perimeter controls
Extensive use of cyber analytics
and user behavior analytics
Automation, orchestration
and machine learning (AI-based)
Advanced identity and
access governance
Security intelligence systems
Value gap
Rank orderings by
spending levels
and cost savings
Legend
1 = Highest rank
9 = Lowest rank
Rank by percentage
spending
Rank by cost savings
Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017 Note: Artificial Intelligence = AI
Copyright © 2018 Accenture Security. All rights reserved. 9
… ONLY 26% HAVE DEPLOYED AI-BASED
SECURITY TECHNOLOGIES AND 31% ADVANCED
ANALYTICS
26
29
31
52
55
55
62
67
71%
Automation, orchestration
and machine learning (AI-based)
Automated policy management
Extensive use of cyber analytics
and user behavior analytics
Extensive use of
data loss prevention
Enterprise deployment of
governance, risk & compliance
Extensive deployment of
encryption technologies
Advanced perimeter controls
Advanced identity and
access governance
Security intelligence systems
0% 10 20 30 40 50 60 70
Nine key security
technologies deployed
in Financial Services
Legend
n = 351 interviews
in the Financial Services
Industry
Percentage
deployment
frequency
Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
Copyright © 2018 Accenture Security. All rights reserved. 10
PRIORITIZE BREAKTHROUGH INNOVATIONS
LIKE AI AND ANALYTICS
Organizations should:
1. Better balance investments in security technologies
2. Use compliance technology—but don’t
bet the business on it
3. Grasp the innovation opportunity
1
2
3
Copyright © 2018 Accenture Security. All rights reserved. 11
WE RECOMMEND THREE
STEPS TO IMPROVE
CYBERSECURITY
EFFECTIVENESS
Become brilliant at the basics
Build cybersecurity on a strong foundation
Undertake extreme pressure testing
Identify vulnerabilities more rigorously
Invest in breakthrough innovation
Enhance program effectiveness and scale value
1
2
3
Copyright © 2018 Accenture Security. All rights reserved. 12
ABOUT THE RESEARCH
COST OF CYBER CRIME 2017
2,182
interviews
7countries
Australia
France
Germany
Italy
Japan
United
Kingdom
United States
254
companies
8-year
research
program
Jointly developed with:
Examining the economic impact of cyber attacks
About Accenture
Accenture is a leading global professional services
company, providing a broad range of services and
solutions in strategy, consulting, digital, technology
and operations. Combining unmatched experience
and specialized skills across more than 40 industries
and all business functions—underpinned by the
world’s largest delivery network—Accenture works
at the intersection of business and technology
to help clients improve their performance and
create sustainable value for their stakeholders.
With approximately 425,000 people serving clients
in more than 120 countries, Accenture drives
innovation to improve the way the world works
and lives. Visit us at www.accenture.com
About Accenture Security
Accenture Security helps organizations build
resilience from the inside out, so they can
confidently focus on innovation and growth.
Leveraging its global network of cybersecurity labs,
deep industry understanding across client value
chains and services that span the security lifecycle,
Accenture protects organization’s valuable assets,
end-to-end. With services that include strategy
and risk management, cyber defense, digital
identity, application security and managed security,
Accenture enables businesses around the world
to defend against known sophisticated threats,
and the unknown. Follow us @AccentureSecure on
Twitter or visit the Accenture Security blog.
Learn more:
http://accenture.com/security

More Related Content

What's hot

Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Dinesh O Bareja
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness TrainingBuy Custom Papers
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptxSandeepK707540
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityAdri Jovin
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crimePsychoticBanda
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementasherad
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAbdullahKanash
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCBIZ, Inc.
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 

What's hot (20)

Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Information security
Information securityInformation security
Information security
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness Training
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptx
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
 
Cyber security
Cyber securityCyber security
Cyber security
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 

Similar to Cost of Cyber Crime: Financial Services

I Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - ItaliaI Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - ItaliaAccenture Italia
 
2017 cost of cyber crime study accenture
2017 cost of cyber crime study   accenture2017 cost of cyber crime study   accenture
2017 cost of cyber crime study accenturejob Titri company
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Reportaccenture
 
Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Thoughtworks
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for InsuranceAccenture Insurance
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilienceaccenture
 
Securing Consumer Trust
Securing Consumer TrustSecuring Consumer Trust
Securing Consumer Trustaccenture
 
Healthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber ResilienceHealthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber Resilienceaccenture
 
