A Small Airport Perspective Royce Holden Director of Information Technology Asheville Regional Airport Asheville, NC

Size: px
Start display at page:

Download "A Small Airport Perspective Royce Holden Director of Information Technology Asheville Regional Airport Asheville, NC"

Transcription

1 Airport IT Security A Small Airport Perspective Royce Holden Director of Information Technology Asheville Regional Airport Asheville, NC rholden@flyavl.com

2 Cyber Security (IT Security) What does having good policy in place have to do with IT & Cyber Security? EVERYTHING!

3 Cyber Security (IT Security) How to start Policy/Directive Response Plan/Strategy Priority System/Triage Communication Documentation Master Plan (IT) Example Incident Policy/Directive Response Plan/Strategy Priority System/Triage Communication Documentation

4 Cyber Security (IT Security) AVL IT Department

5 Cyber Security (IT Security) Swim lane Diagram:

6 Cyber Security (IT Security) How to start Policy/Directive why do we need this? It s important to get executive leadership buy in for creation and inclusion in current Airport Policy Manuals. Response Plan/Strategy How will you handle incidents? Priority System/Triage Take time to prioritize incidents based on organizational impact. Communication Who will you let know about an incident? Who to Call List Even an internal list for the IT Department could minimize down time. Documentation How will you remember an incident? Prevention Documenting an incident and solution could help reduce future down time scenarios. Master Plan/IT Putting it all together

7 IT Security Policy/Directive Policy A plan or course of action Typically approved by an Airport s Governing Body (Authority) Purpose: The Asheville Regional Airport Authority is a local government agency created by action of the City of Asheville and the County of Buncombe for the purpose of developing and operating the Asheville Regional Airport. Functions: To determine policy and administer the provisions of the laws of North Carolina. Public Record Non Exhaustive List of Items covered in Policy: User Eligibility User Accounts Staff, Tenant, Public Usage Hours of Operation Down time / Maintenance Usage/Public Record Installing Software Privacy/Monitoring Unauthorized Usage/Consequences Prohibited Activities/Consequences Misuse/Consequences

8 IT Security Policy/Directive Incident Handler s Handbook, ipad Security Settings, etc. Great Reference for Risk Management Where can I start? Very Good Examples: National Institute of Standards and Technology (NIST, U.S. Department of Commerce): portal.cfm Consider joining InfraGard to keep up to date on Cyber Security Information: InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members.

9 IT Security Policy/Directive Example Policy Information Technology Example: Internet and Usage Policy Objective: To describe the normal procedures for Internet Usage. The procedure outlines the processes and designates the responsible parties for controlling how the Internet and the Local/Wide Area Networks shall be used. Directive Information Technology Example: Wireless Internet Access Directive Objective: To describe connectivity to the Internet via wireless methods and provide staff direction on use by Authority, Tenant, and Public Usage.

10 IT Security Response Plan/Strategy Response Plan/Strategy Airport Authority Production Servers 24 hour Telephone line Critical Area CCTV Critical Area Access Control Tenants Passenger Ticket Counter Passenger Gate Shared Use Printing Public Major MUFIDS Outage (16 or more LCDs in Prime Locations)

11 IT Security Response Plan/Strategy Response Plan/Strategy Airport Authority Non Production Servers Phone not working Non Critical Area CCTV Non Critical Area Access Control Tenants Passenger Ticket Counter (Non Peak Hours) Passenger Gate Shared Use Printing (Non Peak Hours) Public MUFIDS Outage (Less than 16 LCDs out) Wireless not working for more than 5 users

12 IT Security Communication Communication Detail your systems and service agreements. Have a who to call list for each. Know when it is necessary to call Law Enforcement

13 IT Security Documentation Documentation Who? What? When? Where? Why? How? What: Rogue wireless router found Who Was it? Tenant, Employee? When was it found (Important for Law Enforcement) Where was it found (Physically) Why/How Document how you found it

14 IT Security Documentation Documentation Spiceworks Free (or Paid). Helpdesk Solution

15 IT Security Documentation Documentation For Lessons Learned Faster Incident Response Forms should include notes, dates/times, etc.

