SlideShare une entreprise Scribd logo
1  sur  10
Cyber Defense
Alessandro Menna
Cyber Security & Information Assurance
Monday 17th of June
Main customers in home markets
Cyber Security &
Defense
Customs
Ministry of InteriorsNational Securities
Postal services
Other Public Institutions
ATC autohority
Banking / Finance
SMB and large
enterprises
Civil Protection /
Emergency Services
Public
Administrations
MoDs
Telecom Operators
Cyber Defense: a multidimensional issue
User
segments
DoDs, NATO &
EU
Other
Government Dep.
Critical
National
Infrastructures
Large and
medium
Enterprises
Dep. of
Interiors
+
-Complexity of cyber security issue
information
to protect
Classified
Unclassified
Unclassified
Cyber
domain
Protect
Intelligence
Exploitation
Mission
To be a leading worldwide player in the Cyber Defense sector and the trusted partner
to NATO, Italy Government, and UK Government.
Grow further on the international market for Cyber Security for Government, Professional and
Enterprise customers.
IA Professional
Services
(Security governance,
certification, training)
IA Products and
solutions for secure
radio
communications and
navigation
 Security Operation Center
 Services for cyber intelligence based on High Performance Computing platform
 Security Consulting, VA, Secure Architecture
 Integrated solution for lawful interception of IP and telephonic communications
 Information Assurance: new generation Crypto systems, EKMS, secure telephone
Cyber Security, Defense Information Assurance
Our role in Cyber Security & Defense
Cyber Security
Solutions
Managed Security
Services (SOC)
Intelligence &
Analysis
Competences and capabilities
Physical
Networks
Force Protection
Influence
Protection
Physical Activity
Computer
Activity
Electromagnetic
Spectrum
Activity
Influence Activity
Logical
NetworksNetworks
Physical
Networks
Infrastructure
Cyber User/ Organization
Force Protection
Influence
Protection
Asset / Organization Protection
Intelligence
ProtectionWireless
e.g. Social Networks
Processes, governace and asset risk analysis
Access control systems and intrution identification
Infrastructures for physical security monitoring and management
Cyber Intelligence (e.g. massive data analytics; fraud prevention,
analysis of massive social networks )
MSS
Infrastructures for security
Own products, solutions for
network and data protection
(e.g. MILS gateways; cryptos;
network detection tool; TEM)
Specialist support:
Remediation, IRT, malware
analysis, computer forensics,
consultancy
Lawful interception
systems;
Spectrum monitoring,
protection and
jamming systems
Secure navigation
systems
Secure radio
communications
Routes
to Market
A flexible Business Model
Consultancy
& Security assessment
System / product design
and integration
Service Provision
(outsourced security)
Training and other
ancillary services
Plan
Design
Implement
Manage &
TLCM
Support
System /
product
development
lifecycle
Certification Security project lifecycle Business Models
Market
segment
Offering model
Other
Government
Dep. Critical
National
Infrastructures
Dep. of
Defense, NATO
Enterprises
- +
“Managed service”
orientation
Standalone
solutions and
products
Hybrid solutions
Solutions +
co-sourcing
Full outsourced security
services / standalone
security services
Consulting, Engineering support, TLCM
Customer
Partners
Platform
integrators
SELEX
1
2
3
2
Discovery Phase Remediation Design
Remediation
Implementation
Analysis
&
Report
Our approach to the discovery
of vulnerabilities and remediation
Realtime Security Monitoring & Investigation
ICT Infrastructure Analysis and
network probes positioningSecurity
Assessment
Interview
Rapid, real-time incident response intervention available 24/7
Detect
Understand
Define a
remediation
strategy
Implement the
Strategy
Prevention plan
• Monitoring all the traffic on the network
in order di identify the malware
communications, its propagation and
the enemy's command and control
activities
• Monitoring all executable file on all the
host (clients and servers) of the IT
System in order to identify when an
unknow program is running
• Collecting all the alerts from the
network/hosts in a SIEM (Security
Information and Event Management,
in order to create a real time situation
awareness picture
• Merging this picture with the Dynamic
risk management system, asset
inventory System and Cyber-
Intelligence information
•
• Defining the best stategy based on a
Decision Support System
• Using an host-based agent which
runs on each host in the IT System
and that is able to remove a
malware instantly from all the hosts
• Changing configurations on the
prevention tools (firewall, proxy,
...) and adding new rules on the
nerwork monitoring system
Network
Threat
Detector
Trusted
Execution
Monitor
Threat
Lab
Security
Operation
Center
Fighting against cyber threats
Analysis of Massive Social Networks:
• Social network information evolution;
• Social dynamics;
• Computer threat propagation.
Massive Data Analytics:
• Business Analysis;
• Anomaly Detection;
• Information Security trends and
forecasts;
• Knowledge discovery.
Network Analysis for Intelligence and
Surveillances:
• Information collection and analysis;
• Pattern Identification
• Anomaly detection
Cyber Intelligence highlights
Security Operation Centre (SOC)
to monitor and react fast
and properly to IT incident
Security
Operation Center
Utilize cyber
intelligence
services to stay
ahead of the
hackers
community

