HP Cyber Security Control Cyber Insight & Defence
Security awareness at board level Security leadership is under immense pressure Cyber threat Extended supply chain Financial loss Reputation damage Cost of protection 56% of organisations have been the target of a nation state cyber attack 44% of all data breach involved third-party mistakes $675m average cost associated with data breach 30% market cap reduction due to recent events 11% of total it budget spent on security TRUST sits at heart of the enterprise security response 2 Source: Copyright HP internal 2012 Hewlett-Packard data, Forrester Development Research, Company, Ponemon L.P. Institute The information contained herein is subject to change without notice.
Security challenges are increasing Staff lack the necessary bandwidth and skills Need for 24x7 global management Knowledge of changing and diverse forms of threat Protecting data at rest, in motion, and in use Fragmented systems and procedures Embracing new ways of collaborating and delivering IT 3
Managing business risk Moving from reactive to proactive enterprise security Assess security investments and performance Transform from silos to a comprehensive view Optimize to proactively improve security posture Manage security effectively ATOM Balance between securing your business and enabling it 4
Security consulting Benefits Assess where you are today and understand where you need to be, keeping in line with business objectives Transform your security to address gaps and better manage risk and opportunities Security governance and compliance Security risk and control assessment Security architecture and technology integration Optimize your environment to improve compliance, enable your enterprise, and maximize investments Manage your infrastructure proactively to keep you agile and ready to respond quickly to security issues Security metrics and reporting Digital response and investigation Threat and vulnerability management 5
Designing Security: The Security Stack National Cyber Response National Level Threat Alerts Intelligence Overlay of Integrated Security Assured System and Content Situational Awareness (Event Correlation) Prevent Detect Respond Local and Wide Area Network, Data, Privacy Integration of Security is about an exchange of information so that the layers work together 6
Why HP? A complete and direct security solution: HP s full suite of security offerings in security consulting and managed security services, all supporting by leading technology and IP. Actionable security Intelligence: HP s industry leading R&D from HP Labs and DVLabs, full service security experience and toolsets. Multi-industry knowledge and certified consultants: All our consultants are accredited and hold certification in including TOGAF, CHECK, SPF, FISMA, CLAS, CISSP, CISM, CISA, CLEF, IISP, ISO 27001 Lead Auditor, PCI QSA, Emcee, CHFI, CEH, ITIL, GCFA, and many more. Aligning Security with the organization; By implementing HP s proven processes, methodologies and toolsets we can help manage risk exposure in line with an organization s objectives. 7 7
More information Visit us at www.hp.com/enterpise/security 8