SlideShare a Scribd company logo
FusionX &
Accenture:
One global
Security team
2
FusionX
An elite and sophisticated cyber
security team
Copyright © 2015 Accenture All rights reserved.
• 20-year legacy providing tactical vulnerability assessment and
surgical penetration testing services against a wide variety of
organizations and targets.
• Focused on unique talent and experience of our elite
assessment team, rather than on automated tools.
• Targets information assets using the tailored tactics,
techniques and procedures (TTP’s) of your most likely
attackers to evaluate resiliency to a real-world attack.
• Develops effective risk management strategies that focus on
current and emerging threats while maintaining efficient
business operations.
3Copyright © 2015 Accenture All rights reserved.
FusionX works with your management and security teams to
align your risk management practices and procedures with
organizational goals and expectations.
The end result? A comprehensive risk management program,
nuanced to your unique business environment.
Our Approach
Leading businesses to a unique and
comprehensive plan for implementation
4Copyright © 2015 Accenture All rights reserved.
FusionX’s advanced threat capabilities complement
Accenture’s security experience, technology and teams to
address the toughest cyber security challenges.
Accenture’s industrialized suite of offerings—including Digital
Identity, Cyber Defense, and Managed Security—embed
security into the fabric of digital operations, enabling agility,
protecting the broader ecosystem and delivering sustainable
business outcomes.
Together, we help clients remediate cyber security
weaknesses—at a global scale.
FusionX & Accenture
Helping clients manage risk and
improve business results—globally
5Copyright © 2015 Accenture All rights reserved.
FusionX Successes
6
The Outside Insider
Copyright © 2015 Accenture All rights reserved.
The situation
A publicly traded company believes they have an insider
engaging in malicious activity. FusionX deploys an Incident
Response team to investigate.
The support
FusionX works with the client’s staff to investigate the incident
and discovers that the incident is actually the work of organized
crime engaging in large-scale fraud impacting hundreds of
thousands of customers.
The solution
FusionX identifies the attack pathways, engages in
attribution activities and devises a strategy to oust the
attackers and secure the network from future attack.
7
Boardroom Blues
Copyright © 2015 Accenture All rights reserved.
The situation
A multi-billion dollar investment firm engages FusionX for an
enterprise wide, tactical penetration test.
The support
The team discovers dozens of critical vulnerabilities, including
one that allows the team to eavesdrop on the board room via
the Internet.
The solution
FusionX identifies the enterprise vulnerabilities and provides
prioritized recommendations for remediation. Subsequent
assessments reveal a significantly improved vulnerability
profile.
8
Crown Jewels
Copyright © 2015 Accenture All rights reserved.
The situation
The CEO of a Global 100 company wants to know how well his
company’s intellectual property is protected from a
sophisticated adversary. FusionX engages in a penetration test
without the knowledge of the corporate security team.
The support
FusionX discovers a zero-day vulnerability in a custom-built
application that allows the attack team to successfully and
silently penetrate the corporate network. Within weeks, the
team has exfiltrated gigabytes of sensitive data from the
division the CEO wanted specifically targeted.
The solution
The CEO is able to re-align security priorities and the
internal security team mitigates the vulnerabilities
discovered by the FusionX team.
9
Money for Nothing
Copyright © 2015 Accenture All rights reserved.
The situation
A large domestic bank has spent millions of dollars on security
testing and products. The CISO challenges FusionX to find
something they’ve missed.
The support
Within a week, FusionX identifies a systemic, zero-day
vulnerability on their Internet-facing web application that allows
the virtual creation and withdrawal of funds.
The solution
The bank quickly moves to remediate the issue with a
temporary fix and commences a long-term project to remediate
the systemic problem. FusionX provides further data to the
bank to ensure that the issue has not been previously
exploited. Ultimately, the vulnerability was identified prior to
being exploited by a sophisticated attacker.
About Accenture
Accenture is a global management
consulting, technology services and
outsourcing company, with more than
336,000 people serving clients in more than
120 countries. Combining unparalleled
experience, comprehensive capabilities
across all industries and business
functions, and extensive research on the
world’s most successful companies,
Accenture collaborates with clients to help
them become high-performance businesses
and governments. The company generated
net revenues of US$30.0 billion for the
fiscal year ended Aug. 31, 2014. Its home
page is www.accenture.com.
Copyright © 2015 Accenture
All rights reserved.
Accenture, its logo, and
High Performance Delivered
are trademarks of Accenture.
Contact us
www.fusionx.com
accenture.com/security

