Company profile secunet Security Networks AG
|
|
- Olivia Cunningham
- 6 years ago
- Views:
Transcription
1 Company profile secunet Security Networks AG Profile in brief secunet is one of the leading German providers of high-quality IT security. Over 350 experts work in the areas of cryptography, e-government, business security and automotive security, and develop innovative products in these fields in addition to highly secure and reliable solutions. Many DAX companies as well as numerous authorities and organisations are among secunet's national and international customers. secunet is IT security partner of the Federal Republic of Germany and Partner of the German Cyber Security Alliance. secunet was founded in 1996 and achieved sales of EUR 82,2 million in secunet Security Networks AG is listed on the Prime Standard of the German Stock Exchange. In addition to the headquarters in Essen, the company has six further locations in Germany. For more information, please visit Facts and figures at a glance Foundation: 1996, as a spin-off of RWTÜV Essen Type of enterprise: Corporation, listed on the Prime Standard of the German Stock Exchange. Main shareholder: Giesecke & Devrient GmbH, Munich (approximately 79% of shares) Headquarters: secunet Security Networks AG Kronprinzenstraße Essen Germany Further locations: Berlin, Dresden, Eschborn, Hamburg, Munich and Siegen (Germany) Service portfolio: Holistic IT security including consulting, concept design, development, implementation, support and powerful products Business units: Business Sector including the divisions Automotive and Critical Infrastructures Public Sector including the divisions Homeland Security, Public Authorities and Defence
2 Customers: Over 500 national and international customers, including the German Foreign Office, Federal Ministry of Defence, Federal Ministry of the Interior, Federal Office for Information Security, Regional Tax Authority of Bavaria, Howaldtswerke-Deutsche Werft GmbH, mobile.de, BMW, Audi, National-Bank, Commerzbank, Gelsenwasser, Stadtwerke Bremen, Stadtwerke München Industry solutions: Public sector, defence, security organizations, critical infrastructures, energy- and water suppliers, telecommunication, automotive industry, transport and logistics Memberships: BITKOM, TeleTrusT Deutschland e.v. Board of Management: Dr. Rainer Baumgart (Chairman, responsible for the business units Public Sector and Business Sector, corporate development/strategy, compliance/revision and corporate communications/marketing) Thomas Pleines (responsible for finance & controlling, legal department, human resources, DP) IT Security the highest requirements IT security has long been one of the top-priority issues and one of the greatest challenges for any organization in today's information society. The sector is characterized by fast technological development as well as a very complex range of diverse issues. Additionally, national and international legislation, regulations and directives often dictate very special requirements concerning the security of data and infrastructures. At the same time, organizations are becoming more vulnerable as a result of their growing dependency on well-functioning and networked information processing as well as an increased need among employees for mobile and flexible access to corporate data. More frequent use of different devices and applications also increases risks due to incorrect usage and negligence. The urgent need for a comprehensive, continuously updated security solution for companies and authorities also results from increasingly more sophisticated forms of industrial espionage and cyber war attacks. Today, attacks are not only carried out by individuals, but by well-organized and well-funded groups. But it is not only internal networks that are becoming more vulnerable as a result of increased introduction of electronic components and their connection with the Internet; national infrastructures are also at risk. Attacks on energy supply and communicational networks can be launched from anywhere in the world. Even vehicles will soon be communicating with each other via the Internet. These areas also need stringent security measures to maintain a functioning infrastructure. However, the market provides no assistance in terms of orientation due to high provider fragmentation. Consequently, a comprehensive, substantiated overview of security requirements and solutions is all the more important. For companies and authorities, the rel-
3 evant financial and personnel investment is usually too high, so they rely on specialist service providers. secunet: premium IT security "made in Germany" Effective, comprehensive IT security can only be achieved through careful planning and professional support. Alongside intelligent technology, factors relating to infrastructure, legislation, organization and personnel must be taken into account during concept design and rollout. secunet relies on holistic IT security that takes into account all these aspects and implements them in applications with long-term protection. Customers benefit from comprehensive consultation as well as from a technologically advanced service and product portfolio that fulfils even the highest security requirements. secunet offers in-depth know-how in various security fields. These range from the highest security levels in authorities and complete solutions for companies, to the protection of Internet access in vehicles. In addition to products developed and marketed in-house for different security levels, secunet also implements solutions from other security providers in order to achieve the best-possible protection tailored to suit the individual needs of the customer. Alongside design concept and installation, the service provider also assumes responsibility for daily operation. The fields covered by secunet include securing authorities' communication by means of encryption, protecting applications in e-government, developing important security technology such as electronic passports and securing critical infrastructures. secunet also uses the experience gathered in these highly sensitive areas to safeguard business-critical processes in companies. These include, for example, research and development projects. In close collaboration with the German Federal Office for Information Security (BSI), secunet continues to design, develop and evaluate new components and products and roll out data security projects. Additionally, secunet has long-term partnerships with the German Federal Ministry of the Interior (BMI) and well-known automotive manufacturers and suppliers.
