cybersecurity00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · mobile services...

34
CYBERSECURITY Cybersecurity protects and enables your organization as it embraces Digital Transformation.

Upload: others

Post on 20-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

CYBERSECURITY

Cybersecurity protects and enables your organization as it embraces Digital Transformation.

Page 2: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

@Copyright Engineering. All rights reserved.

Page 3: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

6

9

12

15

18

23

24

26

29

Cybersecurity protects and enables your organization

as it embraces Digital Transformation

1

CYBERSECURITY

WHAT ARE WE DISCUSSING?

What is Cybersecurity?

What does Cybersecurity mean for your organization?

Our Approach & Solutions

Govern digital identities and get ahead of compliance

Block cyber attacks building intelligence driven security operations

Data protection to grow your business while protecting your brand

Our Reference Cybersecurity Architecture

How will Cybersecurity evolve?

Engineering, an active player in the European Cybersecurity Strategy

1

2

3

4

5

6

Page 4: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

Cybersecurity protects and enables your organization

as it embraces Digital Transformation

CYBERSECURITY

2

AUTHORS

Véronique PevtschinInnovation Manager Industry & Security, Research Lab Engineering

Building on 30 years of experience in physical and cyber security, Véronique

currently leads the innovation development for the Industry and Security Research

lab. She combines a hands-on experience in both embedded and high level systems

development, with a policy experience from her years working at the European

Commission. As an active member in European initiatives, Véronique chairs the

Cyber Security Working Group in EOS, which was instrumental in publishing

white papers that oriented the European Commission's strategy on cyber security.

Véronique graduated as an engineer from Brussels University and has a Master of

Science degree from MIT.

[email protected]

Elio Di SandroDirector of Offering & Solutions,

Cybertech Engineering Group

With over 35 years' experience in the IT

business, Elio has worked in Software

and IT Services & Consulting segments,

covering Technical, Sales and Managerial

roles in Italy, Europe and US. He

successfully ran international software and

IT service business units during a 28-year

career at IBM. As part of the board of

Directors, for the last 7 years Elio has been

responsible for the IT Security offering

and solutions' portfolio at OmnitechIT, a

specialized cybersecurity system integrator

now merged into the Engineering Group

with the brand Cybertech. Elio graduated in

Electronic Engineering, with an Executive

Master of Science in Information System

Governance.

[email protected]

Pablo CanestroSales Specialist, Engineering D.HUB

Pablo has spent 27 years in multiple

positions in Business Development, Sales

and Consultancy for leading ICT firms in

Digital Encryption, Multimedia Solutions,

Mobile Services & Cyber Security. He

worked in The Netherlands, UK & Italy

following the development of new business

streams. Pablo is an Electronic Engineer

in Argentina and got a master’s degree on

Electronic Engineering in the Netherlands.

He joined Engineering D.HUB mid-2018 to

strengthen and develop the Cyber Security

solutions team.

[email protected]

Envelope

Envelope

Page 5: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

Cybersecurity protects and enables your organization

as it embraces Digital Transformation

CYBERSECURITY

3

A FEW WORDS

The world we live in is changing. More and more and at increasing speed. The

new technological frontiers make it possible to connect everything and everyone.

This transformation is driving innovation forward at an unprecedented speed,

introducing improvements in the way we live and work that until recently seemed

unimaginable.

This new world, made up of opportunities, must however be protected and only

the right mix of experience, skills and technologies will ensure a secure and

controlled transformation.

According to all leading international analysts, in the last few years the number of

serious computer threats has increased exponentially and is destined to continue

to grow.

This trend poses an important question for companies looking to embark on the

Digital Transformation journey: how can I make my Digital World a safe place for

customers, employees and partners?

Engineering guarantees constant IT security. Enterprises that choose our

approach to Cybersecurity can focus on growing and developing their

businesses, with a reliable partner at their side capable of training employees,

monitoring networks, safeguarding data and preventing cyber threats before they

have an impact on the business.

With over 550 Cybersecurity specialists who already protect more than 10

Petabytes of data, we boast one of the leading cybersecurity centres in Europe.

