cybersecurity00701683df863e45695f-5b503b54027f220e7c4df8c160f6cdb2.r18.c… · mobile services...
TRANSCRIPT
CYBERSECURITY
Cybersecurity protects and enables your organization as it embraces Digital Transformation.
@Copyright Engineering. All rights reserved.
6
9
12
15
18
23
24
26
29
Cybersecurity protects and enables your organization
as it embraces Digital Transformation
1
CYBERSECURITY
WHAT ARE WE DISCUSSING?
What is Cybersecurity?
What does Cybersecurity mean for your organization?
Our Approach & Solutions
Govern digital identities and get ahead of compliance
Block cyber attacks building intelligence driven security operations
Data protection to grow your business while protecting your brand
Our Reference Cybersecurity Architecture
How will Cybersecurity evolve?
Engineering, an active player in the European Cybersecurity Strategy
1
2
3
4
5
6
Cybersecurity protects and enables your organization
as it embraces Digital Transformation
CYBERSECURITY
2
AUTHORS
Véronique PevtschinInnovation Manager Industry & Security, Research Lab Engineering
Building on 30 years of experience in physical and cyber security, Véronique
currently leads the innovation development for the Industry and Security Research
lab. She combines a hands-on experience in both embedded and high level systems
development, with a policy experience from her years working at the European
Commission. As an active member in European initiatives, Véronique chairs the
Cyber Security Working Group in EOS, which was instrumental in publishing
white papers that oriented the European Commission's strategy on cyber security.
Véronique graduated as an engineer from Brussels University and has a Master of
Science degree from MIT.
Elio Di SandroDirector of Offering & Solutions,
Cybertech Engineering Group
With over 35 years' experience in the IT
business, Elio has worked in Software
and IT Services & Consulting segments,
covering Technical, Sales and Managerial
roles in Italy, Europe and US. He
successfully ran international software and
IT service business units during a 28-year
career at IBM. As part of the board of
Directors, for the last 7 years Elio has been
responsible for the IT Security offering
and solutions' portfolio at OmnitechIT, a
specialized cybersecurity system integrator
now merged into the Engineering Group
with the brand Cybertech. Elio graduated in
Electronic Engineering, with an Executive
Master of Science in Information System
Governance.
Pablo CanestroSales Specialist, Engineering D.HUB
Pablo has spent 27 years in multiple
positions in Business Development, Sales
and Consultancy for leading ICT firms in
Digital Encryption, Multimedia Solutions,
Mobile Services & Cyber Security. He
worked in The Netherlands, UK & Italy
following the development of new business
streams. Pablo is an Electronic Engineer
in Argentina and got a master’s degree on
Electronic Engineering in the Netherlands.
He joined Engineering D.HUB mid-2018 to
strengthen and develop the Cyber Security
solutions team.
Envelope
Envelope
Cybersecurity protects and enables your organization
as it embraces Digital Transformation
CYBERSECURITY
3
A FEW WORDS
The world we live in is changing. More and more and at increasing speed. The
new technological frontiers make it possible to connect everything and everyone.
This transformation is driving innovation forward at an unprecedented speed,
introducing improvements in the way we live and work that until recently seemed
unimaginable.
This new world, made up of opportunities, must however be protected and only
the right mix of experience, skills and technologies will ensure a secure and
controlled transformation.
According to all leading international analysts, in the last few years the number of
serious computer threats has increased exponentially and is destined to continue
to grow.
This trend poses an important question for companies looking to embark on the
Digital Transformation journey: how can I make my Digital World a safe place for
customers, employees and partners?
Engineering guarantees constant IT security. Enterprises that choose our
approach to Cybersecurity can focus on growing and developing their
businesses, with a reliable partner at their side capable of training employees,
monitoring networks, safeguarding data and preventing cyber threats before they
have an impact on the business.
With over 550 Cybersecurity specialists who already protect more than 10
Petabytes of data, we boast one of the leading cybersecurity centres in Europe.
