Download presentation
Presentation is loading. Please wait.
1
Securing your digital transformation
Critical Information systems and Cybersecurity Check content Check English writing Design presentation
2
In a world that is increasingly fast moving, unpredictable and full of opportunities, “digital” and “cybersecurity” now permeate every aspect of our business activities and daily lives (Our mission ) To be an accelerator of the secured digital transformation of our customers who have
3
Massive disruptions in our environment
Software is eating the world Data is the new oil Analytics is the new engine Everything is sold as a service Cybersecurity is paramount Internet of Things connects billons of smart devices Everybody is moving to the Cloud
4
Regulatory bodies are taking action Setting standards and regulations
A moving environment, facing the increasing number and complexity of cyber attacks Regulatory bodies are taking action 94% of companies use digital transformation technologies with sensitive data* 67% of companies have now been breached* Setting standards and regulations Estimated cost of the 2017 “NotPetya” attack for one single company +250 M€ PASSI PRIS PDIS NIS GDPR Digital Transformation of "essential operators and governments" - our clients - raises Issues about cyber security and safety. Growing threat: persistent, targeted attacks Growing awareness of governments, critical infrastructure providers and company customers Crucial importance of data protection in cyberspace Rapid detection and response capabilities required 2017 Thales Data Threat Report Vormetric attackers relied on a massive botnet of over 100,000 poorly protected and compromised (IoT) devices to overload the servers at DNS provider Dyn and disrupt Internet services in two-thirds of the U.S., rather than attacking Dyn directly. “Nearly two-thirds (63%) of companies are using SaaS Increased spending on security notwithstanding, this year’s study saw the percentage of organizations that have been successfully breached at some time in the past rise to 67.8%, up considerably from 61.1% last year, while those breached in the past 12 months also rose significantly to 26.1%, up from 21.7% a year earlier. Among the hardest hit geographies and industry verticals were Australia, where a full 44% of respondents reported a breach in the past year, and retail (43% globally). *According to Thales 2018 Data Threat Report
5
No digital transformation without trust
No digital transformation without trust No trust without cyber security.
6
Organizations dealing with critical business processes and sensitive data rely on Thales to secure their digital transformation (Our mission) To be an accelerator of the secured digital transformation of its customers Partenaire de confiance de grands intégrateurs systèmes + stratégie de plate-forme / approche service ; proposition de valeur de services de sécurité.
7
Critical Information systems and Cybersecurity
Thales, the trusted partner at the heart of your digital transformation Critical Information systems and Cybersecurity SECURITY FOR OPERATION AND SECURITY OF CRITICAL IT FOR OVER 4 130 HIGH GRADE DATA SECURITY SOLUTIONS FOR OF THE 5 BIGGEST OIL COMPANIES 50 As the European leader in cyber security and the worldwide leader in data protection, Thales addresses the entire information security lifecycle, the cornerstone of digital trust. HIGHLY DEMANDING CUSTOMERS WORLDWIDE PROTECTION OF THE WORLD PAYMENT TRANSACTIONS 80% COUNTRIES including NATO 9 CYBER SECURITY FOR 10 OF THE TOP INTERNET GIANTS Thales helps secure the digital transformation of the most demanding government bodies, private firms and critical infrastructure providers
8
An international footprint
2 HIGH GRADE CYBERSECURITY (CONFIDENTIAL OR TOP SECRET) COMPETENCE CENTRES 5 CYBERSECURITY OPERATION CENTRES (CSOC) NOR UK BE CA NL FR USA CYBER CONSULTING & TRAINING TEAMS in 8 COUNTRIES 5 HIGHLY SECURED DATACENTRES FOR TRUSTED HYBRID IT OUTSOURCING UAE HK AU 3 DATA SECURITY HUBS 1 COMPUTER EMERGENCY RESPONSE TEAM (Cert-IST) IT AND CYBERSECURITY ENGINEERS combining a unique mix of expertise, talents and culture 5,000
9
Fostering innovation with customers, academic partners and start-ups
Within the Group In Thales’s cybersecurity program in the world biggest start-up incubator START-UP INCUBATION LEADING R&D CAPABILITIES PARTNERSHIPS WITH CHAIRS AND UNIVERSITIES Cyber defence and Cyber security Naval systems Cyber defence Connected Cars & Cybersecurity Data Scientist Cyb'Air SAINT-CYR Cyber and computing security in cybersecurity, data science, connectivity, IoT, and AI, with our European research centre Active participation to international organisations, among which: Rapid prototyping & collaborative design, for example with OPEN INNOVATION WITH USERS
