Company profile secunet Security Networks AG

Size: px
Start display at page:

Download "Company profile secunet Security Networks AG"

Transcription

1 Company profile secunet Security Networks AG Profile in brief secunet is one of the leading German providers of high-quality IT security. Over 380 experts work in the areas of cryptography, e-government, business security and automotive security, and develop innovative products in these fields in addition to highly secure and reliable solutions. Many DAX companies as well as numerous authorities and organisations are among secunet's national and international customers. secunet is IT security partner of the Federal Republic of Germany and Partner of the German Cyber Security Alliance. secunet was founded in 1996 and achieved sales of EUR 91.1 million in secunet Security Networks AG is listed on the Prime Standard of the German Stock Exchange. In addition to the headquarters in Essen, the company has six further locations in Germany. For more information, please visit Facts and figures at a glance Foundation: 1996, as a spin-off of RWTÜV Essen Type of enterprise: Corporation, listed on the Prime Standard of the German Stock Exchange. Main shareholder: Giesecke & Devrient GmbH, Munich (approximately 79% of shares) Headquarters: secunet Security Networks AG Kurfürstenstraße Essen Germany Further locations: Berlin, Dresden, Eschborn, Hamburg, Munich and Siegen (Germany) Service portfolio: Holistic IT security including consulting, concept design, development, implementation, support and powerful products Business units: Business Sector including the divisions Automotive and Critical Infrastructures Public Sector including the divisions Homeland Security, Public Authorities and Defence 1

2 Customers: Over 500 national and international customers, including the German Foreign Office, Federal Ministry of Defence, Federal Ministry of the Interior, Federal Office for Information Security, Regional Tax Authority of Bavaria, Howaldtswerke-Deutsche Werft GmbH, mobile.de, BMW, Audi, National-Bank, Commerzbank, Gelsenwasser, Stadtwerke Bremen, Stadtwerke München Industry solutions: Public sector, defence, security organizations, critical infrastructures, energy- and water suppliers, telecommunication, automotive industry, transport and logistics Memberships: BITKOM, TeleTrusT Deutschland e.v. Board of Management: Dr Rainer Baumgart (Chairman, responsible for the business units Public Sector and Business Sector, corporate development/strategy, compliance/revision and corporate communications/marketing) Thomas Pleines (responsible for finance & controlling, legal department, human resources, product management coordination) IT Security the highest requirements IT security has long been one of the top-priority issues and one of the greatest challenges for any organization in today's information society. The sector is characterized by fast technological development as well as a very complex range of diverse issues. Additionally, national and international legislation, regulations and directives often dictate very special requirements concerning the security of data and infrastructures. At the same time, organizations are becoming more vulnerable as a result of their growing dependency on well-functioning and networked information processing as well as an increased need among employees for mobile and flexible access to corporate data. More frequent use of different devices and applications also increases risks due to incorrect usage and negligence. The urgent need for a comprehensive, continuously updated security solution for companies and authorities also results from increasingly more sophisticated forms of industrial espionage and cyber war attacks. Today, attacks are not only carried out by individuals, but by well-organized and well-funded groups. But it is not only internal networks that are becoming more vulnerable as a result of increased introduction of electronic components and their connection with the Internet; national infrastructures are also at risk. Attacks on energy supply and communicational networks can be launched from anywhere in the world. Even vehicles will soon be communicating with each other via the Internet. These areas also need stringent security measures to maintain a functioning infrastructure. 2