Moreover, our continuous investments in people and research ensure that our
approach to security is constantly evolving and in line with the complexity of our
world. We have the vision, the resources and the experience required to protect
your organisation while it embarks on its digital journey.
CYBERSECURITY
ENGINEERING'S RESEARCH ACTIVITIES IN CYBERSECURITY
Engineering has invested its cyber focused research activities in three directions:
■ novel approaches to train the employees and public servants to be able to better detect malicious cyber-attacks;
■ novel risk assessment and prioritisation of investment based on the economic impact of cyber threats;
■ increased contextualisation of cyber threat intelligence.
Engineering is member of European Organization for Security (EOS) and of European Cyber Security Organization (ECSO).
4 Certified Soc Tier IV, AGID, ISO27001/2013
450clients
43.2 Bln incidents per day
10 petabytes of data
21.000 servers
DETECTING
123 Bln liabilities per day
WE SECURE OVER
15%
35%50%
Methodology & Consulting
Senior Technical Professional
ProductSpecialist
WE MANAGE 1Security Academy Training School
Our specialized company in Cybersecurity Services
370categories
550securityspecialists certifiedIN OVER:
WE MANAGE
WE PROVIDE SECURITY SERVICES IN EUROPE, USA AND SOUTH AMERICA
As Chief Security Officer of over 11.000 employees and over 450
client organizations from all over the world, my job is to guarantee
and reassure them that they can trust that their data and assets are
secure. Without trust, change cannot be embraced. Security is not
(only) about technology, and not (only) about prevention: it is a cross
domain founding principle that allows people and organizations to
push forward in their Digital Transformation journey.
Digital Transformation, as well as Business Development, depend on
security just like we depend on air: it’s invisible yet without it there
can be no evolution, no life. Cybersecurity is about protecting and
ensuring measures are in place, not only to prevent threats, but
above all to allow transformation and growth, thus protecting all those
promises that our future holds.
Igor Kranjec Corporate CSO Chief Security Officer, Engineering
WHAT IS CYBERSECURITY?
1
CYBERSECURITY
Cybersecurity protects and enables your organization
as it embraces Digital Transformation
CYBERSECURITY
7
Within the Digital Transformation sphere, Cybersecurity can be defined as the set of
technologies, skills, processes and structures required to protect data, applications
and infrastructure from unauthorised access, damage or attacks.
The importance of adopting Cybersecurity goes hand in hand with the exponential
growth in the quantity and value of data available (code, content, images,
infographics, video, signals, etc.).
The Digital Transformation paradigm places two fundamental and diverging
imperatives on companies:
■ enabling and growing the business,
implementing online services
designed to interact securely with
employees, customers and partners,
and ensuring that their structure is
ever more efficient and agile so it
can respond quickly to new market
requirements
■ protecting the business from breaches
and unauthorised access and data,
thanks to controls designed to
safeguard the data wherever it may be
stored (mobile devices, laptops, data
centres and Clouds).
Cybersecurity protects and enables your organization
as it embraces Digital Transformation
CYBERSECURITY
8
INCREASED THREAT SURFACE
Cloud Mobility Social Media
Big Data I.O.T. Targeted Attacks
Insider Threat
ENABLE THE BUSINESS PROTECT THE BUSINESS
DELIVER NEW BUSINESS SERVICES BY SECURING ACCESS TO APPS AND DATA IN THE HYBRID CLOUD
SECURE THE MOBILE, CLOUD-CONNECTED ENTERPRISE
PROTECT CRITICAL ASSETS AGAINST INSIDER THREATS & EXTERNAL ATTACKS
In this context, Cybersecurity is a key component in the definition of a risk management
strategy and an enabling factor in the Digital Transformation process. Going beyond
IT security programs, there is, in fact, a structured set of technologies, skills and
processes designed to prevent, detect and react effectively against attacks on people,
data, applications and infrastructure.
Cyber attacks are inevitable and, when they occur, those in charge of Cybersecurity -
from security professionals to chief information security officers (CISOs) - must be ready.
