SECURITY REDEFINED. Managing risk and securing the business in the age of the third platform. Sabine Bendiek, Geschäftsführerin EMC Deutschland GmbH

Size: px
Start display at page:

Download "SECURITY REDEFINED. Managing risk and securing the business in the age of the third platform. Sabine Bendiek, Geschäftsführerin EMC Deutschland GmbH"

Transcription

1 SECURITY REDEFINED Managing risk and securing the business in the age of the third platform Sabine Bendiek, Geschäftsführerin EMC Deutschland GmbH 1

2 BILLIONS OF USERS MILLIONS OF APPS 2010 HUNDREDS OF MILLIONS OF USERS Mobile Cloud Big Data Social Mobile Devices LAN/Internet 1990 PC Client/Server TENS OF THOUSANDS OF APPS Source: IDC, 2012 MILLIONS OF USERS 1970 Mainframe, Mini Computer Terminals THOUSANDS OF APPS 2

3 A New Security Approach Is Required 2 ND PLATFORM LAN/Internet PC Client/Server 3 RD PLATFORM Mobile Cloud Big Data Social Mobile Devices IT CONTROLLED PERIMETER-BOUND PREVENTION SIGNATURE-BASED USER-CENTRIC BORDERLESS DETECTION INTELLIGENCE-DRIVEN 3

4 Intelligence is the Game Changer 4

5 RSA s Focus Areas Advanced Security Advanced Security Detecting and Stopping Advanced Threats Understanding and Managing Organizational Risk Governance, Risk, & Compliance Identity & Access Identity & Data Management Protection Securing the Interactions Between People and Information Preventing Online Fraud and Cybercrime Fraud Fraud & Risk & Risk Intelligence 5

6 RSA Security Summit Agenda Munich, Hotel Vier Jahreszeiten May 12th 2014 Zeit Registrierung/Kaffee Advanced Security Identity & Data Protection Begrüßung und Überblick: Sabine Bendiek, Geschäftsführerin EMC Deutschland GmbH RSA Keynote Presentation: Dave Martin, Chief Security Officer, EMC Corporation Tales From The Front Lines: Actionable Strategies for An Intelligence Driven Security Program T-Systems Keynote: Michael Uebel, Head of Executive Security Consulting, T-Systems International GmbH Security as Business Enabler Kaffeepause Governance, Risk, & Compliance 1:Security 3: Fraud & Risk 4: GRC 5: Channel 2: IAM Intelligence Room Name Room Name Room Name Room Name Room Name The Critical Incident Response Maturity Journey Identity und Access Management Mesut Bakir, IAM Specialist, RSA Matthiew Gardiner, Senior Manager, RSA Best Practices To Improve Breach Readiness Bob Griffin, Chief Security Architect, RSA Transforming Information Security- Insights from the Security for Business Key Technologies for Security Identity Management und Governance Innovation Council Dr. Michael Teschner, Matthiew Gardiner, Senior Manager, RSA Mesut Bakir, IAM Specialist, RSA Risk Intelligence: Harness and Exploit Risk for Competitive Advantage David Walter, General Manager GRC, RSA EMEA Kunden Präsentation: IT- Fraud & Risk Security Management mit RSA Archer bei Knorr Bremse Albert Messmer, IT-Security Intelligence Auditor, Knorr-Bremse IT- BDM RSA Deutschland TBC Services GmbH RSA Channel Mission/2014 Channel priorities/state of The MarketRSA value proposition Roberto Llop, Director Emea Channels&Alliances, RSA Aktueller Überblick über das RSA Portfolio 2014 Norbert Olbrich, Pre-Sales Manager, RSA Deutschland 6

