Press visit Stepping up to the cyberspace security challenge

Size: px
Start display at page:

Download "Press visit Stepping up to the cyberspace security challenge"

Transcription

1 Thursday, 6 February 2014, Gennevilliers / Elancourt Press visit Stepping up to the cyberspace security challenge

2 2 Contents A response to the evolving cyberthreat environment Thales proposes a comprehensive response to protect the critical information of the most demanding customers Thales's added value Thales's cybersecurity capabilities Presentations Thales in the security market Thales, company profile Appendices Highlights of 2013 Press releases About Thales Thales is a global technology leader in the Aerospace & Transportation and the Defence & Security markets. In 2012, the company generated revenues of 14.2 billion with 65,000 employees in 56 countries. With its 25,000 engineers and researchers, Thales has a unique capability to design, develop and deploy equipment, systems and services that meet the most complex security requirements. Thales has an exceptional international footprint, with operations around the world working with customers and local partners. Drawing on its strong cryptographic capabilities, Thales is one of the world leaders in cybersecurity products and solutions for critical state and military infrastructures, satellite networks and industrial and financial companies. With a presence throughout the entire security chain, Thales offers a comprehensive range of services and solutions ranging from security consulting, intrusion tests and architecture design to system certification, development and through life management of products and services, and security supervision (Security Operation Centres in France and the United Kingdom).

3 3 A response to the evolving cyberthreat environment Thales is a global leader in the provision of cryptographic security products and solutions for all types of critical infrastructures, including governments, military, satellite networks, business and the finance industry. Thales's unique positioning in the marketplace derives from its ability to address every link in the security chain and deliver end to end solutions. Cyberspace, the new theatre of operations Today, with more than 600 million websites and about 2.7 billion internet users around the world in Q (source: ITU International Telecommunication Union), information systems and the internet are playing such a prominent role in the life of governments, businesses and the general public that they are becoming vital to a country's economy and security. Cybersecurity is now a crucial challenge for governments, financial organisations, vital infrastructure operators, innovative industries, research laboratories, etc. As recent attacks have shown, it is clear that cyberspace has become a new battleground. Experts predict that cyberspace will rapidly take on a new strategic dimension in the next few years, just as space did half a century ago, and that new types of conflicts symmetric as well as asymmetric will emerge with varying degrees of intensity. This new digital paradigm is characterised by the ubiquitous interconnection of people, information systems and objects as well as the rapid evolution of computer technologies and cyberthreats. It is therefore vital to develop new capabilities to protect ourselves from such threats. A new approach: from passive protection to proactive defence Organisations are so dependent on information systems today that a transition from conventional protection to proactive cyberdefence is now necessary. In the face of persistent and targeted cyberattacks, it is essential to adopt rapid detection and response capabilities. Information system security must therefore become proactive, anticipating and detecting attacks at an early stage in order to deliver timely and efficient operational responses. Key figures: Critical information systems and cybersecurity: revenues of approx. 500 million 1,500 experts specialising in cybersecurity at Thales Thales has deployed security products and solutions (confidential or top secret) in 50 countries, including 25 NATO countries Thales protects 80% of the world's banking transactions (19 of the 20 largest banks in the world) Operation and supervision of critical information systems for over 100 clients

4 4 Thales proposes a comprehensive response to protect the critical information of the most demanding customers With a presence throughout the entire security chain, Thales offers a complete range of services and solutions ranging from security consulting to deployment of a rapid response team as well as outsourced management, secure cloud computing and 24/7 security supervision. Thales assists its customers throughout the process of securing their information systems, from risk analysis to the development of effective anticipation and defence strategies. Thales also supplies a wide range of hardware and software products for risk prevention, detection and information system supervision. The company's end to end approach to critical system security and resilience engineering is perfectly aligned with the new challenges facing society today. Thales's added value Drawing on its unrivalled experience, built up over 40 years of protecting classified information up to 'top secret' level, Thales has developed a comprehensive portfolio of security products, covering communication networks, databases and access control. Thales is a trusted partner with the expertise and technologies to protect the information and communication systems of critical organisations against cyber related risks (government agencies, administrations, businesses, police and law enforcement agencies, etc.). With a task force of 1,500 engineers based in France, the United Kingdom, Norway, the United States and the Asia Pacific region, Thales provides its customers with the recognise expertise they need. Since 2001, Thales has operated a permanent cybersecurity operations centre for critical infrastructures. Leveraging Thales's unique expertise, it provides 24/7 supervision of the sensitive information systems of its customers and protects against the most sophisticated attacks. Thanks to its fifteen IT service centres and four highly secure datacentres based at the company's Elancourt, Cholet, Toulouse and Valence sites Thales is able to commit to very high levels of service in line with the requirements of its public sector customers (governments, administrations, etc.) and corporate customers (industry, transportation, aerospace, space, finance, etc.).

5 5 Thales's cybersecurity capabilities Thales implements the IT solutions and human resources needed to protect information systems and to monitor, detect, analyse, visualise and counter all types of current and future cyberattacks, including virus attacks, disinformation, denial of service attacks, destabilisation, data destruction, defacement and theft. These capabilities have a strong service dimension. Thales designs, develops, integrates and delivers high value added services to protect critical information systems. At the forefront of information technology, Thales contributes to the development lifecycle to deliver safer and more intelligent information systems. Key areas of focus include development of software solutions and outsourced management of critical infrastructure. Thales cybersecurity solutions are also a crucial part of its bids and proposals in the aerospace, transportation, defence and security sectors as well as in the development of future solutions for the defence security continuum. The Thales solutions included in today's visit are: CYBELS View: central coordination and complete cybersecurity solution The CYBELS (CYBer Expertise for Leading Security) cybersecurity capability from Thales is designed to protect critical information systems against cyberthreats by anticipating, detecting and responding to attacks in a timely fashion. Organised around a cybersecurity operations centre, it efficiently coordinates security capabilities and provides the necessary protection levels throughout the system lifecycle. This cybersecurity operations centre provides 24/7 supervision of information systems. It offers police, government agencies and critical infrastructure operators the solutions they need to combat cyberattacks. Cybersecurity hypervisor for dynamic risk management Thales has developed an innovative solution to provide a complete picture of information system security via a cybersecurity hypervisor (or cyberdefence C2), able to merge information of different kinds and from different sources. Hypervision offers dynamic risk management capabilities and delivers an overview of the security situation, assessing the business and organisational impacts of a cyberattack and suggesting appropriate responses. This tool supports the decision making process in situations that are complex in both human and technical terms, because of the volume and sensitive nature of the information to be processed. CYBELS Intelligence, an application for social web mining and analysis CYBELS Intelligence is an application developed by Thales that provides the ability to analyse information from social media websites blogs, forums and social networks by dynamically combining analysis of the content of conversations with detection and analysis of social communities. Deployed in the context of cybersecurity as a monitoring and prevention cell, CYBELS Intelligence continuously monitors hacker blogs to anticipate and counter threats. Unlike general interest or specialist search engines, it has the ability to synthesise and closely follow

