52
How to combine innovation, digitization and security?

How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

How to combineinnovationdigitizationand security

2 copy 2019 FUJITSUUnclassified

Welcome

Bas de Reus | Managing Director Fujitsu Netherlands

3 copy 2019 FUJITSUUnclassified

Agenda

1345 | Welcome ndash Bas de Reus

1400 | Strategy and data driven continuous improvement ndash Ronald Renes

1445 | Short break

1500 | Protecting our data and business around the world ndash Edwin Franse

1530 | Interactive workshop based on outcomes from survey

1600 | Networking whilst enjoying the World Port Days during a boat trip

1800 | Closing

4 copy 2019 FUJITSUUnclassified

Driving a Trusting Future

2014

Human CentricInnovation

ldquoHyperconnectedWorldrdquo

2015

Human CentricInnovation in Action

ldquoDigital Ecosystemsrdquo

2016

Driving DigitalTransformation

ldquoNew IndustrialRevolutionrdquo

Human Centric Innovation

2017

Digital Co-creationHuman Centric Innovation

ldquoDigital Societyrdquo

2018

Co-creation for Success

Human Centric Innovation

Learning Enterprise

2013

Fujitsu Technologyand Service Visionlaunched

ldquoHuman Centric Intelligent Society 2019

Driving a Trusted FutureHuman Centric Innovation

5 copy 2019 FUJITSUUnclassified

Driving a Trusting Future

Driving a Trusted Future

Human Centric vision is becoming increasingly

important in shifting to digital society

Rebuild trust in data technology and business where

trust is proving inadequate or even breaking down

Human Centric Innovation

copy 2019 FUJITSUcopy 2019 FUJITSU

Todayrsquos society

6

ldquoPort of Rotterdam Authority launches new company PortXchange to make digital shipping app

Pronto available to ports worldwiderdquoPort of Rotterdam Aug 2019

Online amp Customer Experience Innovation

ldquoIMO outlines autonomous ship trial guidelinesrdquo

IMO Riviera Jul 2019

Smart lifestyle

ldquoConnected workers are going to transform the workplace heres what you should knowrdquo

People Matters Global March 2019

copy 2019 FUJITSU

copy 2019 FUJITSU

Is the data on your side

7

Who does personal data belong to Can we trust information on the web Can we protect information from cyber attacks

ldquoNotPetya Costs Merck FedEx Maersk $800Mrdquo

Forbes Aug 2017copy 2019 FUJITSU

copy 2019 FUJITSU

Pre-industrial Era

Trust 10People

Trust 20Institutions

Industrial Era

Supply Centric Business

Digital Era

Human Centric Business

Trust 30Technology

Paradigm shift of trust

8

copy 2019 FUJITSU9

Human Centric Intelligent Society

Play video gtgt

10 copy 2019 FUJITSUUnclassified

Ronald Renes | CIO Van Oord

Strategy and data driven continuous improvement

11

Play video gtgt

About Van Oord

Dredging Netherlands Offshore Wind Offshore

From asset to knowledge

The Right People Sustainability Vox Data

Strategy

Values

Mission

Purpose

We create We care We work together We succeed

As a global marine contractor we are specialised in dredging oil amp gas infrastructure and offshore wind

We work closely and safely with our clients and stakeholders to create innovative and sustainable

solutions

Our purpose is to create a better world for future generations by delivering marine ingenuity

Van Oord ndash more than 40 offices worldwide

minus We operate the worldrsquos most advanced equipment

minus State-of-the-art vessels

minus Highest quality and safety and sustainable standards

minus Continuous investment programme

minus More than 100 vessels

Van Oord - equipment

Digital Transformation

Digital Transformation ndash a definition

ldquoDigital transformation is the integration of digital technology into all areas of a business

fundamentally changing how you operate and deliver value to customers Its also a cultural

change that requires organizations to continually challenge the status quo experiment and

get comfortable with failurerdquo

Why

Time

(years)-9000 -6000 -4000 -3000 -2000 0 -1000 2000

Population

(millions)

6000

0

3000

Agricultural

revolution

Pottery

Plow

Irrigation1st City

Metallurgy

Writing

Mathematics

Peak of Rome

Peak of Greece

Internet

PCrsquosGenome Project

Nuclear Energy

DNA Discovered

Penicillin1st Man on the Moon

High-speed Computers

Telephone

Germ Theory

2nd Agricultural Revolution

Automobile

Industrial Revolution

Airplane

Watt Engine

Railroads

Time

Why

Gro

wth

In a VUCA world a new

entrant promises superior

productserviceWersquore in trouble

Business is doing

well stick to what

we know and

everything will be

finehellipNew entrant fails to

deliver on promises

We feel confident

about our

decisions

Why

ldquohellip9 out of 10 companies believe digital transformation is now a requirement for success while

almost four out of five (79) say that without further digital transformation they will be at a competitive

disadvantage within three yearsrdquo

- Economist

Why

for our clients

for our people

for newopportunities

What our clients are doinghellip

ldquotransformative technologies are

hellip challenging our cost base

and setting new standards in

reliability productivity and

sustainabilityrdquo

ldquoRWS staat net als de rest van

Nederland aan het begin van een

datarevolutierdquo

The ambition is to have one global

implemented digitalized

scalable solution across both

engineering procurement

construction (EPC) and operations

(OPS)

The digital transformation is not

easy but the benefits far

outweigh the risks and

challenges

Empowering the people that do the work

How

exceptional client

experience

business growth

operational excellence

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 2: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

2 copy 2019 FUJITSUUnclassified

Welcome

Bas de Reus | Managing Director Fujitsu Netherlands

3 copy 2019 FUJITSUUnclassified

Agenda

1345 | Welcome ndash Bas de Reus

1400 | Strategy and data driven continuous improvement ndash Ronald Renes

1445 | Short break

1500 | Protecting our data and business around the world ndash Edwin Franse

1530 | Interactive workshop based on outcomes from survey

1600 | Networking whilst enjoying the World Port Days during a boat trip

1800 | Closing

4 copy 2019 FUJITSUUnclassified

Driving a Trusting Future

2014

Human CentricInnovation

ldquoHyperconnectedWorldrdquo

2015

Human CentricInnovation in Action

ldquoDigital Ecosystemsrdquo

2016

Driving DigitalTransformation

ldquoNew IndustrialRevolutionrdquo

Human Centric Innovation

2017

Digital Co-creationHuman Centric Innovation

ldquoDigital Societyrdquo

2018

Co-creation for Success

Human Centric Innovation

Learning Enterprise

2013

Fujitsu Technologyand Service Visionlaunched

ldquoHuman Centric Intelligent Society 2019

Driving a Trusted FutureHuman Centric Innovation

5 copy 2019 FUJITSUUnclassified

Driving a Trusting Future

Driving a Trusted Future

Human Centric vision is becoming increasingly

important in shifting to digital society

Rebuild trust in data technology and business where

trust is proving inadequate or even breaking down

Human Centric Innovation

copy 2019 FUJITSUcopy 2019 FUJITSU

Todayrsquos society

6

ldquoPort of Rotterdam Authority launches new company PortXchange to make digital shipping app

Pronto available to ports worldwiderdquoPort of Rotterdam Aug 2019

Online amp Customer Experience Innovation

ldquoIMO outlines autonomous ship trial guidelinesrdquo

IMO Riviera Jul 2019

Smart lifestyle

ldquoConnected workers are going to transform the workplace heres what you should knowrdquo

People Matters Global March 2019

copy 2019 FUJITSU

copy 2019 FUJITSU

Is the data on your side

7

Who does personal data belong to Can we trust information on the web Can we protect information from cyber attacks

ldquoNotPetya Costs Merck FedEx Maersk $800Mrdquo

Forbes Aug 2017copy 2019 FUJITSU

copy 2019 FUJITSU

Pre-industrial Era

Trust 10People

Trust 20Institutions

Industrial Era

Supply Centric Business

Digital Era

Human Centric Business

Trust 30Technology

Paradigm shift of trust

8

copy 2019 FUJITSU9

Human Centric Intelligent Society

Play video gtgt

10 copy 2019 FUJITSUUnclassified

Ronald Renes | CIO Van Oord

Strategy and data driven continuous improvement

11

Play video gtgt

About Van Oord

Dredging Netherlands Offshore Wind Offshore

From asset to knowledge

The Right People Sustainability Vox Data

Strategy

Values

Mission

Purpose

We create We care We work together We succeed

As a global marine contractor we are specialised in dredging oil amp gas infrastructure and offshore wind