7 RSA Security Summit Agenda "Networking" Mittagessen im Ausstellungsbereich Advanced Security Advanced Cyber Defense im Spannungsfeld zwischen Compliance und Wirksamkeit Sicherheit im Einklang - Anwenderfreundliche Mehrfaktor Authentifizierung mittels Adaptive Authentication Identity & Data IT Security Risk Management Protection and Business Continuity Inth3Wild: The Current State of Cyber Threats Management RSA Channel Mission/2014 Channel priorities/state of The MarketRSA value proposition Uwe Bernd-Striebeck, Consulting und IT Advisory, KPMG Jochen Klotz, Senior Systems Engineer, Matthew Joseff, Senior RSA Deutschland Technology Evangelist, RSA Gerald Pernack, Archer egrc Solution Architect, RSA Roberto Llop, Director Emea Channels&Alliances, RSA ACD services Best Practices zum Schutz von Unternehmenswerten gegen Cyber- Gefahren Web Threat Detection- Distinguishing between a customer or criminal Automatisierung eines ISMS nach ISO mit RSA Archer LIVE! im RSA Security Center - dem Angreifer auf der Spur Azeem Aleem, Practice Manager- Advanced Cyber Defense Practice EMEA Bob Griffin, Chief Security Architect, RSA Matthew Joseff, Senior Technology Evangelist, RSA Kaffeepause Wilhelm Suffel, Senior Consultant, ComputaCenter Norbert Olbrich, Pre-Sales Manager, RSA Deutschland Governance, Risk, & Compliance Roundtable with EMC/ RSA executives - Customer Q&A Closing Keynote: Leo Martin, Ex Agent: GEHEIMWAFFEN DER KOMMUNIKATION-Social Engineering "Networking" Snacks/Drinks im Ausstellungsbereich Fraud & Risk Intelligence 7

8

Rashmi Knowles Chief Security Architect EMEA

Rashmi Knowles Chief Security Architect EMEA Rashmi Knowles Chief Security Architect EMEA AGENDA Transformation of IT New cyber-security challenges Intelligence Driven Security Security Analytics Q&A 2 ENTERPRISE DATA CENTER ADVANCED SECURITY A UNIQUE

More information

Cloud Ready Technology Evolution

Cloud Ready Technology Evolution Cloud Ready Technology Evolution Alf Nulli cto, service provider emea @alfcloud EMC Stand: 1025 & 1092 1 BILLIONS OF USERS MILLIONS OF APPS Mobile Cloud Big Data Social Mobile Devices HUNDREDS OF MILLIONS

More information

How To Get A Job At Ecm

How To Get A Job At Ecm Cloud, Big Data etc. oder: Wie ich meinen Job behalte.!? Bernhard Grubelnig, Presales Director TEEAM Region, EMC Twitter: @bgrubelnig 1 Ein kleines Quiz 2 ..wer kennt: 3 ..wer kennt: 4 ..wer kennt: und..wer

More information

Security and Privacy

Security and Privacy Security and Privacy Matthew McCormack, CISSP, CSSLP CTO, Global Public Sector, RSA The Security Division of EMC 1 BILLIONS OF USERS MILLIONS/BILLIONS OF APPS 2010 Cloud Big Data Social Mobile Devices

More information

Security Trends. The Case for Intelligence-Driven Security. Copyright 2013 EMC Corporation. All rights reserved.

Security Trends. The Case for Intelligence-Driven Security. Copyright 2013 EMC Corporation. All rights reserved. Security Trends The Case for Intelligence-Driven Security 1 Attack Surface and Threat Environment ¼ ZETTABYTE 2 40-60? ZETTABYTES ZETTABYTES 2007 2013 2020 Digital Content 2 Attack Surface and Threat Environment

More information

Journey to the cloud. Sergei Butenko District Manager EMC

Journey to the cloud. Sergei Butenko District Manager EMC Journey to the cloud Sergei Butenko District Manager EMC Copyright 2013 2013 EMC Corporation. EMC Corporation. All rights reserved. All rights reserved. 1 THE FUTURE Disruptive / Opportunistic IT Trends

More information

The Trends and the Customer Challenges in Identity and Access Management

The Trends and the Customer Challenges in Identity and Access Management The Trends and the Customer Challenges in Identity and Access Management Traxion: RSA: John van Westeneng Corné van Rooij 1 TRILLIONS OF DEVICES BILLIONS OF USERS MILLIONS OF APPS Mobile Cloud Big Data

More information

Ralf Kaltenbach, Regional Director Germany. Arrow Sommerforum 2015

Ralf Kaltenbach, Regional Director Germany. Arrow Sommerforum 2015 Ralf Kaltenbach, Regional Director Germany Arrow Sommerforum 2015 Unsere IT ist doch sicher 2 oder vielleicht doch nicht? 3 2015 VDBIR 4 VDBR - Hintergründe und High level Fakten Dozens of TBs of data

