SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
Copyright © 2018 Accenture. All rights reserved.
LIMITYOUR
VULNERABILITIES
Assess. Develop. Protect.
Copyright © 2018 Accenture. All rights reserved. 02
CYBER
DOESN’T
HAVE TO BE
SCARY
Identifying vulnerabilities allows you
to proactively secure your network.
HERE ARE POTENTIAL
SOLUTIONS FOR CHALLENGES
YOUR NETWORK MAY FACE
Copyright © 2018 Accenture. All rights reserved.
Copyright © 2018 Accenture. All rights reserved.
OPEN ACCESS
03
Increased number of unmonitored open networks
makes it vulnerable to unauthorised access,
unsafe browsing, and malware infections.
CHALLENGE
TO INFORMATION
SHARING AND NETWORK
POTENTIAL SOLUTIONS
• Centralised network and monitoring
• Implement higher security
management standards
• Place an advanced cyber defense
to current protocols
• Provide enterprise-wide training
and awareness on information
security topics
Copyright © 2018 Accenture. All rights reserved.
BRING YOUR
OWN DEVICE
04
Users bringing their own devices prevent campus IT teams from
securely monitoring online activities connected to the campus
network. This exposes the institution to more cyber attacks.
CHALLENGE
(BYOD)
POTENTIAL SOLUTIONS
• Identify most valuable assets and standardise
device management system
• Network security and monitoring
Copyright © 2018 Accenture. All rights reserved.
Copyright © 2018 Accenture. All rights reserved.
DECENTRALISED
05
Without a unified Information Technology (IT) and
Security ecosystem, streamlined practices become
difficult to implement. As a result, distributed data
repositories are scattered throughout the network
making it harder to protect.
CHALLENGE
IT AND SECURITY
PROCEDURES
POTENTIAL SOLUTIONS
• Assess and define enterprise security
policies and standards
• Develop security architecture with flows
• Establish risk levels for applications and
assign security controls
Copyright © 2018 Accenture. All rights reserved.
UNAVAILABLE RESOURCES
06
Most Higher Ed institutions have limited access to formal Security and Compliance
Governance structure which prevent a standardised set of policies to be formed.
CHALLENGE
FOR IT SECURITY
POTENTIAL SOLUTIONS
• Assess and refine current security governance process
• Invest in educating employees about current policies and
hiring specialised employees
• Examine cloud-based security solutions and managed
security services (MSS)
Copyright © 2018 Accenture. All rights reserved.
Copyright © 2018 Accenture. All rights reserved.
THINK INNOVATIVELY. ACT QUICKLY.
To discuss the barriers facing your institution, please contact us.
Jonathan Fry
Head of Education, North America
jonathan.a.fry@accenture.com
Lalit Ahluwalia
North America Security Lead
lalit.k.ahluwalia@accenture.com
ABOUT ACCENTURE
Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and
operations. Combining unmatched experience and specialised skills across more than 40 industries and all business functions – underpinned by the world’s largest
delivery network – Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their
stakeholders. With more than 435,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives.
Visit us at www.accenture.com.
Copyright © 2018 Accenture. All rights reserved.
Accenture, its logo, and High Performance Delivered are trademarks of Accenture.
Learn more at https://www.accenture.com/digitalstudentau.

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Leading the Digital Enterprise
Leading the Digital EnterpriseLeading the Digital Enterprise
Leading the Digital Enterprise
 
Smart Move: Emergent Technologies Make Their Mark on Public Service
Smart Move: Emergent Technologies Make Their Mark on Public ServiceSmart Move: Emergent Technologies Make Their Mark on Public Service
Smart Move: Emergent Technologies Make Their Mark on Public Service
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilience
 
Securing Consumer Trust
Securing Consumer TrustSecuring Consumer Trust
Securing Consumer Trust
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
The State of the Federal IT Market 2018
The State of the Federal IT Market 2018The State of the Federal IT Market 2018
The State of the Federal IT Market 2018
 
Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceTechnology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Service
 
The Digital Emperor Has No Clothes
The Digital Emperor Has No ClothesThe Digital Emperor Has No Clothes
The Digital Emperor Has No Clothes
 
Accenture Compliance Risk Study 2017 for Financial Services: Presentation
Accenture Compliance Risk Study 2017 for Financial Services: PresentationAccenture Compliance Risk Study 2017 for Financial Services: Presentation
Accenture Compliance Risk Study 2017 for Financial Services: Presentation
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
 
Are you Ready to be an Insurer of Things?
Are you Ready to be an Insurer of Things?Are you Ready to be an Insurer of Things?
Are you Ready to be an Insurer of Things?
 
