IT Infrastructure Services. White Paper. Cyber Risk Mitigation for Smart Cities

Size: px
Start display at page:

Download "IT Infrastructure Services. White Paper. Cyber Risk Mitigation for Smart Cities"

Transcription

1 IT Infrastructure Services White Paper Cyber Risk Mitigation for Smart Cities

2 About the Author Abhik Chaudhuri Abhik Chaudhuri is a Domain Consultant with the Information Technology Infrastructure Services (ITIS) Global Technology Practice at Tata Consultancy Services (TCS). A specialist in cyber security and policy, he is focused on developing secure IoT systems for smart cities. Chaudhuri has more than 13 years of IT experience, and is a Chevening TCS Fellow in Cyber Security and Policy.

3 Abstract Rapid growth in global population and evolving technological, macro-economic, and environmental landscapes have fueled widespread interest in smart cities, which are, essentially, dynamic ecosystems characterized by highly advanced, intuitive, and interdependent cyber systems. As emerging digital technologies and the Internet of Things (IoT) pave the way for these smart habitats, effective risk management becomes more crucial than ever. Here is where a smart city council can play a vital role. By identifying vulnerable systems, assessing the type and magnitude of probable risks, and instituting remedial measures, these bodies can thwart cyber-attacks and create risk-resilient smart services. This article discusses the smart city concept, and how smart city councils can effectively address the information security needs of interdependent systems, to provide risk-free smart services to its citizens.

4 Contents The Rise of Smart Cities 5 Interdependent Systems: The Backbone of Smart Cities 5 Opportunities and risks 5 Why Risk Mitigation is a Top Priority for Smart Cities 6 The Role of Smart City Councils 6 Ensuring security of network and sensors 6 Building resilient systems 6 Adopting international standards 7 Performing system impact and interdependency analysis 7 Ensuring citizen compliance 8 Making Smart Cities Safe with Effective Risk Management 8

5 The Rise of Smart Cities Approximately 70% of the world's population is expected to live in cities by To meet the growing needs of this population, city councils the world over are in an expansion mode. The concept of 'smart cities' lends promise in this scenario as these cities are expected to provide superior living experience thanks to a host of cyber-enabled services. As in the case of all IT-enabled services, smart city services too should be risk-free and secure for their citizens to use. In connecting devices and users, cyber systems should ensure the highest level of confidentiality and integrity, while allowing unhindered availability. It is therefore important to proactively manage the security risks of interdependent systems of the smart city digital infrastructure. Two key features of smart cities are citizen-centricity and digitally-enabled infrastructure. Aside of having smart infrastructure, a smart city has advanced systems to manage energy, transport, traffic, water, healthcare, and education. Essentially, it is a seamless union of technology, government, and society to enable smart living, which is characterized by a booming economy, effective governance, and convenient public services. ITU-T's Focus Group on Smart Sustainable Cities (FG-SSC) defines a smart sustainable city as an innovative city that uses information and communication technologies (ICTs) and other means to improve quality of life, efficiency of urban operation and services, and competitiveness, while ensuring that it meets the needs of present and future generations with respect to economic, social, and environmental aspects. ¹ 5 Interdependent Systems: The Backbone of Smart Cities Interdependent systems are the foundation stone of smart cities, as they provide the critical infrastructure to handle major public systems and citizen services. These include water and energy generation and transmission setups, transportation frameworks, waste disposal mechanisms, street and home lighting systems, connected healthcare, surveillance, and more. Interdependent systems also enable dynamic and synergistic data gathering and analytics, which drives continuous improvements across systems. In effect, a smart city is a 'system of systems' that follows a scale-free topology to allow future expansion, but without affecting the attributes of interdependency and interconnectedness. Opportunities and risks The Internet of Things (IoT) promotes an ecosystem of smart applications and services by interconnecting everyday objects and applications, thus enhancing peoples' lives. IT-enabled interdependent systems present several opportunities to improve a citizen s lifestyle. They can help city councils take necessary actions based on real-time analysis of the data collected from various interdependent systems. For example, the city council can analyze health data of its citizens to identify adverse health scenarios such as virus attacks, at an early stage, and take necessary actions to prevent widespread outbreaks. Data integration in smart cities can also be utilized to map energy efficiency of buildings, prevent crime, and effectively manage natural disasters. In addition, it can be leveraged to monitor the city's development in areas such as housing, education, transport, medical services, and employment. [1] ITU-T FG-SSC, Focus Group on Smart Sustainable Cities, June 2014, accessed November 2015