More information

RSA Archer Risk Intelligence

RSA Archer Risk Intelligence RSA Archer Risk Intelligence Harnessing Risk to Exploit Opportunity June 4, 2014 Steve Schlarman GRC Strategist 1 Risk and Compliance Where is it today? 2 Governance, Risk, & Compliance Today 3 4 A New

More information

RSA ARCHER OPERATIONAL RISK MANAGEMENT

RSA ARCHER OPERATIONAL RISK MANAGEMENT RSA ARCHER OPERATIONAL RISK MANAGEMENT 87% of organizations surveyed have seen the volume and complexity of risks increase over the past five years. Another 20% of these organizations have seen the volume

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

Transformation to a ITaaS Model & the Cloud

Transformation to a ITaaS Model & the Cloud Transformation to a ITaaS Model & the Cloud CIO Summit - Miami November, 2014 John Cullen Laddie Suk EMC Global Professional Services John.cullen@emc.com Laddie.suk@emc.com 1 Agenda Business Challenges

More information

Advanced Threats: The New World Order

Advanced Threats: The New World Order Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China gary.lau@rsa.com 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC

More information

EMC ACADEMIC ALLIANCE

EMC ACADEMIC ALLIANCE EMC ACADEMIC ALLIANCE Preparing the next generation of IT professionals for careers in virtualized and cloud environments. EMC ACADEMIC ALLIANCE EMC collaborates with colleges and universities worldwide

More information

Place photo here Executive Customer Briefing

Place photo here Executive Customer Briefing Place photo here Executive Customer Briefing Walldorf, 06. Mai 2013 Agenda Uhrzeit Thema Referent 09:00 Begrüßung & Vorstellung Peter Rupp, IBM IBM SAP Strategische Allianz und Partnerschaft Erwartungen

More information

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287

More information

RSA, The Security Division of EMC. Zamanta Anguiano Sales Manager RSA

RSA, The Security Division of EMC. Zamanta Anguiano Sales Manager RSA RSA, The Security Division of EMC Zamanta Anguiano Sales Manager RSA The Age of the Hyperextended Enterprise BUSINESS ISSUES IMPACT Innovation Collaboration Exploding Information Supply Chain Customer

More information

Wandel im Unternehmen durch BigData. Markus Zappolino - Joachim Worf

Wandel im Unternehmen durch BigData. Markus Zappolino - Joachim Worf Wandel im Unternehmen durch BigData Markus Zappolino - Joachim Worf SE Manager Public, Deutschland Sr. Education Delivery Manager @zappom @joworf 1 Agenda IT Heute Big Data EMC Corporation 2 IT ist ein

More information

CIO SUMMIT l LAS VEGAS

CIO SUMMIT l LAS VEGAS CIO SUMMIT l LAS VEGAS Copyright 2014 EMC Corporation. All rights reserved. 1 IT Transformation Facilitator: Tom Roloff, SVP Global Services, EMC Many Industries Face Structural Change 3 Today s Business

More information

Information Security Shake Up: What to Expect in 2013

Information Security Shake Up: What to Expect in 2013 Information Security Shake Up: What to Expect in 2013 The Security for Business Innovation Council and RSA forecast developments to watch Eddie Schwartz Chief Security Officer, RSA, the Security Division

More information

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

Developing Secure Software in the Age of Advanced Persistent Threats

Developing Secure Software in the Age of Advanced Persistent Threats Developing Secure Software in the Age of Advanced Persistent Threats ERIC BAIZE EMC Corporation DAVE MARTIN EMC Corporation Session ID: ASEC-201 Session Classification: Intermediate Our Job: Keep our Employer

More information

PARTNER TRAINING PROGRAM

PARTNER TRAINING PROGRAM PARTNER TRAINING PROGRAM WHAT IS RSA SECURWORLD ACADEMY? RSA SecurWorld Academy is RSA s formal accreditation & certification program for SecurWorld resellers and distributors, providing them with the

More information

Intelligence Driven Security

Intelligence Driven Security Intelligence Driven Security RSA Advanced Cyber Defense Workshop Shane Harsch Senior Solutions Principal, RSA 1 Agenda Approach & Activities Operations Intelligence Infrastructure Reporting & Top Findings

More information

Cybersecurity Strategic Consulting

Cybersecurity Strategic Consulting Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with

