Executive Customer Council 2017

Size: px
Start display at page:

Download "Executive Customer Council 2017"

Transcription

1 Executive Customer Council und 31. Mai 2017 Würzburg Fujitsu Security Technology Office EMEIA

2 Security in the Age of Digital Transformation from Edge to Core Fujitsu Security Technology Office EMEIA

3 We recognize the trends of the times 50Bill. Connected Devices 2020 * Ca. 7 Smart Objects owns every human around the world +44ZB Generated Data p.a. in 2020 $11Bill. Potential impact: $11 Billion/ in 2025 Quelle: Fujitsu Technology & Services Vision 2015 Quelle: IDC & EMC The Digital Universe of Opportunities // April 2014 Quelle: McKinsey Global Institute The Internet of Things: Mapping the Value Beyond the Hype // Juni Fujitsu Security Technology Office EMEIA

4 Digital Transformation & IoT Urbanization Shortened Development Times Industrial Internet Smart Cities Glocalization Acceleration 4th Industrial Revolution Globalization Sharply Rising Volatility Smart Sensing Big/ Smart Data User Centric Mobility Cloud Fujitsu Security Technology Office EMEIA

5 There will be no Industrial IoT without Security EU Commissioner Günther Oettinger (September 21, IIC Quarterly Meeting) Poor state of security on connected devices enables large scale attacks (e.g. Dyn Attack October 2016) Existing threats utilize consumer devices and legacy industrial devices in the IoT for large scale attacks Industry will be a permanent target High leverage due to economic and safety impact Every vertical is affected, each in a specific way Awareness & Obligation IIoT competitiveness is a vital national interest to every country Imperative requirement of security-by-design in all IoT activities Fujitsu as a Strong Digital Transformation Leader Fujitsu leverages its expertise in Cyber Security within a network of excellent partners providing effective protection of our customers in their IoT applications IoT security is a key enabler of Digital business Fujitsu Security Technology Office EMEIA

6 Fujitsu among Global Players in Industrial IoT Industrial Internet Consortium US based Industrial Value Chain Initiative Japan based 200+ members Plattform Industrie 4.0 Germany based ~200 members Fujitsu Security Technology Office EMEIA

7 The digital disruption in waves... Online-Trading 1. wave Internet Interconnection, online 2. wave Mobiles Internet Real time, platform independent 4. wave KI und Robotik Knowledge and automation 3. wave Internet of Things Convergences of the physical and digital world Hyperconnected World Massive influence to all of the industries Fujitsu Security Technology Office EMEIA

8 By New Legislation will drive Security Requirements Network & Information Security Directive (NIS) & General Data Protection Regulation (DPR) New Legislation Main Customer Tasks Prepare Now! Network and Information Security Directive (NIS) Harmonized requirements on each Member State s legislation Each member state must pass a national law based on the directive by 2018 General Data Protection Regulation (GDPR) Regulation is valid as is in every country from 2018 on Countries may add national extensions Open issue: is relevant law that of consumer s or provider s jurisdiction? Information Systems and Data Governance Evidence of policies and effective implementation, e.g. Security Audit Data Protection Impact Assessments Data Protection Officer to be implemented Reporting Records of Processing Specific reporting of security incidents / data breaches without undue delay Severe Fines GDPR: 20M or 4% of annual turnover Governance, Risk and Compliance Security Consulting, e.g. Continuity & Resilience Data Protection, e.g. IAM, encryption MSS, e.g. vulnerability management, perimeter protection, content inspection Assessments & Audits Security Audits Privacy Impact Assessment Detect and Response Cyber Threat Intelligence SIEM enhanced by reporting according to NIS/GDPR Fujitsu Security Technology Office EMEIA

9 Security and IoT impact every Vertical Initial Situation Regulated, e.g. NIS (EU), National Health Transportation IT and Communications Food Water Energy (Electricity, Oil&Gas) Finance & Insurance Non-Regulated (EMEIA) Others (tbd) Retail Logistics Smart Cities Manufacturing Security today IoT future Digital Service Providers Fujitsu Security Technology Office EMEIA

10 Security in Connected Services Future Situation Safety Reliability Vertical Security 1 0,8 0,6 0,4 0,2 0 Privacy Resilience Customer Security Characteristics Regulated, e.g. NIS (EU), National Health Transportation IT and Communications Food Water Energy (Electricity, Oil&Gas) Finance & Insurance Non-Regulated (EMEIA) Others (tbd) Retail Logistics Smart Cities Manufacturing Connected Services Security for IoT, AI and Cloud based Services in Edge and Core Fujitsu Security Technology Office EMEIA

