SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
Identity, Security and Risk Management



transforming
risk efficiency
value and
          into


Your business technologists. Powering progress
Securing your business while
maximizing opportunities

“Protecting the          Businesses today are confronted with
 privacy and             a seemingly limitless variety of threats,
 integrity of            including identity theft, organized hacking,
 intellectual property   ever-changing legislative and compliance
 and customer            requirements, data loss, and more.
 information is part     As evidence of this, an online, underground           D
                                                                                igital Security – Using familiar tools
 of bedrock of a         marketplace exists where people can actually
                         buy viruses and Trojans, such as Zeus, and then
                                                                               such as identity management, antivirus,

 modern network          modify them and attack your business in new
                                                                               firewalls, intrusion prevention and other
                                                                               technologies to defend the enterprise from
 enabled business .”
                         ways. These attacks are being conducted by            would-be attackers.
                         coordinated gangs interested chiefly in money,
                         but sometimes espionage as well, and less often       C
                                                                                ompliance and Risk Management
                         these days simply for ‘bragging rights’.              – ensuring that your business is able to
                                                                               evidence alignment with regulatory and
                         Against this ‘threat backdrop’, you are               legislative requirements. Although this can
                         simultaneously being asked to embrace                 involve tools and technology, it is more
                         a multitude of new technologies. Take for             focused on process enabled business
                         example the “Cloud”. This new technology could        controls, governance and staff behaviour.
                         enable business models which may offer your
                         company new revenue streams and innovative          A comprehensive approach is required to
                         ways to control costs, but not without taking       align digital security with compliance and risk
                         some risks. In fact, for many companies,            management and critically to ensure that ‘weak
                         security issues are preventing them from            links’ are avoided. Atos’ approach combines
                         rapidly ‘integrating with the cloud.’               a holistic understanding of security and the
                                                                             regulatory requirements for your industry.
                         But, if you want to take advantage of new           By understanding your business process
                         growth opportunities, how much risk are you         controls and control needs first we ensure that
                         willing to accept, and how do you manage that       your compliance and security investment and
                         risk to the best advantage of your shareholders?    operations are well aligned with your most
                         How do you transform risk into value? Atos can      pressing industry compliance requirements
                         help you do just that.                              and valuable business information assets.
                         We can help you evaluate and balance the risks      Our ultimate goal is to help you to grow
                         involved and find a way of managing those           your business by enabling agile operating
                         risk through your IT, governance and business       model changes which would be too risky
                         processes. And while managing business risk         in a enterprise with less well integrated risk
                         and digital security remains a basic business       management processes. For example by
                         requirement, it is spread across two increasingly   enabling your enterprise to bring a new social
                         complex yet related and growing areas               networking enabled business to market which
                         of concern:                                         could generate millions in additional revenue
                                                                             but which will only deliver upside benefit if the
                                                                             downside risks are well managed. That is what
                                                                             we call ‘transforming risk into value’, enabling
                                                                             you to take the upside benefit whilst reliably
                                                                             managing your downside operational risks.