16 IT Security Example

17 IT Security Example Identified Rogue Router Using Xirrus Wi Fi Monitoring Tool, Log Files, inssider software, and a laptop. The AP in the terminal office was not broadcasting a SSID and was set up for PSK authentication. Request for Public Safety Assistance Formal Police Report taken & work with Tenant s Corporate Office NC State Law, Article 19A. Obtaining Property or Services by False or Fraudulent Use of Credit Device or Other Means. Follow Up and Closure Tenant s Management determine their internal policy was broken by employee who was immediately let go. Airport IT documented incident and Lessons Learned.

18 IT Security Example Policy/Directive Tenants sign a Wireless Usage Policy and agree to enforce it with their employees. Tenant Lease Agreements also contain language Re: Improper Use. Airport IT has a directive Monitoring and Logging Networks and System Devices. Response Plan/Strategy Using Xirrus Wi Fi Monitoring Tool, Log Files, inssider software, and a laptop. The rogue AP in the terminal office was not broadcasting a SSID and was set up for PSK authentication. Priority System/Triage Although not disruptive to Wireless Operations, determined a high priority due to violation of Policy.

19 IT Security Example Communication Tenant s Management determine their internal policy was broken by employee who was immediately let go. IT Contacted Public Safety, Formal Police Report taken & work with Tenant s Corporate Office. NC State Law, Article 19A. Obtaining Property or Services by False or Fraudulent Use of Credit Device or Other Means. Documentation Airport IT documented incident and Lessons Learned.

20 IT Security Master Plan Master Plan FAA Advisory Circular 150/5070 6B culars/index.cfm/go/document.list Use the document above when thinking about putting IT related components into your Airport s Master Plan Ideas follow

21 IT Security Master Plan Master Plan 104.a. modernization or expansion of existing airports or the creation of a new airport 104.b. cost effectively satisfy aviation demand If you have or are considering Shared Tenant Services or Shared/Common Use, 202.b.4,6,7. Assess the ability of the existing airport, both airside and landside, to support the forecast demand. Identify the demand levels that will trigger the need for facility additions or improvements and estimate the extent of new facilities that may be required to meet that demand Identify options to meet projected facility requirements and alternative configurations for each major component.

22 IT Security Master Plan Master Plan 202.b.9. Facilities Implementation Plan Provides a summary description of the recommended improvements and associated costs. The schedule of improvements depends, in large part, on the levels of demand that trigger the need for expansion of existing facilities. This is an opportunity to discuss items that are related to IT such as Parking Management Systems, terminal/airfield lighting controls, life safety, etc. Don t forget your MDF/Comm. Rooms!

23 IT Security Thank You

Department of Public Health O F S A N F R A N C I S C O

Department of Public Health O F S A N F R A N C I S C O PAGE 1 of 7 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:

More information

Cyber Security Guidelines for Public Wi-Fi Networks

Cyber Security Guidelines for Public Wi-Fi Networks Cyber Security Guidelines for Public Wi-Fi Networks Version: 1.0 Author: Cyber Security Policy and Standards Document Classification: PUBLIC Published Date: April 2018 Document History: Version Description

More information

Policy. London School of Economics & Political Science. Network Connection IMT. Jethro Perkins. Information Security Manager. Version 1.

Policy. London School of Economics & Political Science. Network Connection IMT. Jethro Perkins. Information Security Manager. Version 1. London School of Economics & Political Science IMT Policy Network Connection Jethro Perkins Information Security Manager Version 1.1 Date 18/03/2015 Library reference ISM-PY-126 For latest version and

More information

Pioneer Communications Internet Services Disclosure

Pioneer Communications Internet Services Disclosure Pioneer Communications Internet Services Disclosure Pioneer Communications ( Pioneer ) is the leading Internet service provider for Southwest Kansas communities with a reputation for excellence that goes

More information

Computer Security Incident Response Plan. Date of Approval: 23-FEB-2014

Computer Security Incident Response Plan. Date of Approval: 23-FEB-2014 Computer Security Incident Response Plan Name of Approver: Mary Ann Blair Date of Approval: 23-FEB-2014 Date of Review: 31-MAY-2016 Effective Date: 23-FEB-2014 Name of Reviewer: John Lerchey Table of Contents

More information

Stockton Aviation Research & Technology Park

Stockton Aviation Research & Technology Park Stockton Aviation Research & Technology Park Overview Joseph M. Sheairs, Sr. Executive Director Introduction Industry, Academia, and Government collaboration dedicated to the advancement of aviation sciences,

More information

PISMO BEACH COUNCIL AGENDA REPORT

PISMO BEACH COUNCIL AGENDA REPORT PISMO BEACH COUNCIL AGENDA REPORT SUBJECT/TITLE: REVIEW OF INFORMATION TECHNOLOGY (IT) STATUS AND IT STRATEGIC PLAN IMPLEMENTATION UPDATE. RECOMMENDATION: 1. Receive the IT Status and Implementation Update.

