GÉANT: A Defense in Depth Approach

Size: px
Start display at page:

Download "GÉANT: A Defense in Depth Approach"

Transcription

1 GÉANT: A Defense in Depth Approach Wayne Routly Security Manager DANTE SURFcert Utrecht.nl Febuary 2014

2 Agenda GEANT Network Technology and forward thinking Defence In Depth: Today A Layered Approach NSHaRP Technologies Security Audits Changes NREN & ISP Security Working Group Demonstrate Leadership Challenges: Tomorrow Raining Cats & DDoS Snowden Effect

3 The GÉANT Network 30 European PoPs 13,500 km of dark fibre on 18 routes 50,000 km network infrastructure on 44 routes Diversified footprint Serves 50 million users 10,000 institutions Across 43 European countries GÉANT is co-funded by Europe s NRENs and the European Commission (EC) under the Seventh Framework Programme (FP7) 34 Project Partners: DANTE, TERENA, 31 European NRENs and NORDUnet 158 FTEs annual effort (> 350 individuals) working in GÉANT across Europe Objectives Achievements Challenges Conclusions GN3 Overall Q&A

4 GÉANT : Who What How State of the Art Pan-European Network..Transit Network.ISP 30 Physical Pops 100Gb/s PB of Data shifted 10 Million+ IPs 100+ Workstations Unusual Traffic Truly Global Interconnects NRENs - 38 Commercial & Commodity Traffic 4 #

5 A Layered Approach Overview NSHaRP Security Toolset Building Future Security Netreflex Security Audit Changes Procedures & Training for Future Security NfSen Splunk ISO27001 NAC Policies Visibility NREN & ISP Security WG Planning for Future Security Future Threats Hardening Infrastructure

6 Who, Where, Why and Definitely What

7 Defence in Depth - A Layered Approach Independent Layers Greater Control Avoid Eggs in Basket Approach - Mix of Technologies 1 st layer NSHaRP - Netreflex: Anomaly Detection / Alerting 2 nd Layer NfSen - Alerts / Profiling & Intelligence 3 rd layer Splunk LM - Logging (Granular Visibility for Alerts) 4 th Layer Network - Segmentation / Authentication 5 th Layer Revision Planning - Policies & Audits

8 Layer 1 Alerting Controls

9 NSHaRP Mechanism to Quickly and Effectively inform affected users Adds Value - Serves as an extension to NRENs CERT An Automated Incident Notification & Handling System Extends NRENs detection and mitigation capability to GEANT borders Innovative and Unique - Caters for different types of requirements Supported with GEANT NOC TTS

10 NSHaRP - Netreflex Netreflex 2.9 BGP, IS-IS & Netflow Mashup Path Through Network Anomaly Detection & Alerting Diverse Pallet Ability to create profiles..lots of profiles New Peering's Expandable Anomaly Type capability New Event Types Can also be used by the NOC Traffic Analysis

11 Netreflex Anomaly Detection

12 Netreflex Anomaly Analysis

13 Layer 2 Investigative Controls

14 NfSen Netflow Sensor Easily navigate through the netflow data. Process the netflow data within the specified time span. Set alerts, based on various conditions.

15 NfSen Graphing Netflow Graph Flows from Multiple Routers View Time Slice / Window Protocol / Packet / Flows Analyse Flows (Incidents) Dimensional Near Zero Day Analysis

16 NfSen Drill Down AS Number Subnet Country Zone Data Source Date Registered Total Bytes Final AS /13 GB ripencc BROADBAND-AS /21 US arin LEASEWEB-US /24 US arin YOUTUBE /24 US arin GOOGLE /18 IE ripencc /20 CN apnic /16 GB ripencc BSKYB- LGI-UPC Liberty Global Operations CHINANET- BACKBONE NTL Virgin Media Limited #

17 NfSen Alerting

18 Layer 3 Analytical Controls

19 Splunk Log Level Analytics Provide Visibility of Low Noise Events Non Netflow Trends Consolidate Logging Across Departments Across Roles Reporting Aspects Big Picture Today vs. Yesterday

