The document provides an overview of Symantec Corporation, a global leader in cybersecurity and data protection. It summarizes Symantec's strategy of securing and managing customers' information-driven world through five engines of growth: growing core businesses, scaling high-growth businesses, seeding emerging trends, growing in fast-growing economies, and using acquisitions. It also outlines Symantec's financial objectives of growing revenue above market rates while expanding margins through expense discipline and cash flow growth.
To ensure that electronic documentation & records shall only be accessible to those who are authorized, and be restricted from the rest.
Nevertheless, there is necessity to balance it against the enterprise need to use and share the information
Gartner Information Security Summit Brochuretrunko
The document summarizes the Gartner Information Security Summit 2009 taking place from June 28 to July 1, 2009 in Washington D.C. The summit will focus on helping information security professionals evolve their role, optimize value, and protect their business. It will consist of over 75 sessions across six conference tracks over three and a half days. Topics will include information security management, critical network technologies, securing data and applications, privacy policies, emerging trends, and initiatives to strengthen professional effectiveness. The summit is aimed at CIOs, CSOs, CISOs and other information security leaders seeking to enhance skills and optimize security strategies in today's challenging economic environment.
Key note in nyc the next breach target and how oracle can help - nyougUlf Mattsson
Old security approaches are based on finding malware and data leaks. This is like "boiling the ocean," since you are “patching” all possible data paths and data stores, and you may not even find a trace of an attack. New security approaches assume that you are under attack and focus instead on protecting the data itself, even in computer memory (the “target” for a growing number of attacks). This session discusses what companies can do now to prevent what happened to Target and others processing PII, PHI and PCI data. The Oracle Big Data Appliance is a critical part of the solution.
Managed Security For A Not So Secure World Wp090991Erik Ginalick
This white paper discusses the need for managed security services given the growing threat landscape and constrained IT budgets. It notes that good security requires continual monitoring and adaptation to new threats. Compliance with regulations is also difficult given shrinking resources. Outsourcing security to an expert provider allows organizations to focus on core operations while gaining access to skilled professionals, comprehensive solutions, and expertise in managing security risks. The white paper concludes that a managed security strategy can help reduce costs and ensure compliance while allowing IT staff to focus on business needs.
Cybersecurity It Audit Services Gt April2012Danny Miller
Grant Thornton is an international professional services firm that provides cyber security and IT audit services. It has over 29,000 personnel across 52 US offices and 498 total offices. The document discusses Grant Thornton's cyber security strategy and design services, vulnerability assessments, penetration testing, and other IT audit and compliance services. It also provides an overview of some of the key standards and frameworks in areas like privacy, PCI, and HIPAA that Grant Thornton's services address.
Sunera Business & Technology Risk ConsultingSunera
Sunera is a professional consultancy that provides regulatory compliance, information security, internal audit, and IT advisory services. It has over 100 professionals across 12 offices in the US and Canada. Services include internal audit, SOX compliance, IT audits, PCI assessments, information security consulting, data privacy, and business continuity planning. The goal is to help clients enhance controls, reduce risks and costs, and achieve compliance with regulations.
To ensure that electronic documentation & records shall only be accessible to those who are authorized, and be restricted from the rest.
Nevertheless, there is necessity to balance it against the enterprise need to use and share the information
Gartner Information Security Summit Brochuretrunko
The document summarizes the Gartner Information Security Summit 2009 taking place from June 28 to July 1, 2009 in Washington D.C. The summit will focus on helping information security professionals evolve their role, optimize value, and protect their business. It will consist of over 75 sessions across six conference tracks over three and a half days. Topics will include information security management, critical network technologies, securing data and applications, privacy policies, emerging trends, and initiatives to strengthen professional effectiveness. The summit is aimed at CIOs, CSOs, CISOs and other information security leaders seeking to enhance skills and optimize security strategies in today's challenging economic environment.
Key note in nyc the next breach target and how oracle can help - nyougUlf Mattsson
Old security approaches are based on finding malware and data leaks. This is like "boiling the ocean," since you are “patching” all possible data paths and data stores, and you may not even find a trace of an attack. New security approaches assume that you are under attack and focus instead on protecting the data itself, even in computer memory (the “target” for a growing number of attacks). This session discusses what companies can do now to prevent what happened to Target and others processing PII, PHI and PCI data. The Oracle Big Data Appliance is a critical part of the solution.
Managed Security For A Not So Secure World Wp090991Erik Ginalick
This white paper discusses the need for managed security services given the growing threat landscape and constrained IT budgets. It notes that good security requires continual monitoring and adaptation to new threats. Compliance with regulations is also difficult given shrinking resources. Outsourcing security to an expert provider allows organizations to focus on core operations while gaining access to skilled professionals, comprehensive solutions, and expertise in managing security risks. The white paper concludes that a managed security strategy can help reduce costs and ensure compliance while allowing IT staff to focus on business needs.
Cybersecurity It Audit Services Gt April2012Danny Miller
Grant Thornton is an international professional services firm that provides cyber security and IT audit services. It has over 29,000 personnel across 52 US offices and 498 total offices. The document discusses Grant Thornton's cyber security strategy and design services, vulnerability assessments, penetration testing, and other IT audit and compliance services. It also provides an overview of some of the key standards and frameworks in areas like privacy, PCI, and HIPAA that Grant Thornton's services address.
Sunera Business & Technology Risk ConsultingSunera
Sunera is a professional consultancy that provides regulatory compliance, information security, internal audit, and IT advisory services. It has over 100 professionals across 12 offices in the US and Canada. Services include internal audit, SOX compliance, IT audits, PCI assessments, information security consulting, data privacy, and business continuity planning. The goal is to help clients enhance controls, reduce risks and costs, and achieve compliance with regulations.
6º Resseguro - A Evolução do Risco Cibernético e seu Impacto no Seguro - Kara...CNseg
Palestra apresentada por Kara Owens no 6º Encontro de Resseguro do Rio de Janeiro, realizado nos dias 5 e 6 de abril de 2017, no hotel Sofitel Copacabana.
As the internet has expanded and criminals have found more ways of creating revenue from stolen information, the need for digital threat intelligence management (DTIM) has increased. Without a means of early identification, companies that are being targeted have no way of knowing their customer’s or employee’s security is threatened or that their brand is being stolen, resulting in an erosion of reputation. DTIM is the early warning system to aid those organizations in identifying the infringements and thefts before severe damage is done.
