Enterprise Risk Management: Strategie e Soluzioni a confronto

Size: px
Start display at page:

Download "Enterprise Risk Management: Strategie e Soluzioni a confronto"

Transcription

1 Enterprise Risk Management: Strategie e Soluzioni a confronto - Milano 25 Settembre 2008 Fabio Battelli, CISSP, CISA Practice Manager - Advisory Services Symantec Consulting Services

2 Symantec Global Services Advisory Service Overview 2

3 Symantec Global Services Enabling Confidence in a Connected World Global Reach: professionals across Americas, EMEA, APAC, Japan consulting engagements per year Work with 95% of Fortune 500 Real-world implementation experience Deep technology expertise Leveraging industry best practices Advisory & Solutions enablement skills Consulting company acquisition (Company-i) Professioanls certification (ITIL, CISM, CISSP)

4 Symantec Consulting Services in Italia Governance, Risk & Compliance IT Transformation Services Business Continuity Management Information Foundation Data Centre Management Threat Management/IT policy Compliance Backup & Storage Management Operational support Antivirus and Data Protection op. svcs. SOC operational services Brand monitoring and online fraud mgmt.

5 Risk Management: Key Facts Advisory Service Overview 5

6 Il Risk Management è importante per...

7 Risk Management & Compliance La conformità ed i rischi IT sono strettamente legati. Ad un aumento della conformità IT, corrisponde una riduzione dei rischi IT

8 Governance, Risk & Compliance Governance Governance Governance Crea Valore Definisce obiettivi ed aspettative Individua le Regulation Definisce regole e politiche People Processes Technology Risk Risk Management Individua Minacce, Vulnerabilità, Probabilità Seleziona le contromisure Stabilisce l Asset Value Definisce la strategia di minitigazione Risk Compliance Compliance Compliance Definisce i controlli Lega i controlli alle politiche Fornisce evidenze Dimostra la due diligence

9 Risk Management: Metodologie e soluzioni Symantec IT Security Risk Management & Compliance

10 Risk Management Top Issues (Fonte: ENISA) Principali ostacoli alla gestione del rischio secondo ENISA (European Network and Information Security Agency)...

11 Risk Management Quale metodologia scegliere?

12 Risk Management Methodology Soluzioni

13 Risk Analysis Threats vs Control

14 Risk Analysis Threats or Control Disponibilità di dati storici inerenti la probabilità di accadimento Per Industry Specifiche (es. Banking) Prevalenza del metodo Quantitativo (es. Valutazione monetaria) Ottenere risultati con rapidità, soprattutto nelle grandi organizzazioni Valutare conformità a Standard e Regulation Prevalenza del metodo Qualitativo

15 Risk Management Fattori Critici di Successo

16 Governance, Risk & Compliance (GRC) Process Automation Advisory Service Overview 16

17 Symantec s Automated IT Compliance Approach Define Assess Report Remediate Determine Risk and Develop Policies Assess Infrastructure and Processes Monitor and Demonstrate Due Care Assess Risk and Remediate Problems POLICIES and CONTROLS TECHNICAL CONTROLS DASHBOARDS RISK WEIGHTED REMEDIATION AUDIT REPORTS RISK ASSESSMENTS PROCEDURAL CONTROLS

18 Thank You! Fabio Battelli Practice Manager - Advisory Consulting Services Copyright 2007 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 18

Dall Information Security alla Cyber Security, e ritorno

Dall Information Security alla Cyber Security, e ritorno Dall Information Security alla Cyber Security, e ritorno (Come migliorare la sicurezza dell azienda attraverso un efficace governo degli incidenti) Luca Bechelli (CLUSIT) Marco Di Leo (HP) Fabio Vernacotola

More information

Alberto Meneghini! Security Leader, IBM Italia! IBM Security. 2015 IBM Corporation. 12015 IBM Corporation

Alberto Meneghini! Security Leader, IBM Italia! IBM Security. 2015 IBM Corporation. 12015 IBM Corporation Alberto Meneghini! Security Leader, IBM Italia! 12015 IBM Corporation Esistono istituzioni finanziarie che sanno cosa significa essere attaccate ed altre che neppure lo immaginano. In quale vi riconoscete?!

More information

Maintaining PCI-DSS compliance. Daniele Bertolotti daniele_bertolotti@symantec.com Antonio Ricci antonio_ricci@symantec.com

Maintaining PCI-DSS compliance. Daniele Bertolotti daniele_bertolotti@symantec.com Antonio Ricci antonio_ricci@symantec.com Maintaining PCI-DSS compliance Daniele Bertolotti daniele_bertolotti@symantec.com Antonio Ricci antonio_ricci@symantec.com Sessione di Studio Milano, 21 Febbraio 2013 Agenda 1 Maintaining PCI-DSS compliance

More information

Quali sono i rischi che derivano dall utilizzo del mobile e quali le precauzioni da prendere contro gli attacchi informatici.