6 However, these interdependent systems also pose operational challenges and security risks. If one smart service information system fails to provide relevant information to other connected smart services, it can lead to chaotic situations, which eventually may result in a complete breakdown. For example, the failure of a smart traffic management database server can cause havoc with the smart transport management system, thus inconveniencing citizens and disrupting governance. Another example could be of a smart healthcare service, where a breach in the network or in the health monitoring device can put the patient's life at risk. Why Risk Mitigation is a Top Priority for Smart Cities Due to the large number of connected devices that make up a smart city's digital infrastructure, enhanced security management for gateway devices, such as industrial control systems (ICS) and IT systems (ITS), is critical to prevent data breach or leakage. Leakage of sensitive data can lead to a lock-down of critical services. A smart city framework deals with huge volumes of data that is generated as a result of communication between various interdependent subsystems and the interactions between devices and citizens. Protection of such private and sensitive information, especially citizen data, is of utmost importance. Further, any incident of data breach or data loss can damage citizens' perception of security in a smart city. Other information security concerns include interception of wireless data in transit between senders and receivers, leakage of confidential information, and viruses in devices such as sensors. Cloud-based information services and data storage in smart cities can also be compromised through hacking and other subversive activities. The Role of Smart City Councils Risk mitigation in smart cities requires a detailed understanding of several factors. These include design and architecture of smart services, IT infrastructure support capabilities, and the knowledge of probable cyber threats. A city council should operate like a modern-day enterprise with specific goals and objectives that include planning for defending against cyber-attacks and responding to emergencies. Ensuring security of network and sensors The smart city council should secure connected systems and sensors from any physical attack or infiltration. Identity management and device authentication mechanisms should be deployed at every interface of a smart system. Digital forensic capabilities, which help trace cyber breaches and gather evidence of malicious activities for legal action, should be integrated with the overall cyber architecture, right from the design phase. Gathering and analyzing real-time data with supervisory control and data acquisition (SCADA) will help predict security failures, and thus prevent a complete lock-down of critical services. Building resilient systems As a smart city grows, the interconnections of systems and interdependencies of smart services increase manifold. This makes them more vulnerable to cyber-attacks. The smart city council should therefore aim to design riskresilient digital architecture. The architecture should possess the adaptive capability to arrest anomalies in the nascent stage, and lock down a subsystem without disturbing other live components, ensuring uninterrupted service delivery. 6

7 City councils should build resilient interdependent systems to handle cyber emergencies and restore impacted services quickly. An effective cyber resilience strategy also helps protect the various connected devices and assets in case of any eventuality. Business continuity planning (BCP) is an effective risk management initiative that can help the smart city council ensure the security and availability of smart services. Periodic BCP drills should be conducted, audited, and documented for ready reference during criticalities. This will enable smart cities to take a recovery oriented approach toward risk management. Adopting international standards The security standards and risk mitigation strategies currently being used to secure IT systems may not be adequate to safeguard the interdependent City council should establish systems in smart cities. ISO 22301:2012, the International Standard for proper communication Societal Security Business Continuity Management Systems² should be channels to respond to cyber adopted to prevent the disruption of citizen services. Proper communication threats and other management is critical for smart cities to respond to cyber threats and other emergencies exigencies. Communication channels with pre-identified points of contact should be defined, documented, and regularly updated. These documents should be made available to all stakeholders for easy reference if and when the need arises. Performing system impact and interdependency analysis Periodic system impact analysis should be performed to identify risks posed to critical interdependent systems and interconnected services, with appropriately defined recovery time and recovery point objectives. Smart cities should also have secure data receivers and data storage to collect and store data generated from the ICS and ITS components for analysis, decision making, and incident response management. The stored data should be periodically backed up. As a precautionary measure, data flow from control systems can be channelized using data diodes to prevent data contamination. Smart city councils should devise a component protection strategy to identify critical components of interdependent systems for agile risk analysis. A preliminary system interdependency analysis should be conducted to understand the requirements for information continuity at system interfaces, and to identify the critical components that enable the flow of vital information. This should be followed by a probabilistic interdependency analysis to manage the risks of high fidelity interdependent systems like smart grid, smart health monitoring systems for senior citizens and critical patients, and so on. This analysis can be helpful in enhancing the resilience of critical systems in a smart city. The CPNI Good Practice Guide for Process Control and SCADA Security³ can be used by city councils to ensure security and trustworthiness of the interdependent systems. It provides a framework based on industry best practices for process control and IT security. The framework focuses on seven key themes: 1) Understanding business risks 2) Implementing secure architecture 3) Establishing response capabilities [2] ISO, ISO 22301:2012, accessed November 2015 [3] Good Practice Guide Process Control and SCADA Security, accessed November

8 4) Improving awareness and skills 5) Managing third party risks 6) Engaging projects for security measures in service design 7) Establishing ongoing governance Ensuring citizen compliance Citizens of smart cities are bound to play a crucial role in ensuring the security of interdependent systems from cyber as well as physical security perspectives. Citizens with smart devices are critical points in the cyber system framework, and can be targeted by attackers and hackers to gain entry into the system. This can be done through social engineering, spam s, data streaming, and other malicious methods. To prevent this, smart city councils should develop policies and procedures for establishment, maintenance, and operation of secure smart services. Cyber-awareness programs should be made mandatory for citizens, and penalties levied for non-compliance. Making Smart Cities Safe with Effective Risk Management Understanding and evaluating risks in smart city systems require a pragmatic approach to cyber risk management due to the high level of interconnectedness of smart services and the rapidly evolving nature of constituent systems. With smart cities projected to grow rapidly over the next few years, there is a clear need for smart city councils to focus on mitigating security concerns. Incorporating risk mitigation and developing strong security strategies in the initial planning and service design stages will enable smart city councils to provide safe, secure, and reliable services to its citizens. 8

