Submit Search
Upload
CWIN17 Rome / A holostic cybersecurity
•
3 likes
•
374 views
Capgemini
Follow
A holostic cybersecurity
Read less
Read more
Presentations & Public Speaking
Report
Share
Report
Share
1 of 13
Download now
Download to read offline
Recommended
CWIN17 New-York / Transforming enterprises with blockchain
CWIN17 New-York / Transforming enterprises with blockchain
Capgemini
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
Forcepoint LLC
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
Forcepoint LLC
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps Scatter
Forcepoint LLC
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical Networks
Forcepoint LLC
Webinar: Adaptive Security
Webinar: Adaptive Security
Blueliv
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
Nur Shiqim Chok
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
Nur Shiqim Chok
Recommended
CWIN17 New-York / Transforming enterprises with blockchain
CWIN17 New-York / Transforming enterprises with blockchain
Capgemini
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
Forcepoint LLC
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
Forcepoint LLC
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps Scatter
Forcepoint LLC
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical Networks
Forcepoint LLC
Webinar: Adaptive Security
Webinar: Adaptive Security
Blueliv
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
Nur Shiqim Chok
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
Nur Shiqim Chok
Cloud Security & Privacy Standard Slide
Cloud Security & Privacy Standard Slide
acinfotec
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
IBM Security
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
Blueliv
Cloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
David Sweigert
Embracing the Millennial Tsunami
Embracing the Millennial Tsunami
Forcepoint LLC
DDoS mitigation at Jisc
DDoS mitigation at Jisc
Jisc
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professional
Bryan Len
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
F-Secure Corporation
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
NetworkCollaborators
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
NetworkCollaborators
Bridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software Solutions
Ron Pascuzzi
Integrated Secure Networking - Fortinet
Integrated Secure Networking - Fortinet
Harry Gunns
Cloud security
Cloud security
BikashPokharel3
C-Level tools for Cloud security
C-Level tools for Cloud security
Vladimir Jirasek
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
FinTech Belgium
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
Vladimir Jirasek
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir
Understanding cyber resilience
Understanding cyber resilience
Christophe Foulon, CISSP
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
Jisc
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Skybox Security
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
NetWatcher
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
NetworkCollaborators
More Related Content
What's hot
Cloud Security & Privacy Standard Slide
Cloud Security & Privacy Standard Slide
acinfotec
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
IBM Security
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
Blueliv
Cloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
David Sweigert
Embracing the Millennial Tsunami
Embracing the Millennial Tsunami
Forcepoint LLC
DDoS mitigation at Jisc
DDoS mitigation at Jisc
Jisc
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professional
Bryan Len
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
F-Secure Corporation
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
NetworkCollaborators
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
NetworkCollaborators
Bridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software Solutions
Ron Pascuzzi
Integrated Secure Networking - Fortinet
Integrated Secure Networking - Fortinet
Harry Gunns
Cloud security
Cloud security
BikashPokharel3
C-Level tools for Cloud security
C-Level tools for Cloud security
Vladimir Jirasek
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
FinTech Belgium
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
Vladimir Jirasek
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir
Understanding cyber resilience
Understanding cyber resilience
Christophe Foulon, CISSP
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
Jisc
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Skybox Security
What's hot
(20)
Cloud Security & Privacy Standard Slide
Cloud Security & Privacy Standard Slide
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
Cloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
Embracing the Millennial Tsunami
Embracing the Millennial Tsunami
DDoS mitigation at Jisc
DDoS mitigation at Jisc
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professional
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Bridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software Solutions
Integrated Secure Networking - Fortinet
Integrated Secure Networking - Fortinet
Cloud security
Cloud security
C-Level tools for Cloud security
C-Level tools for Cloud security
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
Understanding cyber resilience
Understanding cyber resilience
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Similar to CWIN17 Rome / A holostic cybersecurity
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
NetWatcher
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
NetworkCollaborators
CCA study group
CCA study group
IIBA UK Chapter
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Sirius
I Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - Italia
Accenture Italia
Webinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM Solution
JK Tech
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines - security keynote
NetworkCollaborators
Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018
African Cyber Security Summit
The 2018 Threatscape
The 2018 Threatscape
Peter Wood
What i learned at issa international summit 2019
What i learned at issa international summit 2019
Ulf Mattsson
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
NetworkCollaborators
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
Ivanti
Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led Training
Sqrrl
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
IBM Security
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
CNSHacking
Security architecture frameworks
Security architecture frameworks
John Arnold
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trust