Quali sono i rischi che derivano dall utilizzo del mobile e quali le precauzioni da prendere contro gli attacchi informatici. Quali sono i rischi che derivano dall utilizzo del mobile e quali le precauzioni da prendere contro gli attacchi informatici. Nicola D Ottavio Security Sales Specialist 1 The required roadmap disclaimer

More information

Symantec Security Program Assessment

Symantec Security Program Assessment Leverage security maturity to prioritize achievement of enterprise goals The Symantec Security Program Assessment evaluates the maturity of your information security program providing an understanding

More information

Big Data, Big True. IDC Big Data Conference II, Bologna 19 novembre 2013. Fabio Rizzotto IT Research&Consulting Director, IDC Italy

Big Data, Big True. IDC Big Data Conference II, Bologna 19 novembre 2013. Fabio Rizzotto IT Research&Consulting Director, IDC Italy Big Data, Big True IDC Big Data Conference II, Bologna 19 novembre 2013 Fabio Rizzotto IT Research&Consulting Director, IDC Italy Il sorpasso dei Big Data sulla BI Business Intelligence Big Data Worldwide

More information

Sicurezza Data Center 22 giugno 2015. Fabio Paravani Regional Account Manager

Sicurezza Data Center 22 giugno 2015. Fabio Paravani Regional Account Manager Sicurezza Data Center 22 giugno 2015 Fabio Paravani Regional Account Manager A world safe for exchanging digital information CEO Founded Headquarters Employees Offices 2012 Sales Eva Chen 1988, United

More information

Reducing Risk Through Effective Certificate Management

Reducing Risk Through Effective Certificate Management Reducing Risk Through Effective Certificate Management Dave Corbett Technical Product Manager 1 Enterprise Challenges for SSL Management Certificate Expiry & Misconfiguration Certificates Not Secure/Compliant

More information

Risk management, Piano strategico e Organi di governo

Risk management, Piano strategico e Organi di governo Risk management, Piano strategico e Organi di governo Roma, 1 ST Octobre 2014 AGENDA ERM OVERVIEW & VALUE FOR THE BUSINESS ERM IN LUXOTTICA ERM & STRATEGIC PLANNING Roma Risk Management, Piano strategico

More information

Governance, Risk & Compliance

Governance, Risk & Compliance Governance, Risk & Compliance ERM enabled by ARIS Workshop Sistemi IT per la Compliance 30 giugno 2011 Lorenzo Fornai Lorenzo Capozza Software AG at a glance Revenue over 1 billion Global Leader for Process

More information

Le sfide e le opportunità dell internet mobile nelle aziende

Le sfide e le opportunità dell internet mobile nelle aziende Davide Albo MobileFirst Solution Executive IBM SWG Europe Ottobre 2014 Le sfide e le opportunità dell internet mobile nelle aziende Il fattore tecnologico è tornato come prima priorità CIO 2009 CIO 2011

More information

The Economic Outlook Il quadro economico INTELLIGENCE ON THE WORLD, EUROPE, AND ITALY LO SCENARIO DI OGGI E DI DOMANI PER LE STRATEGIE COMPETITIVE

The Economic Outlook Il quadro economico INTELLIGENCE ON THE WORLD, EUROPE, AND ITALY LO SCENARIO DI OGGI E DI DOMANI PER LE STRATEGIE COMPETITIVE Session/Sessione The Economic Outlook Il quadro economico ELECTRONIC POLL RESULTS RISULTATI DEL TELEVOTO INTELLIGENCE ON THE WORLD, EUROPE, AND ITALY LO SCENARIO DI OGGI E DI DOMANI PER LE STRATEGIE COMPETITIVE

More information

IBM Security Services

IBM Security Services IBM Security Services - Penetration Testing - July 15, 2014 12014 IBM Corporation THE EVOLVING THREAT LANDSCAPE 2 Success in today s dynamic, data driven global marketplace requires effective enterprise

More information

Symantec Consulting Services

Symantec Consulting Services GET MORE FROM YOUR SECURITY SOLUTIONS Symantec Consulting 2015 Symantec Corporation. All rights reserved. Access outstanding talent and expertise with Symantec Consulting Symantec s Security Consultants

More information

TRADING ONLINE E STATISTICA PDF

TRADING ONLINE E STATISTICA PDF TRADING ONLINE E STATISTICA PDF ==> Download: TRADING ONLINE E STATISTICA PDF TRADING ONLINE E STATISTICA PDF - Are you searching for Trading Online E Statistica Books? Now, you will be happy that at this

More information

MANY CERTIFICATES WHAT S THE WORTH?