9 About TCS IT Infrastructure Services Unit Leading organizations across industries work with TCS to realize their business transformation and innovation objectives by enhancing the availability, performance and agility of their IT infrastructure. Leveraging a combination of the cloud, new generation delivery models such as IaaS, PaaS, and SaaS, virtualization, and managed services, our offerings deliver the secure, flexible, and reliable IT infrastructure needed to power critical business applications, services and data. TCS infrastructure offerings encompass data center services, end-user computing (EUC), mobility services, cloud services and transformational solutions, converged network services, managed security services, application management services, enterprise systems management, IT service desk, and IT service management. Backed by our Assess-Build-Manage-Transform framework, extensive partner ecosystem, tools and automation frameworks, and technology Centers of Excellence (CoEs), analytics-led approach, to understand the 'as-is' state, and arrive at the 'to-be' state. As a result, you seamlessly transition from traditional infrastructure management services towards new generation delivery. Contact For more information about TCS IT Infrastructure Services, visit: itis.presales@tcs.com Subscribe to TCS White Papers TCS.com RSS: Feedburner: About Tata Consultancy Services (TCS) Tata Consultancy Services is an IT services, consulting and business solutions organization that delivers real results to global business, ensuring a level of certainty no other firm can match. TCS offers a consulting-led, integrated portfolio of IT and IT-enabled infrastructure, engineering and TM assurance services. This is delivered through its unique Global Network Delivery Model, recognized as the benchmark of excellence in software development. A part of the Tata Group, India s largest industrial conglomerate, TCS has a global footprint and is listed on the National Stock Exchange and Bombay Stock Exchange in India. For more information, visit us at IT Services Business Solutions Consulting All content / information present here is the exclusive property of Tata Consultancy Services Limited (TCS). The content / information contained here is correct at the time of publishing. No material from here may be copied, modified, reproduced, republished, uploaded, transmitted, posted or distributed in any form without prior written permission from TCS. Unauthorized use of the content / information appearing here may violate copyright, trademark and other applicable laws, and could result in criminal or civil penalties. Copyright 2015 Tata Consultancy Services Limited TCS Design Services I M I 10 I 15

IT Infrastructure Services. White Paper. Utilizing Software Defined Network to Ensure Agility in IT Service Delivery

IT Infrastructure Services. White Paper. Utilizing Software Defined Network to Ensure Agility in IT Service Delivery IT Infrastructure Services White Paper Utilizing Software Defined Network to Ensure Agility in IT Service Delivery About the Author Siddhesh Rane Siddhesh Rane is a Technical Architect and part of the

More information

Retail. White Paper. Driving Strategic Sourcing Effectively with Supply Market Intelligence

Retail. White Paper. Driving Strategic Sourcing Effectively with Supply Market Intelligence Retail White Paper Driving Strategic Sourcing Effectively with Supply Market Intelligence About the Author Devaraj Chithur Devaraj is part of the Supply Chain group within Tata Consultancy Services (TCS)

More information

Linking Transformational Initiatives to Desired Business Outcomes: Leveraging a Business-Metrics Driven Framework

Linking Transformational Initiatives to Desired Business Outcomes: Leveraging a Business-Metrics Driven Framework Business Process Services White Paper Linking Transformational Initiatives to Desired Business Outcomes: Leveraging a Business-Metrics Driven Framework About the Author Venkatesh Kuppuswamy Venkatesh Kuppuswamy

More information

Over 18,400 branches. 21,843 ATMs. 261 million accounts. Enabling State Bank of India to create the world s largest homogenous banking network

Over 18,400 branches. 21,843 ATMs. 261 million accounts. Enabling State Bank of India to create the world s largest homogenous banking network Wealth Management Volatility and uncertainty in the markets have given rise to a new class of customers who are extremely cautious and demand absolute transparency from their advisors. They now expect

More information

ion IT-as-a-Service Solution

ion IT-as-a-Service Solution ion IT-as-a-Service Solution "The ion Manufacturing Solution enabled us to control our business more meaningfully, including our field operations. Through the Field Force module, we have updated information

More information

Business Process Services. White Paper. Improving Efficiency in Business Process Services through User Interface Re-engineering

Business Process Services. White Paper. Improving Efficiency in Business Process Services through User Interface Re-engineering Business Process Services White Paper Improving Efficiency in Business Process Services through User Interface Re-engineering About the Authors Mahesh Kshirsagar Mahesh has a vast experience of about 24

More information

Business Process Services. White Paper. Personalizing E-Commerce: Improving Interactivity to Increase Revenues

Business Process Services. White Paper. Personalizing E-Commerce: Improving Interactivity to Increase Revenues Business Process Services White Paper Personalizing E-Commerce: Improving Interactivity to Increase Revenues About the Author Subramaniam MV Subramaniam is a Delivery Manager at Tata Consultancy Services

