Search for a command to run...
The environment that companies operate in is constantly evolving, and the risks associated with information security are become more advanced and more diversified, resulting in a greater level of damage. Targeted attacks have a major impact on society. DDoS attacks, manipulation of websites and leakage of information also occur with great frequency. Incidents involving information security has spread to every corner of the IT services industry, with examples including the theft of personal information from unauthorized applications installed on smartphones, increased damage due to unauthorized access from passwords being shared around the internet, or cloud service operates losing customer data. NTT DATA continues to propose information security measures that meet with this changing environment without making any compromises. The NTT DATA Group information security governance also takes on a governance system run by operating companies, with regional security policies based on the GSP (NTT DATA Group Security Policy) for each of the five regions and solutions (Japan, EMEA, APAC, China, Americas, and Solutions) developed and put into operation. This has allowed information security of the NTT DATA Group to be managed quicker and more accurately. NTT DATA and these operating companies work closely together as NTT DATA provides security information, while each operating company holds discussions on incident response and reports on progress related to information security. The NTT DATA Group will continue to take steady and focused efforts for implementing information security. This is because each and every employee of the NTT DATA Group considers themselves a professional handling information, and always takes action with an awareness of information security. In turn, this helps to increase customer satisfaction levels and information security capabilities within the NTT DATA Group. As a corporate group working at the core of IT society, NTT DATA will continue its efforts in implementing further information security to provide customers with a new sense of value with safe and secure services, all without betraying the customer.