3 However, the market provides no assistance in terms of orientation due to high provider fragmentation. Consequently, a comprehensive, substantiated overview of security requirements and solutions is all the more important. For companies and authorities, the relevant financial and personnel investment is usually too high, so they rely on specialist service providers. secunet: premium IT security "made in Germany" Effective, comprehensive IT security can only be achieved through careful planning and professional support. Alongside intelligent technology, factors relating to infrastructure, legislation, organization and personnel must be taken into account during concept design and rollout. secunet relies on holistic IT security that takes into account all these aspects and implements them in applications with long-term protection. Customers benefit from comprehensive consultation as well as from a technologically advanced service and product portfolio that fulfils even the highest security requirements. secunet offers in-depth know-how in various security fields. These range from the highest security levels in authorities and complete solutions for companies, to the protection of Internet access in vehicles. In addition to products developed and marketed in-house for different security levels, secunet also implements solutions from other security providers in order to achieve the best-possible protection tailored to suit the individual needs of the customer. Alongside design concept and installation, the service provider also assumes responsibility for daily operation. The fields covered by secunet include securing authorities' communication by means of encryption, protecting applications in e-government, developing important security technology such as electronic passports and securing critical infrastructures. secunet also uses the experience gathered in these highly sensitive areas to safeguard business-critical processes in companies. These include, for example, research and development projects. In close collaboration with the German Federal Office for Information Security (BSI), secunet continues to design, develop and evaluate new components and products and roll out data security projects. Additionally, secunet has long-term partnerships with the German Federal Ministry of the Interior (BMI) and well-known automotive manufacturers and suppliers. 3

4 Important information about the company 1996 Foundation of secunet from RWTÜV Focus: digital signatures and cryptography with Internet technologies 1999 Initial public offering Pioneer for PKI/trustcenter development for digital certificates in Germany 2000 Launch of SINA (Secure Inter-Network Architecture) product development for encrypted transmission of confidential documents on behalf of the BSI Expansion from consulting business to product manufacturer Initial tests for the introduction of biometry in sovereign documents 2004 Giesecke & Devrient becomes main shareholder Acquisition of SECARTIS AG, a subsidiary of Giesecke & Devrient from the IT security sector Appointment as IT security partner of the Federal Republic of Germany 2015 Sales: 91.1 million euros EBIT: 8.6 million euros Employees: 383 (As of 31 December 2015) SINA components in use: > 60,000 Formation of the company With the advent of the World Wide Web in the 1990s, the Rheinisch-Westfälische Technische Überwachungsverein (RWTÜV) in Essen expanded its area of activity to cover the evaluation of network security. Digital signatures and encryption technologies in particular played a major role in this. As more and more companies wanted their networks to be tested and improved, the TÜV carved out its department for IT security under the name secunet. The service provider did not only test network security, but also improved it together with the customer through consulting and training as well as designing, implementing and operating an optimized security solution. This is still the focus of its activities to this day. With the further development of security technologies, at the end of the 1990s, secunet contributed to comprehensive public key infrastructures for issuing, distributing and checking digital certificates via state-approved trustcenters. 4

5 Automotive With the advent of automated driving, we are on the brink of the next big thing in vehicle innovation. But cars are already highly connected with their environment today. They generate and process vast tracts of internal and external data to provide comfort, infotainment and driver security, which means hacking attacks not only threaten vehicle safety, but also the privacy of vehicle owners which is why data protection and security are now indispensable. Where data protection and security are concerned, the automotive industry wants solutions suitable for series production that respond to vehicle-specific needs, as well as to the peculiarities of the entire automotive supply chain. With years of experience in the automotive industry, secunet s Automotive division works with vehicle manufacturers and suppliers to develop and implement production-ready IT security for on-board network components guaranteeing secure internal and external vehicle networking and protecting new mobility services. The division s services range from drafting specification sheets to implementing and launching solutions in the vehicle, system and process landscape, and it uses software and hardware-based technologies depending on the level of protection required. Its portfolio is rounded out by technical security analyses for existing control unit implementations in its own laboratory. Homeland Security In a networked and globalised world, safeguarding domestic security is one of the greatest challenges of our time. National and international security authorities make a vital contribution to protecting society and the state from criminal activity, terrorism and other, similar threats. No matter the threats faced, the organisations responsible for keeping us safe use IT-supported systems and are increasingly reliant on digital processes to do their job. Guaranteeing IT security is therefore crucial to domestic security. The Homeland Security division specialises in meeting the needs of organisations, authorities and departments, and delivers intelligent, tailored, end-to-end IT security solutions for national and international use. It also offers high-powered products, customer-specific developments and highly specialised consulting. The division s main focus is solutions and infrastructure for collecting biometric data, as well as stationary, mobile and automated border control systems, modern (mobile) government workstations, advanced document management systems for processing classified information, and secure, highperformance police networks. 5

