SlideShare a Scribd company logo
1 of 52
Download to read offline
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
Security Risk Management:
How to mitigate risks and protect data
Security Managed Services
Security BU Director & Sales Director North
Italy
11/11/2015
Denis Cassinerio
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
2. Hitachi Systems CBT
4. Managed Security Services
Agenda
1
1. Hitachi Ltd. & Hitachi ITSG
3. Risk Management Scenario
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
1. Hitachi Ltd. & Hitachi ITSG
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
Power Systems
4%
Social Infrastructure &
Industrial Systems
15%
Electronics Systems &
Equipment
11%
Construction
Machinery
7%
High Functional
Materials &
Components
14%
Automotive Systems
9%
Smart Life &
Ecofriendly Systems
7%
Others (Logistics &
Other services)
11%
Financial Services
3%
Information &
Telecommunication
Systems
19%
1. Hitachi Ltd.
(as of end of Mar. 2015)
81.60
billion
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
1.2 Hitachi Systems Global
Italy
2014-INDIA
Hitachi
Systems
Micro Clinic
2013–SOUTHEASTASIA
Hitachi
Sunway
Information
Systems
2015-ITALY
Hitachi
Systems
CBT
2014-CHINA
Hitachi
Systems
(Guangzhou)
2012–NORTHAMERICA
Cumulus
Systems
2015-CANADA
Above
Security
1. Establish a base of operation in Italy
2. Contribution to the social
infrastructure business of Hitachi
3. Expand into greater Europe
STRATEGY
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
2. Hitachi Systems CBT – Italy
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
2.1 Vision & Mission
“Cloud, Service,
Application &
Technology
Integrator
“Transfer the
complexity and
start focusing on
your business only
Over the last 35 years we have been supporting
medium and large enterprises, both in the
private and public sector, by implementing and
improving their infrastructure, integrating them
with services and application solutions with high
technological content.
Assist organizations in their strategic path
to Business Transformation through
outsourcing of infrastructure, services
and applications
VISION
MISSION”
”
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
2.2 Business Areas
Data Center, Networking, Devices, Middleware
TECHNOLOGY
APPLICATIONS
MANAGED SERVICES
(2014: Revenues 31,1M€)
(2014: Revenues 22,3M€)
(2014: Revenues 3,7M€)
BUSINESSAREAS
Engineering Projects & Services
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
2.3 Highlights
All our customers
will be free to focus
on their core
business only
SOFTWARE
FACTORY
BolognaHEADQUARTER
Roma
BRANCHES
Milano
Venezia
Torino
Novara
DATA CENTERS
Roma
Milano
+300
TEAM
6
LOCATIONS
OVER
1.200
CERTIFICATIONS
OVER
100
PARTNERS
LONG EXPERIENCE
>35
YEARS
100%
SECURITY &
COMPLIANCE
57MIO €
REVENUE
+7% FY 2013
2
DATA
CENTER
365
24/7
SERVICES
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
3. Risk Management Scenario
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
ATTACK SURFACE
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
Vulnerability & Threats
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
DATA BREACH SNAPSHOT
12
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
CLUSIT Report 2015
13
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
3.1 Compliance changes
14
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
NORMATIVE : Regolamento Europeo
15
• La Commissione europea ha proposto una riforma globale della
normativa UE sulla protezione dei dati delle persone fisiche.

• Il nuovo Regolamento ha lo scopo di fissare delle regole chiare e
uniformi
sulla privacy online e offline
• Una volta approvato dal Parlamento e dal Consiglio UE, varrà per
tutti i Paesi europei.
Principali novità del Regolamento
1. Obbligo di «Data Protection Impact Analysis» in caso di trattamenti
rischiosi
2. Obbligo di «Privacy by Design and Default » nella progettazione e
nell’architettura di Infrastrutture ICT e nelle Pratiche Commerciali
3. Obbligo di «Data Breach Notification» entro 24 ore dall’evento al Garante
Privacy
4. Obbligo per le aziende con più di 250 dipendenti e per gli enti pubblici di
nominare un «Data Protection Officer »
5. Diritto all'oblio, per cui ogni interessato potrà richiedere la rimozione di
propri dati personali.


© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
SANZIONI Previste dal NUOVO Regolamento
Europeo
16
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
3.2 Risk Management Maturity
17
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
Crisis = Opportunity
18
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
The Opportunity : Skills Gap
19
DATA PROTECTION
DLGS. 196/2003 e s.m.i.
DLGS. 231/01 e s.m.i.
Legge 547/93 e s.m.i.
ISO/IEC 27001:2013
COBIT
ITIL
……
Virus
Worm
Trojan
Payloads
Man in te Middle
Brute Force
Authentication..
APT
SKILLS GAP
SECURITY RISK MANAGEMENT
Legal & Compliance Threats Vulnerabilities
CVE MS 2008-067
CVE 2014-62-71
ISO
NIST
OWASP
OSST
Vectors of Attack
Technical Impacts
Business Impacts
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
Information Security Risk Management Fundamentals
20
AVAILABILITY
INTEGRITY
CONFIDENTIALI
TY
© Hitachi Systems CBT S.p.A. 2015. All rights reserved. 21
VULNERABILI
TY
Processes
Systems
Network
Applications
Continuous check
Continuos
remediation
THREATS
New threats every 1.5
seconds
Variants
Exploit kits
Botnets
APT
Penalties
COUNTERMEASURES
Processes
Checks
AV
IPS
FW
APT
WAF
HIPS
APP CTRL…….
Consultancy
VALUATION
Data
Assets
ANALYSIS
Qualitative
Quantitative
Information Security Risk Management Fundamentals
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
Situational Awareness Security
22
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
4. Managed Security Services
23
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
Security Business Unit
24
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
EasyShield: Vision
VISION
EasyShield
Legal & Compliance
Architectural Design
Security Engineers
Security Analysts
Integrated Services
Manage the Security IT Complexity
Managed Security Services
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
COMPLIANCE
TECHNOLOGY
MANAGED SERVICES
CYBERSECURITY
EasyShield: Keywords and Benefits
Keywords & Benefits
Reduction & Cost
Control
Security Posture
Improvement
Ad hoc Installation
& Configuration
Up to date
Certification
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
EasyShield: Security Risk Management
Identify &
Analiyze Exposures
Monitor
Results
Examine Risk
Management
Select Risk
ManagementImplement
Techniques
Identify assets and their value to the
organization.
Identify vulnerabilities and threats
Quantify the probability and business
impact of these potential threats.
Provide an economic balance
between the impact of the threat
and the cost of the
countermeasure”.
Shon Harris, CISSP
«Security Partner»
“
“
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
4. EasyShield Offering Structure
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
Security BU Offering
SKILLS
EXTENDED PORTFOLIO
SRM CYCLE
COST EFFECTIVE
Compliance
Professional
Services
Technology
Cyber Security
Managed Security
Services
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
CYBERSECURITYTECHNOLOGY
EasyShield® represents a 360°security approach, from Compliance to Cloud
services, through the best technology solutions via Managed Services
3.4 Offering: EasyShield®
• APT Assessment
• Multi Protocol Network Detection
• Spear Phishing Mitigation
• Anti Bot Net
• Sandboxing and behavioral monitor
• Forensic Analysis
• Intrusion Detection / Prevention
• Ethical Hacking
• Penetration Test
• Web Application Protection
• Zero Day Protection
• Security & Compliance Risk
Assessment
• Risk Management, Governance &
Certification
• Business Continuity & Disaster
Recovery
• Regulatory Compliance Management
• Business Process Reengineering
• Security Awareness Training
• Security & Compliance Audit
• Content security
• Datacenter & Cloud Security
• Network Security
• Security Management
• Vulnerability Management
Compliance Management
Penetration Test
Privileged Account Management
Web Application Protection
Vulnerability Assessment
Virtual Patching
Patch Management
Professional Services
Penetration Test
Vulnerabiility,Mobile
Web Application , Wireless
PCI DSS (/ Scan & compliance)
Managed Security Services
Anti Malware policy Management
Mobile Security
Firewall Configuration and policies
IPS / IDS Management
Wireless Assessm
COMPLIANCE
Compliance
Cyber
Security
Managed
Services
Technology
MANAGEDSERVICES
Professional
Services
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
4.2 Global SOC
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
Global SOC: Security Strategy
WAF: Web Application Firewall; NGFW: Next Generation Fire Wall ; SIEM: Security Incident and Event Management
Cyber Security
(Anti-Phishing, Anti-
Malware)
Proactive Defense
with Real-time
Analytics and Global
Intelligence Service
Global SOC
Protection of Critical
Infrastructure
(Social Infrastructure)
SHIELD
SecurityOperationCenter
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
ABOVE SECURITY Integration
33
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
ARKANGEL Platform
34
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
Conclusion
35
It is better to look ahead and
prepare than to look back and
regret.
Jackie Joyner Kersee, athlete and olympic medails
Thanks!!
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
Security BU Offering: Main Technologies
APT IOC DETECTION IAM / PAM
CONTENT SECURITY NETWORK SECURITY SECURITY MANAGEMENT
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
Contacts
HEADQUARTER
ROME
Via Francesco P. Da Cherso, 30 - 00143
+39 06 519931
www.hitachi-systems-cbt.com
marketing@hitachi-systems-cbt.com
info@hitachi-systems-cbt.com
infosecurity@hitachi-systems-cbt.com
webrainbow@hitachi-systems-cbt.com
easycloud@hitachi-systems-cbt.com
MAIN SITES
MILAN
Via Dei Gracchi, 7 – 20146
+39 02 489571
VENICE - QUARTO D’ALTINO
Via L. Mazzon, 9 – 30020
+39 0422 19702
TURIN
Via Gian Domenico Cassini, 39 - 10129
+39 011 5613567
NOVARA
Via Biandrate, 24 - 28100
+39 0321 670311
BOLOGNA - CASALECCHIO DI RENO
Via Ettore Cristoni, 84 - 40033
+39 051 8550501
TOLL FREE
800 228 228
800 899 228 (WebRainbow)
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
ICT Festival 2015 - Milano
11/11/2015
Denis Cassinerio
END
Security Business Unit & Sales Director
- DirectSecurity
38
Security Risk Management: How mitigate and handle the
data through the Managed Services
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
CYBERCRIME TRICHOTOMY
40
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
References: Case Studies Security
SHIELD: The Brand Name for Hitachi Systems Security Solution
