IT Infrastructure Services. White Paper. Cyber Risk Mitigation for Smart Cities
|
|
- Winfred Richard
- 8 years ago
- Views:
Transcription
1 IT Infrastructure Services White Paper Cyber Risk Mitigation for Smart Cities
2 About the Author Abhik Chaudhuri Abhik Chaudhuri is a Domain Consultant with the Information Technology Infrastructure Services (ITIS) Global Technology Practice at Tata Consultancy Services (TCS). A specialist in cyber security and policy, he is focused on developing secure IoT systems for smart cities. Chaudhuri has more than 13 years of IT experience, and is a Chevening TCS Fellow in Cyber Security and Policy.
3 Abstract Rapid growth in global population and evolving technological, macro-economic, and environmental landscapes have fueled widespread interest in smart cities, which are, essentially, dynamic ecosystems characterized by highly advanced, intuitive, and interdependent cyber systems. As emerging digital technologies and the Internet of Things (IoT) pave the way for these smart habitats, effective risk management becomes more crucial than ever. Here is where a smart city council can play a vital role. By identifying vulnerable systems, assessing the type and magnitude of probable risks, and instituting remedial measures, these bodies can thwart cyber-attacks and create risk-resilient smart services. This article discusses the smart city concept, and how smart city councils can effectively address the information security needs of interdependent systems, to provide risk-free smart services to its citizens.
4 Contents The Rise of Smart Cities 5 Interdependent Systems: The Backbone of Smart Cities 5 Opportunities and risks 5 Why Risk Mitigation is a Top Priority for Smart Cities 6 The Role of Smart City Councils 6 Ensuring security of network and sensors 6 Building resilient systems 6 Adopting international standards 7 Performing system impact and interdependency analysis 7 Ensuring citizen compliance 8 Making Smart Cities Safe with Effective Risk Management 8
5 The Rise of Smart Cities Approximately 70% of the world's population is expected to live in cities by To meet the growing needs of this population, city councils the world over are in an expansion mode. The concept of 'smart cities' lends promise in this scenario as these cities are expected to provide superior living experience thanks to a host of cyber-enabled services. As in the case of all IT-enabled services, smart city services too should be risk-free and secure for their citizens to use. In connecting devices and users, cyber systems should ensure the highest level of confidentiality and integrity, while allowing unhindered availability. It is therefore important to proactively manage the security risks of interdependent systems of the smart city digital infrastructure. Two key features of smart cities are citizen-centricity and digitally-enabled infrastructure. Aside of having smart infrastructure, a smart city has advanced systems to manage energy, transport, traffic, water, healthcare, and education. Essentially, it is a seamless union of technology, government, and society to enable smart living, which is characterized by a booming economy, effective governance, and convenient public services. ITU-T's Focus Group on Smart Sustainable Cities (FG-SSC) defines a smart sustainable city as an innovative city that uses information and communication technologies (ICTs) and other means to improve quality of life, efficiency of urban operation and services, and competitiveness, while ensuring that it meets the needs of present and future generations with respect to economic, social, and environmental aspects. ¹ 5 Interdependent Systems: The Backbone of Smart Cities Interdependent systems are the foundation stone of smart cities, as they provide the critical infrastructure to handle major public systems and citizen services. These include water and energy generation and transmission setups, transportation frameworks, waste disposal mechanisms, street and home lighting systems, connected healthcare, surveillance, and more. Interdependent systems also enable dynamic and synergistic data gathering and analytics, which drives continuous improvements across systems. In effect, a smart city is a 'system of systems' that follows a scale-free topology to allow future expansion, but without affecting the attributes of interdependency and interconnectedness. Opportunities and risks The Internet of Things (IoT) promotes an ecosystem of smart applications and services by interconnecting everyday objects and applications, thus enhancing peoples' lives. IT-enabled interdependent systems present several opportunities to improve a citizen s lifestyle. They can help city councils take necessary actions based on real-time analysis of the data collected from various interdependent systems. For example, the city council can analyze health data of its citizens to identify adverse health scenarios such as virus attacks, at an early stage, and take necessary actions to prevent widespread outbreaks. Data integration in smart cities can also be utilized to map energy efficiency of buildings, prevent crime, and effectively manage natural disasters. In addition, it can be leveraged to monitor the city's development in areas such as housing, education, transport, medical services, and employment. [1] ITU-T FG-SSC, Focus Group on Smart Sustainable Cities, June 2014, accessed November 2015