Contenu connexe

Tendances

HighBeam-Research-Article-DEC-02-2014
HighBeam-Research-Article-DEC-02-2014HighBeam-Research-Article-DEC-02-2014
HighBeam-Research-Article-DEC-02-2014
Siddharth Phadnis
 
Wouter Joossen - IBBT Security departement
Wouter Joossen - IBBT Security departementWouter Joossen - IBBT Security departement
Wouter Joossen - IBBT Security departement
imec.archive
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01
ITNet
 

Tendances (20)

Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Lesson 1 - Technical Controls
Lesson 1 - Technical ControlsLesson 1 - Technical Controls
Lesson 1 - Technical Controls
 
Security in Mobile Computing
Security in Mobile ComputingSecurity in Mobile Computing
Security in Mobile Computing
 
HighBeam-Research-Article-DEC-02-2014
HighBeam-Research-Article-DEC-02-2014HighBeam-Research-Article-DEC-02-2014
HighBeam-Research-Article-DEC-02-2014
 
Lesson 1- Risk Managment
Lesson 1- Risk ManagmentLesson 1- Risk Managment
Lesson 1- Risk Managment
 
Lessson 2 - Application Layer
Lessson 2 - Application LayerLessson 2 - Application Layer
Lessson 2 - Application Layer
 
Lesson 1 - Introduction
Lesson 1 - Introduction Lesson 1 - Introduction
Lesson 1 - Introduction
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Wouter Joossen - IBBT Security departement
Wouter Joossen - IBBT Security departementWouter Joossen - IBBT Security departement
Wouter Joossen - IBBT Security departement
 
Cybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesCybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized Businesses
 
10 the-finstix-data-model
10 the-finstix-data-model10 the-finstix-data-model
10 the-finstix-data-model
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01
 
Lesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPSLesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPS
 
Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 
Lesson 4
Lesson 4Lesson 4
Lesson 4
 
The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information Security
 
Cybersecurity Summit AHR20 Recover Tridium
Cybersecurity Summit AHR20 Recover TridiumCybersecurity Summit AHR20 Recover Tridium
Cybersecurity Summit AHR20 Recover Tridium
 
Lesson 1- Intrusion Detection
Lesson 1- Intrusion DetectionLesson 1- Intrusion Detection
Lesson 1- Intrusion Detection
 

En vedette

Cyber Security, Why It's important To You
Cyber Security, Why It's important To YouCyber Security, Why It's important To You
Cyber Security, Why It's important To You
Ronald E. Laub Jr
 
01 orthokeratology children chan
01  orthokeratology children chan01  orthokeratology children chan
01 orthokeratology children chan
ortokextremadura
 
HoneySpider Network: a Java based system to hunt down malicious websites
HoneySpider Network: a Java based system to hunt down malicious websitesHoneySpider Network: a Java based system to hunt down malicious websites
HoneySpider Network: a Java based system to hunt down malicious websites
NLJUG
 
Newsletter N°14 Mes de Junio
Newsletter N°14 Mes de JunioNewsletter N°14 Mes de Junio
Newsletter N°14 Mes de Junio
West Lubricantes
 
Alfresco DevCon 2011. Implementing eGov Portal. Powered by Alfresco and Orbeon
Alfresco DevCon 2011. Implementing eGov Portal. Powered by Alfresco and OrbeonAlfresco DevCon 2011. Implementing eGov Portal. Powered by Alfresco and Orbeon
Alfresco DevCon 2011. Implementing eGov Portal. Powered by Alfresco and Orbeon
Oksana Kurysheva
 

En vedette (20)

Sistema Paese Italia e Cyber Security : un nuovo scenario di interazione tra ...
Sistema Paese Italia e Cyber Security : un nuovo scenario di interazione tra ...Sistema Paese Italia e Cyber Security : un nuovo scenario di interazione tra ...
Sistema Paese Italia e Cyber Security : un nuovo scenario di interazione tra ...
 
