SlideShare a Scribd company logo
1 of 27
Think local, Be global




Kuala Lumpur, April 28th



Telefónica S.A
Global Security
Contents

     01           The project



     02           The trip



     03           Our Approach



     04           Extrapolating it to Global Anti-fraud
                  working group


Global Security                          1
Telefónica S.A
01
The Project




Global Security   2
Telefónica S.A
3 Security Operation Centers
 § Haga clic para modificar el estilo de texto del patrón
       •  Segundo nivel                                                        Madrid

             ›  Tercer nivel
                                                                Lima
                                                                       Sao
                                                                       Paulo




             To give service to all our customers in up to 20 local Operators
Global Security                             3
Telefónica S.A
02
The trip




Global Security   4
Telefónica S.A
Global Security   5
Telefónica S.A
Language



Global Security   6
Telefónica S.A
Cultural



Global Security   7
Telefónica S.A
Legal



Global Security   8
Telefónica S.A
Taxes



Global Security   9
Telefónica S.A
A few obstacles in our journey
 Diapositiva Muro
 § Haga clic para modificar el estilo de texto del patrón
       •  Segundo nivel
             ›  Tercer nivel




Global Security                        10
Telefónica S.A
Just an example



Global Security          11
Telefónica S.A
Mobile Security



Global Security   12
Telefónica S.A
What do you
understand for
Mobile Security?


Global Security   13
Telefónica S.A
How many of you think about…?




 § Malware on the mobile
 § Loss of important data:
       • Photos
       • e-mails
 § Being tracked

Global Security               14
Telefónica S.A
How many of you was thinking about…?
 § Mobile as a security guard
       •  As a device helping you   in
          case on an emergency
             ›  SOS
             ›  I’m safe
       •  Locale you or your family
          member if needed.




Global Security                          15
Telefónica S.A
03
Our Approach




Global Security   16
Telefónica S.A
Building a common framework


                         People




       Platforms



                                  Process

Global Security     17
Telefónica S.A
Operation model scheme
  n    Spain, Perú, and Brazil have been selected to be provider OBs due to expertise (Spain, Perú) and
        market potential (Brazil).
  n    In the resulting model the commercialising OBs must interface with the Global SOCs through a
        set of Business Support Systems
                       Security Operation
                         Centers (SOCs)

                                                                                                                 GLOBAL                          MSS
                                                      GLOBAL                         ESPAÑA **                SOC 3 (BRASIL)
                                                    SOC 2 (PERÚ)                   (Lead Provider                (Povider                        BSS
                                                      (Povider                           &                           &
                                                         &                        Commercializing)           Commercializing)
                                                   Commercializing)
    Managed Security
     Services (MSS)




                                               Ordering               Billing                  CMDB             Trouble ticketing




                                                                                                                                                 Cost
                       Commercializing
                           OBs




                                            Commercializing     Commercializing     Commercializing   Commercializing          Commercializing
                                             OB1 (LATAM)         OB2 (LATAM)         OB3 (EUROPA)      OB4 (EUROPA)               MNCs




Global Security                                                                         18
Telefónica S.A
Local and Global Process

  n  In
       order to allow SOCs to communicate with each other, balance workloads, receive work
     orders from commercializing OBs, and provide trouble ticketing for complex issues (L2,
     L3) we will need to implement a central tool for Managed Security Services Business
     Support Systems


                                       Receiving
          Activity       Source Unit     unit       System     Only two areas in
      Presales               OB           OB         Local     commercializing OBs need to
      Sales                  OB           OB         Local     interface with the MSS BSS:
      Provisioning           OB          SOC         Global    n Sales   back office
      Service delivery      SOC           OB         Global    n Service   desk
      Ticketing              OB          SOC         Global
                                                               No integration necessary with
      Reports               SOC           OB         Global
                                                               local tools
      SOC->OB billing       SOC           OB         Global
      Customer billing       OB           OB         Local




Global Security                                19
Telefónica S.A
Advantage of global services
                                                 Telefónica Global SOC Strategy:
  Enables an efficient operation of the SOCs
        n      Through common tools and procedures set by the Security Vertical
        n      Supported on a virtualized architecture that allows all SOCs to
                operate on the same platform and enables workload distribution                                              Madrid
                across centres
        n      With specialised reports for customers and internal use
  Allows operators to focus on commercial activity and basic support
                                                                                                          Lima
              n     Providing clear costs and simple ordering and provisioning for the
                                                                                                                  Sao
                      services commercialized to facilitate creation of customer offers                           Paulo
              n     Facilitating access to knowledge sharing tools to provide 1st level
                       support and unified trouble ticketing for more complex issues