Moreover, our continuous investments in people and research ensure that our

approach to security is constantly evolving and in line with the complexity of our

world. We have the vision, the resources and the experience required to protect

your organisation while it embarks on its digital journey.

Page 6: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

CYBERSECURITY

ENGINEERING'S RESEARCH ACTIVITIES IN CYBERSECURITY

Engineering has invested its cyber focused research activities in three directions:

■ novel approaches to train the employees and public servants to be able to better detect malicious cyber-attacks;

■ novel risk assessment and prioritisation of investment based on the economic impact of cyber threats;

■ increased contextualisation of cyber threat intelligence.

Engineering is member of European Organization for Security (EOS) and of European Cyber Security Organization (ECSO).

4 Certified Soc Tier IV, AGID, ISO27001/2013

450clients

43.2 Bln incidents per day

10 petabytes of data

21.000 servers

DETECTING

123 Bln liabilities per day

WE SECURE OVER

15%

35%50%

Methodology & Consulting

Senior Technical Professional

ProductSpecialist

WE MANAGE 1Security Academy Training School

Our specialized company in Cybersecurity Services

370categories

550securityspecialists certifiedIN OVER:

WE MANAGE

WE PROVIDE SECURITY SERVICES IN EUROPE, USA AND SOUTH AMERICA

Page 7: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

As Chief Security Officer of over 11.000 employees and over 450

client organizations from all over the world, my job is to guarantee

and reassure them that they can trust that their data and assets are

secure. Without trust, change cannot be embraced. Security is not

(only) about technology, and not (only) about prevention: it is a cross

domain founding principle that allows people and organizations to

push forward in their Digital Transformation journey.

Digital Transformation, as well as Business Development, depend on

security just like we depend on air: it’s invisible yet without it there

can be no evolution, no life. Cybersecurity is about protecting and

ensuring measures are in place, not only to prevent threats, but

above all to allow transformation and growth, thus protecting all those

promises that our future holds.

Igor Kranjec Corporate CSO Chief Security Officer, Engineering

Page 8: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

WHAT IS CYBERSECURITY?

1

CYBERSECURITY

Page 9: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

Cybersecurity protects and enables your organization

as it embraces Digital Transformation

CYBERSECURITY

7

Within the Digital Transformation sphere, Cybersecurity can be defined as the set of

technologies, skills, processes and structures required to protect data, applications

and infrastructure from unauthorised access, damage or attacks.

The importance of adopting Cybersecurity goes hand in hand with the exponential

growth in the quantity and value of data available (code, content, images,

infographics, video, signals, etc.).

The Digital Transformation paradigm places two fundamental and diverging

imperatives on companies:

■ enabling and growing the business,

implementing online services

designed to interact securely with

employees, customers and partners,

and ensuring that their structure is

ever more efficient and agile so it

can respond quickly to new market

requirements

■ protecting the business from breaches

and unauthorised access and data,

thanks to controls designed to

safeguard the data wherever it may be

stored (mobile devices, laptops, data

centres and Clouds).

Page 10: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

Cybersecurity protects and enables your organization

as it embraces Digital Transformation

CYBERSECURITY

8

INCREASED THREAT SURFACE

Cloud Mobility Social Media

Big Data I.O.T. Targeted Attacks

Insider Threat

ENABLE THE BUSINESS PROTECT THE BUSINESS

DELIVER NEW BUSINESS SERVICES BY SECURING ACCESS TO APPS AND DATA IN THE HYBRID CLOUD

SECURE THE MOBILE, CLOUD-CONNECTED ENTERPRISE

PROTECT CRITICAL ASSETS AGAINST INSIDER THREATS & EXTERNAL ATTACKS

In this context, Cybersecurity is a key component in the definition of a risk management

strategy and an enabling factor in the Digital Transformation process. Going beyond

IT security programs, there is, in fact, a structured set of technologies, skills and

processes designed to prevent, detect and react effectively against attacks on people,

data, applications and infrastructure.

Cyber attacks are inevitable and, when they occur, those in charge of Cybersecurity -

from security professionals to chief information security officers (CISOs) - must be ready.