Agricultural Chemicals 2016 Supply Chain Benchmarking Study
Agricultural Chemicals 2016 Supply Chain Benchmarking StudyAgricultural Chemicals 2016 Supply Chain Benchmarking Study
Agricultural Chemicals 2016 Supply Chain Benchmarking Study
 
Corrosion Management
Corrosion ManagementCorrosion Management
Corrosion Management
 
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
 
A new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growthA new frontier for technology: Nimble innovation for growth
A new frontier for technology: Nimble innovation for growth
 
Chemicals: Smarter Investments, Outstanding Results
Chemicals: Smarter Investments, Outstanding ResultsChemicals: Smarter Investments, Outstanding Results
Chemicals: Smarter Investments, Outstanding Results
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
Unplanned analytics-led transformation
Unplanned analytics-led transformationUnplanned analytics-led transformation
Unplanned analytics-led transformation
 
Unleashing Innovation: A Closer Look at Strategy
Unleashing Innovation: A Closer Look at StrategyUnleashing Innovation: A Closer Look at Strategy
Unleashing Innovation: A Closer Look at Strategy
 
Unleashing Innovation: A Closer Look at Absorption
Unleashing Innovation: A Closer Look at AbsorptionUnleashing Innovation: A Closer Look at Absorption
Unleashing Innovation: A Closer Look at Absorption
 

Similar a Limit Your Vulnerabilities: Assess. Develop. Protect.

Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
Career Communications Group
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal
Carl Bradley Pate
 

Similar a Limit Your Vulnerabilities: Assess. Develop. Protect. (20)

For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
2018 State of Cyber Resilience
2018 State of Cyber Resilience2018 State of Cyber Resilience
2018 State of Cyber Resilience
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber Resilience
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
Healthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber ResilienceHealthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber Resilience
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Securing the Industrial Enterprise
Securing the Industrial EnterpriseSecuring the Industrial Enterprise
Securing the Industrial Enterprise
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal
 

Más de accenture

Más de accenture (20)

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Limit Your Vulnerabilities: Assess. Develop. Protect.

  • 1. Copyright © 2018 Accenture. All rights reserved. LIMITYOUR VULNERABILITIES Assess. Develop. Protect.
  • 2. Copyright © 2018 Accenture. All rights reserved. 02 CYBER DOESN’T HAVE TO BE SCARY Identifying vulnerabilities allows you to proactively secure your network. HERE ARE POTENTIAL SOLUTIONS FOR CHALLENGES YOUR NETWORK MAY FACE Copyright © 2018 Accenture. All rights reserved.
  • 3. Copyright © 2018 Accenture. All rights reserved. OPEN ACCESS 03 Increased number of unmonitored open networks makes it vulnerable to unauthorised access, unsafe browsing, and malware infections. CHALLENGE TO INFORMATION SHARING AND NETWORK POTENTIAL SOLUTIONS • Centralised network and monitoring • Implement higher security management standards • Place an advanced cyber defense to current protocols • Provide enterprise-wide training and awareness on information security topics
  • 4. Copyright © 2018 Accenture. All rights reserved. BRING YOUR OWN DEVICE 04 Users bringing their own devices prevent campus IT teams from securely monitoring online activities connected to the campus network. This exposes the institution to more cyber attacks. CHALLENGE (BYOD) POTENTIAL SOLUTIONS • Identify most valuable assets and standardise device management system • Network security and monitoring Copyright © 2018 Accenture. All rights reserved.
  • 5. Copyright © 2018 Accenture. All rights reserved. DECENTRALISED 05 Without a unified Information Technology (IT) and Security ecosystem, streamlined practices become difficult to implement. As a result, distributed data repositories are scattered throughout the network making it harder to protect. CHALLENGE IT AND SECURITY PROCEDURES POTENTIAL SOLUTIONS • Assess and define enterprise security policies and standards • Develop security architecture with flows • Establish risk levels for applications and assign security controls
  • 6. Copyright © 2018 Accenture. All rights reserved. UNAVAILABLE RESOURCES 06 Most Higher Ed institutions have limited access to formal Security and Compliance Governance structure which prevent a standardised set of policies to be formed. CHALLENGE FOR IT SECURITY POTENTIAL SOLUTIONS • Assess and refine current security governance process • Invest in educating employees about current policies and hiring specialised employees • Examine cloud-based security solutions and managed security services (MSS) Copyright © 2018 Accenture. All rights reserved.
  • 7. Copyright © 2018 Accenture. All rights reserved. THINK INNOVATIVELY. ACT QUICKLY. To discuss the barriers facing your institution, please contact us. Jonathan Fry Head of Education, North America jonathan.a.fry@accenture.com Lalit Ahluwalia North America Security Lead lalit.k.ahluwalia@accenture.com ABOUT ACCENTURE Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialised skills across more than 40 industries and all business functions – underpinned by the world’s largest delivery network – Accenture works at the intersection of business and technology to help clients improve their performance and create sustainable value for their stakeholders. With more than 435,000 people serving clients in more than 120 countries, Accenture drives innovation to improve the way the world works and lives. Visit us at www.accenture.com. Copyright © 2018 Accenture. All rights reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Learn more at https://www.accenture.com/digitalstudentau.