Skip to main content Skip to footer

PERSPECTIVE

Securing the digital core in the gen AI era

Close the gap in security maturity within the digital core and achieve reinvention readiness by activating strategic levers.

10-MINUTE READ

November 26, 2024

In brief

  • Generative AI and other emerging technologies accelerate innovation, but at the same time they expand the threat landscape.

  • In the race to adopt new technologies, companies often prioritize speed over security, which can increase vulnerabilities and technical debt.

  • We found three strategic levers companies can activate to transform their security to run at speed and scale while driving down costs and technical debt.

Cybersecurity as a strategic enabler of reinvention

In order to keep up with accelerated change, companies need to reinvent. Continuous technological transformation increases the risk of threats, so security strategies must also adapt.

Accenture defines the digital core as the critical technology capability needed to drive reinvention. Security is a core component of a strong digital core, allowing organizations to navigate the digital frontier confidently while seizing new opportunities for progress and competitive advantage.

Security can also be a market differentiator and foster an environment where trust, resilience and adaptability are at the forefront.

However, our recent research shows, that in the race to adopt new technologies, companies often prioritize speed over security.

70%

of executives say they implement security controls only for critical functions or deploy it after transformation is finalized and vulnerabilities are detected.1

39%

of organizations have the capability to detect Information Technology and Operational Technology incidents in real-time.2

This reactive approach accumulates technical debt, creates redundancy, increases the risk of misconfigurations and complicates integration efforts. This ultimately diminishes the efficiency of security outcomes, leading to costs far greater than if security had been embedded from the start.

How can organizations close the security maturity gap?

Building robust security is a journey, not a sprint. Organizations can start by activating three strategic levers to transform their security to run at the speed and scale the business needs while driving down costs and reducing technical debt.

1. Streamline security to lower costs and improve investments

Rationalizing security eliminates redundancies, driving down costs, streamlining processes and optimizing investments.

Actions to take:

Consolidate cybersecurity products to streamline your toolsets and reduce complexity. This will help you to achieve better security outcomes such as faster threat detection and improved incident response times.

Invest in integrated platforms instead of relying on isolated, standalone tools to simplify management and fortify your organization’s defense against emerging threats.

Upgrade to modern tools to streamline management and optimize resource allocation. Start by transitioning away from legacy tools that no longer align with modern business processes to accelerate your organization’s security transformation.

2. Modernize and integrate security with the business

A holistic approach to security is essential. Many security processes extend beyond the typical security functions and need to be modernized alongside the business to achieve resilience.

Actions to take:

Leverage proprietary templates, predefined scripts, playbooks and technology integrations to ensure robust security in both brownfield and greenfield client environments.

To combat evolving threats in AI environments, you need the support of all key departments, including legal, regulatory, human resources and operations.

Cyber-Physical Systems are crucial for creating value, and any disruptions can lead to halted production or mission failures. Identify and secure all CPS and conduct regular vulnerability assessments.

Zero Trust fundamentally redefines traditional security models by enhancing how organizations connect to modernized applications, driving the transformation of the digital core. For Zero Trust Networks, start with Secure Access Edge (SASE).

Move beyond traditional methods and leverage data and AI for proactive threat preparation, prediction and defense. A critical component is implementing advanced Identity and Access Management (IAM).

3. Scale through automation and Cybersecurity-as-a-Service

The growing talent and skill shortage is a significant hurdle in modernizing security. To address this challenge, businesses should leverage AI and Cybersecurity-as-a-Service to evolve and scale their security programs.

Actions to take:

Adopt AI-driven defense technologies and utilize automated tools for threat testing such as red teaming and penetration testing.

Transform manual security tasks by integrating generative AI into your operations, increasing efficiency and elevating your security posture.

Outsource security management in order to concentrate on innovation while reducing the complexity and costs associated with maintaining multiple security tools and personnel.

Getting started

In today’s digital age, effective security isn't just a safeguard, it's a strategic asset that can differentiate your market presence. It fosters an environment rich in trust, resilience and adaptability, enabling organizations to securely evolve their digital core to capture new opportunities and sharpen their competitive edge.

WRITTEN BY

Paolo Dal Cin

Lead – Security, Global

Rex Thexton

Chief Technology Officer – Security

Andrew Winkelmann

CTO of Cyber Protection Team – Security

Yusof Seedat

Global Research Lead – Security