What is needed is a strategy capable of ensuring that key corporate data and assets are

secure: a strategy that helps organisations understand and decide where and how to

invest. Teams must be prepared - as is the case with fire control plans - to act quickly and

efficiently. Who should be contacted? Which part of the company should be isolated? How

should the attack be communicated to customers, employees and partners?

A solid Cybersecurity strategy therefore becomes an integral part of an organisation,

extending from prevention and detection to reduce the occurrence of cyber attacks, to

mitigation to react to an attack when it occurs.

Page 11: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

CYBERSECURITY

WHAT DOES CYBERSECURITY MEAN FOR YOUR ORGANIZATION?

2

Page 12: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

Cybersecurity protects and enables your organization

as it embraces Digital Transformation

10

CYBERSECURITY

In order to protect and, at the same time, to enable an organisation’s digital business

within an ecosystem made up of customers, partners and employees, a company must

implement a holistic approach to Cybersecurity, the strategy of which is defined by three

key dimensions: people, processes and technologies.

It is believed that 90% of cyber attacks take advantage of people to gain access to key

corporate assets. An effective Cybersecurity strategy must therefore be an integral part of

the organisation and should consist of: prevention, interception and mitigation of the attack.

The prevention of a cyber attack starts from a 360° analysis of the company’s digital and

physical world. This inventory must take into consideration the risks related to:

■ material goods, which include not only

the devices or the networks, but also

smart buildings, logistics and smart

factories

■ intangible assets (often more at risk

than material ones), which include

trade secrets, marketing plans, pricing

strategies, roll-out deadlines, etc.

Page 13: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

Cybersecurity protects and enables your organization

as it embraces Digital Transformation

11

CYBERSECURITY OUR CYBERSECURITY CHECK LIST

■ Cybersecurity is not only about technology, it is a fully-fledged strategy

■ Only you have the knowledge of how your business operates – do not let anyone else define what is important to protect

■ People are at the centre of Cybersecurity – make them part of your Cybersecurity strategy

■ Widen your thought process – do a 360° analysis of your important assets and keep it up to date

■ Assets relate to anything that is critical – buildings, vehicles, computers, networks, but as importantly trade secrets, marketing plans, pricing strategies

■ Check out the cascading effects of asset failure – how fast will a disruption spread? Where will it stop?

■ Invest in security awareness – train your workforce, work with your clients and partners

■ Prepare for cyber-attacks – expert support, communication plans, assets isolation, redundant processes

■ Govern the identities of the users of your systems - identity information is everywhere. Stay ahead of changing regulatory mandates, put dynamic controls in place

■ Share and check the European and world-wide trends – understand how well you are performing, set annual targets for improved Cybersecurity

■ Approach Cybersecurity as a digital transformation enabler, make it part of your business growth strategy

■ Set yourself a target on detection delay, analyse how you improve on this detection, keep up with the trends to see how well you are performing

■ Select your solutions and service providers with a clear set of criteria to ensure continuous coherence in the means deployed

An inventory of such assets is, however, only

the first step of a verification process that must

never stop. Continuously evolving connectivity

in fact creates an intrinsically dynamic level

of vulnerability, which in turn imposes a

dynamic identification and classification of the

organisation’s assets, in order to set priorities on

what should be protected.

In an effective prevention strategy, the most

important barrier to attacks therefore consists

in continuous staff training. It is the company’s

responsibility to promote a cyber-aware culture

that allows all employees (even those who are not

ICT experts) to feel that they are an integral part

of the corporate Cybersecurity processes.

The interception of a cyber attack is based on

the prompt interpretation of a series of data and

information, the importance of which must be

immediately recognised. It is therefore imperative

that teams have access to a variety of cyber-

threat intelligence sources and are able to provide

data that can be managed in terms of relevance,

quality and timeliness. An even more important

factor therefore consists of access to information

contextualised to the specific company and its

activities, together with the latter’s ability to take

the appropriate actions on these bases.

Cyber attacks are mitigated based on two key

criteria: efficiency and speed. Teams must be

prepared to react, knowing who to contact and

which part of the company must be isolated.

