What is defense in depth accenture

What is defense in depth accenture
Accenture Australia announced the expansion of its national security practice to continue  to assist intelligence, public safety and border protection organisations overcome the multi dimensional threats Australia faces.

National security remains one of the most important priorities of Accenture’s Government  clients, with threats increasing and evolving rapidly. The national security practice will continue to help government to be more secure, resilient and innovative across a range of capabilities, leveraging and exploiting digital technology across the community, from cloud to the metaverse, unlocking human potential and performance to defend, protect and promote Australian integrity, safety and prosperity.

The Accenture national security practice will be led by Michael “Mick” Willing. Willing spent more than three decades working in the police force including as NSW Deputy Police Commissioner. This experience positions him well to work with Accenture’s clients in the public sector as they address their security challenges. Mick leads an established team and will work closely with Margarita “Meg” Tapia, Principal Director National Security, who helps the National Intelligence Community bring end to end digitally enabled technology and human ingenuity to life.

John Vidas, Accenture Health & Public Service Senior Managing Director, said “Accenture is  committed to helping our clients across all sectors navigate the increasing risks and threats to  the security and prosperity of Australia. We are thrilled to have the expertise of Michael with his  in-depth knowledge of both the industry and the security challenges it faces, leading this new  practice.”

Willing said “I am delighted to join the  team at Accenture to help our public sector clients navigate the increasingly complex threat landscape, to build cyber resilience, and to grow and reinvent with confidence. I look forward to expanding the practice and protecting the security of our nation, particularly across organisation boundaries of intelligence, policing and borders.”

What is defense in depth accenture

For Editorial Inquiries Contact:
Editor Kym Bergmann at 

For Advertising Inquiries Contact:
Director of Sales Graham Joss at 

What is defense in depth accenture

What is defense in depth accenture

We’ve detected that JavaScript is disabled in this browser. Please enable JavaScript or switch to a supported browser to continue using twitter.com. You can see a list of supported browsers in our Help Center.

Help Center

75.9k views

App SecurityEssentials

Defense-in-depth is an information assurance strategy that provides multiple, redundant defensive measures in case a security control fails or a vulnerability is exploited. It originates from a military strategy by the same name, which seeks to delay the advance of an attack, rather than defeating it with one strong line of defense.

Defense-in-depth cybersecurity use cases include end-user security, product design and network security.

An opposing principle to defense in depth is known as simplicity-in-security, which operates under the assumption that too many security measures might introduce problems or gaps that attackers can leverage.

Defense-in-depth architecture: Layered security

Defense-in-depth security architecture is based on controls that are designed to protect the physical, technical and administrative aspects of your network.

What is defense in depth accenture

Defense in depth, layered security architecture

  • Physical controls – These controls include security measures that prevent physical access to IT systems, such as security guards or locked doors.
  • Technical controls – Technical controls include security measures that protect network systems or resources using specialized hardware or software, such as a firewall appliance or antivirus program.
  • Administrative controls – Administrative controls are security measures consisting of policies or procedures directed at an organization’s employees, e.g., instructing users to label sensitive information as “confidential”.

Additionally, the following security layers help protect individual facets of your network:

  • Access measures – Access measures include authentication controls, biometrics, timed access and VPN.
  • Workstation defenses – Workstation defense measures include antivirus and anti-spam software.
  • Data protection – Data protection methods include data at rest encryption, hashing, secure data transmission and encrypted backups.
  • Perimeter defenses – Network perimeter defenses include firewalls, intrusion detection systems and intrusion prevention systems.
  • Monitoring and prevention – The monitoring and prevention of network attacks involves logging and auditing network activity, vulnerability scanners, sandboxing and security awareness training.

Defense-in-depth information assurance: Use cases

Broadly speaking, defense-in-depth use cases can be broken down into user protection scenarios and network security scenarios.

Website protection

Defense-in-depth user protection involves a combination of security offerings (e.g., WAF, antivirus, antispam software, etc.) and training to block threats and protect critical data.

A vendor providing software to protect end-users from cyberattacks can bundle multiple security offerings in the same product. For example, packaging together antivirus, firewall, anti-spam and privacy controls.

As a result, the user’s network is secured against malware, web application attacks (e.g., XSS, CSRF).

Network security

  • An organization sets up a firewall, and in addition, encrypts data flowing through the network, and encrypts data at rest. Even if attackers get past the firewall and steal data, the data is encrypted.
  • An organization sets up a firewall, runs an Intrusion Protection System with trained security operators, and deploys an antivirus program. This provides three layers of security – even if attackers get past the firewall, they can be detected and stopped by the IPS. And if they reach an end-user computer and try to install malware, it can be detected and removed by the antivirus.

Imperva defense-in-depth solutions

Imperva offers a complete suite of defense in depth security solutions, providing multiple lines of defense to secure your data and network.

Our data security solutions include database monitoring, data masking and vulnerability detection. Meanwhile, our web facing solutions, i.e., WAF and DDoS protection, ensure that your network is protected against all application layer attacks as well as smoke-screen DDoS assaults.