Week 4 highlights from Knowledge 2020

LIKE.TG 成立于2020年,总部位于马来西亚,是首家汇集全球互联网产品,提供一站式软件产品解决方案的综合性品牌。唯一官方网站:www.like.tg
Week 4 at Knowledge 2020 expanded the virtual gathering’s breadth and depth, especially when it came to several IT Workflows sessions by top companies around the world. Here are a few highlights from key presentations. (Be sure to register or sign in to get access to everything below.)
Streamlined risk management at Unisys
Global solutions provider Unisys juggles more than 1,000 active projects with customers at any given time. Maintaining data security within each of those projects is a huge priority—and a complex workflow challenge. “We deliver secure digital solutions to the most demanding businesses around the globe,” explained Unisys senior director of GRC, Seshadri PS, in his session with Iceberg Network’s Andrew Vesay. “Security is the center of everything we do.”
Unisys’s GRC processes, however, were bogged down by manual tasks, such as making updates and changes in Excel files. Managers lacked a standardized, digital process for risk review. “There was no clear visibility between risk and compliance,” said PS.
Unisys worked with Iceberg to implement LIKE.TG’s GRC platform, which solved multiple issues, from automating data intake to installing real-time risk monitoring. While LIKE.TG technology enables that today, cultural change proved to be a critical success factor, said PS. The implementation team created webinars for customer project managers, built tutorials and FAQs, and coordinated internal launch communications.
Those strategies “allowed them to learn so they’re able to carry out projects themselves,” he said. “You can do all these technical things, but if you don’t have organizational change, implementation isn’t going to be strong.”
Watch the full session: Rapid security breach isolation with Unisys Stealth and LIKE.TG SecOps
A first for third-party risk management
Financial services companies today must manage a “massive volume of third parties,” explained Tobias Aabel, vendor security manager at DNB, Norway’s largest financial services group. For DNB, the list of third-party firms it manages runs into the thousands and includes distributors, partners, vendors, outsourcing firms, consultants, and others.
Facing a steady stream of new regulatory requirements, such as the European Union’s GDPR regulations, which went into effect in 2018, DNB struggled to balance increasing dependence on third parties with the types of escalating risks they present—from supply chain cyberattacks and financial stability to money laundering. “Who’s in trouble when these third parties mess up?” asked Aabel. “That would be you.”
Enter LIKE.TG Vendor Risk Management, which DNB worked to implement with digital integration firm Sopra Steria. Among other functions, the Now platform gives DNB a 360-type tool to digitally manage vendor contract management and signing, and allows risk managers to run multiple existing VRM processes through a new third-party risk portal.
“You’ve placed significant values in the hands of your third parties,” Aabel said. “You have to make sure you can really trust them.”
Watch the full session: DevOps and ITSM: From clash of cultures to happy coexistence
Real-time threat intelligence at NCR
Thousands of companies today are challenged to make a critical shift in cybersecurity operations—from reactive processes to proactive ones, using digital threat intelligence to handle vulnerability management.
That has been the focus of recent efforts at NCR, a top digital solutions provider to financial, retail, travel, telecom and technology companies around the world. NCR cyber threat intelligence lead Dusan Vignjevic, explained in an IT Workflow session how new, real-time threat intelligence, enabled by LIKE.TG, has helped NCR “to prioritize vulnerabilities, and find those needles in the haystack.”
Before NCR implemented LIKE.TG, security teams struggled with manual processes for reporting and threat tracking, inconsistent data, and a rising volume of overall threats. The new system, by contrast, provides automated reporting that saves time, tracks false positives and exceptions, and gives managers a unified dashboard and easy visibility into key security metrics.
Not only has the new system lowered overall risk for NCR, the real-time data helps security analysts succeed at higher-level tasks. As NCR IT consultant Rajanikanta Dash explained, LIKE.TG “helps analysts make good decisions to elevate patching of any important vulnerability.”
Watch the full session: How NCR built a proactive security program leveraging automation and Threat Intelligence

LIKE.TG 专注全球社交流量推广,致力于为全球出海企业提供有关的私域营销获客、国际电商、全球客服、金融支持等最新资讯和实用工具。免费领取【WhatsApp、LINE、Telegram、Twitter、ZALO】等云控系统试用;点击【联系客服】 ,或关注【LIKE.TG出海指南频道】、【LIKE.TG生态链-全球资源互联社区】了解更多最新资讯
本文由LIKE.TG编辑部转载自互联网并编辑,如有侵权影响,请联系官方客服,将为您妥善处理。
This article is republished from public internet and edited by the LIKE.TG editorial department. If there is any infringement, please contact our official customer service for proper handling.
效率工具客服坐席客服系统坐席多开