6 Critical Infrastructures Critical infrastructures are organisations and institutions that are crucial to our nation and government. These infrastructures are increasingly reliant on IT-supported systems and require special protection, because malfunction and disruption can have dramatic consequences for the German economy and society. It is therefore vitally important to protect CRITIS from cyber attacks, espionage and sabotage. secunet s Critical Infrastructures division is dedicated to the integrators, manufacturers and operators of critical infrastructures. With industry-specific knowledge and methodical, technical expertise, the division implements efficient and effective IT security strategies and tailored information security solutions. The division specialises in securing the most vulnerable aspects of critical infrastructures while meeting all applicable legal requirements. Its services include IT security consulting, the design of information security management systems, customer-specific software development, penetration tests, certification services and security awareness training. What s more, the division s extensive product portfolio allows customers to prevent malfunctions and security breaches and respond appropriately should the worst happen. Adopting a holistic approach to IT security, the division establishes secure, tamper-proof connections between networks, enables secure (mobile) remote access to sensitive IT areas like process control and automation systems, and implements protection systems. This means cyber attacks are effectively repelled without impairing the availability of critical systems. Public Authorities The processes and IT infrastructures of public authorities present particular challenges in information security, with diverse fields of application from safeguarding digital communications to protecting e-government applications (e.g. against cyber attacks and espionage) and identity management requiring topquality, tailored IT security solutions. secunet s Public Authorities division offers advice and support to national and regional authorities, drawing on state-of-the-art, combinable products and services, and tailored security concepts. These are designed to meet all the needs of modern administration, meaning customers can perform their official duties while taking into account the security requirements for protecting classified information. The division s strengths lie in its years of experience meeting the security needs of public authorities, as well as its specially tailored products and services. This includes supplying secure, mobile workstations and protecting national and regional authority networks, as well as implementing reliable identity management solutions. Information security management systems built according to IT Baseline Protection offer a consistently high level of security, for instance especially considering the unique infrastructural, regulatory, organisational and staff challenges posed by public authorities. SINA products are used for the secure processing, storage, transmission 6

7 and verification of classified and other sensitive information. Finally, the division s consulting services are rounded out by IT security campaigns and security awareness training. Defence The armed forces, military organisations and authorities have a particularly strong need to protect the confidentiality of their data which ranges from national and international data to mission-related classified information. Closely linked to this are innovative IT security architectures, e.g. for basic IT-based troop operations, C4ISR systems and multinational mission networks. secunet s Defence division draws on years of experience and an in-depth understanding of national and international defence to support military customers. It also assists system integrators, technology companies, consulting firms and research institutes in this unique market segment. Together with the German Federal Office for Information Security, secunet s specialists develop SINA (E/H) cryptographic devices for national and international customers with high security requirements. SINA makes it possible to securely process, store, transfer and register classified information up to and including security classifications STRENG GEHEIM (TOP SECRET), NATO SECRET and SECRET UE. The diversity of secunet s unique product range including stationary and mobile clients, IPsec and unidirectional gateways, Ethernet encryptors and a registry-compliant solution (SINA Workflow) makes it possible to create security domains for all manner of application scenarios. In addition, the division offers complementary security solutions in the following technology areas: public key infrastructures, biometric security solutions, ReCoBS (Remote Controlled Browser Systems) and cyber defence. The Defence division s services are rounded out by SINA and IT security consulting (especially in the context of security and network architectures), SINA system integration and application-oriented research. 7

8 Press contact: Christine Skropke, Spokesperson Phone: Fax: Patrick Franitza, Dep. Spokesperson Phone: Fax: secunet Security Networks AG Kurfürstenstraße Essen (Germany) 8

Intelligent Solutions for the Highest IT Security Requirements

Intelligent Solutions for the Highest IT Security Requirements Intelligent Solutions for the Highest IT Security Requirements 3 Information security from the architects of modern cryptographic systems SINA (Secure Inter-Network Architecture) enables the protected

More information

Intelligent Solutions for the Highest IT Security Demands

Intelligent Solutions for the Highest IT Security Demands Intelligent Solutions for the Highest IT Security Demands 3 Information security from the architects of modern cryptographic systems SINA (Secure Inter-Network Architecture) enables the protected processing,

More information

successstory Security for Diplomacy High Security for Embassy Networks

successstory Security for Diplomacy High Security for Embassy Networks successstory Security for Diplomacy High Security for Embassy Networks Today the consistent deployment of strong cryptography, along with key management that regulates access to data, are the only ways

