{
	"id": "ea9e4ed8-c570-4b56-b88f-eec7a623991a",
	"created_at": "2026-04-06T00:14:19.912156Z",
	"updated_at": "2026-04-10T03:23:51.944863Z",
	"deleted_at": null,
	"sha1_hash": "d76cdd35af3e9605cf7dc8f91966975ac7403319",
	"title": "Secure AI Build Resilience \u0026 Accelerate Value with Accenture",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 2021513,
	"plain_text": "Secure AI Build Resilience \u0026 Accelerate Value with Accenture\r\nArchived: 2026-04-05 14:22:34 UTC\r\nSecure AI and Agentic AI\r\nSecure AI and Agentic AI at scale to build business resilience and accelerate\r\ntransformation outcomes.\r\nThe challenge\r\nGenerative AI and Agentic AI are introducing new opportunities—and new risks. Prioritizing secure and agentic AI accelerates\r\nadoption and builds trust.\r\nGenerative AI and Agentic AI have introduced a new era of enterprise intelligence that organizations must\r\nembrace, or risk falling behind. However, it also elevates cybersecurity risks and introduces new vulnerabilities,\r\nwhich requires embedding security and trust by design into any AI program. And while most CEOs see\r\ncybersecurity as a major consideration for gen AI, only 6% feel they have a robust responsible AI foundation.\r\nAccenture can help close that gap and establish resiliency across your AI lifecycle.\r\nHow we help\r\nhttps://www.accenture.com/us-en/blogs/cyber-defense/evolving-danger-ransomware-extortion\r\nPage 1 of 8\n\nGovern AI usage\r\nImplement AI security governance frameworks, establish consistent policies and training for AI usage, and design\r\nand implement review and reporting processes.\r\nProtect AI environments\r\nSecure data, models and infrastructure with secure, customized AI environments and policy-driven controls to\r\nprotect data, prompts and responses.\r\nDefend against AI threats\r\nEnable monitoring, detection, and response and establish cybersecurity testing to defend against evolving AI\r\nthreats like deepfakes.\r\nAccelerate AI security\r\nAccenture's mySecurity platform uses gen AI-powered assets, built with partner technologies, to accelerate\r\ngovernance and security of AI at scale.\r\nTransform Security AI\r\nEmpower cybersecurity teams with a Gen AI-power cybersecurity operating models, enabled by capabilities like\r\nour SOC AI Assistant and create cyber-resilient AI systems through red team testing.\r\nhttps://www.accenture.com/us-en/blogs/cyber-defense/evolving-danger-ransomware-extortion\r\nPage 2 of 8\n\nAgentic AI\r\nAccenture's AI Refinery platform and a scalable agentic architecture can help organizations build and maintain\r\nsecure AI agents, ensuring they operate reliably and efficiently.\r\nReinvention in action\r\nEssentials for securing AI agents in the cloud\r\nAI agents are reshaping cloud workflows, but cybersecurity must evolve too. Accenture’s Zero Trust Model offers\r\na proactive blueprint to secure AI-powered environments.\r\nRead more\r\nOur leaders\r\nhttps://www.accenture.com/us-en/blogs/cyber-defense/evolving-danger-ransomware-extortion\r\nPage 3 of 8\n\nRex Thexton\r\nSenior Managing Director – Cybersecurity Chief Transformation Officer, Cyber Protection Services Lead\r\nhttps://www.accenture.com/us-en/blogs/cyber-defense/evolving-danger-ransomware-extortion\r\nPage 4 of 8\n\nDaniel Kendzior\r\nGlobal AI Reinvention Lead – Accenture Cybersecurity\r\nhttps://www.accenture.com/us-en/blogs/cyber-defense/evolving-danger-ransomware-extortion\r\nPage 5 of 8\n\nSean Kelly\r\nManaging Director, Global Secure AI Lead\r\nhttps://www.accenture.com/us-en/blogs/cyber-defense/evolving-danger-ransomware-extortion\r\nPage 6 of 8\n\nRyan Leininger\r\nManaging Director – Accenture Cybersecurity, Global AI Resilience Lead\r\nDamon McDougald\r\nGlobal Cyber Protection Domain Lead\r\nStart now\r\nhttps://www.accenture.com/us-en/blogs/cyber-defense/evolving-danger-ransomware-extortion\r\nPage 7 of 8\n\nWant to explore your next steps in securing AI at scale? Reach out today\r\nSource: https://www.accenture.com/us-en/blogs/cyber-defense/evolving-danger-ransomware-extortion\r\nhttps://www.accenture.com/us-en/blogs/cyber-defense/evolving-danger-ransomware-extortion\r\nPage 8 of 8",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://www.accenture.com/us-en/blogs/cyber-defense/evolving-danger-ransomware-extortion"
	],
	"report_names": [
		"evolving-danger-ransomware-extortion"
	],
	"threat_actors": [
		{
			"id": "d90307b6-14a9-4d0b-9156-89e453d6eb13",
			"created_at": "2022-10-25T16:07:23.773944Z",
			"updated_at": "2026-04-10T02:00:04.746188Z",
			"deleted_at": null,
			"main_name": "Lead",
			"aliases": [
				"Casper",
				"TG-3279"
			],
			"source_name": "ETDA:Lead",
			"tools": [
				"Agentemis",
				"BleDoor",
				"Cobalt Strike",
				"CobaltStrike",
				"RbDoor",
				"RibDoor",
				"Winnti",
				"cobeacon"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434459,
	"ts_updated_at": 1775791431,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/d76cdd35af3e9605cf7dc8f91966975ac7403319.pdf",
		"text": "https://archive.orkl.eu/d76cdd35af3e9605cf7dc8f91966975ac7403319.txt",
		"img": "https://archive.orkl.eu/d76cdd35af3e9605cf7dc8f91966975ac7403319.jpg"
	}
}