David Fitch
Whitefish, Montana, United States
4K followers
500+ connections
View mutual connections with David
David can introduce you to 10+ people at Accenture
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with David
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Experienced executive with multidisciplinary skill-set, focused on Information Security…
Activity
4K followers
-
David Fitch posted thisI’m thrilled to share that I’ve started a new chapter as the Americas Cybersecurity Lead at Accenture. It’s an incredible opportunity to help clients navigate today’s complex digital landscape — where trust, resilience, and innovation are more important than ever. The threat landscape is evolving rapidly, and I’m excited to work alongside this world-class team dedicated to making security not just a safeguard, but a strategic advantage. I continue to be grateful for the mentors, colleagues, and friends who have supported my journey, and who laid the foundation for so many others. In particular, I applaud C. Kelly Bissell, Paolo Dal Cin, and Harpreet Sidhu for their immense contributions to, and leadership of the #Accenture #Cybersecurity #family. Here’s to the challenges ahead — and the chance to help our clients build a more secure and confident digital future. Rex Thexton, Ryan LaSalle, Giovanni Cozzolino, Jacky Fox, Rich Mahler, Damon M., James Nunn-Price, Sadhana Joliet, Santha Subramoni, Matteo Masserini, Muthu Raja Sankar, Tyler Melton, Vikram Desai, Vanessa Fonseca, Thomas Schumacher, Jason Merante, Rick Driggers, Nick B., Andrew Winkelmann, Naynesh P., Cesar Villalta, CJ Cui, Nikhil S., Roee Schreiber, Ryan Sarazin, Kris Burkhardt, Kristine Osgoode, Jason Lewkowicz, Ryan Leininger, Noopur Shrivastava, Kandyce Tripp, Daniel Kendzior, Tom Patterson
-
David Fitch shared thisLooking forward to another year at RSA where we get to connect with our amazing clients, partners, and colleagues. There are a LOT of exciting trends this year; let's continue to co-create the future of Cybersecurity! #RSAC2026 AccentureDavid Fitch shared thisSuper excited about our presence at #RSAC2026, Accenture will take part in sessions focused on turning cybersecurity strategy into action. Topics include operational resilience, scaling innovation, and strengthening defenses across the enterprise. View our program https://lnkd.in/e7mft6Nq #Accenture #Cybersecurity Harpreet Sidhu, Giovanni Cozzolino, John Paitaridis, Jacky Fox, Damon M., Kandyce Tripp, Tony Harris, Jennifer Graham, Stephen Saia, Ysais M., Kevin Butterfield, Erin Harp, Pankaj Jain
-
David Fitch shared thisGreat summary of the recent SEC Cyber rules - worth a read, especially for business execs outside of Technology that have an interest in how this will further shape the discussion at the CEO and Board levels.David Fitch shared thisThe latest SEC rules should prompt CEOs to expand their executive team’s attention and accountability beyond the CISO and set in motion efforts to improve governance over the individual employee all the way up to the board. To prepare for the new disclosure requirements company boards, supported by their CEOs, should have a clear and well-documented approach about how the board directors will evolve their knowledge of cyber risk. This will become increasingly important as the board oversees management’s ability to address cyber risk stemming from strategic business decisions and use of emerging technologies, such as GenAI and quantum computing. Since the new rules require annual reporting on cyber risk management practices, leadership should ensure the company’s cyber risk governance process is well-documented, including which senior management committee will consider cyber risk and how issues will be escalated. Additionally, the company will need a repeatable risk decisioning framework that is aligned to policies and procedures and incorporates metrics that are informed by accurate and timely data to measure and monitor risk. Moreover, the new requirement to report an incident within four business days of determining that it’s material means that companies need clearly documented risk thresholds for the data and systems that support critical business process and value chains. These tolerance thresholds should start from the most critical aspects of the business value chain and run all the way to the people, processes and technologies that could be impacted from an incident. They should also include third parties that could cause material impacts if they are unavailable, or their integrity of systems or data is compromised. Once identified and documented in a system of record, these thresholds should be tested based on threat-informed scenarios to understand the level of resilience and whether additional risk mitigation or shifts in policies, procedures or the thresholds themselves are needed. Actions: 1. Up your game in cyber incident materiality 2. Expand the cybersecurity expertise of