More information

Veridos Protects Identities. The expert for worldwide government solutions

Veridos Protects Identities. The expert for worldwide government solutions Veridos Protects Identities The expert for worldwide government solutions 2 Personal identity in a globalized world Today s globalized world is fast, mobile, and highly virtualized. We now expect access

More information

Overview of the key figures for the first half of the year

Overview of the key figures for the first half of the year Half-Year Report 2015 Q2 Revenues increase in the first half of the year by 23% EBIT increased by 1.5 million euros compared to the previous year Order book is growing Overall annual forecast remains unchanged

More information

L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast.

L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast. L2 Box Layer 2 Network encryption Verifiably secure, simple, fast. reliable line encryption. Nowadays internal and confidential data is exchanged between locations or computer centres of public authorities

More information

Technology for data security on the move

Technology for data security on the move hcbvkskfb,jjdvj69g95jgfmfvnmdyc j654wgshdshcbdvdhh3321bvdjdvkr556ur8f8vxlfvsjfb4kfköfkbjöjrööxdvöodjösejavhvhjzjzju6dthtjfzkvlkre.dkn.678i87kje5öäpaüpeqü3äüaoefjfj0ldk,jxclaehfleahfi47zgeugkuvykdfalwidaihrflwaihl993urkwffkaf

More information

Overview of the key figures for the first nine months

Overview of the key figures for the first nine months Continued revenue growth: up 12% on previous year Results impacted by revenue structure and one-off effects High volume of orders: outlook remains optimistic Q3 Overview of the key figures for the first

More information

Cyber Security Strategy for Germany

Cyber Security Strategy for Germany Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable

More information

Protecting your information

Protecting your information Protecting your information Secure your information Each year, governments, businesses and institutions suffer untold losses through not protecting their information. A UK government survey* puts the cost

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

Cyber Security Review

Cyber Security Review ISSN 2055-6950 (Print) ISSN 2055-6969 (Online) Cyber Security Review Winter 2014/15 CYBERCRIME AS A NATIONAL SECURITY ISSUE CECSP: TOWARDS EFFECTIVE COLLABORATION ON CYBER SECURITY IN CENTRAL EUROPE TECHNICAL

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

GOVERNMENT OF THE REPUBLIC OF LITHUANIA GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For

More information

Secure by design: taking a strategic approach to cybersecurity

Secure by design: taking a strategic approach to cybersecurity Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk

More information

Training courses 2015/2016

Training courses 2015/2016 Training courses 2015/2016 2 S33.201 SINA Basics Basic knowledge of IP and routing Basic knowledge of networks and VPN Basic knowledge of cryptography Administrators who use or will soon use an All-in-One

More information

Business Continuity Policy

Business Continuity Policy Business Continuity Policy Software, consultancy and services for global trade and supply chain management Business Continuity Policy Companies using AEB solutions for managing and monitoring their logistics

More information

developing your potential Cyber Security Training

developing your potential Cyber Security Training developing your potential Cyber Security Training The benefits of cyber security awareness The cost of a single cyber security incident can easily reach six-figure sums and any damage or loss to a company

More information

Brainloop Cloud Security

Brainloop Cloud Security Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating

More information

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects

More information

WE ENGINEER THE FUTURE INVESTOR PRESENTATION AUGUST, 2015

WE ENGINEER THE FUTURE INVESTOR PRESENTATION AUGUST, 2015 WE ENGINEER THE FUTURE INVESTOR PRESENTATION AUGUST, 2015 FIRST SENSOR COMPANY PROFILE First Sensor AG is one of the world's leading suppliers in the field of sensor systems. Our company develops and manufactures

More information

Partnerships Annual Report 2008

Partnerships Annual Report 2008 Partnerships Annual Report 2008 Key Figures in Euro m 2008 2007 Change in % Sales 52.1 41.3 +26 EBIT 1.9 3.5-46 EBITDA 2.7 4.4-38 EBT 2.2 3.7-40 Net income/loss year 1.7 2.7-36 Earnings per share 0.27