We work closely and safely with our clients and stakeholders to create innovative and sustainable

solutions

Our purpose is to create a better world for future generations by delivering marine ingenuity

Van Oord ndash more than 40 offices worldwide

minus We operate the worldrsquos most advanced equipment

minus State-of-the-art vessels

minus Highest quality and safety and sustainable standards

minus Continuous investment programme

minus More than 100 vessels

Van Oord - equipment

Digital Transformation

Digital Transformation ndash a definition

ldquoDigital transformation is the integration of digital technology into all areas of a business

fundamentally changing how you operate and deliver value to customers Its also a cultural

change that requires organizations to continually challenge the status quo experiment and

get comfortable with failurerdquo

Why

Time

(years)-9000 -6000 -4000 -3000 -2000 0 -1000 2000

Population

(millions)

6000

0

3000

Agricultural

revolution

Pottery

Plow

Irrigation1st City

Metallurgy

Writing

Mathematics

Peak of Rome

Peak of Greece

Internet

PCrsquosGenome Project

Nuclear Energy

DNA Discovered

Penicillin1st Man on the Moon

High-speed Computers

Telephone

Germ Theory

2nd Agricultural Revolution

Automobile

Industrial Revolution

Airplane

Watt Engine

Railroads

Time

Why

Gro

wth

In a VUCA world a new

entrant promises superior

productserviceWersquore in trouble

Business is doing

well stick to what

we know and

everything will be

finehellipNew entrant fails to

deliver on promises

We feel confident

about our

decisions

Why

ldquohellip9 out of 10 companies believe digital transformation is now a requirement for success while

almost four out of five (79) say that without further digital transformation they will be at a competitive

disadvantage within three yearsrdquo

- Economist

Why

for our clients

for our people

for newopportunities

What our clients are doinghellip

ldquotransformative technologies are

hellip challenging our cost base

and setting new standards in

reliability productivity and

sustainabilityrdquo

ldquoRWS staat net als de rest van

Nederland aan het begin van een

datarevolutierdquo

The ambition is to have one global

implemented digitalized

scalable solution across both

engineering procurement

construction (EPC) and operations

(OPS)

The digital transformation is not

easy but the benefits far

outweigh the risks and

challenges

Empowering the people that do the work

How

exceptional client

experience

business growth

operational excellence

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 3: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

3 copy 2019 FUJITSUUnclassified

Agenda

1345 | Welcome ndash Bas de Reus

1400 | Strategy and data driven continuous improvement ndash Ronald Renes

1445 | Short break

1500 | Protecting our data and business around the world ndash Edwin Franse

1530 | Interactive workshop based on outcomes from survey

1600 | Networking whilst enjoying the World Port Days during a boat trip

1800 | Closing

4 copy 2019 FUJITSUUnclassified

Driving a Trusting Future

2014

Human CentricInnovation

ldquoHyperconnectedWorldrdquo

2015

Human CentricInnovation in Action

ldquoDigital Ecosystemsrdquo

2016

Driving DigitalTransformation

ldquoNew IndustrialRevolutionrdquo

Human Centric Innovation

2017

Digital Co-creationHuman Centric Innovation

ldquoDigital Societyrdquo

2018

Co-creation for Success

Human Centric Innovation

Learning Enterprise

2013

Fujitsu Technologyand Service Visionlaunched

ldquoHuman Centric Intelligent Society 2019

Driving a Trusted FutureHuman Centric Innovation

5 copy 2019 FUJITSUUnclassified

Driving a Trusting Future

Driving a Trusted Future

Human Centric vision is becoming increasingly

important in shifting to digital society

Rebuild trust in data technology and business where

trust is proving inadequate or even breaking down

Human Centric Innovation

copy 2019 FUJITSUcopy 2019 FUJITSU

Todayrsquos society

6

ldquoPort of Rotterdam Authority launches new company PortXchange to make digital shipping app

Pronto available to ports worldwiderdquoPort of Rotterdam Aug 2019

Online amp Customer Experience Innovation

ldquoIMO outlines autonomous ship trial guidelinesrdquo

IMO Riviera Jul 2019

Smart lifestyle

ldquoConnected workers are going to transform the workplace heres what you should knowrdquo

People Matters Global March 2019

copy 2019 FUJITSU

copy 2019 FUJITSU

Is the data on your side

7

Who does personal data belong to Can we trust information on the web Can we protect information from cyber attacks

ldquoNotPetya Costs Merck FedEx Maersk $800Mrdquo

Forbes Aug 2017copy 2019 FUJITSU

copy 2019 FUJITSU

Pre-industrial Era

Trust 10People

Trust 20Institutions

Industrial Era

Supply Centric Business

Digital Era

Human Centric Business

Trust 30Technology

Paradigm shift of trust

8

copy 2019 FUJITSU9

Human Centric Intelligent Society

Play video gtgt

10 copy 2019 FUJITSUUnclassified

Ronald Renes | CIO Van Oord

Strategy and data driven continuous improvement

11

Play video gtgt

About Van Oord

Dredging Netherlands Offshore Wind Offshore

From asset to knowledge

The Right People Sustainability Vox Data

Strategy

Values

Mission

Purpose

We create We care We work together We succeed

As a global marine contractor we are specialised in dredging oil amp gas infrastructure and offshore wind

We work closely and safely with our clients and stakeholders to create innovative and sustainable

solutions

Our purpose is to create a better world for future generations by delivering marine ingenuity

Van Oord ndash more than 40 offices worldwide

minus We operate the worldrsquos most advanced equipment

minus State-of-the-art vessels

minus Highest quality and safety and sustainable standards

minus Continuous investment programme

minus More than 100 vessels

Van Oord - equipment

Digital Transformation

Digital Transformation ndash a definition

ldquoDigital transformation is the integration of digital technology into all areas of a business

fundamentally changing how you operate and deliver value to customers Its also a cultural

change that requires organizations to continually challenge the status quo experiment and

get comfortable with failurerdquo

Why

Time

(years)-9000 -6000 -4000 -3000 -2000 0 -1000 2000

Population

(millions)

6000

0

3000

Agricultural

revolution

Pottery

Plow

Irrigation1st City

Metallurgy

Writing

Mathematics

Peak of Rome

Peak of Greece

Internet

PCrsquosGenome Project

Nuclear Energy

DNA Discovered

Penicillin1st Man on the Moon

High-speed Computers

Telephone

Germ Theory

2nd Agricultural Revolution

Automobile

Industrial Revolution

Airplane

Watt Engine

Railroads

Time

Why

Gro

wth

In a VUCA world a new

entrant promises superior

productserviceWersquore in trouble

Business is doing

well stick to what

we know and

everything will be

finehellipNew entrant fails to

deliver on promises

We feel confident

about our

decisions

Why

ldquohellip9 out of 10 companies believe digital transformation is now a requirement for success while

almost four out of five (79) say that without further digital transformation they will be at a competitive

disadvantage within three yearsrdquo

- Economist

Why

for our clients

for our people

for newopportunities

What our clients are doinghellip

ldquotransformative technologies are

hellip challenging our cost base

and setting new standards in

reliability productivity and

sustainabilityrdquo

ldquoRWS staat net als de rest van

Nederland aan het begin van een

datarevolutierdquo

The ambition is to have one global

implemented digitalized

scalable solution across both

engineering procurement

construction (EPC) and operations

(OPS)

The digital transformation is not

easy but the benefits far

outweigh the risks and

challenges

Empowering the people that do the work

How

exceptional client

experience

business growth

operational excellence

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 4: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

