Skip to main content Skip to footer

Cyber Resilience


Everest Group’s MDR Services PEAK Matrix® 2023


Cyber attack simulation

Simulate attacks to evaluate security control effectiveness and test processes and capabilities to proactively defend against potential adversaries.

Adaptive detection and response

Deliver end-to-end detection & response capabilities across design, build & run services, powered by automation, industry expertise and a global team. Read more.

Crisis and incident response

Rapidly respond end-to-end to cyber events to reduce risk, minimize business disruption and accelerate recovery.

Threat intelligence

Data-led, industry-relevant intelligence delivered via multi-disciplinary analytic services to reduce and mitigate business risks.


Our Cyber Fusion Centers

Combining, market-leading advanced analytics and intelligent automation with managed security services, our cyber resilience incubation centers help organizations out-innovate attackers every single day.

Detect and respond at the Accenture Security ICS Cyber Range

Accenture's ICS Cyber Range in Houston

What we think

The Cyber-Resilient CEO

Five actions CEOs can take to minimize risk and put cyber resilience at the heart of reinvention efforts.

State of Cybersecurity Resilience 2023 

How cybersecurity boosts enterprise reinvention to drive business resilience.

Cyber Threat Intelligence Report

Our latest report focuses on early 2021 cyber threat trends and expert perspectives on threats to the operational technology (OT) landscape.

Ransomware reoriented

Businesses can recover from attacks faster if they understand and prepare for ransomware’s implications across the whole organization.


Our leaders

Robert Boyce

Managing Director – Accenture Security, Cyber Resilience Services Lead

Shawn Duffy

Managing Director – Accenture Security, Cyber Attack Simulation Lead

Matteo Masserini

Managing Director – Accenture Security, Detection and Response Lead

Join the team

Related capabilities

Cyber strategy

Define cyber, risk mitigation and regulatory strategies, aligning security to business priorities.

Cyber protection

Protect the business as it transforms—applying zero trust principles to secure the entire digital core.

Cyber industry

Embed security to build resilience and mitigate risk across critical areas of the value chain.