2                                                                                              Transforming risk into value and efficiency   Transforming risk into value and efficiency   3
It’s all about trust –
governance to regulatory
compliance to digital security
                                                                                                    Through a three-stage cycle of assessment,
                                                                                                    transformation and ongoing management,
                                                                                                                                                          M
                                                                                                                                                           itigate risk by restricting access to sensitive
                                                                                                                                                          data and improving security monitoring              “Anchoring the
                                                                                                    we help your company understand the risks it
                                                                                                    faces and how to manage those risks such that         L
                                                                                                                                                           ower costs by managing complexity and
                                                                                                                                                                                                               capabilities and
                                                                                                    you can leverage new business opportunities.
                                                                                                    For example exposing business processes to
                                                                                                                                                          automating compliance, identity and security
                                                                                                                                                          management procedures
                                                                                                                                                                                                               perspectives
                                                                                                    the web for ecommerce can be a great way of
                                                                                                    opening up a new revenue stream but only if           I
                                                                                                                                                          mprove the agility of your business by
                                                                                                                                                                                                               of regulatory
                                                                                                    the security risks are well managed. We take          providing the right people with access to the        compliance
                                                                                                    an integrated view across an enterprise and
                                                                                                    its business controls, application controls and
                                                                                                                                                          right resources at the right time.
                                                                                                                                                                                                               management and
                                                                                                    infrastructure controls. And because we have
                                                                                                    an in-depth understanding of both the business
                                                                                                                                                        Our capabilities and expertise include:
                                                                                                                                                                                                               digital security
                                                                                                    and IT controls required for effective compliance
                                                                                                    and security we can create a unifiedapproach
                                                                                                                                                          A
                                                                                                                                                           comprehensive understanding of
                                                                                                                                                          regulatory compliance requirements
                                                                                                                                                                                                               together will
                                                                                                    and perspective across your company.                  supported by over 500 experienced business
                                                                                                                                                          consultants and security experts worldwide
                                                                                                                                                                                                               reduce your total
                                                                                                    We help organizations worldwide to address                                                                 cost of compliance
                                                                                                    their most complex compliance and security
                                                                                                    challenges and to:
                                                                                                                                                          A
                                                                                                                                                           proven track record of executing large
                                                                                                                                                          multinational digital compliance and security        and security
                                                                                                      A
                                                                                                       chieve business-driven governance by
                                                                                                                                                          projects in complex IT environments
                                                                                                                                                                                                               management whilst
                                                                                                      automating the enforcement and reporting of         A
                                                                                                                                                           deep understanding of digital identity
                                                                                                                                                          management, for example we manage 17
                                                                                                                                                                                                               improving the
                                                                                                      business policies and compliance mandates
                                                                                                                                                          million secure digital identities for the UK
                                                                                                                                                          Government Gateway Service Portal
                                                                                                                                                                                                               efficiency of both.”
                                                                                                      H
                                                                                                       elp you apply effectively the regulations
                                                                                                      your industry mandates
                                                                                                                                                          A
                                                                                                                                                           trusted forensic security capability which
                                                                                                                                                          includes the operation of state accredited
                                                                                                                                                          security product evaluation centres

                                                                                                                                                          P
                                                                                                                                                           artnerships with world leading security and
                                                                                                                                                          risk management technology providers such
                                                                                                                                                          as McAfee, Oracle, Novell, RSA/EMC
                                                                                                                                                          and Microsoft.



Identity, Security and Risk Management (ISRM)
solutions from Atos enable you to manage your
business risk across your enterprise top to bottom.
We have a long, exemplary history of delivering
highly effective, award winning solutions, tailored
to individual needs. Our solutions have been
deployed at nuclear power stations, for air traffic
control systems and at the Olympic Games.



4                                                     Transforming risk into value and efficiency   Transforming risk into value and efficiency                                                                                       5
Strengthening trust
relationships – eliminating
the weakest link

                                                                                                                                                            Control transformation
                                                                                                                                                            Aligning people, process and technology
                                                                                                                                                            enabled controls with risk appetite




                                                                                                                                                               GRC                  IAB


                                                                                                                                                                     Brand Trust
                                                                                                                                                                      and Value
                                                                                                                                Business                                                                 Risk and
                                                                                                                                Control                                                                  Control
                                                                                                                                Management                                                               Profiling
                                                                                                                                                                STA                 MSS


                                                                                                                                                      Managing controls             Understanding risk
                                                                                                                                                      efficiently,                  exposure appetite
Our approach to Identity, Security and Risk Management (ISRM)                                                                                         consistently and
is based on a simple, three-stage methodology with the goal of                                                                                        reliably across the
                                                                                                                                                      enterprise
reducing risk, growing your business and enabling trust between
your organisation and your industry value chain. The three stages,
as illustrated in the diagram, are Risk and Control Profiling, Control
Transformation, and Business Control Management.




6                                                         Transforming risk into value and efficiency   Transforming risk into value and efficiency                                                                  7
Risk and Control Profiling                         Ongoing Business
                                                       Control Management
    Risk and Control Profiling enables you to
    discover and understand the risks you are          After identifying risks and implementing
    exposed to, or are considering exposure to,        appropriate controls, Atos can offer you
    whilst being able to plan your risk appetite.      ongoing managementof controls and
    The art here is to reduce the volume of            supporting technologies, ensuring an ideal
    unknown, unmeasured threats and unknown            balance amongst compliance requirements,
    control requirements. This process can be          IT security issues and operational expense.
    genuinely enlightening, sometimes revealing        We offer these services via our Managed
    very significant business risks.                   Security Services (MSS) one part of which is
                                                       Atos High Performance Security, which offers
    We support this stage from our Governance,         real-time risk management, event correlation
    Risk and Compliance (GRC) offerings. GRC           and monitoring of your security
    offers methodologies, processes and skilled,       and compliance 24x7x365.
    experienced staff who can measure and
    benchmark risk, providing advice and support
    regarding the business impact and cost of
    treatment of topics such as legislative and
                                                       “Your security
    regulatory control requirements, security
    strategy and more.
                                                       and compliance
                                                       management is
    Control Transformation                             only as strong as
    This stage enables you to change how you
    manage risk by addressing the people, process
                                                       the weakest link.”
    and technology aspects of business controls.
    Our IAB (Identity,Access and Biometrics) and
    STA (Security Technical Advisory) services are
    designed to help you adapt controls to manage
    risk as effectively as possible. We can help you
    improve data privacy by encrypting data on
    mobile devices across the enterprise, or deploy
    identity management technologies to both
    lower costs and improve auditability.