11 Security is a Quality KPI for Connected Services Security KPI per Vertical Requirements differ by vertical Specifically weighted functional requirements Ensure Security quality according to vertical obligations Quality of Security will be a digital supply chain KPI Industrial IoT Security is a continuum of system characteristics OT Safety (IEC 62443*) meets IT Security (ISO 27000*) Privacy (GDPR*), Resilience (ISO*, IEC*), Reliability (NIS*) are quality features in both OT and IT Determine and ensure quality measures per vertical, e.g. audit, certification *) Example Safety Reliability 0,8 0,6 0,4 0,2 Vertical Security 1 0 Customer Resilience Privacy Increasing Quality by Security KPI Fujitsu Security Technology Office EMEIA

12 Manufacturing Energy Water Food ICT Transportation Health Finance & Insurance Scope of Plattform Industrie 4.0 Model for Next-Gen Value Chain based on IIoT Smart Cities Retail Logistics Others (tbd) Frontrunner Manufacturing drives other Verticals Manufacturing is a rapidly growing IIoT(M2M) market and a thought leader for other verticals. Scope of Fujitsu Security Holistic Security in IIoT M2M needs obligatory security-by-design Fujitsu collaborates in IIC, Plattform Industrie 4.0, IVI, etc. These bodies see: Manufacturing as learning ground for other verticals Scope of Industrial Internet Consortium (IIC) Cross Domain Interoperability in IIoT Fujitsu Security Technology Office EMEIA

13 Manufacturing Energy Water Food ICT Transportation Health Finance & Insurance Scope of Plattform Industrie 4.0 Model for Next-Gen Value Chain based on IIoT Smart Cities Retail Logistics Others (tbd) Transfer to other Verticals We see nascent demand in other verticals, e.g. utilities Scope of Fujitsu Security Holistic Security in IIoT Fujitsu can initially address this with existing portfolio Fujitsu will develop specific IIoT security offerings for these verticals Partners and co-creation customers play a vital role Vertical intimacy as key for growth Scope of Industrial Internet Consortium (IIC) Cross Domain Interoperability in IIoT Fujitsu Security Technology Office EMEIA

14 Architecture & Technology Defining Connected Security Services Fujitsu Security Technology Office EMEIA

15 Principle Architecture in the new Ecosystem Edge The place where vertical IoT begins or ends is called the edge. E.g. ICS components, robots, PLCs, sensors, 3D-Print, IoT gateways, MES, etc. will live here. Core The Core will connect, Core manage, process, analyze and control all IIoT devices Fujitsu Security Technology Office EMEIA

16 Security in Edge and Core Ecosystems Edge Security Secure Code Identity and Access Management PKI, HSM, Secure Communications Encryption SIEM Managed Things Security AI supported Cyber Security, Anomaly Analysis Edge Core Core Security Standards and regulations: e.g. ISO 27001, ISO 20000, NIS, Data Protection (e.g. GDPR), legal Security requirements Example Security Services: Data Classification, Privacy Impact Assessments Secure Code, Security Review Identity and Access Management, PKI, HSM, Secure Communications, Firewall, IDS, IPS, Encryption, SOC, SIEM, Business and Service Continuity Security Analytics and AI AI supported Cyber Security, Anomaly Analysis, Threat Intelligence Core Management Services IoT & Asset Management, IT Service Management Interplay of Edge and Core is essential! Fujitsu Security Technology Office EMEIA

17 Analytics and AI drive IIoT Security AI supported (I)IoT and Machine/Components Trusted Identity Anomaly Analysis Connected and Autonomous (I)IoT Devices Cyber Security Fundamental Security Resilience (e.g. DDoS) Edge Core Security Analytics and AI AI based IAM for (I)IoT in Edge Edge/Core support by Threat Intelligence Anomaly analysis securing communications AI based policy and process management Privacy and compliance rules supported by AI Core Security utilizing AI Cloud Security supported by AI Application of AI for cloud service security AI supported Core Management Services IoT & Asset Management IT Service Management Threat management (DDoS, etc) Resilience control Security/Privacy Management Interplay of Edge and Core is essential! Fujitsu Security Technology Office EMEIA

18 Fundamental Building Blocks Dynamic Ecosystem requires permanent Sensing and Analysis Fujitsu Security Technology Office EMEIA

19 Trust in the Industrial IoT Source: IIC Industrial Internet Security Framework Trust evolves dynamically over time Dynamic Trust must be continuously reestablished Analytics and AI enable prediction and learning Trust results from interaction of hardware, software and services Updates and predictive maintenance may change properties and Trust Future standards of trust under development Trust services to be delivered to the Edge from the Core e.g. Policy & Risk Management, Data Classification, Federations, PKIs, CAs, IAM, SIEM IoT Management will be essential part of asset and security management Fujitsu Security Technology Office EMEIA

