Submit Search
Upload
CWIN17 Rome / A holostic cybersecurity
•
3 likes
•
374 views
Capgemini
Follow
A holostic cybersecurity
Read less
Read more
Presentations & Public Speaking
Report
Share
Report
Share
1 of 13
Download now
Download to read offline
Recommended
CWIN17 New-York / Transforming enterprises with blockchain
CWIN17 New-York / Transforming enterprises with blockchain
Capgemini
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
Forcepoint LLC
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
Forcepoint LLC
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps Scatter
Forcepoint LLC
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical Networks
Forcepoint LLC
Webinar: Adaptive Security
Webinar: Adaptive Security
Blueliv
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
Nur Shiqim Chok
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
Nur Shiqim Chok
Recommended
CWIN17 New-York / Transforming enterprises with blockchain
CWIN17 New-York / Transforming enterprises with blockchain
Capgemini
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
Forcepoint LLC
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
Forcepoint LLC
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps Scatter
Forcepoint LLC
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical Networks
Forcepoint LLC
Webinar: Adaptive Security
Webinar: Adaptive Security
Blueliv
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
Nur Shiqim Chok
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
Nur Shiqim Chok
Cloud Security & Privacy Standard Slide
Cloud Security & Privacy Standard Slide
acinfotec
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
IBM Security
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
Blueliv
Cloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
David Sweigert
Embracing the Millennial Tsunami
Embracing the Millennial Tsunami
Forcepoint LLC
DDoS mitigation at Jisc
DDoS mitigation at Jisc
Jisc
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professional
Bryan Len
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
F-Secure Corporation
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
NetworkCollaborators
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
NetworkCollaborators
Bridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software Solutions
Ron Pascuzzi
Integrated Secure Networking - Fortinet
Integrated Secure Networking - Fortinet
Harry Gunns
Cloud security
Cloud security
BikashPokharel3
C-Level tools for Cloud security
C-Level tools for Cloud security
Vladimir Jirasek
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
FinTech Belgium
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
Vladimir Jirasek
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir
Understanding cyber resilience
Understanding cyber resilience
Christophe Foulon, CISSP
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
Jisc
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Skybox Security
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
NetWatcher
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
NetworkCollaborators
More Related Content
What's hot
Cloud Security & Privacy Standard Slide
Cloud Security & Privacy Standard Slide
acinfotec
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
IBM Security
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
Blueliv
Cloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
David Sweigert
Embracing the Millennial Tsunami
Embracing the Millennial Tsunami
Forcepoint LLC
DDoS mitigation at Jisc
DDoS mitigation at Jisc
Jisc
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professional
Bryan Len
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
F-Secure Corporation
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
NetworkCollaborators
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
NetworkCollaborators
Bridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software Solutions
Ron Pascuzzi
Integrated Secure Networking - Fortinet
Integrated Secure Networking - Fortinet
Harry Gunns
Cloud security
Cloud security
BikashPokharel3
C-Level tools for Cloud security
C-Level tools for Cloud security
Vladimir Jirasek
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
FinTech Belgium
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
Vladimir Jirasek
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir
Understanding cyber resilience
Understanding cyber resilience
Christophe Foulon, CISSP
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
Jisc
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Skybox Security
What's hot
(20)
Cloud Security & Privacy Standard Slide
Cloud Security & Privacy Standard Slide
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
Cloud Computing & Cybersecurity
Cloud Computing & Cybersecurity
Embracing the Millennial Tsunami
Embracing the Millennial Tsunami
DDoS mitigation at Jisc
DDoS mitigation at Jisc
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professional
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Bridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software Solutions
Integrated Secure Networking - Fortinet
Integrated Secure Networking - Fortinet
Cloud security
Cloud security
C-Level tools for Cloud security
C-Level tools for Cloud security
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
Understanding cyber resilience
Understanding cyber resilience
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Similar to CWIN17 Rome / A holostic cybersecurity
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
NetWatcher
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
NetworkCollaborators
CCA study group
CCA study group
IIBA UK Chapter
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Sirius
I Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - Italia
Accenture Italia
Webinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM Solution
JK Tech
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines - security keynote
NetworkCollaborators
Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018
African Cyber Security Summit
The 2018 Threatscape
The 2018 Threatscape
Peter Wood
What i learned at issa international summit 2019
What i learned at issa international summit 2019
Ulf Mattsson
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
NetworkCollaborators
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
Ivanti
Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led Training
Sqrrl
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
IBM Security
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
CNSHacking
Security architecture frameworks
Security architecture frameworks
John Arnold
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trust
Capgemini