20 Splunk Detailed Alerts #

21 Layer 4 Physical Controls

22 Network Layer Protections IP Network Segmentation Zones (IPv4 & IPv6) PENETRATION TESTING Standardised Firewall Filters Rapid Deployment Security Baseline Day 1 GEANT Access Control Radius-Based Authentication Restrict Protocols (Management) PORT 443 PORT 22 PORT 139 Penetration Testing DANTE Confirm Best Practice

23 Layer 5 Soft Controls

24 Those Two Magic Words Trust Me Lets Talk I'm Pregnant Greek Default Been Hacked SECURITY AUDIT 24

25

26 Security Audits #

27 Security Audits Resolved Issues Logical changes: Audit physical security measures of Cambridge locations Critical systems are targeted by penetration tests All programmers attended Secure Code Training Implemented Technical Training Programme for NOC Technical Changes: signatures used for all correspondence #

28 NREN & ISP Security Working Group EC Review Recommendation 32 Requirements: A high-level management review of the security measures in place Share knowledge of current threats experienced in large networks List the recommended physical security approaches for listed threats Define areas of co-operation for research and incident mitigation activities

29 Working Group Members NREN & ISP Security Working Group Commercial ISP Security Specialists EU Security Agency Sister R&E Networks GÉANT Operator GÉANT NRENs #

30 Security WG Report Process & Technology Findings Policy Develop a Service Approach Policy for BYOD Threat and Risk Assessment Perform Stress Test on Security Systems Perform Annual Security Exercises Technology Solutions One-Time Password Solution for Critical Systems #

31 Security WG Report People & Physical Security Findings Organisation Review Staffing Levels Implement Privacy Officer Role Identify Management Digitally Sign PDFs Produced for Dissemination Physical Security of Operational Facilities Place Web Cameras in GÉANT Racks (PoPs) #

32 CHALLENGES IMPLICATIONS FOR TOMORROW Logical changes Align controls with ISO Train the Trainer Course Mobile encryption Full disk encryption Technical changes Investigate and implement NAC (WG) Investigate controls and restrictions based on location #

33 CHALLENGES WHO IS THE REAL THREAT? I wish I would ve known about this meeting. Now, I don t have time to pick up any lunch and I m starving. How the NSA could start slowly making it up to us Excuse me sir. Here is your favourite sandwich and a side of potato salad just like you like it. #

34 CHALLENGES TOMORROW S THREATS Nation State Snowden Effect Controlling access to the infrastructure Monitoring (Links / Webcams) Procedures Access to information Encryption, rights management Cloud Security Requirements* Access control? Encryption as a standard Privacy (legal obligations)* Risk-based approach* #

35 In Conclusion GÉANT : What is Why Defence in Depth? A Layered Approach Layer 1 NSHaRP & Netreflex Layer 2 NfSen Layer 3 Splunk Layer 4 Network Layer Protections Layer 5 Policies & Guides

36 Questions & Answers

37 Thank you! Connect Communicate Collaborate

Case study: NBA as a Service at GÉANT

Case study: NBA as a Service at GÉANT Case study: NBA as a Service at GÉANT Part of project NSHaRP Artur Kane kane@flowmon.com Our starts-liberouter Liberouter project 2002 (www.liberouter.org) acceleration of high-speed network application

More information

GÉANT IP Service Description. High Performance IP Services to Support Advanced Research

GÉANT IP Service Description. High Performance IP Services to Support Advanced Research GÉANT IP Service Description High Performance IP Services to Support Advanced Research Issue Date: 1 November 2017 GÉANT IP Overview The GÉANT IP service provides high-bandwidth, international Internet

More information

GÉANT : e-infrastructure connectivity for the data deluge

GÉANT : e-infrastructure connectivity for the data deluge GÉANT : e-infrastructure connectivity for the data deluge Richard Hughes-Jones, Maria Minaricova & Vincenzo Capone DANTE BioMedBridges Workshop, Hinxton, 15-16 May 2014 What is GÉANT? High-bandwidth, high-performance

More information

Security

Security Security +617 3222 2555 info@citec.com.au Security With enhanced intruder technologies, increasingly sophisticated attacks and advancing threats, your data has never been more susceptible to breaches from