More information

Next Generation Electric Utilities Gear up Using Cloud Based Services

Next Generation Electric Utilities Gear up Using Cloud Based Services A Point of View Next Generation Electric Utilities Gear up Using Cloud Based Services Abstract Globally, liberalization of the electricity sector has driven a paradigm shift in the ownership structure,

More information

Business Process Services. White Paper. Mitigating Trade Fraud: The Case for Detecting Group Level Fraudulent Activity

Business Process Services. White Paper. Mitigating Trade Fraud: The Case for Detecting Group Level Fraudulent Activity Business Process Services White Paper Mitigating Trade Fraud: The Case for Detecting Group Level Fraudulent Activity About the Author Narasimha Murty M V Narasimha Murty holds a Master's degree in Mathematics

More information

Business Process Services. White Paper. Optimizing Extended Warranty Processes by Embracing Analytics

Business Process Services. White Paper. Optimizing Extended Warranty Processes by Embracing Analytics Business Process Services White Paper Optimizing Extended Warranty Processes by Embracing Analytics About the Author Dr. Anuj Prakash Anuj Prakash is a part of the TCS Analytics and Insights Practice,

More information

Enterprise-wide Anti-money Laundering and KYC Initiatives A point of view

Enterprise-wide Anti-money Laundering and KYC Initiatives A point of view Enterprise-wide Anti-money Laundering and KYC Initiatives A point of view Introduction Every financial institution is charged with the responsibility of developing policies and procedures to combat money

More information

Business Process Services. White Paper. Automating Email Management: Managing Workflow Effectively

Business Process Services. White Paper. Automating Email Management: Managing Workflow Effectively Business Process Services White Paper Automating Email Management: Managing Workflow Effectively About the Authors Deva Latha S. Assistant Consultant Deva Latha has over nine years of experience in Business

More information

Digital Enterprise Unit. White Paper. Securing Patient Information HIPAA and Mobile Healthcare Applications

Digital Enterprise Unit. White Paper. Securing Patient Information HIPAA and Mobile Healthcare Applications Digital Enterprise Unit White Paper Securing Patient Information HIPAA and Mobile Healthcare Applications About the Authors Colonel Rajmohan, CISSP Senior Consultant, TCS Colonel Rajmohan heads the digital

More information

Business Process Services. White Paper. Improving Regulatory Compliance in the Mortgage Industry

Business Process Services. White Paper. Improving Regulatory Compliance in the Mortgage Industry Business Process Services White Paper Improving Regulatory Compliance in the Mortgage Industry About the Author Lovette Patrick D'Souza Lovette Patrick D'Souza has over 10 years of experience in Banking

More information

Conferencing Agent Enhancing the Communication Experience

Conferencing Agent Enhancing the Communication Experience White Paper Conferencing Agent Enhancing the Communication Experience To achieve corporate operational excellence, the existing resources of an organization must be utilized to the best possible extent.

More information

Bring Your Own Device (BYOD) A point of view

Bring Your Own Device (BYOD) A point of view Bring Your Own Device (BYOD) A point of view BYOD - Consumer driven IT Today, consumers possess powerful devices for their personal needs. Often, the computing power and features of the devices bought

More information

Digital Enterprise Unit. White Paper. Reimagining the Future of Field Service Management with Digital Technologies

Digital Enterprise Unit. White Paper. Reimagining the Future of Field Service Management with Digital Technologies Digital Enterprise Unit White Paper Reimagining the Future of Field Service Management with Digital Technologies About the Author Rahul Trisal Rahul is a senior Digital Strategy Consultant with TCS' Digital

More information

White Paper. Social Analytics

White Paper. Social Analytics White Paper Social Analytics This paper brings to forefront the growing popularity of social media as a source of data for analytics with relation to the telecom industry. The paper further elaborates

More information

ion Customer Relationship Management (CRM) Solution

ion Customer Relationship Management (CRM) Solution ion Customer Relationship Management (CRM) Solution How do you command the loyalty of your customers in a competitive market? How do you achieve an increase in sales? To help you answer these questions,

More information

Business Process Services. White Paper. Predictive Analytics in HR: A Primer

Business Process Services. White Paper. Predictive Analytics in HR: A Primer Business Process Services White Paper Predictive Analytics in HR: A Primer About the Authors Tuhin Subhra Dey Tuhin is a member of the Analytics and Insights team at Tata Consultancy Services (TCS), where

More information

Life Sciences. White Paper. Real-time Patient Health Monitoring with Connected Health Solutions

Life Sciences. White Paper. Real-time Patient Health Monitoring with Connected Health Solutions Life Sciences White Paper Real-time Patient Health Monitoring with Connected Health Solutions About the Authors Ashok Khanna Global Head, Presales and Solutions, Engineering Industrial Services, Life Sciences

More information

Business Process Services. White Paper. Configurable, Automated Workflows: Transforming Process Effectiveness for Business Excellence

Business Process Services. White Paper. Configurable, Automated Workflows: Transforming Process Effectiveness for Business Excellence Business Process Services White Paper Configurable, Automated Workflows: Transforming Process Effectiveness for Business Excellence About the Authors Ohm Kumar Ohm Kumar is a Business Analyst with the

More information

A pay-as-you-use model About TCS ion Integrated solutions Personalized solutions www.tcsion.com Automatic upgrades Increased agility

A pay-as-you-use model About TCS ion Integrated solutions Personalized solutions www.tcsion.com Automatic upgrades Increased agility ion Payroll Solution As organizations strive to improve employee morale, job satisfaction, and productivity, it becomes imperative to regularize the payroll cycles, in order to keep employees motivated.

