-
Featured services
Think beyond the robots
The successful integration of AI and IoT in manufacturing will depend on effective change management, upskilling and rethinking business models.
Read the blog -
Services
Leverage our capabilities to accelerate your business transformation.
-
Services
Network Services
Popular Products
-
Private 5G
Our turnkey private 5G network enables custom-built solutions that are designed around unique use cases and strategies, and deployed, run and optimized through a full network-as-a-service model.
-
Managed Campus Networks
Our Managed Campus Networks services transform campus networks, corporate area networks and interconnected local area networks, and connect smart places and industries.
-
-
Services
Cloud
Popular Products
-
Cloud Architecture and Modernization
Discover how to achieve your business goals through cloud modernization practices, that deliver improved agility, reusability and scalability.
-
Cloud Optimization
Discover how to maximize operational excellence, business continuity and financial sustainability through our cloud-advanced optimization services.
-
-
Services
Consulting
-
-
Services
Data and Artificial intelligence
-
Services
Technology Solutions
Client stories
-
Services
Data Center Services
-
Services
CX and Design
-
Services
Application Services
-
Services
Sustainability Services
-
Services
Digital Workplace
-
Services
Business Process Services
Master your GenAI destiny
We’ll help you navigate the complexities and opportunities of GenAI.
Explore GenAI -
-
-
Insights
Recent Insights
-
The Future of Networking in 2025 and Beyond
-
Using the cloud to cut costs needs the right approach
When organizations focus on transformation, a move to the cloud can deliver cost savings – but they often need expert advice to help them along their journey
-
Make zero trust security work for your organization
Make zero trust security work for your organization across hybrid work environments.
-
-
Master your GenAI destiny
We’ll help you navigate the complexities and opportunities of GenAI.
Explore GenAI -
-
Master your GenAI destiny
We’ll help you navigate the complexities and opportunities of GenAI.
Explore GenAI -
Discover how we accelerate your business transformation
-
About us
CLIENT STORIES
-
Liantis
Over time, Liantis – an established HR company in Belgium – had built up data islands and isolated solutions as part of their legacy system.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
-
CLIENT STORIES
-
Liantis
Over time, Liantis – an established HR company in Belgium – had built up data islands and isolated solutions as part of their legacy system.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
-
CLIENT STORIES
-
Liantis
Over time, Liantis – an established HR company in Belgium – had built up data islands and isolated solutions as part of their legacy system.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
Everest Group PEAK Matrix® Assessment
NTT DATA is a Leader and Star Performer in the Everest Group Sustainability Enablement Technology Services PEAK Matrix® Assessment 2024.
Get the Everest report -
- Careers
Topics in this article
I am often asked, “Why does your office have ‘trust’ in its name?”
The Security and Trust Office of NTT Group was launched in July 2020, and as the CISO, I was asked to choose the name of the office to lead.
I strongly believe that trust will become the oil of the post-COVID world. As such, I felt that officially naming our operation the Security and Trust Office would be more appropriate and authentic than simply calling ourselves the “Office of the CISO”.
For me, our name is an expression of the need to strike a balance between cybersecurity and trust in conducting business. This is a mandate to which I am committed.
Trust has played a fundamental role in the history of human beings. No social contracts can be made without trust between the contracting bodies. Mutual trust drives collaboration and leads to the progress of our society. In other words, trust is an essential driver of the advancement of our society.
The COVID-19 pandemic has accelerated the adaptation of digital technology across the whole range of our socio-economic activities. This drastic and rapid shift to a “remote world” will be irreversible and continue for the coming decades. Trust used to be primarily formed through in-person meetings. But now, in our digitalized and remote-based world, trust and genuine human connections must be built in the absence of such interactions.
Here, I believe that the role of enterprise security becomes amplified. For example, trust will more easily be realized if identity and access management is ensured. System and organization control reports offer information that can validate whether an organization is trustworthy and that the integrity, availability and confidentiality of information are secured.
Therefore, in this new society, security and trust will become inseparable, just like the two sides of a coin. An entity that is not cybersecure won’t be able to earn the trust of other entities. Cybersecurity has become a prerequisite to becoming a trusted entity. And that’s why I wanted to call my office the “Security and Trust Office”.
Building trust
How is trust built? In her book The Power of Trust: How Companies Build It, Lose It, Regain It, Sandra J. Sucher, a Harvard Business School professor, writes that four key elements are required to build trust: competence, motives, means and impacts. This applies not only when an individual builds trust, but also when an organization builds trust. The individual or organization has to display its competence through good and credible motives and means. Finally, he or she or the entity needs to demonstrate impactful results. Trust will be built only after repeated demonstration of the four ingredients — competence, motives, means and impact — and it takes time.
- In cybersecurity, competence manifests itself through the presence and application of a deep and broad set of skills in cybersecurity practices. These required skill sets covers both technical knowledge and soft elements such as disciplined operational processes and organizational culture.
- Motives are people’s mindsets on why ensuring cybersecurity is important. At NTT, people’s attitudes are particularly important since what we provide to our clients are digital services. All NTT employees need to share a common mindset about why cybersecurity is important.
- Means are installed through security technology and tools and people’s activities. People’s activities include adherence to security guidelines, collaboration and information sharing.
- Finally, impact is about keeping damages from any cyberincidents to a minimum. Since completely avoiding cyberincidents is impossible, I would position “minimizing the damage” as impact.
The Power of Trust shares both success and failure stories. What these cases tell us is that building trust takes a long time, but also that, on the other hand, trust is fragile. It can be lost in a short period or during the course of a single event if an individual or an organization fails to prove their trustworthiness.
The Security and Trust Office will make long-lasting efforts to build and entrench a culture of trust within our company. Specifically, we will develop a competent talent pool within the NTT Group. Second, we will amplify our people’s motives to ensure cybersecurity of our services and contribute to the global cyber-resiliency agenda. Our corporate mission is to solve social challenges through technology. Third, we will use best-in-class security technology and tools and embrace collaborative efforts such as proactive information sharing and thought leadership activities. Lastly, we will continue to build on and demonstrate a continuous track record of excellence and trustworthiness to secure our clients’ businesses as well as our own.
But equally, we are aware that none of these efforts can be completed in isolation. Everything is connected and interlinked in our digital society. This is a journey we want to travel with our clients and partners.
I look forward to working on this crucial task with like-minded people and organizations.
Read more about NTT DATA's cybersecurity solutions and let us guide you through the increasingly complex threat landscape.