More information

Connectivity Services, Autobahn and New Services

Connectivity Services, Autobahn and New Services Connectivity Services, Autobahn and New Services Domenico Vicinanza, DANTE EGEE 09, Barcelona, 21 st -25 th September 2009 Agenda Background GÉANT Connectivity services: GÉANT IP GÉANT Plus GÉANT Lambda

More information

GÉANT and other projects Update

GÉANT and other projects Update GÉANT and other projects Update Matthew Scott, General Manager DANTE Internet2 Spring Member Meeting 28 April 2009 Matthew.Scott@dante.net A refresher what is GÉANT? Local campus networks link to national

More information

GÉANT: Supporting R&E Collaboration

GÉANT: Supporting R&E Collaboration GÉANT: Supporting R&E Collaboration Thomas Fryer, Senior International Relations Officer, GÉANT Association NKN Annual Workshop Guwahati, Assam, India Monday, 15 th December 2014 TERENA and DANTE have

More information

Multi-Domain VPN service, a seamless infrastructure for Regional Network, NRENs and GEANT

Multi-Domain VPN service, a seamless infrastructure for Regional Network, NRENs and GEANT Multi-Domain VPN service, a seamless infrastructure for Regional Network, NRENs and GEANT JRES 2013 (Montpellier) Thursday, 12 december 2013 Xavier Jeannin - RENATER, GN3plus, SA3T3 Task Leader Alain Bidaud

More information

GÉANT2 Security: Year 1 (aka JRA2)

GÉANT2 Security: Year 1 (aka JRA2) GÉANT2 Security: Year 1 (aka JRA2) Christoph Graf, SWITCH TF-CSIRT, Lisbon 16 September 2005 Introduction JRA2 aims at: improving the overall security within the GÉANT2 community JRA2 fits into GÉANT2

More information

Options for Joining edugain. Lukas Hämmerle, SWITCH DARIAH Workshop, Köln 18 October 2013

Options for Joining edugain. Lukas Hämmerle, SWITCH DARIAH Workshop, Köln 18 October 2013 Options for Joining edugain Lukas Hämmerle, SWITCH DARIAH Workshop, Köln 18 October 2013 Outline 1. GE ANT and the Enabling Users task 2. Options to Join edugain 3. Discussion 2 GÉANT (GN3plus) - vital

More information

Compare Security Analytics Solutions

Compare Security Analytics Solutions Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch

More information

GDPR Update and ENISA guidelines

GDPR Update and ENISA guidelines GDPR Update and ENISA guidelines 2016 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how to ensure

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

EUMEDCONNECT3 and European R&E Developments

EUMEDCONNECT3 and European R&E Developments EUMEDCONNECT3 and European R&E Developments David West DANTE 17 September 2012 INTERNET2 Middle SIG, Abu Dhabi The Research and Education Network for the Mediterranean Covering GEANT Other regional network

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

Federated E-infrastructure Dedicated to European Researchers Innovating in Computing network Architectures

Federated E-infrastructure Dedicated to European Researchers Innovating in Computing network Architectures Federated E-infrastructure Dedicated to European Researchers Innovating in Computing network Architectures Mauro Campanella - GARR FP7 Future Networks Concertation Meeting Brussels, March 11th, 2008 FEDERICA

More information

GÉANT Community Programme

GÉANT Community Programme GÉANT Community Programme Building the community Klaas Wierenga Chief Community Support Officer GÉANT Information day, Tirana, 5 th April 1 Membership Association = very large community to serve GÉANT

More information

e-infrastructures in FP7 INFO DAY - Paris

e-infrastructures in FP7 INFO DAY - Paris e-infrastructures in FP7 INFO DAY - Paris Carlos Morais Pires European Commission DG INFSO GÉANT & e-infrastructure Unit 1 Global challenges with high societal impact Big Science and the role of empowered

More information

GÉANT Open Service Description. High Performance Interconnectivity to Support Advanced Research

GÉANT Open Service Description. High Performance Interconnectivity to Support Advanced Research GÉANT Open Service Description High Performance Interconnectivity to Support Advanced Research Issue Date: 20 July 2015 GÉANT Open Exchange Overview Facilitating collaboration has always been the cornerstone

