Selling Security to the Business Peter Frøkjær ADP Global Security Organization In:dk.linkedin.com/in/froekjaer/  :+45 6155.

Slides:



Advertisements
Similar presentations
Electric Vehicles Industrial Cluster - NPO IKEM Corp. (Business entity of EVIC) Changing the Government Agenda of EU's poorest countries using the power.
Advertisements

OneBridge Mobile Data Suite Product Positioning. Target Plays IT-driven enterprise mobility initiatives Extensive support for integration into existing.
Enabling business beyond the corporate network.
EMERGING TOPICS IN DATA, APPLICATION AND INFRASTRUCTURE PROTECTION Taher Elgamal ITU
Stonesoft Roadmap WHAT FEATURES WILL COME IN
Malware\Host Analysis for Level 1 Analysts “Decrease exposure time from detection to eradication” Garrett Schubert – EMC Corporation Critical Incident.
Privileged Identity Management Enterprise Password Vault
Solutions & Services to ‘Multiply your Business Performance’ 2013.
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
Handle with care : Digital marketing and online behavioural advertising Global guidance to help improve consumer trust in practice, techniques and messages.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
SANS Technology Institute - Candidate for Master of Science Degree Implementing and Automating Critical Control 19: Secure Network Engineering for Next.
1 Challenges For A Credit Bureau In Emerging Markets.
Practical Steps to Secure your APIs for Mobile Mark O’Neill VP Innovation, Axway.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
360PI Consultants: Marta Maria Godoy Luis Fernando Barillas Jose Andres Mendez Edgar Escriba.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
IBM Software Group - IBM Systems Group © 2006 IBM Corporation IBM Software Group | IBM Systems Grouppage 1 Team Collaboration Software Selling Strategy.
Cloud Security Julian Lovelock VP, Product Marketing, HID Global.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
Duke Medicine IT Strategy Jeffrey Ferranti, MD Chief Information Officer / VP Medical Informatics Duke Medicine April 17, 2015.
Dell Connected Security Solutions Simplify & unify.
Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
1 The World Bank Internet Services Program Rajan Bhardvaj
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
Cloud Market Readiness Report Finance, Media, and Legal Sectors March 2014 Trend Consulting 2013.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE September Integrating Policy with Applications.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Risk Management for Small & Medium Sized Enterprises
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Craig Pringle & Derek Moir
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Cyber Security for the real world Tim Brown Dell Fellow and CTO Dell Security Solutions.
Cisco Systems Amy Kwan Annual Revenue: US $40 Billion Worldwide Presence: Culture: Innovation, Quality, Teamwork Changing the way we work, play and learn.
Total Enterprise Mobility Comprehensive Management and Security
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
SDN & NFV Driving Additional Value into Managed Services.
OIT Security Operations
Joseph Salameh – Consultant
What is the McAfee Compatible Solutions Center?
WORLD OF CLOUD COMPUTING AFTER GDPR challenges, opportunities and the unknown Matjaž Drev, MA. National Supervisor for Personal Data Protection, Information.
Responsibilities & Tasks Week 2
2018 Real Cisco Dumps IT-Dumps
The Only Digital Asset Management System on Microsoft Azure, MediaValet Is Uniquely Equipped to Meet Any Company’s Needs MICROSOFT AZURE ISV PROFILE: MEDIAVALET.
Identity & Access Management
Securing the Threats of Tomorrow, Today.
Contact Center Security Strategies
Cyber Risk & Cyber Insurance - Overview
OECD good practices for setting up an RIA system Regional Capacity-Building Seminar on Regulatory Impact Assessment Istanbul, Turkey 20 November 2007.
GRC - A Strategic Approach
Presentation transcript:

Selling Security to the Business Peter Frøkjær ADP Global Security Organization In:dk.linkedin.com/in/froekjaer/  : / How Security communicate with the Business How to add value to the business How to build a Global Security Organization How Security communicate with the Business How to add value to the business How to build a Global Security Organization

2 What is ADP?  Payroll Services, Human Resource Management & Benefits Administration  Dealer Management System & Digital Marketing Solutions

3 Security as a Business Enabler  The way Security interact with the business has changed.  Today, however the time where the default answer from Security was “No” has changed. We are now primarily Influencing and motivating the Business as a key Player.  We are now supporting Business Decisions, providing Security Services, ensuring Compliance and adding Business Value by Political Influence. To be a Successful Influencer, we need to understand the Business Strategy. We are responsible to design our communication to fit the recipients!

4 How should Security navigate in a global Enterprise? –Build a Global Security Organization (and Business Security Org.) : –Integrate into the Business. –Integrate into IT, and other critical processes.

5 Communicate with the business  The Language Of The Boardroom: RI$K!!  Security MUST learn the language of the Business. geert-hofstede.com/countries.html Expect the unexpected You don’t know what you don’t know. Jungian theory on personality types Understand and Adapt to Personalities and Personality Types. Understand and Adapt to Cultural differences.

6 Communicating with the Business BU Requests and Consumes Consulting & Services GSO Provides Consulting & Services GSO Drives Projects, Program & Policies

7 An example of: Influence by motivation EU Data Protection proposals - Administrative sanctions  Fines of up to 250,000 EUR or 0.5% of annual worldwide turnover (mechanisms for requests or non- response)  Fines of up to 500,000 EUR or 1% of annual worldwide turnover (incomplete information, not transparent, right to be forgotten, form/format)  Fines of up to 1,000,000 EUR or 2 % of annual turnover (no legal basis, no representative, security provisions, breach reporting)

8 Add value to the Business: Monitor Security events and detect Fraud RSA and other Anti- Fraud Command Centers Protect and ensure: Integrity of the Brand Client Assets Personal Info Compliance DLP Event Enrichment Location Identity Division Business Data Value Asset Value Geo Info Regulation CIRC NCC SCC ThreatsIncidentsAssets GRC Aggregation Enterprise Reporting

9 Add value to the Business: Securely implement Business Enabling technologies F5 Internet Firewall PDAN Firewall DB Firewall PDAN Firewall App Web PDAN SSL Offload Adoptive Authentication Web Application Firewall Load Balancing Mobile access Web Services New Innovation Event Enrichment Location Identity Division Business Data Value Asset Value Geo Info Regulation CIRC NCC SCC Threats Incidents Assets GRC Aggregation Enterprise Reporting

10 Thank You – Q&A AV Auth WAF DLP AD WLAN DPI URL FW IDS Event Enrichment Location Identity Division Business Data Value Asset Value Geo Info Regulation CIRC NCC SCC ThreatsIncidentsAssets GRC Security Events Eng. HR Legal Sales VPN MDM uVM SB AI Aggregation Enterprise Reporting