4 Important information about the company 1996 Foundation of secunet from RWTÜV Focus: digital signatures and cryptography with Internet technologies 1999 Initial public offering Pioneer for PKI/trustcenter development for digital certificates in Germany 2000 Launch of SINA (Secure Inter-Network Architecture) product development for encrypted transmission of confidential documents on behalf of the BSI Expansion from consulting business to product manufacturer Initial tests for the introduction of biometry in sovereign documents 2004 Giesecke & Devrient becomes main shareholder Acquisition of SECARTIS AG, a subsidiary of Giesecke & Devrient from the IT security sector Appointment as IT security partner of the Federal Republic of Germany 2014 Sales: 82.2 million euros EBIT: 6.6 million euros Employees: 360 (As of 31 December) SINA components in use: > 30,000 Formation of the company With the advent of the World Wide Web in the 1990s, the Rheinisch-Westfälische Technische Überwachungsverein (RWTÜV) in Essen expanded its area of activity to cover the evaluation of network security. Digital signatures and encryption technologies in particular played a major role in this. As more and more companies wanted their networks to be tested and improved, the TÜV carved out its department for IT security under the name secunet. The service provider did not only test network security, but also improved it together with the customer through consulting and training as well as designing, implementing and operating an optimized security solution. This is still the focus of its activities to this day. With the further development of security technologies, at the end of the 1990s, secunet contributed to comprehensive public key infrastructures for issuing, distributing and checking digital certificates via state-approved trustcenters.
5 Automotive With the advent of automated driving, we are on the brink of the next big thing in vehicle innovation. But cars are already highly connected with their environment today. They generate and process vast tracts of internal and external data to provide comfort, infotainment and driver security, which means hacking attacks not only threaten vehicle safety, but also the privacy of vehicle owners which is why data protection and security are now indispensable. Where data protection and security are concerned, the automotive industry wants solutions suitable for series production that respond to vehicle-specific needs, as well as to the peculiarities of the entire automotive supply chain. With years of experience in the automotive industry, secunet s Automotive division works with vehicle manufacturers and suppliers to develop and implement production-ready IT security for on-board network components guaranteeing secure internal and external vehicle networking and protecting new mobility services. The division s services range from drafting specification sheets to implementing and launching solutions in the vehicle, system and process landscape, and it uses software and hardware-based technologies depending on the level of protection required. Its portfolio is rounded out by technical security analyses for existing control unit implementations in its own laboratory. Homeland Security In a networked and globalised world, safeguarding domestic security is one of the greatest challenges of our time. National and international security authorities make a vital contribution to protecting society and the state from criminal activity, terrorism and other, similar threats. No matter the threats faced, the organisations responsible for keeping us safe use IT-supported systems and are increasingly reliant on digital processes to do their job. Guaranteeing IT security is therefore crucial to domestic security. The Homeland Security division specialises in meeting the needs of organisations, authorities and departments, and delivers intelligent, tailored, end-to-end IT security solutions for national and international use. It also offers high-powered products, customer-specific developments and highly specialised consulting. The division s main focus is solutions and infrastructure for collecting biometric data, as well as stationary, mobile and automated border control systems, modern (mobile) government workstations, advanced document management systems for processing classified information, and secure, high-performance police networks. Critical Infrastructures Critical infrastructures are organisations and institutions that are crucial to our nation and government. These infrastructures are increasingly reliant on IT-supported systems and require special protection, because malfunction and disruption can have dramatic consequences for the German economy and society. It is therefore vitally important to protect CRITIS from cyber attacks, espionage and sabotage.