These slides--based on the webinar from leading IT analyst firm Enterprise Management Associates (EMA) and RiskIQ -- highlight why DTIM is a growing necessity for mid- and large-sized organizations.
The document discusses SunGard Enterprise Cloud Services. It highlights that production and disaster recovery are top cloud priorities for enterprises. It also discusses the security, compliance, connectivity, manageability and availability challenges and benefits of cloud computing. SunGard aims to address these challenges by providing fully managed infrastructure as a service, integrated recovery capabilities, and helping customers adopt a pragmatic path to the enterprise cloud through assessments, design, implementation and steady state production support.
2011 FCC CSRIC WG2A Cyber Security Best Practices Final ReportPhil Agcaoili
This document is the final report of the CSRIC Working Group 2A, which focused on addressing cyber security best practices in the communications industry. It provides an executive summary of the group's work reviewing and updating best practices from previous efforts to address new technologies and threats. It identifies that the group developed 397 best practices across five verticals and four horizontals, with 41% being new and 41% being modified from previous work. It encourages service providers, network operators, and equipment suppliers to prioritize review and implementation of the recommended best practices.
This document provides a company profile for DFLabs, an ISO-certified cybersecurity firm. DFLabs specializes in information security governance, risk, and compliance. The company provides IT risk management frameworks, incident response services, digital forensics, and security consulting. DFLabs operates globally from headquarters in Northern Italy and has Fortune 100 customers. The company focuses on closing the gap between growing security risks and organizations' capacity to respond through an integrated IT governance framework.
The Need for DLP now - A Clearswift White PaperBen Rothke
This white paper discusses the need for data loss prevention (DLP) solutions and provides guidance on implementing a DLP strategy. It notes that while companies secure physical assets like office supplies, data is often less protected. The paper outlines a multi-step approach to deploying DLP, including data discovery, classification, developing a DLP strategy involving multiple departments, addressing interim needs with secure gateways, and eventually selecting and testing DLP products. It emphasizes that DLP requires a long-term, systematic approach rather than being a quick fix, and should be integrated with other security and awareness practices.
In this report we share our insight on the recruitment of cyber security professionals including information regarding the key drivers in the cyber security market, permanent and contract recruitment trends, transferable skills, the top job titles, salaries and qualifications analysis, a heat map of skills demands/talent pools across the UK, concluding with recommendations on attracting and retaining cyber security talent.
- AMAG Pharmaceuticals, a biopharmaceutical company, was facing challenges with password proliferation across its 12 hosted applications, leading to high user frustration and helpdesk calls.
- The company implemented Imprivata OneSign single sign-on to provide easy access to all applications using one password and eliminate password management problems.
- This reduced helpdesk password reset calls by 97% and improved security and compliance, particularly with Massachusetts privacy regulations.
Big Data: Beyond the Hype - Why Big Data Matters to YouDATAVERSITY
This document discusses big data and its importance. It notes that big data is more prevalent than many realize, with most companies and industries now dealing with large volumes of various types of data. It also explains that effectively managing big data provides competitive advantages, with data-savvy companies experiencing much stronger growth rates. Additionally, the document introduces DataStax Enterprise as a solution for easily and effectively managing big data at scale through its support for Apache Cassandra, analytics capabilities, visualization tools, and enterprise services.
The document discusses PCI DSS compliance and maintaining ongoing compliance. It describes PCI DSS as a security standard developed by payment brands to ensure payment data security. Achieving and maintaining PCI compliance can be challenging due to evolving threats, technologies, and requirements. Outsourcing compliance tasks to an expert partner can help organizations adapt to changes and maintain ongoing compliance in a cost-effective manner.
Boards' Eye View of Digital Risk & GDPR v2Graham Mann
The presentation provides senior executives and board members with an overview of digital risk and GDPR. It describes the issues and seeks to provide answers, whilst highlighting the need for a joined-up strategy around digital risk management.
CWIN17 telford gdpr or how to eat the elephant a bit at a time - andy powellCapgemini
Andy Powell will provide an overview of the General Data Protection Regulation (GDPR) and an approach for organizations to address its requirements through principles of "Build, Watch, Proact and React" modeled after medieval warfare strategies. GDPR compliance requires a balanced program across people, processes, and tools rather than a single solution. The presentation will simplify GDPR, explain the threats it addresses beyond just hackers, and how taking a common sense approach to prioritizing efforts can help organizations be ready to meet its obligations.
15 Years of Web Security: The Rebellious Teenage YearsJeremiah Grossman
This document summarizes Jeremiah Grossman's 15 years of experience in web security and the state of application security. It discusses threat actors targeting websites, the growing costs of data breaches and cyber insurance, challenges with vulnerability remediation, and the need for more effective software development processes and addressing skill shortages. WhiteHat Security helps companies find and fix application vulnerabilities before exploits.
SPX is a $6.2 billion global manufacturer of engineered products and services. Approximately one-third of SPX's revenue comes from sales into the global power and energy market. SPX is well positioned to benefit from significant investment in global energy infrastructure estimated at $22 trillion from 2006 to 2030, especially in the areas of coal, gas, and oil. SPX provides critical components and services for power generation and energy transportation across various fuel sources and geographies.
Symantec Corporation reported financial results for its fiscal 2008 fourth quarter and full year. Non-GAAP revenue grew 13% year-over-year for both the quarter and full year. GAAP revenue also grew 13% for the quarter and full year. Non-GAAP EPS grew 50% for the quarter to $0.36 and 26% for the full year to $1.27. Security and Compliance segment revenue grew 21% for the quarter and 19% for the full year. International revenue grew 15% for the quarter and 16% for the full year.
Mark Bregman, the CTO of Symantec, discussed the company's focus on helping customers manage risk by protecting their information through security, backup/data protection, and storage management products. Over the past 12 months, Symantec has strengthened its portfolio by improving product quality and usability. The company is also taking a more business-focused approach to evaluate growth opportunities. While sensitive to macroeconomic conditions, Symantec has not yet seen a slowdown in consumer, SMB, or large enterprise spending. The company is being conservative in its spending plans to better align with revenue expectations.
Fisher Scientific is a leading provider of products and services to scientific researchers around the world. In 2005, Fisher had revenues of $5.6 billion and approximately 19,500 employees worldwide. The company facilitates scientific discovery by supplying researchers with over 600,000 products and services. Fisher aims to make its 350,000 customers more efficient and effective through its integrated supply chain and sales/marketing capabilities.
