-
Featured services
Think beyond the robots
The successful integration of AI and IoT in manufacturing will depend on effective change management, upskilling and rethinking business models.
Read the blog -
Services
Leverage our capabilities to accelerate your business transformation.
-
Services
Network Services
Popular Products
-
Private 5G
Our turnkey private 5G network enables custom-built solutions that are designed around unique use cases and strategies, and deployed, run and optimized through a full network-as-a-service model.
-
Managed Campus Networks
Our Managed Campus Networks services transform campus networks, corporate area networks and interconnected local area networks, and connect smart places and industries.
-
-
Services
Cloud
Popular Products
-
Cloud Architecture and Modernization
Discover how to achieve your business goals through cloud modernization practices, that deliver improved agility, reusability and scalability.
-
Cloud Optimization
Discover how to maximize operational excellence, business continuity and financial sustainability through our cloud-advanced optimization services.
-
-
Services
Consulting
-
-
Services
Data and Artificial intelligence
-
Services
Technology Solutions
Client stories
-
Services
Data Center Services
-
Services
CX and Design
-
Services
Application Services
-
Services
Sustainability Services
-
Services
Digital Workplace
-
Services
Business Process Services
Master your GenAI destiny
We’ll help you navigate the complexities and opportunities of GenAI.
Explore GenAI -
-
-
Insights
Recent Insights
-
The Future of Networking in 2025 and Beyond
-
Using the cloud to cut costs needs the right approach
When organizations focus on transformation, a move to the cloud can deliver cost savings – but they often need expert advice to help them along their journey
-
Make zero trust security work for your organization
Make zero trust security work for your organization across hybrid work environments.
-
-
Master your GenAI destiny
We’ll help you navigate the complexities and opportunities of GenAI.
Explore GenAI -
-
Master your GenAI destiny
We’ll help you navigate the complexities and opportunities of GenAI.
Explore GenAI -
Discover how we accelerate your business transformation
-
About us
CLIENT STORIES
-
Liantis
Over time, Liantis – an established HR company in Belgium – had built up data islands and isolated solutions as part of their legacy system.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
-
CLIENT STORIES
-
Liantis
Over time, Liantis – an established HR company in Belgium – had built up data islands and isolated solutions as part of their legacy system.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
-
Sponsorships
CLIENT STORIES
-
Liantis
Over time, Liantis – an established HR company in Belgium – had built up data islands and isolated solutions as part of their legacy system.
-
Randstad
We ensured that Randstad’s migration to Genesys Cloud CX had no impact on availability, ensuring an exceptional user experience for clients and talent.
-
Everest Group PEAK Matrix® Assessment
NTT DATA is a Leader and Star Performer in the Everest Group Sustainability Enablement Technology Services PEAK Matrix® Assessment 2024.
Get the Everest report -
- Careers
Mitigating chaos and uncertainty during a global pandemic
16 April 2020
Topics in this article
These are unprecedented times for business; however, crisis management is nothing new for humanity. A quick rewind through history to October 1911 would revive the names of the great explorers Roald Amundsen and Robert Falcon Scott, who competed to be the first to reach the South Pole.
In 1911, the explorers Roald Amundsen and Robert Falcon Scott competed to be the first to reach the South Pole
Two different leaders: two different outcomes
Battling the same temperatures and terrain, the two expeditions achieved different outcomes. Amundsen was victorious, leading his team safely back home. Scott’s flawed leadership resulted in the team's defeat, 34 days after Amundsen’s victory. Scott died soon after, alongside four members of his expedition. How can one leader achieve an incredible triumph in such a harsh terrain, while the other leader failed to survive?
Cyberdiscipline is essential in order to remain resilient during cyberattacks
Preparing, responding and remaining resilient during cyberattacks
It wasn’t a matter of luck. Analysis shows that Roald Amundsen exhibited an uncanny, focused discipline in three domains: preparedness, response, resilience.
With the current COVID-19 pandemic, businesses need to focus on their core cyberdiscipline to remain resilient in the face of cyberattacks. We can see a significant rise in coordinated cyberattacks as the majority of businesses shift their modus operandi to remote work (WFH).
As their employees work from home, businesses are experiencing a significant rise in cyberattacks
Preparedness
With the change in working dynamics, there is a dire need to refresh the responsibility assignment matrix (RACI model) around domains (including people) to develop a layer of accountability and consultation. The mandatory mapping of the complete network is crucial. This will create visibility and allow organizations to critically evaluate the network; most organizations will come across the following blind spots during analysis:
- remote connectivity valuation
- patch management appraisal
- network topology assessment
Response
During the current chaos, we must not allow a preventive mind-set, and ‘analysis paralysis’ syndrome seep in. In the first instance, we should be able to understand the attack telemetry by creating end-to-end visibility through appropriate tools and procedures. In the second, organizations need to accept that they may get breached during this pandemic crisis and they need move towards more proactive analysis that enables them to integrate a single normalized platform to detect the behavioural classification of cyber criminals.
Organizations will need to re-define the parameters of their response for the purposes of:
- Business and risk alignment: This is about understanding the mission, scope and authority needed to mitigate risk.
- Visibility: Define the visibility required to achieve mission readiness.
- Content: Build enablement for detection — including use cases, situational awareness, and baseline.
- Applied intelligence and analytics: Analyse, attribute and predict the threat to refocus the mission.
Resiliency
All critical processes must be tested, analysed and updated on a regular basis, in order to ensure all personnel involved are fully prepared and capable of quickly, efficiently and safely achieving the required objectives.
Resiliency techniques shouldn’t just focus on the perimeter, which means deploying more and more new technologies. Instead, organizations need to follow an intelligence-driven security framework or phased approach. To achieve the state of so-called ‘Cyber Swing’ (like ‘Swing’ in rowing – that state of near perfection when all rowers are in harmony with no wasted energy) within a business environment, organizations need an incremental resilience strategy to help them reach a stage of security maturity and to pre-empt advanced attacks.