10
THALES, TRUSTED PARTNER OF YOUR DIGITAL JOURNEY IN THE LONG RUN
INTEGRATING CYBERSECURITY in legacy systems and complex IS/IT projects DESIGNING, MAINTAINING AND OPERATING SMART SECURED CRITICAL SYSTEMS with an industrial approach LEVERAGING KEY DIGITAL TECHNOLOGIES to secure your digital transformation : Big Data, Connectivity, IoT, Cloud, AI (Our mission) To be an accelerator of the secured digital transformation of its customers
11
Serving the people we all rely on to make the world go round
GOVERNMENT AND PUBLIC SERVICES DEFENCE TRANSPORTATION SPACE & AEROSPACE
12
Serving the people we all rely on to make the world go round
BANKING & INSURANCE INDUSTRY AND SERVICES AUTOMOTIVE COMMUNICATIONS AND TECHNOLOGIES ENERGY HEALTHCARE
13
WHY CHOOSE THALES? End-to-end cyber security
Digital and industrial DNA Experience in mission critical systems Innovation and R&D TRUSTFUL AND COMMITTED: NOW AND TOMORROW
14
“ The people we all rely on to make the world go round – they rely on Thales. In a world that is increasingly fast moving, unpredictable, and full of opportunities, they come to us with big ambitions: to make life better, to keep us safer. Combining a unique mix of expertise, talents and cultures, our architects design and deliver extraordinary high technology solutions. Solutions that make tomorrow possible, today. From the bottom of the oceans to the depths of space and cyberspace, we help our customers think smarter and act faster - mastering ever greater complexity and every decisive moment along the way. Whatever it takes. “
15
BACK-UP SLIDES
16
ABOUT THALES
17
80,000 €19 billion 68 countries €1 Thales profile billion
Collective intelligence for a safer world Whenever critical decisions need to be made, Thales has a role to play. In all its markets Thales solutions help customers to make the right decisions at the right time and act accordingly. World-class technology, the combined expertise of 80,000 employees and operations in 68 countries have made Thales a key player in securing businesses, guarding vital infrastructure and protecting the national security interests of countries around the globe, and securing key businesses. Employees Revenues in 2018 80,000 €19 billion Global presence Self-funded R&D* 2018 68 countries €1 billion * Does not include externally financed R&D
18
GROUND TRANSPORTATION
THALES’S CORE MARKETS AEROSPACE SPACE GROUND TRANSPORTATION DEFENCE SECURITY TRUSTED PARTNER FOR A SAFER WORLD
19
In security, we serve the 4 key domains of modern society
Meeting the most complex security requirements From helping cities and critical infrastructures to become safe and smart, to securing the global financial markets, protecting data and privacy and keeping security forces connected while on critical missions, we ensure that everyone can continue to share information, reap the benefits of a connected world and enjoy an enhanced quality of life, while staying safe and one step ahead of all forms of digital threat. Whatever it takes. Governments & States Critical Infrastructure Cities Cyber space
20
Protection of cyberspace
EUROPEAN LEADER IN CYBERSECURITY WORLD LEADER IN DATA PROTECTION 50 OPERATION AND CYBERSECURITY OF CRITICAL INFORMATION SYSTEMS FOR OVER 130 HIGH-GRADE SECURITY PRODUCTS AND SOLUTIONS (CONFIDENTIAL OR TOP SECRET) FOR INCL. NATO COUNTRIES CUSTOMERS COUNTRIES 80% CYBERSECURITY FOR 9 OF THE TOP 10 INTERNET GIANTS SECURITY FOR 19 OF THE 20 LARGEST BANKS PROTECTION OF THE WORLD’S BANKING TRANSACTIONS 2,000 5 5 CYBERSECURITY SPECIALISTS CYBERSECURITY OPERATIONS CENTRES DATA CENTRES
21
ABOUT OUR EXPERTISE (details of slide 10)
22
Leader in cyber security and data protection, catalyst for the digital transformation
CYBER-CONSULTING AND EVALUATION SOVEREIGN CYBER SECURITY SOLUTIONS Risks analysis & Hunting Open Source Intelligence Audit & penetration testing Cyber training Rapid reaction team & crisis management Detection probe High grade Encryption Data Diodes Secure networks From the earliest design and throughout the system lifecycle, Thales builds cyber security into solutions, services and systems to stay on top of an ever-changing cyber threat environment. cyber security BY DESIGN CYBER OPERATIONS AND SURVEILLANCE CRITICAL DATA SECURITY 5 cyber security operation centres (CSOC) 1 Computer emergency response team (Cert-IST), Anti-Malware Sovereign Protection Threat Intelligence Hardware Security Modules (HSMs) Advanced key management Encryption & Tokenization Privileged user control
23
Architecting and operating smart critical systems