Contrato de arrendamiento
Contrato de arrendamientoContrato de arrendamiento
Contrato de arrendamiento
 
Company profile twa
Company profile twaCompany profile twa
Company profile twa
 
Cyber Security, Why It's important To You
Cyber Security, Why It's important To YouCyber Security, Why It's important To You
Cyber Security, Why It's important To You
 
01 orthokeratology children chan
01  orthokeratology children chan01  orthokeratology children chan
01 orthokeratology children chan
 
Desarrollo de software seguro: una visión con OpenSAMM
Desarrollo de software seguro: una visión con OpenSAMMDesarrollo de software seguro: una visión con OpenSAMM
Desarrollo de software seguro: una visión con OpenSAMM
 
HoneySpider Network: a Java based system to hunt down malicious websites
HoneySpider Network: a Java based system to hunt down malicious websitesHoneySpider Network: a Java based system to hunt down malicious websites
HoneySpider Network: a Java based system to hunt down malicious websites
 
Fac pubmed
Fac   pubmedFac   pubmed
Fac pubmed
 
3. STAY IN Newsletter
3. STAY IN Newsletter3. STAY IN Newsletter
3. STAY IN Newsletter
 
Introduction to Elasticsearch
Introduction to ElasticsearchIntroduction to Elasticsearch
Introduction to Elasticsearch
 
Plan de Competitividad de Turismo Activo. Sierra de Gredos y Valle de Iruelas...
Plan de Competitividad de Turismo Activo. Sierra de Gredos y Valle de Iruelas...Plan de Competitividad de Turismo Activo. Sierra de Gredos y Valle de Iruelas...
Plan de Competitividad de Turismo Activo. Sierra de Gredos y Valle de Iruelas...
 
Version cd web definitiva
Version cd web definitivaVersion cd web definitiva
Version cd web definitiva
 
LatinMarket
LatinMarketLatinMarket
LatinMarket
 
Group office
Group officeGroup office
Group office
 
Newsletter N°14 Mes de Junio
Newsletter N°14 Mes de JunioNewsletter N°14 Mes de Junio
Newsletter N°14 Mes de Junio
 
El algodón engaña. Nuestro algodón Fox Fibre Cologranic, no.
El algodón engaña. Nuestro algodón Fox Fibre Cologranic, no.El algodón engaña. Nuestro algodón Fox Fibre Cologranic, no.
El algodón engaña. Nuestro algodón Fox Fibre Cologranic, no.
 
Codemotion Mad 2014 - Things I love seeing when I buy something online - Brai...
Codemotion Mad 2014 - Things I love seeing when I buy something online - Brai...Codemotion Mad 2014 - Things I love seeing when I buy something online - Brai...
Codemotion Mad 2014 - Things I love seeing when I buy something online - Brai...
 
Luxury surface
Luxury surfaceLuxury surface
Luxury surface
 
M3 Sistema de rastreo vehicular
M3 Sistema de rastreo vehicularM3 Sistema de rastreo vehicular
M3 Sistema de rastreo vehicular
 
Alfresco DevCon 2011. Implementing eGov Portal. Powered by Alfresco and Orbeon
Alfresco DevCon 2011. Implementing eGov Portal. Powered by Alfresco and OrbeonAlfresco DevCon 2011. Implementing eGov Portal. Powered by Alfresco and Orbeon
Alfresco DevCon 2011. Implementing eGov Portal. Powered by Alfresco and Orbeon
 

Similaire à Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna

Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Arrow ECS UK
 
Achieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseAchieving Data Privacy in the Enterprise
Achieving Data Privacy in the Enterprise
SafeNet
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Andris Soroka
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
ethnos
 

Similaire à Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna (20)

Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
IT Network Security Services
IT Network Security ServicesIT Network Security Services
IT Network Security Services
 
Achieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseAchieving Data Privacy in the Enterprise
Achieving Data Privacy in the Enterprise
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
ITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet ENITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet EN
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
 
Top Cyber Security Companies: Protecting Your Digital Assets
Top Cyber Security Companies: Protecting Your Digital AssetsTop Cyber Security Companies: Protecting Your Digital Assets
Top Cyber Security Companies: Protecting Your Digital Assets
 