management and the board: 3. Continuously examine your risk landscape The risk landscape evolves quickly, driven by business strategies, rapid changes to evolve the digital core and the use of new technologies. It is critical that boards are encouraged to ask the right questions and have access to the right people to help advise them on effective responses. Often, the focus is squarely on the information security function, which may not be the area that is generating the risk. Robust board reporting can bring together cybersecurity and the business for better business outcomes. With such alignment, our research found some organizations are 18% more like to increase revenue growth and market share, improve customer satisfaction and trust and realize greater employee productivity. #cyber #riskmanagement #governance #boardsofdirectors
-
David Fitch shared this9% of organizations identified in Accenture's new research are leading the way when it comes to generating and sustaining value. Discover the five actions you can take to reinvent your #operations and enable growth for the whole enterprise. https://accntu.re/417nh5EReinventing Enterprise Operations to Create Value | AccentureReinventing Enterprise Operations to Create Value | Accenture
-
David Fitch shared thisOur survey found that only 19% of companies surveyed have successfully extracted intrinsic value from their #data. Learn more about how we help companies increase this value through the use of #CloudContinuum by reading our report. https://accntu.re/3VrysFf
-
David Fitch shared thisBig news announced today! Accenture's new MxDR platform, in partnership with Google Cloud, will continue to deliver cutting-edge capabilities to our clients! #CyberResilienceDavid Fitch shared thisAs enterprises rapidly transform, clients need #CyberResilience at the core of their #DigitalTransformation to grow their businesses with trust and confidence. I am thrilled to announce our partnership with Google Cloud to maximize cyber resilience thanks to: 1. Our new Accenture MxDR (Managed eXtended Detection & Response) service powered by Google Chronicle Security & security-specific #GenerativeAI to offer unparalleled scale, speed, and effectiveness 2. Next gen Crisis Management, Incident Response and Threat intelligence joint services by Mandiant (now part of Google Cloud) and Accenture Security, bringing together our expertise and capabilities Accenture was recently ranked number 1 in managed security services by revenue by Gartner and, as the largest MSS provider globally, I am so excited to help enterprises to become more Cyber Resilient leveraging our partnership with Google Cloud. It’s amazing to serve Lendlease and other global clients with the new Accenture MxDR service based on Google Cloud Chronicle for AI-powered cyber detection and response. Read more here: https://lnkd.in/e88-BsxV Sunil Potti Rex Thexton Robert Boyce Matteo Masserini Kevin Butterfield Scott Alfieri Paul Daugherty Ryan LaSalle Ganesh Devarajan Harpreet Sidhu James Nunn-Price Jacky Fox Cesar Villalta #accenture #accenturesecurity #cyber #security #ai #google #genaiAccenture and Google Cloud Expand Partnership to Accelerate Cybersecurity ResilienceAccenture and Google Cloud Expand Partnership to Accelerate Cybersecurity Resilience
-
David Fitch shared thisDavid Fitch shared thisI was really lucky to have our CEO Julie Sweet come and spend the day at T-Mobile. This is a great conversation with CEO Mike Sievert. I hope you enjoy it. https://welcome.us/Emerging Technologies with Accenture CEO Julie Sweet | Sidekicks Conversations Ep. 6 | T-MobileEmerging Technologies with Accenture CEO Julie Sweet | Sidekicks Conversations Ep. 6 | T-Mobile
-
David Fitch liked thisDavid Fitch liked thisAI is fundamentally transforming cybersecurity, impacting both how enterprises operate and how they are targeted by increasingly sophisticated threats. Accenture's partnership with XBOW enables our clients to continuously test and validate their systems for potential security gaps, ensuring they have the insights and guidance necessary to address vulnerabilities rapidly. As advanced AI accelerates the pace and severity of cyber-attacks, proactive defense measures are more critical than ever. With XBOW, we combine the scale and pattern recognition capabilities of advanced AI with the creativity and judgment of experienced human hackers, allowing us to test systems in ways that mirror real-world attack scenarios. By integrating XBOW into Accenture’s CyberAI solution, we are supporting organizations in moving from periodic assessments to ongoing, #AI-driven #cyber #resilience. Read more here: https://lnkd.in/g3NeR6Zc Adam Burden Alan Goff Ryan Leininger Rex Thexton Jason Lewkowicz Charles Hosner David Fitch Giovanni Cozzolino John Paitaridis Daisuke Fujii T. Ryan WhelanAccenture Invests in XBOW to Advance Continuous Offensive Security Testing and Exposure ManagementAccenture Invests in XBOW to Advance Continuous Offensive Security Testing and Exposure Management
