Orange business services contribution session 2 enterprise strategies against cyber threats
This presentation is the property of its rightful owner.
Sponsored Links
1 / 18

Orange Business Services Contribution Session 2: Enterprise Strategies Against Cyber Threats PowerPoint PPT Presentation


  • 49 Views
  • Uploaded on
  • Presentation posted in: General

Orange Business Services Contribution Session 2: Enterprise Strategies Against Cyber Threats. Nicolas Furge Security Services Director [email protected] agenda. Triggering factors to Digital security Our legitimacy The need for an Integrated end to end approach

Download Presentation

Orange Business Services Contribution Session 2: Enterprise Strategies Against Cyber Threats

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Orange business services contribution session 2 enterprise strategies against cyber threats

Orange Business Services ContributionSession 2: Enterprise Strategies Against Cyber Threats

Nicolas Furge

Security Services Director

[email protected]


Agenda

agenda

  • Triggering factors to Digital security

  • Our legitimacy

  • The need for an Integrated end to end approach

  • CyberSOC and Customers experience

  • Cyber Security pillars


Orange business services contribution session 2 enterprise strategies against cyber threats

Recent and extremely fast development of the cyber space

Pervasive mobility

BYOD

social networks,

big data

« everything in the cloud »


Evolution of threats

Evolution of threats


Orange business services contribution session 2 enterprise strategies against cyber threats

18

15

12

9

6

3

0

Melissa

Loveletter

time to compromise 10,000 systems (in hrs)

Kournikova

Code Red

Nimda

Goner

Klez

Slammer

LovSan

1998

1999

2000

2001

2002

2003

2005

2008

2011

2014

It takes less than ONE second for a threat to reach its target, and counter threat time to deploy is increasing year over year!

time taken to implement counter-measures (in hrs)

Zeus.D, Loic

presentation title


Agenda1

agenda

Triggering factors to Digital security

Our legitimacy

The need for an Integrated end to end approach

CyberSOC and Customers experience

Cyber Security pillars


Orange has owned and managed the largest voice and data network in the world

Orange has owned and managed the largest voice and data network in the world


Security has always been part of orange dna

security has always been part of Orange DNA

long proven experience in securing IP networks

30 years of security history

15 Orange Labs in the world

1 global CyberSOC and 8 Security Operation Centers (SOCs), ISAE* 3402

500+ managed customers (companies)

the largest IP network in the world

extensive skills in security management

More than 1000 security consultants around the world

More than 10 000 managed devices (customers)

More than 300.000 users of our strong authentication services

Distributed Denial of Services attempts on Orange French collection network:

  • + 300 attacks per week of more than 500 Mb/s

  • With peak at up to 10 Gb/s !

  • Average duration30mn to a couple of hours

  • Orange remedy:anti-DDOS solution in the network

* International Standards for Assurance Engagements (ISAE) No. 3402, Assurance Reports on Controls at a Service Organization


Agenda2

agenda

  • Triggering factors to Digital security

  • Our legitimacy

  • The need for an Integrated end to end approach

  • CyberSOC and Customers experience

  • Cyber Security pillars


A true holistic security requires an end to end approach

A true holistic security requiresan end to end approach

Professional Services

Solutions

Delivery Model

Consulting

Implementation


Integration of best in class technologies need to be mastered

Integration of best in class technologies need to bemastered

And a permanent watchdog activity to integrate the most technology advanced start-up security players


Agenda3

agenda

  • Triggering factors to Digital security

  • Our legitimacy

  • The need for an Integrated end to end approach

  • CyberSOC and Customers experience

  • Cyber Security pillars


The surveillance of security events has become a must have

the surveillance of security events has become a “must have”

  • SOCs have evolved from basic security management (ex: firewall rules management, proxy, filtering) to a complex set of security services (event analysis, business impact assessment, remediation, forensics analysis…)

  • Orange Business Services created the CyberSOC structure on top of its existing's legacy SOCs in order to deploy the new complex security services.


How cyberdefense supports competitiveness of the business a real case

how cyberdefense supports competitiveness of the business : a real case

  • one of the largest European industrial players in the car industry, 70 000 employees worldwide

  • highly competitive environment, huge pressure on costs

  • differentiates mainly through innovation, ie R&D

  • protection of industrial secret and availability of IT system are vital to the company

Orange solution

  • identified with customer the most critical data based on business criticity

  • jointly defined 30 threat scenarios based on business risk analysis

  • implemented surveillance of the defined critical perimeter

  • alerts customer in real time and conducts remediation

issues and challenges

  • migration of industrial IT to IP brings huge new threats

  • IT management is fully outsourced, increasing the risk of fraud


Large multinationals choose orange as their trusted partner in the digital world

large multinationals choose Orange as their trusted partner in the digital world

a major tobacco manufacturing company

(8 major brands >400b cigarettes, >10b$)

An industrial chemicals world wide leader

(80 countries, 50 000+ employees)

Multinational financial services company

(100b€, 70 countries, 180 000 emp., 76M customers)

A brewing and distribution player

(190 breweries, 70 countries, 60 000+ employees. )

Airline Catering Services

World wide presence

(120 locations)

A world wide Mining Company

(>50b$, >60 000 employees)


Agenda4

agenda

  • Triggering factors to Digital security

  • Our legitimacy

  • The need for an Integrated end to end approach

  • CyberSOC and Customers experience

  • Cyber Security pillars


Our recommendation a four step journey

our recommendation : a four-step journey

Re-assess the

strategy

Implement surveillance

4

Check for security wholes or breaches

3

Protect Data’s Input and Output

Manage the transformation

2

Elaborate a defense strategy

Identify the sensitive data’s and systems

1


Orange business services contribution session 2 enterprise strategies against cyber threats

Thank you

presentation title


  • Login