DIGITAL DYNAMICS CONSULTING CRITICAL SYSTEMS ENGINEERING Digital Roadmap Definition Digital Transformation framework Digital culture development Design Thinking Business Value Assessment Efficient, resilient & scalable solutions Open source based architectures & Software System Engineering Cybersecure-by-design DevSecOps From ideation to operations, our customers rely on us to master the complexity of their Smart Critical Systems and every decisive moment along their digital journey. KEY DIGITAL APPROACHES CRITICAL INFORMATION SYSTEMS OPERATION User eXperience centric Agility Minimum Viable Products Move-to-Cloud Industry 4.0 Digital Platforms Solutions As-a-Service Software, infrastructure, network & security operation Cloud-based operation Security Vulnerability Management Performance, availability, safety Orient Vision, communicate, strategic plan Implement: Plan, structure, contract, assess Agile contract / legal framework Design … Performances simulation Manage security measures / threats/ security target and security policy Manage availability reliability, safety Run and operate Maintain software Maintain security Monitor IT resources and applications Best Value … new interactions between project IT Customer-centric Need analysis from design thinking and lean management through agile methods Manage Human Factor Our values new usages Constant interactions with customers, users, management and teams: governance and methods Skills, common objectives motivation; incentive Change Management: communication, training, feedback, Social Networking, community, Collaboration Customer and Thales Co steering Feedback: always, everywhere
24
Expert in the key technologies of digital transformation
Connectivity & Internet of things Cloud Supporting massive cloud adoption strategies Enhancing connectivity anywhere, anytime, and ensuring security of IoT To deliver best-in-class, reduced time-to-market and secured solutions, our customers rely on Thales extended expertise in key technologies nurtured in our Research Labs, Digital Factory and innovation ecosystem of SMEs. Hybrid secure outsourcing service (multi cloud / on premises) Cloud migration (data, API, services, security) Secure multimedia platforms, geo information, Augmented and Virtual Reality Artificial Intelligence Big Data Creating data value by building and operating platforms Detecting the unseen and predicting the unknown, helping you develop new capabilities Distributed algorithms, visualization, decision and optimization, business intelligence Machine learning, neuronal networks, behaviour analysis, prescriptive maintenance, video analysis, etc.
25
ABOUT OUR PORTFOLIO (details of slide 10)
26
Our portfolio at a glance
Industry 4.0 Critical systems & software High-grade network security Data security Critical IT outsourcing and secure cloud BUILD, OPERATE AND SECURE CRITICAL IT SYSTEMS PROTECT DIGITAL ASSETS Mobile security Monitoring DETECT AND REACT ASSESS AND TRAIN Diagnosing Rapid response team Cyber threat intelligence Training
27
Our portfolio at a glance
IoT platform AR/VR & remote maintenance Livestreaming Collaboration Platform as a service Industry 4.0 Critical systems & software High-grade network security Data security Network encryptors XO Mail Data Diode (ELIPS SD) Lawful interception Cyber security systems solutions Big data platforms and analytics Large systems cyber security Hardware Security Modules (HSMs) Advanced key management Encryption & Tokenization Privileged user control Critical IT outsourcing and secure cloud BUILD, OPERATE AND SECURE CRITICAL IT SYSTEMS PROTECT DIGITAL ASSETS Mobile security Hybrid IT outsourcing services Move to cloud Multi-cloud operations Open source solutions TeoXC Trusted messaging for professional (CitadelTeam) Monitoring DETECT AND REACT ASSESS AND TRAIN Diagnosing Technical consulting Digital and Cyber consulting Cyber Security Operation Centres Cyber detection probe (CybelSensor) Secure and multi Cloud (HySIO) Threat intelligence Computer Emergency Response Team – industry, Service, Tertiary (Cert IST) Rapid response team Cyber threat intelligence Training Cyber response team Emergency consulting Cyber training platform (CybelsRange)
28
International portfolio of Services, Products & Systems
DIAGNOSING Technical Consulting Cyber consulting MONITORING HySIO secured Cloud CSOC Cybels Sensor INTELLIGENCE Threat Intelligence CERT IST NETWORK SECURITY Network encryptors XO Mail ELIPS SD (Data Diode) TRAINING Cyber Range SYSTEM cyber security MOBILE SECURITY TEO XC CITADEL LAWFUL INTERCEPTION LIST / Spyder/ ULIS Services Products Systems
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.