6 However, these interdependent systems also pose operational challenges and security risks. If one smart service information system fails to provide relevant information to other connected smart services, it can lead to chaotic situations, which eventually may result in a complete breakdown. For example, the failure of a smart traffic management database server can cause havoc with the smart transport management system, thus inconveniencing citizens and disrupting governance. Another example could be of a smart healthcare service, where a breach in the network or in the health monitoring device can put the patient's life at risk. Why Risk Mitigation is a Top Priority for Smart Cities Due to the large number of connected devices that make up a smart city's digital infrastructure, enhanced security management for gateway devices, such as industrial control systems (ICS) and IT systems (ITS), is critical to prevent data breach or leakage. Leakage of sensitive data can lead to a lock-down of critical services. A smart city framework deals with huge volumes of data that is generated as a result of communication between various interdependent subsystems and the interactions between devices and citizens. Protection of such private and sensitive information, especially citizen data, is of utmost importance. Further, any incident of data breach or data loss can damage citizens' perception of security in a smart city. Other information security concerns include interception of wireless data in transit between senders and receivers, leakage of confidential information, and viruses in devices such as sensors. Cloud-based information services and data storage in smart cities can also be compromised through hacking and other subversive activities. The Role of Smart City Councils Risk mitigation in smart cities requires a detailed understanding of several factors. These include design and architecture of smart services, IT infrastructure support capabilities, and the knowledge of probable cyber threats. A city council should operate like a modern-day enterprise with specific goals and objectives that include planning for defending against cyber-attacks and responding to emergencies. Ensuring security of network and sensors The smart city council should secure connected systems and sensors from any physical attack or infiltration. Identity management and device authentication mechanisms should be deployed at every interface of a smart system. Digital forensic capabilities, which help trace cyber breaches and gather evidence of malicious activities for legal action, should be integrated with the overall cyber architecture, right from the design phase. Gathering and analyzing real-time data with supervisory control and data acquisition (SCADA) will help predict security failures, and thus prevent a complete lock-down of critical services. Building resilient systems As a smart city grows, the interconnections of systems and interdependencies of smart services increase manifold. This makes them more vulnerable to cyber-attacks. The smart city council should therefore aim to design riskresilient digital architecture. The architecture should possess the adaptive capability to arrest anomalies in the nascent stage, and lock down a subsystem without disturbing other live components, ensuring uninterrupted service delivery. 6
7 City councils should build resilient interdependent systems to handle cyber emergencies and restore impacted services quickly. An effective cyber resilience strategy also helps protect the various connected devices and assets in case of any eventuality. Business continuity planning (BCP) is an effective risk management initiative that can help the smart city council ensure the security and availability of smart services. Periodic BCP drills should be conducted, audited, and documented for ready reference during criticalities. This will enable smart cities to take a recovery oriented approach toward risk management. Adopting international standards The security standards and risk mitigation strategies currently being used to secure IT systems may not be adequate to safeguard the interdependent City council should establish systems in smart cities. ISO 22301:2012, the International Standard for proper communication Societal Security Business Continuity Management Systems² should be channels to respond to cyber adopted to prevent the disruption of citizen services. Proper communication threats and other management is critical for smart cities to respond to cyber threats and other emergencies exigencies. Communication channels with pre-identified points of contact should be defined, documented, and regularly updated. These documents should be made available to all stakeholders for easy reference if and when the need arises. Performing system impact and interdependency analysis Periodic system impact analysis should be performed to identify risks posed to critical interdependent systems and interconnected services, with appropriately defined recovery time and recovery point objectives. Smart cities should also have secure data receivers