Transcription

Cybersecurity & RiskServices– Capability Note14 Feb 2018Aerospace ReimaginedAerospace & Defense Vertical 2017 Wiprowipro.comConfidential1

Cybersecurity & risk services Overview & market strategyRisk & Compliance593 CUSTOMERSCyber Security ConsultingSecurity ArchitectureApplication SecurityFortune 1000enterprises7500 PRACTITIONERSCyber sec. & RiskexpertiseData Privacy & ProtectionIdentity & AccessTOP 5 WORLDLEADEREnd-to-end providerInfrastructure SecurityCloud Security10 PLATFORMSFor cyberMobile SecuritydefenceIoT SecurityVENTUREINVESTMENTSIndustrial SecurityAnd strategicpartnershipsPhysical SecurityConsulting & Strategy Cybersecurity MaturityAssessment Data PrivacyAssessment Cloud Security Cyberdefense CenterFY 2016-1710SecurityAwards in2017Global SOCs 1 BN2020 VISIONManaged ServicesAs-a-service579 MNYoY GR12Design & Implement Prevention & ProtectionOf Digital Trust Protection & Privacy OfData Integrated RiskReporting Managed SecurityServices Automated IncidentResponse & BreachDetection CybersecurityIntelligence28.9%Strategy Levers Enable Digital Trust Expand Cyber Intelligence Modernize Core Elevate Security Collaborate to WINSimplify Secure Sustain 2017 Wiprowipro.comconfidential2

Our Vision“Wipro’s Cyber Security & Risk Services will be thepartner of choice for cyber risk & security by helpingcustomers Simplify Digital Risk Management, SecureInformation and Sustain Business Resilience”SimplifySecureSustainOur AmbitionDouble Cyber Security & RiskServices Market Share by FY20 2017 Wiprowipro.comconfidential3

Defining our vision, ambition & strategic prioritiesSimplify Digital Risk Ecosystem Secure Information Sustain Business ResilienceCybersecurity & Risk Solutions1 Prepare, Prevent, Protect the enterprise,consumer, device, user and things - Change Protection and Privacy of data in aboundary-less ecosystem - Run Enable business continuity through DigitalResilience – Change Integrated Digital Risk Reporting acrossbusiness channels - Run Cloud Security Solutions - Change3 Areas of InvestmentsEnable Digital IMFrameworks& productsPlatforms12 CDC2SACSICSMCWICRICDGCPSCCSC Detect Respond Predict B2E,B2B,B2C,B2T - ChangeLocalization - ChangeCybersecurity Intelligence leveragingcognitive computing – ChangeIntegrated Threat Management – Change4Modernize CoreAutomated incident detection & response - RunProductized Services - RunCompetency build – RunExpand SIC Platform – RunMSS 1.0 to MSS 2.0 - RunSAC – Security Assurance CenterSIC – Security Intelligence CenterSMC – Security Management CenterWIC – Wipro Identity CloudRIC – Risk Intelligence CenterDGC – Data Governance CenterPSC – Physical Security ConvergenceEDO – Enterprise Data ObfuscationPSIM – Physical Security Information ManagementWAGON – Wipro Access Governance OnboardingWIAT – Wipro Identity Automation ToolCSC – Cloud Security CenterExtend Cyber IntelligenceElevate SecurityBangalore, Chennai, Pune, Bhubaneswar,Mysore, Kochi, Delhi, Dallas etc.5Collaborate to Win Collaboration with security ecosystem partners M&A, Wipro Ventures, Academia Partnerships Integrated services and solutions collaborating withbusiness units, practices and service lines Integrated Cybersecurity Solutions - RunCyber Security Consulting – ChangeDomain Solutions – ChangeLocalized delivery – Regional Deliveryleaders & Security Advisors – Run New Geography Growth: Drive deeperpenetration and mining in newergeographies like LATAM and Canada 2017 Wiprowipro.comconfidential4

Wipro CyberDefense PlatformWIPRO CYBER DEFENSE PLATFORMControlsIdentitiesCYBER INTELLIGENCE GATEWAYRISK INTELLIGENCE PLATFORMDataINTEGRATED IDENTITY CLOUDApplicationDATA PROTECTION & GOVERNANCE PLATFORMInfrastructureSECURITY ASSURANCE PLATFORMMobilitySECURITY INTELLIGENCE PLATFORMCloudSECURITY MANAGEMENT PLATFORMOperational TechnologyPHYSICAL SECURITY CONVERGENCE PLATFORMInternet of ThingsCLOUD ACCESS SECURITY BROKERTHREAT ADVISORY SERVICESSimplify Secure Sustain 2017 Wiprowipro.comConfidential5