Symantec reported financial results for its fiscal third quarter of 2009. Total revenue was $1.538 billion, up 1% year-over-year. Non-GAAP earnings per share increased 27% to $0.42. Security and compliance revenue declined 5% to $396 million, while storage and server management revenue rose 1% to $569 million. Cash and investments totaled $1.529 billion at the end of the quarter, down 22% from the prior quarter.
national oilwell varco 2008 Proxy Statement/2007 Annual Report on Form 10-Kfinance40
The document is the 2008 Proxy Statement and 2007 Annual Report to Stockholders of National Oilwell Varco, Inc. It provides notice of the annual meeting to be held on May 14, 2008. Stockholders will vote on three proposals - electing two directors, ratifying the appointment of Ernst & Young LLP as independent auditors, and approving the National Oilwell Varco, Inc. Annual Cash Incentive Plan for Executive Officers. The proxy statement includes biographies of director nominees, board committee information, executive compensation disclosures, and the company's audited financial statements for fiscal year 2007.
John Thompson, CEO of Symantec, discussed the company's strategy to secure and manage customers' information-driven worlds. Symantec aims to reduce risks, control complexity, and more completely and efficiently manage security, risk and infrastructure. The company sees opportunities in its core security businesses as well as high growth areas like data loss prevention. Symantec is committed to corporate responsibility and long-term financial objectives of growing revenue above market rates while expanding margins and optimizing its capital structure.
The document summarizes information about the Annual Meeting Place For The Reference Data Community conference held from March 19-21, 2012 in New York City. It provides data from surveys of attendees about why they attend the conference (78% to learn about new trends), how they spend their budgets (33% on data integration), and their job roles (40% in data management). Charts and graphs show details on these survey results. The document also discusses how the conference provides a forum for discussions on key issues and solutions, and how marketing partners can benefit from participating.
6º Resseguro - A Evolução do Risco Cibernético e seu Impacto no Seguro - Kara...CNseg
Palestra apresentada por Kara Owens no 6º Encontro de Resseguro do Rio de Janeiro, realizado nos dias 5 e 6 de abril de 2017, no hotel Sofitel Copacabana.
As the internet has expanded and criminals have found more ways of creating revenue from stolen information, the need for digital threat intelligence management (DTIM) has increased. Without a means of early identification, companies that are being targeted have no way of knowing their customer’s or employee’s security is threatened or that their brand is being stolen, resulting in an erosion of reputation. DTIM is the early warning system to aid those organizations in identifying the infringements and thefts before severe damage is done.
These slides--based on the webinar from leading IT analyst firm Enterprise Management Associates (EMA) and RiskIQ -- highlight why DTIM is a growing necessity for mid- and large-sized organizations.
The document discusses SunGard Enterprise Cloud Services. It highlights that production and disaster recovery are top cloud priorities for enterprises. It also discusses the security, compliance, connectivity, manageability and availability challenges and benefits of cloud computing. SunGard aims to address these challenges by providing fully managed infrastructure as a service, integrated recovery capabilities, and helping customers adopt a pragmatic path to the enterprise cloud through assessments, design, implementation and steady state production support.
2011 FCC CSRIC WG2A Cyber Security Best Practices Final ReportPhil Agcaoili
This document is the final report of the CSRIC Working Group 2A, which focused on addressing cyber security best practices in the communications industry. It provides an executive summary of the group's work reviewing and updating best practices from previous efforts to address new technologies and threats. It identifies that the group developed 397 best practices across five verticals and four horizontals, with 41% being new and 41% being modified from previous work. It encourages service providers, network operators, and equipment suppliers to prioritize review and implementation of the recommended best practices.
This document provides a company profile for DFLabs, an ISO-certified cybersecurity firm. DFLabs specializes in information security governance, risk, and compliance. The company provides IT risk management frameworks, incident response services, digital forensics, and security consulting. DFLabs operates globally from headquarters in Northern Italy and has Fortune 100 customers. The company focuses on closing the gap between growing security risks and organizations' capacity to respond through an integrated IT governance framework.
The Need for DLP now - A Clearswift White PaperBen Rothke
This white paper discusses the need for data loss prevention (DLP) solutions and provides guidance on implementing a DLP strategy. It notes that while companies secure physical assets like office supplies, data is often less protected. The paper outlines a multi-step approach to deploying DLP, including data discovery, classification, developing a DLP strategy involving multiple departments, addressing interim needs with secure gateways, and eventually selecting and testing DLP products. It emphasizes that DLP requires a long-term, systematic approach rather than being a quick fix, and should be integrated with other security and awareness practices.
In this report we share our insight on the recruitment of cyber security professionals including information regarding the key drivers in the cyber security market, permanent and contract recruitment trends, transferable skills, the top job titles, salaries and qualifications analysis, a heat map of skills demands/talent pools across the UK, concluding with recommendations on attracting and retaining cyber security talent.
- AMAG Pharmaceuticals, a biopharmaceutical company, was facing challenges with password proliferation across its 12 hosted applications, leading to high user frustration and helpdesk calls.
- The company implemented Imprivata OneSign single sign-on to provide easy access to all applications using one password and eliminate password management problems.
- This reduced helpdesk password reset calls by 97% and improved security and compliance, particularly with Massachusetts privacy regulations.
Big Data: Beyond the Hype - Why Big Data Matters to YouDATAVERSITY
This document discusses big data and its importance. It notes that big data is more prevalent than many realize, with most companies and industries now dealing with large volumes of various types of data. It also explains that effectively managing big data provides competitive advantages, with data-savvy companies experiencing much stronger growth rates. Additionally, the document introduces DataStax Enterprise as a solution for easily and effectively managing big data at scale through its support for Apache Cassandra, analytics capabilities, visualization tools, and enterprise services.
The document discusses PCI DSS compliance and maintaining ongoing compliance. It describes PCI DSS as a security standard developed by payment brands to ensure payment data security. Achieving and maintaining PCI compliance can be challenging due to evolving threats, technologies, and requirements. Outsourcing compliance tasks to an expert partner can help organizations adapt to changes and maintain ongoing compliance in a cost-effective manner.
Boards' Eye View of Digital Risk & GDPR v2Graham Mann
The presentation provides senior executives and board members with an overview of digital risk and GDPR. It describes the issues and seeks to provide answers, whilst highlighting the need for a joined-up strategy around digital risk management.