HDI Assicurazioni - Log Management
Consorzio ATR – Adeguamento
Privacy
IntesaBCI – Processi di Gestione della
Sicurezza
IUAV - Privacy Risk Assessement RM ASL B - AV IPS IDS
Poste Italiane – Risk Management AgID – Security Audit Telecom – Politiche di Log Retention
G.Matica – Certificazione integrata
ISO 27001 - 9001
LND – Security & Privacy Risk
Assessement
RFI – Corso Privacy
FIP – Data Loss Prevent
Realizzazione e certificazione del Sistema di
Gestione Integrato Qualità e Sicurezza delle
Informazioni aziendali,
Installazione, configurazione e gestione
sistema di tracciatura dei log di accesso degli
Amministratori di Sistema a norma privacy
Progettazione ed erogazione di due moduli
didattici sui temi della sicurezza informaticae
della protezione dei dati;. Formazione dei
formatori.
Realizzazione di una attività Assessment di
sicurezza rispetto alla normativa sulla privacy
ed ai Provvedimenti del Garante.
Disegno dei processi di Gestione della
Sicurezza ISO 27001 e valutazione degli
impatti organizzativi sullaBanca.
Assessment di Sicurezza. Elaborazione
sistema documentale privacy.Integrazione dei
contratti. Erogazione dellaformazione.
Installazione e configurazione di una
piattaforma di protezione degli ambienti virtuali
da violazione dei dati einterruzioni dell’attività,
Verifica dello stato di conformità del modello
organizzativo, gestionale e tecnologico
adottato dall’Ateneorispetto alle misure di
sicurezza privacy.
Definizione del processo di Risk
Management ISO 31000 e della
metodologia di Risk Assessment secondo
ISO 27005.
Installazione e configurazione di un sistema di
protezione dei dati su PC e Mobile a sostegno
della conformità e prevenzione della perdita di
dati.
Definizione delle politiche di sicurezza per la
raccolta, la conservazione e l’utilizzo dei log a
norma ai fini del monitoraggio dell’utilizzo dei
sistemi informatici.
Audit di sicurezza ISO/IEC 27001,
Dlgs.196/2003 e Dlgs 231/2001 condotto sulla
RIPA (Rete Internazionale della Pubblica
Amministrazione).
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
1.3 Hitachi ITSG & HISYS Organization
Hitachi Data Systems Corporation
Hitachi Consulting Corporation
Hitachi Solutions Ltd.
“Products and System Development”
“System Solution & Services”
“Platforms (Storage Systems, Server, Platform
Software)”
Information &
Telecommunication Systems
Group (ITSG)
Research & Development Group
Healthcare Group
Power & Infrastructure Systems
Group
“IT Consulting”
Hitachi Systems Ltd.
Cumulus Systems
Hitachi Sunway Information Systems
Hitachi Systems Micro Clinic
Hitachi Systems (Guangzhou)
Hitachi Systems CBT
HITACHI Ltd.
“System Solutions and Services”
Above Security
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
1.2 History of Hitachi ITSG
Establishment
of Totsuka
factory
(produced
telephones &
switchboards
)
1937
194
9
Automated
switchboard
1959
Electric
computer
1959 Train seat
reservation
system
1965
Mainframe
1969
Online
Banking
System
198
0
Beijing
meteorological central
system for Chinese
Central
Meteorological
Agency
198
1
Digital
switch
board
198
2
Super
computer
198
5
Work Station
1993
Integrated
system
management
middleware
199
4
Outsourcing
solution
199
5
RAID
disk
Array
1997
EDI system
2003
Finger vein
authentication
system
200
4
Blade
Server
200
7
Hitachi
virtualization
technology
“Virtage”
2009
Hitachi
cloud
solution/
Environment
-conscious
data center
2012
Big data related
services
2013
Smart
information
related products
and services
“intelligent
Operations”
2014
IoT
(Internet of
Things),
M2M
(Machine to
Machine)
TODAY1910
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
Security Risk Management
45
ERRORS/ OMISSIONS
USERS NOT
AUTHORIZED
VANDALISM
TAMPERING PHYSICAL
CHANGE OR COPY OF DATA
UNAUTHORIZED
SOFTWARE
EXECUTION
NATURAL
EVENTS
INTRODUCTION OF
ILLEGAL SW
THEFTS
ORGANIZATION
ARIAL
BUSINESS -
OPERATIONS
CONTINUITY
LOGICAL ACCESS
PHYSICAL ACCESS
DISTRIBUTED
ARCHITECTURE
DATA
DOCUMENTATIONS
APPLICATIONS
SYSTEMS
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
Misure Minime - Misure Idonee
46
Punto di ottimo
economico
Costo complessivo
Costo della sicurezza
Livello di sicurezza
Costo
Costo di
Esposizione
COST
TOTAL COST
Security cost
Cost exposure
Security Level
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
KEYSTRENGTHS
Strategic transformation of business and organizational processes with
high experience in Outsourcing and Cloud Computing
Manage the customer’s technological complexities, leaving them free to
focus exclusively on their core business
More than 1,200 hardware and software technology certifications to
design tailor-made solutions also in Private and Public Cloud
infrastructure, already available in our Data Centers
CUSTOMISED SOLUTIONS
TIME AND COST SAVINGS
COMPLEXITY TRANSFER
BUSINESS TRANSFORMATION
2.4 How do we do it
Speed of delivery and “Pay-per-use” logic of EasyCloud®, EasyWare®
and WebRainbow® and EasySHIELD ® Solutions to generate economic
efficiency switching from investments to fee
© Hitachi Systems CBT S.p.A. 2015. All rights reserved. 48
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
PROVVEDIMENTI – 28/10/2015
49
…TUTTO CIÒ PREMESSO IL GARANTE
1) dispone la caducazione dell'autorizzazione adottata dal Garante in
data 10 ottobre 2001 con deliberazione n. 36 e per l'effetto vieta, ai
sensi degli artt. 154, comma 1, lett. d) e 45 del Codice, ai soggetti
esportatori di trasferire, sulla base di tale delibera e dei
presupposti indicati nella medesima, i dati personali dal
territorio dello Stato verso gli Stati Uniti d'America;
2) si riserva, ai sensi dell'art. 154, comma 1, lettere da a) a d) del
Codice, di svolgere in qualsiasi momento i necessari controlli
sulla liceità e correttezza del trasferimento dei dati e, comunque, su
ogni operazione di trattamento ad essi inerente, nonché di
adottare, se necessario, i provvedimenti previsti dal Codice;
3) dispone la trasmissione del presente provvedimento all'Ufficio
pubblicazione leggi e decreti del Ministero della giustizia per la sua
pubblicazione nella Gazzetta Ufficiale della Repubblica Italiana.
Trasferimento dati personali verso gli USA: caducazione
provvedimento del Garante del 10.10.2001 di riconoscimento
dell'accordo sul c.d. "Safe Harbor" - 22 ottobre 2015
© Hitachi Systems CBT S.p.A. 2015. All rights reserved.
Corporate Data at Risk
50
Network Credentials
Intellectual Property
Calls
Privileged Communication
Employee Location
Superior service empowered by combining the strength
of our people and information technology.

