Table of Contents Table of Contents
Previous Page  230 / 334 Next Page
Information
Show Menu
Previous Page 230 / 334 Next Page
Page Background

F

Risks analysis [G4-14]

F.2

Business risks [G4-13]

Trusted partner for your Digital Journey

230

[G4-13]

Business risks

F.2

Innovation and newofferings

F.2.1

In a context of rapid technological evolutions, rapid business

loss of opportunities, but also to prevent accessing more

neglect business model disruptions. Such risks may result in the

there is a risk for IT companies to miss technological shifts or to

transformation and emergence of (new) offers on the market,

profitable or growing markets.

Scientific Community looking ahead for future trends, and a

supervision of the Chief Technology Officer, which involves a

In this domain, Atos has deployed a proactive strategy under the

network of recognized “experts”.

process (named “RAPID”) has been setup.

monitoring R&D projects – for which a specific risk assessment

The R&D investment committee is in charge of approving and

Technology and IT risks

F.2.2

IT system breakdowns could be critical both for the Group’s

covering security and back-up systems and effective insurance

and procedures to ensure the proper management of IT risks,

services provided. The Group has implemented specific programs

internal operations and its customers’ needs in respect of the

cover.

administrative and technical procedures for safeguarding and

centers and Data Centers are specifically subject to extensive

IT production sites, offshore development centers, maintenance

supply breakdown or disruption, fire, regulation of extreme

monitoring, covering physical and IT system access, energy

temperature changes, data storage and back-up, contingency

and disaster recovery plans.

certified) for strengthening its defense capabilities and for

system relying on ISO 27001 standard (which for most of it is

Atos has also deployed an information security management

security of data. An information breach in the system and loss of

to conduct attacks on Atos systems that could compromise the

However, the visibility of Atos and its clients may attract hackers

preventing unauthorized access to information and systems.

confidential information (especially in payments activities) could

operations than a hardware failure. The loss of confidential

have a longer and more significant impact on the business

damages.

thus the loss of their business, as well as imposition of fines and

information could result in losing the customers’ confidence and

worldwide, coordinates remediation actions on a 24x7 basis

Team) that centralizes all security events and security incidents

has implemented a CSIRT (Computer Security Incident Response

delay of reaction and enforce its cyber-security defenses, Atos

forces and expertise.

follow the sun while providing forensic and threat management

In order to minimize the impact of security incidents, reduce