More Related Content

What's hot

Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceTechnology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Service
Accenture Operations
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Accenture Technology
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
Accenture Technology
 
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for Insurance
Accenture Insurance
 
Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationHarnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open Innovation
Accenture Operations
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Accenture Technology
 
Accenture Liquid Application Studio
Accenture Liquid Application StudioAccenture Liquid Application Studio
Accenture Liquid Application Studio
Accenture Technology
 
2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York
accenture
 
Technology Vision 2016 - Infographic
Technology Vision 2016 - InfographicTechnology Vision 2016 - Infographic
Technology Vision 2016 - Infographic
Accenture Technology
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
Melissa Gilpin
 
Intelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital BusinessIntelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital Business
accenture
 
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leader
Accenture Australia
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
accenture
 
Cloud in the Boardroom
Cloud in the BoardroomCloud in the Boardroom
Cloud in the Boardroom
Accenture Operations
 
From Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber ResilienceFrom Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber Resilience
accenture
 
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
Accenture Australia
 
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
accenture
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
Accenture Technology
 
Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare
Accenture Security
 

What's hot (19)

Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceTechnology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Service
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Accenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for InsuranceAccenture High Performance Security Report 2016 for Insurance
Accenture High Performance Security Report 2016 for Insurance
 
Harnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open InnovationHarnessing the Power of Entrepreneurs to Open Innovation
Harnessing the Power of Entrepreneurs to Open Innovation
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Accenture Liquid Application Studio
Accenture Liquid Application StudioAccenture Liquid Application Studio
Accenture Liquid Application Studio
 
2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York
 
Technology Vision 2016 - Infographic
Technology Vision 2016 - InfographicTechnology Vision 2016 - Infographic
Technology Vision 2016 - Infographic
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Intelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital BusinessIntelligent Infrastructures: Unlocking the Digital Business
Intelligent Infrastructures: Unlocking the Digital Business
 
The cyber security leap: From laggard to leader
The cyber security leap: From laggard to leaderThe cyber security leap: From laggard to leader
The cyber security leap: From laggard to leader
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Cloud in the Boardroom
Cloud in the BoardroomCloud in the Boardroom
Cloud in the Boardroom
 
From Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber ResilienceFrom Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber Resilience
 
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
 
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare
 

Viewers also liked

Accenture Security Framework for AWS: Monetary Authority of Singapore Guidelines
Accenture Security Framework for AWS: Monetary Authority of Singapore GuidelinesAccenture Security Framework for AWS: Monetary Authority of Singapore Guidelines
Accenture Security Framework for AWS: Monetary Authority of Singapore Guidelines
Accenture Operations
 
Accenture Cloud-based Lab Reviews Case Study
Accenture Cloud-based Lab Reviews Case StudyAccenture Cloud-based Lab Reviews Case Study
Accenture Cloud-based Lab Reviews Case Study
Accenture Operations
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
Accenture Operations
 
Technology Vision 2016 - Overview
Technology Vision 2016 - OverviewTechnology Vision 2016 - Overview
Technology Vision 2016 - Overview
Accenture Operations
 
Collective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber AttacksCollective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber Attacks
Accenture Operations
 
Accenture Enkitec Group: Oracle database and Engineered Systems
Accenture Enkitec Group: Oracle database and Engineered SystemsAccenture Enkitec Group: Oracle database and Engineered Systems
Accenture Enkitec Group: Oracle database and Engineered Systems
Accenture Operations
 
The Promise of as-a-Service
The Promise of as-a-ServiceThe Promise of as-a-Service
The Promise of as-a-Service
Accenture Operations
 
The Six Distinctions of Procurement
The Six Distinctions of ProcurementThe Six Distinctions of Procurement
The Six Distinctions of Procurement
Accenture Operations
 
Technology Vision 2017 - Overview
Technology Vision 2017 - OverviewTechnology Vision 2017 - Overview
Technology Vision 2017 - Overview
Accenture Technology
 
Cookin’ up Hybrid Clouds: Chef and the Accenture Cloud Platform
Cookin’ up Hybrid Clouds: Chef and the Accenture Cloud PlatformCookin’ up Hybrid Clouds: Chef and the Accenture Cloud Platform
Cookin’ up Hybrid Clouds: Chef and the Accenture Cloud Platform
Chef Software, Inc.
 