More information

10 TIPS TO IMPROVE YOUR SECURITY INCIDENT READINESS AND RESPONSE

10 TIPS TO IMPROVE YOUR SECURITY INCIDENT READINESS AND RESPONSE 10 TIPS TO IMPROVE YOUR SECURITY INCIDENT READINESS AND RESPONSE EXECUTIVE SUMMARY Information security attacks have become more targeted, more sophisticated, more adaptable and harder to find. As it becomes

More information

Security Analytics for Smart Grid

Security Analytics for Smart Grid Security Analytics for Smart Grid Dr. Robert W. Griffin Chief Security Architect RSA, the Security Division of EMC robert.griffin@rsa.com blogs.rsa.com/author/griffin @RobtWesGriffin 1 No Shortage of Hard

More information

Risk & Audit Committee California Public Employees Retirement System

Risk & Audit Committee California Public Employees Retirement System California Public Employees Retirement System Consent Agenda Item 4d ITEM NAME: Enterprise Risk Management Division Status Report PROGRAM: Risk Management ITEM TYPE: Consent Information EXECUTIVE SUMMARY

More information

Destination Cloud. EMC Deutschland GmbH. Holger Daube. vspecialist Technical Teamlead Germany. Copyright 2010 EMC Corporation. All rights reserved.

Destination Cloud. EMC Deutschland GmbH. Holger Daube. vspecialist Technical Teamlead Germany. Copyright 2010 EMC Corporation. All rights reserved. Destination Cloud EMC Deutschland GmbH Holger Daube vspecialist Technical Teamlead Germany 1 The Journey To The Cloud Enterprise IT hat viele Herausforderungen Enterprise IT Komplex Teuer Unflexible Silo

More information

Copyright 2010, Oracle. All rights reserved.

Copyright 2010, Oracle. All rights reserved. OPN Partner Workshop zur Oracle BI Enterprise Edition 11g Die Referenten Carsten Frisch Oracle BI PreSales Consultant 14 Jahre für Oracle im Bereich Business Intelligence & Data Warehousing

More information

Intelligence-Driven Security

Intelligence-Driven Security Intelligence-Driven Security Using Big Data Analytics to Detect the Unknown Adversary Dr. Robert W. Griffin Chief Security Architect RSA, the Security Division of EMC robert.griffin@rsa.com Blogs.rsa.com/author/griffin

More information

Increase Revenue THE JOURNEY TO BIG DATA. Gary Evans. CTO EMC Ireland. Twitter.com/Gary3vans. Copyright 2013 EMC Corporation. All rights reserved.

Increase Revenue THE JOURNEY TO BIG DATA. Gary Evans. CTO EMC Ireland. Twitter.com/Gary3vans. Copyright 2013 EMC Corporation. All rights reserved. THE JOURNEY TO BIG DATA Increase Revenue Gary Evans CTO EMC Ireland Twitter.com/Gary3vans 1 THE VALUE OF BIG DATA VARIETY VELOCITY BIG DATA VOLUME COMPLEXITY organizations can earn an incremental ROI of

More information

Transform HC via interoperability to enable integrated care. Michael Graetz Healthcare EMEA RVP, IIG, EMC

Transform HC via interoperability to enable integrated care. Michael Graetz Healthcare EMEA RVP, IIG, EMC Transform HC via interoperability to enable integrated care Michael Graetz Healthcare EMEA RVP, IIG, EMC Copyright 2012 EMC Corporation. All rights reserved. 5 NCDS effects today more than 100 million

More information

SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved.

SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved. SECURITY MEETS BIG DATA Achieve Effectiveness And Efficiency 1 IN 2010 THE DIGITAL UNIVERSE WAS 1.2 ZETTABYTES 1,000,000,000,000,000,000,000 Zetta Exa Peta Tera Giga Mega Kilo Byte Source: 2010 IDC Digital

More information

Changing the Enterprise Security Landscape

Changing the Enterprise Security Landscape Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein

More information

Best Practices to Improve Breach Readiness

Best Practices to Improve Breach Readiness Best Practices to Improve Breach Readiness Dr. Robert W. Griffin Chief Security Architect RSA, the Security Division of EMC http://blog.emc2.de/trust-security @RobtWesGriffin 1 Security Breaches 2 Security