20 Automated Trust in Industrial IoT Trust relationships are required in systems New Trust paradigm E.g. roles in M2M: Operator, Integrator, Component Root of Trust (RoT) is the foundation Hardware, software, people and organizational processes used to establish confidence in the system. Confidence in the authenticity of the devices credentials Strength of RoT determines level of trust attainable by device Trust Services essential for Security in IoT RoT based, policy driven and AI enabled Standardized Trust Levels emerging to measure Trust Fujitsu Security Technology Office EMEIA

21 Secure Communications IAM for Things Authentication Only securely and trustworthy identified things may connect from Edge to the Core Temporary authentication due to dynamic change of Trust Identity of Things (~50bn by 2020) Things will stay and no end of life will be clear Fundamental IoT Services: Intelligent registration and identification of Things End2End management of Communication 5G security model provider dependent Lack of transparency for customers Industrial Quality of Service business critical requirement for IIoT Handling of access for insecure things by providers in consumer environments necessary AI automates mass identification and authentication of things Source: Fujitsu Security Technology Office EMEIA

22 Fujitsu EMEIA Security Offerings Firewalls, NGFW and IDS/IPS Endpoint protection Advanced Threat Protection Content Web, and DLP Security Consultancy Identity & Access Mgmt Continuity and Resilience Consultancy PalmSecure and Biometrics IDaaS SIEM and SIEMaaS Vulnerability Management Cyber Threat Intelligence Technical Design and Integration Cyber Threat Response Security Assessments inc. GDPR mpollux Managed Security Services Consultancy and Advisory Products 350+ Security professionals today Security Operations Centres operating to highest National Government security levels R&D Capability developing/delivering Fujitsu security products, e.g. PalmSecure and IdAM Operating across Public and Private sector, and National Defence Businesses Highest Strategic Technology Partner Accreditations 40+ Year History in design, delivery and Integration of large scale cyber security services Fujitsu Security Technology Office EMEIA

23 Fujitsu Security Technology Office EMEIA

24 Information Security Management System (ISMS) EMEIA Operating Model EMEIA Governance Framework EMEIA Security Governance Model Information Security Implementation Creation of EMEIA Security Framework Definition EMEIA Security Audit Strategy Launch of the EMEIA wide ISMS Awareness Training Alignment of basic Security Processes (Incident, Risk, Comms) Planning and performance of Security Audits Management Review (ECSF = EMEIA Cyber Security Forum) Fujitsu Security Technology Office EMEIA

25 EMEIA Security & Compliance Trainings FIOLA = Fujitsu International Online Learning Application Fujitsu Security Technology Office EMEIA

26 PalmSecure Fujitsu Security Technology Office EMEIA

27 Our own Intelligence gathering Fujitsu Security Technology Office EMEIA

28 The new attack surfaces: Sensors / Actors Gateway - Cloud Intranet Internet Extranet Cloud Identity With which sensor am I talking? Screen contents can be read Webcam and microphone (internal/external) can be activated and controlled (room surveillance possible) External HDDs, USBs can install viruses and backdoors unnoticed Remote access Transfer and control of the systems by remote access Access to critical data Administrations can access sensible data unnoticed Communication (Internet/LAN/WAN) Backdoors to active / passive network components Data is intercepted Outgoing data can be intercepted, read and manipulated Data Integrity? Personal information? Main memory saves data unencrypted BIOS, OS, driver, application can contain backdoors Mouse and keyboard input can be read Internal data media (HDD, SSD, DVD) are readable despite encryption Physical access to systems through insufficiently secured access processes Hacker attacks hacker attacks are facilitated by monitoring that is not end-to-end; logs can be falsified Gateway Identity? Security? Maintenance? Fujitsu Security Technology Office EMEIA

29 Everything is a connected endpoint even my best friend The warning was issued by the Federal Network Agency (Bundesnetzagentur), which oversees telecommunications. Researchers say hackers can use an unsecure bluetooth device embedded in the toy to listen and talk to the child playing with it. But the UK Toy Retailers Association said Cayla "offers no special risk". Cayla was offered for 2 years Hello Barbie is still legal (Big Brother Award 2015) Fujitsu Security Technology Office EMEIA