More information

Information Technology Paul Kronberger, Chief Information Officer

Information Technology Paul Kronberger, Chief Information Officer Paul Kronberger, Chief Information Officer City-County Building, Room 500 210 Martin Luther King, Jr. Boulevard Madison, Wisconsin 53703-3349 May 11, 2016 David Schmiedicke Finance Director City of Madison

More information

DEFINITIONS AND REFERENCES

DEFINITIONS AND REFERENCES DEFINITIONS AND REFERENCES Definitions: Insider. Cleared contractor personnel with authorized access to any Government or contractor resource, including personnel, facilities, information, equipment, networks,

More information

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

E-guide CISSP Prep: 4 Steps to Achieve Your Certification CISSP Prep: 4 Steps to Achieve Your Certification Practice for the exam and keep your skills sharp : Thank you for downloading our CISSP certification guide. Aside from this handy PDF, you can also access

More information

I. PURPOSE III. PROCEDURE

I. PURPOSE III. PROCEDURE A.R. Number: 2.11 Effective Date: 2/1/2009 Page: 1 of 5 I. PURPOSE This policy outlines the procedures that third party organizations must follow when connecting to the City of Richmond (COR) networks

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

Data Processing Agreement

Data Processing Agreement In accordance with the European Parliament- and Council s Directive (EU) 2016/679 of 27th April 2016 (hereinafter GDPR) on the protection of physical persons in connection with the processing of personal

More information

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance.

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance. Policy Number: 10-09-02 Section: Roads and Traffic Subsection: Traffic Operations Effective Date: April 25, 2012 Last Review Date: Approved by: Council Owner Division/Contact: For information on the CCTV

More information

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles Incident Response Lessons From the Front Lines Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles 1 Conflict of Interest Nolan Garrett Has no real or apparent conflicts of

More information

NETWORKS AND THE EFFECTS OF USING THEM (Work Sheet)

NETWORKS AND THE EFFECTS OF USING THEM (Work Sheet) NETWORKS AND THE EFFECTS OF USING THEM (Work Sheet) 1. An organization is planning to train all staff online rather than video-conference. Describe what is meant by a web conference. 2. Explain the differences

More information

Security Surveillance Camera and Video Policy

Security Surveillance Camera and Video Policy UW-Madison Security Surveillance Camera and Policy Effective Date: Oct. 1, 2014 Last Updated: August 1, 2018 Last Reviewed: August 1, 2018 Functional Owner Executive Sponsor Policy Contact Dir. of Security

More information

uanacia 1+1 MARINE SECURITY OPERATIONS BULLETIN No:

uanacia 1+1 MARINE SECURITY OPERATIONS BULLETIN No: 1+1 MARINE SECURITY OPERATIONS BULLETIN No: 2014-001 CLARIFICATION OF TRANSPORT CANADA (TC) MARINE SECURITY MANDATORY THREAT, BREACH AND INCIDENT REPORTING REOUIREMENTS THIS MARINE SECURITY OPERATIONS

More information

Master Information Security Policy & Procedures [Organization / Project Name]

Master Information Security Policy & Procedures [Organization / Project Name] Master Information Security Policy & Procedures [Organization / Project Name] [Version Number / Date of [Insert description of intended audience or scope of authorized distribution.] Authors: [Names] Information

More information

You ve Been Hacked Now What? Incident Response Tabletop Exercise

You ve Been Hacked Now What? Incident Response Tabletop Exercise You ve Been Hacked Now What? Incident Response Tabletop Exercise Date or subtitle Jeff Olejnik, Director Cybersecurity Services 1 Agenda Incident Response Planning Mock Tabletop Exercise Exercise Tips