More information

Deutsche Telekom's International Cloud Approach

Deutsche Telekom's International Cloud Approach Deutsche Telekom's International Cloud Approach Cloud computing is a strongly growing and highly attractive sector of the ICT market. According to Deutsche Telekom's in-depth cloud market analysis the

More information

MODERNIZING IT PLATFORMS SUCCESSFULLY HOW PLATFORM RENEWAL PROJECTS CREATE VALUE

MODERNIZING IT PLATFORMS SUCCESSFULLY HOW PLATFORM RENEWAL PROJECTS CREATE VALUE MODERNIZING IT PLATFORMS SUCCESSFULLY HOW PLATFORM RENEWAL PROJECTS CREATE VALUE INTRODUCTION The machinery and plant engineering industry is under pressure to transform. Globalization, new competitors,

More information

HMG Security Policy Framework

HMG Security Policy Framework HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of

More information

HDI expands Cyber insurance and offers new coverage

HDI expands Cyber insurance and offers new coverage HDI expands Cyber insurance and offers new coverage concepts HDI Global SE HDI Versicherung AG HDI-Platz 1 30659 Hannover Cyber protection now for businesses of all sizes Standalone solutions for mid-sized

More information

RUAG Cyber Security. More security for your data

RUAG Cyber Security. More security for your data RUAG Cyber Security More security for your data More security in cyberspace The RUAG Cyber Security Portfolio offers greater protection for your data through inspection, event analysis and decision-making

More information

Management Report Corporate Profile Annual Report 2014 Continental AG 42

Management Report Corporate Profile Annual Report 2014 Continental AG 42 Management Report Corporate Profile Annual Report 2014 Continental AG 42 Corporate Strategy A balanced product portfolio, technological and market leadership in the market segments relevant to us, as well

More information

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Connecting things. Creating possibilities. A point of view

Connecting things. Creating possibilities. A point of view Connecting things. Creating possibilities. A point of view Is the next technological revolution already here? The Internet of Things is already transforming our daily lives, our health, education and businesses.

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption

Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption White Paper Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption Today s Encryption Environments The number of cyber attacks targeting US organizational data has doubled over

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

INFRASTRUCTURE CONTROL SYSTEMS ENCRYPTION

INFRASTRUCTURE CONTROL SYSTEMS ENCRYPTION INFRASTRUCTURE CONTROL SYSTEMS ENCRYPTION solutions-paper INFRASTRUCTURE AND INDUSTRIAL PROCESS AND CONTROL SYSTEMS SECURITY ARE OF NATIONAL IMPORTANCE DUE TO THEIR ESSENTIAL SERVICES AND ECONOMIC IMPACT.

More information

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for

More information

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 Cyberspace is both an ecosystem consisting of an infrastructure and services, and an environment where and through

More information

REPUBLIC OF LATVIA MINISTRY OF DEFENCE NATIONAL ARMED FORCES CYBER DEFENCE UNIT (CDU) CONCEPT

REPUBLIC OF LATVIA MINISTRY OF DEFENCE NATIONAL ARMED FORCES CYBER DEFENCE UNIT (CDU) CONCEPT REPUBLIC OF LATVIA MINISTRY OF DEFENCE NATIONAL ARMED FORCES CYBER DEFENCE UNIT (CDU) CONCEPT Riga 2013 Introduction In accordance with the National Security Concept, information technology threats or

More information

The Crisis Management System in Germany

The Crisis Management System in Germany The Crisis Management System in Germany www.bmi.bund.de Last update: January 2010 Contents Preliminary remarks... 5 1. Background... 5 2. Legal framework... 8 3. Crisis management at the federal level..

More information

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY

More information

DEMOCRATIC REPUBLIC OF TIMOR-LESTE NATIONAL PARLIAMENT

DEMOCRATIC REPUBLIC OF TIMOR-LESTE NATIONAL PARLIAMENT DEMOCRATIC REPUBLIC OF TIMOR-LESTE NATIONAL PARLIAMENT LAW No. /2003 INTERNAL SECURITY Ensuring internal security constitutes a pre-condition for safeguarding the peace and stability of any sovereign country

More information

How To Manage Risk On A Scada System

How To Manage Risk On A Scada System Risk Management for Industrial Control Systems (ICS) And Supervisory Control Systems (SCADA) Information For Senior Executives (Revised March 2012) Disclaimer: To the extent permitted by law, this document