More Related Content

What's hot

Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesJack Nichelson
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsOxfordCambridge
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governancenooralmousa
 
Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101Jerod Brennen
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security PolicyRobot Mode
 
Information Systems Policy
Information Systems PolicyInformation Systems Policy
Information Systems PolicyAli Sadhik Shaik
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security programWilliam Godwin
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practiceparves kamal
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 
Cybertopicsecurity_3
Cybertopicsecurity_3Cybertopicsecurity_3
Cybertopicsecurity_3Anne Starr
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015Capgemini
 
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgInformation Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgEric Vanderburg
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.IGN MANTRA
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a SciencePankaj Rane
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Network security policies
Network security policiesNetwork security policies
Network security policiesUsman Mukhtar
 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.IGN MANTRA
 

What's hot (20)

Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your Vulnerabilities
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
 
Information Security
Information SecurityInformation Security
Information Security
 
Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security Policy
 
Information Systems Policy
Information Systems PolicyInformation Systems Policy
Information Systems Policy
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practice
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Cybertopicsecurity_3
Cybertopicsecurity_3Cybertopicsecurity_3
Cybertopicsecurity_3
 
develop security policy
develop security policydevelop security policy
develop security policy
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgInformation Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a Science
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Network security policies
Network security policiesNetwork security policies
Network security policies
 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
 
CCA study group
CCA study groupCCA study group
CCA study group
 

Viewers also liked

Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)Jeremiah Grossman
 
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
2010: A Web Hacking Odyssey - Top Ten Hacks of the YearJeremiah Grossman
 
Grow Hack Athens Pt.1: Growth Hacking For Web Apps
Grow Hack Athens Pt.1: Growth Hacking For Web AppsGrow Hack Athens Pt.1: Growth Hacking For Web Apps
Grow Hack Athens Pt.1: Growth Hacking For Web AppsGrowthRocks
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the WebMike Crabb
 
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...Jane Alexander
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk managementG3 intelligence Ltd
 
Journey Management and Safely Driving Procedure
Journey Management and Safely Driving ProcedureJourney Management and Safely Driving Procedure
Journey Management and Safely Driving ProcedureKawa suur
 
Open Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon EditionOpen Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon EditionChris Gates
 
Hitachi Cloud and Solutions
 Hitachi Cloud and Solutions Hitachi Cloud and Solutions
Hitachi Cloud and SolutionsHitachi Vantara
 
