SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
FusionX &
Accenture:
One global
Security team
2
FusionX
An elite and sophisticated cyber
security team
Copyright © 2015 Accenture All rights reserved.
• 20-year legacy providing tactical vulnerability assessment and
surgical penetration testing services against a wide variety of
organizations and targets.
• Focused on unique talent and experience of our elite
assessment team, rather than on automated tools.
• Targets information assets using the tailored tactics,
techniques and procedures (TTP’s) of your most likely
attackers to evaluate resiliency to a real-world attack.
• Develops effective risk management strategies that focus on
current and emerging threats while maintaining efficient
business operations.
3Copyright © 2015 Accenture All rights reserved.
FusionX works with your management and security teams to
align your risk management practices and procedures with
organizational goals and expectations.
The end result? A comprehensive risk management program,
nuanced to your unique business environment.
Our Approach
Leading businesses to a unique and
comprehensive plan for implementation
4Copyright © 2015 Accenture All rights reserved.
FusionX’s advanced threat capabilities complement
Accenture’s security experience, technology and teams to
address the toughest cyber security challenges.
Accenture’s industrialized suite of offerings—including Digital
Identity, Cyber Defense, and Managed Security—embed
security into the fabric of digital operations, enabling agility,
protecting the broader ecosystem and delivering sustainable
business outcomes.
Together, we help clients remediate cyber security
weaknesses—at a global scale.
FusionX & Accenture
Helping clients manage risk and
improve business results—globally
5Copyright © 2015 Accenture All rights reserved.
FusionX Successes
6
The Outside Insider
Copyright © 2015 Accenture All rights reserved.
The situation
A publicly traded company believes they have an insider
engaging in malicious activity. FusionX deploys an Incident
Response team to investigate.
The support
FusionX works with the client’s staff to investigate the incident
and discovers that the incident is actually the work of organized
crime engaging in large-scale fraud impacting hundreds of
thousands of customers.
The solution
FusionX identifies the attack pathways, engages in
attribution activities and devises a strategy to oust the
attackers and secure the network from future attack.
7
Boardroom Blues
Copyright © 2015 Accenture All rights reserved.
The situation
A multi-billion dollar investment firm engages FusionX for an
enterprise wide, tactical penetration test.
The support
The team discovers dozens of critical vulnerabilities, including
one that allows the team to eavesdrop on the board room via
the Internet.
The solution
FusionX identifies the enterprise vulnerabilities and provides
prioritized recommendations for remediation. Subsequent
assessments reveal a significantly improved vulnerability
profile.
8
Crown Jewels
Copyright © 2015 Accenture All rights reserved.
The situation
The CEO of a Global 100 company wants to know how well his
company’s intellectual property is protected from a
sophisticated adversary. FusionX engages in a penetration test
without the knowledge of the corporate security team.
The support
FusionX discovers a zero-day vulnerability in a custom-built
application that allows the attack team to successfully and
silently penetrate the corporate network. Within weeks, the
team has exfiltrated gigabytes of sensitive data from the
division the CEO wanted specifically targeted.
The solution
The CEO is able to re-align security priorities and the
internal security team mitigates the vulnerabilities
discovered by the FusionX team.
9
Money for Nothing
Copyright © 2015 Accenture All rights reserved.
The situation
A large domestic bank has spent millions of dollars on security
testing and products. The CISO challenges FusionX to find
something they’ve missed.
The support
Within a week, FusionX identifies a systemic, zero-day
vulnerability on their Internet-facing web application that allows
the virtual creation and withdrawal of funds.
The solution
The bank quickly moves to remediate the issue with a
temporary fix and commences a long-term project to remediate
the systemic problem. FusionX provides further data to the
bank to ensure that the issue has not been previously
exploited. Ultimately, the vulnerability was identified prior to
being exploited by a sophisticated attacker.
About Accenture
Accenture is a global management
consulting, technology services and
outsourcing company, with more than
336,000 people serving clients in more than
120 countries. Combining unparalleled
experience, comprehensive capabilities
across all industries and business
functions, and extensive research on the
world’s most successful companies,
Accenture collaborates with clients to help
them become high-performance businesses
and governments. The company generated
net revenues of US$30.0 billion for the
fiscal year ended Aug. 31, 2014. Its home
page is www.accenture.com.
Copyright © 2015 Accenture
All rights reserved.
Accenture, its logo, and
High Performance Delivered
are trademarks of Accenture.
Contact us
www.fusionx.com
accenture.com/security

Contenu connexe

Tendances

Tendances (20)