Top Cyber Security Companies: Protecting Your Digital Assets
Top Cyber Security Companies: Protecting Your Digital AssetsTop Cyber Security Companies: Protecting Your Digital Assets
Top Cyber Security Companies: Protecting Your Digital Assets
 
Top Cyber Security Companies: Protecting Your Digital Assets
Top Cyber Security Companies: Protecting Your Digital AssetsTop Cyber Security Companies: Protecting Your Digital Assets
Top Cyber Security Companies: Protecting Your Digital Assets
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
 
Custom defense - Blake final
Custom defense  - Blake finalCustom defense  - Blake final
Custom defense - Blake final
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Age
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service
 
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdfHow Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
 

Plus de Leonardo

Plus de Leonardo (20)

The Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results PresentationThe Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results Presentation
 
Leonardo - Technologies for a Safer Future.pdf
Leonardo - Technologies for a Safer Future.pdfLeonardo - Technologies for a Safer Future.pdf
Leonardo - Technologies for a Safer Future.pdf
 
The Leonardo FY 2023 Preliminary Results Presentation
The Leonardo FY 2023 Preliminary Results PresentationThe Leonardo FY 2023 Preliminary Results Presentation
The Leonardo FY 2023 Preliminary Results Presentation
 
Leonardo 3Q/9M Results Presentation
Leonardo 3Q/9M Results PresentationLeonardo 3Q/9M Results Presentation
Leonardo 3Q/9M Results Presentation
 
Leonardo 1H 2023 Results
Leonardo 1H 2023 ResultsLeonardo 1H 2023 Results
Leonardo 1H 2023 Results
 
Leonardo 1Q 2023 Results
Leonardo 1Q 2023 ResultsLeonardo 1Q 2023 Results
Leonardo 1Q 2023 Results
 
Leonardo FY 2022 Results
Leonardo FY 2022 ResultsLeonardo FY 2022 Results
Leonardo FY 2022 Results
 
Leonardo 3Q/9M 2022 Results
Leonardo 3Q/9M 2022 ResultsLeonardo 3Q/9M 2022 Results
Leonardo 3Q/9M 2022 Results
 
Leonardo 2Q/1H2022 Results Presentation
Leonardo 2Q/1H2022 Results PresentationLeonardo 2Q/1H2022 Results Presentation
Leonardo 2Q/1H2022 Results Presentation
 
1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates
1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates
1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates
 
1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...
1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...
1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...
 
Leonardo 1Q 2022 Results
Leonardo 1Q 2022 ResultsLeonardo 1Q 2022 Results
Leonardo 1Q 2022 Results
 
Leonardo FY2021 Results
Leonardo FY2021 ResultsLeonardo FY2021 Results
Leonardo FY2021 Results
 
European Rotors - Certification by Simulation
European Rotors - Certification by SimulationEuropean Rotors - Certification by Simulation
European Rotors - Certification by Simulation
 
European Rotors - Mission Management System’s Capabilities for Law Enforcemen...
European Rotors - Mission Management System’s Capabilities for Law Enforcemen...European Rotors - Mission Management System’s Capabilities for Law Enforcemen...
European Rotors - Mission Management System’s Capabilities for Law Enforcemen...
 
European Rotors - Rotorcraft and VTOL Symposium
European Rotors - Rotorcraft and VTOL SymposiumEuropean Rotors - Rotorcraft and VTOL Symposium
European Rotors - Rotorcraft and VTOL Symposium
 
European Rotors - Contributing to the Swiss Innovation Day
European Rotors - Contributing to the Swiss Innovation Day European Rotors - Contributing to the Swiss Innovation Day
European Rotors - Contributing to the Swiss Innovation Day
 
European Rotors - Helioffshore panel on Sustainable Aviation Fuel
European Rotors - Helioffshore panel on Sustainable Aviation FuelEuropean Rotors - Helioffshore panel on Sustainable Aviation Fuel
European Rotors - Helioffshore panel on Sustainable Aviation Fuel
 
European Rotors - PBN and GNSS for Rotorcraft Operations
European Rotors - PBN and GNSS for Rotorcraft OperationsEuropean Rotors - PBN and GNSS for Rotorcraft Operations
European Rotors - PBN and GNSS for Rotorcraft Operations
 
European Rotors - AW609 for HEMS Market
European Rotors - AW609 for HEMS MarketEuropean Rotors - AW609 for HEMS Market
European Rotors - AW609 for HEMS Market
 