6 6 discussions about threats and attacks, while collecting knowledge about the structure, behaviour and habits of hacker communities. And unlike commercially available social media monitoring solutions, this type of deep analysis includes both the conversational dimension and the relational dimension of the social web. CYBELS Maps: dynamic assessment of risks to an information system Responding to the growing complexity of information systems and their technical architectures, Thales proposes an innovative approach to cybersecurity risk assessment. This approach includes two phases. The first phase is topological analysis of information system vulnerabilities. On the basis of this topology and the vulnerabilities identified, the second phase begins with an exhaustive calculation of the associated attack graphs or weaknesses that an attacker could potentially exploit, such as the intrusion pathways resulting from the cascading exploitation of such vulnerabilities. To better understand this approach from an operational perspective, visual analytics techniques are also employed. These advanced techniques provide a 3D visual representation of all components of the information system and their degree of exposure to risk, providing effective decision support for security operators. Thales presents the results of applied research, obtained using this innovative approach, to provide a complete picture of information system vulnerabilities and potential attack pathways and in turn measure the risk incurred on the basis of the security events / alerts escalated by the various detection tools. This approach thus goes beyond other information system / cybersecurity analysis tools to offer an additional layer of measurement, which can be used in turn to compare risk reduction options in order to maximise security and minimise the cost of responding to incidents, with the ultimate aim of quantifying the overall security of information systems. Thales uses innovative algorithms and specific tools as part of an integrated processing chain to meet the need to better understand the actual vulnerability issues intrinsic to any information system, including related devices, applications, etc. This approach also includes impact assessment (economic, legal, impact on corporate image, etc.) of any breach of information system security or attack on any resource supporting the company's strategic services, applications and processes. TEOPAD, meeting the challenge of mobile security With TEOPAD, Thales offers business customers an innovative security solution for Android smartphones and tablets (TEOPAD will soon be available for Android 4.3). TEOPAD is an effective response to the security challenges of using these newgeneration mobile devices for professional purposes when extremely high level assurances of confidentiality are required. TEOPAD runs on standard mobile devices, creating a dedicated workspace for company communication applications (messaging, organiser, contacts, etc.) and other businessspecific applications to protect access, storage and transfers of sensitive data. TEOPAD is a unique strong authentication solution that allows each company to retain full control over professional services. The secure workspace environment takes the form of an app, which is launched by icon, like any other smartphone app. Once authenticated, users access a second 'desktop' or secure professional workspace, which operates seamlessly alongside their personal desktop, effectively creating dual personal and professional environments on a single device. The TEOPAD solution builds on Thales's expertise in encryption and communication system security and implements a Thales patented security technique. In 2013, the solution received CSPN certification first level security certification issued by the National Agency for the Security of Information Systems (ANSSI). This vote of confidence demonstrates how the TEOPAD security solution for smartphones and tablets meets its security target and that no exploitable security vulnerability was identified during the evaluation.

7 7 TEOPAD is used by the French Ministry of Defence and other government departments as well as by industrial companies, such as Vinci Facilities, and cosmetics firms, in some cases as a replacement for their BlackBerry fleets. Cloud security Thales offers its customers a secure Cloud solution called CYRIS, comprising a set of modules designed to ensure complete protection for companies and organisations using or migrating their data to a cloud environment. The CYRIS Broker module protects data uploaded to the cloud and includes identity management and associated access / authorisation functions as well as encryption, signature and de identification. In addition, CYRIS Broker allows data to be stored in different cloud environments (public, private, sovereign, etc.), depending on user requirements and attributes. By acting as a trusted third party software application, it protects data by taking the security function out of the hands of cloud operators. CYRIS also includes other functions: security of virtualisation processes, infrastructures and cloudready applications (protection of applications migrated to the cloud, security applications in SaaS mode, etc.). Thales supports its customers throughout the process of data migration and provides assistance for all phases of rollout. The CYBELS solution from Thales completes this capability by providing the security supervision component.

8 8 International references No.1 worldwide in security for interbank electronic transactions No.1 in Europe for information system security Thales solutions are deployed in 50 client countries, including 25 NATO countries Protection of the IP networks of European and NATO military forces Protection of transactions and sensitive systems for numerous international corporations: 19 of the 20 largest banks and over 3,000 financial institutions around the world 80% of the world's banking transactions 3 of the largest pharmaceutical companies 4 of the 5 largest petrochemical companies 9 of the 10 largest high technology industries Definition and delivery of the sovereign cloud security solution for Cloudwatt Recent news Allianz teams up with Thales to offer Allianz Cyber Data Protect University of Malaya, Kuala Lumpur, pioneers the first e Scroll with Thales technology Second cybersecurity integration centre opened in Basingstoke (UK) Qatar University and Thales sign MoU in information technology security Injazat and Thales join forces to provide innovative cybersecurity services in the United Arab Emirates Thales helps secure Microsoft's next generation cloud service

