Accenture’s attack surface, made up of thousands of servers, virtual machines, cloud objects, devices, and virtual workstations, is large enough. But Accenture also often acquires companies with their own IP inventory, creating an even larger attack surface.
“We’ve always had a strong security posture, but as we grew, we realized we had weaknesses in our defense,” said Kristian Burkhardt, Accenture CISO.
To achieve complete visibility of its IP environment, Accenture has combined various technologies into a custom ASM (attack zone management) system. Burkhardt describes the system as “combining a set of tools into a process” that includes penetration testing, customized scanning, and attack simulations with human intelligence and teamwork.
Source link