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Interset
Showreel ICSA Technology Conference
Showreel ICSA Technology Conference
Institute of Chartered Secretaries and Administrators
Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services
accenture
Similar to CWIN17 Rome / A holostic cybersecurity
(20)
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
CCA study group
CCA study group
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
I Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - Italia
Webinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM Solution
Cisco Connect 2018 Philippines - security keynote
Cisco Connect 2018 Philippines - security keynote
Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018
The 2018 Threatscape
The 2018 Threatscape
What i learned at issa international summit 2019
What i learned at issa international summit 2019
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led Training
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
Security architecture frameworks
Security architecture frameworks
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trust
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Showreel ICSA Technology Conference
Showreel ICSA Technology Conference
Cost of Cyber Crime: Financial Services
Cost of Cyber Crime: Financial Services
More from Capgemini
Top Healthcare Trends 2022
Top Healthcare Trends 2022
Capgemini
Top P&C Insurance Trends 2022
Top P&C Insurance Trends 2022
Capgemini
Commercial Banking Trends book 2022
Commercial Banking Trends book 2022
Capgemini
Top Trends in Payments 2022
Top Trends in Payments 2022
Capgemini
Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022
Capgemini
Retail Banking Trends book 2022
Retail Banking Trends book 2022
Capgemini
Top Life Insurance Trends 2022
Top Life Insurance Trends 2022
Capgemini
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
Capgemini
Property & Casualty Insurance Top Trends 2021
Property & Casualty Insurance Top Trends 2021
Capgemini
Life Insurance Top Trends 2021
Life Insurance Top Trends 2021
Capgemini
Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021
Capgemini
Top Trends in Wealth Management: 2021
Top Trends in Wealth Management: 2021
Capgemini
Top Trends in Payments: 2021
Top Trends in Payments: 2021
Capgemini
Health Insurance Top Trends 2021
Health Insurance Top Trends 2021
Capgemini
Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021
Capgemini
Capgemini’s Connected Autonomous Planning
Capgemini’s Connected Autonomous Planning
Capgemini
Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020
Capgemini
Top Trends in Life Insurance: 2020
Top Trends in Life Insurance: 2020
Capgemini
Top Trends in Health Insurance: 2020
Top Trends in Health Insurance: 2020
Capgemini
Top Trends in Payments: 2020
Top Trends in Payments: 2020
Capgemini
More from Capgemini
(20)
Top Healthcare Trends 2022
Top Healthcare Trends 2022
Top P&C Insurance Trends 2022
Top P&C Insurance Trends 2022
Commercial Banking Trends book 2022
Commercial Banking Trends book 2022
Top Trends in Payments 2022
Top Trends in Payments 2022
Top Trends in Wealth Management 2022
Top Trends in Wealth Management 2022
Retail Banking Trends book 2022
Retail Banking Trends book 2022
Top Life Insurance Trends 2022
Top Life Insurance Trends 2022
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
キャップジェミニ、あなたの『RISE WITH SAP』のパートナーです
Property & Casualty Insurance Top Trends 2021
Property & Casualty Insurance Top Trends 2021
Life Insurance Top Trends 2021
Life Insurance Top Trends 2021
Top Trends in Commercial Banking: 2021
Top Trends in Commercial Banking: 2021
Top Trends in Wealth Management: 2021
Top Trends in Wealth Management: 2021
Top Trends in Payments: 2021
Top Trends in Payments: 2021
Health Insurance Top Trends 2021
Health Insurance Top Trends 2021
Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021
Capgemini’s Connected Autonomous Planning
Capgemini’s Connected Autonomous Planning
Top Trends in Retail Banking: 2020
Top Trends in Retail Banking: 2020
Top Trends in Life Insurance: 2020
Top Trends in Life Insurance: 2020
Top Trends in Health Insurance: 2020
Top Trends in Health Insurance: 2020
Top Trends in Payments: 2020
Top Trends in Payments: 2020
Recently uploaded
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
FamilyWorshipCenterD
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
mavinoikein
Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170
Escort Service
Genshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptx
Johnree4
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
soniya singh
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
saastr
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism Presentation
Nathan Young
miladyskindiseases-200705210221 2.!!pptx
miladyskindiseases-200705210221 2.!!pptx
CarrieButtitta
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
漢銘 謝
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Sebastiano Panichella
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸
mathanramanathan2005
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
marjmae69
James Joyce, Dubliners and Ulysses.ppt !
James Joyce, Dubliners and Ulysses.ppt !
risocarla2016
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
Sebastiano Panichella
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
vikas rana
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Krijn Poppe
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
KathleenAnnCordero2
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
Sebastiano Panichella
Anne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptx
noorehahmad
Recently uploaded
(20)
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170
Genshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptx
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism Presentation
miladyskindiseases-200705210221 2.!!pptx
miladyskindiseases-200705210221 2.!!pptx
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
James Joyce, Dubliners and Ulysses.ppt !
James Joyce, Dubliners and Ulysses.ppt !
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
Anne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptx
CWIN17 Rome / A holostic cybersecurity
1.
Cybersecurity – A
Holistic Approach ANDREA NULLI Rome, September 28th #CWIN17
2.
Cybersecurity – A
Holistic Approach| 2017-09-28 Copyright © 2017 Capgemini. All rights reserved. 2 Table of Contents A holistic approach Why Our approach
3.
Cybersecurity – A
Holistic Approach| 2017-09-28 Copyright © 2017 Capgemini. All rights reserved. 3 A Holistic Approach…… “ relating to or concerned with wholes or with complete systems rather than with the analysis of, treatment of, or dissection into parts” https://www.merriam-webster.com/dictionary/holistic
4.