Accenture Tech Vision 2020 - Trend 5
Accenture Tech Vision 2020 - Trend 5Accenture Tech Vision 2020 - Trend 5
Accenture Tech Vision 2020 - Trend 5
 
The Industrialist: Trends & Innovations - November 2022
The Industrialist: Trends & Innovations - November 2022The Industrialist: Trends & Innovations - November 2022
The Industrialist: Trends & Innovations - November 2022
 
The Reinvention Reset | Accenture
The Reinvention Reset | AccentureThe Reinvention Reset | Accenture
The Reinvention Reset | Accenture
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Metaverse opportunities for the communications industry
 Metaverse opportunities for the communications industry Metaverse opportunities for the communications industry
Metaverse opportunities for the communications industry
 
Rethinking Accenture's network
Rethinking Accenture's networkRethinking Accenture's network
Rethinking Accenture's network
 
Reinventing the client journey
Reinventing the client journeyReinventing the client journey
Reinventing the client journey
 
Customer Experience Reimagined
Customer Experience ReimaginedCustomer Experience Reimagined
Customer Experience Reimagined
 
Reinventing the Last Mile: Win the Race to the Top (AU)
Reinventing the Last Mile: Win the Race to the Top (AU)Reinventing the Last Mile: Win the Race to the Top (AU)
Reinventing the Last Mile: Win the Race to the Top (AU)
 
Future Ready Enterprise Systems | Accenture
Future Ready Enterprise Systems | AccentureFuture Ready Enterprise Systems | Accenture
Future Ready Enterprise Systems | Accenture
 
Driving Digitalization in Biopharma R&D
Driving Digitalization in Biopharma R&DDriving Digitalization in Biopharma R&D
Driving Digitalization in Biopharma R&D
 
The Connected Refinery – Accenture 2017 Digital Refining Survey
The Connected Refinery – Accenture 2017 Digital Refining SurveyThe Connected Refinery – Accenture 2017 Digital Refining Survey
The Connected Refinery – Accenture 2017 Digital Refining Survey
 
Workforce 2025 - Financial Services Skills & Roles Of The Future
Workforce 2025 - Financial Services Skills & Roles Of The FutureWorkforce 2025 - Financial Services Skills & Roles Of The Future
Workforce 2025 - Financial Services Skills & Roles Of The Future
 
Technology Trends 2021 | Tech Vision | Accenture
Technology Trends 2021 | Tech Vision | AccentureTechnology Trends 2021 | Tech Vision | Accenture
Technology Trends 2021 | Tech Vision | Accenture
 
Accenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP Solutions
 
Accenture Tech Vision 2020 - Trend 2
Accenture Tech Vision 2020 - Trend 2Accenture Tech Vision 2020 - Trend 2
Accenture Tech Vision 2020 - Trend 2
 
Digital Transformation Strategy and Plan Template
Digital Transformation Strategy and Plan TemplateDigital Transformation Strategy and Plan Template
Digital Transformation Strategy and Plan Template
 
Innovation Portfolio Management and Governance | Accenture
Innovation Portfolio Management and Governance | AccentureInnovation Portfolio Management and Governance | Accenture
Innovation Portfolio Management and Governance | Accenture
 
The Rise of Forerunners | Accenture
The Rise of Forerunners | AccentureThe Rise of Forerunners | Accenture
The Rise of Forerunners | Accenture
 
Transforming the Industry That Transformed the World
Transforming the Industry That Transformed the WorldTransforming the Industry That Transformed the World
Transforming the Industry That Transformed the World
 

En vedette

Accenture video-analytics-operational-marketing-and-security-insights-from-cctv
Accenture video-analytics-operational-marketing-and-security-insights-from-cctvAccenture video-analytics-operational-marketing-and-security-insights-from-cctv
Accenture video-analytics-operational-marketing-and-security-insights-from-cctv
Sunanda Balla
 
Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Edward Bukstel
 
Bloco Esquerda
Bloco EsquerdaBloco Esquerda
Bloco Esquerda
amattos76
 

En vedette (20)

Accenture 2015 Global Risk Management Study: Capital Markets Key Findings and...
Accenture 2015 Global Risk Management Study: Capital Markets Key Findings and...Accenture 2015 Global Risk Management Study: Capital Markets Key Findings and...
Accenture 2015 Global Risk Management Study: Capital Markets Key Findings and...
 