They must also be familiar with the protocol for

communicating the attack to customers, partners

and employees.

Page 14: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

CYBERSECURITY

OUR APPROACH & SOLUTIONS

3

Page 15: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

For a cruise line, security is a priority. We need to ensure the safety of

our guests and of our crew members. Cybersecurity for us goes well

beyond traditional IT security but also covers Operation Technology,

particularly all systems relating to navigation from the Bridge to the

Engine room. We rely on a specialized partner that is not only able to

cover all aspects of security but also appreciates the importance of

this as much as we do.

Franco Caraffi IT Director - Carnival Maritime Information Technology - Costa Group

Page 16: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

Cybersecurity protects and enables your organization

as it embraces Digital Transformation

14

CYBERSECURITY

From a business point of view, our

approach to Cybersecurity is based on

three main pillars:

1. Governance of digital identities, with

a focus on anticipating compliance

and adequately verifying access to

key applications and data, aligning

the organisation’s audits, Lines of

Business (LOBs) and IT prospects

2. Blocking cyber attacks, with a focus on

intercepting and stopping advanced,

persistent and internal threats, taking

advantage of security activities built

on Artificial Intelligence and benefiting

from an effective automation and

an orderly organisation of Incident

Response (IR) processes and legal

audits

3. Data protection - within the B2E, B2C

and B2B business ecosystems - of

work plans and of the most important

assets in a company’s hybrid Cloud,

with a focus on mitigating data

risk, protecting the corporate brand

and enabling the company’s digital

business.

These three pillars offer an adequate

understanding and mitigation of

cyber risk, with the application of

priority countermeasures, both in the

organisational as well as the technological

realms. Based on this approach,

companies are able to:

■ ensure the reliability of business

activities, as well as the confidentiality,

availability, integrity and security of

information resources, together with

consistent BC-DC programs

■ maintain continuous and verifiable

regulatory compliance

■ follow a more secure Digital

Transformation path and adopt Cloud-

based solutions, in order to achieve

company growth, strengthen the brand,

ensure competitiveness and guarantee

greater flexibility.

Page 17: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

Cybersecurity protects and enables your organization

as it embraces Digital Transformation

15

CYBERSECURITY

In most surveys, trust in Digital Identities occupies first place when talking about any

Digital Transformation initiative. Below we describe the business drivers of any "open"

company and some of the challenges that must be faced when it comes to Access

Identification and Management. Data and information

relating to identity is everywhere, attacks are constant, perimeter security

cannot provide an adequate level of protection and it is therefore essential to keep up

with changes in regulatory requirements.

Govern Digital Identities

Involving customers and partners

Customers and partners require an easy and safe user experience. Customers want

to use their own devices through a coherent experience on web and mobile platforms.

Being part of a company ecosystem, partners must be able to easily access the data

and information they need. But neither customers nor partners can be highly reliable

from a security point of view: centralised policy management practices must therefore be

implemented for all users.

Page 18: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

Cybersecurity protects and enables your organization

as it embraces Digital Transformation

16

CYBERSECURITY

Providing easy access to employees, partners and customers

Double authentication methods and multiple passwords are proving

to be increasingly unsatisfactory. New access models are being implemented: their

selection and secure adoption must be part of an overall strategy. This is also a

key element to ensure the quality of the user experience.

Ensuring Compliance

Managing consent and compliance with regulatory requirements related to Personally

Identifiable

Information (PII) and with data confidentiality (GDPR) brings

the dimensions of transparency and responsibility into play.

Quickly adopting apps on the Cloud

With the explosion of cloud-based applications, IT risks related to credentials

must be fully managed from the start of any implementation. This applies to all customer,

partner and employee access. For example, when employees leave the company, their

accounts must be terminated and disconnected from all applications, both locally and in

the Cloud. Orphan accounts represent a risk that must be controlled.