  + A Global SOC network provides efficiency                                 + A Global SOC network enables superior service
        n     Workload distribution                                             n    Homogeneous service portfolio at the same time
                –    Mitigate effect of peak demand hours to serve                     across footprint (Key for MNC customers)
                     more customers                                              n    Add to credibility (analysts and opinion leaders):
                –    Enable follow the sun strategy or absorb more                     Top service providers’ SOCs are interconnected
                     activity in lower-cost locations                            n    Security threats are inter-related so servicing
        n     Increased leverage in partner negotiations                              more clients
        n     Sharing virtualized tools and processes: build                          –    Facilitates early detection of threats
               once exploit n times across footprint                                   –    Enables a coordinated response
        n     Expensive expert resources shared across                          n    Truly redundant operations in case of local
               geographies                                                             contingencies


Global Security                                                         20
Telefónica S.A
Much work already done and much to do…
Global Security
Telefónica S.A
                    21
04
Just extrapolate our
small project to Global
Antifraud working-
group


Global Security   22
Telefónica S.A
Standardize, Standardize, Standardize…
 § Remember the old days in Phishing fight:
       •  When phishing was “fishing, pishing, piching and who know what else”
             ›  Phishing complains was using the terms “Copyright misuse, abuse”
             ›  So at the beginning in Europe was poorly attended because was associated to
                  Copyright and Privacy is a value with major protection so every answer was to
                  forward to “justice tutelage”
 § Phishing now is well covered but what happens with new problems.

 § Why not impulse standard efforts?
 § ARF, IODEF
       •  Please remember time zone stamp –
       How many complains reaches dev- null due to fault
       of time accuracy.



Global Security                                    23
Telefónica S.A
Standardize, Standardize, Standardize…
 § Alliances and Collaboration
       •  Our target is common, avoid fraud.




Global Security                                24
Telefónica S.A
Terima kasih banyak
Thank you
Gracias




Kuala Lumpur, April 28th



Telefónica S.A
Global Security
Global Security            25
Telefónica S.A
Global Security   26
Telefónica S.A

More Related Content

What's hot

Marketing And Sales Strategies In Evolving Telecoms 2008 Tomas Trejbal
Marketing And Sales Strategies In Evolving Telecoms 2008 Tomas TrejbalMarketing And Sales Strategies In Evolving Telecoms 2008 Tomas Trejbal
Marketing And Sales Strategies In Evolving Telecoms 2008 Tomas TrejbalTomas Trejbal
 
TV as enhanced communicator using RCS
TV as enhanced communicator using RCSTV as enhanced communicator using RCS
TV as enhanced communicator using RCSSolaiemes
 
Scenarios for-context-aware-sip-07-a t kishore.pdf
Scenarios for-context-aware-sip-07-a t kishore.pdfScenarios for-context-aware-sip-07-a t kishore.pdf
Scenarios for-context-aware-sip-07-a t kishore.pdfAT Kishore
 
07 a t kishore.pdf
07 a t kishore.pdf07 a t kishore.pdf
07 a t kishore.pdfAT Kishore
 
Service Delivery Platform
Service Delivery PlatformService Delivery Platform
Service Delivery PlatformPitra Satvika
 

What's hot (9)

Marketing And Sales Strategies In Evolving Telecoms 2008 Tomas Trejbal
Marketing And Sales Strategies In Evolving Telecoms 2008 Tomas TrejbalMarketing And Sales Strategies In Evolving Telecoms 2008 Tomas Trejbal
Marketing And Sales Strategies In Evolving Telecoms 2008 Tomas Trejbal
 
Ran Oz Big Band
Ran Oz   Big BandRan Oz   Big Band
Ran Oz Big Band
 
TV as enhanced communicator using RCS
TV as enhanced communicator using RCSTV as enhanced communicator using RCS
TV as enhanced communicator using RCS
 
Gmv Sgi Corporativa Ing10v1
Gmv Sgi Corporativa Ing10v1Gmv Sgi Corporativa Ing10v1
Gmv Sgi Corporativa Ing10v1
 
Telefonica Digital 2012
Telefonica Digital 2012Telefonica Digital 2012
Telefonica Digital 2012
 
