Skip to main content Skip to footer

Cyber Resilience

ACCENTURE NAMED A LEADER IN

Everest Group’s MDR Services PEAK Matrix® 2023

Capabilities

Cyber attack simulation

Simulate attacks to evaluate security control effectiveness and test processes and capabilities to proactively defend against potential adversaries.

Adaptive detection and response

Deliver end-to-end detection & response capabilities across design, build & run services, powered by automation, industry expertise and a global team. Read more.

Crisis and incident response

Rapidly respond end-to-end to cyber events to reduce risk, minimize business disruption and accelerate recovery.

Threat intelligence

Data-led, industry-relevant intelligence delivered via multi-disciplinary analytic services to reduce and mitigate business risks.

Security

Our Cyber Fusion Centers

Combining, market-leading advanced analytics and intelligent automation with managed security services, our cyber resilience incubation centers help organizations out-innovate attackers every single day.

Detect and respond at the Accenture Security ICS Cyber Range

Accenture's ICS Cyber Range in Houston

What we think

The state of cybersecurity resilience 2021

New report reveals a group of Cyber Champions—organizations that excel at cyber resilience to achieve better business outcomes.

Cyber Threat Intelligence Report

Our latest report focuses on early 2021 cyber threat trends and expert perspectives on threats to the operational technology (OT) landscape.

Ransomware reoriented

Businesses can recover from attacks faster if they understand and prepare for ransomware’s implications across the whole organization.

Blogs

Our leaders

Robert Boyce

Managing Director – Accenture Security, Cyber Resilience Services Lead

Shawn Duffy

Managing Director – Accenture Security, Cyber Attack Simulation Lead

Matteo Masserini

Managing Director – Accenture Security, Detection and Response Lead

Join the team

Related capabilities

Cyber strategy

Define cyber, risk mitigation and regulatory strategies, aligning security to business priorities.

Cyber protection

Protect the business as it transforms—applying zero trust principles to secure the entire digital core.

Cyber industry

Embed security to build resilience and mitigate risk across critical areas of the value chain.