Professional Documents
Culture Documents
Fusionx & Accenture: One Global Security Team
Fusionx & Accenture: One Global Security Team
Fusionx & Accenture: One Global Security Team
Accenture:
One global
Security team
FusionX
An elite and sophisticated cyber
security team
• 20-year legacy providing tactical vulnerability assessment and
surgical penetration testing services against a wide variety of
organizations and targets.
The support
FusionX works with the client’s staff to investigate the incident
and discovers that the incident is actually the work of organized
crime engaging in large-scale fraud impacting hundreds of
thousands of customers.
The solution
FusionX identifies the attack pathways, engages in
attribution activities and devises a strategy to oust the
attackers and secure the network from future attack.
The support
The team discovers dozens of critical vulnerabilities, including
one that allows the team to eavesdrop on the board room via
the Internet.
The solution
FusionX identifies the enterprise vulnerabilities and provides
prioritized recommendations for remediation. Subsequent
assessments reveal a significantly improved vulnerability
profile.
The support
FusionX discovers a zero-day vulnerability in a custom-built
application that allows the attack team to successfully and
silently penetrate the corporate network. Within weeks, the
team has exfiltrated gigabytes of sensitive data from the
division the CEO wanted specifically targeted.
The solution
The CEO is able to re-align security priorities and the
internal security team mitigates the vulnerabilities
discovered by the FusionX team.
The support
Within a week, FusionX identifies a systemic, zero-day
vulnerability on their Internet-facing web application that allows
the virtual creation and withdrawal of funds.
The solution
The bank quickly moves to remediate the issue with a
temporary fix and commences a long-term project to remediate
the systemic problem. FusionX provides further data to the
bank to ensure that the issue has not been previously
exploited. Ultimately, the vulnerability was identified prior to
being exploited by a sophisticated attacker.