More information

Basic First Time ipad Setup

Basic First Time ipad Setup Basic First Time ipad Setup SETUP GUIDE: This setup guide was created for Albany Creek State High school to be used only for the purpose of assisting school staff and students in setting up and configuring

More information

Advisory Circular. Subject: INTERNET COMMUNICATIONS OF Date: 11/1/02 AC No.: AVIATION WEATHER AND NOTAMS Initiated by: ARS-100

Advisory Circular. Subject: INTERNET COMMUNICATIONS OF Date: 11/1/02 AC No.: AVIATION WEATHER AND NOTAMS Initiated by: ARS-100 U.S. Department of Transportation Federal Aviation Administration Advisory Circular Subject: INTERNET COMMUNICATIONS OF Date: 11/1/02 AC No.: 00-62 AVIATION WEATHER AND NOTAMS Initiated by: ARS-100 1.

More information

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf

More information

A-LIST 2016 Event Sponsorship Form

A-LIST 2016 Event Sponsorship Form A-LIST 2016 Event Sponsorship Form Event Atlanta Local InfraGard Security Training (A-LIST) event Date February 10, 2016 Location Purchase and sponsorship contribution levels Kennesaw Center, Kennesaw

More information

Bring Your Own Device. BYOD - What does this mean to you?

Bring Your Own Device. BYOD - What does this mean to you? Bring Your Own Device BYOD - What does this mean to you? Goals of this New Policy: Move students forward in a 21st century learning environment. Recognize the power of technology tools to support 21st

More information

Frequently Asked Questions About Getting On NCAtrak

Frequently Asked Questions About Getting On NCAtrak Frequently Asked Questions About Getting On NCAtrak Frequently Asked Questions About Getting on NCAtrak (technology reaching all kids) 1. What is NCAtrak? NCAtrak is a computerized, web-based case tracking

More information

Responsible Officer Approved by

Responsible Officer Approved by Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

CAM: Certifying the Future of Business Aviation

CAM: Certifying the Future of Business Aviation CAM: Certifying the Future of Business Aviation Tuesday, May 2, 2017 1:30 p.m. 3:00 p.m. PRESENTED BY: T. James Buchanan, CAM, C.P.M., AT&T Bill Hart, CAM, Verizon CAM Program Mission Certifying the Future

More information

AIRPORT WIRELESS UPDATE: BUILDING A NETWORK FORTIFIED FOR THE FUTURE

AIRPORT WIRELESS UPDATE: BUILDING A NETWORK FORTIFIED FOR THE FUTURE AIRPORT WIRELESS UPDATE: BUILDING A NETWORK FORTIFIED FOR THE FUTURE Moderator: Mike Allen, Director of Business Development, Boingo Wireless Speakers: Kiel Barnekov, Manager of Projects & Programs, Greater

More information

Port Facility Cyber Security

Port Facility Cyber Security International Port Security Program Port Facility Cyber Security Cyber Security Assessment MAR'01 1 Lesson Topics ISPS Code Requirement The Assessment Process ISPS Code Requirements What is the purpose

More information

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS The Saskatchewan Power Corporation (SaskPower) is the principal supplier of power in Saskatchewan with its mission to deliver power

More information

Number: USF System Emergency Management Responsible Office: Administrative Services

Number: USF System Emergency Management Responsible Office: Administrative Services POLICY USF System USF USFSP USFSM Number: 6-010 Title: USF System Emergency Management Responsible Office: Administrative Services Date of Origin: 2-7-12 Date Last Amended: 8-24-16 (technical) Date Last

More information

CYBER RISK MANAGEMENT

CYBER RISK MANAGEMENT CYBER RISK MANAGEMENT AND BEST PRACTICES Heather Fields, JD, CHC, CCEP (414) 298-8166 hfields@reinhartlaw.com 1000 North Water Street, Suite 1700, Milwaukee, WI 53202 www.reinhartlaw.com 0 Agenda Role

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Service Description: CNS Federal High Touch Technical Support

Service Description: CNS Federal High Touch Technical Support Page 1 of 1 Service Description: CNS Federal High Touch Technical Support This service description ( Service Description ) describes Cisco s Federal High Touch Technical support (CNS-HTTS), a tier 2 in

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE Digital Policy Management consists of a set of computer programs used to generate, convert, deconflict, validate, assess