What is needed is a strategy capable of ensuring that key corporate data and assets are
secure: a strategy that helps organisations understand and decide where and how to
invest. Teams must be prepared - as is the case with fire control plans - to act quickly and
efficiently. Who should be contacted? Which part of the company should be isolated? How
should the attack be communicated to customers, employees and partners?
A solid Cybersecurity strategy therefore becomes an integral part of an organisation,
extending from prevention and detection to reduce the occurrence of cyber attacks, to
mitigation to react to an attack when it occurs.
CYBERSECURITY
WHAT DOES CYBERSECURITY MEAN FOR YOUR ORGANIZATION?
2
Cybersecurity protects and enables your organization
as it embraces Digital Transformation
10
CYBERSECURITY
In order to protect and, at the same time, to enable an organisation’s digital business
within an ecosystem made up of customers, partners and employees, a company must
implement a holistic approach to Cybersecurity, the strategy of which is defined by three
key dimensions: people, processes and technologies.
It is believed that 90% of cyber attacks take advantage of people to gain access to key
corporate assets. An effective Cybersecurity strategy must therefore be an integral part of
the organisation and should consist of: prevention, interception and mitigation of the attack.
The prevention of a cyber attack starts from a 360° analysis of the company’s digital and
physical world. This inventory must take into consideration the risks related to:
■ material goods, which include not only
the devices or the networks, but also
smart buildings, logistics and smart
factories
■ intangible assets (often more at risk
than material ones), which include
trade secrets, marketing plans, pricing
strategies, roll-out deadlines, etc.
Cybersecurity protects and enables your organization
as it embraces Digital Transformation
11
CYBERSECURITY OUR CYBERSECURITY CHECK LIST
■ Cybersecurity is not only about technology, it is a fully-fledged strategy
■ Only you have the knowledge of how your business operates – do not let anyone else define what is important to protect
■ People are at the centre of Cybersecurity – make them part of your Cybersecurity strategy
■ Widen your thought process – do a 360° analysis of your important assets and keep it up to date
■ Assets relate to anything that is critical – buildings, vehicles, computers, networks, but as importantly trade secrets, marketing plans, pricing strategies
■ Check out the cascading effects of asset failure – how fast will a disruption spread? Where will it stop?
■ Invest in security awareness – train your workforce, work with your clients and partners
■ Prepare for cyber-attacks – expert support, communication plans, assets isolation, redundant processes
■ Govern the identities of the users of your systems - identity information is everywhere. Stay ahead of changing regulatory mandates, put dynamic controls in place
■ Share and check the European and world-wide trends – understand how well you are performing, set annual targets for improved Cybersecurity
■ Approach Cybersecurity as a digital transformation enabler, make it part of your business growth strategy
■ Set yourself a target on detection delay, analyse how you improve on this detection, keep up with the trends to see how well you are performing
■ Select your solutions and service providers with a clear set of criteria to ensure continuous coherence in the means deployed
An inventory of such assets is, however, only
the first step of a verification process that must
never stop. Continuously evolving connectivity
in fact creates an intrinsically dynamic level
of vulnerability, which in turn imposes a
dynamic identification and classification of the
organisation’s assets, in order to set priorities on
what should be protected.
In an effective prevention strategy, the most
important barrier to attacks therefore consists
in continuous staff training. It is the company’s
responsibility to promote a cyber-aware culture
that allows all employees (even those who are not
ICT experts) to feel that they are an integral part
of the corporate Cybersecurity processes.
The interception of a cyber attack is based on
the prompt interpretation of a series of data and
information, the importance of which must be
immediately recognised. It is therefore imperative
that teams have access to a variety of cyber-
threat intelligence sources and are able to provide
data that can be managed in terms of relevance,
quality and timeliness. An even more important
factor therefore consists of access to information
contextualised to the specific company and its
activities, together with the latter’s ability to take
the appropriate actions on these bases.
