+ All Categories
Home > Documents > Fujitsu Enterprise and Cyber Security

Fujitsu Enterprise and Cyber Security

Date post: 30-Jun-2015
Category:
Upload: fujitsu-global
View: 269 times
Download: 1 times
Share this document with a friend
Description:
Business globalization increases ever faster. Global use of various communication technologies and new device classes pose many security threats to modern enterprises. A company is not only liable for its own data, but also for that of its customers and business partners. Mobility and advanced security solutions are vital in the new digital world. Fujitsu listens to requests and security requirements and offers proven security solutions on different scales for different demands. Speakers: Mr. David Robinson (Fujitsu UK&I)
22
1 Copyright 2014 FUJITSU Human Centric Innovation Fujitsu Forum 2014 ICM Munich 19th – 20th November
Transcript
  • 1. 1Copyright 2014 FUJITSUHuman CentricInnovationFujitsu Forum2014ICM Munich19th 20th November

2. 2Copyright 2014 FUJITSUEnterprise and Cyber SecurityDavid RobinsonFujitsu Enterprise & Cyber Security, UK&IRobert NorrisDirector -FujitsuEnterprise & Cyber Security, UK&I 3. COMMERCIAL IN CONFIDENCE Copyright 2014 FUJITSUTodays security landscapeTHREATSGovernment sponsoredTerrorismHacktivistDisgruntled insiderOrganised crimeLack of continuity strategyCOUNTERMEASURESRegulation / complianceProactive & reactiveTechnology / serviceIdentity & accessMonitoring / responseInformation sharingGovernance & strategyPolicyACCIDENTAL ORDELIBERATEVULNERABILITIESPROCESSTECHNOLOGYIMPACTREPUTATIONASSETSPEOPLEREVENUE 4. Organised crimeEbayusers to reset passwords after hacking150 millionHome Depot payment cards exposed in data breach56 millionCOMMERCIAL IN CONFIDENCE Copyright 2014 Fujitsu Services Limited 5. Government sponsored attacksWanted by the FBIIntellectual PropertyMalwareCOMMERCIAL IN CONFIDENCE Copyright 2014 FUJITSU 6. Company goes bust after external hack attackBBC NewsMtGoxbitcoin exchange files for bankruptcyBBC NewsBitcoin exchange halts withdrawals after cyber-attackCOMMERCIAL IN CONFIDENCE Copyright 2014 FUJITSU 7. Good news People are being caughtUS cyber-thief gets 20-year jail termThe longest ever sentence for computer criminal17 menarrested in UKPart of a worldwide crackdown on malwareCOMMERCIAL IN CONFIDENCE Copyright 2014 FUJITSU 8. Target CEO out aftermassive cyber attack40 mncredit card details stolen110 mnbits of customer data stolen$61mnloss in fourth quarterBad news People are losing their jobsCOMMERCIAL IN CONFIDENCE Copyright 2014 FUJITSU 9. COMMERCIAL IN CONFIDENCE Copyright 2014 FUJITSUIncreasing external pressuresAdvanced threatsHacktivismInformation overloadLack of visibilityToo reactiveComplex environments 10. COMMERCIAL IN CONFIDENCE Copyright 2014 FUJITSUIncreasing internal pressuresAdvanced threatsHacktivismInformation overloadLack of visibilityToo reactiveComplex environmentsAre we secure?What happens if?Reduce costsMore clarityConsolidationAlign security to the business 11. COMMERCIAL IN CONFIDENCE Copyright 2014 FUJITSUHow do you answer these questions?How do you get there in a structured way?How capable is your business to face todays threats?How do you determine where you need to be? 12. COMMERCIAL IN CONFIDENCE Copyright 2014 FUJITSUHow to plan and reactCONTEXTBE PROACTIVERELEVANCE 13. COMMERCIAL IN CONFIDENCE Copyright 2014 FUJITSUCore security management processesDeviceIncidentComplianceVulnerabilityRiskContinuity 14. COMMERCIAL IN CONFIDENCE Copyright 2014 FUJITSUA business driven approach to information security 15. COMMERCIAL IN CONFIDENCE Copyright 2014 FUJITSUMaturity improvementDiscoverAssessDefineDevelopProgramme Inputs:StakeholdersBusiness StrategyObjectives ScopeChanging Business ObjectivesIdentifyEnableImproveOptimiseOngoingMaturityDevelopmentLack of maturity, structure & efficiencyIncreased maturity, consistency & agility 16. COMMERCIAL IN CONFIDENCE Copyright 2014 FUJITSUSummaryCONTEXT RELEVANCE BE PROACTIVE 17. COMMERCIAL IN CONFIDENCE Copyright 2014 FUJITSUProfessional ServicesUnparalleled Skills & ExperienceTake advantage of our experts from Information Assurance (CLAS)to Technical Design, Implementation, and Continuity.How we secure our customersProductsStrong OEM RelationshipsLong standing vendor relationships to provide our customerswith fit-for-purpose, best-of-breed technology.Managed ServicesKeeping You Secure, 24x7x365Advanced security operations keep our customers secure,with service levels to meet any requirement from adhocsupport to fully managed. 18. COMMERCIAL IN CONFIDENCE Copyright 2014 FUJITSU40+ Year History in design &delivery of large scale, cyber security servicesHighest Partner AccreditationsOperating in Public and Private sector, and National Defence BusinessesR&D Capability developing/delivering Fujitsu security products, e.g. PalmSecure5 GlobalSecurity Operations Centres operating to highest National Government security levels1000+ Security professionalsFujitsu Global Capability31IDS/IPSData Loss PreventionWeb & email securityEnd point protectionFirewallsPalm VeinProductsCloud AssessmentTraining & AwarenessTechnical DesignDLP AssessmentContinuity & Security Consultancy3rd Line SupportAdvanced Cyber OpsSIEMVulnerability ManagementIdentity & Access MgmtConsult & Services 19. COMMERCIAL IN CONFIDENCE Copyright 2014 FUJITSUTechnology partnersSome of Fujitsu Security Partners 20. COMMERCIAL IN CONFIDENCE Copyright 2014 FUJITSUCall Out Key Take AwayUnderstandSECURITY CONTEXTRELEVANCETo your BusinessBE PROACTIVEThreat LandscapeConstantly EvolvesWork with Fujitsu or one of ourmany partners to help you protectyour business. 21. COMMERCIAL IN CONFIDENCE Copyright 2014 FUJITSUQuestions ?


Recommended