Devfest istanbul'14 - Web Application Attacks and Trusting Frameworks
Devfest istanbul'14  - Web Application Attacks and Trusting FrameworksDevfest istanbul'14  - Web Application Attacks and Trusting Frameworks
Devfest istanbul'14 - Web Application Attacks and Trusting FrameworksMehmet Ince
 
Rapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementRapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementEnergySec
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementRand W. Hirt
 
Vi Minh Toại - Security Risk Management, tough path to success
Vi Minh Toại - Security Risk Management, tough path to successVi Minh Toại - Security Risk Management, tough path to success
Vi Minh Toại - Security Risk Management, tough path to successSecurity Bootcamp
 
Hitachi Data Systems Hadoop Solution
Hitachi Data Systems Hadoop SolutionHitachi Data Systems Hadoop Solution
Hitachi Data Systems Hadoop SolutionHitachi Vantara
 
Hitachi smart city
Hitachi  smart cityHitachi  smart city
Hitachi smart cityjbcinvest
 
European Trends in Travel Risk Management 2015
European Trends in Travel Risk Management 2015European Trends in Travel Risk Management 2015
European Trends in Travel Risk Management 2015FERMA
 
Introducing OWASP OWTF Workshop BruCon 2012
Introducing OWASP OWTF Workshop BruCon 2012Introducing OWASP OWTF Workshop BruCon 2012
Introducing OWASP OWTF Workshop BruCon 2012Abraham Aranguren
 
Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Jeremiah Grossman
 
CISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 3. Asset SecurityCISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 3. Asset SecuritySam Bowne
 

Viewers also liked (20)

Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)
 
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
 
Grow Hack Athens Pt.1: Growth Hacking For Web Apps
Grow Hack Athens Pt.1: Growth Hacking For Web AppsGrow Hack Athens Pt.1: Growth Hacking For Web Apps
Grow Hack Athens Pt.1: Growth Hacking For Web Apps
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the Web
 
Ruxmon.2015-08.-.proxenet
Ruxmon.2015-08.-.proxenetRuxmon.2015-08.-.proxenet
Ruxmon.2015-08.-.proxenet
 
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk management
 
Journey Management and Safely Driving Procedure
Journey Management and Safely Driving ProcedureJourney Management and Safely Driving Procedure
Journey Management and Safely Driving Procedure
 
Open Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon EditionOpen Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon Edition
 
Hitachi Cloud and Solutions
 Hitachi Cloud and Solutions Hitachi Cloud and Solutions
Hitachi Cloud and Solutions
 
Devfest istanbul'14 - Web Application Attacks and Trusting Frameworks
Devfest istanbul'14  - Web Application Attacks and Trusting FrameworksDevfest istanbul'14  - Web Application Attacks and Trusting Frameworks
Devfest istanbul'14 - Web Application Attacks and Trusting Frameworks
 
Rapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementRapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk Management
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk Management
 
Vi Minh Toại - Security Risk Management, tough path to success
Vi Minh Toại - Security Risk Management, tough path to successVi Minh Toại - Security Risk Management, tough path to success
Vi Minh Toại - Security Risk Management, tough path to success
 
Hitachi Data Systems Hadoop Solution
Hitachi Data Systems Hadoop SolutionHitachi Data Systems Hadoop Solution
Hitachi Data Systems Hadoop Solution
 
Hitachi smart city
Hitachi  smart cityHitachi  smart city
Hitachi smart city
 
European Trends in Travel Risk Management 2015
European Trends in Travel Risk Management 2015European Trends in Travel Risk Management 2015
European Trends in Travel Risk Management 2015
 
Introducing OWASP OWTF Workshop BruCon 2012
Introducing OWASP OWTF Workshop BruCon 2012Introducing OWASP OWTF Workshop BruCon 2012
Introducing OWASP OWTF Workshop BruCon 2012
 
Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)
 
CISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 3. Asset SecurityCISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 3. Asset Security
 

Similar to Security Risk Management: ovvero come mitigare e gestire i rischi dei dati attraverso i servizi gestiti. - by Hitachi Systems - festival ICT 2015

Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughImperva
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM Security
 
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Kevin Fealey
 
The value of the platform play in real world use cases Software AG cwin18 tou...
The value of the platform play in real world use cases Software AG cwin18 tou...The value of the platform play in real world use cases Software AG cwin18 tou...
The value of the platform play in real world use cases Software AG cwin18 tou...Capgemini
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_bangloreIPPAI
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesKai Wähner
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergdawnrk
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergdawnrk
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
Data Consult Managed Security Services
Data Consult Managed Security ServicesData Consult Managed Security Services
Data Consult Managed Security ServicesJad Bejjani
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageImperva
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of VulnerabilitySkybox Security
 
Motadata - Unified Product Suite for IT Operations and Big Data Analytics
Motadata - Unified Product Suite for IT Operations and Big Data AnalyticsMotadata - Unified Product Suite for IT Operations and Big Data Analytics
Motadata - Unified Product Suite for IT Operations and Big Data Analyticsnovsela
 

Similar to Security Risk Management: ovvero come mitigare e gestire i rischi dei dati attraverso i servizi gestiti. - by Hitachi Systems - festival ICT 2015 (20)

Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
 
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
 
The value of the platform play in real world use cases Software AG cwin18 tou...
The value of the platform play in real world use cases Software AG cwin18 tou...The value of the platform play in real world use cases Software AG cwin18 tou...
The value of the platform play in real world use cases Software AG cwin18 tou...
 
MultiValue Security
MultiValue SecurityMultiValue Security
MultiValue Security
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Data Consult Managed Security Services
Data Consult Managed Security ServicesData Consult Managed Security Services
Data Consult Managed Security Services
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and Espionage
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 
Motadata - Unified Product Suite for IT Operations and Big Data Analytics
Motadata - Unified Product Suite for IT Operations and Big Data AnalyticsMotadata - Unified Product Suite for IT Operations and Big Data Analytics
Motadata - Unified Product Suite for IT Operations and Big Data Analytics
 

More from festival ICT 2016

Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...festival ICT 2016
 
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...festival ICT 2016
 
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015festival ICT 2016
 
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...festival ICT 2016
 
Favorire lo sviluppo di applicazioni native Cloud: lo Smart SaaS Program - by...
Favorire lo sviluppo di applicazioni native Cloud: lo Smart SaaS Program - by...Favorire lo sviluppo di applicazioni native Cloud: lo Smart SaaS Program - by...
Favorire lo sviluppo di applicazioni native Cloud: lo Smart SaaS Program - by...festival ICT 2016
 
I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...
I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...
I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...festival ICT 2016
 
LibreOffice: software libero e formati standard - by LibreItalia - festival I...
LibreOffice: software libero e formati standard - by LibreItalia - festival I...LibreOffice: software libero e formati standard - by LibreItalia - festival I...
LibreOffice: software libero e formati standard - by LibreItalia - festival I...festival ICT 2016
 