9 9 Thales in the security market Thales offers customers unparalleled experience in security markets, with recognised expertise for large scale and highly complex systems integration. Modern societies are mobile and interconnected and the infrastructure that allows them to function plays a critical role. As the nervous system of our societies, this infrastructure must not only improve the quality of life but also guarantee security, which is possibly our most precious asset in ensuring a sustainable future. Whenever governments, local authorities, infrastructure operators and businesses are faced with complex situations, they must combine the need for security with the quality of the services they provide. Security threats are inherently difficult to manage because there are so many different types terrorism, cybercrime, urban crime, trafficking, illegal immigration, natural disasters, industrial accidents, etc. and because they are constantly evolving. However, their economic impact can be enormous. In addition, information systems themselves are more vulnerable to attack, so it has become crucially important to ensure the security of data and data networks. Anticipation and speed of response are increasingly crucial to ensuring security: operators and decision makers need to be alerted as early as possible and they need faster access to reliable, detailed information so they can decide and act effectively in a crisis situation. Post event analysis tools are also needed to help them capitalise on past experience. Thales's response Positioned as a value added systems integrator, equipment supplier and service provider, Thales is one of Europe s leading players in the security market. Thales s security teams work with government agencies, local authorities and civil operators to develop and deploy integrated, resilient solutions to protect citizens, sensitive data and critical infrastructure. Thales solutions secure the four key domains considered vital to modern societies: Government: border surveillance, homeland security, identity management, etc. Cities: urban security Critical infrastructure: government sites, oil and gas infrastructure, nuclear power stations, airports, sensitive sites including museums, mosques, prisons and metro stations Cyberspace Thales solutions are built around each customer's concepts of operations (CONOPS) and incorporate advanced technologies some of them developed for the military that represent a significant competitive advantage in the security market today. By implementing Thales solutions, customers benefit from advanced protection against security risks and immediate access to the most relevant information so they can make the right decisions at the right time and act accordingly. With Thales security solutions, incidents and crisis situations are managed quickly and effectively, and customers can focus on their core missions and thus improve overall operational efficiency.

10 10 Thales's added value Our systems integration capabilities for complex large scale systems and our ability to leverage our customers' legacy solutions. Our systems built around the latest game changing technologies: sensors, networks and information system security, internet technologies (IP, 4G), secure cloud computing / virtualisation, data processing algorithms, data fusion, management of large volumes of video, voice, text and other data, smart human machine interfaces and hypervision. Our international footprint and proven ability to work with local partners worldwide. Our deep understanding of our customers' lines of business, based on a leadership position on flagship programmes. Key figures: Security market revenues of around 1 billion No. 1 worldwide in security for interbank electronic transactions: 80% of bank transactions worldwide are protected by Thales solutions (the Group secures 19 of the world's 20 largest banks) No. 1 in Europe for information system security: 1,500 cybersecurity experts Two 24/7 security operations centres in France (Elancourt since 2001) and the United Kingdom (Basingstoke since 2013) Operation and supervision of critical information systems for over 100 public and privatesector clients International references State protection Identity: Thales identity management systems in over 25 countries more than 300 million ID documents produced. Thales selected for four of France's largest civil biometrics programmes National security: public security database for France's Gendarmerie Nationale Event management system for the G20 Summit in Brisbane, November 2014 Urban security: Ciudad Segura: urban security for Mexico City Security for Hajj pilgrimage (Mecca) Security for public buildings (Paris) Critical infrastructure: Government sites: site security at new French defence ministry complex (Balard) Protection of oil facilities for Saudi Aramco and Sonatrach Airport security systems for Dubai (UAE), Doha (Qatar), Durban (South Africa), Changi (Singapore), Lisbon and Madeira (Portugal) Cyberspace (see page 8)

11 11 Thales Our mission In a world that is increasingly mobile, interconnected and interdependent, the security of people and goods, infrastructure and nations depends on leaders and organisations and their ability to decide and act in a timely fashion and obtain the best outcomes. In the markets that Thales serves defence, security, space, aerospace and ground transportation these decisions are often of critical importance. Army, navy and air force commanders, as well as air traffic controllers, policymakers and infrastructure operators, face these critical decisions and need full, relevant and reliable information to understand the situation and make the right choices. The critical decision chain Our role is to assist our customers in making these decisions by providing the tools and technologies they need to gather, process and distribute information, helping them to understand complex situations so they can decide and act in a timely fashion and obtain the best outcomes. This understanding of the critical decision chain underpins our innovation and technological developments in areas such as large scale software driven systems, secure communications, sensors (radar, sonar, optical), supervision, onboard electronics, satellites and systems integration. These technologies and capabilities and the central role of human factors in critical decisionmaking are common to all our activities. The Group's employees are constantly developing their skills to stay ahead in these areas. Local presence and responsibility We have built up an in depth knowledge of the markets we have served for many decades. And with operations in 56 countries, we have developed close relationships with local customers to grasp the intricacies of their operational decision making processes and propose the best solutions for every situation. Across all our businesses, Thales's 65,000 employees are guided by a proactive policy of corporate responsibility that is key to managing risks and driving performance. Innovating, a top priority for the Group Inventing tomorrow's flagship products today, creating value for our customers, enabling effective teamwork, nurturing a passion for research these are the hallmarks of the Thales spirit of innovation. For Thales, innovation hinges on an in depth understanding of customer needs, the power of creativity and imagination and the ability to transform a technological breakthrough into a practical application. Press contact Thales, Media Relations Security Dorothée Bonneil +33 (0) dorothee.bonneil@thalesgroup.com

12 12 Annexes Highlights of 2013 Press releases Allianz teams up with Thales to offer Allianz Cyber Data Protect insurance against cyberattacks Businesses need a comprehensive approach to risk management to address the growing problem of cybercrime and industrial espionage on the Internet. The new Allianz Cyber Data Protect solution offers complete protection against digital risks. With this innovative insurance cover, Allianz Global Corporate & Speciality and Thales expect to meet a growing need and support the expansion of the cyberinsurance market. Neuilly sur Seine, Wednesday 15 January 2014 Allianz Global Corporate & Specialty SE (AGCS) and Thales have joined forces to offer comprehensive protection against cybercrime. The new Allianz Cyber Data Protect insurance policy from AGCS is tailored to the needs of each customer. It covers the costs incurred by responding to a cyberattack on an insured company and rebuilding its information system as well as losses arising from interruption of business operations. Thales is contributing its expertise in both initial analysis of IT security risks and emergency response in the event of an attack. In the digital age, where business processes are networked and companies rely on ever more complex technologies, the risks and threats to business organisations continue to grow. An estimated 556 million people across the world fall victim to cybercrime each year, equivalent to 1.4 million people per day or 18 per second. The new Allianz Cyber Data Protect insurance solution enables businesses to protect themselves comprehensively against cyber risks. This insurance policy covers the expenses arising from measures taken to respond to a malicious online attack and restore damaged or destroyed data. The policy also protects against loss of income resulting from disruptions following an attack and covers civil liability claims by customers of an insured company who sustain losses as a result of attacks by hackers or denial of service attacks. Data protection violations and illegally accessed digital communications are covered, and the costs of crisis communications to safeguard the company's reputation are also included in the policy. In addition to this standard cover, the Premium and Premium Plus enhanced options offer extended cover up to 50 million. Thales's involvement as a cybersecurity expert includes risk analysis and prevention to ensure the best possible protection for each insured company and mitigate the potential impact of an attack. These two options also include the assistance of Thales's dedicated Rapid Response Team. "Allianz Cyber Data Protect combines various elements of civil liability, damage and pure financial loss insurance, as well as a range of complementary services from carefully selected providers," says Véronique Bruyland, Head of Financial Lines Underwriting, Mediterranean Region, AGCS. "This solution also offers comprehensive protection against growing Internet threats and is designed to adapt to the needs of each specific company."