and data storage to collect and store data generated from the ICS and ITS components for analysis, decision making, and incident response management. The stored data should be periodically backed up. As a precautionary measure, data flow from control systems can be channelized using data diodes to prevent data contamination. Smart city councils should devise a component protection strategy to identify critical components of interdependent systems for agile risk analysis. A preliminary system interdependency analysis should be conducted to understand the requirements for information continuity at system interfaces, and to identify the critical components that enable the flow of vital information. This should be followed by a probabilistic interdependency analysis to manage the risks of high fidelity interdependent systems like smart grid, smart health monitoring systems for senior citizens and critical patients, and so on. This analysis can be helpful in enhancing the resilience of critical systems in a smart city. The CPNI Good Practice Guide for Process Control and SCADA Security³ can be used by city councils to ensure security and trustworthiness of the interdependent systems. It provides a framework based on industry best practices for process control and IT security. The framework focuses on seven key themes: 1) Understanding business risks 2) Implementing secure architecture 3) Establishing response capabilities [2] ISO, ISO 22301:2012, accessed November 2015 [3] Good Practice Guide Process Control and SCADA Security, accessed November
8 4) Improving awareness and skills 5) Managing third party risks 6) Engaging projects for security measures in service design 7) Establishing ongoing governance Ensuring citizen compliance Citizens of smart cities are bound to play a crucial role in ensuring the security of interdependent systems from cyber as well as physical security perspectives. Citizens with smart devices are critical points in the cyber system framework, and can be targeted by attackers and hackers to gain entry into the system. This can be done through social engineering, spam s, data streaming, and other malicious methods. To prevent this, smart city councils should develop policies and procedures for establishment, maintenance, and operation of secure smart services. Cyber-awareness programs should be made mandatory for citizens, and penalties levied for non-compliance. Making Smart Cities Safe with Effective Risk Management Understanding and evaluating risks in smart city systems require a pragmatic approach to cyber risk management due to the high level of interconnectedness of smart services and the rapidly evolving nature of constituent systems. With smart cities projected to grow rapidly over the next few years, there is a clear need for smart city councils to focus on mitigating security concerns. Incorporating risk mitigation and developing strong security strategies in the initial planning and service design stages will enable smart city councils to provide safe, secure, and reliable services to its citizens. 8
9 About TCS IT Infrastructure Services Unit Leading organizations across industries work with TCS to realize their business transformation and innovation objectives by enhancing the availability, performance and agility of their IT infrastructure. Leveraging a combination of the cloud, new generation delivery models such as IaaS, PaaS, and SaaS, virtualization, and managed services, our offerings deliver the secure, flexible, and reliable IT infrastructure needed to power critical business applications, services and data. TCS infrastructure offerings encompass data center services, end-user computing (EUC), mobility services, cloud services and transformational solutions, converged network services, managed security services, application management services, enterprise systems management, IT service desk, and IT service management. Backed by our Assess-Build-Manage-Transform framework, extensive partner ecosystem, tools and automation frameworks, and technology Centers of Excellence (CoEs), analytics-led approach, to understand the 'as-is' state, and arrive at the 'to-be' state. As a result, you seamlessly transition from traditional infrastructure management services towards new generation delivery. Contact For more information about TCS IT Infrastructure Services, visit: itis.presales@tcs.com Subscribe to TCS White Papers TCS.com RSS: Feedburner: About Tata Consultancy Services (TCS) Tata Consultancy Services is an IT services, consulting and business solutions organization that delivers real results to global business, ensuring a level of certainty no other firm can match. TCS offers a consulting-led, integrated portfolio of IT and IT-enabled infrastructure, engineering and TM assurance services. This is delivered through its unique Global Network Delivery Model, recognized as the benchmark of excellence in software development. A part of the Tata Group, India s largest industrial conglomerate, TCS has a global footprint and is listed on the National Stock Exchange and Bombay Stock Exchange in India. For more information, visit us at IT Services Business Solutions Consulting All content / information present here is the exclusive property of Tata Consultancy Services Limited (TCS). The content / information contained here is correct at the time of publishing. No material from here may be copied, modified, reproduced, republished, uploaded, transmitted, posted or distributed in any form without prior written permission from TCS. Unauthorized use of the content / information appearing here may violate copyright, trademark and other applicable laws, and could result in criminal or civil penalties. Copyright 2015 Tata Consultancy Services Limited TCS Design Services I M I 10 I 15