More information

Business Process Services. White Paper. Leveraging the Internet of Things and Analytics for Smart Energy Management

Business Process Services. White Paper. Leveraging the Internet of Things and Analytics for Smart Energy Management Business Process Services White Paper Leveraging the Internet of Things and Analytics for Smart Energy Management About the Author Akhil Bhardwaj Akhil Bhardwaj is a Senior Manager in the Analytics and

More information

Business Process Transformation A Pulse Check

Business Process Transformation A Pulse Check White Paper Business Process Transformation A Pulse Check Over the last decade or two, two trends have been noticeable across all businesses. The move towards consolidation of office-based operations,

More information

Business Process Services. White Paper. Improving Agility in Accounts Receivables with Statistical Prediction and Modeling

Business Process Services. White Paper. Improving Agility in Accounts Receivables with Statistical Prediction and Modeling Business Process Services White Paper Improving Agility in Accounts Receivables with Statistical Prediction and Modeling About the Authors R Rengesh Siva Rengesh Siva has over 14 years of experience in

More information

HiTech. White Paper. Storage-as-a-Service. SAN and NAS Reference Architectures leveraging Private Cloud Storage

HiTech. White Paper. Storage-as-a-Service. SAN and NAS Reference Architectures leveraging Private Cloud Storage HiTech White Paper -as-a-service SAN and NAS Reference Architectures leveraging Private Cloud About the Author Ankur Srivastava Ankur Srivastava is a Solution Architect working with the Hi Tech Industry

More information

Robotic Process Automation: Reenergizing the Directory Publishing Industry

Robotic Process Automation: Reenergizing the Directory Publishing Industry A Point of View Robotic Process Automation: Reenergizing the Directory Publishing Industry Abstract Evolving digital marketing avenues including video, SEM/SEO, mobile, and social media are fast replacing

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

IT Infrastructure Services. White Paper. Emerging PaaS Models and Migration to PaaS

IT Infrastructure Services. White Paper. Emerging PaaS Models and Migration to PaaS IT Infrastructure Services White Paper Emerging PaaS Models and Migration to PaaS About the Author Sameer Deshpande Sameer Deshpande has over 15 years of experience in IT, and is a solution architect within

More information

Simplify your admission process - The ion Way

Simplify your admission process - The ion Way Simplify your admission process - The ion Way Coordination from TCS employees has helped us lot in implementation of all modules of the ERP. It was helpful to have a person that managed to implement our

More information

HiTech. White Paper. A Next Generation Search System for Today's Digital Enterprises

HiTech. White Paper. A Next Generation Search System for Today's Digital Enterprises HiTech White Paper A Next Generation Search System for Today's Digital Enterprises About the Author Ajay Parashar Ajay Parashar is a Solution Architect with the HiTech business unit at Tata Consultancy

More information

Overview. Société Générale

Overview. Société Générale Payments Ever-changing market dynamics, customer expectations, rapidly evolving regulatory measures, ageing technology, consolidation in corporate treasury, advent of electronic instruments, increased

More information

Business Partner of. Hardware + Network + Software + Services

Business Partner of. Hardware + Network + Software + Services Business Partner of Hardware + Network + Software + Services About RDS Business Services RDS Business Services do services like Web Services, Software Services, Software Testing, Contract Staffing, Placement

More information

Business Process Services. White Paper. Business Intelligence in Finance & Accounting: Foundation for an Agile Enterprise

Business Process Services. White Paper. Business Intelligence in Finance & Accounting: Foundation for an Agile Enterprise Business Process Services White Paper Business Intelligence in Finance & Accounting: Foundation for an Agile Enterprise About the Author Balaji Venkat Chellam Iyer Balaji has over 18 years of experience

More information

Business Process Services. White Paper. Five Principles to Consider when Consolidating your Finance and Accounting Function

Business Process Services. White Paper. Five Principles to Consider when Consolidating your Finance and Accounting Function Business Process Services White Paper Five Principles to Consider when Consolidating your Finance and Accounting Function About the Authors Vikas Golchha, Associate Vice President, TCS Vikas is part of

More information

ISU name. Enterprise Security and Risk Management. White Paper. The Cost of Pen Testing a Web Application

ISU name. Enterprise Security and Risk Management. White Paper. The Cost of Pen Testing a Web Application ISU name Enterprise Security and Risk Management White Paper The Cost of Pen Testing a Web Application About the Author Srimant Acharya Srimant Acharya heads the Center of Excellence (CoE) for Enterprise