13 13 "Cybersecurity is an integral part of risk management for French companies today," adds Vincent Marfaing, Thales Vice President, IT Security and Cybersecurity. "Thales is delighted to be contributing its expertise to the Allianz Cyber Data Protect solution. This innovative policy stands apart from other products in that it offers a combination of preventive and remedial measures to optimise both the technical and financial aspects of the protection provided."

14 14 University of Malaya, Kuala Lumpur, pioneers the first e-scroll with Thales technology Neuilly sur Seine, Monday, 9 December 2013 Thales, leader in information system and communication security, announces that its nshield hardware security modules (HSMs) and Time Stamp Server have been deployed by University of Malaya, Kuala Lumpur, to generate digital degree certificates for their graduates and so reduce the instance of counterfeiting and fraud. Academic institutions around the world face challenges over the production of counterfeit degree certificates. University of Malaya decided to address the problem by issuing e scrolls or digital certificates to their graduates. These e Scrolls are digitally signed and time stamped and can be authenticated online. Each e Scroll is digitally signed by the University s Registrar and Vice Chancellor using GlobalSign digital IDs. Thales high assurance, tamper resistant HSMs provide strong protection for the digital identities of the two signatories, securely storing their private signing keys and preventing unauthorised access. As part of the process, each e Scroll is issued a secured time stamp against the Malaysian national clock (located at SIRIM) by a Thales Time Stamp Server providing an additional layer of security and indicating the exact time and date the credential was issued. Richard Mallet, Managing Director, Asia Pacific, Thales e Security says: Organisations are increasingly moving from paper based to electronic documents in order to reduce costs and increase productivity, but it is also essential that any such system provides the high levels of assurance necessary to ensure the authenticity and integrity of those documents. Thales has a wealth of experience and leading edge products in the area of digital signatures and time stamping to protect digital signatures, making it practical for organisations to implement these high strength cryptographic techniques. We are particularly proud that University of Malaya chose Thales technology to deliver its innovative and secure e Scroll." More than 7,000 students graduate from the University of Malaya each year, and we feel it is our duty to present them with a certificate that has strong credibility and integrity as it is widely associated with our university. Thales provided us with the technology to allow us to issue a digitally signed and time stamped e Scroll in a solution that is quick and simple to deploy. Not only does the e Scroll overcome the issues of counterfeit degrees, but in a world where a growing number of graduates apply for jobs online, employers are able to quickly and easily validate the authenticity of the certificates. Effective 2013, all students graduating from the University of Malaya will receive an e Scroll at their graduation ceremony in addition to a printed certificate. Dr David Asirvatham, Director of IT Centre, University of Malaya.

15 15 Qatar University and Thales sign MoU in information technology security MoU includes the development, research and training on new and emerging information technology solutions Neuilly Sur Seine, Wednesday 6 November 2013 Qatar University and Thales yesterday signed a Memorandum of Understanding (MOU) for academic development, research and training of future Qatari professionals on new and emerging technological solutions in the field of information systems for a range of specialties. The agreement was signed between Qatar University President Prof. Sheikha Abdulla Al Misnad and Thales Communications & Security Chairman and CEO Mr Jean Michel Lagarde, in the presence of the Ambassador of France to Qatar, Mr Jean Christophe Peaucelle, QU VP and Chief Academic Officer for Academic Affairs Dr Mazen Hasna, several officials from the French Embassy, Thales, ictqatar and QU, along with representatives from leading information and communication organisations in Qatar. The agreement will benefit students of the departments of Electrical Engineering and Computer Science and Engineering in the College of Engineering. Its objective is to harness Qatar University's central role as the lead producer of Qatar's engineering graduates and partner with Thales's experience, technological know how, product expertise and active research activity in a wide range of functional domains and associated services related to information systems. Underlying this objective is the shared commitment to contribute to Qatar's development and progress. Commenting on the agreement, Prof Al Misnad said: "We are pleased to partner with Thales which is a leader in the field of information systems and related products and services. The research component of this agreement is in line with our continued push to advance our research capacity and to provide our students with an environment of vibrant research activity. Information systems is a fast growing field around the world and we are pleased to be part of the development of these competencies among our students to prepare them to take the reins as future leaders in Qatar." "We are very pleased and honoured to start the cooperation with Qatar University in the field of information systems security. It will enhance IT security awareness across Qatar and improve Qatari workforce skills in that field and will aid Qatar University in becoming an active member of recognised university organisations and forums," said Mr Lagarde.