    Other STA and IAB services we offer include
    reducing regulatory compliance costs via IT                                                                       In January 2007, the US retail company TJX announced that
    automation and reducing help desk costs via
    biometric solutions.                                                                                              someone had broken into its payment systems and illegally
                                                                                                                      accessed card data belonging to customers in the US, Canada,
                                                                                                                      Puerto Rico, the UK and Ireland. In filings with the US Securities
                                                                                                                      and Exchange Commission (SEC) in March, the company said
                                                                                                                      “45.6m credit and debit card numbers were stolen over a period
                                                                                                                      of more than 18 months by an unknown number of intruders.”
                                                                                                                      Computer World UK




8                                                                       Transforming risk into value and efficiency   Transforming risk into value and efficiency                          9
Why Atos?


Atos bring together risk management, regulatory
compliance and digital security. We have done         “We help you navigate through
this for Olympic Games, for nuclear power plants
and for air traffic control systems, as well as for
                                                      the challenges of governance, risk
some of the best known companies in the world.
We put our clients first, and work to understand
                                                      management and compliance,
the unique challenges our clients face. We adapt
our solutions to your specific needs and can
                                                      while optimizing available budget.”
provide total security solutions, from consulting
to implementation to ongoing services. We
provide these security services today, to
thousands of clients throughout the world, and
can do the same for you.




     Governance Risk and Compliance                               Security Technical Advisory

     Security Maturity Assessment                                 PCI DSS
     Business Continuity Management                               Vulterability Analysis
     Security Strategy                                            Data Loss Prevention
     Security Awareness Training                                  Cloud Security Assessment Services



     Managed Security Services                                    Identity, Access and Biometrics

     Atos High Performance Security                               Identity Management
     Security Risk Management                                     Help Desk Cost Reduction




10                                                                                            Transforming risk into value and efficiency   Transforming risk into value and efficiency   11
About Atos
Atos is an international information technology
services company with annual 2011 pro
forma revenue of EUR 8.5 billion and 74,000
employees in 48 countries. Serving a global
client base, it delivers hi-tech transactional
services, consulting and technology services,
systems integration and managed services.
With its deep technology expertise and industry
knowledge, it works with clients across the
following market sectors: Manufacturing, Retail,
Services; Public, Health  Transports; Financial
Services; Telecoms, Media  Technology;
Energy  Utilities.

Atos is focused on business technology that
powers progress and helps organizations to
create their firm of the future. It is the Worldwide
Information Technology Partner for the Olympic
and Paralympic Games and is quoted on the
Paris Eurolist Market. Atos operates under the
brands Atos, Atos Consulting  Technology
Services, Atos Worldline and Atos Worldgrid.
For more information, visit: atos.net




For more information:
Please contact dialogue@atos.net

                 Atos, the Atos logo, Atos Consulting, Atos Worldline, Atos Sphere, Atos Cloud, Atos Healthcare (in the UK) and Atos Worldgrid are registered trademarks of Atos SA.
atos.net         May 2012© 2012 Atos.

