F
Risks analysis [G4-14]
F.2
Business risks [G4-13]
Trusted partner for your Digital Journey
230
[G4-13]
Business risks
F.2
Innovation and newofferings
F.2.1
In a context of rapid technological evolutions, rapid business
loss of opportunities, but also to prevent accessing more
neglect business model disruptions. Such risks may result in the
there is a risk for IT companies to miss technological shifts or to
transformation and emergence of (new) offers on the market,
profitable or growing markets.
Scientific Community looking ahead for future trends, and a
supervision of the Chief Technology Officer, which involves a
In this domain, Atos has deployed a proactive strategy under the
network of recognized “experts”.
process (named “RAPID”) has been setup.
monitoring R&D projects – for which a specific risk assessment
The R&D investment committee is in charge of approving and
Technology and IT risks
F.2.2
IT system breakdowns could be critical both for the Group’s
covering security and back-up systems and effective insurance
and procedures to ensure the proper management of IT risks,
services provided. The Group has implemented specific programs
internal operations and its customers’ needs in respect of the
cover.
administrative and technical procedures for safeguarding and
centers and Data Centers are specifically subject to extensive
IT production sites, offshore development centers, maintenance
supply breakdown or disruption, fire, regulation of extreme
monitoring, covering physical and IT system access, energy
temperature changes, data storage and back-up, contingency
and disaster recovery plans.
certified) for strengthening its defense capabilities and for
system relying on ISO 27001 standard (which for most of it is
Atos has also deployed an information security management
security of data. An information breach in the system and loss of
to conduct attacks on Atos systems that could compromise the
However, the visibility of Atos and its clients may attract hackers
preventing unauthorized access to information and systems.
confidential information (especially in payments activities) could
operations than a hardware failure. The loss of confidential
have a longer and more significant impact on the business
damages.
thus the loss of their business, as well as imposition of fines and
information could result in losing the customers’ confidence and
worldwide, coordinates remediation actions on a 24x7 basis
Team) that centralizes all security events and security incidents
has implemented a CSIRT (Computer Security Incident Response
delay of reaction and enforce its cyber-security defenses, Atos
forces and expertise.
follow the sun while providing forensic and threat management
In order to minimize the impact of security incidents, reduce