More information

Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services

Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services Service Overview Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services Cisco Service Provider (SP) Wi-Fi is a single, unified architecture for all types of Wi-Fi services and business

More information

Constitution Towson University Sport Clubs Organization Campus Recreation Services. Article I Name. Article II Membership

Constitution Towson University Sport Clubs Organization Campus Recreation Services. Article I Name. Article II Membership Constitution Towson University Sport Clubs Organization Campus Recreation Services The organization shall be classified as the Sport Clubs Organization and shall be open to men and women alike. The organization

More information

Cellular Site Simulator Usage and Privacy

Cellular Site Simulator Usage and Privacy Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and

More information

Determining Best Fit for ITIL Implementation

Determining Best Fit for ITIL Implementation Determining Best Fit for ITIL Implementation Presentation to the DC SPIN October 4, 2006 www.davidconsultinggroup.com Agenda Introduction to ITIL Preparing for ITIL Best Fit Analysis Relationship of ITIL

More information

Metropolitan Washington Airports Authority PROCUREMENT AND CONTRACTS DEPT. AMENDMENT OF SOLICITATION

Metropolitan Washington Airports Authority PROCUREMENT AND CONTRACTS DEPT. AMENDMENT OF SOLICITATION Metropolitan Washington Airports Authority PROCUREMENT AND CONTRACTS DEPT. AMENDMENT OF SOLICITATION Metropolitan Washington Airports Authority Procurement and Contracts Dept., MA-29 2733 Crystal Drive

More information

ISSP Network Security Plan

ISSP Network Security Plan ISSP-000 - Network Security Plan 1 CONTENTS 2 INTRODUCTION (Purpose and Intent)... 1 3 SCOPE... 2 4 STANDARD PROVISIONS... 2 5 STATEMENT OF PROCEDURES... 3 5.1 Network Control... 3 5.2 DHCP Services...

More information

2 University International Medical University

2 University International Medical University POLICY OWNER : Information Technology Services TITLE : Document Code : IMU/POL/ITS/09 Edition : 1 Approval Body : Management Approval : 03/05/17 Committee Date Effective Date : 03/05/17 Pages : 6 1.0 OBJECTIVE

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

Subject: Wireless Networking Policy Effective Date: May 2005 Responsible Office: Department of Information Technology _ Responsible Officer:

Subject: Wireless Networking Policy Effective Date: May 2005 Responsible Office: Department of Information Technology _ Responsible Officer: Section Number Section Header: Subject: Wireless Networking Policy Effective Date: May 2005 Responsible Office: Department of Information Technology _ Responsible Officer: TABLE OF CONTENTS Introduction...1

More information

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications Gramm-Leach Bliley Act Section 501(b) and Customer Notification Roger Pittman Director of Operations Risk Federal Reserve Bank of Atlanta Overview Bank IT examination perspective Background information

More information

Mobile Device policy Frequently Asked Questions April 2016

Mobile Device policy Frequently Asked Questions April 2016 Mobile Device policy Frequently Asked Questions April 2016 In an attempt to help the St. Lawrence University community understand this policy, the following FAQ document was developed by IT in collaboration

More information

RMU-IT-SEC-01 Acceptable Use Policy

RMU-IT-SEC-01 Acceptable Use Policy 1.0 Purpose 2.0 Scope 2.1 Your Rights and Responsibilities 3.0 Policy 3.1 Acceptable Use 3.2 Fair Share of Resources 3.3 Adherence with Federal, State, and Local Laws 3.4 Other Inappropriate Activities

More information

Juniper Vendor Security Requirements

Juniper Vendor Security Requirements Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy This Acceptable Use Policy is in addition to South Central Communication s Terms of Service and together the documents constitute the Agreement between South Central Communications

More information

Use Of Mobile Communication Devices Within Healthcare Premises Policy

Use Of Mobile Communication Devices Within Healthcare Premises Policy Use Of Mobile Communication Devices Within Healthcare Premises Policy Co-ordinator: Director of Facilities Reviewer: Working Group chaired by Director of Facilities Approver: GAPF Signature Signature Signature

More information

NASCIO Recognition Award Nomination. Title: Central Issuance of State Drivers Licenses. Category: Digital Government Government to Citizen