CWIN17 telford gdpr or how to eat the elephant a bit at a time - andy powellCapgemini
Andy Powell will provide an overview of the General Data Protection Regulation (GDPR) and an approach for organizations to address its requirements through principles of "Build, Watch, Proact and React" modeled after medieval warfare strategies. GDPR compliance requires a balanced program across people, processes, and tools rather than a single solution. The presentation will simplify GDPR, explain the threats it addresses beyond just hackers, and how taking a common sense approach to prioritizing efforts can help organizations be ready to meet its obligations.
15 Years of Web Security: The Rebellious Teenage YearsJeremiah Grossman
This document summarizes Jeremiah Grossman's 15 years of experience in web security and the state of application security. It discusses threat actors targeting websites, the growing costs of data breaches and cyber insurance, challenges with vulnerability remediation, and the need for more effective software development processes and addressing skill shortages. WhiteHat Security helps companies find and fix application vulnerabilities before exploits.
SPX is a $6.2 billion global manufacturer of engineered products and services. Approximately one-third of SPX's revenue comes from sales into the global power and energy market. SPX is well positioned to benefit from significant investment in global energy infrastructure estimated at $22 trillion from 2006 to 2030, especially in the areas of coal, gas, and oil. SPX provides critical components and services for power generation and energy transportation across various fuel sources and geographies.
Symantec Corporation reported financial results for its fiscal 2008 fourth quarter and full year. Non-GAAP revenue grew 13% year-over-year for both the quarter and full year. GAAP revenue also grew 13% for the quarter and full year. Non-GAAP EPS grew 50% for the quarter to $0.36 and 26% for the full year to $1.27. Security and Compliance segment revenue grew 21% for the quarter and 19% for the full year. International revenue grew 15% for the quarter and 16% for the full year.
Mark Bregman, the CTO of Symantec, discussed the company's focus on helping customers manage risk by protecting their information through security, backup/data protection, and storage management products. Over the past 12 months, Symantec has strengthened its portfolio by improving product quality and usability. The company is also taking a more business-focused approach to evaluate growth opportunities. While sensitive to macroeconomic conditions, Symantec has not yet seen a slowdown in consumer, SMB, or large enterprise spending. The company is being conservative in its spending plans to better align with revenue expectations.
Fisher Scientific is a leading provider of products and services to scientific researchers around the world. In 2005, Fisher had revenues of $5.6 billion and approximately 19,500 employees worldwide. The company facilitates scientific discovery by supplying researchers with over 600,000 products and services. Fisher aims to make its 350,000 customers more efficient and effective through its integrated supply chain and sales/marketing capabilities.
Symantec reported financial results for its fiscal third quarter of 2009. Total revenue was $1.538 billion, up 1% year-over-year. Non-GAAP earnings per share increased 27% to $0.42. Security and compliance revenue declined 5% to $396 million, while storage and server management revenue rose 1% to $569 million. Cash and investments totaled $1.529 billion at the end of the quarter, down 22% from the prior quarter.
national oilwell varco 2008 Proxy Statement/2007 Annual Report on Form 10-Kfinance40
The document is the 2008 Proxy Statement and 2007 Annual Report to Stockholders of National Oilwell Varco, Inc. It provides notice of the annual meeting to be held on May 14, 2008. Stockholders will vote on three proposals - electing two directors, ratifying the appointment of Ernst & Young LLP as independent auditors, and approving the National Oilwell Varco, Inc. Annual Cash Incentive Plan for Executive Officers. The proxy statement includes biographies of director nominees, board committee information, executive compensation disclosures, and the company's audited financial statements for fiscal year 2007.
John Thompson, CEO of Symantec, discussed the company's strategy to secure and manage customers' information-driven worlds. Symantec aims to reduce risks, control complexity, and more completely and efficiently manage security, risk and infrastructure. The company sees opportunities in its core security businesses as well as high growth areas like data loss prevention. Symantec is committed to corporate responsibility and long-term financial objectives of growing revenue above market rates while expanding margins and optimizing its capital structure.
The document summarizes information about the Annual Meeting Place For The Reference Data Community conference held from March 19-21, 2012 in New York City. It provides data from surveys of attendees about why they attend the conference (78% to learn about new trends), how they spend their budgets (33% on data integration), and their job roles (40% in data management). Charts and graphs show details on these survey results. The document also discusses how the conference provides a forum for discussions on key issues and solutions, and how marketing partners can benefit from participating.
The document discusses six key questions organizations should ask about data governance: 1) Do we have a government structure in place to oversee data governance? 2) How can we assess our current data governance situation? 3) What is our data governance strategy? 4) What is the value of our data? 5) What are our data vulnerabilities? 6) How can we measure progress in data governance? It provides details on each question, highlighting the importance of leadership, benchmarks, strategic planning, risk assessment, and metrics in developing an effective data governance program.
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
This webinar will provide more information on the importance of information security and how you can take security well beyond compliance, an approach on building strong information security, privacy and data governance programs, and the importance of strong data governance in relation to privacy and information security requirements.
The webinar covers
• Information Security
• Importance Of Information Security Today
• Taking Information Security Beyond A Compliance First
• Importance Of Data Governance In Information Security
• Privacy
• Changing And Evolving Privacy Requirements
• Importance Of Data Governance In Privacy
• Data Governance And Data Privacy
• Data Privacy - Data Processing Principles
Presenters:
Moji is a Senior Business Process Analyst working with GemaltoThales, a leading firm in the IT industry. Moji has over fifteen years of experience in leading projects to improve processes, create and implement processes leading to increased revenue generation and eliminate redundancies.
She has a zeal for adding value and increasing revenue for organizations. Moji is very passionate about Data Privacy and its application in business and consumer rights.
Hardeep Mehrotara has 20+ years of senior leadership experience in Information Technology and Cyber Security working for public and private organizations building security programs from the ground up. He has been featured on Canadian television as a cyber expert and provided advice to various communities on implementing cybersecurity strategy, best practices and controls. He has been a co-author on numerous leading industry security control frameworks, technical benchmarks and industry best practice standards.
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/whitepaper/iso-27001-information-technology--security-techniques-information-security--management-systems---requirements
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27701
Webinars: https://pecb.com/webinars
Articles: https://pecb.com/article
Whitepapers: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/aQcS5-RFIEY
Website link: https://pecb.com/
SECUDE is an innovative provider of IT security solutions for SAP customers. It focuses on data-centric security and classification with its Halocore solutions. Halocore allows users to identify sensitive data extracted from SAP, apply data loss prevention controls, and protect documents with rights management. This helps mitigate security risks, reduce compliance costs, and prevent data breaches and theft. The presenters discuss how rising security threats, lack of preparedness, and stringent compliance regulations are pushing companies to find new ways to secure their SAP data.