More information

Networks

Networks Networks +617 3222 2555 info@citec.com.au Queensland Government Network (QGN) Our Queensland Government Network (QGN) is central to the ICT services we provide. It is a government owned and managed network,

More information

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1 CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/

More information

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson Supply Chain Integrity and Security Assurance for ICT Mats Nilsson The starting point 2 B Internet users 85% Population coverage 5+ B Mobile subscriptions 10 years of Daily upload E-Books surpassing Print

More information

It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security

It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security Pavel Minařík, Chief Technology Officer Neutral Peering Days 2018, The Hague Your customers depend on your

More information

Advancing European R&E through collaboration

Advancing European R&E through collaboration Advancing European R&E through collaboration CESNET Conference Erik Huizer, GÉANT, 11 th December 2017 To support collaboration and development amongst researchers, the dissemination of information & knowledge,

More information

Network Disaggregation

Network Disaggregation Network Disaggregation Mian Usman Network Architect Internet2 Global Summit 2018 1 GÉANT Network The GÉANT network interconnects research, education and innovation communities worldwide, with secure, high-capacity

More information

TALK. agalaxy FOR THUNDER TPS REAL-TIME GLOBAL DDOS DEFENSE MANAGEMENT WITH A10 DATA SHEET DDOS DEFENSE MONITORING AND MANAGEMENT

TALK. agalaxy FOR THUNDER TPS REAL-TIME GLOBAL DDOS DEFENSE MANAGEMENT WITH A10 DATA SHEET DDOS DEFENSE MONITORING AND MANAGEMENT DATA SHEET agalaxy FOR THUNDER TPS DDOS DEFENSE MONITORING AND MANAGEMENT The A10 agalaxy management system is integrated with PLATFORMS the Thunder TPS (Threat Protection System) for DDoS protection.

More information

Intro to Niara. no compromise behavioral analytics. Tomas Muliuolis HPE Aruba Baltics Lead

Intro to Niara. no compromise behavioral analytics. Tomas Muliuolis HPE Aruba Baltics Lead Intro to Niara no compromise behavioral analytics Tomas Muliuolis HPE Aruba Baltics Lead THE SECURITY GAP SECURITY SPEND DATA BREACHES 146 days median time from compromise to discovery PREVENTION & DETECTION

More information

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe. Crises Control Cloud Security Principles Transputec provides ICT Services and Solutions to leading organisations around the globe. As a provider of these services for over 30 years, we have the credibility

More information

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 ENISA & Cybersecurity Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010 Agenda Some Definitions Some Statistics ENISA & Cybersecurity Conclusions

More information

Security Aspects of Trust Services Providers

Security Aspects of Trust Services Providers Security Aspects of Trust Services Providers Please replace background with image European Union Agency for Network and Information Security 24 th September 2013 www.enisa.europa.eu Today s agenda 09:30-10:00

More information

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW: SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,

More information

FEDERICA Federated E-infrastructure Dedicated to European Researchers Innovating in Computing network Architectures

FEDERICA Federated E-infrastructure Dedicated to European Researchers Innovating in Computing network Architectures FEDERICA Federated E-infrastructure Dedicated to European Researchers Innovating in Computing network Architectures Mauro Campanella - GARR Joint Techs Workshop / APAN Honolulu, January 23 2008 FEDERICA

More information

GÉANT network and applications PENS workshop J-L Dorel European Commission

GÉANT network and applications PENS workshop J-L Dorel European Commission GÉANT network and applications PENS workshop 17-10-12 J-L Dorel European Commission 50000 km of network 10000 km of lit fibre 8000+ institutions 40 millions researchers and students 40 countries Reaching

More information

Innovation policy for Industry 4.0

Innovation policy for Industry 4.0 Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

NETWORK THREATS DEMAN

NETWORK THREATS DEMAN SELF-DEFENDING NETWORK NETWORK THREATS DEMAN NEW SECURITY: STRATEGIES TECHNOLOGIES Self-Propagating Threats A combination of: self propagating threats Collaborative applications Interconnected environments

More information

Subscriber Data Correlation

Subscriber Data Correlation Subscriber Data Correlation Application of Cisco Stealthwatch to Service Provider mobility environment Introduction With the prevalence of smart mobile devices and the increase of application usage, Service