IT Infrastructure Services. White Paper. Utilizing Software Defined Network to Ensure Agility in IT Service Delivery
IT Infrastructure Services White Paper Utilizing Software Defined Network to Ensure Agility in IT Service Delivery About the Author Siddhesh Rane Siddhesh Rane is a Technical Architect and part of the
More informationRetail. White Paper. Driving Strategic Sourcing Effectively with Supply Market Intelligence
Retail White Paper Driving Strategic Sourcing Effectively with Supply Market Intelligence About the Author Devaraj Chithur Devaraj is part of the Supply Chain group within Tata Consultancy Services (TCS)
More informationLinking Transformational Initiatives to Desired Business Outcomes: Leveraging a Business-Metrics Driven Framework
Business Process Services White Paper Linking Transformational Initiatives to Desired Business Outcomes: Leveraging a Business-Metrics Driven Framework About the Author Venkatesh Kuppuswamy Venkatesh Kuppuswamy
More informationOver 18,400 branches. 21,843 ATMs. 261 million accounts. Enabling State Bank of India to create the world s largest homogenous banking network
Wealth Management Volatility and uncertainty in the markets have given rise to a new class of customers who are extremely cautious and demand absolute transparency from their advisors. They now expect
More informationion IT-as-a-Service Solution
ion IT-as-a-Service Solution "The ion Manufacturing Solution enabled us to control our business more meaningfully, including our field operations. Through the Field Force module, we have updated information
More informationBusiness Process Services. White Paper. Improving Efficiency in Business Process Services through User Interface Re-engineering
Business Process Services White Paper Improving Efficiency in Business Process Services through User Interface Re-engineering About the Authors Mahesh Kshirsagar Mahesh has a vast experience of about 24
More informationBusiness Process Services. White Paper. Personalizing E-Commerce: Improving Interactivity to Increase Revenues
Business Process Services White Paper Personalizing E-Commerce: Improving Interactivity to Increase Revenues About the Author Subramaniam MV Subramaniam is a Delivery Manager at Tata Consultancy Services
More informationNext Generation Electric Utilities Gear up Using Cloud Based Services
A Point of View Next Generation Electric Utilities Gear up Using Cloud Based Services Abstract Globally, liberalization of the electricity sector has driven a paradigm shift in the ownership structure,
More informationBusiness Process Services. White Paper. Mitigating Trade Fraud: The Case for Detecting Group Level Fraudulent Activity
Business Process Services White Paper Mitigating Trade Fraud: The Case for Detecting Group Level Fraudulent Activity About the Author Narasimha Murty M V Narasimha Murty holds a Master's degree in Mathematics
More informationBusiness Process Services. White Paper. Optimizing Extended Warranty Processes by Embracing Analytics
Business Process Services White Paper Optimizing Extended Warranty Processes by Embracing Analytics About the Author Dr. Anuj Prakash Anuj Prakash is a part of the TCS Analytics and Insights Practice,
More informationEnterprise-wide Anti-money Laundering and KYC Initiatives A point of view
Enterprise-wide Anti-money Laundering and KYC Initiatives A point of view Introduction Every financial institution is charged with the responsibility of developing policies and procedures to combat money
More informationBusiness Process Services. White Paper. Automating Email Management: Managing Workflow Effectively
Business Process Services White Paper Automating Email Management: Managing Workflow Effectively About the Authors Deva Latha S. Assistant Consultant Deva Latha has over nine years of experience in Business
More informationDigital Enterprise Unit. White Paper. Securing Patient Information HIPAA and Mobile Healthcare Applications
Digital Enterprise Unit White Paper Securing Patient Information HIPAA and Mobile Healthcare Applications About the Authors Colonel Rajmohan, CISSP Senior Consultant, TCS Colonel Rajmohan heads the digital
More informationBusiness Process Services. White Paper. Improving Regulatory Compliance in the Mortgage Industry
Business Process Services White Paper Improving Regulatory Compliance in the Mortgage Industry About the Author Lovette Patrick D'Souza Lovette Patrick D'Souza has over 10 years of experience in Banking
More informationConferencing Agent Enhancing the Communication Experience
White Paper Conferencing Agent Enhancing the Communication Experience To achieve corporate operational excellence, the existing resources of an organization must be utilized to the best possible extent.