Capgemini
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Interset
Showreel ICSA Technology Conference
Showreel ICSA Technology Conference
Institute of Chartered Secretaries and Administrators
Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services
accenture
Similar to CWIN17 Rome / A holostic cybersecurity
(20)
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
CCA study group
CCA study group
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
I Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - Italia
Webinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM Solution
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines - security keynote
Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018
The 2018 Threatscape
The 2018 Threatscape
What i learned at issa international summit 2019
What i learned at issa international summit 2019
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led Training
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
Security architecture frameworks
Security architecture frameworks
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trust
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Showreel ICSA Technology Conference
Showreel ICSA Technology Conference
Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services
More from Capgemini
Top Healthcare Trends 2022
Top Healthcare Trends 2022
Capgemini
Top P&C Insurance Trends 2022
Top P&C Insurance Trends 2022
Capgemini
Commercial Banking Trends book 2022
Commercial Banking Trends book 2022
Capgemini
Top Trends in Payments 2022
Top Trends in Payments 2022
Capgemini
Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022
Capgemini
Retail Banking Trends book 2022
Retail Banking Trends book 2022
Capgemini
Top Life Insurance Trends 2022
Top Life Insurance Trends 2022
Capgemini
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
Capgemini
Property & Casualty Insurance Top Trends 2021
Property & Casualty Insurance Top Trends 2021
Capgemini
Life Insurance Top Trends 2021
Life Insurance Top Trends 2021
Capgemini
Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021
Capgemini
Top Trends in Wealth Management: 2021
Top Trends in Wealth Management: 2021
Capgemini
Top Trends in Payments: 2021
Top Trends in Payments: 2021
Capgemini
Health Insurance Top Trends 2021
Health Insurance Top Trends 2021
Capgemini
Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021
Capgemini
Capgemini’s Connected Autonomous Planning
Capgemini’s Connected Autonomous Planning
Capgemini
Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020
Capgemini
Top Trends in Life Insurance: 2020
Top Trends in Life Insurance: 2020
Capgemini
Top Trends in Health Insurance: 2020
Top Trends in Health Insurance: 2020
Capgemini
Top Trends in Payments: 2020
Top Trends in Payments: 2020
Capgemini
More from Capgemini
(20)
Top Healthcare Trends 2022
Top Healthcare Trends 2022
Top P&C Insurance Trends 2022
Top P&C Insurance Trends 2022
Commercial Banking Trends book 2022
Commercial Banking Trends book 2022
Top Trends in Payments 2022
Top Trends in Payments 2022
Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022
Retail Banking Trends book 2022
Retail Banking Trends book 2022
Top Life Insurance Trends 2022
Top Life Insurance Trends 2022
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
Property & Casualty Insurance Top Trends 2021
Property & Casualty Insurance Top Trends 2021
Life Insurance Top Trends 2021
Life Insurance Top Trends 2021
Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021
Top Trends in Wealth Management: 2021
Top Trends in Wealth Management: 2021
Top Trends in Payments: 2021
Top Trends in Payments: 2021
Health Insurance Top Trends 2021
Health Insurance Top Trends 2021
Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021
Capgemini’s Connected Autonomous Planning
Capgemini’s Connected Autonomous Planning
Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020
Top Trends in Life Insurance: 2020
Top Trends in Life Insurance: 2020
Top Trends in Health Insurance: 2020
Top Trends in Health Insurance: 2020
Top Trends in Payments: 2020
Top Trends in Payments: 2020
Recently uploaded
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
Delhi Call girls
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
NikitaBankoti2
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
Islamia university of Rahim Yar khan campus
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
Senaatti-kiinteistöt
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
Chameera Dedduwage
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Delhi Call girls
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
CamilleBoulbin1
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
Delhi Call girls
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
NhPhngng3
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Hasting Chen
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
SkillCertProExams
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
hlharris
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
Vipesco
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
Report Writing Webinar Training
Report Writing Webinar Training
KylaCullinane
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Kayode Fayemi
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
Sheetaleventcompany
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
nswingard
Recently uploaded
(20)
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Report Writing Webinar Training
Report Writing Webinar Training
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
CWIN17 Rome / A holostic cybersecurity
1.
Cybersecurity – A
Holistic Approach ANDREA NULLI Rome, September 28th #CWIN17
2.
Cybersecurity – A
Holistic Approach| 2017-09-28 Copyright © 2017 Capgemini. All rights reserved. 2 Table of Contents A holistic approach Why Our approach
3.
Cybersecurity – A
Holistic Approach| 2017-09-28 Copyright © 2017 Capgemini. All rights reserved. 3 A Holistic Approach…… “ relating to or concerned with wholes or with complete systems rather than with the analysis of, treatment of, or dissection into parts” https://www.merriam-webster.com/dictionary/holistic
4.
Cybersecurity – A
Holistic Approach| 2017-09-28 Copyright © 2017 Capgemini. All rights reserved. 4 ….to Cybersecurity A holistic approach incorporates technical, human and physical factors that are relevant to the detection, prevention, and correction of cybersecurity vulnerabilities. Risk zero doesn’t exist. Technology is just a small part of the solution, and can become a big part of the problem. Assume breach. It’s a difficult war: the good guys have to fix all holes, while the bad guys need to find just one !