-
David Fitch liked thisDavid Fitch liked thisHow to work on a new Venture? Rule of Three: 1) Dreaming it with the Heart and Shaping it with the Mind 2) Discussing it with great people you know in your Network 3) Having fun (Samuel Linares) Btw I had great fun last week in…guess where! :)
-
David Fitch liked thisDavid Fitch liked thisAt Accenture, we are deeply committed to shaping the future of AI-powered cybersecurity. Last month, in collaboration with Anthropic, we announced the launch of Cyber.AI — our agentic security platform powered by Claude that helps organizations move from human-speed response to continuous, AI-driven cybersecurity. What makes it different: Cyber.AI isn't a single tool. It's a curated library of AI agents that span identity, SOC, cloud, GRC, and more — all reasoning over a shared security knowledge and an ontology built on the breadth of Accenture delivery expertise. And critically, it's the platform on which we can build and customize powerful agentic capabilities to meet the unique needs of each client. Working directly on Cyber.AI, what excites me most is the fundamental shift this enables as we partner with our clients. The ability to co-create their agentic security future with them. I'm looking forward to what we continue to build and bring to our clients. If you're thinking about what agentic security looks like for your organization, I'd love to connect! Learn more: https://lnkd.in/gym5Tx2V Rex Thexton, Damon M., Sadhana Joliet, Nick Rasche, Greg Callegari, Ephrem Yemru, Diane Bartley, Andrew WinkelmannAccenture and Anthropic Team to Help Organizations Secure, Scale AI-Driven Cybersecurity OperationsAccenture and Anthropic Team to Help Organizations Secure, Scale AI-Driven Cybersecurity Operations
-
David Fitch liked thisDavid Fitch liked thisI had a great conversation with Anna Delaney from Information Security Media Group (ISMG) at RSAC 2026 Conference. We talked about why traditional identity and access management systems can’t keep up with the speed and scale of agentic environments. AI agents create a different kind of exposure than most security architectures were designed to handle. Agents aren't quite human and aren't quite machine-to-machine. When they stumble on data they shouldn’t, they aren’t going to report it. They’re going to use it. At the same time, bad actors aren’t constrained by the identity and access management capabilities we’ve spent years building. They’re running agents at scale, finding vulnerabilities and firing zero-days at speed at enterprise infrastructure before organizations even realize it. The world of agentic AI is shifting so fast, and security leaders can’t stay on the sidelines. It’s time to get your identity strategy right for agents the same way you have for humans. Define your strategy before you select your tooling. Strengthen your digital core. And commit to a fail-fast approach. Remember, this is a speed game, and the cost of moving slowly isn’t theoretical anymore. Watch the full video for more insights: https://lnkd.in/gKtb5PsA #AgenticAI #IdentityAndAccessManagement #Cybersecurity #CISO
-
David Fitch liked thisDavid Fitch liked thisThank you to Accenture for co-hosting our CrowdStrike & Accenture Happy Hour last night at the Peacock Grill during the Retail & Hospitality ISAC in Austin TX. Great evening of relaxed conversation and premium refreshments as we discussed the evolving security landscape of the retail and hospitality sectors. T. Ryan Whelan Mark Amato Sid Srivastava Rex Thexton Tony Harris Eric Stalfort David Fitch Ryan Sarazin Jillian Gillette Carol Mallia Chad Whitney Mark Pickett Robert Hagopian Gregg Evering Madeline Mikesh Anu Vijh Shweta Amitabh Singh Daniel Danielli Amanda Adams David Rees Erin Harp Joshua S. Vivian B. Daniel Bernard
-
David Fitch liked thisDavid Fitch liked thisLots of good #quantum conversations for #AccentureSecurity and me at #RSAC this year, with my main theme highlighting our clients moving from planning to action this year in their transition to #PQC. The quantum security technology and standards ecosystems are rising quickly to match the fast approaching threat, making the adoption of PQC a reality around the world. The ecosystem of quantum #security experts at RSAC was high level, including my presentations with Michele Mosca , John Buselli , Blair Canavan , Chris Hickman , Dave Krauthamer , Cara Alexander , Colin Soutar, IDQ , Palo Alto Networks and more! Looking up into orbit, I was also pleased to hold substantive discussions on developing cybersecurity for the new space economy. The universe of emerging technologies is ever expanding! 2026 is indeed shaping up as a year of action! Special congratulations to Jen Easterly who is already putting her stamp (with equal doses of substance and style) on having RSAC continue to lead the way forward every spring!