Come rendere più collaborative le tue riunioni - by Epson - festival ICT 2015
Come rendere più collaborative le tue riunioni - by Epson - festival ICT 2015Come rendere più collaborative le tue riunioni - by Epson - festival ICT 2015
Come rendere più collaborative le tue riunioni - by Epson - festival ICT 2015festival ICT 2016
 
Case Study TWT: North Sails ha rivoluzionato il modo di lavorare - by TWT - f...
Case Study TWT: North Sails ha rivoluzionato il modo di lavorare - by TWT - f...Case Study TWT: North Sails ha rivoluzionato il modo di lavorare - by TWT - f...
Case Study TWT: North Sails ha rivoluzionato il modo di lavorare - by TWT - f...festival ICT 2016
 
Il mio ufficio è sempre con me. E il tuo? - by TWT - festival ICT 2015
Il mio ufficio è sempre con me. E il tuo? - by TWT - festival ICT 2015Il mio ufficio è sempre con me. E il tuo? - by TWT - festival ICT 2015
Il mio ufficio è sempre con me. E il tuo? - by TWT - festival ICT 2015festival ICT 2016
 
Non adeguatevi al Cloud - by Clouditalia - festival ICT 2015
Non adeguatevi al Cloud - by Clouditalia - festival ICT 2015Non adeguatevi al Cloud - by Clouditalia - festival ICT 2015
Non adeguatevi al Cloud - by Clouditalia - festival ICT 2015festival ICT 2016
 
Impatto privacy della video analisi nei sistemi di video sorveglianza intelli...
Impatto privacy della video analisi nei sistemi di video sorveglianza intelli...Impatto privacy della video analisi nei sistemi di video sorveglianza intelli...
Impatto privacy della video analisi nei sistemi di video sorveglianza intelli...festival ICT 2016
 
Web reputation, le verità nascoste dell’identità digitale - festival ICT 2015
Web reputation, le verità nascoste dell’identità digitale - festival ICT 2015Web reputation, le verità nascoste dell’identità digitale - festival ICT 2015
Web reputation, le verità nascoste dell’identità digitale - festival ICT 2015festival ICT 2016
 
Privacy e non profit online: profilazioni digitali di donatori e aderenti nel...
Privacy e non profit online: profilazioni digitali di donatori e aderenti nel...Privacy e non profit online: profilazioni digitali di donatori e aderenti nel...
Privacy e non profit online: profilazioni digitali di donatori e aderenti nel...festival ICT 2016
 
L'importanza del controllo nelle operazioni di Data Wiping - Sprint Computer ...
L'importanza del controllo nelle operazioni di Data Wiping - Sprint Computer ...L'importanza del controllo nelle operazioni di Data Wiping - Sprint Computer ...
L'importanza del controllo nelle operazioni di Data Wiping - Sprint Computer ...festival ICT 2016
 
Il dato è tratto: il lato B della mobilità tra privacy e reati informatici - ...
Il dato è tratto: il lato B della mobilità tra privacy e reati informatici - ...Il dato è tratto: il lato B della mobilità tra privacy e reati informatici - ...
Il dato è tratto: il lato B della mobilità tra privacy e reati informatici - ...festival ICT 2016
 
Web e privacy, le nuove regole per i cookies - festival ICT 2015
Web e privacy, le nuove regole per i cookies - festival ICT 2015Web e privacy, le nuove regole per i cookies - festival ICT 2015
Web e privacy, le nuove regole per i cookies - festival ICT 2015festival ICT 2016
 
Il paradigma UCaaS: come migliorare i processi di business dell’azienda attra...
Il paradigma UCaaS: come migliorare i processi di business dell’azienda attra...Il paradigma UCaaS: come migliorare i processi di business dell’azienda attra...
Il paradigma UCaaS: come migliorare i processi di business dell’azienda attra...festival ICT 2016
 
Nuvole e metallo: Infrastruttura e servizi Cloud based - by Hosting Solution...
 Nuvole e metallo: Infrastruttura e servizi Cloud based - by Hosting Solution... Nuvole e metallo: Infrastruttura e servizi Cloud based - by Hosting Solution...
Nuvole e metallo: Infrastruttura e servizi Cloud based - by Hosting Solution...festival ICT 2016
 
Definire, configurare ed implementare soluzioni scalabili su sistemi di Cloud...
Definire, configurare ed implementare soluzioni scalabili su sistemi di Cloud...Definire, configurare ed implementare soluzioni scalabili su sistemi di Cloud...
Definire, configurare ed implementare soluzioni scalabili su sistemi di Cloud...festival ICT 2016
 

More from festival ICT 2016 (20)

Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
 
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
 
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
 
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
 
Favorire lo sviluppo di applicazioni native Cloud: lo Smart SaaS Program - by...
Favorire lo sviluppo di applicazioni native Cloud: lo Smart SaaS Program - by...Favorire lo sviluppo di applicazioni native Cloud: lo Smart SaaS Program - by...
Favorire lo sviluppo di applicazioni native Cloud: lo Smart SaaS Program - by...
 
I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...
I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...
I vantaggi di un’infrastruttura unica nell’erogazione dei servizi IT networke...
 
LibreOffice: software libero e formati standard - by LibreItalia - festival I...
LibreOffice: software libero e formati standard - by LibreItalia - festival I...LibreOffice: software libero e formati standard - by LibreItalia - festival I...
LibreOffice: software libero e formati standard - by LibreItalia - festival I...
 
Come rendere più collaborative le tue riunioni - by Epson - festival ICT 2015
Come rendere più collaborative le tue riunioni - by Epson - festival ICT 2015Come rendere più collaborative le tue riunioni - by Epson - festival ICT 2015
Come rendere più collaborative le tue riunioni - by Epson - festival ICT 2015
 
Case Study TWT: North Sails ha rivoluzionato il modo di lavorare - by TWT - f...
Case Study TWT: North Sails ha rivoluzionato il modo di lavorare - by TWT - f...Case Study TWT: North Sails ha rivoluzionato il modo di lavorare - by TWT - f...
Case Study TWT: North Sails ha rivoluzionato il modo di lavorare - by TWT - f...
 
Il mio ufficio è sempre con me. E il tuo? - by TWT - festival ICT 2015
Il mio ufficio è sempre con me. E il tuo? - by TWT - festival ICT 2015Il mio ufficio è sempre con me. E il tuo? - by TWT - festival ICT 2015
Il mio ufficio è sempre con me. E il tuo? - by TWT - festival ICT 2015
 
Non adeguatevi al Cloud - by Clouditalia - festival ICT 2015
Non adeguatevi al Cloud - by Clouditalia - festival ICT 2015Non adeguatevi al Cloud - by Clouditalia - festival ICT 2015
Non adeguatevi al Cloud - by Clouditalia - festival ICT 2015
 
Impatto privacy della video analisi nei sistemi di video sorveglianza intelli...
Impatto privacy della video analisi nei sistemi di video sorveglianza intelli...Impatto privacy della video analisi nei sistemi di video sorveglianza intelli...
Impatto privacy della video analisi nei sistemi di video sorveglianza intelli...
 