6 secunet s Critical Infrastructures division is dedicated to the integrators, manufacturers and operators of critical infrastructures. With industry-specific knowledge and methodical, technical expertise, the division implements efficient and effective IT security strategies and tailored information security solutions. The division specialises in securing the most vulnerable aspects of critical infrastructures while meeting all applicable legal requirements. Its services include IT security consulting, the design of information security management systems, customer-specific software development, penetration tests, certification services and security awareness training. What s more, the division s extensive product portfolio allows customers to prevent malfunctions and security breaches and respond appropriately should the worst happen. Adopting a holistic approach to IT security, the division establishes secure, tamper-proof connections between networks, enables secure (mobile) remote access to sensitive IT areas like process control and automation systems, and implements protection systems. This means cyber attacks are effectively repelled without impairing the availability of critical systems. Public Authorities The processes and IT infrastructures of public authorities present particular challenges in information security, with diverse fields of application from safeguarding digital communications to protecting e-government applications (e.g. against cyber attacks and espionage) and identity management requiring top-quality, tailored IT security solutions. secunet s Public Authorities division offers advice and support to national and regional authorities, drawing on state-of-the-art, combinable products and services, and tailored security concepts. These are designed to meet all the needs of modern administration, meaning customers can perform their official duties while taking into account the security requirements for protecting classified information. The division s strengths lie in its years of experience meeting the security needs of public authorities, as well as its specially tailored products and services. This includes supplying secure, mobile workstations and protecting national and regional authority networks, as well as implementing reliable identity management solutions. Information security management systems built according to IT Baseline Protection offer a consistently high level of security, for instance especially considering the unique infrastructural, regulatory, organisational and staff challenges posed by public authorities. SINA products are used for the secure processing, storage, transmission and verification of classified and other sensitive information. Finally, the division s consulting services are rounded out by IT security campaigns and security awareness training. Defence The armed forces, military organisations and authorities have a particularly strong need to protect the confidentiality of their data which ranges from national and international data to mission-related classified information. Closely linked to this are innovative IT security architectures, e.g. for basic IT-based troop operations, C4ISR systems and multinational mission networks.
7 secunet s Defence division draws on years of experience and an in-depth understanding of national and international defence to support military customers. It also assists system integrators, technology companies, consulting firms and research institutes in this unique market segment. Together with the German Federal Office for Information Security, secunet s specialists develop SINA (E/H) cryptographic devices for national and international customers with high security requirements. SINA makes it possible to securely process, store, transfer and register classified information up to and including security classifications STRENG GE- HEIM (TOP SECRET), NATO SECRET and SECRET UE. The diversity of secunet s unique product range including stationary and mobile clients, IPsec and unidirectional gateways, Ethernet encryptors and a registry-compliant solution (SINA Workflow) makes it possible to create security domains for all manner of application scenarios. In addition, the division offers complementary security solutions in the following technology areas: public key infrastructures, biometric security solutions, ReCoBS (Remote Controlled Browser Systems) and cyber defence. The Defence division s services are rounded out by SINA and IT security consulting (especially in the context of security and network architectures), SINA system integration and application-oriented research. Press contact: Christine Skropke, Spokesperson Phone: Fax: Patrick Franitza, Dep. Spokesperson Phone: Fax: presse@secunet.com secunet Security Networks AG Kronprinzenstr Essen (Germany)
Intelligent Solutions for the Highest IT Security Requirements
Intelligent Solutions for the Highest IT Security Requirements 3 Information security from the architects of modern cryptographic systems SINA (Secure Inter-Network Architecture) enables the protected
More informationIntelligent Solutions for the most Rigorous IT Security Requirements
Intelligent Solutions for the most Rigorous IT Security Requirements 1 2 1 2 3 Information Security from the Architects of Modern Encryption Systems SINA (Secure Inter-Network Architecture) enables the
More informationsecunet Security Networks AG SINA an Overview Sofia,
secunet Security Networks AG SINA an Overview Sofia, 10.6.2014 Agenda 1 Some facts about secunet 2 SINA Portfolio 3 SINA References 4 Voice Solutions secunet Security Networks AG 2010 2 Some facts about
More informationConformity and Interoperability Key Prerequisites for Security of eid documents. Holger Funke, 27 th April 2017, ID4Africa Windhoek
Conformity and Interoperability Key Prerequisites for Security of eid documents Holger Funke, 27 th April 2017, ID4Africa Windhoek Agenda 1. About secunet Security Networks AG 2. Timeline of interoperability
More informationAssessments Audits CERTIFICATION
IT SECURITY Cyber Security Training Consulting Analyses Assessments Audits CERTIFICATION Increasing connectivity of equipment, systems and applications in cyberspace networks harbours additional risks.