More information

Designing and Building a Cybersecurity Program

Designing and Building a Cybersecurity Program Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (CSF) Larry Wilson lwilson@umassp.edu ISACA Breakfast Meeting January, 2016 Designing & Building a Cybersecurity

More information

ARBOR DDoS PRODUCTS IN A GDPR COMPLIANT ENVIRONMENT. Guidelines and Frequently Asked Questions

ARBOR DDoS PRODUCTS IN A GDPR COMPLIANT ENVIRONMENT. Guidelines and Frequently Asked Questions ARBOR DDoS PRODUCTS IN A GDPR COMPLIANT ENVIRONMENT Guidelines and Frequently Asked Questions About NETSCOUT NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT) assures digital business services against disruptions

More information

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002 ISO 27002 COMPLIANCE GUIDE How Rapid7 Can Help You Achieve Compliance with ISO 27002 A CONTENTS Introduction 2 Detailed Controls Mapping 3 About Rapid7 8 rapid7.com ISO 27002 Compliance Guide 1 INTRODUCTION

More information

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS Surprisingly Successful: What Really Works in Cyber Defense John Pescatore, SANS 1 Largest Breach Ever 2 The Business Impact Equation All CEOs know stuff happens in business and in security The goal is

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

Digital Health Cyber Security Centre

Digital Health Cyber Security Centre Digital Health Cyber Security Centre Current challenges Ransomware According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. Distributed Denial of Service (DDoS) Targeting

More information

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,

More information

GÉANT Time Compendium Project and Service Updates

GÉANT Time Compendium Project and Service Updates GÉANT Time Compendium Project and Service Updates Melanie Pankhurst, DANTE TF-CPR Network Meeting Vienna, 13 February 2014 The GÉANT Time The Compendium Online (Christian Gijtenbeek) Project and NA2 updates

More information

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today Security Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today Staff Augmentation, Executive Staffing, Flex Staffing Achieving our main goal

More information

IPv6 deployment, European Commission involvement. RIPE 60 Prague 4May Per Blixt

IPv6 deployment, European Commission involvement. RIPE 60 Prague 4May Per Blixt IPv6 deployment, European Commission involvement RIPE 60 Prague 4May 2010 Per Blixt European Commission - DG INFSO Head of Unit, New Infrastructure Paradigms and Experimental Facilities 1 50 Millions left

More information

AMRES Combining national, regional and & EU efforts

AMRES Combining national, regional and & EU efforts AMRES Combining national, regional and & EU efforts Eastern Europe Partnership Event, 8 November 2011, Bucharest www.amres.ac.rs 1 www.amres.ac.rs Who are we? - Why AMRES/UoB? In 90s UoB (computer centre)

More information

Security by Default: Enabling Transformation Through Cyber Resilience

Security by Default: Enabling Transformation Through Cyber Resilience Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,

More information

Deutsches Forschungsnetz

Deutsches Forschungsnetz Deutsches Forschungsnetz DDoS mitigation in DFN's service portfolio Dr. Ralf Gröper DDoS Mitigation in the NREN Environment Workshop November 11, 2015 Seite 3 Real-World Example in DFN 10 Gbit/s ~45 Minutes

More information

Flow-based Traffic Visibility

Flow-based Traffic Visibility Flow-based Traffic Visibility Operations, Performance, Security Pavel Minařík, Chief Technology Officer What is Flow Data? Modern method for network monitoring flow measurement Cisco standard NetFlow v5/v9,

More information

SAFEGUARDING YOUR VIRTUALIZED RESOURCES ON THE CLOUD. May 2012

SAFEGUARDING YOUR VIRTUALIZED RESOURCES ON THE CLOUD. May 2012 SAFEGUARDING YOUR VIRTUALIZED RESOURCES ON THE CLOUD May 2012 THE ECONOMICS OF THE DATA CENTER Physical Server Installed Base (Millions) Logical Server Installed Base (Millions) Complexity and Operating

More information

Network Virtualization for Future Internet Research

Network Virtualization for Future Internet Research Network Virtualization for Future Internet Research Mauro Campanella - GARR On behalf of the FEDERICA project Internet2 Fall Meeting New Orleans, October 14th, 2008 Agenda FEDERICA at a glance, vision