More information

National Plan for Information Infrastructure Protection

National Plan for Information Infrastructure Protection National Plan for Information Infrastructure Protection www.bmi.bund.de Contents 1 Introduction 2 1.1 Germany s information infrastructures 2 1.2 Threats and risks to our information infrastructures 3

More information

ID Security Made in Germany Holistic Solutions for Biometric Systems and Identity Documents

ID Security Made in Germany Holistic Solutions for Biometric Systems and Identity Documents ID Security Made in Germany Holistic Solutions for Biometric Systems and Identity Documents 3 Your Personal Identity: Unique, Secure, Multifaceted Every person has individual characteristics by which

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises Appendix Key Areas of Concern i. Inadequate coverage of cybersecurity risk assessment exercises The scope coverage of cybersecurity risk assessment exercises, such as cybersecurity control gap analysis

More information

SECURITY ORGANISATION Security Awareness and the Five Aspects of Security

SECURITY ORGANISATION Security Awareness and the Five Aspects of Security SECURITY ORGANISATION Security Awareness and the Five Aspects of Security Shift Security simply used to protect information vs. Enabling business initiatives with security Bolt-on/add-on structure to business

More information

SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY

SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY Transported Asset Protection Association SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY YOUR INVITATION TO JOIN TAPA EMEA Making your supply chain more resilient The Transported Asset Protection Association

More information

Cybersecurity Strategy of the Republic of Cyprus

Cybersecurity Strategy of the Republic of Cyprus Policy Document Cybersecurity Strategy of the Republic of Cyprus Network and Information Security and Protection of Critical Information Infrastructures Version 1.0 23 April 2012 TABLE OF CONTENTS EXECUTIVE

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

Smart Cities. Smart partners in tomorrow s cities

Smart Cities. Smart partners in tomorrow s cities DNV KEMA serving the energy industry Smart Cities Smart partners in tomorrow s cities Experience, knowledge and advanced methods & tools for smart city planning and implementation 02 I DNV KEMA SERVING

More information

Developing National Frameworks & Engaging the Private Sector

Developing National Frameworks & Engaging the Private Sector www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012

More information

Company Profile. Aareon AG

Company Profile. Aareon AG Company Profile Aareon AG Isaac-Fulda-Allee 6 55124 Mainz Karin Veyhle Corporate Marketing & Communications Press spokesperson Tel.: +49 7141 2986295 Fax: +49 7141 2986296 Karin.Veyhle@Aareon.com www.aareon.com

More information

Smart Grid Different Flavors for Different Tastes

Smart Grid Different Flavors for Different Tastes By Jeff Buxton, Executive Consultant, and Mehrdod Mohseni, Senior Vice President and General Manager of Smart Grid Practice, Black & Veatch Published in Intelligent Utility Magazine, May/June 2010 Smart

More information

Cybersecurity Strategic Consulting

Cybersecurity Strategic Consulting Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with

More information

The Danish Cyber and Information Security Strategy

The Danish Cyber and Information Security Strategy February 2015 The Danish Cyber and Information Security Strategy 1. Introduction In December 2014 the Government presented a National Cyber and Information Security Strategy containing 27 government initiatives

More information

Position Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security

Position Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security Position Paper: Berlin, 31 March 2014 Legislative intentions to increase IT Security eco the Association of the sees itself as lobbyist and supporter of all companies that are involved in the economic

More information

On the European experience in critical infrastructure protection

On the European experience in critical infrastructure protection DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation

More information

Security Services and Solutions. Full security, from planning through implementation to operation.

Security Services and Solutions. Full security, from planning through implementation to operation. Security Services and Solutions. Full security, from planning through implementation to operation. Security Services and Solutions. Seamless end-to-end service provision. T-Systems supports its customers

More information

Cloud Computing Security Considerations

Cloud Computing Security Considerations Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction

More information

Solution & Service Portfolio for the Telco Market.

