2. Main customers in home markets
Cyber Security &
Defense
Customs
Ministry of InteriorsNational Securities
Postal services
Other Public Institutions
ATC autohority
Banking / Finance
SMB and large
enterprises
Civil Protection /
Emergency Services
Public
Administrations
MoDs
Telecom Operators
3. Cyber Defense: a multidimensional issue
User
segments
DoDs, NATO &
EU
Other
Government Dep.
Critical
National
Infrastructures
Large and
medium
Enterprises
Dep. of
Interiors
+
-Complexity of cyber security issue
information
to protect
Classified
Unclassified
Unclassified
Cyber
domain
Protect
Intelligence
Exploitation
4. Mission
To be a leading worldwide player in the Cyber Defense sector and the trusted partner
to NATO, Italy Government, and UK Government.
Grow further on the international market for Cyber Security for Government, Professional and
Enterprise customers.
IA Professional
Services
(Security governance,
certification, training)
IA Products and
solutions for secure
radio
communications and
navigation
Security Operation Center
Services for cyber intelligence based on High Performance Computing platform
Security Consulting, VA, Secure Architecture
Integrated solution for lawful interception of IP and telephonic communications
Information Assurance: new generation Crypto systems, EKMS, secure telephone
Cyber Security, Defense Information Assurance
Our role in Cyber Security & Defense
Cyber Security
Solutions
Managed Security
Services (SOC)
Intelligence &
Analysis
5. Competences and capabilities
Physical
Networks
Force Protection
Influence
Protection
Physical Activity
Computer
Activity
Electromagnetic
Spectrum
Activity
Influence Activity
Logical
NetworksNetworks
Physical
Networks
Infrastructure
Cyber User/ Organization
Force Protection
Influence
Protection
Asset / Organization Protection
Intelligence
ProtectionWireless
e.g. Social Networks
Processes, governace and asset risk analysis
Access control systems and intrution identification
Infrastructures for physical security monitoring and management
Cyber Intelligence (e.g. massive data analytics; fraud prevention,
analysis of massive social networks )
MSS
Infrastructures for security
Own products, solutions for
network and data protection
(e.g. MILS gateways; cryptos;
network detection tool; TEM)
Specialist support:
Remediation, IRT, malware
analysis, computer forensics,
consultancy
Lawful interception
systems;
Spectrum monitoring,
protection and
jamming systems
Secure navigation
systems
Secure radio
communications
6. Routes
to Market
A flexible Business Model
Consultancy
& Security assessment
System / product design
and integration
Service Provision
(outsourced security)
Training and other
ancillary services
Plan
Design
Implement
Manage &
TLCM
Support
System /
product
development
lifecycle
Certification Security project lifecycle Business Models
Market
segment
Offering model
Other
Government
Dep. Critical
National
Infrastructures
Dep. of
Defense, NATO
Enterprises
- +
“Managed service”
orientation
Standalone
solutions and
products
Hybrid solutions
Solutions +
co-sourcing
Full outsourced security
services / standalone
security services
Consulting, Engineering support, TLCM
Customer
Partners
Platform
integrators
SELEX
1
2
3
2
7. Discovery Phase Remediation Design
Remediation
Implementation
Analysis
&
Report
Our approach to the discovery
of vulnerabilities and remediation
Realtime Security Monitoring & Investigation
ICT Infrastructure Analysis and
network probes positioningSecurity
Assessment
Interview
Rapid, real-time incident response intervention available 24/7
8. Detect
Understand
Define a
remediation
strategy
Implement the
Strategy
Prevention plan
• Monitoring all the traffic on the network
in order di identify the malware
communications, its propagation and
the enemy's command and control
activities
• Monitoring all executable file on all the
host (clients and servers) of the IT
System in order to identify when an
unknow program is running
• Collecting all the alerts from the
network/hosts in a SIEM (Security
Information and Event Management,
in order to create a real time situation
awareness picture
• Merging this picture with the Dynamic
risk management system, asset
inventory System and Cyber-
Intelligence information
•
• Defining the best stategy based on a
Decision Support System
• Using an host-based agent which
runs on each host in the IT System
and that is able to remove a
malware instantly from all the hosts
• Changing configurations on the
prevention tools (firewall, proxy,
...) and adding new rules on the
nerwork monitoring system
Network
Threat
Detector
Trusted
Execution
Monitor
Threat
Lab
Security
Operation
Center
Fighting against cyber threats
9. Analysis of Massive Social Networks:
• Social network information evolution;
• Social dynamics;
• Computer threat propagation.
Massive Data Analytics:
• Business Analysis;
• Anomaly Detection;
• Information Security trends and
forecasts;
• Knowledge discovery.
Network Analysis for Intelligence and
Surveillances:
• Information collection and analysis;
• Pattern Identification
• Anomaly detection
Cyber Intelligence highlights
10. Security Operation Centre (SOC)
to monitor and react fast
and properly to IT incident
Security
Operation Center
Utilize cyber
intelligence
services to stay
ahead of the
hackers
community