Contenu connexe

Dernier

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Dernier (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

En vedette

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

En vedette (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

London 2012 brochure - Identity, Security and Risk Management

  • 1. Identity, Security and Risk Management transforming risk efficiency value and into Your business technologists. Powering progress
  • 2. Securing your business while maximizing opportunities “Protecting the Businesses today are confronted with privacy and a seemingly limitless variety of threats, integrity of including identity theft, organized hacking, intellectual property ever-changing legislative and compliance and customer requirements, data loss, and more. information is part As evidence of this, an online, underground D igital Security – Using familiar tools of bedrock of a marketplace exists where people can actually buy viruses and Trojans, such as Zeus, and then such as identity management, antivirus, modern network modify them and attack your business in new firewalls, intrusion prevention and other technologies to defend the enterprise from enabled business .” ways. These attacks are being conducted by would-be attackers. coordinated gangs interested chiefly in money, but sometimes espionage as well, and less often C ompliance and Risk Management these days simply for ‘bragging rights’. – ensuring that your business is able to evidence alignment with regulatory and Against this ‘threat backdrop’, you are legislative requirements. Although this can simultaneously being asked to embrace involve tools and technology, it is more a multitude of new technologies. Take for focused on process enabled business example the “Cloud”. This new technology could controls, governance and staff behaviour. enable business models which may offer your company new revenue streams and innovative A comprehensive approach is required to ways to control costs, but not without taking align digital security with compliance and risk some risks. In fact, for many companies, management and critically to ensure that ‘weak security issues are preventing them from links’ are avoided. Atos’ approach combines rapidly ‘integrating with the cloud.’ a holistic understanding of security and the regulatory requirements for your industry. But, if you want to take advantage of new By understanding your business process growth opportunities, how much risk are you controls and control needs first we ensure that willing to accept, and how do you manage that your compliance and security investment and risk to the best advantage of your shareholders? operations are well aligned with your most How do you transform risk into value? Atos can pressing industry compliance requirements help you do just that. and valuable business information assets. We can help you evaluate and balance the risks Our ultimate goal is to help you to grow involved and find a way of managing those your business by enabling agile operating risk through your IT, governance and business model changes which would be too risky processes. And while managing business risk in a enterprise with less well integrated risk and digital security remains a basic business management processes. For example by requirement, it is spread across two increasingly enabling your enterprise to bring a new social complex yet related and growing areas networking enabled business to market which of concern: could generate millions in additional revenue but which will only deliver upside benefit if the downside risks are well managed. That is what we call ‘transforming risk into value’, enabling you to take the upside benefit whilst reliably managing your downside operational risks. 2 Transforming risk into value and efficiency Transforming risk into value and efficiency 3
  • 3. It’s all about trust – governance to regulatory compliance to digital security Through a three-stage cycle of assessment, transformation and ongoing management, M itigate risk by restricting access to sensitive data and improving security monitoring “Anchoring the we help your company understand the risks it faces and how to manage those risks such that L ower costs by managing complexity and capabilities and you can leverage new business opportunities. For example exposing business processes to automating compliance, identity and security management procedures perspectives the web for ecommerce can be a great way of opening up a new revenue stream but only if I mprove the agility of your business by of regulatory the security risks are well managed. We take providing the right people with access to the compliance an integrated view across an enterprise and its business controls, application controls and right resources at the right time. management and infrastructure controls. And because we have an in-depth understanding of both the business Our capabilities and expertise include: digital security and IT controls required for effective compliance and security we can create a unifiedapproach A comprehensive understanding of regulatory compliance requirements together will and perspective across your company. supported by over 500 experienced business consultants and security experts worldwide reduce your total We help organizations worldwide to address cost of compliance their most complex compliance and security challenges and to: A proven track record of executing large multinational digital compliance and security and security A chieve business-driven governance by projects in complex IT environments management whilst automating the enforcement and reporting of A deep understanding of digital identity management, for example we manage 17 improving the business policies and compliance mandates million secure digital identities for the UK Government Gateway Service Portal efficiency of both.” H elp you apply effectively the regulations your industry mandates A trusted forensic security capability which includes the operation of state accredited security product evaluation centres P artnerships with world leading security and risk management technology providers such as McAfee, Oracle, Novell, RSA/EMC and Microsoft. Identity, Security and Risk Management (ISRM) solutions from Atos enable you to manage your business risk across your enterprise top to bottom. We have a long, exemplary history of delivering highly effective, award winning solutions, tailored to individual needs. Our solutions have been deployed at nuclear power stations, for air traffic control systems and at the Olympic Games. 4 Transforming risk into value and efficiency Transforming risk into value and efficiency 5
