Aboitiz Group Report | Page 13

ABOITIZ GROUP
Aboitiz InfraCapital : industrial business
many systems you have , where you store your data and how you compute ,” she says . “ But when you flip that story over , you ’ re using data versus systems because at the centre of everything is data points .”
This transition reflects broader changes in enterprise computing . With workloads distributed across cloud platforms , traditional perimeter-based security measures have proven insufficient . Aboitiz operates across multiple cloud service models , making system-centric approaches obsolete . “ Being systemcentric will not work today ,” Charmaine states . “ It ’ s important to understand where your data points are .”
The company ’ s security team implemented this shift through continuous monitoring of data movement . Their platform tracks data points across the enterprise , identifying patterns and detecting anomalies . When a new cloud system launches or a configuration changes , the monitoring system flags potential security implications immediately .
“ If there is a noncompliant configuration in our systems , perhaps in the firewall or cloud environment , we detect it through AI-powered monitoring ,” explains Charmaine . “ These patterns serve as a base – if there is a deviation , there is a trigger or alert .”
The speed of business transformation creates specific security challenges . Aboitiz likens the process to ‘ changing the tyre while the car is moving .’ Security teams must protect new digital initiatives without impeding business growth . This requires constant adaptation of security models .
“ The organisation may pivot , align , take on mergers , acquisitions , or centralise , decentralise ,” says Charmaine . “ There are many pivots that create an evolving computing environment . That becomes your challenge , but it ’ s also an opportunity because we build around this requirement .”
The data-centric approach provides flexibility during transformation . Rather than securing specific systems , the team focuses on protecting data flows . This allows business units to adopt new technologies while maintaining security standards . The approach proves particularly valuable during mergers and acquisitions , where different technology
aboitiz . com 13