Solution & Service Portfolio for the Telco Market. Telecommunications Billing Solution & Service Portfolio for the Telco Market. Billing. Business flexibility Solution & Service Portfolio for the Telco Market. T-Systems. T-Systems is a one-stop information

More information

We Believe in Security with a Capital S

We Believe in Security with a Capital S Security Consulting by arvato Systems We Believe in Security with a Capital S The number of attacks on IT systems has increased dramatically in recent years, with the style and approach of such attacks

More information

Program Automotive Security and Privacy

Program Automotive Security and Privacy Program Automotive Security and Privacy FFI Board Funded Program 2015 10 02 Abstract This document describes the FFI board funded program Automotive Security and Privacy. This document is prepared by the

More information

www.pwc.com Developing a robust cyber security governance framework 16 April 2015

www.pwc.com Developing a robust cyber security governance framework 16 April 2015 www.pwc.com Developing a robust cyber security governance framework 16 April 2015 Cyber attacks are ubiquitous Anonymous hacker group declares cyber war on Hong Kong government, police - SCMP, 2 October

More information

DEDICATED TO SOLUTIONS. Automotive System and Software Development

DEDICATED TO SOLUTIONS. Automotive System and Software Development DEDICATED TO SOLUTIONS Automotive System and Software Development ... PERFORMANCE ADVANTAGE BY KNOW-HOW AND INNOVATION ESG Partnership System Competence Progress For five decades, ESG has been one of the

More information

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 BACKGROUND CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 On 26-30 October 2015 Lowlands Solutions Netherlands (LSN) will be presenting

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

ICASAS505A Review and update disaster recovery and contingency plans

ICASAS505A Review and update disaster recovery and contingency plans ICASAS505A Review and update disaster recovery and contingency plans Release: 1 ICASAS505A Review and update disaster recovery and contingency plans Modification History Release Release 1 Comments This

More information

Cyber Security Recommendations October 29, 2002

Cyber Security Recommendations October 29, 2002 Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown

More information

Nokia Networks. security you can rely on

Nokia Networks. security you can rely on Nokia Networks security you can rely on Protecting communication networks is critical 7 billion mobile subscriptions in 2014 1 Mobile broadband network traffic expected to grow by a factor of 1,000 by

More information

CYBER SECURITY Audit, Test & Compliance

CYBER SECURITY Audit, Test & Compliance www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance 02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit

More information

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE Identity is the unique set of characteristics that define an entity or individual. Identity theft is the unauthorized use of an individual

More information

Billing Code: 4810-25. Guidance Concerning the National Security Review Conducted by the Committee

Billing Code: 4810-25. Guidance Concerning the National Security Review Conducted by the Committee This document has been submitted to the Office of the Federal Register (OFR) for publication and is currently pending placement on public display at the OFR and publication in the Federal Register. The

More information

HNOLOGY IN POLICING SECURITY & CYBERSPACE SITUATION

HNOLOGY IN POLICING SECURITY & CYBERSPACE SITUATION S e c u r i t y & D e f e n c e Bringing The Digital Edge To Your Operations ITY & CYBERSPACE SITUATIONAL AWARENESS CRITICAL COM S CRITICAL COMMUNICATIONS TECHNOLOGY IN POLICING SE ITUATIONAL AWARENESS

More information

SerViceS & SolutionS for next generation customer management

SerViceS & SolutionS for next generation customer management SerViceS & SolutionS for next generation customer management LOYALTY PARTNER SOLuTiONS ServiceS & SolutionS 02 03 BooSting customer loyalty AnD winning new customers in a world of saturated markets long-term

More information

Securing the Microsoft Cloud

Securing the Microsoft Cloud Securing the Microsoft Cloud Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and consumers to fully embrace and benefit from

More information

This is a free 15 page sample. Access the full version online.

This is a free 15 page sample. Access the full version online. AS/NZS ISO/IEC 17799:2001 This Joint Australian/New Zealand Standard was prepared by Joint Technical Committee IT-012, Information Systems, Security and Identification Technology. It was approved on behalf

More information

IT security beyond expectations

IT security beyond expectations IT security beyond expectations Binärcode ist die Gesamtheit aller Codes welche Informationen durch Sequenzen von zwei verschiedenen Symbolen (zum Beispiel 1 / 0 oder wahr / falsch) dargestellt werden

More information

Smart Data Business 10 statements on the use of big data solutions in business

Smart Data Business 10 statements on the use of big data solutions in business Smart Data Business 10 statements on the use of big data solutions in business Key results of a study conducted by Smart Data Accompanying Research in cooperation with the Business Application Research