Cybersecurity &Risk ServicesRiskIntelligencePlatform3rd Party ingComplianceas a serviceBusinessContinuityManagementERP As AServiceIntegratedIdentityWipro IdentityCloudDigitalIdentity,Access &FederationIdentity ccountCertificateLifecycleData Privacy &GovernanceData LeakPreventionPrivacyInventory nitoringDataDiscovery nitoring &AnalyticsIncidentResponseAutomationCyber st gCybersecurityAssuranceThreatModellingApp & InfraVulnerabilityAssessmentSecure CodeReviews &TrainingStatic &Dynamic alSecurity Info.Mgmt.PhysicalIdentity &Access Mgmt.SecurityManagementPlatformNW sAutomationSecurityProcessAutomationCONTEXTManaged ServicesAs-a-ServiceSimplify Secure Sustain 2017 Wiprowipro.comConfidential6

Key Tenets of Cybersecurity& Risk ServicesTransparency Security specific performance metrics(SLAs, BLAs & KPIs) Catalogue based services and RateCard with consumption based pricingInnovationFlexibility Integrated platform for Security Competence driven CoE-based Flexpool of security consultants Proven frameworks & productized Bubble Support Team for Peak loadsservices Contextualized Program Governance Customized Security as a Service ModelsModelmodel Visibility through Integrated Reporting Hybrid delivery models aligned to client Co developed services with productOEM’s & Cloud security partnersobjectives:ExpertiseDelivery Excellence Specialization in advanced & emerging Standardization & Repeatability Business Centric as a Service Models Targeted Service Improvement Plans with Outcome based cost modelstechnologies Integrated Knowledge Management Security experience Centers acrossSecurity OEM product's Leading industry and TechnologyCertificationsCost Optimization Element driven costing for predictabilitydefined outcomes & benefits CapEx to OpEx conversion through Process Automation, audit automation,Wipro owned tools deliverycompliance monitoring automation Near shore & Offshore Leverage for Proactive & Institutionalized staffproductivity & effectiveness measurementcost arbitrageSimplify Secure Sustain 2017 Wiprowipro.comConfidential7

Investing in Innovation throughSecurity Platforms (Part 1 of 2)Risk Intelligence Platform Risk Intelligence CenterIT Risk AssessmentCloud Risk AssessmentRisk Operations ManagementVendor Risk ManagementDisaster RecoveryBusiness Continuity ManagementIntegrated Risk ReportingSecurity & AuthorizationERP Security AssessmentSAP GRCOracle GRCGRC Automation RSA Archer IBM OpenPages MetricStreamSimplify Secure SustainIntegrated Identity Cloud Wipro Identity Cloud Identity as a service Federated SSO as a Service Advanced Authentication as a Service –2FA On-boarding of applications WAGON – Wipro Access GovernanceOnboarding framework Service Delivery Platform Managed User Access Management Certificate Lifecycle Management (CLM) CLM Automation tool sets based onMicrosoft PKI Automate Certificate Issuance Automate Certificate Renewal Automate Certificate expiry notifications Integration with AD and MSPKI Managed Privileged Account Management (PAM)Enterprise Data GovernancePlatform Security Data Lifecycle ManagementData Privacy and ComplianceOutsourcing Data ProtectionManaged Data Leak PreventionDatabase MonitoringEncryption SolutionsManaged Enterprise Data ObfuscationData Privacy AssessmentData Privacy Compliance FrameworksIT Risk OfficeCompliance ISO 27001, PCI-DSS 3.1, SOX /SSAE 16, NERC/FERC, FDA,IT Common Compliance FrameworkCompliance as Service (CCS)Fraud Risk Management (Apollo)Internal Control Assurance 2017 Wiprowipro.comConfidential8

Investing in Innovation throughSecurity Platforms (Part 2 of 2)Security IntelligencePlatform Cyber Threat Management CSIRT – IncidentResponse Advanced MalwareProtection Advanced End PointProtection SOC Consulting SIEM Consulting andImplementation DDOS Protection Services Security Analytics Threat Intelligence SIC as a Service SIC Cloud Security Broker Cyber Security Defense Incident Response ForensicsSecurity Assurance Platform Secure SDLC ConsultingThreat ModelingCloud Security AssessmentsSecure Code ReviewWeb Penetration Testing &Vulnerability AssessmentNetwork Pen TestingMobile ForensicsSAMM ConsultingSecurity Assurance ServicesVulnerability Management as aServiceMobile Application SecurityTestingSecurity Management Platform UAM AutomationSec Ops – Network AutomationSecOps – End pointPhysical Security ConvergenceManaged UAMSecurity Operations – Network,End Point, Host, Gateway,ApplicationsPlatform Security ComplianceSecurity Operations Automationas a ServiceUAM Automation and SharedServicesEncryptionPKIRisk Based AuthenticationIDAM SupportSimplify Secure SustainPhysical Security Convergence Physical Security InformationManagement Solution (PSIMS) Physical Identity AccessManagement (PIAM) Vehicle Tracking Solution IP Video Surveillance 2017 Wiprowipro.comConfidential9