4 copy 2019 FUJITSUUnclassified

Driving a Trusting Future

2014

Human CentricInnovation

ldquoHyperconnectedWorldrdquo

2015

Human CentricInnovation in Action

ldquoDigital Ecosystemsrdquo

2016

Driving DigitalTransformation

ldquoNew IndustrialRevolutionrdquo

Human Centric Innovation

2017

Digital Co-creationHuman Centric Innovation

ldquoDigital Societyrdquo

2018

Co-creation for Success

Human Centric Innovation

Learning Enterprise

2013

Fujitsu Technologyand Service Visionlaunched

ldquoHuman Centric Intelligent Society 2019

Driving a Trusted FutureHuman Centric Innovation

5 copy 2019 FUJITSUUnclassified

Driving a Trusting Future

Driving a Trusted Future

Human Centric vision is becoming increasingly

important in shifting to digital society

Rebuild trust in data technology and business where

trust is proving inadequate or even breaking down

Human Centric Innovation

copy 2019 FUJITSUcopy 2019 FUJITSU

Todayrsquos society

6

ldquoPort of Rotterdam Authority launches new company PortXchange to make digital shipping app

Pronto available to ports worldwiderdquoPort of Rotterdam Aug 2019

Online amp Customer Experience Innovation

ldquoIMO outlines autonomous ship trial guidelinesrdquo

IMO Riviera Jul 2019

Smart lifestyle

ldquoConnected workers are going to transform the workplace heres what you should knowrdquo

People Matters Global March 2019

copy 2019 FUJITSU

copy 2019 FUJITSU

Is the data on your side

7

Who does personal data belong to Can we trust information on the web Can we protect information from cyber attacks

ldquoNotPetya Costs Merck FedEx Maersk $800Mrdquo

Forbes Aug 2017copy 2019 FUJITSU

copy 2019 FUJITSU

Pre-industrial Era

Trust 10People

Trust 20Institutions

Industrial Era

Supply Centric Business

Digital Era

Human Centric Business

Trust 30Technology

Paradigm shift of trust

8

copy 2019 FUJITSU9

Human Centric Intelligent Society

Play video gtgt

10 copy 2019 FUJITSUUnclassified

Ronald Renes | CIO Van Oord

Strategy and data driven continuous improvement

11

Play video gtgt

About Van Oord

Dredging Netherlands Offshore Wind Offshore

From asset to knowledge

The Right People Sustainability Vox Data

Strategy

Values

Mission

Purpose

We create We care We work together We succeed

As a global marine contractor we are specialised in dredging oil amp gas infrastructure and offshore wind

We work closely and safely with our clients and stakeholders to create innovative and sustainable

solutions

Our purpose is to create a better world for future generations by delivering marine ingenuity

Van Oord ndash more than 40 offices worldwide

minus We operate the worldrsquos most advanced equipment

minus State-of-the-art vessels

minus Highest quality and safety and sustainable standards

minus Continuous investment programme

minus More than 100 vessels

Van Oord - equipment

Digital Transformation

Digital Transformation ndash a definition

ldquoDigital transformation is the integration of digital technology into all areas of a business

fundamentally changing how you operate and deliver value to customers Its also a cultural

change that requires organizations to continually challenge the status quo experiment and

get comfortable with failurerdquo

Why

Time

(years)-9000 -6000 -4000 -3000 -2000 0 -1000 2000

Population

(millions)

6000

0

3000

Agricultural

revolution

Pottery

Plow

Irrigation1st City

Metallurgy

Writing

Mathematics

Peak of Rome

Peak of Greece

Internet

PCrsquosGenome Project

Nuclear Energy

DNA Discovered

Penicillin1st Man on the Moon

High-speed Computers

Telephone

Germ Theory

2nd Agricultural Revolution

Automobile

Industrial Revolution

Airplane

Watt Engine

Railroads

Time

Why

Gro

wth

In a VUCA world a new

entrant promises superior

productserviceWersquore in trouble

Business is doing

well stick to what

we know and

everything will be

finehellipNew entrant fails to

deliver on promises

We feel confident

about our

decisions

Why

ldquohellip9 out of 10 companies believe digital transformation is now a requirement for success while

almost four out of five (79) say that without further digital transformation they will be at a competitive

disadvantage within three yearsrdquo

- Economist

Why

for our clients

for our people

for newopportunities

What our clients are doinghellip

ldquotransformative technologies are

hellip challenging our cost base

and setting new standards in

reliability productivity and

sustainabilityrdquo

ldquoRWS staat net als de rest van

Nederland aan het begin van een

datarevolutierdquo

The ambition is to have one global

implemented digitalized

scalable solution across both

engineering procurement

construction (EPC) and operations

(OPS)

The digital transformation is not

easy but the benefits far

outweigh the risks and

challenges

Empowering the people that do the work

How

exceptional client

experience

business growth

operational excellence

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 5: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

5 copy 2019 FUJITSUUnclassified

Driving a Trusting Future

Driving a Trusted Future

Human Centric vision is becoming increasingly

important in shifting to digital society

Rebuild trust in data technology and business where

trust is proving inadequate or even breaking down

Human Centric Innovation

copy 2019 FUJITSUcopy 2019 FUJITSU

Todayrsquos society

6

ldquoPort of Rotterdam Authority launches new company PortXchange to make digital shipping app

Pronto available to ports worldwiderdquoPort of Rotterdam Aug 2019

Online amp Customer Experience Innovation

ldquoIMO outlines autonomous ship trial guidelinesrdquo

IMO Riviera Jul 2019

Smart lifestyle

ldquoConnected workers are going to transform the workplace heres what you should knowrdquo

People Matters Global March 2019

copy 2019 FUJITSU

copy 2019 FUJITSU

Is the data on your side

7

Who does personal data belong to Can we trust information on the web Can we protect information from cyber attacks

ldquoNotPetya Costs Merck FedEx Maersk $800Mrdquo

Forbes Aug 2017copy 2019 FUJITSU

copy 2019 FUJITSU

Pre-industrial Era

Trust 10People

Trust 20Institutions

Industrial Era

Supply Centric Business

Digital Era

Human Centric Business

Trust 30Technology

Paradigm shift of trust

8

copy 2019 FUJITSU9

Human Centric Intelligent Society

Play video gtgt

10 copy 2019 FUJITSUUnclassified

Ronald Renes | CIO Van Oord

Strategy and data driven continuous improvement

11

Play video gtgt

About Van Oord

Dredging Netherlands Offshore Wind Offshore

From asset to knowledge

The Right People Sustainability Vox Data

Strategy

Values

Mission

Purpose

We create We care We work together We succeed

As a global marine contractor we are specialised in dredging oil amp gas infrastructure and offshore wind

We work closely and safely with our clients and stakeholders to create innovative and sustainable

solutions

Our purpose is to create a better world for future generations by delivering marine ingenuity

Van Oord ndash more than 40 offices worldwide

minus We operate the worldrsquos most advanced equipment

minus State-of-the-art vessels

minus Highest quality and safety and sustainable standards

minus Continuous investment programme

minus More than 100 vessels

Van Oord - equipment

Digital Transformation

Digital Transformation ndash a definition

ldquoDigital transformation is the integration of digital technology into all areas of a business

fundamentally changing how you operate and deliver value to customers Its also a cultural

change that requires organizations to continually challenge the status quo experiment and

get comfortable with failurerdquo

Why

Time

(years)-9000 -6000 -4000 -3000 -2000 0 -1000 2000

Population

(millions)

6000

0

3000

Agricultural

revolution

Pottery

Plow

Irrigation1st City

Metallurgy

Writing

Mathematics

Peak of Rome

Peak of Greece

Internet

PCrsquosGenome Project

Nuclear Energy

DNA Discovered

Penicillin1st Man on the Moon

High-speed Computers

Telephone

Germ Theory

2nd Agricultural Revolution

Automobile

Industrial Revolution

Airplane

Watt Engine

Railroads

Time

Why

Gro

wth

In a VUCA world a new

entrant promises superior

productserviceWersquore in trouble

Business is doing

well stick to what

we know and

everything will be

finehellipNew entrant fails to

deliver on promises

We feel confident

about our

decisions

Why

ldquohellip9 out of 10 companies believe digital transformation is now a requirement for success while

almost four out of five (79) say that without further digital transformation they will be at a competitive

disadvantage within three yearsrdquo

- Economist

Why

for our clients

for our people

for newopportunities

What our clients are doinghellip

ldquotransformative technologies are

hellip challenging our cost base

and setting new standards in

reliability productivity and

sustainabilityrdquo

ldquoRWS staat net als de rest van

Nederland aan het begin van een

datarevolutierdquo

The ambition is to have one global

implemented digitalized

scalable solution across both

engineering procurement

construction (EPC) and operations

(OPS)

