References #TECHVISION2019 TREND 4 1. Onaran, Y. (2018, October 9). Global Payment Firms 11. Whittaker, Z. (2018, January 29). How Strava’s 20. Project Xero: Agile Security in the Cloud. (2017, January Hold First Cyber War Game. Bloomberg. “Anonymized” Fitness Tracking Data Spilled 13). Cybersecurity Excellence Awards. 2. Fruhlinger, J. (2018, August 30). What Is WannaCry Government Secrets. ZDnet. 21. Macpherson, P. (2018, July 25). The Weakest Link: Why Ransomware, How Does It Infect, and Who Was 12. Stevens R., Votipka D., Redmiles E.M., Mazurek M.L., Security Is Everyone’s Responsibility. Xero blog. Responsible? CSO Online. Ahern C., and Sweeney P. The Battle for New York: A 22. Chickowski, E. (2017, March 21). The True State of 3. Clark, Z. (2017, May 12). The Worm That Spreads Case Study of Applied Digital Threat Modeling at the DevSecOps. DARKReading. WanaCrypt0r. (2017, May 12). Malwarebytes blog. Enterprise Level. (2018, August 15-17). Proceedings of 23. The Economic Impacts of Inadequate Infrastructure 4. Shadow Brokers Threaten to Release Windows 10 the 27th USENIX Conference on Security Symposium for Software Testing. (2002). The National Institute of Hacking Tools. (2017, May 31). The Express Tribune. (SEC’18). Standards and Technology. 5. What is the Mirai Botnet? Cloudflare website. 13. Build Pervasive Cyber Resilience Now. (2018, June 26). 24. IBM Application Security Open Source Analyzer. (2018, 6. Ashford, W. (2018, January 18). Next-Gen Mirai Botnet Accenture. September 19). IBM website. Targets Cryptocurrency Mining Operations. 14. Nadeau, M. (2017, October 2). How To Secure the IIoT: 25. Robinson, T. (2018, February 15). Open AWS S3 Bucket ComputerWeekly.com. A Q&A with GE’s CISO. CSO Online. Exposes Private Info on Thousands of FedEx 7. Lohr, S. (2018, March 8). It’s True: False News Spreads 15. Network Security - AT&T. (2018, August 20). Customers. SC Media. Faster and Wider. And Humans Are to Blame. The New 16. Ashford, W. (2018, February 20). Businesses Face 26. Chickowski, E. (2018, January 24). Leaky Buckets: 10 York Times. Unprecedented Volume of Cyber Attacks. Worst Amazon S3 Breaches. Bitdefender. 8. Koshiw, I. (2018, August 22). How a Hacker Network ComputerWeekly.com. 27. Newman, L. H. (2018, July 18). Amazon Web Services Turned Stolen Press Releases into $100 Million. The 17. Mitchell, J. (2018, January 31). How Machine Learning Tests Out Two Tools to Help Keep the Cloud Secure. Verge. and Other Tech Trends Will Disrupt Cyber Security In WIRED. 9. Franceschi-Bicchierai, L. (2018, August 8). Hackers 2018. Forbes. 28. Vendor Security Alliance website. Could Cause Havoc by Pwning Internet-Connected 18. Get Your Bank Transactions into Xero Effortlessly. Xero 29. Build Pervasive Cyber Resilience Now. (2018, June 26). Irrigation Systems. Motherboard. website. Accenture. 10. Cyber Threatscape Report 2018. (2018, August 7). 19. Paredes, D. (2016, June 29). Agile Security in the Cloud: Accenture. Lessons From Xero. CIO. 93 TECHNOLOGY VISION 2019 THE POST-DIGITAL ERA IS UPON US

Accenture Technology Vision 2019 | Full Report - Page 99 Accenture Technology Vision 2019 | Full Report Page 98 Page 100