Scenarios for-context-aware-sip-07-a t kishore.pdf
Scenarios for-context-aware-sip-07-a t kishore.pdfScenarios for-context-aware-sip-07-a t kishore.pdf
Scenarios for-context-aware-sip-07-a t kishore.pdf
 
07 a t kishore.pdf
07 a t kishore.pdf07 a t kishore.pdf
07 a t kishore.pdf
 
Service Delivery Platform
Service Delivery PlatformService Delivery Platform
Service Delivery Platform
 
10 fn s14
10 fn s1410 fn s14
10 fn s14
 

Similar to Think Local, Be Global

Cisco Case Analysis
Cisco Case AnalysisCisco Case Analysis
Cisco Case Analysisperk2624
 
PFSWeb Inc. Financial Market Roadshow Presentation
PFSWeb Inc. Financial Market Roadshow PresentationPFSWeb Inc. Financial Market Roadshow Presentation
PFSWeb Inc. Financial Market Roadshow PresentationCompany Spotlight
 
Wso2esb sap-jkh-v2.0
Wso2esb sap-jkh-v2.0Wso2esb sap-jkh-v2.0
Wso2esb sap-jkh-v2.0WSO2
 
Comarch Telecoms Business Unit - Overview
Comarch Telecoms Business Unit - OverviewComarch Telecoms Business Unit - Overview
Comarch Telecoms Business Unit - OverviewComarch
 
Unifying the Service Layer for Transformation
Unifying the Service Layer for TransformationUnifying the Service Layer for Transformation
Unifying the Service Layer for TransformationSigma Systems
 
Development and Third Party Maintenance for the IBM Mainframe (L. De Bruyn)
Development and Third Party Maintenance for the IBM Mainframe (L. De Bruyn)Development and Third Party Maintenance for the IBM Mainframe (L. De Bruyn)
Development and Third Party Maintenance for the IBM Mainframe (L. De Bruyn)NRB
 
Pitch book -NCR Corporation
Pitch book -NCR Corporation Pitch book -NCR Corporation
Pitch book -NCR Corporation Tushar Parekh
 
Contino Webinar - Migrating your Trading Workloads to the Cloud
Contino Webinar -  Migrating your Trading Workloads to the CloudContino Webinar -  Migrating your Trading Workloads to the Cloud
Contino Webinar - Migrating your Trading Workloads to the CloudBen Saunders
 
Technology Review | In Focus: Customers & Product
Technology Review | In Focus: Customers & ProductTechnology Review | In Focus: Customers & Product
Technology Review | In Focus: Customers & ProductComarch
 
FITT Toolbox: Open Source Business Model
FITT Toolbox: Open Source Business ModelFITT Toolbox: Open Source Business Model
FITT Toolbox: Open Source Business ModelFITT
 
FITT Toolbox: Open Source Business Model
FITT Toolbox: Open Source Business ModelFITT Toolbox: Open Source Business Model
FITT Toolbox: Open Source Business ModelFITT
 
Vonnue Profile for SES (1).pdf
Vonnue Profile for SES  (1).pdfVonnue Profile for SES  (1).pdf
Vonnue Profile for SES (1).pdfAnishMathew70
 
Tues1200 integration brokers-andrazzmajsek-simobil
Tues1200 integration brokers-andrazzmajsek-simobilTues1200 integration brokers-andrazzmajsek-simobil
Tues1200 integration brokers-andrazzmajsek-simobileurocloud
 
2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...
2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...
2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...Club Alliances
 
Technology Review | In Focus: Next Generation Service Management
Technology Review | In Focus: Next Generation Service ManagementTechnology Review | In Focus: Next Generation Service Management
Technology Review | In Focus: Next Generation Service ManagementComarch
 
Evolution of the Telco Services Plane, Greg Sikora, TADSummit 2018
Evolution of the Telco Services Plane, Greg Sikora, TADSummit 2018Evolution of the Telco Services Plane, Greg Sikora, TADSummit 2018
Evolution of the Telco Services Plane, Greg Sikora, TADSummit 2018Alan Quayle
 

Similar to Think Local, Be Global (20)