  • 4. Strengthening trust relationships – eliminating the weakest link Control transformation Aligning people, process and technology enabled controls with risk appetite GRC IAB Brand Trust and Value Business Risk and Control Control Management Profiling STA MSS Managing controls Understanding risk efficiently, exposure appetite Our approach to Identity, Security and Risk Management (ISRM) consistently and is based on a simple, three-stage methodology with the goal of reliably across the enterprise reducing risk, growing your business and enabling trust between your organisation and your industry value chain. The three stages, as illustrated in the diagram, are Risk and Control Profiling, Control Transformation, and Business Control Management. 6 Transforming risk into value and efficiency Transforming risk into value and efficiency 7
  • 5. Risk and Control Profiling Ongoing Business Control Management Risk and Control Profiling enables you to discover and understand the risks you are After identifying risks and implementing exposed to, or are considering exposure to, appropriate controls, Atos can offer you whilst being able to plan your risk appetite. ongoing managementof controls and The art here is to reduce the volume of supporting technologies, ensuring an ideal unknown, unmeasured threats and unknown balance amongst compliance requirements, control requirements. This process can be IT security issues and operational expense. genuinely enlightening, sometimes revealing We offer these services via our Managed very significant business risks. Security Services (MSS) one part of which is Atos High Performance Security, which offers We support this stage from our Governance, real-time risk management, event correlation Risk and Compliance (GRC) offerings. GRC and monitoring of your security offers methodologies, processes and skilled, and compliance 24x7x365. experienced staff who can measure and benchmark risk, providing advice and support regarding the business impact and cost of treatment of topics such as legislative and “Your security regulatory control requirements, security strategy and more. and compliance management is Control Transformation only as strong as This stage enables you to change how you manage risk by addressing the people, process the weakest link.” and technology aspects of business controls. Our IAB (Identity,Access and Biometrics) and STA (Security Technical Advisory) services are designed to help you adapt controls to manage risk as effectively as possible. We can help you improve data privacy by encrypting data on mobile devices across the enterprise, or deploy identity management technologies to both lower costs and improve auditability. Other STA and IAB services we offer include reducing regulatory compliance costs via IT In January 2007, the US retail company TJX announced that automation and reducing help desk costs via biometric solutions. someone had broken into its payment systems and illegally accessed card data belonging to customers in the US, Canada, Puerto Rico, the UK and Ireland. In filings with the US Securities and Exchange Commission (SEC) in March, the company said “45.6m credit and debit card numbers were stolen over a period of more than 18 months by an unknown number of intruders.” Computer World UK 8 Transforming risk into value and efficiency Transforming risk into value and efficiency 9
  • 6. Why Atos? Atos bring together risk management, regulatory compliance and digital security. We have done “We help you navigate through this for Olympic Games, for nuclear power plants and for air traffic control systems, as well as for the challenges of governance, risk some of the best known companies in the world. We put our clients first, and work to understand management and compliance, the unique challenges our clients face. We adapt our solutions to your specific needs and can while optimizing available budget.” provide total security solutions, from consulting to implementation to ongoing services. We provide these security services today, to thousands of clients throughout the world, and can do the same for you. Governance Risk and Compliance Security Technical Advisory Security Maturity Assessment PCI DSS Business Continuity Management Vulterability Analysis Security Strategy Data Loss Prevention Security Awareness Training Cloud Security Assessment Services Managed Security Services Identity, Access and Biometrics Atos High Performance Security Identity Management Security Risk Management Help Desk Cost Reduction 10 Transforming risk into value and efficiency Transforming risk into value and efficiency 11
  • 7. About Atos Atos is an international information technology services company with annual 2011 pro forma revenue of EUR 8.5 billion and 74,000 employees in 48 countries. Serving a global client base, it delivers hi-tech transactional services, consulting and technology services, systems integration and managed services. With its deep technology expertise and industry knowledge, it works with clients across the following market sectors: Manufacturing, Retail, Services; Public, Health Transports; Financial Services; Telecoms, Media Technology; Energy Utilities. Atos is focused on business technology that powers progress and helps organizations to create their firm of the future. It is the Worldwide Information Technology Partner for the Olympic and Paralympic Games and is quoted on the Paris Eurolist Market. Atos operates under the brands Atos, Atos Consulting Technology Services, Atos Worldline and Atos Worldgrid. For more information, visit: atos.net For more information: Please contact dialogue@atos.net Atos, the Atos logo, Atos Consulting, Atos Worldline, Atos Sphere, Atos Cloud, Atos Healthcare (in the UK) and Atos Worldgrid are registered trademarks of Atos SA. atos.net May 2012© 2012 Atos.