30 MetaArc: Digital Enablement Platform Multi Cloud Integration, Managed Services Fujitsu RunMyProcess Fujitsu Cloud Services Mgt Hybrid IT Managed Services Digital Initiatives: Platform Service Mobility Big Data IOT AI Fujitsu Cloud Service K5 (IaaS and PaaS) PRIMEFLEX for Cloud (Private cloud product) Fujitsu Group Clouds Other Clouds Digital Business Platform MetaArc A set of technologies, cloud solutions, Professional Services, multi-cloud integration, multi-cloud and Hybrid IT Managed Services and an ecosystem of partners. Security Global WAN Fujitsu Security Technology Office EMEIA

31 Definition of Industrial IoT Dr. Jacques Durand, Director R&D Fujitsu America, Member of Steering Committee IIC A user-centric definition IoT is a value chain for both businesses and people. IoT starts with connecting objects from the real world - buildings, vehicles, products, etc. between themselves and to computers at a significantly larger scale than done in the past Useless without additional intelligence provided: a new level of analytics and automated decision making is now possible based on the unprecedented amount of data generated from this connectivity. Benefits More efficient, insightful and productive industrial operations, Better and personalized responses to people s needs and interests. Challenges of gathering more data and of more reliance on automated systems Users will expect an IoT deployment to tell a lot more about how it ensures privacy, transparency, safety, security, reliability, resilience, than other conventional ICT systems. Source: (2015) Fujitsu Security Technology Office EMEIA

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

Innovation policy for Industry 4.0

Innovation policy for Industry 4.0 Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda

More information

Run the business. Not the risks.

Run the business. Not the risks. Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.

More information

Gaining Business Value from IoT

Gaining Business Value from IoT Gaining Business Value from IoT Digital Aviation Conference 2018 Thomas Bengs GM, Head of Biometrics EMEIA Enterprise Cybersecurity EMEIA Human Centric Innovation Co-creation for Success 0 2018 FUJITSU

More information

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security LTI Security Intelligent & integrated Approach to Cyber & Digital Security Overview As businesses are expanding globally into new territories, propelled and steered by digital disruption and technological

More information

GDPR Update and ENISA guidelines

GDPR Update and ENISA guidelines GDPR Update and ENISA guidelines 2016 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how to ensure

More information

Disruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise

Disruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise Disruptive Technologies Legal and Regulatory Aspects 16 May 2017 Investment Summit - Swiss Gobal Enterprise Legal and Regulatory Framework in Switzerland Legal and regulatory Framework: no laws or provisions

More information

Data Management and Security in the GDPR Era

Data Management and Security in the GDPR Era Data Management and Security in the GDPR Era Franck Hourdin; Vice President, EMEA Security Russ Lowenthal; Director, Database Security Product Management Mike Turner; Chief Operating Officer, Capgemini

More information

GDPR: The Day After. Pierre-Luc REFALO

GDPR: The Day After. Pierre-Luc REFALO GDPR: The Day After Pierre-Luc REFALO The speaker: Pierre-Luc REFALO Global Head of Strategic Cybersecurity Consulting 25+ years in Information & Cyber Security consultancy CISO for SFR & Vivendi Universal

More information

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies

More information

Introduction to Device Trust Architecture

Introduction to Device Trust Architecture Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

Angela McKay Director, Government Security Policy and Strategy Microsoft

Angela McKay Director, Government Security Policy and Strategy Microsoft Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au

More information

Your Trusted Partner in Europe European Business Reliance Centre

Your Trusted Partner in Europe European Business Reliance Centre Your Trusted Partner in Europe European Business Reliance Centre Fit4Exchange 23 Septembre 2015 ebrc.com 24/09/2015 Public 1 EBRC -European Business Reliance Centre Our vision: To be the Centre of Excellence

More information

SECURING THE CONNECTED ENTERPRISE.

SECURING THE CONNECTED ENTERPRISE. SECURING THE CONNECTED ENTERPRISE. IT S ONLY A MATTER OF TIME. WILL YOU BE READY? NITISH SHRIVASTAVA DIRECTOR, HARMAN CONNECTED SERVICES EVERYTHING WAS FINE THEN THIS HAPPENED. INTERNET GOES DOWN DAMAGE

More information

Accelerating Cloud Adoption

Accelerating Cloud Adoption Accelerating Cloud Adoption Ron Stuart July 2016 Disruption Disruption is the new normal Globally interconnected, convenient and more efficient than ever before NZ Government challenge is to use disruptive

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

In Accountable IoT We Trust

In Accountable IoT We Trust In Accountable IoT We Trust AIOTI WG3 Security & Privacy-in-IoT Taskforces, and H2020 CSA CREATE-IoT & LSPs AG Trust in IoT Arthur van der Wees Managing Director Arthur s Legal, the global tech-by-design