More information

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large Executive Summary As a County Government servicing about 1.5 million citizens, we have the utmost responsibility to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

More information

Second Online Workshop Report Study of the readiness of Member States for a common pan-european network infrastructure for public services

Second Online Workshop Report Study of the readiness of Member States for a common pan-european network infrastructure for public services Study of the readiness of Member States for a common pan-european network infrastructure for public services SMART2012/0048 October 2013 Table of Contents 1 CONTEXT... 3 1.1 INTRODUCTION... 3 2 OBJECTIVE

More information

Securing Europe's Information Society

Securing Europe's Information Society Securing Europe's Information Society Dr. Udo Helmbrecht Executive Director European Network and Information Security Agency 16 June 2010 FIRST AGM Miami 16/6/2010 1 Agenda ENISA overview Challenges EU

More information

GN3 Plus NA3-T3 Greening of ICT Services. Andrew Mackarel GN3+ NA3 T3 15th September 2014 Workshop Budapest

GN3 Plus NA3-T3 Greening of ICT Services. Andrew Mackarel GN3+ NA3 T3 15th September 2014 Workshop Budapest GN3 Plus NA3-T3 Greening of ICT Services Andrew Mackarel GN3+ NA3 T3 15th September 2014 Workshop Budapest Agenda for this talk! GN3Plus Team Scope of Work! The GN3Plus NA3-T3 Team! GN3 Focus Areas and

More information

Open Exchange Policy

Open Exchange Policy 23-01-2014 Open Exchange Policy Date of Issue: 23 Jan 2014 Document Code: GN3PLUS13-1439-12 Authors: DANTE Product Management Description: Outlines the purpose and governance of the GÉANT Open Exchange

More information

10 FOCUS AREAS FOR BREACH PREVENTION

10 FOCUS AREAS FOR BREACH PREVENTION 10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual

More information

Security Operations & Analytics Services

Security Operations & Analytics Services Security Operations & Analytics Services www.ecominfotech.biz info@ecominfotech.biz Page 1 Key Challenges Average time to detect an attack (Dwell time) hovers around 175 to 210 days as reported by some

More information

Defense in Depth. Constructing Your Walls for Your Enterprise. Mike D Arezzo Director of Security April 21, 2016

Defense in Depth. Constructing Your Walls for Your Enterprise. Mike D Arezzo Director of Security April 21, 2016 Defense in Depth Constructing Your Walls for Your Enterprise Mike D Arezzo Director of Security April 21, 2016 Defense in Depth Defense in Depth Coordinated use of multiple security countermeasures Protect

More information

GARR-CERT. Update. Simona Venuti TF-CSIRT, Rome,

GARR-CERT. Update. Simona Venuti TF-CSIRT, Rome, GARR-CERT Update OLD GARR-CERT Presentation... I do not know who was the first to present GARR-CERT... And I do not have that presentation, nor any presentation at all Since my duty is to make an «update»...

More information

Sharing Best Security Practices with your Peers - on an International Level

Sharing Best Security Practices with your Peers - on an International Level Public Sharing Best Security Practices with your Peers - on an International Level Urpo Kaila, Head of Security, csc.fi EUDAT Security Officer WISE Community SC member GÉANT SIG-ISMS

More information

EU General Data Protection Regulation (GDPR) Achieving compliance

EU General Data Protection Regulation (GDPR) Achieving compliance EU General Data Protection Regulation (GDPR) Achieving compliance GDPR enhancing data protection and privacy The new EU General Data Protection Regulation (GDPR) will apply across all EU member states,

More information

Cybersecurity Overview

Cybersecurity Overview Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where

More information

Trisul Network Analytics - Traffic Analyzer

Trisul Network Analytics - Traffic Analyzer Trisul Network Analytics - Traffic Analyzer Using this information the Trisul Network Analytics Netfllow for ISP solution provides information to assist the following operation groups: Network Operations

More information

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare INFORMATION SECURITY A briefing on the information security controls at Computershare One line heading > One line subheading INTRODUCTION Information is critical to all of our clients and is therefore

More information

Cyber security tips and self-assessment for business

Cyber security tips and self-assessment for business Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this