Web reputation, le verità nascoste dell’identità digitale - festival ICT 2015
Web reputation, le verità nascoste dell’identità digitale - festival ICT 2015Web reputation, le verità nascoste dell’identità digitale - festival ICT 2015
Web reputation, le verità nascoste dell’identità digitale - festival ICT 2015
 
Privacy e non profit online: profilazioni digitali di donatori e aderenti nel...
Privacy e non profit online: profilazioni digitali di donatori e aderenti nel...Privacy e non profit online: profilazioni digitali di donatori e aderenti nel...
Privacy e non profit online: profilazioni digitali di donatori e aderenti nel...
 
L'importanza del controllo nelle operazioni di Data Wiping - Sprint Computer ...
L'importanza del controllo nelle operazioni di Data Wiping - Sprint Computer ...L'importanza del controllo nelle operazioni di Data Wiping - Sprint Computer ...
L'importanza del controllo nelle operazioni di Data Wiping - Sprint Computer ...
 
Il dato è tratto: il lato B della mobilità tra privacy e reati informatici - ...
Il dato è tratto: il lato B della mobilità tra privacy e reati informatici - ...Il dato è tratto: il lato B della mobilità tra privacy e reati informatici - ...
Il dato è tratto: il lato B della mobilità tra privacy e reati informatici - ...
 
Web e privacy, le nuove regole per i cookies - festival ICT 2015
Web e privacy, le nuove regole per i cookies - festival ICT 2015Web e privacy, le nuove regole per i cookies - festival ICT 2015
Web e privacy, le nuove regole per i cookies - festival ICT 2015
 
Il paradigma UCaaS: come migliorare i processi di business dell’azienda attra...
Il paradigma UCaaS: come migliorare i processi di business dell’azienda attra...Il paradigma UCaaS: come migliorare i processi di business dell’azienda attra...
Il paradigma UCaaS: come migliorare i processi di business dell’azienda attra...
 
Nuvole e metallo: Infrastruttura e servizi Cloud based - by Hosting Solution...
 Nuvole e metallo: Infrastruttura e servizi Cloud based - by Hosting Solution... Nuvole e metallo: Infrastruttura e servizi Cloud based - by Hosting Solution...
Nuvole e metallo: Infrastruttura e servizi Cloud based - by Hosting Solution...
 
Definire, configurare ed implementare soluzioni scalabili su sistemi di Cloud...
Definire, configurare ed implementare soluzioni scalabili su sistemi di Cloud...Definire, configurare ed implementare soluzioni scalabili su sistemi di Cloud...
Definire, configurare ed implementare soluzioni scalabili su sistemi di Cloud...
 

Recently uploaded

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Recently uploaded (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Security Risk Management: ovvero come mitigare e gestire i rischi dei dati attraverso i servizi gestiti. - by Hitachi Systems - festival ICT 2015

  • 1. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. Security Risk Management: How to mitigate risks and protect data Security Managed Services Security BU Director & Sales Director North Italy 11/11/2015 Denis Cassinerio
  • 2. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. 2. Hitachi Systems CBT 4. Managed Security Services Agenda 1 1. Hitachi Ltd. & Hitachi ITSG 3. Risk Management Scenario
  • 3. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. 1. Hitachi Ltd. & Hitachi ITSG
  • 4. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. Power Systems 4% Social Infrastructure & Industrial Systems 15% Electronics Systems & Equipment 11% Construction Machinery 7% High Functional Materials & Components 14% Automotive Systems 9% Smart Life & Ecofriendly Systems 7% Others (Logistics & Other services) 11% Financial Services 3% Information & Telecommunication Systems 19% 1. Hitachi Ltd. (as of end of Mar. 2015) 81.60 billion
  • 5. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. 1.2 Hitachi Systems Global Italy 2014-INDIA Hitachi Systems Micro Clinic 2013–SOUTHEASTASIA Hitachi Sunway Information Systems 2015-ITALY Hitachi Systems CBT 2014-CHINA Hitachi Systems (Guangzhou) 2012–NORTHAMERICA Cumulus Systems 2015-CANADA Above Security 1. Establish a base of operation in Italy 2. Contribution to the social infrastructure business of Hitachi 3. Expand into greater Europe STRATEGY
  • 6. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. 2. Hitachi Systems CBT – Italy
  • 7. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. 2.1 Vision & Mission “Cloud, Service, Application & Technology Integrator “Transfer the complexity and start focusing on your business only Over the last 35 years we have been supporting medium and large enterprises, both in the private and public sector, by implementing and improving their infrastructure, integrating them with services and application solutions with high technological content. Assist organizations in their strategic path to Business Transformation through outsourcing of infrastructure, services and applications VISION MISSION” ”
  • 8. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. 2.2 Business Areas Data Center, Networking, Devices, Middleware TECHNOLOGY APPLICATIONS MANAGED SERVICES (2014: Revenues 31,1M€) (2014: Revenues 22,3M€) (2014: Revenues 3,7M€) BUSINESSAREAS Engineering Projects & Services
  • 9. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. 2.3 Highlights All our customers will be free to focus on their core business only SOFTWARE FACTORY BolognaHEADQUARTER Roma BRANCHES Milano Venezia Torino Novara DATA CENTERS Roma Milano +300 TEAM 6 LOCATIONS OVER 1.200 CERTIFICATIONS OVER 100 PARTNERS LONG EXPERIENCE >35 YEARS 100% SECURITY & COMPLIANCE 57MIO € REVENUE +7% FY 2013 2 DATA CENTER 365 24/7 SERVICES
  • 10. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. 3. Risk Management Scenario
  • 11. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. ATTACK SURFACE
  • 12. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. Vulnerability & Threats
  • 13. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. DATA BREACH SNAPSHOT 12
  • 14. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. CLUSIT Report 2015 13
  • 15. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. 3.1 Compliance changes 14
  • 16. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. NORMATIVE : Regolamento Europeo 15 • La Commissione europea ha proposto una riforma globale della normativa UE sulla protezione dei dati delle persone fisiche.
 • Il nuovo Regolamento ha lo scopo di fissare delle regole chiare e uniformi sulla privacy online e offline • Una volta approvato dal Parlamento e dal Consiglio UE, varrà per tutti i Paesi europei. Principali novità del Regolamento 1. Obbligo di «Data Protection Impact Analysis» in caso di trattamenti rischiosi 2. Obbligo di «Privacy by Design and Default » nella progettazione e nell’architettura di Infrastrutture ICT e nelle Pratiche Commerciali 3. Obbligo di «Data Breach Notification» entro 24 ore dall’evento al Garante Privacy 4. Obbligo per le aziende con più di 250 dipendenti e per gli enti pubblici di nominare un «Data Protection Officer » 5. Diritto all'oblio, per cui ogni interessato potrà richiedere la rimozione di propri dati personali. 