The digital transformation is not

easy but the benefits far

outweigh the risks and

challenges

Empowering the people that do the work

How

exceptional client

experience

business growth

operational excellence

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 6: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

copy 2019 FUJITSUcopy 2019 FUJITSU

Todayrsquos society

6

ldquoPort of Rotterdam Authority launches new company PortXchange to make digital shipping app

Pronto available to ports worldwiderdquoPort of Rotterdam Aug 2019

Online amp Customer Experience Innovation

ldquoIMO outlines autonomous ship trial guidelinesrdquo

IMO Riviera Jul 2019

Smart lifestyle

ldquoConnected workers are going to transform the workplace heres what you should knowrdquo

People Matters Global March 2019

copy 2019 FUJITSU

copy 2019 FUJITSU

Is the data on your side

7

Who does personal data belong to Can we trust information on the web Can we protect information from cyber attacks

ldquoNotPetya Costs Merck FedEx Maersk $800Mrdquo

Forbes Aug 2017copy 2019 FUJITSU

copy 2019 FUJITSU

Pre-industrial Era

Trust 10People

Trust 20Institutions

Industrial Era

Supply Centric Business

Digital Era

Human Centric Business

Trust 30Technology

Paradigm shift of trust

8

copy 2019 FUJITSU9

Human Centric Intelligent Society

Play video gtgt

10 copy 2019 FUJITSUUnclassified

Ronald Renes | CIO Van Oord

Strategy and data driven continuous improvement

11

Play video gtgt

About Van Oord

Dredging Netherlands Offshore Wind Offshore

From asset to knowledge

The Right People Sustainability Vox Data

Strategy

Values

Mission

Purpose

We create We care We work together We succeed

As a global marine contractor we are specialised in dredging oil amp gas infrastructure and offshore wind

We work closely and safely with our clients and stakeholders to create innovative and sustainable

solutions

Our purpose is to create a better world for future generations by delivering marine ingenuity

Van Oord ndash more than 40 offices worldwide

minus We operate the worldrsquos most advanced equipment

minus State-of-the-art vessels

minus Highest quality and safety and sustainable standards

minus Continuous investment programme

minus More than 100 vessels

Van Oord - equipment

Digital Transformation

Digital Transformation ndash a definition

ldquoDigital transformation is the integration of digital technology into all areas of a business

fundamentally changing how you operate and deliver value to customers Its also a cultural

change that requires organizations to continually challenge the status quo experiment and

get comfortable with failurerdquo

Why

Time

(years)-9000 -6000 -4000 -3000 -2000 0 -1000 2000

Population

(millions)

6000

0

3000

Agricultural

revolution

Pottery

Plow

Irrigation1st City

Metallurgy

Writing

Mathematics

Peak of Rome

Peak of Greece

Internet

PCrsquosGenome Project

Nuclear Energy

DNA Discovered

Penicillin1st Man on the Moon

High-speed Computers

Telephone

Germ Theory

2nd Agricultural Revolution

Automobile

Industrial Revolution

Airplane

Watt Engine

Railroads

Time

Why

Gro

wth

In a VUCA world a new

entrant promises superior

productserviceWersquore in trouble

Business is doing

well stick to what

we know and

everything will be

finehellipNew entrant fails to

deliver on promises

We feel confident

about our

decisions

Why

ldquohellip9 out of 10 companies believe digital transformation is now a requirement for success while

almost four out of five (79) say that without further digital transformation they will be at a competitive

disadvantage within three yearsrdquo

- Economist

Why

for our clients

for our people

for newopportunities

What our clients are doinghellip

ldquotransformative technologies are

hellip challenging our cost base

and setting new standards in

reliability productivity and

sustainabilityrdquo

ldquoRWS staat net als de rest van

Nederland aan het begin van een

datarevolutierdquo

The ambition is to have one global

implemented digitalized

scalable solution across both

engineering procurement

construction (EPC) and operations

(OPS)

The digital transformation is not

easy but the benefits far

outweigh the risks and

challenges

Empowering the people that do the work

How

exceptional client

experience

business growth

operational excellence

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 7: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

copy 2019 FUJITSU

Is the data on your side

7

Who does personal data belong to Can we trust information on the web Can we protect information from cyber attacks

ldquoNotPetya Costs Merck FedEx Maersk $800Mrdquo

Forbes Aug 2017copy 2019 FUJITSU

copy 2019 FUJITSU

Pre-industrial Era

Trust 10People

Trust 20Institutions

Industrial Era

Supply Centric Business

Digital Era

Human Centric Business

Trust 30Technology

Paradigm shift of trust

8

copy 2019 FUJITSU9

Human Centric Intelligent Society

Play video gtgt

10 copy 2019 FUJITSUUnclassified

Ronald Renes | CIO Van Oord

Strategy and data driven continuous improvement

11

Play video gtgt

About Van Oord

Dredging Netherlands Offshore Wind Offshore

From asset to knowledge

The Right People Sustainability Vox Data

Strategy

Values

Mission

Purpose

We create We care We work together We succeed

As a global marine contractor we are specialised in dredging oil amp gas infrastructure and offshore wind

We work closely and safely with our clients and stakeholders to create innovative and sustainable

solutions

Our purpose is to create a better world for future generations by delivering marine ingenuity

Van Oord ndash more than 40 offices worldwide

minus We operate the worldrsquos most advanced equipment

minus State-of-the-art vessels

minus Highest quality and safety and sustainable standards

minus Continuous investment programme

minus More than 100 vessels

Van Oord - equipment

Digital Transformation

Digital Transformation ndash a definition

ldquoDigital transformation is the integration of digital technology into all areas of a business

fundamentally changing how you operate and deliver value to customers Its also a cultural

change that requires organizations to continually challenge the status quo experiment and

get comfortable with failurerdquo

Why

Time

(years)-9000 -6000 -4000 -3000 -2000 0 -1000 2000

Population

(millions)

6000

0

3000

Agricultural

revolution

Pottery

Plow

Irrigation1st City

Metallurgy

Writing

Mathematics

Peak of Rome

Peak of Greece

Internet

PCrsquosGenome Project

Nuclear Energy

DNA Discovered

Penicillin1st Man on the Moon

High-speed Computers

Telephone

Germ Theory

2nd Agricultural Revolution

Automobile

Industrial Revolution

Airplane

Watt Engine

Railroads

Time

Why

Gro

wth

In a VUCA world a new

entrant promises superior

productserviceWersquore in trouble

Business is doing

well stick to what

we know and

everything will be

finehellipNew entrant fails to

deliver on promises

We feel confident

about our

decisions

Why

ldquohellip9 out of 10 companies believe digital transformation is now a requirement for success while

almost four out of five (79) say that without further digital transformation they will be at a competitive

disadvantage within three yearsrdquo

- Economist

Why

for our clients

for our people

for newopportunities

What our clients are doinghellip

ldquotransformative technologies are

hellip challenging our cost base

and setting new standards in

reliability productivity and

sustainabilityrdquo

ldquoRWS staat net als de rest van

Nederland aan het begin van een

datarevolutierdquo

The ambition is to have one global

implemented digitalized

scalable solution across both

engineering procurement

construction (EPC) and operations

(OPS)