Dernier

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna

  • 1. Cyber Defense Alessandro Menna Cyber Security & Information Assurance Monday 17th of June
  • 2. Main customers in home markets Cyber Security & Defense Customs Ministry of InteriorsNational Securities Postal services Other Public Institutions ATC autohority Banking / Finance SMB and large enterprises Civil Protection / Emergency Services Public Administrations MoDs Telecom Operators
  • 3. Cyber Defense: a multidimensional issue User segments DoDs, NATO & EU Other Government Dep. Critical National Infrastructures Large and medium Enterprises Dep. of Interiors + -Complexity of cyber security issue information to protect Classified Unclassified Unclassified Cyber domain Protect Intelligence Exploitation
  • 4. Mission To be a leading worldwide player in the Cyber Defense sector and the trusted partner to NATO, Italy Government, and UK Government. Grow further on the international market for Cyber Security for Government, Professional and Enterprise customers. IA Professional Services (Security governance, certification, training) IA Products and solutions for secure radio communications and navigation  Security Operation Center  Services for cyber intelligence based on High Performance Computing platform  Security Consulting, VA, Secure Architecture  Integrated solution for lawful interception of IP and telephonic communications  Information Assurance: new generation Crypto systems, EKMS, secure telephone Cyber Security, Defense Information Assurance Our role in Cyber Security & Defense Cyber Security Solutions Managed Security Services (SOC) Intelligence & Analysis
  • 5. Competences and capabilities Physical Networks Force Protection Influence Protection Physical Activity Computer Activity Electromagnetic Spectrum Activity Influence Activity Logical NetworksNetworks Physical Networks Infrastructure Cyber User/ Organization Force Protection Influence Protection Asset / Organization Protection Intelligence ProtectionWireless e.g. Social Networks Processes, governace and asset risk analysis Access control systems and intrution identification Infrastructures for physical security monitoring and management Cyber Intelligence (e.g. massive data analytics; fraud prevention, analysis of massive social networks ) MSS Infrastructures for security Own products, solutions for network and data protection (e.g. MILS gateways; cryptos; network detection tool; TEM) Specialist support: Remediation, IRT, malware analysis, computer forensics, consultancy Lawful interception systems; Spectrum monitoring, protection and jamming systems Secure navigation systems Secure radio communications
  • 6. Routes to Market A flexible Business Model Consultancy & Security assessment System / product design and integration Service Provision (outsourced security) Training and other ancillary services Plan Design Implement Manage & TLCM Support System / product development lifecycle Certification Security project lifecycle Business Models Market segment Offering model Other Government Dep. Critical National Infrastructures Dep. of Defense, NATO Enterprises - + “Managed service” orientation Standalone solutions and products Hybrid solutions Solutions + co-sourcing Full outsourced security services / standalone security services Consulting, Engineering support, TLCM Customer Partners Platform integrators SELEX 1 2 3 2
  • 7. Discovery Phase Remediation Design Remediation Implementation Analysis & Report Our approach to the discovery of vulnerabilities and remediation Realtime Security Monitoring & Investigation ICT Infrastructure Analysis and network probes positioningSecurity Assessment Interview Rapid, real-time incident response intervention available 24/7
  • 8. Detect Understand Define a remediation strategy Implement the Strategy Prevention plan • Monitoring all the traffic on the network in order di identify the malware communications, its propagation and the enemy's command and control activities • Monitoring all executable file on all the host (clients and servers) of the IT System in order to identify when an unknow program is running • Collecting all the alerts from the network/hosts in a SIEM (Security Information and Event Management, in order to create a real time situation awareness picture • Merging this picture with the Dynamic risk management system, asset inventory System and Cyber- Intelligence information • • Defining the best stategy based on a Decision Support System • Using an host-based agent which runs on each host in the IT System and that is able to remove a malware instantly from all the hosts • Changing configurations on the prevention tools (firewall, proxy, ...) and adding new rules on the nerwork monitoring system Network Threat Detector Trusted Execution Monitor Threat Lab Security Operation Center Fighting against cyber threats
  • 9. Analysis of Massive Social Networks: • Social network information evolution; • Social dynamics; • Computer threat propagation. Massive Data Analytics: • Business Analysis; • Anomaly Detection; • Information Security trends and forecasts; • Knowledge discovery. Network Analysis for Intelligence and Surveillances: • Information collection and analysis; • Pattern Identification • Anomaly detection Cyber Intelligence highlights
  • 10. Security Operation Centre (SOC) to monitor and react fast and properly to IT incident Security Operation Center Utilize cyber intelligence services to stay ahead of the hackers community