  • 17. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. SANZIONI Previste dal NUOVO Regolamento Europeo 16
  • 18. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. 3.2 Risk Management Maturity 17
  • 19. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. Crisis = Opportunity 18
  • 20. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. The Opportunity : Skills Gap 19 DATA PROTECTION DLGS. 196/2003 e s.m.i. DLGS. 231/01 e s.m.i. Legge 547/93 e s.m.i. ISO/IEC 27001:2013 COBIT ITIL …… Virus Worm Trojan Payloads Man in te Middle Brute Force Authentication.. APT SKILLS GAP SECURITY RISK MANAGEMENT Legal & Compliance Threats Vulnerabilities CVE MS 2008-067 CVE 2014-62-71 ISO NIST OWASP OSST Vectors of Attack Technical Impacts Business Impacts
  • 21. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. Information Security Risk Management Fundamentals 20 AVAILABILITY INTEGRITY CONFIDENTIALI TY
  • 22. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. 21 VULNERABILI TY Processes Systems Network Applications Continuous check Continuos remediation THREATS New threats every 1.5 seconds Variants Exploit kits Botnets APT Penalties COUNTERMEASURES Processes Checks AV IPS FW APT WAF HIPS APP CTRL……. Consultancy VALUATION Data Assets ANALYSIS Qualitative Quantitative Information Security Risk Management Fundamentals
  • 23. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. Situational Awareness Security 22
  • 24. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. 4. Managed Security Services 23
  • 25. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. Security Business Unit 24
  • 26. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. EasyShield: Vision VISION EasyShield Legal & Compliance Architectural Design Security Engineers Security Analysts Integrated Services Manage the Security IT Complexity Managed Security Services
  • 27. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. COMPLIANCE TECHNOLOGY MANAGED SERVICES CYBERSECURITY EasyShield: Keywords and Benefits Keywords & Benefits Reduction & Cost Control Security Posture Improvement Ad hoc Installation & Configuration Up to date Certification
  • 28. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. EasyShield: Security Risk Management Identify & Analiyze Exposures Monitor Results Examine Risk Management Select Risk ManagementImplement Techniques Identify assets and their value to the organization. Identify vulnerabilities and threats Quantify the probability and business impact of these potential threats. Provide an economic balance between the impact of the threat and the cost of the countermeasure”. Shon Harris, CISSP «Security Partner» “ “
  • 29. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. 4. EasyShield Offering Structure
  • 30. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. Security BU Offering SKILLS EXTENDED PORTFOLIO SRM CYCLE COST EFFECTIVE Compliance Professional Services Technology Cyber Security Managed Security Services
  • 31. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. CYBERSECURITYTECHNOLOGY EasyShield® represents a 360°security approach, from Compliance to Cloud services, through the best technology solutions via Managed Services 3.4 Offering: EasyShield® • APT Assessment • Multi Protocol Network Detection • Spear Phishing Mitigation • Anti Bot Net • Sandboxing and behavioral monitor • Forensic Analysis • Intrusion Detection / Prevention • Ethical Hacking • Penetration Test • Web Application Protection • Zero Day Protection • Security & Compliance Risk Assessment • Risk Management, Governance & Certification • Business Continuity & Disaster Recovery • Regulatory Compliance Management • Business Process Reengineering • Security Awareness Training • Security & Compliance Audit • Content security • Datacenter & Cloud Security • Network Security • Security Management • Vulnerability Management Compliance Management Penetration Test Privileged Account Management Web Application Protection Vulnerability Assessment Virtual Patching Patch Management Professional Services Penetration Test Vulnerabiility,Mobile Web Application , Wireless PCI DSS (/ Scan & compliance) Managed Security Services Anti Malware policy Management Mobile Security Firewall Configuration and policies IPS / IDS Management Wireless Assessm COMPLIANCE Compliance Cyber Security Managed Services Technology MANAGEDSERVICES Professional Services
  • 32. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. 4.2 Global SOC
  • 33. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. Global SOC: Security Strategy WAF: Web Application Firewall; NGFW: Next Generation Fire Wall ; SIEM: Security Incident and Event Management Cyber Security (Anti-Phishing, Anti- Malware) Proactive Defense with Real-time Analytics and Global Intelligence Service Global SOC Protection of Critical Infrastructure (Social Infrastructure) SHIELD SecurityOperationCenter
  • 34. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. ABOVE SECURITY Integration 33
  • 35. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. ARKANGEL Platform 34
  • 36. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. Conclusion 35 It is better to look ahead and prepare than to look back and regret. Jackie Joyner Kersee, athlete and olympic medails Thanks!!
  • 37. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. Security BU Offering: Main Technologies APT IOC DETECTION IAM / PAM CONTENT SECURITY NETWORK SECURITY SECURITY MANAGEMENT
  • 38. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. Contacts HEADQUARTER ROME Via Francesco P. Da Cherso, 30 - 00143 +39 06 519931 www.hitachi-systems-cbt.com marketing@hitachi-systems-cbt.com info@hitachi-systems-cbt.com infosecurity@hitachi-systems-cbt.com webrainbow@hitachi-systems-cbt.com easycloud@hitachi-systems-cbt.com MAIN SITES MILAN Via Dei Gracchi, 7 – 20146 +39 02 489571 VENICE - QUARTO D’ALTINO Via L. Mazzon, 9 – 30020 +39 0422 19702 TURIN Via Gian Domenico Cassini, 39 - 10129 +39 011 5613567 NOVARA Via Biandrate, 24 - 28100 +39 0321 670311 BOLOGNA - CASALECCHIO DI RENO Via Ettore Cristoni, 84 - 40033 +39 051 8550501 TOLL FREE 800 228 228 800 899 228 (WebRainbow)
  • 39. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. ICT Festival 2015 - Milano 11/11/2015 Denis Cassinerio END Security Business Unit & Sales Director - DirectSecurity 38 Security Risk Management: How mitigate and handle the data through the Managed Services
  • 40.
  • 41. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. CYBERCRIME TRICHOTOMY 40
  • 42.
  • 43. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. References: Case Studies Security SHIELD: The Brand Name for Hitachi Systems Security Solution HDI Assicurazioni - Log Management Consorzio ATR – Adeguamento Privacy IntesaBCI – Processi di Gestione della Sicurezza IUAV - Privacy Risk Assessement RM ASL B - AV IPS IDS Poste Italiane – Risk Management AgID – Security Audit Telecom – Politiche di Log Retention G.Matica – Certificazione integrata ISO 27001 - 9001 LND – Security & Privacy Risk Assessement RFI – Corso Privacy FIP – Data Loss Prevent Realizzazione e certificazione del Sistema di Gestione Integrato Qualità e Sicurezza delle Informazioni aziendali, Installazione, configurazione e gestione sistema di tracciatura dei log di accesso degli Amministratori di Sistema a norma privacy Progettazione ed erogazione di due moduli didattici sui temi della sicurezza informaticae della protezione dei dati;. Formazione dei formatori. Realizzazione di una attività Assessment di sicurezza rispetto alla normativa sulla privacy ed ai Provvedimenti del Garante. Disegno dei processi di Gestione della Sicurezza ISO 27001 e valutazione degli impatti organizzativi sullaBanca. Assessment di Sicurezza. Elaborazione sistema documentale privacy.Integrazione dei contratti. Erogazione dellaformazione. Installazione e configurazione di una piattaforma di protezione degli ambienti virtuali da violazione dei dati einterruzioni dell’attività, Verifica dello stato di conformità del modello organizzativo, gestionale e tecnologico adottato dall’Ateneorispetto alle misure di sicurezza privacy. Definizione del processo di Risk Management ISO 31000 e della metodologia di Risk Assessment secondo ISO 27005. Installazione e configurazione di un sistema di protezione dei dati su PC e Mobile a sostegno della conformità e prevenzione della perdita di dati. Definizione delle politiche di sicurezza per la raccolta, la conservazione e l’utilizzo dei log a norma ai fini del monitoraggio dell’utilizzo dei sistemi informatici. Audit di sicurezza ISO/IEC 27001, Dlgs.196/2003 e Dlgs 231/2001 condotto sulla RIPA (Rete Internazionale della Pubblica Amministrazione).
  • 44. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. 1.3 Hitachi ITSG & HISYS Organization Hitachi Data Systems Corporation Hitachi Consulting Corporation Hitachi Solutions Ltd. “Products and System Development” “System Solution & Services” “Platforms (Storage Systems, Server, Platform Software)” Information & Telecommunication Systems Group (ITSG) Research & Development Group Healthcare Group Power & Infrastructure Systems Group “IT Consulting” Hitachi Systems Ltd. Cumulus Systems Hitachi Sunway Information Systems Hitachi Systems Micro Clinic Hitachi Systems (Guangzhou) Hitachi Systems CBT HITACHI Ltd. “System Solutions and Services” Above Security
  • 45. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. 1.2 History of Hitachi ITSG Establishment of Totsuka factory (produced telephones & switchboards ) 1937 194 9 Automated switchboard 1959 Electric computer 1959 Train seat reservation system 1965 Mainframe 1969 Online Banking System 198 0 Beijing meteorological central system for Chinese Central Meteorological Agency 198 1 Digital switch board 198 2 Super computer 198 5 Work Station 1993 Integrated system management middleware 199 4 Outsourcing solution 199 5 RAID disk Array 1997 EDI system 2003 Finger vein authentication system 200 4 Blade Server 200 7 Hitachi virtualization technology “Virtage” 2009 Hitachi cloud solution/ Environment -conscious data center 2012 Big data related services 2013 Smart information related products and services “intelligent Operations” 2014 IoT (Internet of Things), M2M (Machine to Machine) TODAY1910
  • 46. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. Security Risk Management 45 ERRORS/ OMISSIONS USERS NOT AUTHORIZED VANDALISM TAMPERING PHYSICAL CHANGE OR COPY OF DATA UNAUTHORIZED SOFTWARE EXECUTION NATURAL EVENTS INTRODUCTION OF ILLEGAL SW THEFTS ORGANIZATION ARIAL BUSINESS - OPERATIONS CONTINUITY LOGICAL ACCESS PHYSICAL ACCESS DISTRIBUTED ARCHITECTURE DATA DOCUMENTATIONS APPLICATIONS SYSTEMS
  • 47. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. Misure Minime - Misure Idonee 46 Punto di ottimo economico Costo complessivo Costo della sicurezza Livello di sicurezza Costo Costo di Esposizione COST TOTAL COST Security cost Cost exposure Security Level
  • 48. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. KEYSTRENGTHS Strategic transformation of business and organizational processes with high experience in Outsourcing and Cloud Computing Manage the customer’s technological complexities, leaving them free to focus exclusively on their core business More than 1,200 hardware and software technology certifications to design tailor-made solutions also in Private and Public Cloud infrastructure, already available in our Data Centers CUSTOMISED SOLUTIONS TIME AND COST SAVINGS COMPLEXITY TRANSFER BUSINESS TRANSFORMATION 2.4 How do we do it Speed of delivery and “Pay-per-use” logic of EasyCloud®, EasyWare® and WebRainbow® and EasySHIELD ® Solutions to generate economic efficiency switching from investments to fee
  • 49. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. 48
  • 50. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. PROVVEDIMENTI – 28/10/2015 49 …TUTTO CIÒ PREMESSO IL GARANTE 1) dispone la caducazione dell'autorizzazione adottata dal Garante in data 10 ottobre 2001 con deliberazione n. 36 e per l'effetto vieta, ai sensi degli artt. 154, comma 1, lett. d) e 45 del Codice, ai soggetti esportatori di trasferire, sulla base di tale delibera e dei presupposti indicati nella medesima, i dati personali dal territorio dello Stato verso gli Stati Uniti d'America; 2) si riserva, ai sensi dell'art. 154, comma 1, lettere da a) a d) del Codice, di svolgere in qualsiasi momento i necessari controlli sulla liceità e correttezza del trasferimento dei dati e, comunque, su ogni operazione di trattamento ad essi inerente, nonché di adottare, se necessario, i provvedimenti previsti dal Codice; 3) dispone la trasmissione del presente provvedimento all'Ufficio pubblicazione leggi e decreti del Ministero della giustizia per la sua pubblicazione nella Gazzetta Ufficiale della Repubblica Italiana. Trasferimento dati personali verso gli USA: caducazione provvedimento del Garante del 10.10.2001 di riconoscimento dell'accordo sul c.d. "Safe Harbor" - 22 ottobre 2015
  • 51. © Hitachi Systems CBT S.p.A. 2015. All rights reserved. Corporate Data at Risk 50 Network Credentials Intellectual Property Calls Privileged Communication Employee Location
  • 52. Superior service empowered by combining the strength of our people and information technology.