MANY CERTIFICATES WHAT S THE WORTH? MANY CERTIFICATES WHAT S THE WORTH? CLUSIT Security Summit Milano 17 Marzo 2016 Stefano Niccolini AIEA ISACA Milan Chapter (President) Basato su un lavoro di Umberto Annino, ISACA Switzerland Chapter (Certification

More information

PCI DSS READINESS AND RESPONSE

PCI DSS READINESS AND RESPONSE PCI DSS READINESS AND RESPONSE EMC Consulting Services offers a lifecycle approach to holistic, proactive PCI program management ESSENTIALS Partner with EMC Consulting for your PCI program management and

More information

Questa versione del programma è da intendersi come provvisoria * da confermare Seguici sui Social Network e commenta con #forumt2s This version is

Questa versione del programma è da intendersi come provvisoria * da confermare Seguici sui Social Network e commenta con #forumt2s This version is 08.30 09.30 a.m. Registrazione partecipanti, Welcome Coffee e networking nell Area Meeting Participants registration, Welcome Coffee and networking in the Meeting Area SESSIONE PLENARIA DI APERTURA OPENING

More information

Cyber intelligence in an online world

Cyber intelligence in an online world Cyber intelligence in an online world James Hanlon CISM, CISSP, CMI Cyber Strategy & GTM, EMEA Cyber intelligence in an online world SYMANTEC VISION SYMPOSIUM 2014 2 Software and data powers the world

More information

NetBackup Best Practice Using Tape Storage with Deduplicating Disk Storage

NetBackup Best Practice Using Tape Storage with Deduplicating Disk Storage NetBackup Best Practice Using Tape Storage with Deduplicating Disk Storage This document looks at best practices around creating multiple copies of backups on a mixture of tape and deduplicating disk storage.

More information

Find the needle in the security haystack

Find the needle in the security haystack Find the needle in the security haystack Gunnar Kristian Kopperud Principal Presales Consultant Security & Endpoint Management Technology Day Oslo 1 Find the needle in the security haystack Manually deep

More information

Transforming SMB Security Stephen Banbury

Transforming SMB Security Stephen Banbury Transforming SMB Security Stephen Banbury VP, Global SMB Channel & Alliances Compelling Trends for Change Symantec as a Leader in Security Winning Together 2 NOT SO LONG AGO SMB Attitudes Towards Business

More information

Compliance Applicata. Milano, 7 febbraio 2007. Dr. Jean Paul Ballerini Sr. Technology Solutions Expert

Compliance Applicata. Milano, 7 febbraio 2007. Dr. Jean Paul Ballerini Sr. Technology Solutions Expert Compliance Applicata Milano, 7 febbraio 2007 Dr. Jean Paul Ballerini Sr. Technology Solutions Expert Legislazione e Normative Terrorism Act 2000 Sarbanes Oxley Act FSA CMA HIPAA Here is another one Obscene

More information

Le soluzioni per la protezione, l archiviazione dei dati e le novità imminenti nell ambito del Backup e Disaster Recovery

Le soluzioni per la protezione, l archiviazione dei dati e le novità imminenti nell ambito del Backup e Disaster Recovery Le soluzioni per la protezione, l archiviazione dei dati e le novità imminenti nell ambito del Backup e Disaster Recovery Massimiliano Bossi SMB Channel Manager Symantec Italia Uno sguardo al mercato 2

More information

Symantec Company Overview. Symantec Company Overview 1

Symantec Company Overview. Symantec Company Overview 1 Symantec Company Overview Symantec Company Overview 1 Symantec Is Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure

More information

Industrial Control Systems Security. Denny Gregianin_Sales Area Manager

Industrial Control Systems Security. Denny Gregianin_Sales Area Manager Industrial Control Systems Security Denny Gregianin_Sales Area Manager VEM in Numbers 5 29 170 800 495 5000 Dipendenti e Fatturato Design & Delivery NOC SOC HR & Quality Operations Custom Application Development

More information

APC-Pro sa Computer Service

APC-Pro sa Computer Service Configuring, Managing and Troubleshooting Microsoft Exchange Service Pack 2 (10135B) Durata: 5 giorni Orario: 8:30 12:00 / 13:30-17.00 Costo per persona: CHF 1 900.-- (Min. 5 partecipanti) Obiettivi di

More information

Better Together: Microsoft Office 365 & Symantec Office 365

Better Together: Microsoft Office 365 & Symantec Office 365 #SymVisionEmea #SymVisionEmea Better Together: Microsoft Office 365 & Symantec Office 365 & Symantec Mike Smart Product Marketing Information SECURITY David Moseley Product Marketing Information MANAGEMENT