Why Software as a Service (SaaS) requires a new approach to Application Manag...
Why Software as a Service (SaaS) requires a new approach to Application Manag...Why Software as a Service (SaaS) requires a new approach to Application Manag...
Why Software as a Service (SaaS) requires a new approach to Application Manag...
Accenture Technology
 
Cloud Power
Cloud PowerCloud Power
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
accenture
 
Accenture DevOps: Delivering applications at the pace of business
Accenture DevOps: Delivering applications at the pace of businessAccenture DevOps: Delivering applications at the pace of business
Accenture DevOps: Delivering applications at the pace of business
Accenture Technology
 
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
Sonatype
 
Llp Mantra I 23 Apr 2009
Llp Mantra I 23 Apr 2009Llp Mantra I 23 Apr 2009
Llp Mantra I 23 Apr 2009LLPonline.in
 

Viewers also liked (16)

Accenture Security Framework for AWS: Monetary Authority of Singapore Guidelines
Accenture Security Framework for AWS: Monetary Authority of Singapore GuidelinesAccenture Security Framework for AWS: Monetary Authority of Singapore Guidelines
Accenture Security Framework for AWS: Monetary Authority of Singapore Guidelines
 
Accenture Cloud-based Lab Reviews Case Study
Accenture Cloud-based Lab Reviews Case StudyAccenture Cloud-based Lab Reviews Case Study
Accenture Cloud-based Lab Reviews Case Study
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Technology Vision 2016 - Overview
Technology Vision 2016 - OverviewTechnology Vision 2016 - Overview
Technology Vision 2016 - Overview
 
Collective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber AttacksCollective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber Attacks
 
Accenture Enkitec Group: Oracle database and Engineered Systems
Accenture Enkitec Group: Oracle database and Engineered SystemsAccenture Enkitec Group: Oracle database and Engineered Systems
Accenture Enkitec Group: Oracle database and Engineered Systems
 
The Promise of as-a-Service
The Promise of as-a-ServiceThe Promise of as-a-Service
The Promise of as-a-Service
 
The Six Distinctions of Procurement
The Six Distinctions of ProcurementThe Six Distinctions of Procurement
The Six Distinctions of Procurement
 
Technology Vision 2017 - Overview
Technology Vision 2017 - OverviewTechnology Vision 2017 - Overview
Technology Vision 2017 - Overview
 
Cookin’ up Hybrid Clouds: Chef and the Accenture Cloud Platform
Cookin’ up Hybrid Clouds: Chef and the Accenture Cloud PlatformCookin’ up Hybrid Clouds: Chef and the Accenture Cloud Platform
Cookin’ up Hybrid Clouds: Chef and the Accenture Cloud Platform
 
Why Software as a Service (SaaS) requires a new approach to Application Manag...
Why Software as a Service (SaaS) requires a new approach to Application Manag...Why Software as a Service (SaaS) requires a new approach to Application Manag...
Why Software as a Service (SaaS) requires a new approach to Application Manag...
 
Cloud Power
Cloud PowerCloud Power
Cloud Power
 
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
 
Accenture DevOps: Delivering applications at the pace of business
Accenture DevOps: Delivering applications at the pace of businessAccenture DevOps: Delivering applications at the pace of business
Accenture DevOps: Delivering applications at the pace of business
 
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
 
Llp Mantra I 23 Apr 2009
Llp Mantra I 23 Apr 2009Llp Mantra I 23 Apr 2009
Llp Mantra I 23 Apr 2009
 

Similar to FusionX & Accenture: One Global Security Team

The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019
Insights success media and technology pvt ltd
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.
accenture
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
accenture
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Accenture Operations
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Accenture Technology
 
DDHI Board Report.ppsx
DDHI Board Report.ppsxDDHI Board Report.ppsx
DDHI Board Report.ppsx
LaurenCampbell84
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
CMR WORLD TECH
 
Cyber Security Audit.pdf
Cyber Security Audit.pdfCyber Security Audit.pdf
Cyber Security Audit.pdf
Vograce
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementWilliam McBorrough
 
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lens
aakash malhotra
 
Virtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber SecurityVirtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber Security
Cyber Security Experts
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
Netmagic Solutions Pvt. Ltd.
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
Netmagic Solutions Pvt. Ltd.
 