16 16 Injazat and Thales join forces to provide innovative cybersecurity services in the United Arab Emirates Milipol Paris Nord Villepinte Wednesday 20 November 2013 Injazat Data Systems and Thales are collaborating on an advanced and innovative cybersecurity offering for UAE companies. Injazat and Thales are working together to address the key cyber risks to companies' businesses and strengthen their cybersecurity operations through a fully managed cybersecurity service. The 24/7 cybersecurity service will be delivered from Injazat's Tier IV ISO certified datacentre in Abu Dhabi. It will provide situational awareness and incident response continuous monitoring services that will be fully compliant with international information assurance frameworks. Furthermore, the two recognised information technology experts, Injazat and Thales, will be extending this offer to provide the critical infrastructures of the UAE with a complete cybersecurity protection scope, relying on Thales's solutions and Injazat's delivery capabilities. "Every day the world grows more dependent on the Internet; nations now rely heavily on IT infrastructure to operate and support their financial markets, transportation networks, energy grids and public agencies to protect the health and security of their citizens. While this growth opens up a lot of opportunities, it also brings accompanying risks," said Ibrahim Lari, Chief Executive Officer, Injazat Data Systems. "The Internet is an evolving technology that carries both enormous potential and vulnerabilities. Cybersecurity operation centres are thus becoming essential in providing enhanced defensive capabilities to address all forms of risks, threats and attacks. Through our work with Thales, we aim to deliver advanced and innovative cybersecurity solutions from a world class Cybersecurity Operation Centre that is ready to face a constantly evolving global threat landscape," added Lari. Marc Darmon, Thales Executive Vice President Secure Communications and Information Systems, said: "Thales and Injazat provide an operational answer to the cybersecurity challenges in the region. We believe that the proactive approach of Thales in cybersecurity combined with the highly reliable infrastructure of Injazat will provide our customers with high security and an added value in their risk management by supplying a situational awareness of their threats." As a world leader in secure communications and information systems, Thales brings to the table extensive know how in security audits and security consulting, development and integration of cybersecurity solutions and security services. Thales draws on distinctive expertise in the supervision and administration of large scale information systems and networks. Since 2001, Thales has operated a world class cybersecurity operations centre for critical infrastructures. It provides 24/7 supervision of the information systems of major corporate customers and also detects and responds to cyberattacks.

17 17 Thales unveils Cyber Integration & Innovation Centre Facility reinforces Thales s commitment to improving cybersecurity of UK November 2013 Thales today announced the launch of a new Cyber Integration & Innovation Centre in the UK, a dedicated cybersecurity 'battlelab' designed to help improve the security of critical national infrastructure, government and commercial organisations. Thales UK has developed the Cyber Integration & Innovation Centre as a working facility to: Enable the modelling of customer networks, in order to help clients understand the security implications of proposed changes in a safe environment a vital service for operators of safety critical technology. Deliver cutting edge cyber security research and development, including co innovation with government, universities, SMEs and customers. Ensure that Thales cybersecurity consultants are the best trained in the world, by supporting their structured training programme with 'simulator time' in a representative environment with the right tools, support and skills development activities. Support the continuous assessment of global cybersecurity products and technologies, to ensure that Thales always recommends the most appropriate solution to meet our clients specific needs. The Cyber Integration & Innovation Centre has been developed to respond to the pervasive cyberthreat facing the UK's critical national infrastructure, which can only be addressed by taking a holistic approach to addressing connected cyber, physical and human security vulnerabilities. This facility enables Thales to work with its clients to: Develop and implement best practice security measures for their specific environment. Use over 6,000 pieces of malware to train security professional staff to protect systems, spot vulnerabilities and respond to breaches in a controlled environment. Test, validate and accredit the security of networks, products and systems by helping to embed the most advanced and holistic approaches to cyberdefence. At the launch of the Cyber Integration & Innovation Centre, Sam Keayes, Vice President for Security & Consulting at Thales UK, said: "Cybersecurity is a pervasive problem that threatens at an individual, organisational and national level. The Cyber Integration & Innovation Centre is part of Thales's holistic response to the growing cybersecurity threat, which addresses connected cyber, physical and human security vulnerabilities." The facility is used to conduct the research necessary to ensure that critical national infrastructure, in particular, can stay one step ahead of the threats. It also offers an unparalleled advanced training facility for security professionals. The centre exchanges tools, practices, malware knowledge and threat updates with other Thales cybersecurity competence centres around the world, enabling the support of global clients' networks. With the support of leading security academics and innovative companies, the centre supports the creation and testing of safety critical systems in a controlled virtualised environment. This allows clients to test their products and systems to the appropriate cybersecurity standard, before live implementation or launch. "Cybersecurity is a journey, which starts by understanding which information needs to be protected and articulating the business benefits of addressing the cybersecurity threat," said Sam Keayes. "The Cyber Integration & Innovation Centre ensures that Thales always provides the most highly

18 18 trained, professional and pragmatic support to our clients, always applies the most effective solutions to cybersecurity problems, and always ensures that 'good cybersecurity is good business'."

19 19 Thales helps secure Microsoft's next-generation cloud service Innovative bring your own key (BYOK) capability allows businesses to retain control of critical assets in the cloud Plantation, FL October 22, 2013 Thales, leader in information systems and communications security, announces that its nshield hardware security modules (HSMs) have been deployed by Microsoft to provide enhanced security for Microsoft Rights Management service (Windows Azure RMS). The new online offering a cloud based digital rights management system forms the core of a new secure collaboration service accessible from anywhere, by anyone and supporting a multitude of document formats. Until now, rights management has mainly focused on infrastructure deployed within the enterprise over which an organisation had complete control. By shifting to a cloud based model, customers have the ability to dramatically expand accessibility and ease of use particularly when collaborating with parties outside their own network and across today s highly dispersed organisations. However, the issue of control and security is still paramount. The goal for any security oriented cloud service is to convey confidence that sensitive data in the cloud is protected, confidence that different tenants are strongly segregated and that control over critical security assets such as cryptographic keys remains with the customer. In the case of Microsoft Windows Azure cloud, Thales nshield hardware security modules (HSMs) enhance the security of its Rights Management Service (RMS) by enabling customers to bring your own key (BYOK). By using a Thales nshield HSM on site, an organisation can generate and securely transfer their critical Tenant Key (the customer s master key) to Thales HSMs in Windows Azure, where it is used to underpin the security of their RMS service. This gives organisations complete custody and visibility over the use of their master key and the reassurance that they can use the Microsoft service on their own terms. Dan Plastina, Partner Group Program Manager, Microsoft says: "The Microsoft Rights Management Service helps customer safeguard their data, both inside and outside of the organisation. As a result of our collaboration with Thales, our customers can generate and upload their own master keys to a cloud based HSM and keep complete control over their keys, giving them confidence that their data is protected." Richard Moulds, Vice President Strategy at Thales e Security says: "The Windows Azure RMS service is a great example of where the unique properties of the cloud can be exploited to transform the usability and value of traditionally in house security systems and therefore greatly promote their adoption. Innovative capabilities such as the bring your own key philosophy and the use of HSMs can protect both the consumer and the cloud provider and build the confidence to trust the service with an organisation s most valuable assets. As organisations focus on moving their more sensitive data and applications to the cloud, the issue of retaining control takes centre stage and sound key management is an effective way of achieving that. The ability to release keys to cloud providers on a need to use basis and to revoke them as necessary will be an increasingly powerful tool."