5.
Cybersecurity – A
Holistic Approach| 2017-09-28 Copyright © 2017 Capgemini. All rights reserved. 5 2017’s breaches: some examples
6.
Cybersecurity – A
Holistic Approach| 2017-09-28 Copyright © 2017 Capgemini. All rights reserved. 6 So … I divide the entire set of Fortune Global 2000 firms into two categories: those what know they’ve been compromised and those don’t yet know Dmitri Alperovitch V.P. of threat research, McAfee after discovering of Operation Shady RAT (August 2011)
7.
Cybersecurity – A
Holistic Approach| 2017-09-28 Copyright © 2017 Capgemini. All rights reserved. 7 From cyber threat awareness … Operational Technology systems IoT (Internet of Things) IT systems Across • Secure its digital transformation and move to cloud • Be well governed, compliant and secure • Control security related costs Your enterprise needs to: Gartner >“Operational Technology (OT): industrial systems and manufacturing IT systems Stay ahead of increasingly sophisticated threats
8.
Cybersecurity – A
Holistic Approach| 2017-09-28 Copyright © 2017 Capgemini. All rights reserved. 8 A 360°end-to-end future-focused approach to control and secure your assets … to controlling and securing assets Your customers will … Your business will … Be secure and compliant with regulations Optimize costs with as- a-service offers Access digital services securely Trust you Live an enhanced customer experience Access the best domain experts worldwide Benefit from packaged offers powered by the best technology products
9.
Cybersecurity – A
Holistic Approach| 2017-09-28 Copyright © 2017 Capgemini. All rights reserved. 9 A Cybersecurity framework 4 families of Cybersecurity Services 1 Cybersecurity framework Consulting & Assessment Services Protection Services Monitoring Services IT systems OT & IoT Systems & Products Cloud Gartner >“Operational Technology (OT): industrial systems and manufacturing IT systems Data Threat Hunting Services
10.
Cybersecurity – A
Holistic Approach| 2017-09-28 Copyright © 2017 Capgemini. All rights reserved. 10 1st Advanced Data Analysis Security Operation Center Dedicated SOCs or Multi-tenant SOCs: SOCaaS Design & Build Managed Security Services 8 multi-tenant operated from France, UK, Luxemburg, India *2, Spain, Belgium + many dedicated SOCs Monitoring Services Detect and analyze even the most advanced attacks before they can impact the business. Gain complete visibility of your IT and security system to detect, analyze and react to cyber attacks. 3rd Generation Security Operations Centre (SOC) capability Response: take targeted action on the most important incidents. External Threat Intelligence Vulnerability management Incidents Prevention Security monitoring Incidents Detection Security update, files in quarantine, isolation of an IT system part,… Incident Response & reporting 1 2 3
11.
Cybersecurity – A
Holistic Approach| 2017-09-28 Copyright © 2017 Capgemini. All rights reserved. 11 Hunting Find the hacker inside Threat Hunting Services PROACTIVE THREAT HUNTING Search for undetected adversaries already inside the network Use available information to look for generic and specific IOCs (indicator of compromise), based on Threat intelligence. Gather meaningful data on endpoint, servers and networks to search for abnormal behavior. Leverage OS experts and malware analysts to identify real on- going attacks among noise and misconfiguration. Share results with the Security team to: Trigger a timely “ incident response ” process Patch exploited vulnerabilities and reduce attack surface Investigation cycle Define perimeter and threats Collect data Uncover unknown behavior Investigate for intrusions Share results with Security team
12.
Cybersecurity – A
Holistic Approach| 2017-09-28 Copyright © 2017 Capgemini. All rights reserved. 12 Thank You! Phone: +39 3494923311 andrea.nulli@capgemini.com Andrea Nulli Title: Principal Consultant Role: Italian Cybersecurity Leader @NulliAndrea Speaker 1 Photo
13.
www.capgemini.com The information contained
in this presentation is proprietary. Copyright © 2017 Capgemini. All rights reserved. Rightshore® is a trademark belonging to Capgemini. About Capgemini With more than 180,000 people in over 40 countries, Capgemini is one of With more than 190,000 people in over 40 countries, Capgemini is one of the world's foremost providers of consulting, technology and outsourcing services. The Group reported 2016 global revenues of EUR 12.5 billion. Together with its clients, Capgemini creates and delivers business, technology and digital solutions that fit their needs, enabling them to achieve innovation and competitiveness. A deeply multicultural organization, Capgemini has developed its own way of working, the Collaborative Business Experience™, and draws on Rightshore®, its worldwide delivery model.
Download now