FINTECH: Industries we Serve
FINTECH: Industries we ServeFINTECH: Industries we Serve
FINTECH: Industries we Serve
The TNS Group
 
Fire eye investis case study
Fire eye investis case studyFire eye investis case study
Fire eye investis case studycnnetwork
 
FireEye investis case study
FireEye investis case studyFireEye investis case study
FireEye investis case study
cnnetwork
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber Resilience
Accenture Security
 
Lead Through Disruption Guide PDF
Lead Through Disruption Guide PDFLead Through Disruption Guide PDF
Lead Through Disruption Guide PDF
Deloitte United States
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
wkyra78
 

Similar to FusionX & Accenture: One Global Security Team (20)

The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
DDHI Board Report.ppsx
DDHI Board Report.ppsxDDHI Board Report.ppsx
DDHI Board Report.ppsx
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Cyber Security Audit.pdf
Cyber Security Audit.pdfCyber Security Audit.pdf
Cyber Security Audit.pdf
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability Statement
 
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lens
 
ZS Infotech v1.0
ZS Infotech v1.0ZS Infotech v1.0
ZS Infotech v1.0
 
Virtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber SecurityVirtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber Security
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
FINTECH: Industries we Serve
FINTECH: Industries we ServeFINTECH: Industries we Serve
FINTECH: Industries we Serve
 
Fire eye investis case study
Fire eye investis case studyFire eye investis case study
Fire eye investis case study
 
FireEye investis case study
FireEye investis case studyFireEye investis case study
FireEye investis case study
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber Resilience
 
Lead Through Disruption Guide PDF
Lead Through Disruption Guide PDFLead Through Disruption Guide PDF
Lead Through Disruption Guide PDF
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 

More from Accenture Operations

Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Accenture Operations
 
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Accenture Operations
 
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Accenture Operations
 
Network Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureNetwork Operations | SlideShare | Accenture
Network Operations | SlideShare | Accenture
Accenture Operations
 
Network Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureNetwork Operations | SlideShare | Accenture
Network Operations | SlideShare | Accenture
Accenture Operations
 
Start your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureStart your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | Accenture
Accenture Operations
 
Start your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureStart your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | Accenture
Accenture Operations
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | Accenture
Accenture Operations
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | Accenture
Accenture Operations
 
Driving change: Unlocking data to transform the front office
Driving change: Unlocking data to transform the front officeDriving change: Unlocking data to transform the front office
Driving change: Unlocking data to transform the front office
Accenture Operations
 
Marketing Operations | SlideShare | Accenture
Marketing Operations | SlideShare | AccentureMarketing Operations | SlideShare | Accenture
Marketing Operations | SlideShare | Accenture
Accenture Operations
 
The Value Multiplier | SlideShare | Accenture
The Value Multiplier | SlideShare | AccentureThe Value Multiplier | SlideShare | Accenture
The Value Multiplier | SlideShare | Accenture
Accenture Operations
 
Intelligent Talent & HR Operations | SlideShare | Accenture
Intelligent Talent & HR Operations | SlideShare | AccentureIntelligent Talent & HR Operations | SlideShare | Accenture
Intelligent Talent & HR Operations | SlideShare | Accenture
Accenture Operations
 
Intelligent Marketing Operations | SlideShare | Accenture
Intelligent Marketing Operations | SlideShare | AccentureIntelligent Marketing Operations | SlideShare | Accenture
Intelligent Marketing Operations | SlideShare | Accenture
Accenture Operations
 
Elevate with Intelligent Supply Chain | SlideShare | Accenture
Elevate with Intelligent Supply Chain | SlideShare | AccentureElevate with Intelligent Supply Chain | SlideShare | Accenture
Elevate with Intelligent Supply Chain | SlideShare | Accenture
Accenture Operations
 