Selis
SelisSelis
Selis
 
Cisco Case Analysis
Cisco Case AnalysisCisco Case Analysis
Cisco Case Analysis
 
resume_Deepak
resume_Deepakresume_Deepak
resume_Deepak
 
PFSWeb Inc. Financial Market Roadshow Presentation
PFSWeb Inc. Financial Market Roadshow PresentationPFSWeb Inc. Financial Market Roadshow Presentation
PFSWeb Inc. Financial Market Roadshow Presentation
 
Wso2esb sap-jkh-v2.0
Wso2esb sap-jkh-v2.0Wso2esb sap-jkh-v2.0
Wso2esb sap-jkh-v2.0
 
Comarch Telecoms Business Unit - Overview
Comarch Telecoms Business Unit - OverviewComarch Telecoms Business Unit - Overview
Comarch Telecoms Business Unit - Overview
 
Unifying the Service Layer for Transformation
Unifying the Service Layer for TransformationUnifying the Service Layer for Transformation
Unifying the Service Layer for Transformation
 
Development and Third Party Maintenance for the IBM Mainframe (L. De Bruyn)
Development and Third Party Maintenance for the IBM Mainframe (L. De Bruyn)Development and Third Party Maintenance for the IBM Mainframe (L. De Bruyn)
Development and Third Party Maintenance for the IBM Mainframe (L. De Bruyn)
 
Pitch book -NCR Corporation
Pitch book -NCR Corporation Pitch book -NCR Corporation
Pitch book -NCR Corporation
 
CA
CACA
CA
 
Contino Webinar - Migrating your Trading Workloads to the Cloud
Contino Webinar -  Migrating your Trading Workloads to the CloudContino Webinar -  Migrating your Trading Workloads to the Cloud
Contino Webinar - Migrating your Trading Workloads to the Cloud
 
Spotlight On Enterprise SBCs
Spotlight On Enterprise SBCsSpotlight On Enterprise SBCs
Spotlight On Enterprise SBCs
 
Technology Review | In Focus: Customers & Product
Technology Review | In Focus: Customers & ProductTechnology Review | In Focus: Customers & Product
Technology Review | In Focus: Customers & Product
 
FITT Toolbox: Open Source Business Model
FITT Toolbox: Open Source Business ModelFITT Toolbox: Open Source Business Model
FITT Toolbox: Open Source Business Model
 
FITT Toolbox: Open Source Business Model
FITT Toolbox: Open Source Business ModelFITT Toolbox: Open Source Business Model
FITT Toolbox: Open Source Business Model
 
Vonnue Profile for SES (1).pdf
Vonnue Profile for SES  (1).pdfVonnue Profile for SES  (1).pdf
Vonnue Profile for SES (1).pdf
 
Tues1200 integration brokers-andrazzmajsek-simobil
Tues1200 integration brokers-andrazzmajsek-simobilTues1200 integration brokers-andrazzmajsek-simobil
Tues1200 integration brokers-andrazzmajsek-simobil
 
2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...
2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...
2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...
 
Technology Review | In Focus: Next Generation Service Management
Technology Review | In Focus: Next Generation Service ManagementTechnology Review | In Focus: Next Generation Service Management
Technology Review | In Focus: Next Generation Service Management
 
Evolution of the Telco Services Plane, Greg Sikora, TADSummit 2018
Evolution of the Telco Services Plane, Greg Sikora, TADSummit 2018Evolution of the Telco Services Plane, Greg Sikora, TADSummit 2018
Evolution of the Telco Services Plane, Greg Sikora, TADSummit 2018
 

More from Leonardo Amor

Sinfonier Storm Builder for Security Intelligence
Sinfonier Storm Builder for Security IntelligenceSinfonier Storm Builder for Security Intelligence
Sinfonier Storm Builder for Security IntelligenceLeonardo Amor
 
Join the phishing dots to detect suspicious mobile apps
Join the phishing dots to detect suspicious mobile appsJoin the phishing dots to detect suspicious mobile apps
Join the phishing dots to detect suspicious mobile appsLeonardo Amor
 
Be More Dog, Enise 2013
Be More Dog, Enise 2013Be More Dog, Enise 2013
Be More Dog, Enise 2013Leonardo Amor
 
Managed Security Services as a Formula1 race
Managed Security Services as a Formula1 raceManaged Security Services as a Formula1 race
Managed Security Services as a Formula1 raceLeonardo Amor
 
Ya están dentro ¿y Ahora qué?
Ya están dentro ¿y Ahora qué?Ya están dentro ¿y Ahora qué?
Ya están dentro ¿y Ahora qué?Leonardo Amor
 
