Skip to content

Share

  • Add this article to your LinkedIn page
  • Add this article to your Twitter feed
  • Add this article to your Facebook page
  • Email this article
  • View or print a PDF of this page
  • Share further
  • Add this article to your Pinterest board
  • Add this article to your Google page
  • Share this article on Reddit
  • Share this article on StumbleUpon
  • Bookmark this page
CLIENT STORY

Protecting a major luxury goods company's intellectual property and assets

"The growing array of cyber threats, from foreign actors looking to steal IP through to inadvertent disclosure of confidential material by employees, makes it impossible for the existing ways of managing information risk to be sufficient."
JOHN SKIPPER, PA EXPERT IN IT SECURITY, RISK AND RESILIENCE

Our client is a major European luxury brand, sold in over 50 countries through more than 10,000 points of sale worldwide. After a period of rapid expansion, and faced with increasing threats to its intellectual property and well-known brand, the company had identified the need for a thorough security review. Specifically, it wanted to develop a proactive approach to cyber security as part of an integrated enterprise security strategy.

Brought in to help the company achieve this ambition, we undertook a detailed review of its entire enterprise, using a lifecycle model to identify its most vital information assets and the risks they faced. We worked closely with senior managers to challenge assumptions about security and demonstrate potential weaknesses. We drew on international standards and our own experience to rethink the company’s security strategy, proposing suggested improvements across its design, manufacturing and distribution functions and prioritising these into a three year security improvement plan.

As this market-leading, publicly-listed company grows its business for the long term, it can do so with increased confidence in the security of its enterprise-wide intellectual property and assets.

To find out more about how PA can help you develop an effective cyber security strategy for your organisation, please contact us now.

By using this website, you accept the use of cookies. For more information on how to manage cookies, please read our privacy policy. 

×