More informationBring Your Own Device (BYOD) A point of view
Bring Your Own Device (BYOD) A point of view BYOD - Consumer driven IT Today, consumers possess powerful devices for their personal needs. Often, the computing power and features of the devices bought
More informationDigital Enterprise Unit. White Paper. Reimagining the Future of Field Service Management with Digital Technologies
Digital Enterprise Unit White Paper Reimagining the Future of Field Service Management with Digital Technologies About the Author Rahul Trisal Rahul is a senior Digital Strategy Consultant with TCS' Digital
More informationWhite Paper. Social Analytics
White Paper Social Analytics This paper brings to forefront the growing popularity of social media as a source of data for analytics with relation to the telecom industry. The paper further elaborates
More informationion Customer Relationship Management (CRM) Solution
ion Customer Relationship Management (CRM) Solution How do you command the loyalty of your customers in a competitive market? How do you achieve an increase in sales? To help you answer these questions,
More informationBusiness Process Services. White Paper. Predictive Analytics in HR: A Primer
Business Process Services White Paper Predictive Analytics in HR: A Primer About the Authors Tuhin Subhra Dey Tuhin is a member of the Analytics and Insights team at Tata Consultancy Services (TCS), where
More informationLife Sciences. White Paper. Real-time Patient Health Monitoring with Connected Health Solutions
Life Sciences White Paper Real-time Patient Health Monitoring with Connected Health Solutions About the Authors Ashok Khanna Global Head, Presales and Solutions, Engineering Industrial Services, Life Sciences
More informationBusiness Process Services. White Paper. Configurable, Automated Workflows: Transforming Process Effectiveness for Business Excellence
Business Process Services White Paper Configurable, Automated Workflows: Transforming Process Effectiveness for Business Excellence About the Authors Ohm Kumar Ohm Kumar is a Business Analyst with the
More informationA pay-as-you-use model About TCS ion Integrated solutions Personalized solutions www.tcsion.com Automatic upgrades Increased agility
ion Payroll Solution As organizations strive to improve employee morale, job satisfaction, and productivity, it becomes imperative to regularize the payroll cycles, in order to keep employees motivated.
More informationBusiness Process Services. White Paper. Leveraging the Internet of Things and Analytics for Smart Energy Management
Business Process Services White Paper Leveraging the Internet of Things and Analytics for Smart Energy Management About the Author Akhil Bhardwaj Akhil Bhardwaj is a Senior Manager in the Analytics and
More informationBusiness Process Transformation A Pulse Check
White Paper Business Process Transformation A Pulse Check Over the last decade or two, two trends have been noticeable across all businesses. The move towards consolidation of office-based operations,
More informationBusiness Process Services. White Paper. Improving Agility in Accounts Receivables with Statistical Prediction and Modeling
Business Process Services White Paper Improving Agility in Accounts Receivables with Statistical Prediction and Modeling About the Authors R Rengesh Siva Rengesh Siva has over 14 years of experience in
More informationHiTech. White Paper. Storage-as-a-Service. SAN and NAS Reference Architectures leveraging Private Cloud Storage
HiTech White Paper -as-a-service SAN and NAS Reference Architectures leveraging Private Cloud About the Author Ankur Srivastava Ankur Srivastava is a Solution Architect working with the Hi Tech Industry
More informationRobotic Process Automation: Reenergizing the Directory Publishing Industry
A Point of View Robotic Process Automation: Reenergizing the Directory Publishing Industry Abstract Evolving digital marketing avenues including video, SEM/SEO, mobile, and social media are fast replacing
More informationNational Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
More informationIT Infrastructure Services. White Paper. Emerging PaaS Models and Migration to PaaS
IT Infrastructure Services White Paper Emerging PaaS Models and Migration to PaaS About the Author Sameer Deshpande Sameer Deshpande has over 15 years of experience in IT, and is a solution architect within
More informationSimplify your admission process - The ion Way
Simplify your admission process - The ion Way Coordination from TCS employees has helped us lot in implementation of all modules of the ERP. It was helpful to have a person that managed to implement our
More informationHiTech. White Paper. A Next Generation Search System for Today's Digital Enterprises
HiTech White Paper A Next Generation Search System for Today's Digital Enterprises About the Author Ajay Parashar Ajay Parashar is a Solution Architect with the HiTech business unit at Tata Consultancy
More informationOverview. Société Générale
Payments Ever-changing market dynamics, customer expectations, rapidly evolving regulatory measures, ageing technology, consolidation in corporate treasury, advent of electronic instruments, increased
More informationBusiness Partner of. Hardware + Network + Software + Services
Business Partner of Hardware + Network + Software + Services About RDS Business Services RDS Business Services do services like Web Services, Software Services, Software Testing, Contract Staffing, Placement
More informationBusiness Process Services. White Paper. Business Intelligence in Finance & Accounting: Foundation for an Agile Enterprise
Business Process Services White Paper Business Intelligence in Finance & Accounting: Foundation for an Agile Enterprise About the Author Balaji Venkat Chellam Iyer Balaji has over 18 years of experience
More informationBusiness Process Services. White Paper. Five Principles to Consider when Consolidating your Finance and Accounting Function