More information

ion Human Capital Management Solution

ion Human Capital Management Solution ion Human Capital Solution For organizations spread across multiple sites, Human Resource processes such as recruitment, deputation, and employee appraisal are complex. HR departments are increasingly

More information

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number

More information

Business Process Services. White Paper. Social Media Influence: Looking Beyond Activities and Followers

Business Process Services. White Paper. Social Media Influence: Looking Beyond Activities and Followers Business Process Services White Paper Social Media Influence: Looking Beyond Activities and Followers About the Author Vandita Bansal Vandita Bansal is a subject matter expert in Analytics and Insights

More information

Business Process Services. White Paper. Managing Customer Experience: Strategies for Success

Business Process Services. White Paper. Managing Customer Experience: Strategies for Success Business Process Services White Paper Managing Customer Experience: Strategies for Success About the Author Ashwin Fernandes, Assistant Manager, TCS Ashwin is a practice consultant in the Innovation and

More information

TCS Supply Chain Center of Excellence

TCS Supply Chain Center of Excellence TCS Supply Chain Center of Excellence Delivering Supply Chain Performance in Complex Dynamic Markets Supply Chain Management Supply Chain Management (SCM) has evolved and the focus has now shifted from

More information

KYCS - Integrating KYC with Social Identity: The Future-Ready Marketing Approach

KYCS - Integrating KYC with Social Identity: The Future-Ready Marketing Approach A Point of View KYCS - Integrating KYC with Identity: The Future-Ready Marketing Approach Abstract media has empowered us to voice and share our opinion on things that impact our lives. It has reshaped

More information

Seven Strategic Imperatives for Transitioning to a Shared Services Model

Seven Strategic Imperatives for Transitioning to a Shared Services Model A Point of View Seven Strategic Imperatives for Transitioning to a Shared Services Model Abstract Given today s tough business climate, organizations are adopting a shared services model to realize cost

More information

Digital Enterprise. White Paper. Capturing the Voice of the Employee: Enterprise Social Media Monitoring and Analytics

Digital Enterprise. White Paper. Capturing the Voice of the Employee: Enterprise Social Media Monitoring and Analytics Digital Enterprise White Paper Capturing the Voice of the Employee: Enterprise Social Media Monitoring and Analytics About the Authors Praveen Mishra Praveen Mishra is a Business Development Lead with

More information

Cyber Security: Confronting the Threat

Cyber Security: Confronting the Threat 09 Cyber Security: Confronting the Threat Cyber Security: Confronting the Threat 09 In Short Cyber Threat Awareness and Preparedness Active Testing Likelihood of Attack Privacy Breaches 9% 67% Only 9%

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

EMC DOCUMENTUM MANAGING DISTRIBUTED ACCESS

EMC DOCUMENTUM MANAGING DISTRIBUTED ACCESS EMC DOCUMENTUM MANAGING DISTRIBUTED ACCESS This white paper describes the various distributed architectures supported by EMC Documentum and the relative merits and demerits of each model. It can be used

More information

Business Process Services. White Paper. Effective Credit Risk Assessment Strengthening the Financial Spreading with Technology Enablers

Business Process Services. White Paper. Effective Credit Risk Assessment Strengthening the Financial Spreading with Technology Enablers Business Process Services White Paper Effective Credit Risk Assessment Strengthening the Financial Spreading with Technology Enablers About the Author Vijay Muppavarapu Vijay is a subject matter expert

More information

Dodd Frank Act and the Consumer Affect on Banks

Dodd Frank Act and the Consumer Affect on Banks A Point of View Dodd Frank Act: Partner your way to Compliance With the passage of the Dodd Frank Act, banks and financial institutions are grappling with a highly restrictive environment and burgeoning

More information

Business Process Services. White Paper. Strengthening Business Operations with the Digital Five Forces

Business Process Services. White Paper. Strengthening Business Operations with the Digital Five Forces Business Process Services White Paper Strengthening Business Operations with the Digital Five Forces About the Author Mahesh Kshirsagar Mahesh Kshirsagar heads Technology Transformation in the Business

More information

BPM Perspectives Positioning and Fitment drivers

BPM Perspectives Positioning and Fitment drivers BPM Perspectives Positioning and Fitment drivers BPM is a commonly used and much hyped acronym. It popularly stands for Business Process Management but now it achieves much more than just that. Especially

More information

Banking & Financial Services. White Paper. Automated Advice Delivery Platforms: Simplifying the Investment Management Game

Banking & Financial Services. White Paper. Automated Advice Delivery Platforms: Simplifying the Investment Management Game Banking & Financial Services White Paper Automated Advice Delivery Platforms: Simplifying the Investment Management Game About the Authors Srinivasa Kumar Yerchuru Srinivasa Kumar Yerchuru heads the Capital

More information

The four windows of organizational change in training for ERP transformation

The four windows of organizational change in training for ERP transformation White Paper The four windows of organizational change in training for ERP transformation Managing users apprehension to change has always been a challenge for large scale ERP implementations. Moving the

More information

Business Process Services. White Paper. Achieving Business Excellence: Utilities Embracing Analytics for Effective Decision Making