Cyber attacks are mitigated based on two key
criteria: efficiency and speed. Teams must be
prepared to react, knowing who to contact and
which part of the company must be isolated.
They must also be familiar with the protocol for
communicating the attack to customers, partners
and employees.
CYBERSECURITY
OUR APPROACH & SOLUTIONS
3
For a cruise line, security is a priority. We need to ensure the safety of
our guests and of our crew members. Cybersecurity for us goes well
beyond traditional IT security but also covers Operation Technology,
particularly all systems relating to navigation from the Bridge to the
Engine room. We rely on a specialized partner that is not only able to
cover all aspects of security but also appreciates the importance of
this as much as we do.
Franco Caraffi IT Director - Carnival Maritime Information Technology - Costa Group
Cybersecurity protects and enables your organization
as it embraces Digital Transformation
14
CYBERSECURITY
From a business point of view, our
approach to Cybersecurity is based on
three main pillars:
1. Governance of digital identities, with
a focus on anticipating compliance
and adequately verifying access to
key applications and data, aligning
the organisation’s audits, Lines of
Business (LOBs) and IT prospects
2. Blocking cyber attacks, with a focus on
intercepting and stopping advanced,
persistent and internal threats, taking
advantage of security activities built
on Artificial Intelligence and benefiting
from an effective automation and
an orderly organisation of Incident
Response (IR) processes and legal
audits
3. Data protection - within the B2E, B2C
and B2B business ecosystems - of
work plans and of the most important
assets in a company’s hybrid Cloud,
with a focus on mitigating data
risk, protecting the corporate brand
and enabling the company’s digital
business.
These three pillars offer an adequate
understanding and mitigation of
cyber risk, with the application of
priority countermeasures, both in the
organisational as well as the technological
realms. Based on this approach,
companies are able to:
■ ensure the reliability of business
activities, as well as the confidentiality,
availability, integrity and security of
information resources, together with
consistent BC-DC programs
■ maintain continuous and verifiable
regulatory compliance
■ follow a more secure Digital
Transformation path and adopt Cloud-
based solutions, in order to achieve
company growth, strengthen the brand,
ensure competitiveness and guarantee
greater flexibility.
Cybersecurity protects and enables your organization
as it embraces Digital Transformation
15
CYBERSECURITY
In most surveys, trust in Digital Identities occupies first place when talking about any
Digital Transformation initiative. Below we describe the business drivers of any "open"
company and some of the challenges that must be faced when it comes to Access
Identification and Management. Data and information
relating to identity is everywhere, attacks are constant, perimeter security
cannot provide an adequate level of protection and it is therefore essential to keep up
with changes in regulatory requirements.
Govern Digital Identities
Involving customers and partners
Customers and partners require an easy and safe user experience. Customers want
to use their own devices through a coherent experience on web and mobile platforms.
Being part of a company ecosystem, partners must be able to easily access the data
and information they need. But neither customers nor partners can be highly reliable
from a security point of view: centralised policy management practices must therefore be
implemented for all users.
Cybersecurity protects and enables your organization
as it embraces Digital Transformation
16
CYBERSECURITY
Providing easy access to employees, partners and customers
Double authentication methods and multiple passwords are proving
to be increasingly unsatisfactory. New access models are being implemented: their
selection and secure adoption must be part of an overall strategy. This is also a
key element to ensure the quality of the user experience.
Ensuring Compliance
Managing consent and compliance with regulatory requirements related to Personally
Identifiable
Information (PII) and with data confidentiality (GDPR) brings
the dimensions of transparency and responsibility into play.
Quickly adopting apps on the Cloud
With the explosion of cloud-based applications, IT risks related to credentials
must be fully managed from the start of any implementation. This applies to all customer,
partner and employee access. For example, when employees leave the company, their
accounts must be terminated and disconnected from all applications, both locally and in
the Cloud. Orphan accounts represent a risk that must be controlled.