The document is an investor presentation for Avery Dennison's proposed acquisition of Paxar. The key points are:
1) Avery Dennison will acquire Paxar for $30.50 per share, valuing Paxar at $1.34 billion including debt. This represents a 27% premium to Paxar's stock price.
2) The acquisition will enhance Avery Dennison's revenue growth potential by expanding into the $15 billion retail identification market and better serving global supply chains.
3) Annual cost synergies of $90-100 million are estimated by combining infrastructure and achieving scale. This is expected to make the acquisition accretive to earnings within 12
Storing Archive Data to meet Compliance ChallengesTony Pearson
This document discusses solutions for storing archive data to meet compliance challenges. It describes IBM software and hardware that can be used, including features like immutability, WORM technology, and NENR enforcement. The discussion covers concepts like retention policies and litigation holds. It also provides an overview of IBM products that can be deployed for archiving, such as tape libraries, disk storage, and software.
George W. Buckley Chairman, President and Chief Executive Officerfinance10
George Buckley presents an emerging strategy for growth at 3M. He outlines 3M's core competencies in applying coatings to various backings using precision manufacturing. Buckley describes how 3M leverages its technology platforms across multiple markets through sharing technologies and an "adjacency lattice" approach. The strategy emphasizes growing 3M's core businesses, gaining scale in large markets, and increasing relative share in smaller markets through globalization and a focus on innovation.
Big Data in Financial Services: How to Improve Performance with Data-Driven D...Perficient, Inc.
Most banking and financial services organizations have only scratched the surface of leveraging customer data to transform their business, realize new revenue opportunities, manage risk and address customer loyalty. Yet a business’s digital footprint continues to evolve as automated payments, location-based purchases, and unstructured customer communications continue to influence the technology landscape for financial services.
Rene Grossrieder, Vice President of Worldwide Channels & Alliances and General Manager of International Operations at MIR3, presented on their Intelligent Notification software platform. The presentation provided an overview of MIR3's mass notification capabilities, customer success stories, the growing market opportunity, strategic partnership with Singlewire, and demonstration of their notification platform.
Securing Your "Crown Jewels": Do You Have What it Takes?IBM Security
Securing Your "Crown Jewels": Do You Have What it Takes to Go From Start to Finish?
Protecting Your Most Valuable Data: Organizations face many data protection challenges, but one of the biggest is identifying and prioritizing the 0.01% - 2% of the data that is most important to your organization's survival and success. IBM Data Security Services can help by providing you with a 5-stage strategy designed to ensure that your "Crown Jewels" are protected and kept safe from loss, hackers, and being compromised. Attend this session and learn about processes to identify and prioritize your critical data, and services available from IBM to protect it.
This document discusses mobile security for businesses. It begins by noting that mobile devices present new security risks that companies often only address reactively after a breach. However, mobile security allows businesses to capitalize on opportunities from mobile applications if done properly. The document then provides an overview of common mobile security threats like malware, privacy issues, and social engineering. It concludes by offering a 7-step checklist for better mobile security practices that IT administrators can implement, including securing devices with passwords and preparing phone location/remote wipe services.
Data security in a big data environment swedenIBM Sverige
This document discusses data security challenges in big data environments. It notes that data breaches are common and costly for organizations. Several examples of recent breaches are provided that impacted companies like Target, a Canadian government agency, and healthcare providers. The document advocates for the IBM Guardium suite of data security products to help secure sensitive data across different systems and platforms through discovery, monitoring, masking, encryption and other techniques. It argues these tools are needed to reduce risks, costs, and protect brand reputation for organizations working with big data.
The webinar discusses cybersecurity trends for small and medium enterprises (SMEs) and professional accountants in light of the COVID-19 pandemic. It will provide an overview of pre-pandemic cybersecurity trends and risks, examine how the pandemic has influenced these trends and risks, and offer practical insights for SMEs to respond proactively. A panel of cybersecurity experts from Deloitte, KPMG and Cherry Bekaert will discuss topics like the global state of cybersecurity in SMEs before the pandemic, the impact of widespread remote working during the pandemic, and key considerations for cybersecurity in a post-pandemic environment.
Improve Efficiency & Reduce Costs through BI in Fertilizer SectorDhiren Gala
Efficiency Improvement & Cost Reduction through Business Intelligence (BI) in Fertilizer Sector. - A presentation by Sanjay Mehta, CEO, MAIA Intelligence at The Fertilizer Association of India (FAI) WORKSHOP ON ICT FOR IMPROVING EFFICIENCY IN FERTILISER AND AGRICULTURE SECTORS held from March 16-19, 2009 at Manali.
The document discusses Thermo Scientific's leadership in serving science through analytical instruments, equipment, reagents, software and services. It highlights the company's size and scale, unmatched capabilities, portfolio of leading brands, and mission to make the world healthier, cleaner and safer. Key strengths include global industry leadership, ability to continuously invest in growth opportunities through R&D, and an excellent track record of financial performance. New products are presented for applications such as sample preparation, analysis, and data interpretation.
- Thermo Electron Corporation filed a quarterly report with the SEC for Q1 2006.
- In the report, they disclosed revenues of $684 million for Q1 2006 and net income of $46.9 million.
- They also noted that in May 2005, their Life and Laboratory Sciences segment acquired the Kendro Laboratory Products division of SPX Corporation.
- Thermo Electron Corporation filed a quarterly report with the SEC for Q1 2006.
- In the report, they disclosed revenues of $684 million for Q1 2006 and net income of $46.9 million.
- They also noted that in May 2005, their Life and Laboratory Sciences segment acquired the Kendro Laboratory Products division of SPX Corporation.
This document is Thermo Electron Corporation's Form 10-Q quarterly report filed with the SEC for the quarter ended July 1, 2006. It includes Thermo's consolidated balance sheet, income statement, and cash flow statement for the quarter, as well as notes to the financial statements. The financial statements show that for the quarter, Thermo's revenues increased 9% to $713 million, net income decreased 20% to $48 million, and earnings per share from continuing operations decreased 14% to $0.30. Thermo also announced a definitive agreement to merge with Fisher Scientific International in an all-stock transaction expected to close in the fourth quarter of 2006.