More information

Walter Bogorad, Lead Architect Aman Manik, Principal Product Manager. Secure File Sharing Using Norton Zone powered by Symantec

Walter Bogorad, Lead Architect Aman Manik, Principal Product Manager. Secure File Sharing Using Norton Zone powered by Symantec Secure File Sharing Using Norton Zone powered by Symantec Walter Bogorad, Lead Architect Aman Manik, Principal Product Manager Secure File Sharing Using Norton Zone powered by Symantec 1 Agenda Norton

More information

Payment Card Industry (PCI) Data Security Standard (DSS) Motorola PCI Security Assessment

Payment Card Industry (PCI) Data Security Standard (DSS) Motorola PCI Security Assessment Payment Card Industry (PCI) Data Security Standard (DSS) Motorola PCI Security Assessment Retail establishments have always been a favorite target of thieves and shoplifters, but today s worst criminals

More information

Intel Open Day. VASCO and Intel Identity Protection Technology. Richard Zoni Sales Manager Italy. 2011 - VASCO Data Security

Intel Open Day. VASCO and Intel Identity Protection Technology. Richard Zoni Sales Manager Italy. 2011 - VASCO Data Security Intel Open Day ASCO and Intel Identity Protection Technology 2011 - ASCO Data Security Richard Zoni Sales Manager Italy Agenda 2012 - ASCO Data Security Lunch&Learn with ASCO and Intel 2 Please log in

More information

Spambrella SaaS Support Terms & Conditions

Spambrella SaaS Support Terms & Conditions April 29, 2014 Spambrella SaaS Support Terms & Conditions Spambrella and/or other noted Spambrella related products contained herein are registered trademarks or trademarks of Spambrella and/or its affiliates

More information

22/11/2015-08:08:30 Pag. 1/10

22/11/2015-08:08:30 Pag. 1/10 22/11/2015-08:08:30 Pag. 1/10 CODICE: TITOLO: MOC20462 Administering Microsoft SQL Server Databases DURATA: 5 PREZZO: LINGUA: MODALITA': 1.600,00 iva esclusa Italiano Classroom CERTIFICAZIONI ASSOCIATE:

More information

comscore Day Press Conference Milan, 19 th November 2015

comscore Day Press Conference Milan, 19 th November 2015 comscore Day Press Conference Milan, 19 th November 2015 For info about the proprietary technology used in comscore products, refer to http://comscore.com/about_comscore/patents vce in Italy Today: The

More information

Symantec Enterprise Vault.cloud Giovanni Alberici

Symantec Enterprise Vault.cloud Giovanni Alberici Symantec Enterprise Vault.cloud Giovanni Alberici Global Product Marketing Manager 1 Agenda 1 2 3 4 Symantec s cloud strategy Overview of Symantec.cloud Symantec Enterprise Vault.cloud Symantec.cloud portfolio

More information

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice NERC Cyber Security Compliance Consulting Services HCL Governance, Risk & Compliance Practice Overview The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to

More information

The Retail & Proximity Marketing Expo & Conference. Milano, 14 October 2010 Hotel De La Ville

The Retail & Proximity Marketing Expo & Conference. Milano, 14 October 2010 Hotel De La Ville The Retail & Proximity Marketing Expo & Conference Milano, 14 October 2010 Hotel De La Ville Prof. Cesare A. Massarenti Università di Milano-Bicocca - Politecnico di Torino Babes-Bolyai University 14 October

More information

Chief Security Strategist Symantec Public Sector

Chief Security Strategist Symantec Public Sector Chief Security Strategist Symantec Public Sector Advanced Persistent Threat Further things to understand about the APT Compromised Game Networks Lulzec Anonymous/YamaTough WikiLeaks 101 Global Intelligence

More information

Altiris Client Management Suite

Altiris Client Management Suite Altiris Client Management Suite Agenda 1 What DO YOU Need Help With 2 What does Altiris have to Assist 3 What s New with CMS 7 4 Beyond Client Management Altiris Client Management Suite Leads the Way Symantec

More information

Software License Monitoring

Software License Monitoring LANDESK Quick Start Guide Software License Monitoring VERSION 2 Introduction This guide was designed to help those users new to Software License Monitoring (SLM) introduced in LANDESK Management Suite

More information

Public, Private, Hybrid:

Public, Private, Hybrid: Public, Private, Hybrid: How to Use the Cloud for More Effective Security Symantec and Cloud Computing Ron Poserina, Director of Systems Engineering Agenda Our Perspective on Cloud Computing Why Cloud