Accenture video-analytics-operational-marketing-and-security-insights-from-cctv
Accenture video-analytics-operational-marketing-and-security-insights-from-cctvAccenture video-analytics-operational-marketing-and-security-insights-from-cctv
Accenture video-analytics-operational-marketing-and-security-insights-from-cctv
 
GeekGirlCon 2011 / Computer Engineer Barbie: Attracting Girls to STEM Careers
GeekGirlCon 2011 / Computer Engineer Barbie: Attracting Girls to STEM CareersGeekGirlCon 2011 / Computer Engineer Barbie: Attracting Girls to STEM Careers
GeekGirlCon 2011 / Computer Engineer Barbie: Attracting Girls to STEM Careers
 
If I Could Go Back in Time, Here’s What I Would Tell Myself about Careers in ...
If I Could Go Back in Time, Here’s What I Would Tell Myself about Careers in ...If I Could Go Back in Time, Here’s What I Would Tell Myself about Careers in ...
If I Could Go Back in Time, Here’s What I Would Tell Myself about Careers in ...
 
Reflections on ‘freedom to live a valued life’ - Dr Lynne Friedli
Reflections on ‘freedom to live a valued life’ - Dr Lynne FriedliReflections on ‘freedom to live a valued life’ - Dr Lynne Friedli
Reflections on ‘freedom to live a valued life’ - Dr Lynne Friedli
 
Bereavement and Loss Counselling
Bereavement and Loss CounsellingBereavement and Loss Counselling
Bereavement and Loss Counselling
 
Grief Matters, Responding to Loss and Bereavement - Mike O'Connor
Grief Matters, Responding to Loss and Bereavement - Mike O'ConnorGrief Matters, Responding to Loss and Bereavement - Mike O'Connor
Grief Matters, Responding to Loss and Bereavement - Mike O'Connor
 
CES 2017 FinTech trend: Blockchain Technology by Mark Mueller-Eberstein, Adgetec
CES 2017 FinTech trend: Blockchain Technology by Mark Mueller-Eberstein, AdgetecCES 2017 FinTech trend: Blockchain Technology by Mark Mueller-Eberstein, Adgetec
CES 2017 FinTech trend: Blockchain Technology by Mark Mueller-Eberstein, Adgetec
 
Interconnect_Blockchain One Year On
Interconnect_Blockchain One Year OnInterconnect_Blockchain One Year On
Interconnect_Blockchain One Year On
 
Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017
 
Accenture Security Report 2016 Infographic for Insurance
Accenture Security Report 2016 Infographic for InsuranceAccenture Security Report 2016 Infographic for Insurance
Accenture Security Report 2016 Infographic for Insurance
 
Blockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challengesBlockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challenges
 
Harrison lsri blockchain 2017
Harrison lsri blockchain 2017Harrison lsri blockchain 2017
Harrison lsri blockchain 2017
 
BlockChain Strategists - English presentation
BlockChain Strategists - English presentationBlockChain Strategists - English presentation
BlockChain Strategists - English presentation
 
Sintesis informativa 29 de marzo 2017
Sintesis informativa 29 de marzo 2017Sintesis informativa 29 de marzo 2017
Sintesis informativa 29 de marzo 2017
 
Bn1029 demo sap sd
Bn1029 demo  sap sdBn1029 demo  sap sd
Bn1029 demo sap sd
 
Getting It Right: “Bad Paper” Legislation That Works
Getting It Right: “Bad Paper” Legislation That WorksGetting It Right: “Bad Paper” Legislation That Works
Getting It Right: “Bad Paper” Legislation That Works
 
Bloco Esquerda
Bloco EsquerdaBloco Esquerda
Bloco Esquerda
 
Speed costs
Speed costsSpeed costs
Speed costs
 
Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.
Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.
Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.
 

Similaire à FusionX & Accenture: One Global Security Team

MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability Statement
William McBorrough
 
Fire eye investis case study
Fire eye investis case studyFire eye investis case study
Fire eye investis case study
cnnetwork
 

Similaire à FusionX & Accenture: One Global Security Team (20)

Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
DDHI Board Report.ppsx
DDHI Board Report.ppsxDDHI Board Report.ppsx
DDHI Board Report.ppsx
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Cyber Security Audit.pdf
Cyber Security Audit.pdfCyber Security Audit.pdf
Cyber Security Audit.pdf
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability Statement
 
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lens
 
ZS Infotech v1.0
ZS Infotech v1.0ZS Infotech v1.0
ZS Infotech v1.0
 
Virtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber SecurityVirtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber Security
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
FINTECH: Industries we Serve
FINTECH: Industries we ServeFINTECH: Industries we Serve
FINTECH: Industries we Serve
 
FireEye investis case study
FireEye investis case studyFireEye investis case study
FireEye investis case study
 
