In the most obvious sense, effective information security assures the safety of our critical assets, protects individual privacy, and guards the integrity of our systems and infrastructure. In a broader sense, information security is the essential first ingredient to our evolution as a global society. Therefore, in Santen, we see information security is a strategic priority.
Santen is committed to implement and maintain an Information Security Management System (ISMS) based on ISO/IEC 27001. The main objective of the system is to guarantee the confidentiality, integrity and availability of information which is required for the continuity of daily operations, regulations and maintaining strategic competitive advantage. To implement and operate this management system, Santen;
Top Management's support, commitments, accountability is vital in ensuring information security implementation and achieving the Information Security Management System's intended results.
In Santen, Global Head of Digital & Information Technology acts as Chief Information Security Officer (CISO) and is accountable for the global information security strategy and its execution.
The responsibilities of this role vary from maintaining the security governance framework, focusing on information and business risks, concentrating on the protection of critical business processes and applications, protecting classified information from disclosure, taking responsibility for developing and maintaining an information security architecture, and ensuring that new systems are developed securely, as clearly stated in the 'Santen Global Information Security Policy'.
In this role, Global Head of Digital & Information Technology is supported by Global Head of Information Security, and he reports to the Chief Financial Officer, Chief Executive Officer, and Board of Directors.
To support the execution of ISMS, Global Head of Information Security meets with the critical technical and business stakeholders on a regular basis, to make strategic decisions and perform the key responsibilities listed below. Global Head of Information Security then reports the identified risks, and decisions to Global Head of Digital & Information Technology:
Our security education and awareness program expect all employees to take ownership of our security practices. we train all new employees on information security policies and detailed rules.
The online IT security awareness training in FY2023 has a completion rate of 95%. Below topics are some examples that are covered in the training:
The online OT security awareness training in FY2023 has a completion rate of 99%. Below topics are some examples that are covered in the training:
As phishing is one of the most effective and widespread techniques used by cyber criminals, Global Information Security innovated an AI based global phishing training approach to drive a more secure corporate culture, founded upon employee behavior that reduces risk of the human element.
The team provides an ongoing phishing gamification experience globally, to encourage our colleagues learn safer email habits in an engaging and playful way, while making sure they are part of the incident response process.
The company aims to apply industry best practices as part of our information security policies, processes and invest in strategies that are commensurate with the changing nature of the security threat landscape. Some of the policies and procedures that provide guidance to our employees in their daily operations include the following: all are for global.
In Santen, third parties are treated as an extension of our Information Security Management System (ISMS), i.e. when Santen provides or receives services from a third-party supplier, the scope of our ISMS extends to the third parties. Our information security policies, procedures, instructions enforced in Santen, are applicable to all third parties who hold a relationship with us.
Before engaging with third parties, information security risk assessments are performed. As third-party security risks are always evolving, and continuous monitoring at regular intervals is vital; we monitor the security risks via different tools and processes (such as Maturity Level Assessments, Cyber Risk Scorecards) throughout the entire vendor lifecycle, from onboarding to off-boarding.