Fast-Track to Future-Ready Finance Operations
Fast-Track to Future-Ready Finance OperationsFast-Track to Future-Ready Finance Operations
Fast-Track to Future-Ready Finance Operations
Accenture Operations
 
Elevate Every Decision with Intelligent Procurement
Elevate Every Decision with Intelligent ProcurementElevate Every Decision with Intelligent Procurement
Elevate Every Decision with Intelligent Procurement
Accenture Operations
 
Elevate Every Decision with Digital Inside Sales
Elevate Every Decision with Digital Inside SalesElevate Every Decision with Digital Inside Sales
Elevate Every Decision with Digital Inside Sales
Accenture Operations
 
Fast Track to Future Ready Banking Operations
Fast Track to Future Ready Banking OperationsFast Track to Future Ready Banking Operations
Fast Track to Future Ready Banking Operations
Accenture Operations
 
Fast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance OperationsFast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance Operations
Accenture Operations
 

More from Accenture Operations (20)

Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | Accenture
 
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | Accenture
 
Making Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | AccentureMaking Finance the Predictive Powerhouse | SlideShare | Accenture
Making Finance the Predictive Powerhouse | SlideShare | Accenture
 
Network Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureNetwork Operations | SlideShare | Accenture
Network Operations | SlideShare | Accenture
 
Network Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureNetwork Operations | SlideShare | Accenture
Network Operations | SlideShare | Accenture
 
Start your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureStart your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | Accenture
 
Start your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | AccentureStart your Sustainability Journey | SlideShare | Accenture
Start your Sustainability Journey | SlideShare | Accenture
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | Accenture
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | Accenture
 
Driving change: Unlocking data to transform the front office
Driving change: Unlocking data to transform the front officeDriving change: Unlocking data to transform the front office
Driving change: Unlocking data to transform the front office
 
Marketing Operations | SlideShare | Accenture
Marketing Operations | SlideShare | AccentureMarketing Operations | SlideShare | Accenture
Marketing Operations | SlideShare | Accenture
 
The Value Multiplier | SlideShare | Accenture
The Value Multiplier | SlideShare | AccentureThe Value Multiplier | SlideShare | Accenture
The Value Multiplier | SlideShare | Accenture
 
Intelligent Talent & HR Operations | SlideShare | Accenture
Intelligent Talent & HR Operations | SlideShare | AccentureIntelligent Talent & HR Operations | SlideShare | Accenture
Intelligent Talent & HR Operations | SlideShare | Accenture
 
Intelligent Marketing Operations | SlideShare | Accenture
Intelligent Marketing Operations | SlideShare | AccentureIntelligent Marketing Operations | SlideShare | Accenture
Intelligent Marketing Operations | SlideShare | Accenture
 
Elevate with Intelligent Supply Chain | SlideShare | Accenture
Elevate with Intelligent Supply Chain | SlideShare | AccentureElevate with Intelligent Supply Chain | SlideShare | Accenture
Elevate with Intelligent Supply Chain | SlideShare | Accenture
 
Fast-Track to Future-Ready Finance Operations
Fast-Track to Future-Ready Finance OperationsFast-Track to Future-Ready Finance Operations
Fast-Track to Future-Ready Finance Operations
 
Elevate Every Decision with Intelligent Procurement
Elevate Every Decision with Intelligent ProcurementElevate Every Decision with Intelligent Procurement
Elevate Every Decision with Intelligent Procurement
 
Elevate Every Decision with Digital Inside Sales
Elevate Every Decision with Digital Inside SalesElevate Every Decision with Digital Inside Sales
Elevate Every Decision with Digital Inside Sales
 
Fast Track to Future Ready Banking Operations
Fast Track to Future Ready Banking OperationsFast Track to Future Ready Banking Operations
Fast Track to Future Ready Banking Operations
 
Fast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance OperationsFast-Track to Future-Ready Insurance Operations
Fast-Track to Future-Ready Insurance Operations
 

Recently uploaded

What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
Lviv Startup Club
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 

Recently uploaded (20)

What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 

FusionX & Accenture: One Global Security Team

  • 2. 2 FusionX An elite and sophisticated cyber security team Copyright © 2015 Accenture All rights reserved. • 20-year legacy providing tactical vulnerability assessment and surgical penetration testing services against a wide variety of organizations and targets. • Focused on unique talent and experience of our elite assessment team, rather than on automated tools. • Targets information assets using the tailored tactics, techniques and procedures (TTP’s) of your most likely attackers to evaluate resiliency to a real-world attack. • Develops effective risk management strategies that focus on current and emerging threats while maintaining efficient business operations.
  • 3. 3Copyright © 2015 Accenture All rights reserved. FusionX works with your management and security teams to align your risk management practices and procedures with organizational goals and expectations. The end result? A comprehensive risk management program, nuanced to your unique business environment. Our Approach Leading businesses to a unique and comprehensive plan for implementation
  • 4. 4Copyright © 2015 Accenture All rights reserved. FusionX’s advanced threat capabilities complement Accenture’s security experience, technology and teams to address the toughest cyber security challenges. Accenture’s industrialized suite of offerings—including Digital Identity, Cyber Defense, and Managed Security—embed security into the fabric of digital operations, enabling agility, protecting the broader ecosystem and delivering sustainable business outcomes. Together, we help clients remediate cyber security weaknesses—at a global scale. FusionX & Accenture Helping clients manage risk and improve business results—globally
  • 5. 5Copyright © 2015 Accenture All rights reserved. FusionX Successes
  • 6. 6 The Outside Insider Copyright © 2015 Accenture All rights reserved. The situation A publicly traded company believes they have an insider engaging in malicious activity. FusionX deploys an Incident Response team to investigate. The support FusionX works with the client’s staff to investigate the incident and discovers that the incident is actually the work of organized crime engaging in large-scale fraud impacting hundreds of thousands of customers. The solution FusionX identifies the attack pathways, engages in attribution activities and devises a strategy to oust the attackers and secure the network from future attack.
  • 7. 7 Boardroom Blues Copyright © 2015 Accenture All rights reserved. The situation A multi-billion dollar investment firm engages FusionX for an enterprise wide, tactical penetration test. The support The team discovers dozens of critical vulnerabilities, including one that allows the team to eavesdrop on the board room via the Internet. The solution FusionX identifies the enterprise vulnerabilities and provides prioritized recommendations for remediation. Subsequent assessments reveal a significantly improved vulnerability profile.
  • 8. 8 Crown Jewels Copyright © 2015 Accenture All rights reserved. The situation The CEO of a Global 100 company wants to know how well his company’s intellectual property is protected from a sophisticated adversary. FusionX engages in a penetration test without the knowledge of the corporate security team. The support FusionX discovers a zero-day vulnerability in a custom-built application that allows the attack team to successfully and silently penetrate the corporate network. Within weeks, the team has exfiltrated gigabytes of sensitive data from the division the CEO wanted specifically targeted. The solution The CEO is able to re-align security priorities and the internal security team mitigates the vulnerabilities discovered by the FusionX team.
  • 9. 9 Money for Nothing Copyright © 2015 Accenture All rights reserved. The situation A large domestic bank has spent millions of dollars on security testing and products. The CISO challenges FusionX to find something they’ve missed. The support Within a week, FusionX identifies a systemic, zero-day vulnerability on their Internet-facing web application that allows the virtual creation and withdrawal of funds. The solution The bank quickly moves to remediate the issue with a temporary fix and commences a long-term project to remediate the systemic problem. FusionX provides further data to the bank to ensure that the issue has not been previously exploited. Ultimately, the vulnerability was identified prior to being exploited by a sophisticated attacker.
  • 10. About Accenture Accenture is a global management consulting, technology services and outsourcing company, with more than 336,000 people serving clients in more than 120 countries. Combining unparalleled experience, comprehensive capabilities across all industries and business functions, and extensive research on the world’s most successful companies, Accenture collaborates with clients to help them become high-performance businesses and governments. The company generated net revenues of US$30.0 billion for the fiscal year ended Aug. 31, 2014. Its home page is www.accenture.com. Copyright © 2015 Accenture All rights reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Contact us www.fusionx.com accenture.com/security