- Thermo Electron Corporation filed a Form 10-Q with the SEC for the quarter ended July 1, 2006.
- Thermo announced an agreement to merge with Fisher Scientific International in a stock-for-stock exchange to create Thermo Fisher Scientific.
- The merger is subject to shareholder and regulatory approvals and is expected to close in the fourth quarter of 2006.
This document is Thermo Electron Corporation's quarterly report filed with the SEC for the quarter ended September 30, 2006. It provides condensed financial statements and notes for the periods presented. The financial statements show revenues of $724.9 million for the quarter and income from continuing operations of $48.8 million. Notes include details on the planned merger with Fisher Scientific International and recent acquisitions completed during the periods.
This document is Thermo Electron Corporation's quarterly report filed with the SEC for the quarter ended September 30, 2006. It provides condensed financial statements and notes for the periods presented. The financial statements show that revenues increased from the prior year period but net income decreased due to higher costs and expenses. Thermo also announced a definitive agreement in May 2006 to combine with Fisher Scientific International in an all-stock merger transaction subject to regulatory approvals.
The document is Thermo Fisher Scientific's annual report on Form 10-K for the fiscal year ended December 31, 2006. It provides information on the company's business operations and financial performance. Specifically, it discusses Thermo Fisher's merger with Fisher Scientific to create a global leader in serving science. It also describes the company's two business segments - Analytical Technologies and Laboratory Products and Services - and provides an overview of key product lines within the Analytical Technologies segment, including scientific instruments, biosciences products, and diagnostic and environmental instruments.
The document is Thermo Fisher Scientific's annual report on Form 10-K for the fiscal year ended December 31, 2006. It provides information on the company's business operations and financial performance. Specifically, it discusses Thermo Fisher's merger with Fisher Scientific to create a global leader in serving science. It also describes the company's two business segments - Analytical Technologies and Laboratory Products and Services - and provides an overview of key product lines within the Analytical Technologies segment, including scientific instruments, biosciences products, and diagnostic and environmental instruments.
This document is Thermo Fisher Scientific's quarterly report filed with the SEC for the quarter ended March 31, 2007. It includes Thermo Fisher's consolidated balance sheet, statement of income, and notes on significant events from the quarter. The quarter saw revenues of $2.3 billion, operating income of $192 million, and net income of $139 million. Expenses increased along with revenues from the prior year quarter following Thermo Fisher's merger transactions.
This document is Thermo Fisher Scientific's quarterly report filed with the SEC for the quarter ended March 31, 2007. It includes Thermo Fisher's consolidated balance sheet, statement of income, and statement of cash flows for the quarter, as well as notes to the financial statements. The notes disclose that in the first quarter of 2007, Thermo Fisher acquired two businesses in Switzerland for $24 million and a small manufacturer of electrostatic discharge products for $5 million total. Thermo Fisher also paid $5 million for various acquisition-related costs and adjustments.
- Thermo Fisher Scientific Inc. filed a quarterly report with the SEC for the quarter ended June 30, 2007.
- The company reported revenues of $2.385.9 million for the quarter and income from continuing operations of $187.9 million.
- Thermo Fisher has major operations in scientific instrument manufacturing, life sciences, diagnostics, and laboratory products and services.
This document is Thermo Fisher Scientific's Form 10-Q quarterly report filed with the SEC for the quarter ended June 30, 2007. It provides financial statements and notes including the consolidated balance sheet, statement of income, and statement of cash flows for the quarter, as well as information on acquisitions, accounting policies, and segment information. In the quarter, Thermo Fisher reported revenues of $2.4 billion, net income of $164 million, and earnings per share of $0.39. It also acquired Spectronex AG and Flux AG for $24 million in cash to expand its mass spectrometry offerings.
This document is Thermo Fisher Scientific's quarterly report filed with the SEC for the quarter ended September 29, 2007. It provides financial statements including the consolidated balance sheet, statement of income, and statement of cash flows. Key details include total revenues of $2.4 billion for the quarter, net income of $218.5 million, and cash and cash equivalents increasing to $830.8 million. It also summarizes two acquisitions completed in the first nine months of 2007, expanding analytical technologies offerings.
This document is Thermo Fisher Scientific's quarterly report filed with the SEC for the quarter ended September 29, 2007. It provides Thermo Fisher's consolidated balance sheet and income statement for the periods shown. The balance sheet shows the company had total assets of $21.2 billion, including $8.5 billion in goodwill. Total liabilities were $6.7 billion and shareholders' equity was $14.4 billion. The income statement shows revenues of $2.4 billion for the quarter and net income of $218.5 million.
This document is Thermo Fisher Scientific's annual report on Form 10-K for the fiscal year ended December 31, 2007. It provides information on Thermo Fisher's business, including that it was formed through the merger of Thermo Electron and Fisher Scientific in 2006. Thermo Fisher has two principal brands, Thermo Scientific and Fisher Scientific, that serve over 350,000 customers in various industries through analytical instruments, equipment, consumables and services. The report provides an overview of Thermo Fisher's products and services and its strategy to continuously advance its technologies and services to address customers' emerging needs.
The document is Thermo Fisher Scientific's annual report on Form 10-K for the fiscal year ended December 31, 2007. It provides information on the company's business segments and products. Specifically, it discusses the company's two business segments - Analytical Technologies and Laboratory Products and Services. It provides details on the various product groupings within the Analytical Technologies segment, which serves markets like pharmaceutical, biotechnology, academic, and clinical laboratories.
Thermo Fisher Scientific filed a Form 10-Q with the SEC for the quarter ended March 29, 2008. The filing includes financial statements and notes. The financial statements show that Thermo Fisher's revenues increased to $2.55 billion for the quarter, up from $2.34 billion in the same quarter the previous year. Net income was $233 million compared to $139 million in the prior year. Thermo Fisher also acquired the intellectual property of an immunohistochemistry control slide business during the quarter for $3 million in cash plus potential future payments of up to $2 million.
Thermo Fisher Scientific filed a Form 10-Q with the SEC for the quarter ended March 29, 2008. The filing includes financial statements and notes. The financial statements show that Thermo Fisher's revenues increased to $2.55 billion for the quarter, up from $2.34 billion in the same quarter of the prior year. Net income for the quarter was $233 million compared to $139 million in the prior year. Thermo Fisher also acquired the intellectual property of an immunohistochemistry control slide business during the quarter for $3 million in cash plus potential future payments of up to $2 million.