The digital transformation is not

easy but the benefits far

outweigh the risks and

challenges

Empowering the people that do the work

How

exceptional client

experience

business growth

operational excellence

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 8: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

copy 2019 FUJITSU

Pre-industrial Era

Trust 10People

Trust 20Institutions

Industrial Era

Supply Centric Business

Digital Era

Human Centric Business

Trust 30Technology

Paradigm shift of trust

8

copy 2019 FUJITSU9

Human Centric Intelligent Society

Play video gtgt

10 copy 2019 FUJITSUUnclassified

Ronald Renes | CIO Van Oord

Strategy and data driven continuous improvement

11

Play video gtgt

About Van Oord

Dredging Netherlands Offshore Wind Offshore

From asset to knowledge

The Right People Sustainability Vox Data

Strategy

Values

Mission

Purpose

We create We care We work together We succeed

As a global marine contractor we are specialised in dredging oil amp gas infrastructure and offshore wind

We work closely and safely with our clients and stakeholders to create innovative and sustainable

solutions

Our purpose is to create a better world for future generations by delivering marine ingenuity

Van Oord ndash more than 40 offices worldwide

minus We operate the worldrsquos most advanced equipment

minus State-of-the-art vessels

minus Highest quality and safety and sustainable standards

minus Continuous investment programme

minus More than 100 vessels

Van Oord - equipment

Digital Transformation

Digital Transformation ndash a definition

ldquoDigital transformation is the integration of digital technology into all areas of a business

fundamentally changing how you operate and deliver value to customers Its also a cultural

change that requires organizations to continually challenge the status quo experiment and

get comfortable with failurerdquo

Why

Time

(years)-9000 -6000 -4000 -3000 -2000 0 -1000 2000

Population

(millions)

6000

0

3000

Agricultural

revolution

Pottery

Plow

Irrigation1st City

Metallurgy

Writing

Mathematics

Peak of Rome

Peak of Greece

Internet

PCrsquosGenome Project

Nuclear Energy

DNA Discovered

Penicillin1st Man on the Moon

High-speed Computers

Telephone

Germ Theory

2nd Agricultural Revolution

Automobile

Industrial Revolution

Airplane

Watt Engine

Railroads

Time

Why

Gro

wth

In a VUCA world a new

entrant promises superior

productserviceWersquore in trouble

Business is doing

well stick to what

we know and

everything will be

finehellipNew entrant fails to

deliver on promises

We feel confident

about our

decisions

Why

ldquohellip9 out of 10 companies believe digital transformation is now a requirement for success while

almost four out of five (79) say that without further digital transformation they will be at a competitive

disadvantage within three yearsrdquo

- Economist

Why

for our clients

for our people

for newopportunities

What our clients are doinghellip

ldquotransformative technologies are

hellip challenging our cost base

and setting new standards in

reliability productivity and

sustainabilityrdquo

ldquoRWS staat net als de rest van

Nederland aan het begin van een

datarevolutierdquo

The ambition is to have one global

implemented digitalized

scalable solution across both

engineering procurement

construction (EPC) and operations

(OPS)

The digital transformation is not

easy but the benefits far

outweigh the risks and

challenges

Empowering the people that do the work

How

exceptional client

experience

business growth

operational excellence

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 9: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

copy 2019 FUJITSU9

Human Centric Intelligent Society

Play video gtgt

10 copy 2019 FUJITSUUnclassified

Ronald Renes | CIO Van Oord

Strategy and data driven continuous improvement

11

Play video gtgt

About Van Oord

Dredging Netherlands Offshore Wind Offshore

From asset to knowledge

The Right People Sustainability Vox Data

Strategy

Values

Mission

Purpose

We create We care We work together We succeed

As a global marine contractor we are specialised in dredging oil amp gas infrastructure and offshore wind

We work closely and safely with our clients and stakeholders to create innovative and sustainable

solutions

Our purpose is to create a better world for future generations by delivering marine ingenuity

Van Oord ndash more than 40 offices worldwide

minus We operate the worldrsquos most advanced equipment

minus State-of-the-art vessels

minus Highest quality and safety and sustainable standards

minus Continuous investment programme

minus More than 100 vessels

Van Oord - equipment

Digital Transformation

Digital Transformation ndash a definition

ldquoDigital transformation is the integration of digital technology into all areas of a business

fundamentally changing how you operate and deliver value to customers Its also a cultural

change that requires organizations to continually challenge the status quo experiment and

get comfortable with failurerdquo

Why

Time

(years)-9000 -6000 -4000 -3000 -2000 0 -1000 2000

Population

(millions)

6000

0

3000

Agricultural

revolution

Pottery

Plow

Irrigation1st City

Metallurgy

Writing

Mathematics

Peak of Rome

Peak of Greece

Internet

PCrsquosGenome Project

Nuclear Energy

DNA Discovered

Penicillin1st Man on the Moon

High-speed Computers

Telephone

Germ Theory

2nd Agricultural Revolution

Automobile

Industrial Revolution

Airplane

Watt Engine

Railroads

Time

Why

Gro

wth

In a VUCA world a new

entrant promises superior

productserviceWersquore in trouble

Business is doing

well stick to what

we know and

everything will be

finehellipNew entrant fails to

deliver on promises

We feel confident

about our

decisions

Why

ldquohellip9 out of 10 companies believe digital transformation is now a requirement for success while

almost four out of five (79) say that without further digital transformation they will be at a competitive

disadvantage within three yearsrdquo

- Economist

Why

for our clients

for our people

for newopportunities

What our clients are doinghellip

ldquotransformative technologies are

hellip challenging our cost base

and setting new standards in

reliability productivity and

sustainabilityrdquo

ldquoRWS staat net als de rest van

Nederland aan het begin van een

datarevolutierdquo

The ambition is to have one global

implemented digitalized

scalable solution across both

engineering procurement

construction (EPC) and operations

(OPS)

The digital transformation is not

easy but the benefits far

outweigh the risks and

challenges

Empowering the people that do the work

How

exceptional client

experience

business growth

operational excellence

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 10: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

10 copy 2019 FUJITSUUnclassified

Ronald Renes | CIO Van Oord

Strategy and data driven continuous improvement

11

Play video gtgt

About Van Oord

Dredging Netherlands Offshore Wind Offshore

From asset to knowledge

The Right People Sustainability Vox Data

Strategy

Values

Mission

Purpose

We create We care We work together We succeed

As a global marine contractor we are specialised in dredging oil amp gas infrastructure and offshore wind

We work closely and safely with our clients and stakeholders to create innovative and sustainable

solutions

Our purpose is to create a better world for future generations by delivering marine ingenuity

Van Oord ndash more than 40 offices worldwide

minus We operate the worldrsquos most advanced equipment

minus State-of-the-art vessels

minus Highest quality and safety and sustainable standards

minus Continuous investment programme

minus More than 100 vessels

Van Oord - equipment

Digital Transformation

Digital Transformation ndash a definition

ldquoDigital transformation is the integration of digital technology into all areas of a business

fundamentally changing how you operate and deliver value to customers Its also a cultural

change that requires organizations to continually challenge the status quo experiment and

get comfortable with failurerdquo

Why

Time

(years)-9000 -6000 -4000 -3000 -2000 0 -1000 2000

Population

(millions)

6000

0

3000

Agricultural

revolution

Pottery

Plow

Irrigation1st City

Metallurgy

Writing

Mathematics

Peak of Rome

Peak of Greece

Internet

PCrsquosGenome Project

Nuclear Energy

DNA Discovered

Penicillin1st Man on the Moon

High-speed Computers

Telephone

Germ Theory

2nd Agricultural Revolution

Automobile

Industrial Revolution

Airplane

Watt Engine

Railroads

Time

Why

Gro

wth

In a VUCA world a new

entrant promises superior

productserviceWersquore in trouble

Business is doing

well stick to what

we know and

everything will be

finehellipNew entrant fails to

deliver on promises

We feel confident

about our

decisions

Why

ldquohellip9 out of 10 companies believe digital transformation is now a requirement for success while

almost four out of five (79) say that without further digital transformation they will be at a competitive

disadvantage within three yearsrdquo

- Economist

Why

for our clients

for our people

for newopportunities

What our clients are doinghellip

ldquotransformative technologies are

hellip challenging our cost base

and setting new standards in

reliability productivity and

sustainabilityrdquo

ldquoRWS staat net als de rest van

Nederland aan het begin van een

datarevolutierdquo

The ambition is to have one global

implemented digitalized

scalable solution across both

engineering procurement

construction (EPC) and operations

(OPS)

