XML 57 R28.htm IDEA: XBRL DOCUMENT v3.25.2
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Aug. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
Safeguarding data and systems is one of our most important responsibilities in building and maintaining trust, not only with our people but also with our clients and other stakeholders. Our cybersecurity risk management program is integrated into our overall enterprise risk management system and is supported by controls, policies and processes implemented across the enterprise and is designed to protect our network/technical infrastructure and the data of Accenture, our clients and our people. Our internal cybersecurity team collaborates closely with our information technology team and Accenture Security, a leading provider of end-to-end cybersecurity services, including strategy, protection, resilience and industry-specific cyber services, to continually innovate security solutions intended to address the evolving threat landscape.
Our security framework leverages a hybrid set of internationally recognized standards, including but not limited to, ISO 27001/27701, NIST Cyber Security Framework, CSA Security Trust and Assurance Registry, and CIS Critical Security Controls. We regularly measure our security posture and resilience through risk assessments, penetration testing and external validation conducted by third-party assessors and auditors. Threat intelligence sources, including those provided by Accenture Security, are also used to inform our security strategy, understand the threat landscape, and enable security risk and procedures to be integrated into the business. Our key strategic security programs include secure integration of acquisitions and supplier cyber risk management. We utilize systems and processes designed to oversee, identify, and reduce the potential impact of cybersecurity incidents at third-party vendors, service providers or clients.
Our infrastructure vulnerability scanning and configuration compliance approach includes real-time threat detection and monitoring of threats via our security information and event management and endpoint detection and response tools to respond to security incidents at speed. We monitor for secure configuration of servers, network devices, containers and other cloud services, evaluate risks in new programs, and regularly review and strengthen our security controls.
Protecting client data is a top business priority supported by our global client data protection (CDP) program. A CDP plan is developed for our clients and is designed to provide end-to-end security risk management covering physical, application, infrastructure, and data security. The CDP program also arms our project teams with tools and controls that enable them to identify and mitigate security risks over the lifecycle of a client project. Accenture leadership reviews and monitors CDP monthly metrics, which are intended to provide oversight and accountability.
All Accenture people are required to complete annual core information security and data privacy training, delivered in multiple courses throughout the year, to stay up-to-date on security practices and threats. In addition, our people in data-sensitive roles are provided specialized, targeted security training to increase knowledge about role-specific threats, concepts and practices. These interactive learning programs are focused on strengthening foundational knowledge and responding to emerging threats. Agile and flexible, our training program has garnered industry recognition for its innovative approach and effectiveness.
In the event of a cybersecurity incident, we have robust playbooks to guide our incident procedures. These procedures provide a standardized framework for responding to cybersecurity incidents and include taking action to limit and contain the spread of the incident within our environment, analyzing whether and the extent to which any data may have been compromised and conducting forensic analysis to determine severity. We also have internal and external reporting and communication plans that address reporting findings and keeping senior management and other key stakeholders informed and involved as appropriate. Once an incident is resolved, a comprehensive post-incident review process is conducted.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] Our cybersecurity risk management program is integrated into our overall enterprise risk management system and is supported by controls, policies and processes implemented across the enterprise and is designed to protect our network/technical infrastructure and the data of Accenture, our clients and our people. Our internal cybersecurity team collaborates closely with our information technology team and Accenture Security, a leading provider of end-to-end cybersecurity services, including strategy, protection, resilience and industry-specific cyber services, to continually innovate security solutions intended to address the evolving threat landscape.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]
Our enterprise risk management program is an annual and ongoing process designed to identify, assess and manage Accenture’s risk exposures over multiple time horizons. Our enterprise risk management program and disclosure controls and procedures are designed to appropriately escalate key risks to the Board of Directors, as well as to analyze potential risks for disclosure. As part of our Board of Directors’ role in overseeing the Company’s enterprise risk management program, the Board devotes time and attention to cybersecurity and data privacy-related risks, with the Audit Committee of the Board of Directors responsible for overseeing information technology risk exposures, including cybersecurity, data privacy and data security.
The Audit Committee receives reports on cybersecurity and data privacy matters and related risk exposures from management, including our chief information security officer (“CISO”), at least twice a year and more frequently as applicable. In addition, the Audit Committee’s quarterly enterprise risk management updates include developments regarding IT security and data protection. Recent topics included integrated third-party risk management, the evolving AI security governance and innovation landscape and client data protection. The Audit Committee regularly updates the Board on such matters and the Board also periodically receives reports from management directly. We have protocols by which cybersecurity incidents that meet established reporting thresholds are escalated within the company and, where appropriate, reported promptly to the Board.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] As part of our Board of Directors’ role in overseeing the Company’s enterprise risk management program, the Board devotes time and attention to cybersecurity and data privacy-related risks, with the Audit Committee of the Board of Directors responsible for overseeing information technology risk exposures, including cybersecurity, data privacy and data security.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Our enterprise risk management program is an annual and ongoing process designed to identify, assess and manage Accenture’s risk exposures over multiple time horizons. Our enterprise risk management program and disclosure controls and procedures are designed to appropriately escalate key risks to the Board of Directors, as well as to analyze potential risks for disclosureThe Audit Committee receives reports on cybersecurity and data privacy matters and related risk exposures from management, including our chief information security officer (“CISO”), at least twice a year and more frequently as applicable. In addition, the Audit Committee’s quarterly enterprise risk management updates include developments regarding IT security and data protection. Recent topics included integrated third-party risk management, the evolving AI security governance and innovation landscape and client data protection. The Audit Committee regularly updates the Board on such matters and the Board also periodically receives reports from management directly. We have protocols by which cybersecurity incidents that meet established reporting thresholds are escalated within the company and, where appropriate, reported promptly to the Board.
Cybersecurity Risk Role of Management [Text Block]
Our information security team maintains an extensive governance network, including formal relationships with other organizations within Accenture through our Situation and Action Committee, which includes representatives from our markets and services and the legal, information technology, corporate services and sustainability, data privacy and business resilience services teams. In addition, our cyber incident response efforts are overseen by a cross-functional leadership team including our CISO, our General Counsel and our Chief Marketing Officer.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Our CISO leads all aspects of Accenture’s global cybersecurity program, including security operations, client data protection, cyber risk reduction strategies, incident response, cybersecurity integration of acquisitions and our industry-leading behavioral change program.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our CISO joined Accenture in 1995. Prior to being appointed CISO in 2020, he helped create Accenture’s information security capability and led the implementation of information security technology. Previously, he managed large technology transformations for Accenture and for clients in the United States, Japan and Australia. Our CISO reports to our Chief Operating Officer and is supported by a team of over 1,000 people with expertise in technical architecture and security operations; governance, risk and compliance; client data protection; behavioral change; and cyber incident response, many of whom hold cybersecurity certifications and possess deep technical knowledge and experience.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block]
Our information security team maintains an extensive governance network, including formal relationships with other organizations within Accenture through our Situation and Action Committee, which includes representatives from our markets and services and the legal, information technology, corporate services and sustainability, data privacy and business resilience services teams. In addition, our cyber incident response efforts are overseen by a cross-functional leadership team including our CISO, our General Counsel and our Chief Marketing Officer.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true