NASCIO Recognition Award Nomination. Title: Central Issuance of State Drivers Licenses. Category: Digital Government Government to Citizen NASCIO Recognition Award Nomination Title: Central Issuance of State Drivers Licenses Category: Digital Government Government to Citizen State: North Carolina Executive Summary The NCDMV wanted to reduce

More information

POLICY 8200 NETWORK SECURITY

POLICY 8200 NETWORK SECURITY POLICY 8200 NETWORK SECURITY Policy Category: Information Technology Area of Administrative Responsibility: Information Technology Services Board of Trustees Approval Date: April 17, 2018 Effective Date:

More information

Open Data Policy City of Irving

Open Data Policy City of Irving Open Data Policy City of Irving 1. PURPOSE: The City of Irving is committed to fostering open, transparent, and accessible city government, and recognizes that by sharing data freely, the city will generate

More information

How to connect to a Wi-Fi or Wireless Network

How to connect to a Wi-Fi or Wireless Network How to connect to a Wi-Fi or Wireless Network This guide will walk you through the steps of connecting to a Wi-Fi network that is broadcasting its name. Start the ipad. 1. Tap on the Settings app. The

More information

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance. Real-time Visibility Network Access Control Endpoint Compliance Mobile Security ForeScout CounterACT Continuous Monitoring and Mitigation Rapid Threat Response Benefits Rethink IT Security Security Do

More information

Complying with RBI Guidelines for Wi-Fi Vulnerabilities

Complying with RBI Guidelines for Wi-Fi Vulnerabilities A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Reserve Bank of India (RBI) guidelines

More information

From Integrated Corridor Management To Integrated Regional Mobility

From Integrated Corridor Management To Integrated Regional Mobility From Integrated Corridor Management To Integrated Regional Mobility Agenda Regional Mobility Dallas ICM Operational Needs Expansion and Enhancements Transit Improvements MPO s Leadership Future Direction

More information

Internal Audit Report DATA CENTER LOGICAL SECURITY

Internal Audit Report DATA CENTER LOGICAL SECURITY Internal Audit Report DATA CENTER LOGICAL SECURITY Report No. SC 12 06 June 2012 David Lane Principal IT Auditor Jim Dougherty Principal Auditor Approved Barry Long, Director Internal Audit & Advisory

More information

2014 TRANSIT CEOs SEMINAR. Cybersecurity What Every CEO Should Know to Help Secure the System

2014 TRANSIT CEOs SEMINAR. Cybersecurity What Every CEO Should Know to Help Secure the System 2014 TRANSIT CEOs SEMINAR Cybersecurity What Every CEO Should Know to Help Secure the System APTA Enterprise Cyber Security WG update Vulnerable Systems Cyber attacks may be targeted toward one or more

More information

ITSM20F_Umang. Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0. Exin ITSM20F

ITSM20F_Umang.   Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0. Exin ITSM20F ITSM20F_Umang Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0 http://www.gratisexam.com/ Exin ITSM20F IT Service Management Foundation based on ISO/IEC 20000 (ITSM20F.EN) Version:

More information

( Utility Name ) Identity Theft Prevention Program

( Utility Name ) Identity Theft Prevention Program ***DRAFT*** ( Utility Name ) Identity Theft Prevention Program Implemented as of, 2008 *** This document is intended to give guidance to municipal utilities in their understanding of the FTC Red Flag Rule.

More information

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Elevation of Privilege

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Elevation of Privilege Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response playbook guide. This guide has been created especially for you for use in within your security

More information

Introduction. We are excited about the possibility of bringing Google Fiber to your city and look forward to working with you.

Introduction. We are excited about the possibility of bringing Google Fiber to your city and look forward to working with you. Introduction Over the last few years, gigabit Internet has moved from idea to reality, with dozens of communities working hard to build networks with speeds capable of supporting the future of the Internet.