Proteccion moviles Monterrey
Proteccion moviles MonterreyProteccion moviles Monterrey
Proteccion moviles MonterreyLeonardo Amor
 
Protege tu empresa en la era Wikileaks
Protege tu empresa en la era WikileaksProtege tu empresa en la era Wikileaks
Protege tu empresa en la era WikileaksLeonardo Amor
 
El papel de la seguridad en la era PostPc
El papel de la seguridad en la era PostPcEl papel de la seguridad en la era PostPc
El papel de la seguridad en la era PostPcLeonardo Amor
 
Protege los dispositivos móviles de tu empresa
Protege los dispositivos móviles de tu empresaProtege los dispositivos móviles de tu empresa
Protege los dispositivos móviles de tu empresaLeonardo Amor
 
3G Dialers, A New Demon with an Old Scan
3G Dialers, A New Demon with an Old Scan3G Dialers, A New Demon with an Old Scan
3G Dialers, A New Demon with an Old ScanLeonardo Amor
 

More from Leonardo Amor (10)

Sinfonier Storm Builder for Security Intelligence
Sinfonier Storm Builder for Security IntelligenceSinfonier Storm Builder for Security Intelligence
Sinfonier Storm Builder for Security Intelligence
 
Join the phishing dots to detect suspicious mobile apps
Join the phishing dots to detect suspicious mobile appsJoin the phishing dots to detect suspicious mobile apps
Join the phishing dots to detect suspicious mobile apps
 
Be More Dog, Enise 2013
Be More Dog, Enise 2013Be More Dog, Enise 2013
Be More Dog, Enise 2013
 
Managed Security Services as a Formula1 race
Managed Security Services as a Formula1 raceManaged Security Services as a Formula1 race
Managed Security Services as a Formula1 race
 
Ya están dentro ¿y Ahora qué?
Ya están dentro ¿y Ahora qué?Ya están dentro ¿y Ahora qué?
Ya están dentro ¿y Ahora qué?
 
Proteccion moviles Monterrey
Proteccion moviles MonterreyProteccion moviles Monterrey
Proteccion moviles Monterrey
 
Protege tu empresa en la era Wikileaks
Protege tu empresa en la era WikileaksProtege tu empresa en la era Wikileaks
Protege tu empresa en la era Wikileaks
 
El papel de la seguridad en la era PostPc
El papel de la seguridad en la era PostPcEl papel de la seguridad en la era PostPc
El papel de la seguridad en la era PostPc
 
Protege los dispositivos móviles de tu empresa
Protege los dispositivos móviles de tu empresaProtege los dispositivos móviles de tu empresa
Protege los dispositivos móviles de tu empresa
 
3G Dialers, A New Demon with an Old Scan
3G Dialers, A New Demon with an Old Scan3G Dialers, A New Demon with an Old Scan
3G Dialers, A New Demon with an Old Scan
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Think Local, Be Global