Third party risk management with cyber threat intelligence
Third party risk management with cyber threat intelligenceThird party risk management with cyber threat intelligence
Third party risk management with cyber threat intelligenceCharles Steve
 
Evolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEvolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEY
 
CWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurityCWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurityCapgemini
 

Similar to Cost of Cyber Crime: Financial Services (20)

I Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - ItaliaI Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - Italia
 
2017 cost of cyber crime study accenture
2017 cost of cyber crime study   accenture2017 cost of cyber crime study   accenture
2017 cost of cyber crime study accenture
 
Cost of Cybercrime 2017
Cost of Cybercrime 2017Cost of Cybercrime 2017
Cost of Cybercrime 2017
 
Cost of Cyber Crime UK Data
Cost of Cyber Crime UK DataCost of Cyber Crime UK Data
Cost of Cyber Crime UK Data
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
2017 global-cyber-risk-transfer-report-final
2017 global-cyber-risk-transfer-report-final2017 global-cyber-risk-transfer-report-final
2017 global-cyber-risk-transfer-report-final
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilience
 
The 10 most admired electronic security solution providers
The 10 most admired electronic security solution providersThe 10 most admired electronic security solution providers
The 10 most admired electronic security solution providers
 
Securing Consumer Trust
Securing Consumer TrustSecuring Consumer Trust
Securing Consumer Trust
 
Healthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber ResilienceHealthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber Resilience
 
Third party risk management with cyber threat intelligence
Third party risk management with cyber threat intelligenceThird party risk management with cyber threat intelligence
Third party risk management with cyber threat intelligence
 
Evolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEvolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architecture
 
CWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurityCWIN17 Rome / A holostic cybersecurity
CWIN17 Rome / A holostic cybersecurity
 

More from accenture

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024accenture
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileaccenture
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial Systemaccenture
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyaccenture
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023accenture
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operationsaccenture
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Studyaccenture
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023accenture
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented changeaccenture
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% meaccenture
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023accenture
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoaccenture
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industryaccenture
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023accenture
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accentureaccenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accentureaccenture
 

More from accenture (20)

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 

Recently uploaded

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Cost of Cyber Crime: Financial Services