More information

Informazione Regolamentata n. 1597-41-2016

Informazione Regolamentata n. 1597-41-2016 Informazione Regolamentata n. 1597-41-2016 Data/Ora Ricezione 29 Aprile 2016 16:55:26 MTA Societa' : CERVED INFORMATION SOLUTIONS Identificativo Informazione Regolamentata : 73431 Nome utilizzatore : CERVEDN04

More information

Cloud Services: cosa sono e quali vantaggi portano alle aziende manifatturiere

Cloud Services: cosa sono e quali vantaggi portano alle aziende manifatturiere Cloud Services: cosa sono e quali vantaggi portano alle aziende manifatturiere Sergio Gimelli Sales Consulting Director Oracle Italy Fabbrica Futuro Verona, 27 Giugno 2013 1 2 Cosa è il Cloud? il Cloud

More information

Choosing Between Managed Security Services or In-house SIEM? Consider the Benefits of both!

Choosing Between Managed Security Services or In-house SIEM? Consider the Benefits of both! Choosing Between Managed Security Services or In-house SIEM? Consider the Benefits of both! Matteo Masserini Steven Kulley Tarun Sondhi Emerging Region Sales Specialist Regional Product Manager - EMEA

More information

CERTIFICATE MANAGEMENT SURVEY

CERTIFICATE MANAGEMENT SURVEY CERTIFICATE MANAGEMENT SURVEY GLOBAL RESULTS 2013 CONTENTS 3 4 5 7 8 9 METHODOLOGY INTRODUCTION SSL CERTIFICATE MANAGEMENT IS COMPLEX STAKES HIGH WITH CERTIFICATE MANAGEMENT COMPANIES IN DENIAL ABOUT EXPIRED

More information

E U R O P E A N C U R R I C U L U M V I T A E F O R M A T PERSONAL INFORMATION

E U R O P E A N C U R R I C U L U M V I T A E F O R M A T PERSONAL INFORMATION E U R O P E A N C U R R I C U L U M V I T A E F O R M A T PERSONAL INFORMATION Name Address Telephone Luca Nocco Via Agostini Della Seta, 8, Pisa (56121), Italy. + 39 050 981407 (ab.) + 39 347 7823875

More information

Corso: Mastering Microsoft Project 2010 Codice PCSNET: MSPJ-11 Cod. Vendor: 50413 Durata: 3

Corso: Mastering Microsoft Project 2010 Codice PCSNET: MSPJ-11 Cod. Vendor: 50413 Durata: 3 Corso: Mastering Microsoft Project 2010 Codice PCSNET: MSPJ-11 Cod. Vendor: 50413 Durata: 3 Obiettivi Comprendere la disciplina del project management in quanto si applica all'utilizzo di Project. Apprendere

More information

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide The software described in this book is furnished under a license agreement and

More information

INFORMATION PROTECTION

INFORMATION PROTECTION INFORMATION PROTECTION Johan Celis Principal Security Consultant Symantec Benelux SYMANTEC ENTERPRISE SECURITY STRATEGY Users Data Cyber Security Services Monitoring, Incident Response, Simulation, Adversary

More information

Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security,

Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security, Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security, streamline compliance reporting, and reduce the overall

More information

Titoli delle qualifiche

Titoli delle qualifiche Level 1: Level 1 Award in Selling lawfully and ethically (Legalità ed etica della vendita) Level 1 Award in Understanding the sales cycle (Capire il processo di vendita) Level 1 Award in Understanding

More information

ITIL and Altiris ServiceDesk. Joseph Carson, Sr. Product Manager October 21, 2009

ITIL and Altiris ServiceDesk. Joseph Carson, Sr. Product Manager October 21, 2009 ITIL and Altiris ServiceDesk Joseph Carson, Sr. Product Manager October 21, 2009 Agenda Altiris Portfolio Overview IT Lifecycle Management Service Framework Establish the Face of IT to the Business Automate

More information

Project Management/Controls and their impact on Auditing and Accounting Issues. October 31, 2012

Project Management/Controls and their impact on Auditing and Accounting Issues. October 31, 2012 Project Management/Controls and their impact on Auditing and Accounting Issues October 31, 2012 Today s presenters Patrick Hagan National Managing Partner State and Local Government patrick.hagan@mcgladrey.com

More information

Transform Audit Practices and Move Beyond Assurance

Transform Audit Practices and Move Beyond Assurance SAP Brief SAP s for Governance, Risk, and Compliance SAP Audit Management Objectives Transform Audit Practices and Move Beyond Assurance Advance along the technology curve Advance along the technology

More information

An Oracle White Paper January 2010. Access Certification: Addressing & Building on a Critical Security Control