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

CHALLENGES GOVERNANCE INTEGRATION SECURITY

CHALLENGES GOVERNANCE INTEGRATION SECURITY CLOUD SERVICES The adoption and migration to the cloud is rooted in the need for speed and flexibility in creating and managing services. These benefits are often impacted by the difficulty of enterprises

More information

IoT and Smart Infrastructure efforts in ENISA

IoT and Smart Infrastructure efforts in ENISA IoT and Smart Infrastructure efforts in ENISA Dr. Dan Tofan IoT workshop BEREC 01.02.2017, Brussels European Union Agency for Network and Information Security Everything becomes connected Manufacturers

More information

Cybersecurity. Securely enabling transformation and change

Cybersecurity. Securely enabling transformation and change Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why

More information

Internet of Things Toolkit for Small and Medium Businesses

Internet of Things Toolkit for Small and Medium Businesses Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

Management Direction Briefing October 29, 2015 Fujitsu Limited

Management Direction Briefing October 29, 2015 Fujitsu Limited Management Direction Briefing October 29, 2015 Fujitsu Limited Copyright 2015 FUJITSU LIMITED Market Trend: Accelerating Digitalization Expectations for the delivery of higher-value ICT services Manufacturing

More information

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions IDC FutureScape: Worldwide Security Products and Services 2017 Predictions Sean Pike, Program Vice President, Robert Ayoub, Research Director IDC Web Conference December, 7, 2016 Logistics Submit any questions

More information

Package of initiatives on Cybersecurity

Package of initiatives on Cybersecurity Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating

More information

How will cyber risk management affect tomorrow's business?

How will cyber risk management affect tomorrow's business? How will cyber risk management affect tomorrow's business? The "integrated" path towards continuous improvement of information security Cyber Risk as a Balance Sheet Risk exposing Board and C-Levels 2018

More information

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS MEET THE EXPERTS DAVID O LEARY Director, Forsythe Security Solutions THOMAS ECK Director, Forsythe Security Solutions ALEX HANWAY Product

More information

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure

More information

End-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration

End-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration End-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration Dr. Andreas Hauser Director Digital Service, TÜV SÜD Tokyo, 21 February 2017 Corporate Profile Slide 2 Our heritage: 150

More information

Discussion on MS contribution to the WP2018

Discussion on MS contribution to the WP2018 Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several

More information

Jim Reavis CEO and Founder Cloud Security Alliance December 2017

Jim Reavis CEO and Founder Cloud Security Alliance December 2017 CLOUD THREAT HUNTING Jim Reavis CEO and Founder Cloud Security Alliance December 2017 A B O U T T H E BUILDING SECURITY BEST PRACTICES FOR NEXT GENERATION IT C L O U D S E C U R I T Y A L L I A N C E GLOBAL,

More information

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING WWW.HCLTECH.COM 21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING THE AGE OF DISRUPTION: THE AGE OF CYBER THREATS While the digital era has brought with it significant advances in technology, capabilities

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

SGS CYBER SECURITY GROWTH OPPORTUNITIES

SGS CYBER SECURITY GROWTH OPPORTUNITIES SGS CYBER SECURITY GROWTH OPPORTUNITIES Eric Krzyzosiak GENERAL MANAGER DIGITAL Jeffrey Mc Donald Executive Vice President CERTIFICATION & BUSINESS ENHANCEMENT Eric Lee WIRELESS & CONSUMER RETAIL CYBER

More information

CYBER SECURITY AIR TRANSPORT IT SUMMIT

CYBER SECURITY AIR TRANSPORT IT SUMMIT CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER

More information

Morgan Stanley Digital Day. London, March

Morgan Stanley Digital Day. London, March Morgan Stanley Digital Day London, March 20 2017 Atos business profile 2016 revenue: 11.7 billion By Division By Business Unit By Market 6% 27% 11% 56% 11% 8% 17% 18% 17% 20% 17% 35% 14% 15% 28% Infrastructure

More information

Digital Healthcare. Yordan Iliev Director R&D Healthcare. Regional Cybersecurity Forum, November 2016, Grand Hotel Sofia, Bulgaria

Digital Healthcare. Yordan Iliev Director R&D Healthcare. Regional Cybersecurity Forum, November 2016, Grand Hotel Sofia, Bulgaria Digital Healthcare Yordan Iliev Director R&D Healthcare Regional Cybersecurity Forum, 29-30 November 2016, Grand Hotel Sofia, Bulgaria AGENDA Introduction Security challenges in healthcare IT Change ahead

More information

Management Direction. FY2017 Progress Review. June 6, Copyright 2017 FUJITSU LIMITED