The digital transformation is not

easy but the benefits far

outweigh the risks and

challenges

Empowering the people that do the work

How

exceptional client

experience

business growth

operational excellence

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 11: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

11

Play video gtgt

About Van Oord

Dredging Netherlands Offshore Wind Offshore

From asset to knowledge

The Right People Sustainability Vox Data

Strategy

Values

Mission

Purpose

We create We care We work together We succeed

As a global marine contractor we are specialised in dredging oil amp gas infrastructure and offshore wind

We work closely and safely with our clients and stakeholders to create innovative and sustainable

solutions

Our purpose is to create a better world for future generations by delivering marine ingenuity

Van Oord ndash more than 40 offices worldwide

minus We operate the worldrsquos most advanced equipment

minus State-of-the-art vessels

minus Highest quality and safety and sustainable standards

minus Continuous investment programme

minus More than 100 vessels

Van Oord - equipment

Digital Transformation

Digital Transformation ndash a definition

ldquoDigital transformation is the integration of digital technology into all areas of a business

fundamentally changing how you operate and deliver value to customers Its also a cultural

change that requires organizations to continually challenge the status quo experiment and

get comfortable with failurerdquo

Why

Time

(years)-9000 -6000 -4000 -3000 -2000 0 -1000 2000

Population

(millions)

6000

0

3000

Agricultural

revolution

Pottery

Plow

Irrigation1st City

Metallurgy

Writing

Mathematics

Peak of Rome

Peak of Greece

Internet

PCrsquosGenome Project

Nuclear Energy

DNA Discovered

Penicillin1st Man on the Moon

High-speed Computers

Telephone

Germ Theory

2nd Agricultural Revolution

Automobile

Industrial Revolution

Airplane

Watt Engine

Railroads

Time

Why

Gro

wth

In a VUCA world a new

entrant promises superior

productserviceWersquore in trouble

Business is doing

well stick to what

we know and

everything will be

finehellipNew entrant fails to

deliver on promises

We feel confident

about our

decisions

Why

ldquohellip9 out of 10 companies believe digital transformation is now a requirement for success while

almost four out of five (79) say that without further digital transformation they will be at a competitive

disadvantage within three yearsrdquo

- Economist

Why

for our clients

for our people

for newopportunities

What our clients are doinghellip

ldquotransformative technologies are

hellip challenging our cost base

and setting new standards in

reliability productivity and

sustainabilityrdquo

ldquoRWS staat net als de rest van

Nederland aan het begin van een

datarevolutierdquo

The ambition is to have one global

implemented digitalized

scalable solution across both

engineering procurement

construction (EPC) and operations

(OPS)

The digital transformation is not

easy but the benefits far

outweigh the risks and

challenges

Empowering the people that do the work

How

exceptional client

experience

business growth

operational excellence

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 12: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

About Van Oord

Dredging Netherlands Offshore Wind Offshore

From asset to knowledge

The Right People Sustainability Vox Data

Strategy

Values

Mission

Purpose

We create We care We work together We succeed

As a global marine contractor we are specialised in dredging oil amp gas infrastructure and offshore wind

We work closely and safely with our clients and stakeholders to create innovative and sustainable

solutions

Our purpose is to create a better world for future generations by delivering marine ingenuity

Van Oord ndash more than 40 offices worldwide

minus We operate the worldrsquos most advanced equipment

minus State-of-the-art vessels

minus Highest quality and safety and sustainable standards

minus Continuous investment programme

minus More than 100 vessels

Van Oord - equipment

Digital Transformation

Digital Transformation ndash a definition

ldquoDigital transformation is the integration of digital technology into all areas of a business

fundamentally changing how you operate and deliver value to customers Its also a cultural

change that requires organizations to continually challenge the status quo experiment and

get comfortable with failurerdquo

Why

Time

(years)-9000 -6000 -4000 -3000 -2000 0 -1000 2000

Population

(millions)

6000

0

3000

Agricultural

revolution

Pottery

Plow

Irrigation1st City

Metallurgy

Writing

Mathematics

Peak of Rome

Peak of Greece

Internet

PCrsquosGenome Project

Nuclear Energy

DNA Discovered

Penicillin1st Man on the Moon

High-speed Computers

Telephone

Germ Theory

2nd Agricultural Revolution

Automobile

Industrial Revolution

Airplane

Watt Engine

Railroads

Time

Why

Gro

wth

In a VUCA world a new

entrant promises superior

productserviceWersquore in trouble

Business is doing

well stick to what

we know and

everything will be

finehellipNew entrant fails to

deliver on promises

We feel confident

about our

decisions

Why

ldquohellip9 out of 10 companies believe digital transformation is now a requirement for success while

almost four out of five (79) say that without further digital transformation they will be at a competitive

disadvantage within three yearsrdquo

- Economist

Why

for our clients

for our people

for newopportunities

What our clients are doinghellip

ldquotransformative technologies are

hellip challenging our cost base

and setting new standards in

reliability productivity and

sustainabilityrdquo

ldquoRWS staat net als de rest van

Nederland aan het begin van een

datarevolutierdquo

The ambition is to have one global

implemented digitalized

scalable solution across both

engineering procurement

construction (EPC) and operations

(OPS)

The digital transformation is not

easy but the benefits far

outweigh the risks and

challenges

Empowering the people that do the work

How

exceptional client

experience

business growth

operational excellence

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 13: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Van Oord ndash more than 40 offices worldwide

minus We operate the worldrsquos most advanced equipment

minus State-of-the-art vessels

minus Highest quality and safety and sustainable standards

minus Continuous investment programme

minus More than 100 vessels

Van Oord - equipment

Digital Transformation

Digital Transformation ndash a definition

ldquoDigital transformation is the integration of digital technology into all areas of a business

fundamentally changing how you operate and deliver value to customers Its also a cultural

change that requires organizations to continually challenge the status quo experiment and

get comfortable with failurerdquo

Why

Time

(years)-9000 -6000 -4000 -3000 -2000 0 -1000 2000

Population

(millions)

6000

0

3000

Agricultural

revolution

Pottery

Plow

Irrigation1st City

Metallurgy

Writing

Mathematics

Peak of Rome

Peak of Greece

Internet

PCrsquosGenome Project

Nuclear Energy

DNA Discovered

Penicillin1st Man on the Moon

High-speed Computers

Telephone

Germ Theory

2nd Agricultural Revolution

Automobile

Industrial Revolution

Airplane

Watt Engine

Railroads

Time

Why

Gro

wth

In a VUCA world a new

entrant promises superior

productserviceWersquore in trouble

Business is doing

well stick to what

we know and

everything will be

finehellipNew entrant fails to

deliver on promises

We feel confident

about our

decisions

Why

ldquohellip9 out of 10 companies believe digital transformation is now a requirement for success while

almost four out of five (79) say that without further digital transformation they will be at a competitive

disadvantage within three yearsrdquo

- Economist

Why

for our clients

for our people

for newopportunities

What our clients are doinghellip

ldquotransformative technologies are

hellip challenging our cost base

and setting new standards in

reliability productivity and

sustainabilityrdquo

ldquoRWS staat net als de rest van

Nederland aan het begin van een

datarevolutierdquo

The ambition is to have one global

implemented digitalized

scalable solution across both

engineering procurement

construction (EPC) and operations

(OPS)

The digital transformation is not

easy but the benefits far

outweigh the risks and

challenges

Empowering the people that do the work

How

exceptional client

experience

business growth

operational excellence

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 14: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

minus We operate the worldrsquos most advanced equipment

minus State-of-the-art vessels

minus Highest quality and safety and sustainable standards

minus Continuous investment programme

minus More than 100 vessels

Van Oord - equipment

Digital Transformation

Digital Transformation ndash a definition

ldquoDigital transformation is the integration of digital technology into all areas of a business

fundamentally changing how you operate and deliver value to customers Its also a cultural

change that requires organizations to continually challenge the status quo experiment and

get comfortable with failurerdquo

Why

Time

(years)-9000 -6000 -4000 -3000 -2000 0 -1000 2000

Population

(millions)