An Oracle White Paper January 2010. Access Certification: Addressing & Building on a Critical Security Control An Oracle White Paper January 2010 Access Certification: Addressing & Building on a Critical Security Control Disclaimer The following is intended to outline our general product direction. It is intended

More information

Enterprise Vault 10 Feature Briefing

Enterprise Vault 10 Feature Briefing Enterprise Vault 10 Feature Briefing Nirvanix Cloud Storage This document is one of a set of Feature Briefings which detail major new or changed features in Enterprise Vault 10. This document covers the

More information

8 Key Requirements of an IT Governance, Risk and Compliance Solution

8 Key Requirements of an IT Governance, Risk and Compliance Solution 8 Key Requirements of an IT Governance, Risk and Compliance Solution White Paper: IT Compliance 8 Key Requirements of an IT Governance, Risk and Compliance Solution Contents Introduction............................................................................................

More information

Smart Factory: non un lontano futuro, ma un attuale opportunità grazie al concetto Optimized Packaging Plant (OPP)

Smart Factory: non un lontano futuro, ma un attuale opportunità grazie al concetto Optimized Packaging Plant (OPP) Smart Factory: non un lontano futuro, ma un attuale opportunità grazie al concetto Optimized Packaging Plant (OPP) For internal use only / Siemens AG 2011. All Rights Reserved. Smart Factory: le esigenze

More information

Self-assessment and development of the Human Resources Strategy for Researchers: a successful approach

Self-assessment and development of the Human Resources Strategy for Researchers: a successful approach Self-assessment and development of the Human Resources Strategy for Researchers: a successful approach Camerino, July 8th, 2015 Anna Maria Eleuteri Rector s Delegate for HRS4R How to develop your strategy

More information

DTI / Titolo principale della presentazione IPHONE ENCRYPTION. Litiano Piccin. 11 ottobre 2014

DTI / Titolo principale della presentazione IPHONE ENCRYPTION. Litiano Piccin. 11 ottobre 2014 1 IPHONE ENCRYPTION 2 MOBILE FORENSICS Nella Computer Forensics, le evidenze che vengono acquisite sono dispositivi statici di massa; questa significa che possiamo ottenere la stessa immagine (bit stream)

More information

Distribution: questo livello include le Base Station utilizzate per stabilire la connettività wireless con gli utenti finali.

Distribution: questo livello include le Base Station utilizzate per stabilire la connettività wireless con gli utenti finali. Il presente documento HLD definisce l architettura e le configurazioni necessarie per separare la rete di management dai servizi dati dedicati al traffico cliente, con l obiettivo di poter accedere agli

More information

Enterprise Vault 11 Feature Briefing

Enterprise Vault 11 Feature Briefing Enterprise Vault 11 Feature Briefing Enterprise Vault SCOM Enhancements This document is about the new Enterprise Vault SCOM enhancements introduced in Enterprise Vault 11. If you have any feedback or

More information

IBM QRadar Security Intelligence April 2013

IBM QRadar Security Intelligence April 2013 IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence

More information

ISACA: Certified Information Security Manager Certification Training

ISACA: Certified Information Security Manager Certification Training ISACA: Certified Information Security Manager Certification Training Certified Information Security Manager (CISM) DESCRIPCIÓN: El programa de certificación CISM (Certified Information Security Manager)

More information

Storage management and business continuity strategy and futures

Storage management and business continuity strategy and futures #SymVisionEmea #SymVisionEmea Storage management and business continuity strategy and futures Petter Sveum Information Availability Solution Lead EMEA Ian Wood Information Management Strategy & GTM Storage

More information

From Complexity to Client Centricity - Business Analytics nel settore bancario

From Complexity to Client Centricity - Business Analytics nel settore bancario From Complexity to Client Centricity - Business Analytics nel settore bancario IBM Forum Milano, 22 Giugno 2011 Francesca Gandini IBM Associate Partner, Banking Sector f.gandini@it.ibm.com Un recente studio

More information

IMPLEMENTATION OF HIGH-PERFORMANCE SECURITY MANAGEMENT PROCESSES

IMPLEMENTATION OF HIGH-PERFORMANCE SECURITY MANAGEMENT PROCESSES IMPLEMENTATION OF HIGH-PERFORMANCE SECURITY MANAGEMENT PROCESSES OBJECTIVES This course is specifically designed to improve your skills as an information security manager. Using O-ISM3 as a framework,

More information

Symantec Residency and Managed Services

Symantec Residency and Managed Services Symantec Residency and Managed Services Flexible options for staff augmentation and IT out-tasking Symantec Global Services Confidence in a connected world. Symantec Residency and Managed Services provide