Business Process Services White Paper Five Principles to Consider when Consolidating your Finance and Accounting Function About the Authors Vikas Golchha, Associate Vice President, TCS Vikas is part of
More informationISU name. Enterprise Security and Risk Management. White Paper. The Cost of Pen Testing a Web Application
ISU name Enterprise Security and Risk Management White Paper The Cost of Pen Testing a Web Application About the Author Srimant Acharya Srimant Acharya heads the Center of Excellence (CoE) for Enterprise
More informationion Human Capital Management Solution
ion Human Capital Solution For organizations spread across multiple sites, Human Resource processes such as recruitment, deputation, and employee appraisal are complex. HR departments are increasingly
More informationImpact of Cybersecurity Innovations in Key Sectors (Technical Insights)
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number
More informationBusiness Process Services. White Paper. Social Media Influence: Looking Beyond Activities and Followers
Business Process Services White Paper Social Media Influence: Looking Beyond Activities and Followers About the Author Vandita Bansal Vandita Bansal is a subject matter expert in Analytics and Insights
More informationBusiness Process Services. White Paper. Managing Customer Experience: Strategies for Success
Business Process Services White Paper Managing Customer Experience: Strategies for Success About the Author Ashwin Fernandes, Assistant Manager, TCS Ashwin is a practice consultant in the Innovation and
More informationTCS Supply Chain Center of Excellence
TCS Supply Chain Center of Excellence Delivering Supply Chain Performance in Complex Dynamic Markets Supply Chain Management Supply Chain Management (SCM) has evolved and the focus has now shifted from
More informationKYCS - Integrating KYC with Social Identity: The Future-Ready Marketing Approach
A Point of View KYCS - Integrating KYC with Identity: The Future-Ready Marketing Approach Abstract media has empowered us to voice and share our opinion on things that impact our lives. It has reshaped
More informationSeven Strategic Imperatives for Transitioning to a Shared Services Model
A Point of View Seven Strategic Imperatives for Transitioning to a Shared Services Model Abstract Given today s tough business climate, organizations are adopting a shared services model to realize cost
More informationDigital Enterprise. White Paper. Capturing the Voice of the Employee: Enterprise Social Media Monitoring and Analytics
Digital Enterprise White Paper Capturing the Voice of the Employee: Enterprise Social Media Monitoring and Analytics About the Authors Praveen Mishra Praveen Mishra is a Business Development Lead with
More informationCyber Security: Confronting the Threat
09 Cyber Security: Confronting the Threat Cyber Security: Confronting the Threat 09 In Short Cyber Threat Awareness and Preparedness Active Testing Likelihood of Attack Privacy Breaches 9% 67% Only 9%
More informationServices. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
More informationEMC DOCUMENTUM MANAGING DISTRIBUTED ACCESS
EMC DOCUMENTUM MANAGING DISTRIBUTED ACCESS This white paper describes the various distributed architectures supported by EMC Documentum and the relative merits and demerits of each model. It can be used
More informationBusiness Process Services. White Paper. Effective Credit Risk Assessment Strengthening the Financial Spreading with Technology Enablers
Business Process Services White Paper Effective Credit Risk Assessment Strengthening the Financial Spreading with Technology Enablers About the Author Vijay Muppavarapu Vijay is a subject matter expert
More informationDodd Frank Act and the Consumer Affect on Banks
A Point of View Dodd Frank Act: Partner your way to Compliance With the passage of the Dodd Frank Act, banks and financial institutions are grappling with a highly restrictive environment and burgeoning
More informationBusiness Process Services. White Paper. Strengthening Business Operations with the Digital Five Forces
Business Process Services White Paper Strengthening Business Operations with the Digital Five Forces About the Author Mahesh Kshirsagar Mahesh Kshirsagar heads Technology Transformation in the Business
More informationBPM Perspectives Positioning and Fitment drivers
BPM Perspectives Positioning and Fitment drivers BPM is a commonly used and much hyped acronym. It popularly stands for Business Process Management but now it achieves much more than just that. Especially
More informationBanking & Financial Services. White Paper. Automated Advice Delivery Platforms: Simplifying the Investment Management Game
Banking & Financial Services White Paper Automated Advice Delivery Platforms: Simplifying the Investment Management Game About the Authors Srinivasa Kumar Yerchuru Srinivasa Kumar Yerchuru heads the Capital
More informationThe four windows of organizational change in training for ERP transformation
White Paper The four windows of organizational change in training for ERP transformation Managing users apprehension to change has always been a challenge for large scale ERP implementations. Moving the
More informationBusiness Process Services. White Paper. Achieving Business Excellence: Utilities Embracing Analytics for Effective Decision Making
Business Process Services White Paper Achieving Business Excellence: Utilities Embracing Analytics for Effective Decision Making About the Author Swaminathan Subramanian Swaminathan has over 17 years of
More informationBridging the IT Business Gap The Role of an Enterprise Architect
Whitepaper Bridging the IT Business Gap The Role of an Enterprise Architect Today s enterprises understand the value that Information Technology (IT) can bring to their business. IT supports day-to-day
More informationInto the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
More informationSeamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.
Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues
More informationCyber Security solutions
Cyber Security solutions The scenario IT security has become a highly critical issue for all businesses as a result of the growing pervasiveness and diffusion of ICT technology. Risks can arise both inside
More informationEnter an insurance solution, TCS BaNCS from Tata Consultancy Services.
Insurance The financial crisis of 2008 and the subsequent recovery process, though tepid, has altered the insurance industry landscape significantly. Today, the focus is on enhancing efficiencies and controlling
More informationBusiness Process Services. White Paper. Providing Customer Service the Social Way
Business Process Services White Paper Providing Customer Service the Social Way About the Author Awani Sarogi Awani is a subject matter expert in digital media, developing digital media solutions and offerings
More informationOverview. Integrated Front-mid-back office as well as standalone Front office or Back-office solution or Trading Channels
Securities Trading The adoption of technology is rapidly changing the dynamics of the brokerage industry. The increasing use of smartphones and tablets represent a transformation in the way in which investors
More informationDigital Enterprise. White Paper. Multi-Channel Strategies that Deliver Results with the Right Marketing Attribution Model
Digital Enterprise White Paper Multi-Channel Strategies that Deliver Results with the Right Marketing Model About the Authors Vishal Machewad Head Marketing Services Practice Vishal Machewad has over 13
More informationTCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions
TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy Mobility Solutions The growth of in-house and third-party enterprise mobile applications; device diversity across ios, Android,
More informationCYBER SECURITY GUIDANCE
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
More informationPCI Compliance for Cloud Applications
What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage
More informationBacklog Management Index (BMI) Evaluation and Improvement An ITIL Approach
Backlog Management Index (BMI) Evaluation and Improvement An ITIL Approach Backlog Management Index is one of the important metrics that is closely monitored in Steady State of Maintenance and Support
More informationBackward Scheduling An effective way of scheduling Warehouse activities
Backward Scheduling An effective way of scheduling Warehouse activities Traditionally, scheduling algorithms were used in capital intensive production processes where there was a need to optimize the production
More informationFive keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
More informationImplement Business Process Management to realize Cost Savings and High Return on Investments
Implement Business Process Management to realize Cost Savings and High Return on Investments Business Process Management (BPM) was unheard of just a few years ago, but it has burst onto the global scene
More informationLife Sciences. White Paper. Integrated Digital Marketing: The Key To Understanding Your Customer
Life Sciences White Paper Integrated Digital Marketing: The Key To Understanding Your Customer About the Authors Raghunandan H Head, Life Sciences Sales & Marketing Center of Excellence Raghunandan (Raghu)
More informationRedefining Agile to Realize Continuous Business Value
A Point of View Redefining Agile to Realize Continuous Business Value Abstract As enterprises look to move the needle on their business in an intensely competitive market, they expect superior performance
More informationTransportation Solutions Built on Oracle Transportation Management. Enterprise Solutions
Transportation Solutions Built on Oracle Transportation Management Enterprise Solutions Optimizing transportation operations and ensuring improved customer service Today s complex and challenging business
More informationLead the Retail Revolution.