More information

About Our 2015 WTA Cyber Security Speakers and Sessions

About Our 2015 WTA Cyber Security Speakers and Sessions About Our 2015 WTA Cyber Security Speakers and Sessions The constant threat of cyber security attacks is the number one concern for most businesses today. Weaknesses in networks and data security can expose

More information

IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE

IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE ABSTRACT Changing regulatory requirements, increased attack surfaces and a need to more efficiently deliver access to the business

More information

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet

More information

CYBER SECURITY, A GROWING CIO PRIORITY

CYBER SECURITY, A GROWING CIO PRIORITY www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------

More information

The Next Generation Data Centers: SPECS and The 3 rd Platform.

The Next Generation Data Centers: SPECS and The 3 rd Platform. The Next Generation Data Centers: SPECS and The 3 rd Platform. Dr. Silvio La Porta Senior Research Scientist EMC Research Europe Dr. Said Tabet Senior Technology Strategist Corporate CTO Office, EMC 1

More information

Analytics & Marketing 4.0 Wie die Anwendung von BigData die Customer Loyalty von morgen schafft

Analytics & Marketing 4.0 Wie die Anwendung von BigData die Customer Loyalty von morgen schafft Analytics & Marketing 4.0 Wie die Anwendung von BigData die Customer Loyalty von morgen schafft Oliver Börner Thomas Thalhammer 1 / digital business by 2 / digital business by 3 / digital business by 4

More information

NNIT Cybersecurity. A new threat landscape requires a new approach

NNIT Cybersecurity. A new threat landscape requires a new approach NNIT Cybersecurity A new threat landscape requires a new approach Effective cybersecurity is not about spending more money. It s about aligning your security initiatives with the threats and priorities

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

Redefining SIEM to Real Time Security Intelligence

Redefining SIEM to Real Time Security Intelligence Redefining SIEM to Real Time Security Intelligence David Osborne Security Architect September 18, 2012 Its not paranoia if they really are out to get you Malware Malicious Insiders Exploited Vulnerabilities

More information

EMC Technology Trends

EMC Technology Trends EMC Technology Trends Mikhail Salamatov University Relations Coordinator EMC Russia CoE 1 Agenda EMC Overview Overview of Technology Trends Cloud transforms IT Big Data Transforms Business Security Needs

More information

The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief

The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief The RSA Solution for Cloud Security and Compliance A GRC foundation for VMware infrastructure security and compliance Solution Brief The RSA Solution for Cloud Security and Compliance enables end-user

More information

North Texas ISSA CISO Roundtable

North Texas ISSA CISO Roundtable North Texas ISSA CISO Roundtable Roundtable Topic Threat Against Our Well Being The Most Effective Methods in Combating and Responding to the Cyber Attack Event Sponsor Moderator and Panelists David Stanton

More information

REPORT. Next steps in cyber security

REPORT. Next steps in cyber security REPORT March 2015 Contents Executive summary...3 The Deloitte and Efma questionnaire...5 Level of awareness...5 Level of significance...8 Level of implementation...11 Gap identification and concerns...15

More information

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance 3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security

More information

After the Attack. The Transformation of EMC Security Operations

After the Attack. The Transformation of EMC Security Operations After the Attack The Transformation of EMC Security Operations Thomas Wood Senior Systems Engineer, GSNA CISSP RSA, The Security Division of EMC Thomas.WoodJr@rsa.com 1 Agenda Review 2011 Attack on RSA

More information

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

TOP INNOVATIONS FOR CYBERSECURITY

TOP INNOVATIONS FOR CYBERSECURITY 1 TOP INNOVATIONS FOR CYBERSECURITY MATTHEW S TOP 10 SECURITY INNOVATIONS FOR THE PRESENT & NEAR FUTURE MATTHEW GARDINER, SR. MANAGER, RSA SECURITY 2 ROADMAP INFORMATION DISCLAIMER EMC makes no representation

More information

IBM Security Strategy

IBM Security Strategy IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration

More information

Baader Investment Conference. Dr. Werner Brandt, CFO, SAP AG Munich, September 24, 2013

Baader Investment Conference. Dr. Werner Brandt, CFO, SAP AG Munich, September 24, 2013 Baader Investment Conference Dr. Werner Brandt, CFO, SAP AG Munich, September 24, 2013 Safe Harbor Statement Any statements contained in this document that are not historical facts are forward-looking