Protecting corporate information
The main risks are internal threats and external attacks. External attacks very often
focus on accounts, particularly ones with greater access. In the event that the account
is breached, companies may experience serious harm. Appropriate controls must
therefore be implemented, to protect what an administrator can do, even after they have
authenticated. Thorough checks are needed to limit the potential damage caused by
malicious administrators and users (negligent). Ongoing monitoring and documentation
could help identify the root causes of a suspected breach.
Cybersecurity protects and enables your organization
as it embraces Digital Transformation
17
CYBERSECURITY
SPECIALIZED CONSULTING
BEST PRACTICES & STANDARDS
GRC TOOLS
TREATMENT PLAN EXECUTION
MONITORING
OUR APPROACH TO GDPR A COMPREHENSIVE READINESS PROGRAM TO ADDRESS GDPR AT ALL STAGES
ISO 27001 ISO 31000 ISO 29100
02 Data Discovery &
Classification, GRC lifecycle
03 Mitigation Plan and Risk
Treatment, Execute and Monitor
04 GRC Audit,
Risk Assess & Analysis, GDPR Legal,
IT Security Knowledge
01
OUR SECURITY PROGRAM IDENTITY Today, in the so-called “open” company, Digital Identities can be effectively managed only through a dedicated security program focused on identity and designed to:
■ Establish trust and ensure compliance, balance
the risk within and between companies,
applying and monitoring access permits with
two-factor authentication mechanisms (2FA)
and minimum privileges.
■ Anticipate and continuously monitor the latest
compliance requirements (GDPR, PSD2, NIS)
and the continuously changing government
policies on the matter.
■ Align auditors, Lines of Business and
IT prospects.
■ Use risk analytics and intelligence to represent
the user’s complex data and provide information
on risky users and internal threats.
■ Distribute requests and access certifications
that are easy to launch.
■ Leverage a company approach focused on
activities, to help managers understand and
certify access requests, by evaluating the nature
and impact on the business.
■ Enable risk and compliance managers to
obtain easy reports and audit tests, to manage
role mining, to clean up accounts, to perform
Segregation-of-Duties (SoD) checks and to
identify SoD scenarios and related breaches
quickly.
Cybersecurity protects and enables your organization
as it embraces Digital Transformation
18
CYBERSECURITY
Blocking cyber attacks
A “fluid” security perimeter, in continuous evolution, requires a holistic approach to the
operations needed to ensure an adequate control of the cyber risk and of the secure
enabling of the digital business.
This is precisely where the Intelligence-Driven Security Operation Centre (ISOC) comes
into play. The Centre offers a centralised system powered by Artificial Intelligence to
detect cybersecurity-related incidents and to facilitate the necessary reaction and
recovery actions.
Traditional SOCs protect organisations from the emergence of cyber threats (advanced
malware, compromised e-mails, targeted attacks) by primarily relying on preventive
technologies.
Cybersecurity protects and enables your organization
as it embraces Digital Transformation
19
CYBERSECURITY
ISOCs, on the other hand, rely on:
■ machine and deep learning, behavioural analysis of users and organisations,
enriched with threat-related intelligence, to verify suspicious and dangerous behaviour
based on an adaptive, conscious and holistic approach
■ new generation networks, servers, endpoints and Cloud security tools, in which AI
and advanced analytics are incorporated in all phases
■ Security Information and Event Management (SIEM) technology, which facilitates the
automatic identification of breaches through intelligence and the correlation of events
■ feeds sourced from the Network Operation Centre Alerting System, so that the
Network Operations Centre (NOC) can provide an early warning of potential
processes and the assets which, as a result of malicious activities, are consuming
standard resources (such as power, memory, bandwidth)
■ an architecture designed to automate security activities relating to multiple products
and to assign tasks to analysts with ease: the collaborative and interactive interface
of the Incident Response Automation & Orchestration platform (IR A&O) enables
security teams to investigate and trace events throughout the entire life cycle of the
incident, creating a single hub that guarantees consistent and compliant response
processes.