More information

WELCOME. to the 1 st online DG CONNECT NIPS Study workshop. July 25, 2013

WELCOME. to the 1 st online DG CONNECT NIPS Study workshop. July 25, 2013 WELCOME to the 1 st online DG CONNECT NIPS Study workshop July 25, 2013 2 DG CONNECT NIPS Study online workshop Agenda topics Timing Facilitator Introduction and practicalities of the workshop 5 min Dan

More information

Interconnected NRENs in Europe & GÉANT: Mission & Governance Issues

Interconnected NRENs in Europe & GÉANT: Mission & Governance Issues Interconnected NRENs in Europe & GÉANT: Mission & Governance Issues Vasilis Maglaris maglaris@netmode.ntua.gr Professor, National Technical University of Athens - NTUA Chairman, NREN Policy Committee GÉANT

More information

e-infrastructure: objectives and strategy in FP7

e-infrastructure: objectives and strategy in FP7 "The views expressed in this presentation are those of the author and do not necessarily reflect the views of the European Commission" e-infrastructure: objectives and strategy in FP7 National information

More information

Research and Education Networking Ecosystem and NSRC Assistance

Research and Education Networking Ecosystem and NSRC Assistance Research and Education Networking Ecosystem and NSRC Assistance This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org). This document may be freely copied,

More information

Initiative. Copyright Techdemocracy, 2017

Initiative. Copyright Techdemocracy, 2017 A Initiative 1 A Initiative 2 November 2 nd, 2017 Ken Pfeil / Gautam Dev 3 What is the purpose of the ACRG? The alliance purpose is to establish a standard framework for risk measurement, reporting and

More information

ngenius Products in a GDPR Compliant Environment

ngenius Products in a GDPR Compliant Environment l FAQ l ngenius Products in a GDPR Compliant Environment This document addresses questions from organizations that use ngenius Smart Data Core platform and application products and are evaluating their

More information

DDoS Protection in Backbone Networks

DDoS Protection in Backbone Networks DDoS Protection in Backbone Networks The Czech Way Pavel Minarik, Chief Technology Officer Holland Strikes Back, 3 rd Oct 2017 Backbone DDoS protection Backbone protection is specific High number of up-links,

More information

Cisco Tetration Analytics

Cisco Tetration Analytics Cisco Tetration Analytics Enhanced security and operations with real time analytics John Joo Tetration Business Unit Cisco Systems Security Challenges in Modern Data Centers Securing applications has become

More information

Trustworthy ICT. FP7-ICT Objective 1.5 WP 2013

Trustworthy ICT. FP7-ICT Objective 1.5 WP 2013 Trustworthy ICT FP7-ICT-2013-10 Objective 1.5 WP 2013 1 General Overview Focused in a limited number of technologies in emerging application of high economic impact in the security area, Cloud Computing

More information

SentryWire Next generation packet capture and network security.

SentryWire Next generation packet capture and network security. Next generation packet capture and network security. 1 The data landscape More data, more danger. Data proliferation brings many new opportunities but also many downsides: more data breaches, more sophisticated

More information

SentryWire Next generation packet capture and network security.

SentryWire Next generation packet capture and network security. Next generation packet capture and network security. 1 The data landscape 5 big cyber security trends for 2018 More data, more danger. Data proliferation brings many new opportunities but also many downsides:

More information

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle Data Security and Privacy : Compliance to Stewardship Jignesh Patel Solution Consultant,Oracle Agenda Connected Government Security Threats and Risks Defense In Depth Approach Summary Connected Government

More information

GÉANT Open Service Description. High Performance Interconnectivity to Support Advanced Research

GÉANT Open Service Description. High Performance Interconnectivity to Support Advanced Research GÉANT Open Service Description High Performance Interconnectivity to Support Advanced Research Issue Date: 1 November 2017 GÉANT Open Exchange Overview Facilitating collaboration has always been the cornerstone

More information

Outline. Infrastructure and operations architecture. Operations. Services Monitoring and management tools

Outline. Infrastructure and operations architecture. Operations. Services Monitoring and management tools EGI-InSPIRE EGI Operations Tiziana Ferrari/EGI.eu EGI Chief Operations Officer 1 Outline Infrastructure and operations architecture Services Monitoring and management tools Operations 2 Installed Capacity