Business Process Services. White Paper. Achieving Business Excellence: Utilities Embracing Analytics for Effective Decision Making Business Process Services White Paper Achieving Business Excellence: Utilities Embracing Analytics for Effective Decision Making About the Author Swaminathan Subramanian Swaminathan has over 17 years of

More information

Bridging the IT Business Gap The Role of an Enterprise Architect

Bridging the IT Business Gap The Role of an Enterprise Architect Whitepaper Bridging the IT Business Gap The Role of an Enterprise Architect Today s enterprises understand the value that Information Technology (IT) can bring to their business. IT supports day-to-day

More information

Into the cybersecurity breach

Into the cybersecurity breach Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing

More information

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue. Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues

More information

Cyber Security solutions

Cyber Security solutions Cyber Security solutions The scenario IT security has become a highly critical issue for all businesses as a result of the growing pervasiveness and diffusion of ICT technology. Risks can arise both inside

More information

Enter an insurance solution, TCS BaNCS from Tata Consultancy Services.

Enter an insurance solution, TCS BaNCS from Tata Consultancy Services. Insurance The financial crisis of 2008 and the subsequent recovery process, though tepid, has altered the insurance industry landscape significantly. Today, the focus is on enhancing efficiencies and controlling

More information

Business Process Services. White Paper. Providing Customer Service the Social Way

Business Process Services. White Paper. Providing Customer Service the Social Way Business Process Services White Paper Providing Customer Service the Social Way About the Author Awani Sarogi Awani is a subject matter expert in digital media, developing digital media solutions and offerings

More information

Overview. Integrated Front-mid-back office as well as standalone Front office or Back-office solution or Trading Channels

Overview. Integrated Front-mid-back office as well as standalone Front office or Back-office solution or Trading Channels Securities Trading The adoption of technology is rapidly changing the dynamics of the brokerage industry. The increasing use of smartphones and tablets represent a transformation in the way in which investors

More information

Digital Enterprise. White Paper. Multi-Channel Strategies that Deliver Results with the Right Marketing Attribution Model

Digital Enterprise. White Paper. Multi-Channel Strategies that Deliver Results with the Right Marketing Attribution Model Digital Enterprise White Paper Multi-Channel Strategies that Deliver Results with the Right Marketing Model About the Authors Vishal Machewad Head Marketing Services Practice Vishal Machewad has over 13

More information

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy Mobility Solutions The growth of in-house and third-party enterprise mobile applications; device diversity across ios, Android,

More information

CYBER SECURITY GUIDANCE

CYBER SECURITY GUIDANCE CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires

More information

PCI Compliance for Cloud Applications

PCI Compliance for Cloud Applications What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage

More information

Backlog Management Index (BMI) Evaluation and Improvement An ITIL Approach

Backlog Management Index (BMI) Evaluation and Improvement An ITIL Approach Backlog Management Index (BMI) Evaluation and Improvement An ITIL Approach Backlog Management Index is one of the important metrics that is closely monitored in Steady State of Maintenance and Support

More information

Backward Scheduling An effective way of scheduling Warehouse activities

Backward Scheduling An effective way of scheduling Warehouse activities Backward Scheduling An effective way of scheduling Warehouse activities Traditionally, scheduling algorithms were used in capital intensive production processes where there was a need to optimize the production

More information

Five keys to a more secure data environment

Five keys to a more secure data environment Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational

More information

Implement Business Process Management to realize Cost Savings and High Return on Investments

Implement Business Process Management to realize Cost Savings and High Return on Investments Implement Business Process Management to realize Cost Savings and High Return on Investments Business Process Management (BPM) was unheard of just a few years ago, but it has burst onto the global scene

More information

Life Sciences. White Paper. Integrated Digital Marketing: The Key To Understanding Your Customer

Life Sciences. White Paper. Integrated Digital Marketing: The Key To Understanding Your Customer Life Sciences White Paper Integrated Digital Marketing: The Key To Understanding Your Customer About the Authors Raghunandan H Head, Life Sciences Sales & Marketing Center of Excellence Raghunandan (Raghu)

More information

Redefining Agile to Realize Continuous Business Value

Redefining Agile to Realize Continuous Business Value A Point of View Redefining Agile to Realize Continuous Business Value Abstract As enterprises look to move the needle on their business in an intensely competitive market, they expect superior performance

More information

Transportation Solutions Built on Oracle Transportation Management. Enterprise Solutions

Transportation Solutions Built on Oracle Transportation Management. Enterprise Solutions Transportation Solutions Built on Oracle Transportation Management Enterprise Solutions Optimizing transportation operations and ensuring improved customer service Today s complex and challenging business

More information

Lead the Retail Revolution.