The adoption of this level of automation and architecture offers ISOC analysts the
following benefits:
■ context enrichment and the correlation/fusion of intelligence
■ evidence collection
■ notifications, escalation and reaction through automatic processes (digital cyber
playbook)
■ raw data processing with analytical algorithms and the presentation of the results
■ the elimination of manual work and the automation of repeatable processes
■ time savings and a reduction in the number of errors through deeper and more
comprehensive checks.
Cybersecurity protects and enables your organization
as it embraces Digital Transformation
20
CYBERSECURITY
Finally, Cyber Threat Intelligence (CTI) platforms, used together with advanced analytics
tools, SIEM and Incident Response platforms represent the “secret ingredient” of an
intelligent SOC, capable of supporting analysts in:
■ monitoring the underlying data
■ resolving outages
■ prioritising problems
■ sorting alerts
■ analysing attacks
■ performing effective forensic analyses.
All this makes it possible to reduce timeframes and ensure more efficient security
operations.
CYBERSECURITY
BLOCK CYBER ATTACKS – SOME USE CASES
The main goal of any cyber security strategy is to avoid cyber-attacks to actually
succeed. Let’s consider the following use cases.
ADVANCED THREAT DETECTION How can organizations address these concerns:
■ Identify threats in real time and escalate to identify the most critical ones.
■ Detect long and slow attacks. ■ Avoid alert fatigue and minimize the chance
of missing alerts in the noise of event data. ■ Identify threat actors, malware, campaigns
and the attack vectors exploited in the face of skills and knowledge gaps and ever growing threat variety. INSIDER THREATS
How can organizations address these concerns:
■ Have credentials been stolen via phishing or malware account takeover?
■ Are credentials being misused? ■ Are there double earners and career jumpers
stealing customer data and/or intellectual property?
■ Are users performing activities that are putting themselves and the organization at increased risk?
INCIDENT RESPONSE How can organizations address these concerns:
■ Understand step by step what happened in a security incident and breach.
■ Respond quickly and effectively to a security incident.
■ Maintain compliance with security incidents reporting and regulatory requirements.
■ Understand what threats the organization is experiencing and the effectiveness and cost of response and management constantly ready to respond to a breach or the next major zero-day attack.
Cybersecurity protects and enables your organization
as it embraces Digital Transformation
22
CYBERSECURITY
Aggregate Correlate
PROTECTION
Cyber Security Testers
GRC Audit AUDIT IT Operation –
Managed Services
Collect
Store
GA
TH
ER
SIEM SOAR
SOC
ENRICH & ANALYZE
IRT
Security Bulletin
CSIRT
L3 RESPOND
ALERT
SC
AN
THREAT INTELLIGENCE Feeds
L1 L2 DETECT Analytics Behavioural
Anomaly det.
Cybersecurity protects and enables your organization
as it embraces Digital Transformation
23
CYBERSECURITY
Data protection
MONITOR ACCESS
• Monitor and alert on attacks in real-time
• Identify suspicious activity
• Produce detailed compliance reports
HARDEN REPOSITORIES
• Encrypt and mask sensitive data
• Archive / purge dormant data
• Revoke dormant entitlements
DISCOVER INSIGHTS
• Optimize data retention over extended time periods, meet compliance mandates
• Enrich data, apply big data analytics to get insights on suspicious access patterns
ENFORCE POLICIES
• Take action in real-time
• Prevent unauthorized access to sensitive data
• Enforce change control
SAFEGUARD SENSITIVE DATA, PROTECT YOUR BRAND AND CRITICAL ASSETS
IDENTIFY RISK
• Discover and classify sensitive data
• Assess, map and prioritize vulnerabilities for structured and unstructured data, database, big data, file shares
• Visualize data-related business risk
We provide smarter data protection thanks to a multi-level, technological framework which
makes it possible to:
■ obtain information and, thanks to analytics, understand the associated risks, ensuring
that the continuously evolving threats are addressed proactively and in real time
■ manage repositories and automatically apply policies to protect data and reduce risks,
using as few resources as possible
■ improve the organisation’s approach to innovation while ensuring security.