This document is a quarterly report filed with the SEC by Thermo Fisher Scientific Inc. for the quarter ended September 27, 2008. It includes Thermo Fisher's consolidated balance sheet, statement of income, and statement of cash flows for the periods presented. Some key details:
- Thermo Fisher reported revenues of $2.6 billion for the quarter and $7.9 billion for the nine months ended September 27, 2008.
- Net income was $221.5 million for the quarter and $704 million for the nine months.
- In the first nine months of 2008, Thermo Fisher made several acquisitions for aggregate consideration of $142 million in cash, plus $8 million of assumed debt and up to $19
13 Jun 24 ILC Retirement Income Summit - slides.pptxILC- UK
ILC's Retirement Income Summit was hosted by M&G and supported by Canada Life. The event brought together key policymakers, influencers and experts to help identify policy priorities for the next Government and ensure more of us have access to a decent income in retirement.
Contributors included:
Jo Blanden, Professor in Economics, University of Surrey
Clive Bolton, CEO, Life Insurance M&G Plc
Jim Boyd, CEO, Equity Release Council
Molly Broome, Economist, Resolution Foundation
Nida Broughton, Co-Director of Economic Policy, Behavioural Insights Team
Jonathan Cribb, Associate Director and Head of Retirement, Savings, and Ageing, Institute for Fiscal Studies
Joanna Elson CBE, Chief Executive Officer, Independent Age
Tom Evans, Managing Director of Retirement, Canada Life
Steve Groves, Chair, Key Retirement Group
Tish Hanifan, Founder and Joint Chair of the Society of Later life Advisers
Sue Lewis, ILC Trustee
Siobhan Lough, Senior Consultant, Hymans Robertson
Mick McAteer, Co-Director, The Financial Inclusion Centre
Stuart McDonald MBE, Head of Longevity and Democratic Insights, LCP
Anusha Mittal, Managing Director, Individual Life and Pensions, M&G Life
Shelley Morris, Senior Project Manager, Living Pension, Living Wage Foundation
Sarah O'Grady, Journalist
Will Sherlock, Head of External Relations, M&G Plc
Daniela Silcock, Head of Policy Research, Pensions Policy Institute
David Sinclair, Chief Executive, ILC
Jordi Skilbeck, Senior Policy Advisor, Pensions and Lifetime Savings Association
Rt Hon Sir Stephen Timms, former Chair, Work & Pensions Committee
Nigel Waterson, ILC Trustee
Jackie Wells, Strategy and Policy Consultant, ILC Strategic Advisory Board
Discovering Delhi - India's Cultural Capital.pptxcosmo-soil
Delhi, the heartbeat of India, offers a rich blend of history, culture, and modernity. From iconic landmarks like the Red Fort to bustling commercial hubs and vibrant culinary scenes, Delhi's real estate landscape is dynamic and diverse. Discover the essence of India's capital, where tradition meets innovation.
Confirmation of Payee (CoP) is a vital security measure adopted by financial institutions and payment service providers. Its core purpose is to confirm that the recipient’s name matches the information provided by the sender during a banking transaction, ensuring that funds are transferred to the correct payment account.
Confirmation of Payee was built to tackle the increasing numbers of APP Fraud and in the landscape of UK banking, the spectre of APP fraud looms large. In 2022, over £1.2 billion was stolen by fraudsters through authorised and unauthorised fraud, equivalent to more than £2,300 every minute. This statistic emphasises the urgent need for robust security measures like CoP. While over £1.2 billion was stolen through fraud in 2022, there was an eight per cent reduction compared to 2021 which highlights the positive outcomes obtained from the implementation of Confirmation of Payee. The number of fraud cases across the UK also decreased by four per cent to nearly three million cases during the same period; latest statistics from UK Finance.
In essence, Confirmation of Payee plays a pivotal role in digital banking, guaranteeing the flawless execution of banking transactions. It stands as a guardian against fraud and misallocation, demonstrating the commitment of financial institutions to safeguard their clients’ assets. The next time you engage in a banking transaction, remember the invaluable role of CoP in ensuring the security of your financial interests.
For more details, you can visit https://technoxander.com.
Fabular Frames and the Four Ratio ProblemMajid Iqbal
Digital, interactive art showing the struggle of a society in providing for its present population while also saving planetary resources for future generations. Spread across several frames, the art is actually the rendering of real and speculative data. The stereographic projections change shape in response to prompts and provocations. Visitors interact with the model through speculative statements about how to increase savings across communities, regions, ecosystems and environments. Their fabulations combined with random noise, i.e. factors beyond control, have a dramatic effect on the societal transition. Things get better. Things get worse. The aim is to give visitors a new grasp and feel of the ongoing struggles in democracies around the world.
Stunning art in the small multiples format brings out the spatiotemporal nature of societal transitions, against backdrop issues such as energy, housing, waste, farmland and forest. In each frame we see hopeful and frightful interplays between spending and saving. Problems emerge when one of the two parts of the existential anaglyph rapidly shrinks like Arctic ice, as factors cross thresholds. Ecological wealth and intergenerational equity areFour at stake. Not enough spending could mean economic stress, social unrest and political conflict. Not enough saving and there will be climate breakdown and ‘bankruptcy’. So where does speculative design start and the gambling and betting end? Behind each fabular frame is a four ratio problem. Each ratio reflects the level of sacrifice and self-restraint a society is willing to accept, against promises of prosperity and freedom. Some values seem to stabilise a frame while others cause collapse. Get the ratios right and we can have it all. Get them wrong and things get more desperate.
Monthly Market Risk Update: June 2024 [SlideShare]Commonwealth
Markets rallied in May, with all three major U.S. equity indices up for the month, said Sam Millette, director of fixed income, in his latest Market Risk Update.
For more market updates, subscribe to The Independent Market Observer at https://blog.commonwealth.com/independent-market-observer.
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
Dr. Alyce Su Cover Story - China's Investment Leadermsthrill
In World Expo 2010 Shanghai – the most visited Expo in the World History
https://www.britannica.com/event/Expo-Shanghai-2010
China’s official organizer of the Expo, CCPIT (China Council for the Promotion of International Trade https://en.ccpit.org/) has chosen Dr. Alyce Su as the Cover Person with Cover Story, in the Expo’s official magazine distributed throughout the Expo, showcasing China’s New Generation of Leaders to the World.