More information

Information Systems Accomplishments

Information Systems Accomplishments Information Systems The Information Systems (IS) Department is responsible for implementing and maintaining technology solutions for all county departments as well as the server and network infrastructure

More information

HIPAA Security and Privacy Policies & Procedures

HIPAA Security and Privacy Policies & Procedures Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400

More information

SMART CAMPUS, BUILDING AND VENUES

SMART CAMPUS, BUILDING AND VENUES SMART CAMPUS, BUILDING AND VENUES Greg Deffenbaugh, Corporate Solutions Technologist SDS & Hospitality SDN Solutions and Strategy, Avaya @gregdeff gregdeff 1 Thank you Sponsors! Global Sponsors Gold Sponsors

More information

Railroad Infrastructure Security

Railroad Infrastructure Security TRB Annual Meeting January 14, 2002 Session 107 - Railroad Security William C. Thompson william.thompson@jacobs.com 402-697-5011 Thanks to: Bob Ulrich Dr. William Harris Byron Ratcliff Frank Thigpen John

More information

Information Technology Branch Organization of Cyber Security Technical Standard

Information Technology Branch Organization of Cyber Security Technical Standard Information Technology Branch Organization of Cyber Security Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 1 November 20, 2014 Approved:

More information

Use of Mobile Devices on Voice and Data Networks Policy

Use of Mobile Devices on Voice and Data Networks Policy World Agroforestry Centre Policy Series MG/C/4/2012 Use of Mobile Devices on Voice and Data Networks Policy One of the policies on information security and business continuity which will be audited by

More information

Making YOUR Organization More Efficient and Effective Through Business Continuity / Continuity of Operations Planning

Making YOUR Organization More Efficient and Effective Through Business Continuity / Continuity of Operations Planning 2017 California Higher Education Collaborative Conference Making YOUR Organization More Efficient and Effective Through Business Continuity / Continuity of Operations Planning Introductions Rick Blackburn,

More information

Donor Credit Card Security Policy

Donor Credit Card Security Policy Donor Credit Card Security Policy INTRODUCTION This document explains the Community Foundation of Northeast Alabama s credit card security requirements for donors as required by the Payment Card Industry

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of

More information

Administrative Procedure

Administrative Procedure Administrative Procedure Number: 403 Effective: 9/19/05 Supercedes: 7/10/02 Page: 1 of 15 Subject: LOCK/KEY CONTROL POLICY 1.0. PURPOSE: To establish the policy and procedures for the coordination of a

More information

FOLLOW-UP REPORT Industrial Control Systems Audit

FOLLOW-UP REPORT Industrial Control Systems Audit FOLLOW-UP REPORT Industrial Control Systems Audit February 2017 Office of the Auditor Audit Services Division City and County of Denver Timothy M. O Brien, CPA The Auditor of the City and County of Denver

More information

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager. London School of Economics & Political Science IT Services Policy Remote Access Policy Jethro Perkins Information Security Manager Summary This document outlines the controls from ISO27002 that relate

More information

Information Technology Disaster Recovery Planning Audit Redacted Public Report

Information Technology Disaster Recovery Planning Audit Redacted Public Report 1200, Scotia Place, Tower 1 10060 Jasper Avenue Edmonton, Alberta T5J 3R8 edmonton.ca/auditor Information Technology Disaster Recovery Planning Audit Redacted Public Report June 12, 2018 City of Edmonton

More information

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire Version 1.0 Release: December 2004 How to Complete the Questionnaire The questionnaire is divided into six sections. Each

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center Security Notifications No: Effective: OSC-10 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy POLICY 07.01.01 Effective Date: 01/01/2015 The following are responsible for the accuracy of the information contained in this document Responsible Policy Administrator Information

More information

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services

Building YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services Building YOUR Privacy Program: One Size Does Not Fit All Justine Gottshall Partner, InfoLawGroup, LLP Chief Privacy Officer, Signal Jgottshall@infolawgroup.com Adam Nelson Executive Consultant Global Data

More information

MANAGEMENT CONTROL AGREEMENT REGARDING TEXAS DEPARTMENT OF PUBLIC SAFETY AND FBI CRIMINAL JUSTICE INFORMATION SYSTEMS

MANAGEMENT CONTROL AGREEMENT REGARDING TEXAS DEPARTMENT OF PUBLIC SAFETY AND FBI CRIMINAL JUSTICE INFORMATION SYSTEMS MANAGEMENT CONTROL AGREEMENT REGARDING TEXAS DEPARTMENT OF PUBLIC SAFETY AND FBI CRIMINAL JUSTICE INFORMATION SYSTEMS The purpose of this document is to establish and enforce Security Control of the access

More information

Wireless Network Standard

Wireless Network Standard Last Modified: 10/20/15 Wireless Network Standard Purpose The standard and guidelines described in this document will ensure the uniformity of wireless network access points at the University of Georgia.