When these key areas work together, organisations are able not only to protect their data,
but also to accelerate their business and technological processes.
For a company that manages a digital business, data is one of its most important
resources. Data is of such fundamental importance that when deciding to develop a
security program to protect an organisation’s most relevant assets, this is precisely
where we recommend starting from. Today, however, data security is constantly put to
the test by the fact that more and more information is changed, shared and stored with
processes which, if poorly managed, can lead to vulnerabilities. Moreover, the latest
regulations on privacy are creating ever more stringent requirements on how to manage
data, especially if related to individuals.
CYBERSECURITY
OUR REFERENCE CYBERSECURITY ARCHITECTURE
4
Cybersecurity protects and enables your organization
as it embraces Digital Transformation
25
CYBERSECURITY
Security Governance, Risk & Compliance
Security Assessment
En
d P
oin
t
Pro
tect
ion
& M
ob
ile
AP
I Man
agem
ent
Clo
ud
Sec
uri
ty
Net
wo
rk &
In
fras
tru
ctu
re
Ach
itec
ture
Dat
a A
rch
itec
ture
SaaS
PaaS
IaaS
Application
Data
Virtual Infrastructure
Server
Storage
Network
Identity & Access Administration and Governance
Data Protection
Security Analytics & Threat Intelligence
Network & Virtual Infrastructure
The challenges of transformation towards digital enterprise requires a new approach to
Cybersecurity: multidimensional, across different sectors and capable of fielding skills
and expertise based on technologies that combine proven threat detection techniques
(both known and unknown) offering advanced security features. In other words, each
and every approach to Cybersecurity must integrate with the knowledge and processes
already in place in the company, to ensure protection that is fully aligned with other
activities.
This is precisely why we developed a complete technology and a logical structure that
offer solutions as part of an integrated and transversal framework. For our customers, we
design, develop and implement integrated, multi-level Cybersecurity solutions, supporting
the secure supply of new digital services, while at the same time protecting access to
applications and data within the mobile, IoT and Cloud-connected enterprise. Based on
this approach, we are able to help our customers:
■ improve the visibility, control and ability to block the growing array and complexity of
cyber threats, for an adaptive and contextualised security solution
■ understand the flow of information and improve the ability to prevent, detect and react
to cyber threats
■ safeguard the organisation’s data in order to support the Digital Transformation
process.
CYBERSECURITY
HOW WILL CYBERSECURITY EVOLVE?
5
Cybersecurity protects and enables your organization
as it embraces Digital Transformation
27
CYBERSECURITY
The first trend directly concerns the information we rely on to take action. Today,
intelligence on cyber threats is widely available, although not always usable. Usability is
above all impeded by the acquisition of information from other continents; this causes a
very risky delay in detecting threats that are spreading ever closer to us.
Locating information related to cyber threats is therefore a priority, even if the enormous
quantity of intelligence data adds a fair bit of complexity to the process. It is necessary to
initiate a personalised and smart contextualisation of cyber-threat intelligence, based on
greater automation, on AI functionality and on a detailed learning of organisation-specific
processes and operations. The combination of digital tools with human intelligence is at
the very core of future efficiency in this regard.
Our way of dealing with Cybersecurity is affected by five main trends. For each
of them, Europe is taking important steps towards a concerted strategy aimed at
increasing the resilience to cyber-attacks, based on the coordination of response
and prevention processes.
1
The second trend concerns the fact that we live in a world in which sensors and actuators
are and will become more and more widespread, with technology and data moving along
our diverse networks.
The increase in intelligence and the connection of our physical world through the IoT,
combined with the arrival and diffusion of the 5G network, creates ever more fluid defence
perimeters, introducing a new wave of cyber threats. This will require a continuous
evolution of authentication and data validation methods, greater attention to the protection
of the IoT, in addition to a use of real time cryptographic transfers.
2
Cybersecurity protects and enables your organization
as it embraces Digital Transformation28
The third trend is represented by a focus on an increased level of centralisation through
platforms where services offered to users converge with new models characterised by
more immersive interaction.