-
David Fitch liked thisDavid Fitch liked thisI wasn't at RSAC Conference or #GTC this year. But I've tracked this industry for two decades, and the back-to-back signal from NVIDIA GTC, RSAC, and today's Anthropic announcement was the sharpest I've seen. The industry isn't debating whether agentic AI changes security — it's shipping product to prove it. The agentic SOC went from concept to product. CrowdStrike launched Charlotte AI AgentWorks with partners including Accenture Security, Amazon Web Services (AWS), Anthropic, NVIDIA, and OpenAI. Cisco shipped seven agentic SOC capabilities through Splunk. Microsoft delivered Agent 365 across Defender, Entra, and Sentinel. Palo Alto Networks launched Prisma AIRS 3.0 with an agentic identity provider and MCP gateway. #MxDR hit machine speed. Falcon Complete now deploys AI agents for automated breach response, with IBM ATOM integrated for cross-environment containment. Google showcased agentic automation in Security Operations alongside M-Trends 2026 and the completed $32B Wiz acquisition. George Kurtz's keynote: 27-second adversary breakout times. Providers that can't match that speed are selling a legacy service. AI security shipped at platform launch. At GTC, NVIDIA launched NemoClaw and OpenShell — open-source frameworks for securing autonomous AI agents with built-in guardrails. Five vendors shipped governance for NVIDIA's agentic stack simultaneously. At RSAC, Prisma AIRS 3.0 shipped agent red teaming and runtime protection. CrowdStrike added AI Runtime Protection and Shadow AI Discovery. Geordie AI won the Innovation Sandbox for real-time AI agent governance. AI-powered offensive security entered a new era. Today, Anthropic launched Project Glasswing — deploying its #Mythos Preview model for defensive security work with 12 partners including Amazon, Apple, Cisco, CrowdStrike, Google, Microsoft, NVIDIA, and Palo Alto Networks. Mythos has already identified thousands of zeroday vulnerabilities, many one to two decades old! CrowdStrike's Global Threat Report showed AI-enabled adversary operations up 89% YoY. The offensive-defensive AI arms race just accelerated. Exposure management absorbed agent risk. CrowdStrike expanded AI Agent Discovery across Copilot, Salesforce Agentforce, and ChatGPT Enterprise. Every AI agent creates permissions and tool calls SOC teams must triage — most can't yet distinguish agent from human in logs. Consolidation accelerated. Google closed $32B for Wiz. Palo Alto completed $25B for CyberArk. CISOs want platforms, not point solutions. Resilience was the framework underneath every conversation. The measure of security maturity is now detection speed, containment effectiveness, and recovery completeness. #Cybersecurity #RSAC2026 #SOC #CyberResilience #ThreatIntelligence Harpreet Sidhu, David Fitch, Rex Thexton, Jason Lewkowicz, Matteo Masserini, Muthu Raja Sankar, Tyler Melton, Vikram Desai, Vanessa Fonseca, Jason Merante, Rick Driggers, Andrew Winkelmann, Cesar Villalta, CJ Cui, Ryan Sarazin
-
David Fitch liked thisDavid Fitch liked thisBack to work after an impactful week at #RSAC2026 in #SanFrancisco. #RSA is truly remarkable - the conference, the city, and the incredible opportunities for discovery, networking, and learning. Key discussions around the evolving threat landscape, geopolitical risk, and the growing role of AI in cyber defense highlighted the rapid pace of change in cybersecurity and the critical need for continuous reinvention. It was an honor to connect with clients, and partners showcasing Accenture’s dedication to helping organizations stay secure in today’s complex environment. A special thank you to our exceptional partners— #PaloAltoNetworks, #CrowdStrike, #Google, #Wiz, #Microsoft, #AWS, #ServiceNow, #Fortinet, #Cloudflare, #Anthropic, #SailPoint, #Okta, #Zscaler, #Cohesity, #Illumio, #Snyk, #Cyera and others—for driving innovation and strengthening cybersecurity resilience. To all who joined us at Accenture #InnovationDay, thank you for your support and inspiration in advancing security innovation globally. #RSA, #AccentureCybersecurity, #Alliances Harpreet Sidhu, Rex Thexton, Mariana Perez, Giovanni Cozzolino, Jacky Fox, Paul Kunas, Rouz Hashemi, Jennifer Graham, Alison Geib, Tony Harris, Ysais M., Andrew Winkelmann, Kevin Butterfield, Heather Sundheim, Scott Alfieri, Damon M., Nick Baird, Ryan Sarazin, Erin Harp, Stephen Saia, Shweta Amitabh Singh, Sommer Newman, Kamilla Giedrojc, Angie Slee, Anu Vijh, Terri Z., Amanda Adams l, Daniel Danielli, Mariana Perez, Joseph Hegarty
Experience
Education
-
University of Chicago
-
-
Activities and Societies: University of Chicago Consulting Club, CS Startup Club
-
-
-
Licenses & Certifications
-
Certified Information Systems Security Professional (CISSP)
ISC2
Credential ID 434434
Languages
-
English
Native or bilingual proficiency
-
Spanish
Elementary proficiency
Organizations
-
ISACA
-
-
ISC2
-
View David’s full profile
-
See who you know in common
-
Get introduced
-
Contact David directly
Other similar profiles
Explore more posts
-
Whiz Works
2K followers
Identity and Access Management (IAM) is a key guardrail for secure access. This guide explains core IAM components, how they protect resources, and why they are foundational to Zero Trust security strategies. Read the breakdown: http://oal.lu/I9q5t #IAM #ZeroTrust #Security
3
-
Chickasaw Telecom, Inc.