Protecting corporate information

The main risks are internal threats and external attacks. External attacks very often

focus on accounts, particularly ones with greater access. In the event that the account

is breached, companies may experience serious harm. Appropriate controls must

therefore be implemented, to protect what an administrator can do, even after they have

authenticated. Thorough checks are needed to limit the potential damage caused by

malicious administrators and users (negligent). Ongoing monitoring and documentation

could help identify the root causes of a suspected breach.

Page 19: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

Cybersecurity protects and enables your organization

as it embraces Digital Transformation

17

CYBERSECURITY

SPECIALIZED CONSULTING

BEST PRACTICES & STANDARDS

GRC TOOLS

TREATMENT PLAN EXECUTION

MONITORING

OUR APPROACH TO GDPR A COMPREHENSIVE READINESS PROGRAM TO ADDRESS GDPR AT ALL STAGES

ISO 27001 ISO 31000 ISO 29100

02 Data Discovery &

Classification, GRC lifecycle

03 Mitigation Plan and Risk

Treatment, Execute and Monitor

04 GRC Audit,

Risk Assess & Analysis, GDPR Legal,

IT Security Knowledge

01

OUR SECURITY PROGRAM IDENTITY Today, in the so-called “open” company, Digital Identities can be effectively managed only through a dedicated security program focused on identity and designed to:

■ Establish trust and ensure compliance, balance

the risk within and between companies,

applying and monitoring access permits with

two-factor authentication mechanisms (2FA)

and minimum privileges.

■ Anticipate and continuously monitor the latest

compliance requirements (GDPR, PSD2, NIS)

and the continuously changing government

policies on the matter.

■ Align auditors, Lines of Business and

IT prospects.

■ Use risk analytics and intelligence to represent

the user’s complex data and provide information

on risky users and internal threats.

■ Distribute requests and access certifications

that are easy to launch.

■ Leverage a company approach focused on

activities, to help managers understand and

certify access requests, by evaluating the nature

and impact on the business.

■ Enable risk and compliance managers to

obtain easy reports and audit tests, to manage

role mining, to clean up accounts, to perform

Segregation-of-Duties (SoD) checks and to

identify SoD scenarios and related breaches

quickly.

Page 20: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

Cybersecurity protects and enables your organization

as it embraces Digital Transformation

18

CYBERSECURITY

Blocking cyber attacks

A “fluid” security perimeter, in continuous evolution, requires a holistic approach to the

operations needed to ensure an adequate control of the cyber risk and of the secure

enabling of the digital business.

This is precisely where the Intelligence-Driven Security Operation Centre (ISOC) comes

into play. The Centre offers a centralised system powered by Artificial Intelligence to

detect cybersecurity-related incidents and to facilitate the necessary reaction and

recovery actions.

Traditional SOCs protect organisations from the emergence of cyber threats (advanced

malware, compromised e-mails, targeted attacks) by primarily relying on preventive

technologies.

Page 21: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

Cybersecurity protects and enables your organization

as it embraces Digital Transformation

19

CYBERSECURITY

ISOCs, on the other hand, rely on:

■ machine and deep learning, behavioural analysis of users and organisations,

enriched with threat-related intelligence, to verify suspicious and dangerous behaviour

based on an adaptive, conscious and holistic approach

■ new generation networks, servers, endpoints and Cloud security tools, in which AI

and advanced analytics are incorporated in all phases

■ Security Information and Event Management (SIEM) technology, which facilitates the

automatic identification of breaches through intelligence and the correlation of events

■ feeds sourced from the Network Operation Centre Alerting System, so that the

Network Operations Centre (NOC) can provide an early warning of potential

processes and the assets which, as a result of malicious activities, are consuming

standard resources (such as power, memory, bandwidth)

■ an architecture designed to automate security activities relating to multiple products

and to assign tasks to analysts with ease: the collaborative and interactive interface

of the Incident Response Automation & Orchestration platform (IR A&O) enables

security teams to investigate and trace events throughout the entire life cycle of the

incident, creating a single hub that guarantees consistent and compliant response

processes.