20 20 Thales and Schneider Electric team on cybersecurity for command-and-control systems Under a new cooperation agreement, Thales and Schneider Electric will jointly propose cybersecurity solutions to essential operators and industry and defence customers to protect their automation and command and control systems from attack. Les Assises de la Sécurité, Monaco, Wednesday 2 October 2013 Thales and Schneider Electric have signed a commercial cooperation agreement for the development of cybersecurity solutions and services to protect command and control systems from cyberattack. As a result of this cooperation, essential operators, industry and defence customers will benefit from state of the art solutions to protect them from new and emerging threats such as computer attacks launched from their management systems, unauthorised access across wireless networks and malware introduced via USB memory sticks. These solutions will also assure compliance with new national and international regulations in the area of security for digital command and control systems. Solutions will include risk management, vulnerability analysis, definition of security architectures, implementation of protection and surveillance measures, security maintenance and incident response management, and will be tailored to the automation and command and control systems in service with Schneider Electric and Thales's customers and their specific environments. Vincent Marfaing, Thales Vice President Information Technology Security/Cybersecurity, said: "Digital security of critical infrastructures is a top priority for the authorities in France and other countries. Through our cooperation with Schneider Electric, we will offer a range of world class technical solutions to meet this requirement." Sylvain Frodé de la Forêt, Vice President of Partner Projects & Buildings, Schneider Electric France, added: "The cooperation with Thales enables us to further extend the range of solutions we offer to our customers in sensitive sectors to address their growing concerns over cybersecurity. It is an alliance between two market leaders designed to step up to one of the major challenges of our times." Schneider Electric and Thales will initially work together to offer these joint solutions to French companies. As Europe's foremost supplier of secure communications and information systems, Thales brings to the table its expertise in security audits and security consulting, development and integration of cybersecurity solutions and security services. Schneider Electric, a leading specialist in automation solutions for energy networks, industrial processes and machines, building management and data centre infrastructure management, is contributing its know how in automation system design as well as its locally based service delivery organisation throughout France.

21 21 Thales TEOPAD obtains ANSSI security certification French Network and Information Security Agency Neuilly sur Seine, Thursday 27 June 2013 The TEOPAD security solution from Thales has received CSPN certification from the French Network and Information Security Agency. This vote of confidence shows that TEOPAD, the security solution for smartphones and tablets, meets its security targets and that no vulnerabilities were identified during the evaluation. The CSPN certification is based on a criteria, methodology and evaluation process developed by ANSSI. The agency is the only authority in France which is able to award a CSPN certification for products providing security for information systems. TEOPAD, a secure workspace on smartphones and tablets With TEOPAD, Thales offers business customers an innovative security solution for Android smartphones and tablets. TEOPAD is an effective response to the security challenges of using these new generation mobile devices for professional purposes when solid assurances of information asset protection are required. TEOPAD runs on standard mobile devices, creating a dedicated workspace for professional applications to protect access, storage and transfers of sensitive data. The professional workspace has no effect on the user s personal settings and in no way restricts the use of personal applications. TEOPAD is a unique, strong authentication solution that allows each company to retain full control over professional services, for example through a private app store or kiosk function. TEOPAD builds on Thales s expertise in cryptology and communications security and implements a Thales patented security technique. Thales and Civipol unveil new cyber crisis management training for managers and executives Thales and Civipol have joined forces to provide managers and executives with cyber crisis management training, covering the many aspects of today's complex and hard to understand threats. Drawing on Thales's vast experience in cybersecurity and crisis management, the training programme uses a specially tailored cyber crisis management exercise to: Assess the conditions and business implications of a cyberattack Clearly identify the organisation's cyber vulnerabilities Evaluate the preparedness of the organisation's teams in the face of a major cyberattack Thales, in partnership with Civipol, also offers this training to government agencies and privatesector companies outside France.

FIC 2014 Stepping up to the cyberspace security challenge

FIC 2014 Stepping up to the cyberspace security challenge www.thalesgroup.com 21-22 January 2014, Lille Grand Palais FIC 2014 Stepping up to the cyberspace security challenge 2 Contents Thales at the 6 th International Cybersecurity Forum Not to be missed Presentations

More information

Thales @ InfoSecurity Ensuring your crypto systems can be trusted

Thales @ InfoSecurity Ensuring your crypto systems can be trusted www.thalesgroup.com 29 April - 1 May 2014, Earl s Court, London, stand F30 Thales @ InfoSecurity Ensuring your crypto systems can be trusted 2 Contents Biographies Thales at InfoSecurity 2014 Do you trust

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril. Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing

More information

Faculdade de Direito, Lisboa, 02-Jul-2014. The Competitive Advantage of Cybersecurity

Faculdade de Direito, Lisboa, 02-Jul-2014. The Competitive Advantage of Cybersecurity Faculdade de Direito, Lisboa, 02-Jul-2014 The Competitive Advantage of Cybersecurity Thales Key highlights (I) A global company with 65,000 employees and 14,2 billion in revenues, R&D 2,5 billion * We

More information

Protecting Malaysia in the Connected world

Protecting Malaysia in the Connected world Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE

More information

CYBER SECURITY Audit, Test & Compliance

CYBER SECURITY Audit, Test & Compliance www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance 02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

CYBERSECURITY. Global cybersecurity capabilities for a digital transformation with confidence. Delivering Transformation. Together.