Lead the Retail Revolution. The retail industry is at the center of a dramatic shift in the way consumers shop and interact with their retailers. After hundreds of years of customers going to the store,
More informationHEALTH CARE AND CYBER SECURITY:
HEALTH CARE AND CYBER SECURITY: Increasing Threats Require Increased Capabilities kpmg.com 1 HEALTH CARE AND CYBER SECURITY EXECUTIVE SUMMARY Four-fifths of executives at healthcare providers and payers
More informationCall to Action on Smart Sustainable Cities
Call to Action on Smart Sustainable Cities 1. Introduction Achieving sustainable urbanization, along with the preservation of our planet, has been recognized as one of the major challenges of our society
More informationCyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
More informationAddress C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
More informationion Manufacturing Solution
ion Manufacturing Solution Today with ion, while I am driving home I get to see all the information that I need, even when I am in a customer place I can take decisions looking at the information that
More informationBusiness Process Services. White Paper. Transforming the Mortgage Lending Process through Social Media
Business Process Services White Paper Transforming the Mortgage Lending Process through Social Media About the Author Ramani Balakrishnan Ramani Balakrishnan is a domain consultant in the Transformation
More informationData Visualization in Ext Js 3.4
White Paper Data Visualization in Ext Js 3.4 Ext JS is a client-side javascript framework for rapid development of cross-browser interactive Web applications using techniques such as Ajax, DHTML and DOM
More informationGreen Desktop Infrastructure
White Paper Green Desktop Infrastructure An Approach to Reduce Desktop Carbon Footprint The proliferation of desktops is increasingly contributing to carbon emissions, through inefficient power consumption,
More informationBenchmarking Software Quality With Applied Cost of Quality
Benchmarking Software Quality With Applied Cost of Quality Cost of Quality has remained theoretical in many treatments despite its powerful relevance in software quality. A survey-based approach makes
More informationCyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
More informationPreemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
More informationProcurement needs a Digital Strategy
White Paper Procurement needs a Digital Strategy Marketing executives across the world have very clearly been concerned with digital strategy for some time, leveraging the benefits of greater reach and
More informationCyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology
Cyber Security Incident Handling Policy Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Oct 9, 2015 i Document Control Document Owner Classification
More informationLegislative Council Panel on Information Technology and Broadcasting. Information Security
For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest
More informationBusiness Process Services. White Paper. Holistic Enterprise Compliance: Adapting to Evolving Regulations in the Mortgage Industry
Business Process Services White Paper Holistic Enterprise Compliance: Adapting to Evolving Regulations in the Mortgage Industry About the Author Ramani Balakrishnan Ramani Balakrishnan is a Domain Consultant
More informationIs Your Vendor CJIS-Certified?
A Thought Leadership Profile Symantec SHUTTERSTOCK.COM Is Your Vendor CJIS-Certified? How to identify a vendor partner that can help your agency comply with new federal security standards for accessing
More informationBusiness Process Services. White Paper. Effective Vendor Management: Improving Supply Chain Efficiencies, Reducing Risk
Business Process Services White Paper Effective Vendor Management: Improving Supply Chain Efficiencies, Reducing Risk About the Author Devaraj Chithur Devaraj Chithur is a subject matter expert on supply
More informationMike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program
Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat
More informationBanking & Financial Services. White Paper. How a Hybrid Cloud Strategy can help Financial Institutions Realize Business Value
Banking & Financial Services White Paper How a Hybrid Cloud Strategy can help Financial Institutions Realize Business Value About the Author Ravi Satyanarayana Solution Architect and Consultant Ravi Satyanarayana
More informationInternal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015
Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are
More informationBI Today and Tomorrow
White Paper BI Today and Tomorrow BI has been one of the most important business initiatives providing positive impact on the health of organizations. Usually, questions are raised on the maturity of the
More informationSecurities Processing
Securities Processing Several challenges in the global securities market including new regulations, the pressure to reduce cost and minimize risk along with the mounting need for transparency, are forcing
More informationCybersecurity Converged Resilience :
Cybersecurity Converged Resilience : The cybersecurity of critical infrastructure 2 AECOM Port Authority of New York and New Jersey (PANYNJ), New York, New York, United States. AECOM, working with the
More informationThe new A and B of the Finance Function: Analytics and Big Data
White Paper The new A and B of the Finance Function: Analytics and Big Data - Evolution of the finance function from bean counter to business partner There s no escaping the fact that finance, and the
More informationLeveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
More informationCloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
More information