The adoption of this level of automation and architecture offers ISOC analysts the

following benefits:

■ context enrichment and the correlation/fusion of intelligence

■ evidence collection

■ notifications, escalation and reaction through automatic processes (digital cyber

playbook)

■ raw data processing with analytical algorithms and the presentation of the results

■ the elimination of manual work and the automation of repeatable processes

■ time savings and a reduction in the number of errors through deeper and more

comprehensive checks.

Page 22: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

Cybersecurity protects and enables your organization

as it embraces Digital Transformation

20

CYBERSECURITY

Finally, Cyber Threat Intelligence (CTI) platforms, used together with advanced analytics

tools, SIEM and Incident Response platforms represent the “secret ingredient” of an

intelligent SOC, capable of supporting analysts in:

■ monitoring the underlying data

■ resolving outages

■ prioritising problems

■ sorting alerts

■ analysing attacks

■ performing effective forensic analyses.

All this makes it possible to reduce timeframes and ensure more efficient security

operations.

Page 23: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

CYBERSECURITY

BLOCK CYBER ATTACKS – SOME USE CASES

The main goal of any cyber security strategy is to avoid cyber-attacks to actually

succeed. Let’s consider the following use cases.

ADVANCED THREAT DETECTION How can organizations address these concerns:

■ Identify threats in real time and escalate to identify the most critical ones.

■ Detect long and slow attacks. ■ Avoid alert fatigue and minimize the chance

of missing alerts in the noise of event data. ■ Identify threat actors, malware, campaigns

and the attack vectors exploited in the face of skills and knowledge gaps and ever growing threat variety. INSIDER THREATS

How can organizations address these concerns:

■ Have credentials been stolen via phishing or malware account takeover?

■ Are credentials being misused? ■ Are there double earners and career jumpers

stealing customer data and/or intellectual property?

■ Are users performing activities that are putting themselves and the organization at increased risk?

INCIDENT RESPONSE How can organizations address these concerns:

■ Understand step by step what happened in a security incident and breach.

■ Respond quickly and effectively to a security incident.

■ Maintain compliance with security incidents reporting and regulatory requirements.

■ Understand what threats the organization is experiencing and the effectiveness and cost of response and management constantly ready to respond to a breach or the next major zero-day attack.

Page 24: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

Cybersecurity protects and enables your organization

as it embraces Digital Transformation

22

CYBERSECURITY

Aggregate Correlate

PROTECTION

Cyber Security Testers

GRC Audit AUDIT IT Operation –

Managed Services

Collect

Store

GA

TH

ER

SIEM SOAR

SOC

ENRICH & ANALYZE

IRT

Security Bulletin

CSIRT

L3 RESPOND

ALERT

SC

AN

THREAT INTELLIGENCE Feeds

L1 L2 DETECT Analytics Behavioural

Anomaly det.

Page 25: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

Cybersecurity protects and enables your organization

as it embraces Digital Transformation

23

CYBERSECURITY

Data protection

MONITOR ACCESS

• Monitor and alert on attacks in real-time

• Identify suspicious activity

• Produce detailed compliance reports

HARDEN REPOSITORIES

• Encrypt and mask sensitive data

• Archive / purge dormant data

• Revoke dormant entitlements

DISCOVER INSIGHTS

• Optimize data retention over extended time periods, meet compliance mandates

• Enrich data, apply big data analytics to get insights on suspicious access patterns

ENFORCE POLICIES

• Take action in real-time

• Prevent unauthorized access to sensitive data

• Enforce change control

SAFEGUARD SENSITIVE DATA, PROTECT YOUR BRAND AND CRITICAL ASSETS

IDENTIFY RISK

• Discover and classify sensitive data

• Assess, map and prioritize vulnerabilities for structured and unstructured data, database, big data, file shares

• Visualize data-related business risk

We provide smarter data protection thanks to a multi-level, technological framework which

makes it possible to:

■ obtain information and, thanks to analytics, understand the associated risks, ensuring

that the continuously evolving threats are addressed proactively and in real time

■ manage repositories and automatically apply policies to protect data and reduce risks,

using as few resources as possible

■ improve the organisation’s approach to innovation while ensuring security.

When these key areas work together, organisations are able not only to protect their data,

but also to accelerate their business and technological processes.