More information

Cyber Security solutions

Cyber Security solutions Cyber Security solutions The scenario IT security has become a highly critical issue for all businesses as a result of the growing pervasiveness and diffusion of ICT technology. Risks can arise both inside

More information

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the

More information

Best Solutions for Biometrics and eid

Best Solutions for Biometrics and eid Best Solutions for Biometrics and eid In times of virtual communication even a person s identity is converted into an electronic form with the help of biometrics and then organised through intricate technical

More information

Standards for Security Categorization of Federal Information and Information Systems

Standards for Security Categorization of Federal Information and Information Systems FIPS PUB 199 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Standards for Security Categorization of Federal Information and Information Systems Computer Security Division Information Technology

More information

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,

More information

TeleTrusT Bundesverband IT-Sicherheit e.v.

TeleTrusT Bundesverband IT-Sicherheit e.v. TeleTrusT Bundesverband IT-Sicherheit e.v. TeleTrusT-Workshop "Industrial Security" 2015 München, 11.06.2015 Einführung Industrial Security anhand des IEC 62443; Bedrohungslage für Betreiber von ICS (Industrial

More information

Act of 20 March 1998 No. 10 relating to Protective Security Services (the Security Act)

Act of 20 March 1998 No. 10 relating to Protective Security Services (the Security Act) Act of 20 March 1998 No. 10 relating to Protective Security Services (the Security Act) Chapter 1. General provisions Section 1. The purpose of the Act The purpose of this Act is to: a) take steps enabling

More information

Application management services that power business transformation

Application management services that power business transformation SOLUTION MAP Application management services that power business transformation Protecting business reputation and revenue through superior application performance Application management for IT and business

More information

Navigating Cyber Risk Exposure and Insurance. Stephen Wares EMEA Cyber Risk Practice Leader Marsh

Navigating Cyber Risk Exposure and Insurance. Stephen Wares EMEA Cyber Risk Practice Leader Marsh Navigating Cyber Risk Exposure and Insurance Stephen Wares EMEA Cyber Risk Practice Leader Marsh Presentation Format Four Key Questions How important is cyber risk and how should we view the cyber threat?

More information

KION Group acquires Handling Automation division of automation specialist Egemin Group

KION Group acquires Handling Automation division of automation specialist Egemin Group Press release KION Group acquires Handling Automation division of automation specialist Egemin Group Egemin Group is one of the leading suppliers of automation solutions for logistic flows, processes and

More information

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become

More information

Advantages of High Speed Networking Solutions

Advantages of High Speed Networking Solutions 3 SECURE HIGH-SPEED CONNECTIVITY Protecting Critical Data in Motion without Compromise 2 Data Security Remains a Growing Concern Enterprises of all sizes are adopting cloud-based applications, in which

More information

IBM Penetration Testing Services

IBM Penetration Testing Services IBM Penetration Testing Services Service Definition IBM Penetration Testing Services 1 1. Summary 1.1 Service Description IBM offers a comprehensive set of Security Assessment and Penetration Testing services,

More information

FTTx Roll-out: A Commercial Perspective beyond Technology

FTTx Roll-out: A Commercial Perspective beyond Technology Opinion Paper FTTx Roll-out: A Commercial Perspective beyond Technology 2010 / 11 We make ICT strategies work Table of Contents 1 Motivation...3 2 Roll-out Levers...4 2.1 Demand Drivers...4 2.2 Competitive

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

Assessing the strength of your security operating model

Assessing the strength of your security operating model www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems

More information

Brenntag Oil & Gas. Efficiency OIL & GAS

Brenntag Oil & Gas. Efficiency OIL & GAS Oil & Gas Brenntag Oil & Gas From obtaining fuel that can efficiently power factories and vehicles to safely delivering the oil and gas that keep households warm in winter, modern society depends on having

More information

WHITE PAPER Security in M2M Communication What is secure enough?

WHITE PAPER Security in M2M Communication What is secure enough? WHITE PAPER Security in M2M Communication What is secure enough? Motivation Wireless Machine-To-Machine (M2M) communication has grown dramatically over the past decade and is still growing rapidly. In

More information