More informationCYBER RESILIENCE & INCIDENT RESPONSE
CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable
More informationCyber security mechanisms for connected vehicles
Infineon Security Partner Network Partner Use Case Cyber security mechanisms for connected vehicles Protecting automotive vehicle networks and business models from cyber security attacks Products AURIX
More informationGiesecke+Devrient. Company Presentation
Giesecke+Devrient Company Presentation Our vision G+D makes the lives of billions of people more secure We want to be the global leading provider of security technologies, both in the digital and physical
More informationAn overview of mobile call recording for businesses
An overview of mobile call recording for businesses 1 3 WHY DO WE NEED MOBILE CALL RECORDING? 4 STAYING AHEAD OF THE CHANGING REGULATORY LANDSCAPE Regulatory compliance and mobile call recording FCA (Financial
More informationWritten Statement of. Timothy J. Scott Chief Security Officer The Dow Chemical Company
Written Statement of Timothy J. Scott Chief Security Officer The Dow Chemical Company Representing The Dow Chemical Company and the American Chemistry Council To the United States Senate Committee on Homeland
More informationPOSITION DESCRIPTION
Network Security Consultant POSITION DESCRIPTION Unit/Branch, Directorate: Location: Regulatory Unit Information Assurance and Cyber Security Directorate Auckland Salary range: I $90,366 - $135,548 Purpose
More informationCyber Security. CyberSecurity. For more information: Airbus CyberSecurity
For more information: Airbus CyberSecurity CyberSecurity France Metapole 1, boulevard Jean Moulin / CS 40001 / 78996 Elancourt Cedex/ France Germany Willy-Messerschmitt-Str. 1 / 82024 Taufkirchen / Germany
More informationEnd-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration
End-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration Dr. Andreas Hauser Director Digital Service, TÜV SÜD Tokyo, 21 February 2017 Corporate Profile Slide 2 Our heritage: 150
More informationFiscal year 2017: TÜV Rheinland continues growth strategy with investments in future-oriented topics
Fiscal year 2017: TÜV Rheinland continues growth strategy with investments in future-oriented topics 04/25/2018 Cologne The international testing service provider, TÜV Rheinland, continued its ongoing
More informationSecuring the future of mobility
Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need
More informationBe prepared! Secure communication leads to successful command.
Be prepared! Secure communication leads to successful command. Welcome to RUAG Defence As a technology partner, RUAG Defence helps armed forces carry out their operations successfully. We ensure that response
More informationThe modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.
Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased
More informationForensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services
Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic
More informationYour single source for a safe, secure, and sustainable airport
Your single source for a safe, secure, and sustainable airport Innovative and comprehensive solutions www.usa.siemens.com/es Answers for infrastructure. Turning challenges into sustainable success Every
More informationThe Key Principles of Cyber Security for Connected and Automated Vehicles. Government
The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational
More informationDHS Cybersecurity: Services for State and Local Officials. February 2017
DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated
More informationDefence services. Independent systems and technology advice that delivers real value. Systems and Engineering Technology
Defence services Independent systems and technology advice that delivers real value Systems and Engineering Technology Frazer-Nash Consultancy Working in the UK and internationally, Frazer-Nash is making
More informationCanada Life Cyber Security Statement 2018
Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability
More informationIT security for energy infrastructures
IT security for energy infrastructures Next-generation firewalls made in Germany Cybersecurity Because of a lack of security mechanisms at both application level and data link layer level, conventional
More informationCyber Security: Are digital doors still open?