More information

NetApp at a Glance. Jörg Lemke. Business Development NetApp Deutschland GmbH

NetApp at a Glance. Jörg Lemke. Business Development NetApp Deutschland GmbH NetApp at a Glance Jörg Lemke Business Development NetApp Deutschland GmbH NetApp auf einen Blick FY10: $3.93 Billion Kontinuierlicher Finanzerfolg * $4B Cash Flow 25% des Gesamtumsatzes $3B $2B $1B 04

More information

Compliance Doesn t Mean Security Achieving Security and Compliance with the latest Regulations and Standards

Compliance Doesn t Mean Security Achieving Security and Compliance with the latest Regulations and Standards Compliance Doesn t Mean Security Achieving Security and Compliance with the latest Regulations and Standards Paul de Graaff Chief Strategy Officer Vanguard Integrity Professionals March 11, 2014 Session

More information

22. April 2010 Siemens Enterprise Communications

22. April 2010 Siemens Enterprise Communications Donnerstag, 26.04.2007 22. April 2010 Siemens Enterprise Communications GmbH & Co KG Copyright Siemens Copyright Enterprise Siemens Communications Enterprise Communications GmbH & KG 2007. 2010. All rights

More information

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant THE MARKET LEADER IN IT, SECURITY AND COMPLIANCE SERVICES FOR COMMUNITY FINANCIAL INSTITUTIONS The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant Agenda

More information

Cloud Computing & Sustainability. Virtualization, Cloud Computing & Green IT Summit. October 26, 2010

Cloud Computing & Sustainability. Virtualization, Cloud Computing & Green IT Summit. October 26, 2010 Cloud Computing & Sustainability Doug Bourgeois, Vice President, Federal Chief Cloud Executive Virtualization, Cloud Computing & Green IT Summit Proprietary October 26, 2010 2009 VMware Inc. All rights

More information

PCI DSS Investing wisely...

PCI DSS Investing wisely... PCI DSS Investing wisely... Hotel webinar Neira Jones Head of Payment Security Barclaycard Global Payment Acceptance 25 th July 2011 Leading the way in secure payments global payment acceptance Hotel Security

More information

Management (ALM) Presales - Senior Principal Technical Consultant

Management (ALM) Presales - Senior Principal Technical Consultant HP Application Lifecycle Management (ALM) Roman Zednik Presales - Senior Principal Technical Consultant Agenda HP Application Lifecycle cle Management Überblick bli Test Management mit HP Quality Center

More information

Cisco die richtige Architektur für Big Data und Internet of Things Josephine Bruggeman - CISCO April 20th, 2015

Cisco die richtige Architektur für Big Data und Internet of Things Josephine Bruggeman - CISCO April 20th, 2015 Cisco die richtige Architektur für Big Data und Internet of Things Josephine Bruggeman - CISCO April 20th, 2015 Agenda The new IT Platform Discover and explore the Fog from your landscape. It is nothing

More information

De wondere wereld van Cloud en Big Data

De wondere wereld van Cloud en Big Data De wondere wereld van Cloud en Big Data Wat is de waarde van uw data? Hans Timmerman CTO EMC The Netherlands Analyse Lifecycle Authenticate Context STORE Status Available Protect Access Intelligence Synchronise

More information

Technology to Power the Next Cloud. Presented by: Eric Kelly, CEO and Chairman 27 th Annual Roth Conference Presentation March 2015

Technology to Power the Next Cloud. Presented by: Eric Kelly, CEO and Chairman 27 th Annual Roth Conference Presentation March 2015 Technology to Power the Next Cloud Presented by: Eric Kelly, CEO and Chairman 27 th Annual Roth Conference Presentation March 2015 Safe Harbor Statement Except for the factual statements made herein, the

More information

SECURING PAYMENTS IN THE CYBER WORLD

SECURING PAYMENTS IN THE CYBER WORLD The Central Bank of Kuwait Presents An Information Security Forum on SECURING PAYMENTS IN THE CYBER WORLD 16th NOVEMBER 2014 JUMEIRAH MESSILAH BEACH HOTEL, KUWAIT WELCOME In the last few years, the usages