Management Direction. FY2017 Progress Review. June 6, Copyright 2017 FUJITSU LIMITED Management Direction FY2017 Progress Review June 6, 2017 FY 2015-2016 Financial Results and FY 2017 Plan Operating profit margin Free cash flow 2.5% 2.9% 4.5% Target 10% or more (Billion JPY) 88.7 104.8

More information

Future-Proof Security & Privacy in IoT

Future-Proof Security & Privacy in IoT All rights reserved, Arthur s Legal B.V. Future-Proof Security & Privacy in IoT From State of Play, To State of The Art Arthur van der Wees, LLM Managing Director Arthur s Legal, the global tech-by-design

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

Singtel Investor Day Bill Chang, CEO, Group Enterprise and Country Chief Officer Singapore 13 June 2018

Singtel Investor Day Bill Chang, CEO, Group Enterprise and Country Chief Officer Singapore 13 June 2018 Singtel Investor Day 2018 Bill Chang, CEO, Group Enterprise and Country Chief Officer Singapore 13 June 2018 Singtel Group Enterprise at a glance #1 International IPVPN in APeJ #1 EVPN and Eline in APeJ

More information

SECURING THE UK S DIGITAL PROSPERITY. Enabling the joint delivery of the National Cyber Security Strategy's objectives

SECURING THE UK S DIGITAL PROSPERITY. Enabling the joint delivery of the National Cyber Security Strategy's objectives SECURING THE UK S DIGITAL PROSPERITY Enabling the joint delivery of the National Cyber Security Strategy's objectives 02 November 2016 2 SECURING THE UK S DIGITAL PROSPERITY SECURING THE UK S DIGITAL PROSPERITY

More information

Risk Advisory Academy Training Brochure

Risk Advisory Academy Training Brochure Academy Brochure 2 Academy Brochure Cyber Security Our Cyber Security trainings are focused on building your internal capacity to leverage IT related technologies more confidently and manage risk and uncertainty

More information

Welcome to the Industrial Internet Forum

Welcome to the Industrial Internet Forum Welcome to the Industrial Internet Forum Dr. Richard Soley, Executive Director Industrial Internet Consortium Keio University June 3, 2016 The Industrial Internet is leading the next economic revolution

More information

Global Security Consulting Services, compliancy and risk asessment services

Global Security Consulting Services, compliancy and risk asessment services Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment

More information

Information Security Management Systems Standards ISO/IEC Global Opportunity for the Business Community

Information Security Management Systems Standards ISO/IEC Global Opportunity for the Business Community Information Security Management Systems Standards ISO/IEC 27001 Global Opportunity for the Business Community Prof. Edward (Ted) Humphreys IPA Global Symposium 2013 23 rd May 2013, Tokyo, Japan CyberSecurity

More information

Introduction. When it comes to GDPR compliance, is OK for now enough? Minds made for protecting financial services

Introduction. When it comes to GDPR compliance, is OK for now enough? Minds made for protecting financial services When it comes to GDPR compliance, is OK for now enough? EY CertifyPoint s GDPR certification process will help you achieve and demonstrate compliance. Minds made for protecting financial services Introduction

More information

Cybersecurity & Digital Privacy in the Energy sector

Cybersecurity & Digital Privacy in the Energy sector ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European

More information

Securing Your Most Sensitive Data

Securing Your Most Sensitive Data Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way

More information

Unisys Security. Enabling Business Growth with Advanced Security Solutions. Tom Patterson, Vice President, Security Solutions, Unisys

Unisys Security. Enabling Business Growth with Advanced Security Solutions. Tom Patterson, Vice President, Security Solutions, Unisys Unisys Security Enabling Business Growth with Advanced Security Solutions Tom Patterson, Vice President, Security Solutions, Unisys Unisys EMEA Security Examples Leading European bank Stealth(core) Leading

More information

Securing Digital Transformation

Securing Digital Transformation September 4, 2017 Securing Digital Transformation DXC Security Andreas Wuchner, CTO Security Innovation Risk surface is evolving and increasingly complex The adversary is highly innovative and sophisticated

More information

FOR FINANCIAL SERVICES ORGANIZATIONS

FOR FINANCIAL SERVICES ORGANIZATIONS RSA BUSINESS-DRIVEN SECURITYTM FOR FINANCIAL SERVICES ORGANIZATIONS MANAGING THE NEXUS OF RISK & SECURITY A CHANGING LANDSCAPE AND A NEW APPROACH Today s financial services technology landscape is increasingly