  • 2. SECURITY BREACHES CONTINUE TO PLAGUE FINANCIAL SERVICES Average annualized cost of cyber crime (USD) $18.28Average number of security breaches each year 125 +9.6%Increase in the last year … AND THE COST OF BREACHES CONTINUES TO RISE … FINANCIAL SERVICES IS SLIGHTLY BETTER THAN GLOBAL PEERS Average number of security breaches each year 130 Copyright © 2018 Accenture Security. All rights reserved. 2 Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
  • 3. 5.04 5.07 6.47 7.10 7.34 7.36 8.28 9.30 10.22 11.05 12.47 13.17 14.46 17.20 $18.28 $0 4 8 12 16 20 Hospitality Education Life science Communications Consumer products Transportation Public sector Retail Industrial/manufacturing Services Healthcare Technology and software Aerospace and defense Utilities and energy Financial services Average annualized cost by industry sector US$ millions Legend n = 351 interviews in the Financial Services Industry Total annualized cost ($1 million omitted) Copyright © 2018 Accenture Security. All rights reserved. 3 FINANCIAL SERVICES HAS THE HIGHEST COST OF CYBER CRIME Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
  • 4. Copyright © 2018 Accenture Security. All rights reserved. 4 IN FINANCIAL SERVICES, DENIAL OF SERVICES, PHISHING & SOCIAL ENGINEERING ARE THE TWO MOST COSTLY ATTACK TYPES Average cost per attack $ thousands Legend n = 351 interviews in the Financial Services Industry 1,015 5,462 43,034 87,460 89,686 114,700 169,059 196,610 $227,865 $0K 50 100 150 200 250 Botnets Malware Stolen devices Malicious code Ransomware Web-based attacks Malicious insiders Phishing & social engineering Denial of services Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
  • 5. Copyright © 2018 Accenture Security. All rights reserved. 5 MALICIOUS CODE AND MALICIOUS INSIDERS CONTINUE TO TOP THE LIST – TAKING THE LONGEST TO RESOLVE Length of time to resolve an attack in days Estimated average time is measured for each attack type in days Legend n = 351 Interviews in the Financial Services Industry FY 2016 FY 2017 2.8 6.2 14.7 14.7 20.0 26.0 23.9 58.8 65.8 1.8 4.3 13.2 15.0 19.9 23.0 25.0 58.8 56.7 0 Days 10 20 30 40 50 60 70 Botnets Malware Stolen devices Denial of service Phishing & social engineering Ransomware Web-based attack Malicious insiders Malicious code Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
  • 6. Copyright © 2018 Accenture Security. All rights reserved. 6 DETECTION ACCOUNTS FOR 41% OF SECURITY COSTS FOR FINANCIAL SERVICES COMPANIES … 16 Containment 19 Recovery 13 Investigation 41 Detection 11 Incident Management and Ex-post Response Percentage cost by internal activities Legend n = 351 interviews in the Financial Services Detection Containment Recovery Investigation Incident management and ex-post response Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
  • 7. Copyright © 2018 Accenture Security. All rights reserved. 7 … BUT INFORMATION LOSS IS ONE OF THE MOST EXPENSIVE CONSEQUENCES OF CYBER ATTACKS IN FINANCIAL SERVICES Percentage cost by consequence Legend n = 351 interviews in the Financial Services Industry Business disruption Information loss Revenue loss 52 Information Loss 13 Revenue Loss 35 Business Disruption Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
  • 8. Copyright © 2018 Accenture Security. All rights reserved. 8 SPENDING LEVELS BALANCED FOR KEY SECURITY TECHNOLOGIES – AI-BASED 3RD & ADVANCED ANALYTICS 4TH FOR COST SAVINGS +1 -1 +1 -1 = = +1 -1 = 0 1 2 3 4 5 6 7 8 9 Automated policy management Enterprise deployment of governance, risk & compliance Extensive use of data loss prevention Extensive deployment of encryption technologies Advanced perimeter controls Extensive use of cyber analytics and user behavior analytics Automation, orchestration and machine learning (AI-based) Advanced identity and access governance Security intelligence systems Value gap Rank orderings by spending levels and cost savings Legend 1 = Highest rank 9 = Lowest rank Rank by percentage spending Rank by cost savings Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017 Note: Artificial Intelligence = AI
  • 9. Copyright © 2018 Accenture Security. All rights reserved. 9 … ONLY 26% HAVE DEPLOYED AI-BASED SECURITY TECHNOLOGIES AND 31% ADVANCED ANALYTICS 26 29 31 52 55 55 62 67 71% Automation, orchestration and machine learning (AI-based) Automated policy management Extensive use of cyber analytics and user behavior analytics Extensive use of data loss prevention Enterprise deployment of governance, risk & compliance Extensive deployment of encryption technologies Advanced perimeter controls Advanced identity and access governance Security intelligence systems 0% 10 20 30 40 50 60 70 Nine key security technologies deployed in Financial Services Legend n = 351 interviews in the Financial Services Industry Percentage deployment frequency Source: Cost of Cyber Crime 2017, Accenture and the Ponemon Institute, September 2017
  • 10. Copyright © 2018 Accenture Security. All rights reserved. 10 PRIORITIZE BREAKTHROUGH INNOVATIONS LIKE AI AND ANALYTICS Organizations should: 1. Better balance investments in security technologies 2. Use compliance technology—but don’t bet the business on it 3. Grasp the innovation opportunity 1 2 3
  • 11. Copyright © 2018 Accenture Security. All rights reserved. 11 WE RECOMMEND THREE STEPS TO IMPROVE CYBERSECURITY EFFECTIVENESS Become brilliant at the basics Build cybersecurity on a strong foundation Undertake extreme pressure testing Identify vulnerabilities more rigorously Invest in breakthrough innovation Enhance program effectiveness and scale value 1 2 3
  • 12. Copyright © 2018 Accenture Security. All rights reserved. 12 ABOUT THE RESEARCH COST OF CYBER CRIME 2017 2,182 interviews 7countries Australia France Germany Italy Japan United Kingdom United States 254 companies 8-year research program Jointly developed with: Examining the economic impact of cyber attacks
  • 13. About Accenture Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functions—underpinned by the world’s largest delivery network—Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With approximately 425,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com About Accenture Security Accenture Security helps organizations build resilience from the inside out, so they can confidently focus on innovation and growth. Leveraging its global network of cybersecurity labs, deep industry understanding across client value chains and services that span the security lifecycle, Accenture protects organization’s valuable assets, end-to-end. With services that include strategy and risk management, cyber defense, digital identity, application security and managed security, Accenture enables businesses around the world to defend against known sophisticated threats, and the unknown. Follow us @AccentureSecure on Twitter or visit the Accenture Security blog. Learn more: http://accenture.com/security