Thanks to voice commands, facial recognition, biometric authentication and augmented
reality, users increasingly expect greater fluidity and ease of access to platforms, where a
range of business services and immersive interaction models converge. This will result in
faster authentication modes, without passwords, but completely secure.
3
The fourth trend relates to the increased awareness on the part of companies that their
exposure to Cybersecurity extends to both tangible and intangible assets and that the
economic impact linked to cyber threats must be quantified, like any other risk.
In Europe (as has been the case in the USA for some time now) IT insurance companies
are becoming promoters and, in some cases, Cybersecurity product and service brokers,
whose management and implementation is bound to change.
4
5 The fifth and last - but no less important - trend concerns our economies, which are
increasingly dependent on the cyber space. This has led to a greater awareness of the
need to fully understand and trust the range of digital devices and processes on which
everyday business operations are now based.
Companies must reassure customers, users and citizens that their data is processed
with full transparency and responsibility. The arrival and diffusion of the 5G network, the
installation of smart meters in homes, the growing use of online voting systems, self-
driving vehicles and public transport are just a few of the many examples illustrating just
how Cybersecurity and privacy protection represent a challenge that must be tackled.
Across all five trends, Europe has taken and continues to take concrete steps towards a concerted
strategy aimed at increasing the resilience to cyber attacks, focusing on developing response and
prevention processes characterised by enhanced capacity and coordination.
CYBERSECURITY
ENGINEERING, AN ACTIVE PLAYER IN THE EUROPEAN CYBERSECURITY STRATEGY
6
Cybersecurity protects and enables your organization
as it embraces Digital Transformation
CYBERSECURITY
30
Over the last few years, Engineering
has focused its research activities in the
Cybersecurity sphere in three key areas:
new approaches to training employees
and operators in the public space to be
able to discover malicious cyber attacks;
new risk assessment approaches;
definition of investment priorities based on
the economic impact of cyber threats and
their ever-increasing contextualisation.
The Engineering Group also collaborates
with ENISA, the European Union
Agency for Cybersecurity. A key initiative
has been the cooperation of ENISA
members on Cybersecurity Certificates
issued at European level, which will be
valid throughout Europe for a range of
products, processes and services.
Engineering has been an active player in European Cybersecurity since 2007. Within
the European Organisation for Security (EOS) we have actively promoted a coordinated
approach to Cybersecurity, with the adoption of a concerted strategy. Together with
leading security players in Europe, our commitment to promoting an action plan at
European level reached an important milestone with the private public Cybersecurity
partnership between the European Commission and industrial players through the
ECSO (the European Cyber Security Organisation).
Cybersecurity protects and enables your organization
as it embraces Digital Transformation
CYBERSECURITY
31
Engineering is one of the main players in the field of Digital Transformation of
public and private companies and organizations, offering an innovative range of
platforms for the main market segments.
ENGINEERING
With around 11,000 professionals in 65 locations (in Italy, Belgium, Germany, Norway,
Republic of Serbia, Spain, Sweden, Switzerland, Argentina, Brazil and the USA), the
Engineering Group designs, develops and manages innovative solutions for the business
areas where digitalization is having the biggest impact, including Digital Finance, Smart
Government & E-Health, Augmented City, Digital Industry, Smart Energy & Utilities, Digital
Telco & Multimedia.
Through its activities, the Group contributes to modernizing the world in which we live and
work, combining specialist competences in next-generation technologies, technological
infrastructures organized in a single hybrid multicloud and the capability to interpret new
business models.
With significant investments in R&D, Engineering plays a leading role in research, by
coordinating national and international projects thanks to its team of 420 researchers and
data scientists and a network of academic partners and universities throughout Europe.
One of the group’s key strategic assets is its employees’ know-how, to whose training it
has dedicated a multidisciplinary School which has provided more than 21,000 days of
training during the last year.
www.eng.it/en
CYBERSECURITY
www.eng.it