Investing in Innovation throughFrameworks & ProductsAccelerateASTRID FrameworkAccelerateSDP (Solution Delivery Platforms)AppON (Faster ApplicationOnboarding onto IAM Tool)WAGON (Wipro Access GovernanceOnboarding) FrameworkWIAT – Wipro Identity AutomationToolEDO – Enterprise DataObfuscationUAM (User Access Management)Automation BOTs/Tool (20 Bots)Unified Control FrameworkPSIM – Physical SecurityInformation ManagementCSC – Cloud Security Center 2017 Wiprowipro.comConfidential10

Strategic Investments in Ventures(Intelligence,Automation & Analytics)A FRAUD RISK SOLUTION THAT USESEMAIL ADDRESSES AS AN UNIQUE DATAPOINT AND USES MILLIONS OF FRAUDSIGNALS AND DATA SCIENCEANREAL-TIME CONTINUOUS THREAT MONITORINGACROSS THE NETWORK AND THE DATA CENTERTO INSTANTLY IDENTIFY ANY PHASE OF A CYBERATTACK.AI-DRIVEN ENTERPRISE BOT PLATFORM THAT DRAMATICALLYREDUCES THE TIME NEEDED TO DESIGN AND DEPLOYENTERPRISE BOTS TO CORPORATE EMPLOYEES AND THEIRCUSTOMERS.DEEP, DARK W EB AND CLEAR W EBMINING WITH ACTIONABLE INSIGHTS INTOENTERPRISE SPECIFIC ALERTSA SECURITY AUTOMATION AND ORCHESTRATION PLATFORM THATINTEGRATES WITH THE ENTERPRISE SECURITY TECHNOLOGIES TOAUTOMATE INFORMATION EXCHANGE, ACTIONS TO DRIVE CYBERINCIDENT RESPONSE, INVESTIGATION AND REMEDIATIONW IPROVENTURESCOMPANIESSimplify Secure Sustain 2017 Wiprowipro.comConfidential11

Investing in People through SecurityExperience Center 5500 Security certifications130,000 hours ofCybersecurity Trainings peryearincluding CISSP,CISA, CISM, CRISC,ISO 27001, CEH, CBCP, RSA Archer,Check Point, CISCO, Juniper, PAN,TIM, IBM Qradar, Arcsight, CyberArk,and many more 45 Security Skill Experience2800 people trainedCenters and over 1200 Use Casesevery quarterCompetency in 110technologies supported across 7500 ConsultantsSimplify Secure Sustain 2017 Wiprowipro.comConfidential12

Investment in Global Footprintthrough Cyber Defense CentersGlasgow, UKMeerbusch, DEBucharest, RODelhi, INKochi, INEdmonton, CAPune, INBhubaneswar, INPhoenix, AZ, USABangalore, INDallas, TX, USAMysore, INChennai, INNew Cyber Defense Centers in FY’ 16Global Delivery CapabilitiesMelbourne, AUCyber Defence Center24x7 Operations 5000 Cyber Defence SpecilistsSimplify Secure Sustain 2017 Wiprowipro.comConfidential13

Diversified Tech Co. (Life Science,Mfg. etc.) Independent Oil & Gas major Large Eu Financial Services Co. Entertainment, information andcommunications Co. US based Speciality Retailer Physical SecurityGlobal Bio-pharma CompanyData Security Identity Mgmt. Content SecuritySecurityOperations Client ThreatMgmt.Network SecurityGlobal Pharmaceutical GiantApplicationSecurityRisk & ComplianceSome of our KeyEngagements 38000 users / 57000 endpoints6500 servers/ 350 apps / 68 countries 68000 users / 69000 endpoints 69 countries 35000 users / 36500 Endpoints 5900/ servers/ 103 countries 140,000 users / 6000 apps / 72000 servers 95000 users / 110,000 endpoints / 30,000servers 180,000 internal users / 2 million consumers /4 countries Scale of Engagement320,000 users / 76 countriesSimplify Secure Sustain 2017 Wiprowipro.comConfidential14

Value our customersexperience Global Risk Dashboard for Business Leadersenabling Risk-based decisionsOverall Posture:Near Real-time View for CISOs onemerging threat reduction20-60% faster* security incident response andremediation through automationAt least 44% reduction in manual effort viabuilt-in automation in As-a-Service solutions 23-37% operational security spend optimization,releases funds for business centric investments»Easy access to expertise in theregion»Rationalized security controls»Improved Security Processes»Test-Once and Comply-to-Many»Catalogue of security services»Risk advisory to the operationalInfra and Apps teams»Single point of accountability forsecurity service management»Future-aligned and integratedSecurity Architecture»24x7 security operations* Based on maturity-level of customerSimplify Secure Sustain 2017 Wiprowipro.comConfidential15

Industry AwardsGold Winner (Vulnerability Assessment, Remediation andManagement)Integrated Security Assurance Services (iSAS)Info Security Product & Service Excellence AwardGold Winner (Managed Security Services)Wipro Managed Security ServicesCIO Choice Awards 2015Finalist (Best Managed Security Services)Wipro Managed Security ServicesSC Awards 2015 EuropeGold Winner (NERC/FERC CIP Compliance)IronGate Security Solution for Industrial NetworksInfo Security Product & Service Excellence AwardGold Winner (SaaS/Cloud Solution)Wipro Identity CloudInfo Security Product & Service Excellence AwardGold Winner (Risk Management Services)Risk Intelligence CenterInfo Security Product & Service Excellence AwardExcellence in Managed Security Services 2015Wipro Managed Security ServicesIBM Business Partner AwardsWinner (Innovation in Outsourcing)NextGen Security Intelligence CenterAecus Innovation Awards 2015Gold award for the Year 2016 in the InformationTechnology Services categoryWipro Identity Cloud Version 1.552016 Golden Bridge Business & Innovation AwardsBronze award for the Year 2016 in the InformationTechnology Services categorySecurity Intelligence As A Service2016 Golden Bridge Business & Innovation AwardsPartner Award for outstanding Contribution 2015-16Cisco Partner Award in APJCCisco Security Connection 2016Simplify Secure Sustain 2017 Wiprowipro.comConfidential16

Analyst View onWipro (1 of 2)WIPRO POSITIONED AS A WINNER IN THE HFSWIPRO POSITIONED AS A LEADER IN EVEREST ITWIPRO POSITIONED AS A LEADER IN THEMANAGED SECURITY SERVICES BLUEPRINT,SECURITY SERVICES PEAK MATRIX, 2016FORRESTER WAVE: INFORMATION SECURITYCONSULTING, 20162017.Wipro's MSS delivery approach is highlycustomizable to customers' requirements and existingtechnology solutions, but can also bring preferredpartner solutions to a customer as needed.Gartner IncMagic Quadrant for Managed Security Services2016Wipro goes beyond strategic outsourcing withWipro is growing its business throughWipro grounds its offering in a strategy tohelp its clients win and keep clients by demonstratinghigh security maturity.multitenant MSS. Wipro offers global delivery of a wideHfs Blueprint Grid,Vendor Landscape: Global ManagedForrester ResearchSecurity Services, 2017Managed Security Services2017array of managed and monitored security services, withsome regional differencesreliability and strong delivery. Customers looking forsolid value for competitive cost and committedworkforce should consider WiproForrester Wave: Information SecurityConsulting Services, Global, 2016 2017 Wiprowipro.comConfidential17

Analyst View onWipro (2 of 2)Wipro listed in the Gartner Market Guide for RiskWipro listed in the Gartner Market Guide: SecurityWIPRO POSITIONED AS A LEADER IN HFSManagement Consulting, Worldwide, 2016Consulting , 2016BLUEPRINT FOR DIGITAL TRUST AS A SERVICE,2015Customers have rated Wipro's services as veryWipro’s Customer Dedicated Delivery Centersgood. Wipro regularly Wipro's RM consultingcompetency is part of its cybersecurity and risk service and Share Delivery Centers are spread across, India,practice. Its experience in RM consulting includes US, Europe and UK. Wipro has six Security Intelligencedesign and implementation of its proprietaryframeworks, such as the risk intelligence framework, Centers located in India.business resilience framework and continuous controlmonitoring framework. These frameworks help managerisk and compliance proactively on a near-real-timebasis, leveraging risk analytics models.Wipro has good customer service levels and as aIT outsourcing provider, Wipro is able to deliver multiskilled resources delivered as a single team. Wipro tends tohave attractive pricing. Organizations looking for a serviceprovider with competitive pricing should consider Wipro.“Wipro's customers think very highly of Wipro, withits MSS projects receiving high satisfaction ratings fromGartner Inccustomers, especially on the delivery front and adherenceMarket Guide for Risk ManagementConsulting Worldwide 2016to SLAs”IDCWipro has made strategic investments throughits venture capital arm in new security products, suchas Vectra Networks and IntSights, which have beenadopted by its MSS offerings (e.g., Threat Hunting asa- Service).Gartner IncMagic Quadrant for Managed Security Services2016MarketScape, MSSPs,Asia-Pacific, 2015Wipro is driving ecosystem security throughintegrated security and digital frameworksHFS ResearchDigital Trust as a ServiceBlueprint, 2015 2017 Wiprowipro.comConfidential18

1.0 Cybersecurity & Risk servicesCybersecurity & Risk services80,000Sites of a Major Indian Telecom ProviderSecuredthroughPhysical Security Convergence Platformto aggressively expand mobile service in PAN India 2017 Wiprowipro.comconfidential19

2.0 Cybersecurity & Risk servicesCybersecurity & Risk services400 Million Lines Of Code reviewed for security vulnerabilities and100 Threat Models Preparedfor a Leading Retailer in the US throughSecurity Assurance Platformfor him to goDigital 2017 Wiprowipro.comconfidential20

3.0 Cybersecurity & Risk servicesCybersecurity & Risk services23 Telecom Circlesof a Major Indian Telecom Provider areCertified for BS 10012 standard & DSCI Privacyfor safeguarding personal information of itscustomers40 Privacy Impact Assessments and PAN Indiacircle audits for data privacy throughEnterprise Data Governance Platform 2017 Wiprowipro.comconfidential21

4.0 Cybersecurity & Risk servicesCybersecurity & Risk services100 Billion Events Processed PerQuarter4000 Offenses Triggered140 Incidents investigatedfor a privately held Telecom Provider inUSA having parent company in UKthroughSecurity Intelligence Platform 2017 Wiprowipro.comconfidential22

5.0 Cybersecurity & Risk servicesCybersecurity & Risk servicesManaged160K Corporate Users200K External users300 Enterprise Applications250K AD ObjectsFor one of the fortune 100 globalmanufacturing company throughIntegrated Identity Cloud 2017 Wiprowipro.comconfidential23

6.0 Cybersecurity & Risk servicesCybersecurity & Risk servicesManaged220 operational firewalls50 customer’s vendors operating acrossthe globe resulting inIncreased firewall compliancefor a leading tobacco company headquartered inLondon throughSecurity ManagementPlatform 2017 Wiprowipro.comconfidential24

7.0 Cybersecurity & Risk servicesCybersecurity & Risk servicesImproved Compliance for PCI DSS &CACIB Security frameworkandImproved Operational Efficiencies andReduced cost of security threatmanagementfor one of the Corporate and Investment Bankheadquartered in Paris throughSecureEye 2017 Wiprowipro.comconfidential25

8.0 Cybersecurity & Risk servicesCybersecurity & Risk services50% of Australia’sInternet BankingSecured 2017 Wiprowipro.comconfidential26

9.0 Cybersecurity & Risk servicesCybersecurity & Risk services 42Bn worth RetailTransactions for a singleUS retailerSecured 2017 Wiprowipro.comconfidential27

10.0 Cybersecurity & Risk servicesCybersecurity & Risk servicesEvery 4 out of 5Payment Card Transactions globallySecured 2017 Wiprowipro.comconfidential28

11.0 Cybersecurity & Risk servicesCybersecurity & Risk servicesEntire Postal NetworkOperations of CanadaSecured 2017 Wiprowipro.comconfidential29

12.0 Cybersecurity & Risk servicesCybersecurity & Risk services3 of Top 5Global PharmaCompaniesSecured 2017 Wiprowipro.comconfidential30

13.0 Cybersecurity & Risk servicesCybersecurity & Risk services56 Mn US HealthcareInformation RecordsSecured 2017 Wiprowipro.comconfidential31

Thank YouScott Crislip VP & Global HeadAerospace & Defense [email protected] 2017 Wiprowipro.comConfidential32

SAP GRC Oracle GRC GRC Automation RSA Archer IBM OpenPages MetricStream Integrated Identity Cloud Wipro Identity Cloud Identity as a service Federated SSO as a Service Advanced Authentication as a Service – 2FA On-boarding of applica