Securing Your Digital Transformation

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

Life Science Services and Solutions
Security Controls – What Works
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Lessons Learned in Smart Grid Cyber Security
© Copyright 2011 Hewlett-Packard Development Company, L.P. 1 Sundara Nagarajan (“SN”) CLOUD SYSTEMS AUTOMATION.
Dell Connected Security Solutions Simplify & unify.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Private Cloud: Manage Data Center Services Business Priorities Presentation.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Network security Product Group 2 McAfee Network Security Platform.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Why SIEM – Why Security Intelligence??
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Cyber Security for the real world Tim Brown Dell Fellow and CTO Dell Security Solutions.
DATS Portfolio. PARTNERS & Solutions END TO END DATA CENTER SOLUTIONS Building a robust, resilient IT infrastructure. Lenovo System x combines unbeatable.
1© Copyright 2012 EMC Corporation. All rights reserved. Authentication Manager Integration Services (AMIS) RSA Global Services Customer Presentation SP.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Azure Stack Foundation
Your Partner for Superior Cybersecurity
Cybersecurity - What’s Next? June 2017
CIM Modeling for E&U - (Short Version)
Driving Digital Business with SAP Digital Business Services
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
San Francisco IIA Fall Seminar
San Francisco IIA Fall Seminar
Enterprise Productivity Services
Transforming IT Management
I have many checklists: how do I get started with cyber security?
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Consulting Services for IoT
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Securing the Threats of Tomorrow, Today.
Panda Adaptive Defense Platform and Services
Overview UA has formed is forming a Security Operations Center (SOC) with Students supporting Tier 1 Activities. The SOC provides benefits to the University.
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Strategic threat assessment
MAZARS’ CONSULTING PRACTICE
The MobileIron® Threat Detection difference:
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Managing IT Risk in a digital Transformation AGE
GRC - A Strategic Approach
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Microsoft Data Insights Summit
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
IT Management Services Infrastructure Services
Presentation transcript:

Securing Your Digital Transformation Chris Moyer, CTO, Security

Thrive on change CSC and HPE Enterprise Services brought innovation to clients for 60+ years Together, we serve nearly 6,000 private and public sector enterprises across 70 countries Our clients benefit from our technology independence, global talent, expertise and extensive partner network We are uniquely positioned to lead digital transformations, creating greater value for our people, clients and partners DXC Technology is the world’s leading independent, end-to-end IT services company. We guide clients on their digital transformation journeys, multiply their capabilities, and help them harness the power of innovation to thrive on change. 

Value of an integrated Security Actionable Intelligence More effectively detect and prevent threats with actionable intelligence Security Incident Response Quickly resolves adverse security events using a full suite of incident response, management, and remediation services Benefits Leverage our extensive IT and security knowledge of clients’ environments Gain comprehensive security visibility across the enterprise Quickly identify and respond to incidents, especially those on managed devices Enhance alert context with integration of multiple existing threat sources Reduce organizational impact with rapid restoration time Minimize incident damage with automated policy management and configuration Control access during and after incidents Security Monitoring Detects and responds to incidents and manages global risk with 24/7 security monitoring Security Management Optimizes operational efficiency and enhances reporting with 24/7,365 management of vital security controls Identity Management Comprehensively manages user access, identity governance and administration, and privileged access accounts Security Analytics Proactively hunts for and prevents unknown threats using analytical and big data tools

Security Operations is differentiated by 3 main areas of capability Guided, analytics powered prioritization, investigation, entity profiling and workflow with automated orchestration and response Intuitive Investigation w/automated response Visibility Without Boundaries Massive scale log ingestion supporting both short term alerting and long term investigation Seamless Real-time and Advanced Analytics powered monitoring and alerting built for security scale Comprehensive Detection

CRA Framework – Structured Approach for Advisors Define a security strategic direction aligned with business objectives; outline a plan to achieve that direction; and ensure proper execution of that plan, including decision making based on risk management Processes to define, evaluate, mitigate, accept, or transfer risk and ensure compliance with regulatory and industry requirements while meeting business objectives Strategy, Leadership & Governance (SLG) Translation of business strategies into effective security solutions through principles, models, capabilities and patterns Capabilities necessary to create a security-conscious culture and manage internal security knowledge Risk & Compliance Management (RCM) Security monitoring, incident management and breach response Security Resilient Architecture (SRA) Background on more of the specifics on CRA if needed Operational security processes, including management and measurement Resilient Workforce (RW) Management of identities and access controls to meet compliance, operational, and security requirements Data classification, data security modeling and protection to prevent loss, modification, or misuse Cyber Defense (CD) Security Orchestration (SO) Automated rule enforcement, threat detection, and prevention at infrastructure and endpoint Development and maintenance of software to meet security requirements Identity & Access Management (IAM) Infrastructure & Endpoint Security (IES) Data Protection & Privacy (DPP) Applications Security (AS) Integration of Information Technology (IT) and Operational Technology (OT) security Protect assets from environmental, accidental or deliberate physical threats Converged Security (CS) Physical Security (PS)

Solve security challenges with integrated set of services Cyber Maturity Review Privileged Account Security Diagnostic Advanced Compromise Assessment Cyber Attack Simulation Ransomware Diagnostic Security Risk Management Advisory Services PhishEd Advisory Services Account Security Governance Client Security Officer Technology Compliance Intelligent Security Operations Advisory Services Incident Response Advisory Services Security Monitoring Managed SIEM Log Management Deep/Dark Web Monitoring Cloud Security Advisory Services Cloud Security Monitoring On-Demand Workload Protection File Integrity Monitoring Managed Cloud Access Security Broker DXC Security combines our deep experience in Security Advisory with our legacy of partnering with clients to provide managed services to deliver a differentiated end-to-end security solution that fits their specific business needs and capabilities. The DXC Security portfolio is led by a Security Advisory capability supported by thousands of advisors with regional and industry experience. These Security Advisors provide diagnostic services to quickly assess your security capabilities, uncover gaps and recommend improvements based on your position. This guidance leads to the development of a Security Improvement Plan where the DXC Security portfolio of integrated services can be utilized to deliver these improvements. The DXC Security portfolio will provide you with the ability to simplify your security management and ongoing evolution. These integrated services bring the industry’s best security solutions into a foundational security platform that is managed by DXC’s security professionals either in partnership with your security personnel or entirely by DXC. Threat and Vulnerability Management Advisory Services Security Testing Certification Laboratories Vulnerability Intelligence Vulnerability Scanning Comprehensive Applications Threat Analysis Applications Security (within Applications Offering Family) Data Protection and Privacy Advisory Services Data Loss Prevention Managed PKI Infrastructure and Endpoint Security Advisory Services Managed Endpoint Threat Detection & Response Managed Endpoint Protection Managed Advanced Threat Protection Managed Firewall Managed Network IDS/IPS Managed Proxy Firewall Ruleset Assurance Distributed Denial of Service (DDoS) Protection Identity and Access Management Advisory Services Identity Management as-a-Service Privileged Account Management ConfidentID - Biometric Authentication Security Access Multifactor Authentication Authentication Broker

Thank you