Cybersecurity – A
Holistic Approach| 2017-09-28 Copyright © 2017 Capgemini. All rights reserved. 4 ….to Cybersecurity A holistic approach incorporates technical, human and physical factors that are relevant to the detection, prevention, and correction of cybersecurity vulnerabilities. Risk zero doesn’t exist. Technology is just a small part of the solution, and can become a big part of the problem. Assume breach. It’s a difficult war: the good guys have to fix all holes, while the bad guys need to find just one !
5.
Cybersecurity – A
Holistic Approach| 2017-09-28 Copyright © 2017 Capgemini. All rights reserved. 5 2017’s breaches: some examples
6.
Cybersecurity – A
Holistic Approach| 2017-09-28 Copyright © 2017 Capgemini. All rights reserved. 6 So … I divide the entire set of Fortune Global 2000 firms into two categories: those what know they’ve been compromised and those don’t yet know Dmitri Alperovitch V.P. of threat research, McAfee after discovering of Operation Shady RAT (August 2011)
7.
Cybersecurity – A
Holistic Approach| 2017-09-28 Copyright © 2017 Capgemini. All rights reserved. 7 From cyber threat awareness … Operational Technology systems IoT (Internet of Things) IT systems Across • Secure its digital transformation and move to cloud • Be well governed, compliant and secure • Control security related costs Your enterprise needs to: Gartner >“Operational Technology (OT): industrial systems and manufacturing IT systems Stay ahead of increasingly sophisticated threats
8.
Cybersecurity – A
Holistic Approach| 2017-09-28 Copyright © 2017 Capgemini. All rights reserved. 8 A 360°end-to-end future-focused approach to control and secure your assets … to controlling and securing assets Your customers will … Your business will … Be secure and compliant with regulations Optimize costs with as- a-service offers Access digital services securely Trust you Live an enhanced customer experience Access the best domain experts worldwide Benefit from packaged offers powered by the best technology products
9.
Cybersecurity – A
Holistic Approach| 2017-09-28 Copyright © 2017 Capgemini. All rights reserved. 9 A Cybersecurity framework 4 families of Cybersecurity Services 1 Cybersecurity framework Consulting & Assessment Services Protection Services Monitoring Services IT systems OT & IoT Systems & Products Cloud Gartner >“Operational Technology (OT): industrial systems and manufacturing IT systems Data Threat Hunting Services
10.
Cybersecurity – A
Holistic Approach| 2017-09-28 Copyright © 2017 Capgemini. All rights reserved. 10 1st Advanced Data Analysis Security Operation Center Dedicated SOCs or Multi-tenant SOCs: SOCaaS Design & Build Managed Security Services 8 multi-tenant operated from France, UK, Luxemburg, India *2, Spain, Belgium + many dedicated SOCs Monitoring Services Detect and analyze even the most advanced attacks before they can impact the business. Gain complete visibility of your IT and security system to detect, analyze and react to cyber attacks. 3rd Generation Security Operations Centre (SOC) capability Response: take targeted action on the most important incidents. External Threat Intelligence Vulnerability management Incidents Prevention Security monitoring Incidents Detection Security update, files in quarantine, isolation of an IT system part,… Incident Response & reporting 1 2 3
11.
Cybersecurity – A
Holistic Approach| 2017-09-28 Copyright © 2017 Capgemini. All rights reserved. 11 Hunting Find the hacker inside Threat Hunting Services PROACTIVE THREAT HUNTING Search for undetected adversaries already inside the network Use available information to look for generic and specific IOCs (indicator of compromise), based on Threat intelligence. Gather meaningful data on endpoint, servers and networks to search for abnormal behavior. Leverage OS experts and malware analysts to identify real on- going attacks among noise and misconfiguration. Share results with the Security team to: Trigger a timely “ incident response ” process Patch exploited vulnerabilities and reduce attack surface Investigation cycle Define perimeter and threats Collect data Uncover unknown behavior Investigate for intrusions Share results with Security team
12.
Cybersecurity – A
Holistic Approach| 2017-09-28 Copyright © 2017 Capgemini. All rights reserved. 12 Thank You! Phone: +39 3494923311 andrea.nulli@capgemini.com Andrea Nulli Title: Principal Consultant Role: Italian Cybersecurity Leader @NulliAndrea Speaker 1 Photo
13.
www.capgemini.com The information contained
in this presentation is proprietary. Copyright © 2017 Capgemini. All rights reserved. Rightshore® is a trademark belonging to Capgemini. About Capgemini With more than 180,000 people in over 40 countries, Capgemini is one of With more than 190,000 people in over 40 countries, Capgemini is one of the world's foremost providers of consulting, technology and outsourcing services. The Group reported 2016 global revenues of EUR 12.5 billion. Together with its clients, Capgemini creates and delivers business, technology and digital solutions that fit their needs, enabling them to achieve innovation and competitiveness. A deeply multicultural organization, Capgemini has developed its own way of working, the Collaborative Business Experience™, and draws on Rightshore®, its worldwide delivery model.
Download now