More information

ERCI cybersecurity seminar Guildford ERCI cybersecurity seminar Guildford

ERCI cybersecurity seminar Guildford ERCI cybersecurity seminar Guildford Cybersecurity is a EU strategic priority DG CONNECT* > The Digital Single Market strategy aims to open up digital opportunities for people and business and enhance Europe's position as a world leader in

More information

Securing Europe's Information Society

Securing Europe's Information Society Securing Europe's Information Society Dr. Udo Helmbrecht Executive Director European Network and Information Security Agency 16 June 2010 FIRST AGM Miami 16/6/2010 1 Agenda ENISA overview Challenges EU

More information

Cybersecurity Roadmap: Global Healthcare Security Architecture

Cybersecurity Roadmap: Global Healthcare Security Architecture SESSION ID: TECH-W02F Cybersecurity Roadmap: Global Healthcare Security Architecture Nick H. Yoo Chief Security Architect Disclosure No affiliation to any vendor products No vendor endorsements Products

More information

Enhancing the cyber security &

Enhancing the cyber security & Enhancing the cyber security & resilience of transport infrastructure in Europe European Union Agency for Network and Information Security Securing Europe s Information society 2 Positioning ENISA activities

More information

Massive M2M Communications: Challenges for NRAs

Massive M2M Communications: Challenges for NRAs Communications Regulatory Agency Bosnia and Herzegovina GD-001/2018 (E) Massive M2M Communications: Challenges for NRAs Aleksandar Mastilovic Expert Advisor the Director-General at Communications Regulatory

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Securing Your Digital Transformation

Securing Your Digital Transformation Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,

More information

Security in India: Enabling a New Connected Era

Security in India: Enabling a New Connected Era White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile

More information

Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy

Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy Business Challenges Investment in the Industrial Internet of Things (IIoT) is expected to top $60 trillion during the next 15 years.

More information

building for my Future 2013 Certification

building for my Future 2013 Certification I am building for my Future 2013 Certification Let ISACA help you open new doors of opportunity With more complex IT challenges arising, enterprises demand qualified professionals with proven knowledge

More information

Cybersecurity and Data Protection Developments

Cybersecurity and Data Protection Developments Cybersecurity and Data Protection Developments Nathan Taylor March 8, 2017 NY2 786488 MORRISON & FOERSTER LLP 2017 mofo.com Regulatory Themes 2 A Developing Regulatory Environment 2016 2017 March CFPB

More information

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson Delivering Integrated Cyber Defense for the Generation Darren Thomson Vice President & CTO, EMEA Region Symantec In 2009 there were 2,361,414 new piece of malware created. In 2015 that number was 430,555,582

More information

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government ATIONAL STRATEGY National Strategy for Critical Infrastructure Government Her Majesty the Queen in Right of Canada, 2009 Cat. No.: PS4-65/2009E-PDF ISBN: 978-1-100-11248-0 Printed in Canada Table of contents

More information

NOVEMBER 2017 Leading Digital Transformation Driving innovation at scale Marc Leroux Executive Evangelist/Digital ABB

NOVEMBER 2017 Leading Digital Transformation Driving innovation at scale Marc Leroux Executive Evangelist/Digital ABB NOVEMBER 2017 Leading Digital Transformation Driving innovation at scale Marc Leroux Executive Evangelist/Digital ABB Discussion topics Introductions The digital transformation Innovating at scale How

More information

Integrated Security Management Framework

Integrated Security Management Framework Integrated Security Management Framework Critical for Securing the Future of IoT Nampuraja Enose Principal Consultant- Industry 4.0 / Industrial Internet 17 Nov 2016 Internet Of Things The Vision 2 Instrumented

More information

MITIGATE CYBER ATTACK RISK

MITIGATE CYBER ATTACK RISK SOLUTION BRIEF MITIGATE CYBER ATTACK RISK CONNECTING SECURITY, RISK MANAGEMENT & BUSINESS TEAMS TO MINIMIZE THE WIDESPREAD IMPACT OF A CYBER ATTACK DIGITAL TRANSFORMATION CREATES NEW RISKS As organizations

More information

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on

More information

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders

More information

Digital Co-Creation with Hybrid IT. Fujitsu World Tour 2017

Digital Co-Creation with Hybrid IT. Fujitsu World Tour 2017 Digital Co-Creation with Hybrid IT Fujitsu World Tour 2017 0 Copyright 2017 FUJITSU The Industrial Revolution The original disruptor that brought us to a new world The Industrial Revolution was a period

More information

THE POWER OF TECH-SAVVY BOARDS:

THE POWER OF TECH-SAVVY BOARDS: THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES

More information

New Digital Business Models Driving the Softwarization of the Network

New Digital Business Models Driving the Softwarization of the Network New Digital Business Models Driving the Softwarization of the Network Marc Halbfinger January 2018 Here To Serve Headquartered in Hong Kong PCCW consolidated 2016 Revenue: US$4.9 billion HKT 2016 Revenue:

More information

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018 Transformation in Technology Barbara Duck Chief Information Officer Investor Day 2018 Key Takeaways 1Transformation in Technology driving out cost, supporting a more technologyenabled business Our new

More information

The Internet of Things

The Internet of Things 1 The Internet of Things The Internet of Things (IoT) is a new vision of the Internet in which any type of object or thing that generates or consumes data on the network can be connected. It is the evolution

More information

Cisco Smart+Connected Communities

Cisco Smart+Connected Communities Brochure Cisco Smart+Connected Communities Helping Cities on Their Digital Journey Cities worldwide are becoming digital or are evaluating strategies for doing so in order to make use of the unprecedented

More information

The Etihad Journey to a Secure Cloud

The Etihad Journey to a Secure Cloud SESSION ID: CCS-T07 The Etihad Journey to a Secure Cloud Georges de Moura Head of Group Information Security, Risk & Compliance Etihad Aviation Group History: Before The Cloud Devolved IT Decision-Making

More information

Continuous protection to reduce risk and maintain production availability

Continuous protection to reduce risk and maintain production availability Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading

More information

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Data Sheet Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Available through NASPO ValuePoint Cloud Services VIRTUSTREAM CLOUD AND MANAGED SERVICES SOLUTIONS

More information

Cisco Connected Factory Accelerator Bundles

Cisco Connected Factory Accelerator Bundles Data Sheet Cisco Connected Factory Accelerator Bundles Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America

5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America 5G Security Jason Boswell Head of Security, IT, and Cloud Ericsson North America Drew Morin Director Federal Cybersecurity Technology and Engineering Programs T-Mobile USA Chris White Head of Algorithms,

More information

Cybersecurity Session IIA Conference 2018

Cybersecurity Session IIA Conference 2018 www.pwc.com/me Cybersecurity Session IIA Conference 2018 Wael Fattouh Partner PwC Cybersecurity and Technology Risk PwC 2 There are only two types of companies: Those that have been hacked, and those that

More information

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure Information Infrastructure and Security The value of smart manufacturing begins with a secure and reliable infrastructure The Case for Connection To be competitive, you must be connected. That is why industrial

More information

Building a Resilient Security Posture for Effective Breach Prevention

Building a Resilient Security Posture for Effective Breach Prevention SESSION ID: GPS-F03B Building a Resilient Security Posture for Effective Breach Prevention Avinash Prasad Head Managed Security Services, Tata Communications Agenda for discussion 1. Security Posture 2.

More information

Executive Customer Council 2017

Executive Customer Council 2017 Executive Customer Council 2017 30. und 31. Mai 2017 Würzburg 0 Fujitsu Technology Solutions GmbH 2017 Sicherheitsarchitektur und -kultur als wesentlicher Bestandteil einer Digital Enterprise Strategy

More information

Intelligent Buildings and Cybersecurity

Intelligent Buildings and Cybersecurity Intelligent Buildings and Cybersecurity March 14-18,2017 Frankfurt, Germany Ron Zimmer CABA President & CEO www.caba.org Connect to what s next 1 CABA Board of Directors and Vision CABA Vision Statement

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

Cyber Resilience Solution for Smart Buildings

Cyber Resilience Solution for Smart Buildings Cyber Resilience Solution for Smart Buildings Integrated IT/OT Security Oren Aspir, Cyberbit, CTO 2017 by CYBERBIT 2017 by CYBERBIT Proprietary CYBERBIT Proprietary Buildings getting smarter IT systems

More information

Intelligent Building and Cybersecurity 2016

Intelligent Building and Cybersecurity 2016 Intelligent Building and Cybersecurity 2016 Landmark Research Executive Summary 2016, Continental Automated Buildings Association Presentation Contents 1. About CABA, Compass Intelligence & This Research

More information

Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED

Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials FAQ All figures refer to continuing

More information

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE WHITEPAPER RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE CONTENTS Executive Summary........................................ 3 Transforming How We Think About Security.......................... 4 Assessing

More information

Security Secure Information Sharing

Security Secure Information Sharing ASD Convention Workshop 6 e-standards: a Strategic Asset across the Value Chain Security Secure Information Sharing Steve SHEPHERD Executive Director UK CeB Istanbul, 6 October 2011 1 Information security

More information

BHConsulting. Your trusted cybersecurity partner

BHConsulting. Your trusted cybersecurity partner Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised

More information