More information

UK Permanent Salary Index - 2015

UK Permanent Salary Index - 2015 1 SYSTEM INTEGRATORS & CONSULTANCIES Job Title Guidelines 8 9 2010 2011 2012 2013 2014 Information & Risk IT Officer Project & Risk Consultant Analyst Part of a team in a large organisation responsible

More information

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle Close the security gap with a unified approach Detect, block and remediate risks faster with end-to-end visibility of the security cycle Events are not correlated. Tools are not integrated. Teams are not

More information

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM

More information

Third Platform Apps & EMC: Redefining IT & Helping Our Customers Lead The Way. Name

Third Platform Apps & EMC: Redefining IT & Helping Our Customers Lead The Way. Name 1 Third Platform Apps & EMC: Redefining IT & Helping Our Customers Lead The Way Name 2 3 Home, Driving & Work 3 rd Platform A Definition Four Interdependent Trends: Social Interaction, Mobility, Cloud,

More information

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25

More information

BP1 Mobile App Management: Solutions for ios and Android. Gary Barton Mobility Architect Citrix Receivers and Gateways Group

BP1 Mobile App Management: Solutions for ios and Android. Gary Barton Mobility Architect Citrix Receivers and Gateways Group BP1 Mobile App Management: Solutions for ios and Android Gary Barton Mobility Architect Citrix Receivers and Gateways Group Agenda 1. Synergy Announcements 2. Mobile Management Market 3. Citrix Vision

More information

Digital Infrastructure - A Model For Success

Digital Infrastructure - A Model For Success Organizer: BRIDGING BARRIERS: LEGAL AND TECHNICAL OF CYBERCRIME CASES Session 6 : Securing Your Fortress Best practices, standards, techniques and technologies secure your organization from cyber criminals.

More information

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR 場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR Minimum Requirements of Security Management and Compliance

More information

Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare

Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare CIO-SP 3 Task Areas Ten task areas constitute the technical scope of this contract: Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare The objective of this task area is

More information

Cloud OS Network. Uwe Lüthy, Die Bedeutung einer Partner Managed Cloud für Kunden. Partner Technology Strategiest uwelu@microsoft.

Cloud OS Network. Uwe Lüthy, Die Bedeutung einer Partner Managed Cloud für Kunden. Partner Technology Strategiest uwelu@microsoft. Cloud OS Network Die Bedeutung einer Partner Managed Cloud für Kunden. Uwe Lüthy, Partner Technology Strategiest uwelu@microsoft.com Die Cloud Opportunity Definition von Buzzwords Cloud OS Strategie Wichtig

More information

Westcon Presentation on Security Innovation, Opportunity, and Compromise

Westcon Presentation on Security Innovation, Opportunity, and Compromise Westcon Presentation on Security Innovation, Opportunity, and Compromise Christian A. Christiansen Program Vice President IDC Security Products & Services What s Happening with Threats? 1.5B 80% 33% $1.3M

More information

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery

More information

Cybersecurity. Are you prepared?

Cybersecurity. Are you prepared? Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data

More information

Joining Forces: Bringing Big Data to your Security Team

Joining Forces: Bringing Big Data to your Security Team Joining Forces: Bringing Big Data to your Security Team Alaa Abdulnabi, CISSP RSA Regional Pre-Sales Manager Turkey, Middle East & Africa @AlaaAbdulnabi 1 Facteurs de mutation du marché Appareils mobiles

More information

Raytheon Oakley Systems

Raytheon Oakley Systems Raytheon Oakley Systems Michael Crouse VP, Sales & Marketing Daniel Velez Director, Program Operations Cleared for release. #IIS2013-226. Page 1 Raytheon Oakley Systems About us Founded as Oakley Networks

More information

ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange

ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange ASMONIA Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange Overview on Activities Related to Academic Utilization Contributors: Cassidian

More information

The Top Ten of Information Security - For 2015

The Top Ten of Information Security - For 2015 7 th Annual Information Security Summit The Executive Forum Information Security Management Overview June 4, 2015 Copyright 2015. Citadel Information Group. All Rights Reserved. 2 Establishing Leadership.