Fire eye investis case study
Fire eye investis case studyFire eye investis case study
Fire eye investis case study
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure
 

Plus de accenture

Plus de accenture (20)

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chain
 
Chemical Companies in the Metaverse
Chemical Companies in the MetaverseChemical Companies in the Metaverse
Chemical Companies in the Metaverse
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chain
 

Dernier

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Dernier (20)

Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

FusionX & Accenture: One Global Security Team

  • 2. 2 FusionX An elite and sophisticated cyber security team Copyright © 2015 Accenture All rights reserved. • 20-year legacy providing tactical vulnerability assessment and surgical penetration testing services against a wide variety of organizations and targets. • Focused on unique talent and experience of our elite assessment team, rather than on automated tools. • Targets information assets using the tailored tactics, techniques and procedures (TTP’s) of your most likely attackers to evaluate resiliency to a real-world attack. • Develops effective risk management strategies that focus on current and emerging threats while maintaining efficient business operations.
  • 3. 3Copyright © 2015 Accenture All rights reserved. FusionX works with your management and security teams to align your risk management practices and procedures with organizational goals and expectations. The end result? A comprehensive risk management program, nuanced to your unique business environment. Our Approach Leading businesses to a unique and comprehensive plan for implementation
  • 4. 4Copyright © 2015 Accenture All rights reserved. FusionX’s advanced threat capabilities complement Accenture’s security experience, technology and teams to address the toughest cyber security challenges. Accenture’s industrialized suite of offerings—including Digital Identity, Cyber Defense, and Managed Security—embed security into the fabric of digital operations, enabling agility, protecting the broader ecosystem and delivering sustainable business outcomes. Together, we help clients remediate cyber security weaknesses—at a global scale. FusionX & Accenture Helping clients manage risk and improve business results—globally
  • 5. 5Copyright © 2015 Accenture All rights reserved. FusionX Successes
  • 6. 6 The Outside Insider Copyright © 2015 Accenture All rights reserved. The situation A publicly traded company believes they have an insider engaging in malicious activity. FusionX deploys an Incident Response team to investigate. The support FusionX works with the client’s staff to investigate the incident and discovers that the incident is actually the work of organized crime engaging in large-scale fraud impacting hundreds of thousands of customers. The solution FusionX identifies the attack pathways, engages in attribution activities and devises a strategy to oust the attackers and secure the network from future attack.
  • 7. 7 Boardroom Blues Copyright © 2015 Accenture All rights reserved. The situation A multi-billion dollar investment firm engages FusionX for an enterprise wide, tactical penetration test. The support The team discovers dozens of critical vulnerabilities, including one that allows the team to eavesdrop on the board room via the Internet. The solution FusionX identifies the enterprise vulnerabilities and provides prioritized recommendations for remediation. Subsequent assessments reveal a significantly improved vulnerability profile.
  • 8. 8 Crown Jewels Copyright © 2015 Accenture All rights reserved. The situation The CEO of a Global 100 company wants to know how well his company’s intellectual property is protected from a sophisticated adversary. FusionX engages in a penetration test without the knowledge of the corporate security team. The support FusionX discovers a zero-day vulnerability in a custom-built application that allows the attack team to successfully and silently penetrate the corporate network. Within weeks, the team has exfiltrated gigabytes of sensitive data from the division the CEO wanted specifically targeted. The solution The CEO is able to re-align security priorities and the internal security team mitigates the vulnerabilities discovered by the FusionX team.
  • 9. 9 Money for Nothing Copyright © 2015 Accenture All rights reserved. The situation A large domestic bank has spent millions of dollars on security testing and products. The CISO challenges FusionX to find something they’ve missed. The support Within a week, FusionX identifies a systemic, zero-day vulnerability on their Internet-facing web application that allows the virtual creation and withdrawal of funds. The solution The bank quickly moves to remediate the issue with a temporary fix and commences a long-term project to remediate the systemic problem. FusionX provides further data to the bank to ensure that the issue has not been previously exploited. Ultimately, the vulnerability was identified prior to being exploited by a sophisticated attacker.
  • 10. About Accenture Accenture is a global management consulting, technology services and outsourcing company, with more than 336,000 people serving clients in more than 120 countries. Combining unparalleled experience, comprehensive capabilities across all industries and business functions, and extensive research on the world’s most successful companies, Accenture collaborates with clients to help them become high-performance businesses and governments. The company generated net revenues of US$30.0 billion for the fiscal year ended Aug. 31, 2014. Its home page is www.accenture.com. Copyright © 2015 Accenture All rights reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Contact us www.fusionx.com accenture.com/security