Cyber Security: Are digital doors still open? Introduction Security is becoming a rapidly evolving and complex issue that various organizations are contending with today. It continues to be one of the
More informationCommand and Control Center
E Command and Control Center 2 The Company eurofunk Kappacher GmbH is an Austrian company with its head office in St. Johann in Pongau. The company was founded in 1969 and is mainly active as a system
More informationA company built on security
Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for
More informationSecurity and Architecture SUZANNE GRAHAM
Security and Architecture SUZANNE GRAHAM Why What How When Why Information Security Information Assurance has been more involved with assessing the overall risk of an organisation's technology and working
More informationEasy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications
Infineon Network Use Case Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications Providing Infineon customers with an easy path to integrating TPM support into their products and systems
More informationGlobal Security Consulting Services, compliancy and risk asessment services
Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment
More informationFACTS FIGURES TÜV SÜD AG
2014 FACTS FIGURES TÜV SÜD AG TÜV SÜD AT A GLANCE 1866 Founded in Mannheim. More than 22,000 Employees worldwide. Around 800 Locations on all continents. SHAREHOLDERS OF TÜV SÜD AG IN % 74.9 TÜV SÜD E.V.
More informationNational Cyber Security Strategy 2016
National Cyber Security Strategy 2016 26th of April 2017, Athens Samuel Rothenpieler, International Relations Advisor, Federal Office for Information Security (BSI) Mission Statement of the German Federal
More informationT-Systems company profile
T-Systems company profile With a footprint in more than 20 countries, 43,700 employees, and external revenue of 7.9 billion euros (2016), T-Systems is one of the world's leading vendor independent providers
More informationInformation Security Controls Policy
Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January
More informationCritical Information Infrastructure Protection Law
Critical Information Infrastructure Protection Law CCD COE Training 8 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington, Virginia.
More informationThe German IT Security Certification Scheme. Joachim Weber
The German IT Security Certification Scheme Joachim Weber The German IT Security Certification Scheme 1. The role of the BSI 2. The German IT Certificate Scheme 3. Certification procedures in detail 4.
More informationSecurity analysis and assessment of threats in European signalling systems?
Security analysis and assessment of threats in European signalling systems? New Challenges in Railway Operations Dr. Thomas Störtkuhl, Dr. Kai Wollenweber TÜV SÜD Rail Copenhagen, 20 November 2014 Slide
More informationTHE CYBER SECURITY ENVIRONMENT IN LITHUANIA
Executive summary of the public audit report THE CYBER SECURITY ENVIRONMENT IN LITHUANIA 9 December 2015, No. VA-P-90-4-16 Full audit report in Lithuanian is available on the website of the National Audit
More informationBoston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018
Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security BRANDEIS UNIVERSITY PROFESSOR ERICH SCHUMANN MAY 2018 1 Chinese military strategist Sun Tzu: Benchmark If you know your
More informationKeys to a more secure data environment
Keys to a more secure data environment A holistic approach to data infrastructure security The current fraud and regulatory landscape makes it clear that every firm needs a comprehensive strategy for protecting
More informationCYBER SECURITY AIR TRANSPORT IT SUMMIT
CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER
More informationGoogle Cloud & the General Data Protection Regulation (GDPR)
Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to
More informationBack to the Future Cyber Security
Back to the Future Cyber Security A manifesto for Cyber Security and the Industrial Legacy Introduction Industrial facilities and infrastructure form the core of our economy and society. These advanced
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationPROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY
PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY OUR MISSION Make the digital world a sustainable and trustworthy environment
More informationEfficient, broad-based solution for a Swiss digital ID
Press release November 21, 2017 Government and private sector produce joint solution Efficient, broad-based solution for a Swiss digital ID The people of this country should have a simple, secure and unambiguous
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationForensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services
Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic
More informationThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce
More informationNATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -
NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationRUAG Cyber Security Understand Cyber. Protect Values.
RUAG Cyber Security Understand Cyber. Protect Values. Your Cyber Security maturity depends on your awareness and the appropriate behaviour of every single user. RUAG Cyber Security empowers and efficiently
More information2017 Company Profile
2017 Company Profile LITS Lead Technology Services 10/2/2017 INTRODUCTION Leading Innovative Technology Solutions (LITS) Lead Innovative Technology Services is an affirmative and black economic empowerment
More informationSpecial Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)
Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect
More informationGovernment Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security
Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:
More informationFMN / MLS Lessons learned. Praha November 12th, 2013 Holger W. Kalnischkies
FMN / MLS Lessons learned Praha November 12th, 2013 Holger W. Kalnischkies MLS a definition Protecting sensitve or confidental data is paramount to most organizations Having information of different security
More informationItu regional workshop
Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on
More informationhow to manage risks in those rare cases where existing mitigation mechanisms are insufficient or impractical.