941 followers
Identity and Access Management (IAM) is a key guardrail for secure access. This guide explains core IAM components, how they protect resources, and why they are foundational to Zero Trust security strategies. Read the breakdown: http://oal.lu/nq0Lr #IAM #ZeroTrust #Security
-
Jordan Barth 🏳️🌈
KPMG US • 3K followers
I’m very excited to announce today KPMG’s new, enhanced on-call retainer model specifically designed to meet the on-demand resilience needs of our clients! We’ve heard loud and clear from our industrial manufacturers and OEMs about how they need new approaches to cyber response and resilience. Our new, enhanced response and resilience agreement includes: * Prepaid incident response hours * Built-in annual IT resilience assessment (!) * Built-in annual breach resilience and compromise assessment (!!) * Quarterly check-ins for threat intelligence sharing Read more about the challenges for manufacturers and how we’re working to partner with our clients to build resilience. https://lnkd.in/eqc7D2Tc
46
-
Erin Cahill
PwC • 2K followers
Firewall environments are getting more complex—and manual rule reviews aren’t keeping pace. PwC is modernizing firewall governance with an AI-driven approach that helps teams analyze large rule sets faster, surface risks more clearly, and focus remediation where it matters most. PwC’s Firewall Rule Analyzer brings analytics and rule intelligence together to turn complex policies into actionable security insight. The result is a more consistent, scalable way to govern firewall policies across environments—supporting stronger decision-making without sacrificing control or transparency. Read more 🔗 https://pwc.to/4sBwGR1
3
-
CYBER DEFENSE MAROC
1K followers
Not all alerts are created equal. Master alert triage by focusing on context: asset criticality, attack vector, and threat intelligence. Prioritize what threatens your crown jewels first, then tackle the noise. Efficient triage = faster response, less burnout. Your SOC’s secret weapon? Smarter, not harder. 🔍 #Cybersecurity #AlertTriage
-
LogZilla Corporation
2K followers
PCI DSS. HIPAA. NIST 800-53. GDPR. SOX. Different frameworks. Different requirements. The same underlying log data. LogZilla AI Compliance maps log events across multiple frameworks at once. One analysis. Five frameworks. No manual control mapping. Audit preparation becomes structured instead of reactive. Learn how AI-driven compliance reporting simplifies multi-framework audits: https://lnkd.in/gD2G-S6J #Compliance #GRC #NIST #GDPR #SOX
5
1 Comment -
Jason Basye
Concertium • 6K followers
CMMC Compliance Deadline: Are You Ready for October 1st? The DoD’s latest update to 48 CFR Part 204.75 makes it official: CMMC certification is mandatory for contractors starting October 1, 2025. If your organization handles Federal Contract Information (FCI) or Controlled Unclassified Information (CUI), you must be certified to bid, renew, or extend DoD contracts. 🎯 Don’t risk disqualification. As a CMMC Registered Practitioner Organization (RPO), Concertium helps defense contractors like you: * Assess and close compliance gaps * Build cybersecurity policies and procedures * Train your team and prepare for certification ⏳ Time is running out. Let’s get you ready before Phase 1 begins. 📅 Book your free consultation today: concertium.com/cmmc-rpo
10
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentAdd new skills with these courses
-
12m
A Standalone Project: Create a Simple Vulnerability Scanning Tool That Scans for Common Vulnerabilities
-
1h 47m
AI-Driven Threat Protection with Microsoft Defender for Cloud
-
13m
A Standalone Project: Build a Program to Encrypt and Decrypt Text Messages Using an Encryption Algorithm to Protect Data from Unauthorized Access