6000

0

3000

Agricultural

revolution

Pottery

Plow

Irrigation1st City

Metallurgy

Writing

Mathematics

Peak of Rome

Peak of Greece

Internet

PCrsquosGenome Project

Nuclear Energy

DNA Discovered

Penicillin1st Man on the Moon

High-speed Computers

Telephone

Germ Theory

2nd Agricultural Revolution

Automobile

Industrial Revolution

Airplane

Watt Engine

Railroads

Time

Why

Gro

wth

In a VUCA world a new

entrant promises superior

productserviceWersquore in trouble

Business is doing

well stick to what

we know and

everything will be

finehellipNew entrant fails to

deliver on promises

We feel confident

about our

decisions

Why

ldquohellip9 out of 10 companies believe digital transformation is now a requirement for success while

almost four out of five (79) say that without further digital transformation they will be at a competitive

disadvantage within three yearsrdquo

- Economist

Why

for our clients

for our people

for newopportunities

What our clients are doinghellip

ldquotransformative technologies are

hellip challenging our cost base

and setting new standards in

reliability productivity and

sustainabilityrdquo

ldquoRWS staat net als de rest van

Nederland aan het begin van een

datarevolutierdquo

The ambition is to have one global

implemented digitalized

scalable solution across both

engineering procurement

construction (EPC) and operations

(OPS)

The digital transformation is not

easy but the benefits far

outweigh the risks and

challenges

Empowering the people that do the work

How

exceptional client

experience

business growth

operational excellence

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 15: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Digital Transformation

Digital Transformation ndash a definition

ldquoDigital transformation is the integration of digital technology into all areas of a business

fundamentally changing how you operate and deliver value to customers Its also a cultural

change that requires organizations to continually challenge the status quo experiment and

get comfortable with failurerdquo

Why

Time

(years)-9000 -6000 -4000 -3000 -2000 0 -1000 2000

Population

(millions)

6000

0

3000

Agricultural

revolution

Pottery

Plow

Irrigation1st City

Metallurgy

Writing

Mathematics

Peak of Rome

Peak of Greece

Internet

PCrsquosGenome Project

Nuclear Energy

DNA Discovered

Penicillin1st Man on the Moon

High-speed Computers

Telephone

Germ Theory

2nd Agricultural Revolution

Automobile

Industrial Revolution

Airplane

Watt Engine

Railroads

Time

Why

Gro

wth

In a VUCA world a new

entrant promises superior

productserviceWersquore in trouble

Business is doing

well stick to what

we know and

everything will be

finehellipNew entrant fails to

deliver on promises

We feel confident

about our

decisions

Why

ldquohellip9 out of 10 companies believe digital transformation is now a requirement for success while

almost four out of five (79) say that without further digital transformation they will be at a competitive

disadvantage within three yearsrdquo

- Economist

Why

for our clients

for our people

for newopportunities

What our clients are doinghellip

ldquotransformative technologies are

hellip challenging our cost base

and setting new standards in

reliability productivity and

sustainabilityrdquo

ldquoRWS staat net als de rest van

Nederland aan het begin van een

datarevolutierdquo

The ambition is to have one global

implemented digitalized

scalable solution across both

engineering procurement

construction (EPC) and operations

(OPS)

The digital transformation is not

easy but the benefits far

outweigh the risks and

challenges

Empowering the people that do the work

How

exceptional client

experience

business growth

operational excellence

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 16: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Digital Transformation ndash a definition

ldquoDigital transformation is the integration of digital technology into all areas of a business

fundamentally changing how you operate and deliver value to customers Its also a cultural

change that requires organizations to continually challenge the status quo experiment and

get comfortable with failurerdquo

Why

Time

(years)-9000 -6000 -4000 -3000 -2000 0 -1000 2000

Population

(millions)

6000

0

3000

Agricultural

revolution

Pottery

Plow

Irrigation1st City

Metallurgy

Writing

Mathematics

Peak of Rome

Peak of Greece

Internet

PCrsquosGenome Project

Nuclear Energy

DNA Discovered

Penicillin1st Man on the Moon

High-speed Computers

Telephone

Germ Theory

2nd Agricultural Revolution

Automobile

Industrial Revolution

Airplane

Watt Engine

Railroads

Time

Why

Gro

wth

In a VUCA world a new

entrant promises superior

productserviceWersquore in trouble

Business is doing

well stick to what

we know and

everything will be

finehellipNew entrant fails to

deliver on promises

We feel confident

about our

decisions

Why

ldquohellip9 out of 10 companies believe digital transformation is now a requirement for success while

almost four out of five (79) say that without further digital transformation they will be at a competitive

disadvantage within three yearsrdquo

- Economist

Why

for our clients

for our people

for newopportunities

What our clients are doinghellip

ldquotransformative technologies are

hellip challenging our cost base

and setting new standards in

reliability productivity and

sustainabilityrdquo

ldquoRWS staat net als de rest van

Nederland aan het begin van een

datarevolutierdquo

The ambition is to have one global

implemented digitalized

scalable solution across both

engineering procurement

construction (EPC) and operations

(OPS)

The digital transformation is not

easy but the benefits far

outweigh the risks and

challenges

Empowering the people that do the work

How

exceptional client

experience

business growth

operational excellence

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 17: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Why

Time

(years)-9000 -6000 -4000 -3000 -2000 0 -1000 2000

Population

(millions)

6000

0

3000

Agricultural

revolution

Pottery

Plow

Irrigation1st City

Metallurgy

Writing

Mathematics

Peak of Rome

Peak of Greece

Internet

PCrsquosGenome Project

Nuclear Energy

DNA Discovered

Penicillin1st Man on the Moon

High-speed Computers

Telephone

Germ Theory

2nd Agricultural Revolution

Automobile

Industrial Revolution

Airplane

Watt Engine

Railroads

Time

Why

Gro

wth

In a VUCA world a new

entrant promises superior

productserviceWersquore in trouble

Business is doing

well stick to what

we know and

everything will be

finehellipNew entrant fails to

deliver on promises

We feel confident

about our

decisions

Why

ldquohellip9 out of 10 companies believe digital transformation is now a requirement for success while

almost four out of five (79) say that without further digital transformation they will be at a competitive

disadvantage within three yearsrdquo

- Economist

Why

for our clients

for our people

for newopportunities

What our clients are doinghellip

ldquotransformative technologies are

hellip challenging our cost base

and setting new standards in

reliability productivity and

sustainabilityrdquo

ldquoRWS staat net als de rest van

Nederland aan het begin van een

datarevolutierdquo

The ambition is to have one global

implemented digitalized

scalable solution across both

engineering procurement

construction (EPC) and operations

(OPS)

The digital transformation is not

easy but the benefits far

outweigh the risks and

challenges

Empowering the people that do the work

How

exceptional client

experience

business growth

operational excellence

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 18: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Time

Why

Gro

wth

In a VUCA world a new

entrant promises superior

productserviceWersquore in trouble

Business is doing

well stick to what

we know and

everything will be

finehellipNew entrant fails to

deliver on promises

We feel confident

about our

decisions

Why

ldquohellip9 out of 10 companies believe digital transformation is now a requirement for success while

almost four out of five (79) say that without further digital transformation they will be at a competitive

disadvantage within three yearsrdquo

- Economist

Why

for our clients

for our people

for newopportunities

What our clients are doinghellip

ldquotransformative technologies are

hellip challenging our cost base

and setting new standards in

reliability productivity and

sustainabilityrdquo

ldquoRWS staat net als de rest van

Nederland aan het begin van een

datarevolutierdquo

The ambition is to have one global

implemented digitalized

scalable solution across both

engineering procurement

construction (EPC) and operations

(OPS)