For a company that manages a digital business, data is one of its most important

resources. Data is of such fundamental importance that when deciding to develop a

security program to protect an organisation’s most relevant assets, this is precisely

where we recommend starting from. Today, however, data security is constantly put to

the test by the fact that more and more information is changed, shared and stored with

processes which, if poorly managed, can lead to vulnerabilities. Moreover, the latest

regulations on privacy are creating ever more stringent requirements on how to manage

data, especially if related to individuals.

Page 26: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

CYBERSECURITY

OUR REFERENCE CYBERSECURITY ARCHITECTURE

4

Page 27: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

Cybersecurity protects and enables your organization

as it embraces Digital Transformation

25

CYBERSECURITY

Security Governance, Risk & Compliance

Security Assessment

En

d P

oin

t

Pro

tect

ion

& M

ob

ile

AP

I Man

agem

ent

Clo

ud

Sec

uri

ty

Net

wo

rk &

In

fras

tru

ctu

re

Ach

itec

ture

Dat

a A

rch

itec

ture

SaaS

PaaS

IaaS

Application

Data

Virtual Infrastructure

Server

Storage

Network

Identity & Access Administration and Governance

Data Protection

Security Analytics & Threat Intelligence

Network & Virtual Infrastructure

The challenges of transformation towards digital enterprise requires a new approach to

Cybersecurity: multidimensional, across different sectors and capable of fielding skills

and expertise based on technologies that combine proven threat detection techniques

(both known and unknown) offering advanced security features. In other words, each

and every approach to Cybersecurity must integrate with the knowledge and processes

already in place in the company, to ensure protection that is fully aligned with other

activities.

This is precisely why we developed a complete technology and a logical structure that

offer solutions as part of an integrated and transversal framework. For our customers, we

design, develop and implement integrated, multi-level Cybersecurity solutions, supporting

the secure supply of new digital services, while at the same time protecting access to

applications and data within the mobile, IoT and Cloud-connected enterprise. Based on

this approach, we are able to help our customers:

■ improve the visibility, control and ability to block the growing array and complexity of

cyber threats, for an adaptive and contextualised security solution

■ understand the flow of information and improve the ability to prevent, detect and react

to cyber threats

■ safeguard the organisation’s data in order to support the Digital Transformation

process.

Page 28: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

CYBERSECURITY

HOW WILL CYBERSECURITY EVOLVE?

5

Page 29: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

Cybersecurity protects and enables your organization

as it embraces Digital Transformation

27

CYBERSECURITY

The first trend directly concerns the information we rely on to take action. Today,

intelligence on cyber threats is widely available, although not always usable. Usability is

above all impeded by the acquisition of information from other continents; this causes a

very risky delay in detecting threats that are spreading ever closer to us.

Locating information related to cyber threats is therefore a priority, even if the enormous

quantity of intelligence data adds a fair bit of complexity to the process. It is necessary to

initiate a personalised and smart contextualisation of cyber-threat intelligence, based on

greater automation, on AI functionality and on a detailed learning of organisation-specific

processes and operations. The combination of digital tools with human intelligence is at

the very core of future efficiency in this regard.

Our way of dealing with Cybersecurity is affected by five main trends. For each

of them, Europe is taking important steps towards a concerted strategy aimed at

increasing the resilience to cyber-attacks, based on the coordination of response

and prevention processes.

1

The second trend concerns the fact that we live in a world in which sensors and actuators

are and will become more and more widespread, with technology and data moving along

our diverse networks.

The increase in intelligence and the connection of our physical world through the IoT,

combined with the arrival and diffusion of the 5G network, creates ever more fluid defence

perimeters, introducing a new wave of cyber threats. This will require a continuous

evolution of authentication and data validation methods, greater attention to the protection

of the IoT, in addition to a use of real time cryptographic transfers.

2

Page 30: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

Cybersecurity protects and enables your organization

as it embraces Digital Transformation28

The third trend is represented by a focus on an increased level of centralisation through

platforms where services offered to users converge with new models characterised by

more immersive interaction.