More information

The Data Accessibility Gamble: What is Your Enterprise Wagering? Maximize Accessibility and Minimize the Risk Stored in Your Enterprise Data

The Data Accessibility Gamble: What is Your Enterprise Wagering? Maximize Accessibility and Minimize the Risk Stored in Your Enterprise Data The Data Accessibility Gamble: What is Your Enterprise Wagering? Maximize Accessibility and Minimize the Risk Stored in Your Enterprise Data This document does not provide legal or other professional advice

More information

Best Practices for a BYOD World

Best Practices for a BYOD World Face Today s Threats Head-On: Best Practices for a BYOD World Chris Vernon CISSP, VTSP Security Specialist Agenda Mobile Threats Overview 2013 State of Mobility Survey Canada BYOD Best Practices 2 Mobile

More information

Oracle Retail MICROS Stores2 Functional Document General - License Control Release 1.37.1. September 2015

Oracle Retail MICROS Stores2 Functional Document General - License Control Release 1.37.1. September 2015 Oracle Retail MICROS Stores2 Functional Document General - License Control Release 1.37.1 September 2015 Oracle Retail MICROS Stores2 Functional Document General - License Control, Release 1.37.1 Copyright

More information

Symantec Control Compliance Suite Standards Manager

Symantec Control Compliance Suite Standards Manager Symantec Control Compliance Suite Standards Manager Automate Security Configuration Assessments. Discover Rogue Networks & Assets. Harden the Data Center. Data Sheet: Security Management Control Compliance

More information

Symantec to Acquire Clearwell Systems, Inc. May 19, 2011

Symantec to Acquire Clearwell Systems, Inc. May 19, 2011 Symantec to Acquire Clearwell Systems, Inc. May 19, 2011 1 Forward-Looking Statements This presentation contains forward-looking statements within the meaning of U.S. federal securities laws, including

More information

An Oracle White Paper October 2009. An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions

An Oracle White Paper October 2009. An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions An Oracle White Paper October 2009 An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions Executive Overview Today s complex financial crime schemes pose

More information

Leveraging a Maturity Model to Achieve Proactive Compliance

Leveraging a Maturity Model to Achieve Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance White Paper: Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance Contents Introduction............................................................................................

More information

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who

More information

Source code security testing

Source code security testing Source code security testing Simone Riccetti EMEA PSS Security Services All information represents IBM's current intent, is subject to change or withdrawal without notice, and represents only IBM ISS goals

More information

Smarter Data Center di IBM

Smarter Data Center di IBM Sergio Eufemi - GTS Offering Management and Development Leader Marzo 2011 Smarter Data Center di IBM I nuovi modelli di business richiedono un salto qualitativo e quantitativo all IT in un difficile contesto

More information

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat

More information

UP L13: Leveraging the full protection of SEP 12.1.x

UP L13: Leveraging the full protection of SEP 12.1.x UP L13: Leveraging the full protection of SEP 12.1.x Martial RICHARD Principal Field Enablement Manager Endpoint Security UP L13 1 Threat landscape (ISTR Vol.18 April 2013) http://www.symantec.com/threatreport/

More information

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management Managing Remote and Mobile Workers 1 Today s Workforce 79% employees favor

More information

IC L10: Seamless Encryption of Data Sync'ing to Dropbox Using Symantec File Share Encryption

IC L10: Seamless Encryption of Data Sync'ing to Dropbox Using Symantec File Share Encryption IC L10: Seamless Encryption of Data Sync'ing to Dropbox Using Symantec File Share Encryption Jeremy Tully, Douglas Rivers, Matt Dawdy Technical Field Enablement 1 Is your Enterprise Data secure in the

More information

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Release 3.1.0 for Symantec ESM 6.5.x and 9.0.1 Symantec Enterprise Security Manager Modules for Sybase

More information

Cad Service e l integrazione CAD : Una partnership di valore per. Meeting. G.Delmonte Founder and CEO CadService

Cad Service e l integrazione CAD : Una partnership di valore per. Meeting. G.Delmonte Founder and CEO CadService Cad Service e l integrazione CAD : Una partnership di valore per G.Delmonte Founder and CEO CadService Meeting Company Profile Opera da oltre 15 anni nel facility ed asset management, con ottime referenze,

More information

Securing OS Legacy Systems Alexander Rau

Securing OS Legacy Systems Alexander Rau Securing OS Legacy Systems Alexander Rau National Information Security Strategist Sample Agenda 1 Today s IT Challenges 2 Popular OS End of Support & Challenges for IT 3 How to protect Legacy OS systems

More information

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems Engineer Symantec LAMC Agenda 1 What DLP is and its purpose 2 Challenges