The digital transformation is not

easy but the benefits far

outweigh the risks and

challenges

Empowering the people that do the work

How

exceptional client

experience

business growth

operational excellence

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 19: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Why

ldquohellip9 out of 10 companies believe digital transformation is now a requirement for success while

almost four out of five (79) say that without further digital transformation they will be at a competitive

disadvantage within three yearsrdquo

- Economist

Why

for our clients

for our people

for newopportunities

What our clients are doinghellip

ldquotransformative technologies are

hellip challenging our cost base

and setting new standards in

reliability productivity and

sustainabilityrdquo

ldquoRWS staat net als de rest van

Nederland aan het begin van een

datarevolutierdquo

The ambition is to have one global

implemented digitalized

scalable solution across both

engineering procurement

construction (EPC) and operations

(OPS)

The digital transformation is not

easy but the benefits far

outweigh the risks and

challenges

Empowering the people that do the work

How

exceptional client

experience

business growth

operational excellence

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 20: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Why

for our clients

for our people

for newopportunities

What our clients are doinghellip

ldquotransformative technologies are

hellip challenging our cost base

and setting new standards in

reliability productivity and

sustainabilityrdquo

ldquoRWS staat net als de rest van

Nederland aan het begin van een

datarevolutierdquo

The ambition is to have one global

implemented digitalized

scalable solution across both

engineering procurement

construction (EPC) and operations

(OPS)

The digital transformation is not

easy but the benefits far

outweigh the risks and

challenges

Empowering the people that do the work

How

exceptional client

experience

business growth

operational excellence

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 21: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

What our clients are doinghellip

ldquotransformative technologies are

hellip challenging our cost base

and setting new standards in

reliability productivity and

sustainabilityrdquo

ldquoRWS staat net als de rest van

Nederland aan het begin van een

datarevolutierdquo

The ambition is to have one global

implemented digitalized

scalable solution across both

engineering procurement

construction (EPC) and operations

(OPS)

The digital transformation is not

easy but the benefits far

outweigh the risks and

challenges

Empowering the people that do the work

How

exceptional client

experience

business growth

operational excellence

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 22: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Empowering the people that do the work

How

exceptional client

experience

business growth

operational excellence

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 23: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

How

exceptional client

experience

business growth

operational excellence

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 24: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

How

exceptional client

experience

business growth

operational excellence

data management

digital movement

knowledge amp experience

+ data

= better decisions

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 25: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Data management

25

Data Governance

Establish data ownership data

policies principles data

organization reporting steering

on data KPIrsquos

Landscape Transition

Re-organize application and

technology landscape by maximizing

use of data in a modern workspace

by value creation and innovation

Data Management

Select develop implement and

operationalize all data management

knowledge areas in relation to

people process technology goals

and principles

Change Programme

Our knowledge and 150+ years of

experience is our strength In order to

further develop the data driven

organization we need to reconsider and

build our data habits and digital culture

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 26: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

IT is a business focused partner responsible for the delivery of high quality IT

services where innovation continuity and security are leading

How IT supports digitalisation

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 27: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

IT is business critical in reaching digitalization

DIGITALIZATION

HIGH QUALITY AND USEFUL DATA

APPLICATIONS AND ARCHITECTURE

INFORMATION SECURITY

NETWORK- OPERATIONS- AND WORKPLACE-INFRASTRUCTURE

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 28: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Trust

Take-aways

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 29: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

29 copy 2019 FUJITSUUnclassified

Thank you

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 30: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

30 copy 2019 FUJITSUUnclassified

Short break

See you a 3PM

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 31: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

31 copy 2019 FUJITSUUnclassified

Edwin Franse | IT Security Officer Van Oord

Protecting our data and business all around the world

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 32: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Text (L) amp Image (M)

Edwin Franse

32

bull 1994 Bachelor of science in electrical engineering

bull 1998 Master of science in technology management

bull March 1998 CMG

bull April 2006 Dutch Ministry of Defense

bull September 2017 Van Oord

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 33: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Text (XXL)

Organizational structure

33

CIO

Ronald Renes

InnovationProjects portfolio

management

IT OperationsEnterprise

ArchitectureInformation

Security

Edwin FransePatrick Spierings

Executive

Board

Jacques Domenie

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 34: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Text (L) amp Image (M)

Intellectual property theft

Awareness at C-level (competition innovation)

CIO

IT Security Officer

GDPR legislation comes into force

Cybersecurity regulations for the maritime industry

Information Security within Van Oord - history

34

2015

2017

2018

2021

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 35: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Text (L) amp Image (M)

Dutch National Coordinator of Counterterrorism and Security

35

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 36: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Text (M) amp Image (L)

bull Insufficient process oriented

bull In essence good tooling -configuration and coherence are missing

bull Variety of maturity levels per department

bull IT foundation is lacking no standards no methodology no roadmaps

bull Speed of organisational changes

bull Great people with great responsibility

Information Security at Van Oord

My initial findings

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 37: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Text (XXL)

Information Security - scope

Information Security

IT security

Vendor Supply Chain

Security

Personnel Security

Physical Security

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 38: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Text (XXL)

IT Security in a Volatile Uncertain Complex Ambiguous World

38

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 39: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Text (XXL)

Information Security ndash how I see it

bull Security is not an outcome ndash

it is a capability

bull Awareness should motivate ndash

not punish

bull Must never be an excuse Not

ldquoI told you sordquo

bull Awareness is necessary

compensating IT

bull Security should make sense

bull Security must make it easy ndash

insecure should be harder

Security needs to enable and deliver value

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 40: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Text (XXL)

Frameworks ndash what guidelines or controls to start with

40

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 41: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Text (XXL)

41

Prioritized set of actionsISMS

Relates to ISO27001

Best practices guidelinesBest practices guidelines Best practices guidelines

Collaboration

Frameworks ndash what guidelines or controls to start with

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 42: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Text (XXL)

With this initial selection

all DevOps teams are taking part

Center for Information Security Controls

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 43: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Text (XXL)

Vendor Selection Trajectory

Timeline

21 August

Workshop 1

invitation to 7 vendors

28 ndash 31 August

QA

3 October

vendor proposals

10-11 October

Workshop 2

Elaboration proposals

20 November

Reference visit

31 October

Workshop 3

final ranking

4 December

Start contract

negotiation and

scoping

28 February

Signed contract

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 44: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Text (L) amp Image (XL)

1 Choose your framework (and stick to it)

2 Choose your security partner (and go for it)

3 Information security is not an outcome it is a

capability

4 Information security is about delivering value to

business

5 Information security from various perspectives

(physical IT personnel supply chain) and with

holistic approach (people process technology)

Conclusion

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 45: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

45 copy 2019 FUJITSUUnclassified

Thank you

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 46: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

46 copy 2019 FUJITSUUnclassified

Workshop based on the results from our survey

Interactive workshop

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 47: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

47 copy 2019 FUJITSUUnclassified

Question 1

Thanks for filling out our short survey

24 respondents

0

25

50

25

Is digitization part of your company IT strategy

Digital is not at our agenda

Strategy in development

First digital projects are visible

Digital is fully integrated into our organization and services

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 48: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

48 copy 2019 FUJITSUUnclassified

Question 2

42

38

17

Do you have full insight in the performance of your (IT) Services

Not yet Only for IT Cross departments

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 49: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

49 copy 2019 FUJITSUUnclassified

Question 3

0 20 40 60 80

Other

Knowing which rules to comply to percountryregion

Gaining control of the governance on aworld wide scale

Aligning processes and procedures totechnology

38

42

75

What are your main compliancy challenges (select as many answers as you wish)

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 50: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

50 copy 2019 FUJITSUUnclassified

Question 4

Otherbull Acting too slowbull Insider threat

0 10 20 30 40 50 60 70 80

Other

Ransomware Phishing

Man in the middle attacks

Disruption of business

Information theft

9

73

23

68

55

What type of threats are most applicable for your organization (select as many answers as you wish)

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 51: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

51 copy 2019 FUJITSUUnclassified

Boat trip

1600-1800 Networking whilst enjoying the World Port Days during a boat trip

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 52: How to combine innovation, digitization and security? · 2019. 11. 12. · 2015 Human Centric Innovation in Action ... by value creation and innovation Data Management Select, develop,

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuuml

yacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt|

copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz 0123456789 notrdquopound$^amp()_+-

=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacute

ucircuumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash

―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl