Skip to main content Skip to footer

Information Security at Accenture

What we do

Technical architecture and security operations

Selects, deploys, and operates security technology for Accenture that monitors, mitigates and defends against vulnerabilities and threats.

Governance, risk and compliance

Establishes and maintains cyber risk management controls, policies, processes and metrics to fortify Accenture’s security posture.

Client data protection

Operates a program that equips Accenture client teams with tools and processes necessary to identify and mitigate security risks over the lifecycle of a client project.

Behavioral change

Creates a security-first mindset among employees through immersive and relatable learning experiences.

Cyber incident response

Detects and defends the Accenture network infrastructure against cyber attacks through six specialized teams.

Case studies

Building a culture of cyber security

A changing world of cyber threats leads Accenture to evolve and mature its defenses to fortify the company’s security posture.

Accenture achieves high cyber security ratings

Accenture’s Information Security group implements an engineered process of security hygiene practices to enhance third-party security ratings.

Accenture is certified secure

Accenture maintains certification to ISO 27001:2013 standard and meets/exceeds benchmarks against leading industry controls and frameworks.

Information security client data protection

Accenture’s Information Security Client Data program equips client teams with a standardized approach and the security controls and tools necessary to keep data safe.

Information Security Advocate Program

Accenture’s Information Security Advocate program promotes positive security behavior with interactive learning aligned with security risks.

Hear from us

Awards and recognition

Our leaders

Kris Burkhardt

Chief Information Security Officer

Paul Kunas

Lead – Information Security Governance, Risk and Compliance

Gary Sacco

Lead – Information Security Deployment and Acquisitions

John Blasi

Lead – Information Security Technology and Operations

Adam Long

Lead – Information Security Cyber Incident Response