CYBERSECURITY. Global cybersecurity capabilities for a digital transformation with confidence. Delivering Transformation. Together. CYBERSECURITY Global cybersecurity capabilities for a digital transformation with confidence Delivering Transformation. Together. Sopra Steria, a European leader in digital transformation, has one of the

More information

Cybersecurity on a Global Scale

Cybersecurity on a Global Scale Cybersecurity on a Global Scale Time-tested Leadership A global leader for more than a century with customers in 80 nations supported by offices in 19 countries worldwide, Raytheon recognizes that shared

More information

KUDELSKI SECURITY DEFENSE. www.kudelskisecurity.com

KUDELSKI SECURITY DEFENSE. www.kudelskisecurity.com KUDELSKI SECURITY DEFENSE Cyber Defense Center connection for remote information exchange with local monitoring consoles Satellite link Secure Data Sharing, a data-centric solution protecting documents

More information

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP C DIG CSCSS / DEFENCE INTELLIGENCE GROUP COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE C DIG CSCSS / DEFENCE INTELLIGENCE GROUP

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance

More information

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Legislative Council Panel on Information Technology and Broadcasting. Information Security For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

A strategic approach to fraud

A strategic approach to fraud A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for

More information

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION In the ever-evolving technological landscape which we all inhabit, our lives are dominated by

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

Increasing the city s attractiveness

Increasing the city s attractiveness www.thalesgroup.com URBAN SECURITY Increasing the city s attractiveness Thales Communications & Security 20-22 rue Grange Dame Rose - 78141 Vélizy-Villacoublay - France - Tel: +33(0)1 73 32 00 00 10/2013

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations

More information

Testing the Security of your Applications

Testing the Security of your Applications Home Safeguarding Business Critical Testing the of your Applications Safeguarding business critical systems and applications 2 Safeguarding business critical systems and applications Organizations are

More information

RUAG Cyber Security. More security for your data

RUAG Cyber Security. More security for your data RUAG Cyber Security More security for your data More security in cyberspace The RUAG Cyber Security Portfolio offers greater protection for your data through inspection, event analysis and decision-making

More information

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation

More information

The firm. of the future. Accelerating sustainable progress. Your business technologists. Powering progress

The firm. of the future. Accelerating sustainable progress. Your business technologists. Powering progress The firm of the future Accelerating sustainable progress Your business technologists. Powering progress At Atos we strive to create the firm of the future. We believe that bringing together people, technology

More information

Malware isn t The only Threat on Your Endpoints

Malware isn t The only Threat on Your Endpoints Malware isn t The only Threat on Your Endpoints Key Themes The cyber-threat landscape has Overview Cybersecurity has gained a much higher profile over the changed, and so have the past few years, thanks

More information

Delivering peace of mind in outsourcing

Delivering peace of mind in outsourcing > Delivering peace of mind in outsourcing How to increase enterprise performance when outsourcing mission critical systems www.thalesgroup.com/security-services AND >> PERFORMANCE OUTSOURCING OF MISSION

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

Unisys Security Insights: Global Summary A Consumer Viewpoint - 2015

Unisys Security Insights: Global Summary A Consumer Viewpoint - 2015 Unisys Security Insights: Global Summary A Consumer Viewpoint - 2015 How consumers in 12 countries feel about: Personal data security, ranked by industry Region-specific security perceptions Research by

More information

SMART CITY. The interconnected city: improving the quality of life of citizens

SMART CITY. The interconnected city: improving the quality of life of citizens w w w. t h a l e s g r o u p. c o m The interconnected city: improving the quality of life of citizens transport Security 2 The smart city concept is a vision shared by major cities as they chart their

More information

security changes with Orange focus on your business, we focus on your security

security changes with Orange focus on your business, we focus on your security security changes with Orange focus on your business, we focus on your security the only constant in security is change New uses and new technologies, proliferation of platforms and new workspaces in a

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

Strengthen security with intelligent identity and access management

Strengthen security with intelligent identity and access management Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Cyber Security Recommendations October 29, 2002

Cyber Security Recommendations October 29, 2002 Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown

More information

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,

More information

IT Services. We re the IT in OrganIsaTion. Large Organisations

IT Services. We re the IT in OrganIsaTion. Large Organisations IT Services. We re the IT in OrganIsaTion Large Organisations IT for Large Organisations. As the world of business technology has changed, so have we. From designing, building and optimising tailored

More information

Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary

Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary Is cyber security now too hard for enterprises? Executive Summary Sponsors The creation and distribution of this study was supported by CGI, cybx and Fujitsu/Symantec. Premium sponsors: Gold sponsor: 2

More information

How To Protect Your Business From A Cyber Attack

How To Protect Your Business From A Cyber Attack Intelligence FIRST helping your business make better decisions Cyber security Keeping your business resilient Cyber security is about keeping your business resilient in the modern technological age. It

More information

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41

More information

Nokia Networks. security you can rely on

Nokia Networks. security you can rely on Nokia Networks security you can rely on Protecting communication networks is critical 7 billion mobile subscriptions in 2014 1 Mobile broadband network traffic expected to grow by a factor of 1,000 by

More information

SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise

SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise w w w. t h a l e s g r o u p. c o m SECURE IDENTITY MANAGEMENT Globally recognised identity management expertise Integrated identity management solutions As a global technology leader for the Aerospace

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

Protecting your information

Protecting your information Protecting your information Secure your information Each year, governments, businesses and institutions suffer untold losses through not protecting their information. A UK government survey* puts the cost

More information

Preemptive security solutions for healthcare

Preemptive security solutions for healthcare Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare

More information

Digital Pathways. Harlow Enterprise Hub, Edinburgh Way, Harlow CM20 2NQ. 0844 586 0040 intouch@digitalpathways.co.uk www.digpath.co.

Digital Pathways. Harlow Enterprise Hub, Edinburgh Way, Harlow CM20 2NQ. 0844 586 0040 intouch@digitalpathways.co.uk www.digpath.co. Harlow Enterprise Hub, Edinburgh Way, Harlow CM20 2NQ 0844 586 0040 intouch@digitalpathways.co.uk Security Services Menu has a full range of Security Services, some of which are also offered as a fully

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

ISO27032 Guidelines for Cyber Security

ISO27032 Guidelines for Cyber Security ISO27032 Guidelines for Cyber Security Deloitte Point of View on analysing and implementing the guidelines Deloitte LLP Enterprise Risk Services Security & Resilience Contents Foreword 1 Cyber governance

More information

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis An analogue approach to a digital world What foundations is CDCAT built on?

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

Security & privacy in the cloud; an easy road?