KYC Compliance: A Cornerstone of Global Crypto Regulatory FrameworksAny kyc Account
This presentation explores the pivotal role of KYC compliance in shaping and enforcing global regulations within the dynamic landscape of cryptocurrencies. Dive into the intricate connection between KYC practices and the evolving legal frameworks governing the crypto industry.
How Poonawalla Fincorp and IndusInd Bank’s Co-Branded RuPay Credit Card Cater...beulahfernandes8
The eLITE RuPay Platinum Credit Card, a strategic collaboration between Poonawalla Fincorp and IndusInd Bank, represents a significant advancement in India's digital financial landscape. Spearheaded by Abhay Bhutada, MD of Poonawalla Fincorp, the card leverages deep customer insights to offer tailored features such as no joining fees, movie ticket offers, and rewards on UPI transactions. IndusInd Bank's solid banking infrastructure and digital integration expertise ensure seamless service delivery in today's fast-paced digital economy. With a focus on meeting the growing demand for digital financial services, the card aims to cater to tech-savvy consumers and differentiate itself through unique features and superior customer service, ultimately poised to make a substantial impact in India's digital financial services space.
2. Cautionary Note Regarding Forward
Looking Statements
• This presentation may include predictions, estimates or other information that is
not a statement of historical fact that might be considered forward-looking.
Reference is made in particular to forward-looking statements regarding
projections of our future financial performance, capital resources, anticipated
growth and trends in our business and in our industries, the anticipated impact of
acquisitions, potential stock repurchases and other characterizations of future
events. While these forward-looking statements represent our current judgment on
what the future holds, they are subject to risks and uncertainties that could cause
actual results to differ materially. Additional information concerning these risks and
uncertainties can be found in our most recent periodic reports filed with the U.S.
Securities and Exchange Commission. You are cautioned not to place undue
reliance on these forward-looking statements and please keep in mind that we are
not obligating ourselves to revise or publicly release the results of any revision to
these forward-looking statements.
2
3. Company Overview
• Headquartered in Cupertino, CA
• Founded in April 1982
• 4th Largest software maker in the world
• Global footprint with operations in 40
countries
• More than17,000 employees worldwide
• Leader in security, storage management
and data protection
• Strong brand equity
• Broad product portfolio serving a diverse
customer base ranging from individuals to
small businesses to large enterprises to
government
3
4. The Strategy
Secure Manage
Your
Information-
driven world
More
More
COMPLETELY &
RISKS &
EFFICIENTLY
POINTS
4
5. Consumers and Businesses
Want to Reduce Risks
• Keep Bad Things Out
• Define and Enforce Policies
• Standardize and Automate • Keep Good Things In
Your
Information-
driven world
• Ensure Regulations & • Keep Systems Up
Governance • Enable Rapid Recovery
5
6. Control Complexity
Information
Infrastructure Process
• Multiple platform and • Increasing data • Increasing cost and
tools complexity
• Different value and
• Physical and virtual • Manual processes
sensitivity
• Endpoint complexity • Structured and • Growing regulation
unstructured and governance
• Managed and
unmanaged
6
7. Symantec’s Five Engines of Growth
Grow our core/franchise businesses at, or above, market growth rate
1 - Security, data protection, and storage management
Scale high growth businesses to contribute to top-line growth
2 - Data loss prevention, archiving, compliance, and consumer services
Seed longer term growth by exploiting emerging trends
3 - Software-as-a-Service and virtualization
Grow faster than the market in the world’s fast-growing economies
4 - Eastern Europe, Russia, Middle East, Latin America, India, China
5 Use acquisitions to complement our portfolio growth strategy
7
9. Leading Security Brand and
Consumer Franchise
Loyal Customer Base Broad Channels
Retail Online
Stores Storefronts
56 Million
Active Users
ISPs OEMs
Extensive Product Line Leading Products
9
10. Symantec Enterprise Solutions
Endpoint Information Data Center
Security & Risk
Management Risk Management Transformation
Management
INFO RISK & BUSINESS
INFRASTRUCTURE
SECURITY STORAGE
OPERATIONS COMPLIANCE CONTINUITY
Security Server IT Storage Disaster
Management Management Compliance Management Recovery
Discovery & High
Endpoint Client Archiving
Retention Availability
Security Management
Management
Messaging Data
IT Service
Data Loss
Security Protection
Delivery
Prevention
Application Server
Messaging
Security Virtualization
Management
Endpoint
Virtualization
11
11. Long-Term Financial Objectives
• Grow revenue at or better than market
• Expand operating margins through growth and expense
discipline
– 100 basis points improvement per year
• Grow EPS faster than revenue
• Generate cash flow growth in line with revenue and
deferred revenue growth
• Balance use of cash between driving growth and share
repurchases
– Use half of CFFO for buy backs
11
14. Committed to Corporate
Responsibility
THE ENVIRONMENT
OUR COMMUNITIES
Member of the Green Grid; committed to providing
Cyber Awareness and Education
solutions which enable energy efficiency in the data
• Internet Keep Safe Coalition, National Cyber
center and beyond
Security Alliance, Web Wise Kids
Joined Sustainable Silicon Valley's Carbon Dioxide
Science and Technology Education Partnerships
Emissions Reduction Initiative
• Teach For America, Science Buddies, Symantec
Utah scholarship program. Dublin manufacturing site ISO 1400 certified, won 2006
National Repak Recycling Award – Best Preventative
Engagement via philanthropy and volunteerism
• Waste Management Program
Donated more than $16 million in cash and
software in FY08
• Employees volunteered 20,000+ hours in FY08
OUR EMPLOYEES AND SUPPLIERS GOVERNANCE
Signatory to the UN Global Compact
Global network of Diversity and Inclusion Councils
FTSE4Good Global Index
Symantec Women’s Action Network (SWAN)
Calvert Social Index
Supplier Diversity Programs
Dow Jones Sustainability North America Index
Support for the Universal Declaration on Human
Outperformed 94% of the companies in the S&P 500
Rights
and 99.7% of the companies in the Software & Services
Signatory to the Calvert Women’s Principles
group
14
15. Summary
• Strong brand equity
• Broad product portfolio across multiple segments and
geographies
• Significant global expansion opportunities
• Financial performance driven by:
– Revenue growth
– Ongoing expense discipline
• Focus on shareholder value
– Cash flow and earnings growth
– Maintaining share buyback
15