ExecLN Event (CIO | CMO | CISO) 7th Sep 2016 | Page 25

RSA Security Website: www.rsa.com Company Profile RSA provides more than 30,000 customers around the world with the essential security capabilities to protect their most valuable assets from cyber threats. With RSA’s award-winning products, organizations effectively detect, investigate, and respond to advanced attacks; confirm and manage identities; and ultimately, reduce IP theft, fraud, and cybercrime. For more information, go to www.rsa.com Company’s USP What Solutions Do You Offer? • • • • • • • • • • • • • • • RSA® NetWitness® delivers real-time detection for response in minutes, not months RSA® Archer empowers organisations to manage multiple dimensions of risk RSA® SecurID® Suite – the Smart Identity solution that protects from endpoint to cloud RSA Fraud Prevention solutions secure your customers across multi-channel environments Advanced Security Operations Center Security Incident Response Governance Risk & Compliance Identity & Access Management Fraud Prevention Security Analytics Advanced Cyber Defence Services IT and Security Risk Management Enterprise and Operational Risk Management Regulatory and Corporate Compliance Authentication and Access Assurance Discussion Synopsis Creating a Business Driven Approach to Security Cyber security risks have notably evolved over recent years and the challenges facing enterprise organisations both now and in the future has created a significant level of complexity. Along with these complex cyber threats, issues such as GDPR (General Data Protection Regulation) and the major impact this has upon businesses defining their cyber security posture, means organisations need to define an end to end strategy to ensure they can not just maximise their security protection capabilities, but also have the ability to effectively and efficiently analyse, react and respond to attacks. In this session Andy Waterhouse, EMEA Presales Director at global leader RSA Security will review the key areas of consideration for todays enterprise and how to create a business driven approach to cyber security. Page 25