Security & privacy in the cloud; an easy road? Security & privacy in the cloud; an easy road? A journey to the trusted cloud Martin Vliem CISSP, CISA National Security Officer Microsoft The Netherlands mvliem@microsoft.com THE SHIFT O L D W O R L D

More information

ClearSkies. Re-Defining SIEM

ClearSkies. Re-Defining SIEM ClearSkies Re-Defining SIEM Re-Defining SIEM You are required to collect and archive log data generated from diverse systems and applications for forensics and regulatory compliance purposes. You need

More information

Testing the Security of your Applications

Testing the Security of your Applications Home Safeguarding Business Critical Testing the of your Applications Safeguarding business critical systems and applications 2 Safeguarding business critical systems and applications Organizations are

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

Digital Forensics G-Cloud Service Definition

Digital Forensics G-Cloud Service Definition Digital Forensics G-Cloud Service Definition 2013 General Dynamics Information Technology Limited. All rights 1 GDIT Team Clients Metropolitan Police Service The General Dynamics Information Technology

More information

www.thalesgroup.com / transport Supervision at The Heart of Transport Network Security

www.thalesgroup.com / transport Supervision at The Heart of Transport Network Security www.thalesgroup.com / transport Supervision at The Heart of Transport Network Security TECHNOLOGY Thales : Supervision at The Heart of Transport Network Security Supervision plays a key role in any type

More information

Cybernetic Global Intelligence. Service Information Package

Cybernetic Global Intelligence. Service Information Package Cybernetic Global Intelligence Service Information Package / 2015 Content Who we are Our mission Message from the CEO Our services 01 02 02 03 Managed Security Services Penetration Testing Security Audit

More information

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions Managed Security Managed Security MANAGED SECURITY SOLUTIONS I would highly recommend for your company s network review... were by far the best company IT Manager, Credit Management Agency Presenting IT

More information

Sytorus Information Security Assessment Overview

Sytorus Information Security Assessment Overview Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)

More information

HNOLOGY IN POLICING SECURITY & CYBERSPACE SITUATION

HNOLOGY IN POLICING SECURITY & CYBERSPACE SITUATION S e c u r i t y & D e f e n c e Bringing The Digital Edge To Your Operations ITY & CYBERSPACE SITUATIONAL AWARENESS CRITICAL COM S CRITICAL COMMUNICATIONS TECHNOLOGY IN POLICING SE ITUATIONAL AWARENESS

More information

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s IDC Middle East, Africa, and Turkey, Al Thuraya Tower 1, Level 15, Dubai

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

THE WHITE HOUSE Office of the Press Secretary

THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE February 13, 2015 THE WHITE HOUSE Office of the Press Secretary FACT SHEET: White House Summit on Cybersecurity and Consumer Protection As a nation, the United States has become highly

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

Overcoming Five Critical Cybersecurity Gaps

Overcoming Five Critical Cybersecurity Gaps Overcoming Five Critical Cybersecurity Gaps How Active Threat Protection Addresses the Problems that Security Technology Doesn t Solve An esentire White Paper Copyright 2015 esentire, Inc. All rights reserved.

More information

Predictive Cyber Defense A Strategic Thought Paper

Predictive Cyber Defense A Strategic Thought Paper Predictive Cyber Defense A Strategic Thought Paper Don Adams Vice President, Chief Technology Officer, Worldwide Government TIBCO Software Federal, Inc 2 Summary The art and science of multi-sensor data

More information

On the European experience in critical infrastructure protection

On the European experience in critical infrastructure protection DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation

More information

Data center solutions from Siemens. For the factories of the 21 st century. siemens.com/datacenters

Data center solutions from Siemens. For the factories of the 21 st century. siemens.com/datacenters Data center solutions from Siemens For the factories of the 21 st century siemens.com/datacenters We face the challenges for the factories of the 21 st century Based on our vast experience, we offer a

More information

Cybersecurity Converged Resilience :

Cybersecurity Converged Resilience : Cybersecurity Converged Resilience : The cybersecurity of critical infrastructure 2 AECOM Port Authority of New York and New Jersey (PANYNJ), New York, New York, United States. AECOM, working with the

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

CyberArk Privileged Threat Analytics. Solution Brief

CyberArk Privileged Threat Analytics. Solution Brief CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect

More information

Cybersecurity and internal audit. August 15, 2014

Cybersecurity and internal audit. August 15, 2014 Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices

More information

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net This project has received funding from the European Union s Seventh Framework Programme for research, technological development

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

Cybersecurity Delivering Confidence in the Cyber Domain

Cybersecurity Delivering Confidence in the Cyber Domain Cybersecurity Delivering Confidence in the Cyber Domain With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your

More information

Comprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board

Comprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board Comprehensive European Security Approaches: EU Security Programmes Robert HAVAS EOS Chairman of the Board INTRODUCTION the EOS Programmes rationale Why implementing EU Security Programmes / ASPIDA approach?

More information

THE WORLD IS MOVING FAST, SECURITY FASTER.

THE WORLD IS MOVING FAST, SECURITY FASTER. THE WORLD IS MOVING FAST, SECURITY FASTER. * COMMITTED TO SECURITY* *Committed to providing peace of mind in your digital life and business. [ 3 ] OUR MISSION TO PREVENT AND MANAGE RISKS FACED BY ORGANIZATIONS

More information

CYBERSPACE SECURITY CONTINUUM

CYBERSPACE SECURITY CONTINUUM CYBERSPACE SECURITY CONTINUUM A People, Processes, and Technology Approach to Meeting Cyber Security Challenges in the 21 st Century 1 InterAgency Board 1550 Crystal Drive Suite 601, Arlington VA 22202

More information

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for

More information

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace

More information

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue. Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues

More information

NNIT Cybersecurity. A new threat landscape requires a new approach

NNIT Cybersecurity. A new threat landscape requires a new approach NNIT Cybersecurity A new threat landscape requires a new approach Effective cybersecurity is not about spending more money. It s about aligning your security initiatives with the threats and priorities

More information

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014 www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday

More information

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations

More information

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture Topics Introduction Reverse Engineering the Threat Operational

More information

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat

More information

Cyber Security Evolved

Cyber Security Evolved Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are

More information

Zen Internet Case Study

Zen Internet Case Study Zen Internet Case Study About Zen Internet Zen Internet is an independent Internet Service Provider (ISP) that offers a full range of data, voice, and hosting services to businesses and residential users

More information