Contents Introduction... 2 Purpose of this paper... 2 Critical Infrastructure Security and Resilience... 3 The National Security Environment... 5 A Proactive and Collaborative Approach... 7 Critical Infrastructure
More informationHitachi s Social Infrastructure Defenses for Safety and Security through Collaborative Creation with Customers
302 Hitachi Review Vol. 65 (2016), No. 8 Overview Hitachi s Social Infrastructure Defenses for Safety and Security through Collaborative Creation with Customers Takeshi Miyao Toshihiko Nakano, Ph.D. ADVANCES
More informationSage Data Security Services Directory
Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time
More informationDHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017
DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.
More informationTARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS
Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS
More informationCommonwealth Cyber Declaration
Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that
More informationAwareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB
Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB 2 OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB In today s digital world, safeguarding data, intellectual property, financial
More informationOUR MISSION STATEMENT
June 2013 Company Presentation Corporate Communications OUR MISSION STATEMENT // QSC is the medium-sized provider in the ICT industry who creates sustainable value for mediumsized companies, cooperation
More informationASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016
ASSEMBLY, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED FEBRUARY, 0 Sponsored by: Assemblywoman VALERIE VAINIERI HUTTLE District (Bergen) Assemblyman DANIEL R. BENSON District (Mercer and Middlesex)
More informationPosition Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED
Position Description Computer Network Defence (CND) Analyst Position purpose: Directorate overview: The CND Analyst seeks to discover, analyse and report on sophisticated computer network exploitation
More informationMapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective
Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better
More informationGujarat Forensic Sciences University
Gujarat Forensic Sciences University Knowledge Wisdom Fulfilment Cyber Security Consulting Services Secure Software Engineering Infrastructure Security Digital Forensics SDLC Assurance Review & Threat
More informationCybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com
Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationSix Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP
Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant
More informationCyber Security and Cyber Fraud
Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa
More informationAirport Security & Safety Thales, Your Trusted Hub Partner
Airport Security & Safety Thales, Your Trusted Hub Partner www.thalesgroup.com/shield Securing People Ensuring Business Continuity Protecting Assets Thales Credentials Thales is a leading international
More informationM a d. Take control of your digital security. Advisory & Audit Security Testing Certification Services Training & Awareness
M a d Take control of your digital security Advisory & Audit Security Testing Certification Services Training & Awareness Safeguarding digital security is a profession The digitalisation of our society
More informationGoverning cyber security risk: It s time to take it seriously Seven principles for Boards and Investors
www.pwc.co.uk Governing cyber security risk: It s time to take it seriously Seven principles for Boards and Investors Dr. Richard Horne Cyber Security Partner PwC January 2017 Board governance is often
More informationTraining courses 2017 / 2018
Training courses 2017 / 2018 2 S33.201 SINA Basics Basic knowledge of IP and routing Basic knowledge of networks and VPN Basic knowledge of cryptography Administrators who use or will soon use an All-in-One
More informationAdvanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018
Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018 The Homeland Security Systems Engineering and Development Institute (HSSEDI ) is a trademark of the U.S. Department of Homeland
More informationBIG DATA INDUSTRY PAPER
BIG DATA INDUSTRY PAPER Encryption Key Management INFORMATION-RICH BIG DATA IS UNDER INCREASING THREAT OF THEFT AND BUSINESS DISRUPTION. AS THE NETWORKS AND TECHNOLOGIES THAT ENABLE BIG DATA COLLECTION,
More informationEU General Data Protection Regulation (GDPR) Achieving compliance
EU General Data Protection Regulation (GDPR) Achieving compliance GDPR enhancing data protection and privacy The new EU General Data Protection Regulation (GDPR) will apply across all EU member states,
More informationSGS CYBER SECURITY GROWTH OPPORTUNITIES
SGS CYBER SECURITY GROWTH OPPORTUNITIES Eric Krzyzosiak GENERAL MANAGER DIGITAL Jeffrey Mc Donald Executive Vice President CERTIFICATION & BUSINESS ENHANCEMENT Eric Lee WIRELESS & CONSUMER RETAIL CYBER
More informationCYBER SECURITY OPERATION CENTER
CYBER OPERATION CENTER Reply s new Cyber Security Operation Centre is a structure specialised in the provision of Premium-level security services, tailored to the customer's needs, processes, and the specific
More informationCritical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.
Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. By Christopher Ganizani Banda ICT Development Manager Malawi Communications Regulatory Authority 24-26th July,2016 Khartoum,
More informationCyber risk Getting the boardroom focus right
Cyber risk Getting the boardroom focus right Cyber attacks have become substantially more malicious and larger scale over last few years, causing much greater harm to organisations and elevating cyber
More informationPrinciples for a National Space Industry Policy
Principles for a National Space Industry Policy Commonwealth of Australia 2011 DIISR 11/144 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced
More informationFINNISH APPROACH TO CRITICAL INFRASTRUCTURE PROTECTION
FINNISH APPROACH TO CRITICAL INFRASTRUCTURE PROTECTION Katri Liekkilä, M.M.Sc., M.Sc. (Econ) Special Adviser IMPROVER Operators workshop, Lisbon 2018 NATIONAL DOCUMENTS RELATED TO CIP SECURITY STRATEGY
More informationUSA HEAD OFFICE 1818 N Street, NW Suite 200 Washington, DC 20036
US-China Business Council Comments on The Draft Measures for Security Review of Online Products and Services March 6, 2017 On behalf of the more than 200 members of the US-China Business Council (USCBC),
More informationOracle Buys Automated Applications Controls Leader LogicalApps
Oracle Buys Automated Applications Controls Leader LogicalApps To strengthen Oracle s Governance, Risk and Compliance Suite with Real-time Policy Enforcement October 26, 2007 Disclaimer The following is
More informationUnit 3 Cyber security
2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 3 - revised September 2016 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning
More informationCYBER SECURITY TAILORED FOR BUSINESS SUCCESS
CYBER SECURITY TAILORED FOR BUSINESS SUCCESS KNOW THE ASIAN CYBER SECURITY LANDSCAPE As your organisation adopts digital transformation initiatives to accelerate your business ahead, understand the cyber
More informationTRULY INDEPENDENT CYBER SECURITY SPECIALISTS. Cyber Major
TRULY INDEPENDENT CYBER SECURITY SPECIALISTS Cyber Major 1 WHO WE ARE Cyber Major is a world class, independent and cutting-edge cyber security consultancy. We specialise in conducting full end-to-end
More informationCLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY
CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for
More informationBringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016
Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the
More informationThe Federal Council s Basic Strategy. for Critical Infrastructure Protection
The Federal Council The Federal Council s Basic Strategy for Critical Infrastructure Protection Basis for the national critical infrastructure protection strategy 18 May 2009 Table of Contents 1 Introduction...
More informationCOMPANY PRESENTATION 1ST QUARTER Bechtle AG Neckarsulm, May 2012
COMPANY PRESENTATION 1ST QUARTER 2012 Bechtle AG Neckarsulm, May 2012 CONTENTS Corporate development Business model Customers Competition Economic conditions Business development 2012.Q1 The Share Vision
More informationSOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:
(Solutions Brief) An integrated cybersecurity Administration solution for securing any Large Enterprise. The Industry s most complete protection for the Large Enterprise and Cloud Deployments. KEY SERVICES:
More informationHow will cyber risk management affect tomorrow's business?
How will cyber risk management affect tomorrow's business? The "integrated" path towards continuous improvement of information security Cyber Risk as a Balance Sheet Risk exposing Board and C-Levels 2018
More informationThe NIS Directive and Cybersecurity in
The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security
More informationProtecting your data. EY s approach to data privacy and information security
Protecting your data EY s approach to data privacy and information security Digital networks are a key enabler in the globalization of business. They dramatically enhance our ability to communicate, share
More informationDIGITAL TRUST Making digital work by making digital secure
Making digital work by making digital secure MARKET DRIVERS AND CHALLENGES THE ROLE OF IT SECURITY IN THE DIGITAL AGE 2 In today s digital age we see the impact of poor security controls everywhere. Bots
More information