More information

How to Create and Secure Your Mobile Infrastructure. Session EM B27

How to Create and Secure Your Mobile Infrastructure. Session EM B27 How to Create and Secure Your Mobile Infrastructure Session EM B27 Mike Littleton Manager, EndPoint Infrastructure Kelly Services John Engels Principal Product Manager, Symantec Enterprise Mobility Typical

More information

Motorola Enterprise Mobility Services. Maximize the value of your mobility solutions

Motorola Enterprise Mobility Services. Maximize the value of your mobility solutions Motorola Enterprise Mobility Services Maximize the value of your mobility solutions Motorola Enterprise Mobility Services: Service with a difference for maximum success and maximum business advantage

More information

«Software Open Source come fattore abilitante dei Progetti per le Smart Cities»

«Software Open Source come fattore abilitante dei Progetti per le Smart Cities» «Software Open Source come fattore abilitante dei Progetti per le Smart Cities» Le esperienze nell Electronic Ticketing, nel Wireless Sensor Networks, nei Telematic Services & Location Based Systems Enrico

More information

Risk and threats everywhere, all the time

Risk and threats everywhere, all the time Risk and threats everywhere, all the time Hackers Cloud Remote Offices/ Workers Authentication & Encryption Mobile Devices Virtualization Malicious & Well-meaning Users Cyber Threats Social Media Compliance

More information

Building Private Cloud Architectures

Building Private Cloud Architectures Building Private Cloud Architectures Chandra Rangan Sr. Director, Storage & Availability Management Group Symantec Corporation SNW Spring 2011: Building Private Cloud Architectures 1 State of the infrastructure

More information

The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence

The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver White Paper: BEST PRACTICES The Modern Service Desk: Contents Introduction............................................................................................

More information

Lorenzo.barbieri@microsoft.com Blogs.msdn.com/vstsitalia. www.geniodelmale.info

Lorenzo.barbieri@microsoft.com Blogs.msdn.com/vstsitalia. www.geniodelmale.info Lorenzo.barbieri@microsoft.com Blogs.msdn.com/vstsitalia www.geniodelmale.info Visual Studio Team System, Professional e Standard Team Explorer si integra in VS2008/VS2005 Visual Studio.NET 2003, VS 6.0,

More information

Accenture: Digitizing Internal Audit

Accenture: Digitizing Internal Audit Accenture: Digitizing Internal Audit 2 The Internal Audit function at Accenture is essential for identifying and assessing financial, operational, and technology risks and controls. As Accenture has expanded

More information

Streamlining the ediscovery

Streamlining the ediscovery Streamlining the ediscovery Response Process Dean Gonsowski, Esq. Sr. ediscovery Counsel Streamlining the FOIA Process 1 Today s Speaker Dean Gonsowski, Esq. Sr. ediscovery Counsel Mr. Gonsowski is the

More information

The 2010 Symantec Break in the Clouds Report. 2010 Symantec Break in the Clouds Report

The 2010 Symantec Break in the Clouds Report. 2010 Symantec Break in the Clouds Report The 2010 Symantec Break in the Clouds Report 1 Introduction The White House is urging Federal agencies to adopt cloud computing, with a clear focus on streamlining infrastructure management, improving

More information

Oracle Retail MICROS Stores2 Functional Document Tax Free - Manual Receipt Number Assignment Release 1.35. September 2015

Oracle Retail MICROS Stores2 Functional Document Tax Free - Manual Receipt Number Assignment Release 1.35. September 2015 Oracle Retail MICROS Stores2 Functional Document Tax Free - Manual Receipt Number Assignment Release 1.35 September 2015 Oracle Retail MICROS Stores2 Functional Document Tax Free - Manual Receipt Number

More information

Direct virtual machine creation from backup with BMR

Direct virtual machine creation from backup with BMR NETBACKUP 7.6 FEATURE BRIEFING DIRECT VIRTUAL MACHINE CREATION FROM BACKUP WITH BMR NetBackup 7.6 Feature Briefing Direct virtual machine creation from backup with BMR Version number: 1.0 Issue date: 5

More information

Advanced High Availability Architecture. White Paper

Advanced High Availability Architecture. White Paper Advanced High Advanced High Production database servers are replicated in near-real time to a peer data center within the same geographic region in Asia Pacific Japan (APJ); Europe, Middle East and Africa

More information

Un nuovo modello di efficienza all interno del Data Center Fabio Di Dionisio HP Storage Division

Un nuovo modello di efficienza all interno del Data Center Fabio Di Dionisio HP Storage Division HP Converged Storage: Un nuovo modello di efficienza all interno del Data Center Fabio Di Dionisio HP Storage Division Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained

More information