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance Context and Alignment Policy 4.1 4.4 800-26 164.308 12.4 EDM01 IT Governance Policy 5.1 800-30 12.5 EDM02 Leadership Mergers and Acquisitions Policy A.6.1.1 800-33 EDM03 Context Terms and Definitions

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

Information technology security and system integrity policy.

Information technology security and system integrity policy. 3359-11-10.3 Information technology security and system integrity policy. (A) Need for security and integrity. The university abides by and honors its long history of supporting the diverse academic values

More information

Oracle Data Cloud ( ODC ) Inbound Security Policies

Oracle Data Cloud ( ODC ) Inbound Security Policies Oracle Data Cloud ( ODC ) Inbound Security Policies Contents Contents... 1 Overview... 2 Oracle Data Cloud Security Policy... 2 Oracle Information Security Practices - General... 2 Security Standards...

More information

Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center

Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center What to expect from today: The ugly truth about planning Why you need a plan that works Where

More information

Fair Use Policy. nbn Ethernet Product Module. Wholesale Broadband Agreement

Fair Use Policy. nbn Ethernet Product Module. Wholesale Broadband Agreement Fair Use Policy nbn Ethernet Product Module Wholesale Broadband Agreement This document forms part of NBN Co s Wholesale Broadband Agreement, which is a Standard Form of Access Agreement for the purposes

More information

This regulation outlines the policy and procedures for the implementation of wireless networking for the University Campus.

This regulation outlines the policy and procedures for the implementation of wireless networking for the University Campus. UAR NUMBER: 400.01 TITLE: Wireless Network Policy and Procedure INITIAL ADOPTION: 11/6/2003 REVISION DATES: PURPOSE: Set forth the policy for using wireless data technologies and assigns responsibilities

More information

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring

More information

XAVIER UNIVERSITY Building Access Control Policy

XAVIER UNIVERSITY Building Access Control Policy Effective: March 25, 2019 Last Updated: March 20, 2019 XAVIER UNIVERSITY Building Access Control Policy Responsible University Office: Auxiliary Services, Physical Plant Responsible Executive: Vice President,

More information

CA Automation Capabilities A Technical Look at Process and Runbook Automation. Tom Kouhsari and AJ Dennis

CA Automation Capabilities A Technical Look at Process and Runbook Automation. Tom Kouhsari and AJ Dennis CA Automation Capabilities A Technical Look at Process and Runbook Automation Tom Kouhsari and AJ Dennis Terms of This Presentation This presentation was based on current information and resource allocations

More information

Airport Operations Center October 17, Ryan E. Rocha A.A.E., IAP Chief of Operations City of San Antonio Aviation Department

Airport Operations Center October 17, Ryan E. Rocha A.A.E., IAP Chief of Operations City of San Antonio Aviation Department Airport Operations Center October 17, 2017 Ryan E. Rocha A.A.E., IAP Chief of Operations City of San Antonio Aviation Department Why is it called an AOC? Airport Operations Centers Other titles: Operations

More information

Personal Communication Devices and Voic Procedure

Personal Communication Devices and Voic Procedure Personal Communication Devices and Voicemail Procedure Reference No. xx Revision No. 1 Relevant ISO Control No. 11.7.1 Issue Date: January 23, 2012 Revision Date: January 23, 2012 Approved by: Title: Ted

More information

APPLICATION FOR TELEPHONE SERVICE

APPLICATION FOR TELEPHONE SERVICE APPLICATION FOR TELEPHONE SERVICE Attached is the application for new telephone service. It is extremely important that the application be filled out completely. Incomplete applications will be returned

More information

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:

More information

Information Security Incident Response and Reporting

Information Security Incident Response and Reporting Information Security Incident Response and Reporting Original Implementation: July 24, 2018 Last Revision: None This policy governs the actions required for reporting or responding to information security

More information

BCP At Bangkok Bank, Thailand

BCP At Bangkok Bank, Thailand BCP At Bangkok Bank, Thailand Bhakorn Vanuptikul, BCCE Executive Vice President Bangkok Bank Public Company Limited 10 May 2012 1 Agenda Business Continuity Management at Bangkok Bank Success Factors in

More information