Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.

Fujitsu Enterprise and Cyber Security

1 215 vues

Publié le

Business globalization increases ever faster. Global use of various communication technologies and new device classes pose many security threats to modern enterprises. A company is not only liable for its own data, but also for that of its customers and business partners. Mobility and advanced security solutions are vital in the new digital world. Fujitsu listens to requests and security requirements and offers proven security solutions on different scales for different demands.

Speakers:

Mr. David Robinson (Fujitsu UK&I)

  • Soyez le premier à commenter

  • Soyez le premier à aimer ceci

Fujitsu Enterprise and Cyber Security

  1. 1. 1 Copyright 2014 FUJITSU Human Centric Innovation Fujitsu Forum2014 ICM Munich19th –20th November
  2. 2. 2 Copyright 2014 FUJITSU Enterprise and Cyber Security David Robinson Fujitsu Enterprise & Cyber Security, UK&I Robert Norris Director -FujitsuEnterprise & Cyber Security, UK&I
  3. 3. COMMERCIAL IN CONFIDENCE © Copyright 2014 FUJITSU Today’s security landscape THREATS Government sponsored Terrorism Hacktivist Disgruntled insider Organised crime Lack of continuity strategy COUNTERMEASURES Regulation / compliance Proactive & reactive Technology / service Identity & access Monitoring / response Information sharing Governance & strategy Policy ACCIDENTAL ORDELIBERATE VULNERABILITIES PROCESS TECHNOLOGY IMPACT REPUTATION ASSETS PEOPLE REVENUE
  4. 4. Organised crime Ebayusers to reset passwords after hacking 150 million Home Depot payment cards exposed in data breach 56 million COMMERCIAL IN CONFIDENCE © Copyright 2014 Fujitsu Services Limited
  5. 5. Government sponsored attacks Wanted by the FBI Intellectual Property Malware COMMERCIAL IN CONFIDENCE © Copyright 2014 FUJITSU
  6. 6. Company goes bust after external hack attack BBC News ‘MtGoxbitcoin exchange files for bankruptcy’ BBC News ‘Bitcoin exchange halts withdrawals after cyber-attack’ COMMERCIAL IN CONFIDENCE © Copyright 2014 FUJITSU
  7. 7. Good news –People are being caught US cyber-thief gets 20-year jail term The longest ever sentence for computer criminal 17 men arrested in UK Part of a worldwide crackdown on malware COMMERCIAL IN CONFIDENCE © Copyright 2014 FUJITSU
  8. 8. Target CEO out after massive cyber attack 40 mn credit card details stolen 110 mn bits of customer data stolen $61mn loss in fourth quarter Bad news –People are losing their jobs COMMERCIAL IN CONFIDENCE © Copyright 2014 FUJITSU
  9. 9. COMMERCIAL IN CONFIDENCE © Copyright 2014 FUJITSU Increasing external pressures Advanced threats Hacktivism Information overload Lack of visibility Too reactive Complex environments
  10. 10. COMMERCIAL IN CONFIDENCE © Copyright 2014 FUJITSU Increasing internal pressures Advanced threats Hacktivism Information overload Lack of visibility Too reactive Complex environments Are we secure? What happens if…? Reduce costs More clarity Consolidation Align security to the business
  11. 11. COMMERCIAL IN CONFIDENCE © Copyright 2014 FUJITSU How do you answer these questions? How do you get there in a structured way? How capable is your business to face today’s threats? How do you determine where you need to be?
  12. 12. COMMERCIAL IN CONFIDENCE © Copyright 2014 FUJITSU How to plan and react CONTEXT BE PROACTIVE RELEVANCE
  13. 13. COMMERCIAL IN CONFIDENCE © Copyright 2014 FUJITSU Core security management processes Device Incident Compliance Vulnerability Risk Continuity
  14. 14. COMMERCIAL IN CONFIDENCE © Copyright 2014 FUJITSU A business driven approach to information security
  15. 15. COMMERCIAL IN CONFIDENCE © Copyright 2014 FUJITSU Maturity improvement Discover Assess Define Develop Programme Inputs: •Stakeholders •Business Strategy •Objectives Scope Changing Business Objectives Identify Enable Improve Optimise Ongoing Maturity Development Lack of maturity, structure & efficiency Increased maturity, consistency & agility
  16. 16. COMMERCIAL IN CONFIDENCE © Copyright 2014 FUJITSU Summary CONTEXT RELEVANCE BE PROACTIVE
  17. 17. COMMERCIAL IN CONFIDENCE © Copyright 2014 FUJITSU Professional Services Unparalleled Skills & Experience Take advantage of our experts from Information Assurance (CLAS) to Technical Design, Implementation, and Continuity. How we secure our customers Products Strong OEM Relationships Long standing vendor relationships to provide our customers with fit-for-purpose, best-of-breed technology. Managed Services Keeping You Secure, 24x7x365 Advanced security operations keep our customers secure, with service levels to meet any requirement from adhoc support to fully managed.
  18. 18. COMMERCIAL IN CONFIDENCE © Copyright 2014 FUJITSU 40+ Year History in design &delivery of large scale, cyber security services Highest Partner Accreditations Operating in Public and Private sector, and National Defence Businesses R&D Capability – developing/delivering Fujitsu security products, e.g. PalmSecure 5 GlobalSecurity Operations Centres operating to highest National Government security levels 1000+ Security professionals Fujitsu Global Capability 31 IDS/IPS Data Loss Prevention Web & email security End point protection Firewalls Palm Vein Products Cloud Assessment Training & Awareness Technical Design DLP Assessment Continuity & Security Consultancy 3rd Line Support Advanced Cyber Ops SIEM Vulnerability Management Identity & Access Mgmt Consult & Services
  19. 19. COMMERCIAL IN CONFIDENCE © Copyright 2014 FUJITSU Technology partners Some of Fujitsu Security Partners
  20. 20. COMMERCIAL IN CONFIDENCE © Copyright 2014 FUJITSU Call Out – Key Take Away Understand SECURITY CONTEXT RELEVANCE To your Business BE PROACTIVE Threat Landscape Constantly Evolves Work with Fujitsu or one of our many partners to help you protect your business.
  21. 21. COMMERCIAL IN CONFIDENCE © Copyright 2014 FUJITSU Questions ?

×