More information

Überblick Oracle Fusion Applications: Funktionen, Architektur und Implementierung

Überblick Oracle Fusion Applications: Funktionen, Architektur und Implementierung Überblick Oracle Fusion Applications: Funktionen, Architektur und Implementierung Carsten Ratzlaff Fusion Applications Sales Leader Berlin, 11. Oktober 2013 Agenda Überblick Fusion Applications Fusion

More information

Cisco ASA und FirePOWER Services

Cisco ASA und FirePOWER Services Cisco ASA und FirePOWER Services 1 Die Abwehr von Bedrohungen ist ein Prozess Attack Continuum BEFORE Control Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Firewall/VPN Applikations-Kontrolle

More information

What s New in Security Analytics 10.4. Be the Hunter.. Not the Hunted

What s New in Security Analytics 10.4. Be the Hunter.. Not the Hunted What s New in Security Analytics 10.4 Be the Hunter.. Not the Hunted Attackers Are Outpacing Detection Attacker Capabilities Time To Discovery Source: VERIZON 2014 DATA BREACH INVESTIGATIONS REPORT 2 TRANSFORM

More information

Big Data: What You Should Know. Mark Child Research Manager - Software IDC CEMA

Big Data: What You Should Know. Mark Child Research Manager - Software IDC CEMA Big Data: What You Should Know Mark Child Research Manager - Software IDC CEMA Agenda Market Dynamics Defining Big Data Technology Trends Information and Intelligence Market Realities Future Applications

More information

Data Security as a BDM Best Practice

Data Security as a BDM Best Practice Data Security as a BDM Best Practice David Loshin, President, Knowledge Integrity Robert Shields, CISSP, Director, PMM Data Security Group May 23, 2016 About the Speaker David Loshin President, Knowledge

More information

HHSN316201200042W 1 QSSI - Quality Software Services, Inc

HHSN316201200042W 1 QSSI - Quality Software Services, Inc ARTICLE C.1. STATEMENT OF WORK This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and Human Services (DHHS), and all other federal agencies to acquire

More information

Contents. Ad Tech Big Data Creative Information Security. Marketing Media, Planning & Buying. Project Management & Client Services

Contents. Ad Tech Big Data Creative Information Security. Marketing Media, Planning & Buying. Project Management & Client Services Salary Survey 2015 Contents Ad Tech 03 Big Data 05 Creative 06 Information Security 08 IT 09 Marketing 11 Media, Planning & Buying 13 Mobile 14 Project Management & Client Services 16 Tech 18 Foreword

More information

the challenge our mission our advisors

the challenge our mission our advisors corporate overview the challenge Organizations are spending billions of dollars a year on security products, however recent security breaches have proven that the traditional security solutions are not

More information

10. Swiss ITSM & BSM Forum 2015 Automation Performance Efficiency Best Practice Processes

10. Swiss ITSM & BSM Forum 2015 Automation Performance Efficiency Best Practice Processes November 19, 2015 10. Swiss ITSM & BSM Forum 2015 Automation Performance Efficiency Best Practice Processes Knowledge of the needs Requirements from the Business / Users Challenges within IT s Capabilities

More information

Cloud Computing--Efficiency and Security

Cloud Computing--Efficiency and Security Cloud Computing--Efficiency and Security Mick Atton, VP & Chief Architect Thomson Reuters--Legal July 22, 2013 Thomson Reuters Thomson Reuters is the leading source of intelligent information for the world's

More information

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance The RSA Solution for Cloud Security and Compliance The RSA Solution for Cloud Security and Compliance enables enduser organizations and service providers to orchestrate and visualize the security of their

More information

How To Protect Your Network From Attack

How To Protect Your Network From Attack Liste von ausgewählten Cybersecurity-Normen, -Standards und -Richtlinien mit Smart-Grid-Relevanz: Advanced Security Acceleration Project Smart Grid (ASAP-SG): Entwicklung von Security Anforderungen für

More information

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013 2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

CLOSING THE GAP ON BREACH READINESS INSIGHTS FROM THE SECURITY FOR BUSINESS INNOVATION COUNCIL

CLOSING THE GAP ON BREACH READINESS INSIGHTS FROM THE SECURITY FOR BUSINESS INNOVATION COUNCIL CLOSING THE GAP ON BREACH READINESS INSIGHTS FROM THE SECURITY FOR BUSINESS INNOVATION COUNCIL OVERVIEW This e-book contains insights on breach readiness, response and resiliency based on in-depth interviews

More information

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?

More information