More information

Network Security Platform Overview

Network Security Platform Overview Quick Tour Revision B McAfee Network Security Platform 8.1 Network Security Platform Overview McAfee Network Security Platform [formerly McAfee IntruShield ] is a combination of network appliances and

More information

Challenges 3. HAWK Introduction 4. Key Benefits 6. About Gavin Technologies 7. Our Security Practice 8. Security Services Approach 9

Challenges 3. HAWK Introduction 4. Key Benefits 6. About Gavin Technologies 7. Our Security Practice 8. Security Services Approach 9 HAWK Overview Agenda Contents Slide Challenges 3 HAWK Introduction 4 Key Benefits 6 About Gavin Technologies 7 Our Security Practice 8 Security Services Approach 9 Why Gavin Technologies 10 Key Clients

More information

First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh.

First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh. First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh. DRAFT SUBMISSION OF [ORGANIZATION] PROJECTS/ACTIVITIES/STUDIES [Date] Objective: This

More information

Cybersecurity Auditing in an Unsecure World

Cybersecurity Auditing in an Unsecure World About This Course Cybersecurity Auditing in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that cybersecurity

More information

Twilio cloud communications SECURITY

Twilio cloud communications SECURITY WHITEPAPER Twilio cloud communications SECURITY From the world s largest public companies to early-stage startups, people rely on Twilio s cloud communications platform to exchange millions of calls and

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

Imperva Incapsula Website Security

Imperva Incapsula Website Security Imperva Incapsula Website Security DA T A SH E E T Application Security from the Cloud Imperva Incapsula cloud-based website security solution features the industry s leading WAF technology, as well as

More information

Call for Expressions of Interest

Call for Expressions of Interest Call for Expressions of Interest ENISA M/CEI/17/T01 Experts for assisting in the implementation of the annual ENISA Work Programme TECHNICAL DESCRIPTION CONTENTS TECHNICAL DESCRIPTION... 3 1. INTRODUCTION...

More information

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA IT Security Mandatory Solutions Andris Soroka 2nd of July, 2014 @LPS, RIGA Data Security Solutions business card Specialization IT Security IT Security services (consulting, audit, pen-testing, market

More information

NEXT GENERATION SECURITY OPERATIONS CENTER

NEXT GENERATION SECURITY OPERATIONS CENTER DTS SOLUTION NEXT GENERATION SECURITY OPERATIONS CENTER SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 - SUCCESS FACTORS SOC 2.0 - FUNCTIONAL COMPONENTS DTS SOLUTION SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 Protecting

More information

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience

More information

SIEM: Five Requirements that Solve the Bigger Business Issues

SIEM: Five Requirements that Solve the Bigger Business Issues SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered

More information

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE PREPARATION FOR GDPR IS ESSENTIAL The EU GDPR imposes interrelated obligations for organizations handling

More information

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

NETWORKING &SECURITY SOLUTIONSPORTFOLIO NETWORKING &SECURITY SOLUTIONSPORTFOLIO NETWORKING &SECURITY SOLUTIONSPORTFOLIO Acomprehensivesolutionsportfoliotohelpyougetyourbusiness securelyconnected.clickononeofoursolutionstoknowmore NETWORKING

More information

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley Auditing Bring Your Own Devices (BYOD) Risks Shannon Buckley Agenda 1. Understanding the trend towards BYOD. 2. Weighing up the cost benefit vs. the risks. 3. Identifying and mitigating the risks. 4. Tips

More information

EISAS Enhanced Roadmap 2012

EISAS Enhanced Roadmap 2012 [Deliverable November 2012] I About ENISA The European Network and Information Security Agency (ENISA) is a centre of network and information security expertise for the EU, its Member States, the private

More information

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs

More information

The Oracle Trust Fabric Securing the Cloud Journey

The Oracle Trust Fabric Securing the Cloud Journey The Oracle Trust Fabric Securing the Cloud Journey Eric Olden Senior Vice President and General Manager Cloud Security and Identity 05.07.2018 Safe Harbor Statement The following is intended to outline

More information