Thanks to voice commands, facial recognition, biometric authentication and augmented

reality, users increasingly expect greater fluidity and ease of access to platforms, where a

range of business services and immersive interaction models converge. This will result in

faster authentication modes, without passwords, but completely secure.

3

The fourth trend relates to the increased awareness on the part of companies that their

exposure to Cybersecurity extends to both tangible and intangible assets and that the

economic impact linked to cyber threats must be quantified, like any other risk.

In Europe (as has been the case in the USA for some time now) IT insurance companies

are becoming promoters and, in some cases, Cybersecurity product and service brokers,

whose management and implementation is bound to change.

4

5 The fifth and last - but no less important - trend concerns our economies, which are

increasingly dependent on the cyber space. This has led to a greater awareness of the

need to fully understand and trust the range of digital devices and processes on which

everyday business operations are now based.

Companies must reassure customers, users and citizens that their data is processed

with full transparency and responsibility. The arrival and diffusion of the 5G network, the

installation of smart meters in homes, the growing use of online voting systems, self-

driving vehicles and public transport are just a few of the many examples illustrating just

how Cybersecurity and privacy protection represent a challenge that must be tackled.

Across all five trends, Europe has taken and continues to take concrete steps towards a concerted

strategy aimed at increasing the resilience to cyber attacks, focusing on developing response and

prevention processes characterised by enhanced capacity and coordination.

Page 31: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

CYBERSECURITY

ENGINEERING, AN ACTIVE PLAYER IN THE EUROPEAN CYBERSECURITY STRATEGY

6

Page 32: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

Cybersecurity protects and enables your organization

as it embraces Digital Transformation

CYBERSECURITY

30

Over the last few years, Engineering

has focused its research activities in the

Cybersecurity sphere in three key areas:

new approaches to training employees

and operators in the public space to be

able to discover malicious cyber attacks;

new risk assessment approaches;

definition of investment priorities based on

the economic impact of cyber threats and

their ever-increasing contextualisation.

The Engineering Group also collaborates

with ENISA, the European Union

Agency for Cybersecurity. A key initiative

has been the cooperation of ENISA

members on Cybersecurity Certificates

issued at European level, which will be

valid throughout Europe for a range of

products, processes and services.

Engineering has been an active player in European Cybersecurity since 2007. Within

the European Organisation for Security (EOS) we have actively promoted a coordinated

approach to Cybersecurity, with the adoption of a concerted strategy. Together with

leading security players in Europe, our commitment to promoting an action plan at

European level reached an important milestone with the private public Cybersecurity

partnership between the European Commission and industrial players through the

ECSO (the European Cyber Security Organisation).

Page 33: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

Cybersecurity protects and enables your organization

as it embraces Digital Transformation

CYBERSECURITY

31

Engineering is one of the main players in the field of Digital Transformation of

public and private companies and organizations, offering an innovative range of

platforms for the main market segments.

ENGINEERING

With around 11,000 professionals in 65 locations (in Italy, Belgium, Germany, Norway,

Republic of Serbia, Spain, Sweden, Switzerland, Argentina, Brazil and the USA), the

Engineering Group designs, develops and manages innovative solutions for the business

areas where digitalization is having the biggest impact, including Digital Finance, Smart

Government & E-Health, Augmented City, Digital Industry, Smart Energy & Utilities, Digital

Telco & Multimedia.

Through its activities, the Group contributes to modernizing the world in which we live and

work, combining specialist competences in next-generation technologies, technological

infrastructures organized in a single hybrid multicloud and the capability to interpret new

business models.

With significant investments in R&D, Engineering plays a leading role in research, by

coordinating national and international projects thanks to its team of 420 researchers and

data scientists and a network of academic partners and universities throughout Europe.

One of the group’s key strategic assets is its employees’ know-how, to whose training it

has dedicated a multidisciplinary School which has provided more than 21,000 days of

training during the last year.

www.eng.it/en

Page 34: CYBERSECURITY00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · Mobile Services & Cyber Security. He worked in The Netherlands, UK & Italy following the development

CYBERSECURITY

www.eng.it