Lead the Retail Revolution. Lead the Retail Revolution. The retail industry is at the center of a dramatic shift in the way consumers shop and interact with their retailers. After hundreds of years of customers going to the store,

More information

HEALTH CARE AND CYBER SECURITY:

HEALTH CARE AND CYBER SECURITY: HEALTH CARE AND CYBER SECURITY: Increasing Threats Require Increased Capabilities kpmg.com 1 HEALTH CARE AND CYBER SECURITY EXECUTIVE SUMMARY Four-fifths of executives at healthcare providers and payers

More information

Call to Action on Smart Sustainable Cities

Call to Action on Smart Sustainable Cities Call to Action on Smart Sustainable Cities 1. Introduction Achieving sustainable urbanization, along with the preservation of our planet, has been recognized as one of the major challenges of our society

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

ion Manufacturing Solution

ion Manufacturing Solution ion Manufacturing Solution Today with ion, while I am driving home I get to see all the information that I need, even when I am in a customer place I can take decisions looking at the information that

More information

Business Process Services. White Paper. Transforming the Mortgage Lending Process through Social Media

Business Process Services. White Paper. Transforming the Mortgage Lending Process through Social Media Business Process Services White Paper Transforming the Mortgage Lending Process through Social Media About the Author Ramani Balakrishnan Ramani Balakrishnan is a domain consultant in the Transformation

More information

Data Visualization in Ext Js 3.4

Data Visualization in Ext Js 3.4 White Paper Data Visualization in Ext Js 3.4 Ext JS is a client-side javascript framework for rapid development of cross-browser interactive Web applications using techniques such as Ajax, DHTML and DOM

More information

Green Desktop Infrastructure

Green Desktop Infrastructure White Paper Green Desktop Infrastructure An Approach to Reduce Desktop Carbon Footprint The proliferation of desktops is increasingly contributing to carbon emissions, through inefficient power consumption,

More information

Benchmarking Software Quality With Applied Cost of Quality

Benchmarking Software Quality With Applied Cost of Quality Benchmarking Software Quality With Applied Cost of Quality Cost of Quality has remained theoretical in many treatments despite its powerful relevance in software quality. A survey-based approach makes

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Preemptive security solutions for healthcare

Preemptive security solutions for healthcare Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare

More information

Procurement needs a Digital Strategy

Procurement needs a Digital Strategy White Paper Procurement needs a Digital Strategy Marketing executives across the world have very clearly been concerned with digital strategy for some time, leveraging the benefits of greater reach and

More information

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Cyber Security Incident Handling Policy Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Oct 9, 2015 i Document Control Document Owner Classification

More information

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Legislative Council Panel on Information Technology and Broadcasting. Information Security For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest

More information

Business Process Services. White Paper. Holistic Enterprise Compliance: Adapting to Evolving Regulations in the Mortgage Industry

Business Process Services. White Paper. Holistic Enterprise Compliance: Adapting to Evolving Regulations in the Mortgage Industry Business Process Services White Paper Holistic Enterprise Compliance: Adapting to Evolving Regulations in the Mortgage Industry About the Author Ramani Balakrishnan Ramani Balakrishnan is a Domain Consultant

More information

Is Your Vendor CJIS-Certified?

Is Your Vendor CJIS-Certified? A Thought Leadership Profile Symantec SHUTTERSTOCK.COM Is Your Vendor CJIS-Certified? How to identify a vendor partner that can help your agency comply with new federal security standards for accessing

More information

Business Process Services. White Paper. Effective Vendor Management: Improving Supply Chain Efficiencies, Reducing Risk

Business Process Services. White Paper. Effective Vendor Management: Improving Supply Chain Efficiencies, Reducing Risk Business Process Services White Paper Effective Vendor Management: Improving Supply Chain Efficiencies, Reducing Risk About the Author Devaraj Chithur Devaraj Chithur is a subject matter expert on supply

More information

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat

More information

Banking & Financial Services. White Paper. How a Hybrid Cloud Strategy can help Financial Institutions Realize Business Value

Banking & Financial Services. White Paper. How a Hybrid Cloud Strategy can help Financial Institutions Realize Business Value Banking & Financial Services White Paper How a Hybrid Cloud Strategy can help Financial Institutions Realize Business Value About the Author Ravi Satyanarayana Solution Architect and Consultant Ravi Satyanarayana

More information

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015 Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are

More information

BI Today and Tomorrow

BI Today and Tomorrow White Paper BI Today and Tomorrow BI has been one of the most important business initiatives providing positive impact on the health of organizations. Usually, questions are raised on the maturity of the

More information

Securities Processing

Securities Processing Securities Processing Several challenges in the global securities market including new regulations, the pressure to reduce cost and minimize risk along with the mounting need for transparency, are forcing

More information

Cybersecurity Converged Resilience :

Cybersecurity Converged Resilience : Cybersecurity Converged Resilience : The cybersecurity of critical infrastructure 2 AECOM Port Authority of New York and New Jersey (PANYNJ), New York, New York, United States. AECOM, working with the

More information

The new A and B of the Finance Function: Analytics and Big Data

The new A and B of the Finance Function: Analytics and Big Data White Paper The new A and B of the Finance Function: Analytics and Big Data - Evolution of the finance function from bean counter to business partner There s no escaping the fact that finance, and the

More information

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government

More information

Cloud Computing for SCADA

Cloud Computing for SCADA Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry

More information