  • 1. Think local, Be global Kuala Lumpur, April 28th Telefónica S.A Global Security
  • 2. Contents 01 The project 02 The trip 03 Our Approach 04 Extrapolating it to Global Anti-fraud working group Global Security 1 Telefónica S.A
  • 3. 01 The Project Global Security 2 Telefónica S.A
  • 4. 3 Security Operation Centers § Haga clic para modificar el estilo de texto del patrón •  Segundo nivel Madrid ›  Tercer nivel Lima Sao Paulo To give service to all our customers in up to 20 local Operators Global Security 3 Telefónica S.A
  • 5. 02 The trip Global Security 4 Telefónica S.A
  • 6. Global Security 5 Telefónica S.A
  • 7. Language Global Security 6 Telefónica S.A
  • 8. Cultural Global Security 7 Telefónica S.A
  • 9. Legal Global Security 8 Telefónica S.A
  • 10. Taxes Global Security 9 Telefónica S.A
  • 11. A few obstacles in our journey Diapositiva Muro § Haga clic para modificar el estilo de texto del patrón •  Segundo nivel ›  Tercer nivel Global Security 10 Telefónica S.A
  • 12. Just an example Global Security 11 Telefónica S.A
  • 13. Mobile Security Global Security 12 Telefónica S.A
  • 14. What do you understand for Mobile Security? Global Security 13 Telefónica S.A
  • 15. How many of you think about…? § Malware on the mobile § Loss of important data: • Photos • e-mails § Being tracked Global Security 14 Telefónica S.A
  • 16. How many of you was thinking about…? § Mobile as a security guard •  As a device helping you in case on an emergency ›  SOS ›  I’m safe •  Locale you or your family member if needed. Global Security 15 Telefónica S.A
  • 17. 03 Our Approach Global Security 16 Telefónica S.A
  • 18. Building a common framework People Platforms Process Global Security 17 Telefónica S.A
  • 19. Operation model scheme n  Spain, Perú, and Brazil have been selected to be provider OBs due to expertise (Spain, Perú) and market potential (Brazil). n  In the resulting model the commercialising OBs must interface with the Global SOCs through a set of Business Support Systems Security Operation Centers (SOCs) GLOBAL MSS GLOBAL ESPAÑA ** SOC 3 (BRASIL) SOC 2 (PERÚ) (Lead Provider (Povider BSS (Povider & & & Commercializing) Commercializing) Commercializing) Managed Security Services (MSS) Ordering Billing CMDB Trouble ticketing Cost Commercializing OBs Commercializing Commercializing Commercializing Commercializing Commercializing OB1 (LATAM) OB2 (LATAM) OB3 (EUROPA) OB4 (EUROPA) MNCs Global Security 18 Telefónica S.A
  • 20. Local and Global Process n  In order to allow SOCs to communicate with each other, balance workloads, receive work orders from commercializing OBs, and provide trouble ticketing for complex issues (L2, L3) we will need to implement a central tool for Managed Security Services Business Support Systems Receiving Activity Source Unit unit System Only two areas in Presales OB OB Local commercializing OBs need to Sales OB OB Local interface with the MSS BSS: Provisioning OB SOC Global n Sales back office Service delivery SOC OB Global n Service desk Ticketing OB SOC Global No integration necessary with Reports SOC OB Global local tools SOC->OB billing SOC OB Global Customer billing OB OB Local Global Security 19 Telefónica S.A
  • 21. Advantage of global services Telefónica Global SOC Strategy: Enables an efficient operation of the SOCs n  Through common tools and procedures set by the Security Vertical n  Supported on a virtualized architecture that allows all SOCs to operate on the same platform and enables workload distribution Madrid across centres n  With specialised reports for customers and internal use Allows operators to focus on commercial activity and basic support Lima n  Providing clear costs and simple ordering and provisioning for the Sao services commercialized to facilitate creation of customer offers Paulo n  Facilitating access to knowledge sharing tools to provide 1st level support and unified trouble ticketing for more complex issues + A Global SOC network provides efficiency + A Global SOC network enables superior service n  Workload distribution n  Homogeneous service portfolio at the same time –  Mitigate effect of peak demand hours to serve across footprint (Key for MNC customers) more customers n  Add to credibility (analysts and opinion leaders): –  Enable follow the sun strategy or absorb more Top service providers’ SOCs are interconnected activity in lower-cost locations n  Security threats are inter-related so servicing n  Increased leverage in partner negotiations more clients n  Sharing virtualized tools and processes: build –  Facilitates early detection of threats once exploit n times across footprint –  Enables a coordinated response n  Expensive expert resources shared across n  Truly redundant operations in case of local geographies contingencies Global Security 20 Telefónica S.A
  • 22. Much work already done and much to do… Global Security Telefónica S.A 21
  • 23. 04 Just extrapolate our small project to Global Antifraud working- group Global Security 22 Telefónica S.A
  • 24. Standardize, Standardize, Standardize… § Remember the old days in Phishing fight: •  When phishing was “fishing, pishing, piching and who know what else” ›  Phishing complains was using the terms “Copyright misuse, abuse” ›  So at the beginning in Europe was poorly attended because was associated to Copyright and Privacy is a value with major protection so every answer was to forward to “justice tutelage” § Phishing now is well covered but what happens with new problems. § Why not impulse standard efforts? § ARF, IODEF •  Please remember time zone stamp – How many complains reaches dev- null due to fault of time accuracy. Global Security 23 Telefónica S.A
  • 25. Standardize, Standardize, Standardize… § Alliances and Collaboration •  Our target is common, avoid fraud. Global Security 24 Telefónica S.A
  • 26. Terima kasih banyak Thank you Gracias Kuala Lumpur, April 28th Telefónica S.A Global Security Global Security 25 Telefónica S.A
  • 27. Global Security 26 Telefónica S.A