cybersecurity vision - atos · health & life sciences retail, transport & logistics...
TRANSCRIPT
Cybersecurity vision
Zeina ZakhourCybersecurity CTO Distinguished expert & member of the scientific community
Technology Days 2019 Cybersecurity
The ever changing Threat LandscapeSpeed & super cycle of innovation
2000 2005 2010 2018 2019+
Big data = big problems
Crime syndicates take a quantum leap
Systemic vulnerabilities
are weaponized
Smart machinescreate new risks
Mobile apps become the main route for compromise
Opaque algorithms compromise integrity
OT/Smart meterhacks surge
Fileless malware are difficult to detect
serverless computing
blurs the defense zone
AI powered attackscryptojacking/
drive-by mining
cross cloud attacks
Worms
DDOS
Exploiting known vulnerabilities
Cross site scripting exploits
Spywares
Intelligent botnets
MassSpams
Trojans
Zero days
APTs
Ransomware
IoT botnets
Hardware flaws weaponization
SSL/TLS attacks
DNS Hijacking
Cloud attackvectors
Technology Days 2019 Cybersecurity
Who is winning the war in Cybersecurity?
Technology Days 2019 Cybersecurity
Turning the table on cybercrimeCybersecurity Everywhere & By design
Ecosystems of multiple infrastructures
Smart data platforms and services
Industry expertise and solutions
Cybersecurity everywhere
The foundation of the Atos digital value
Technology Days 2019 Cybersecurity
Turning the table on cybercrimeTackle the Survivor Bias to succeed
Cybersecurity
Technology Days 2019 Cybersecurity
Security by Design Four core elements
Threat landscape
People Scalability Speed
AGILITY
Technology Days 2019 Cybersecurity
Atos Cybersecurity StrategyLeveraging Analytics & Automation for key cybersecurity domains
Trusted Digital Identities
DigitalWorkplace
Security
DataProtection &Governance
HybridCloud
Security
Consulting – Technologies – Integration – MSSP
Analytics &Automation
IndustrialIoT
Security
AdvancedDetection
& Response
Predict – Prevent – Detect - Respond
Technology Days 2019 Cybersecurity
New Cybersecurity ParadigmSingle pane of glass
Clo
ud
en
vir
on
men
t
Prescriptive Security Analytics (Machine Learning, Deep Learning, …)
Threat IntelligenceThreat Hunting
Security Orchestration & Automation Response
CERT & 24/7 Global SOC services
Prescrip
tive
SO
CO
n P
rem
ise
en
vir
on
men
t
Managed Cloud Provider Security Services
CloudAccess
Security Broker
CloudEncryption
Service
AppSecurityTesting
Cloud Identity and Access
Mgmt.
Cloud Workload Protection
Cloud Security Analytics
Container Security
Servers & Network Devices
FW & IPSServices
Endpoint Protection Services
APT Detection & Remediation
Data LossPrevention
IAM & PAMservices
Secure Web & Mail Gateway Services
DDoS Mitigation Services
NextGenFirewall
API Security Analytics
Privileged Access Mgmt.
Cloud Security Posture Mgmt.µ/n segment.
AntiDDoS/ WAF aaS
Data Leakage
Prevention
…
Endpoint Detection & Response
Vulnerability Management Services
Technology Days 2019 Cybersecurity
Public Sector
DefenseHealth & Life
sciencesRetail, Transport
& logistics
Manufacturing Energy & Utilities
Financial services
& Insurance
TelcoMedia
From Cyber Defense to Cyber
Deterrence
Secure Digitization and Smart Factories
through IoT, AI, robotics and Cloud computing
Securing the acquisition,
production & distribution platforms
Secure digital IT/OT/IoT operations
while complying with
strict regulations
Secure & save Lives with a sustainabledata privacy compliance
model Resilience for Smart Mobilityand Intelligent
transport infrastructures
Secure Open Banking
innovations & protect from payment and investment
frauds
Safeguarding Citizen-centric public servicesand the journey
to digital transformation
Getting ready for 5G and
stayingup-to-speed
with Security challenges for critical digital
services
One Cybersecurity does not fit all
Technology Days 2019 Cybersecurity
Privacy & Ethics in data-driven digital timesThe need for an Ethics Framework
AnalyticsProcessingCollection Storage Usage Refinement Sharing Disposal
Data Minimization
Data Subject Rights ManagementConsent | Graduated Consent | Continuous Consent update
Privacy & Security by Design Data Protection | Data Sovereignty | Linkability of Data
Lawfulness of data
processing
Auditability on Algorithms
Purpose specification
Due diligence for thirdparty collaboration
Transparency Accountability AuditabilityRegulationCompliance
Usage limitation
De-biasingAI / Ethicalmachines
Organizational structure for EthicsChief Ethics Officer | Ethics Panel | Ethics Council
Atos, the Atos logo, Atos Codex, Atos Consulting, Atos Worldgrid, Bull, Canopy, equensWorldline, Unify, Worldline and Zero Email are registered trademarks of the Atos group. May 2019. © 2019 Atos. Confidential information owned by Atos, to be used by the recipient only. This document, or any part of it, may not be reproduced, copied, circulated and/or distributed nor quoted without prior written approval from Atos.