Security Services Catalogue

Size: px
Start display at page:

Download "Security Services Catalogue"

Transcription

1 Project Charter for the development of a Security Services Catalogue Version 1.0 Prepared by Pascal de Koning, i-to-i May 27 th, 2014

2 Project Charter for Security Services Library Page 1 Table of Contents 1. Project Description Vision The function of a catalogue Project goals Relationships with other work ISO27001/ISO ISF Standard of Good Practice COBIT O-ISM O-ESA (Open Enterprise Security Architecture) OSA (Open Security Architecture) A Security Services Catalogue is not a Unified Control Objective Framework Deliverables, Ownership and Success Criteria Deliverables Project ownership and intellectual property (IP) Critical Success Factors Stakeholders Project chairman The Open Group The SABSA Institute The Open Security Architecture Working group members Communication plan Project Scope Assumptions and Dependencies Risks Resources Approval of the deliverables Planning Revision History Name Date Reason For Changes Version Pascal de Koning May 2 nd 2014 Initial version 0.1 Pascal de Koning May 27 th 2014 Reviewed by John Sherwood, Jim Hietala, Tobias Christen, John Sluiter, Lex Borger, Jason Kobes, Vicente Aceituno and Geoff Besco. 1.0

3 Project Charter for Security Services Library Page 2 1. Project Description The aim of the project is realize the community-driven development of a security service catalogue, so that it can be consumed by enterprise (security) architects. Reuse of and referral to existing material is encouraged. A readily available catalogue enables Enterprise (Security) Architects to quickly make a clear link between high level requirement and corresponding solution(s). The catalogue contains the organizations solutions memory and enables re-use. Without the catalogue and associated governance, the benefits of security architecture are only partly realized. It provides the mechanism for feedback from delivered systems and solutions to the architecture. The desire for a security services catalogue was expressed clearly at the SABSA world conference 2013, hosted at COSAC. SABSA offers a framework for Enterprise Security Architecture. It is owned by the SABSA Institute. The focus of SABSA is to realize a business-driven security architecture. At current, worldwide there more than 3000 people certified as SABSA architect. A lot of them have been working on the definition and inventory of the business drivers and business attributes. At this time, many practitioners are seeking ways to actually fill in the security functions at the logical layer. A current development is that security is integrated more and more into enterprise architectures. A mainstream enterprise architecture framework is TOGAF, owned by The Open Group. It describes an Architecture Development Method (ADM) that can be used to deliver an Enterprise Architecture. A security architecture framework that fits well with TOGAF is SABSA, owned by The SABSA Institute. At this moment the TNSPproject is running, which goal is to provide the integration of security into the Next version of TOGAF, using many SABSA ideas. Part of this is the development of practitioner guidance. This security-services-catalogue project will deliver a part of this TNSP-guidance Vision For security architects, the security services catalogue is a register that supports filling in the logical (aka functional) layer of the architecture with security controls. Unlike existing control frameworks that contain requirements, the security services catalogue describes security building blocks that actually deliver protection. This architecture approach enables smooth integration of information security in the enterprise architecture. The standardized approach contributes to the professionalization of the security management organization and facilitates a more efficient and cost effective way of working. One of the main advantages of the Security Services Catalogue is that it is a common terminology and reference framework for the domain of security management allowing better cooperation between the parties concerned.

4 Project Charter for Security Services Library Page The function of a catalogue To give an idea of the function of the catalogue, we use a historic source from a librarian. Charles Ammi Cutter made the first explicit statement regarding the objectives of a bibliographic system in his Rules for a Printed Dictionary Catalog in According to Cutter, those objectives were 1 to enable a person to find a book of which either (Identifying objective) the author the title the subject the category is known. 2. to show what the library has (Collocating objective) by a given author on a given subject in a given kind of literature 3. to assist in the choice of a book (Evaluating objective) as to its edition (bibliographically) as to its character (literary or topical) These objectives can still be recognized in more modern definitions and they also hold for the Security Services Catalogue, although in this case a book is replaced by a security service.

5 Project Charter for Security Services Library Page Project goals The project goals are: 1. To bring security services within the realm of enterprise architects, by using the concepts of TOGAF and SABSA to give shape to the Security Services Catalogue. This catalogue enables communication and cooperation between technical and business oriented security professionals. 2. To fill in the Security Services Catalogue, a unified set of security services that can be used by enterprise security architects. There are some useable sets available, so this goal is more about selecting or combining existing sets of services. A project principle is to make use of existing good work if available. The workgroup will: i. look at existing security control libraries, and engage with the one(s) that are useable. For example OSA or O-ISM3. ii. give guidance on the selection of security services for a given enterprise, for example by giving services a priority rating or implementation impact rating. 3. To add a how-to component to the logical layer of the SABSA framework, based on work already done by Pascal de Koning and John Sherwood on a methodology for achieving this. This work is known as the trusted architecture concept. 4. To develop TOGAF practitioner guidance on the benefits and usage of a security services catalogue. This is positioned as TOGAF Part 2 Practitioner guidance and will be offered to the TNSP project. 5. To establish a process that maintains the catalogue for years to come. A process by which a set of roles and responsibilities are applied for who shall have authority for including materials in the repository, who shall apply quality control, who shall operate and maintain the repository and who shall have access to use the materials stored. 6. To give life to an international community of enterprise security architects, boosting the exchange of knowledge and improving the personal networks of participants, and bringing together both the TOGAF and the SABSA communities in a common purpose Relationships with other work ISO27001/ISO27002 ISO27002 is a set of control objectives that support the implementation of an Information Security Management System (ISMS) as described in ISO It is a widely accepted standard. Although not meant to be so, the ISO27002 is often used as a checklist. The latest version is published in 2013, following up the 2005 version. The time it takes before it is updated means per definition that ISO27002 cannot cope with emerging threats and ICT developments. The price is about 300,- euro for both. ISO s model gets in the way of freely distributing this work. In this project we ll just use it as a source of inspiration but not literally take it over.

6 Project Charter for Security Services Library Page ISF Standard of Good Practice The ISF Standard of Good Practice is a best practice that is updated yearly. It addresses both a way to approach information security as well as a set of control objectives to implement security. This set of control objectives is at the same abstraction layer as foreseen for the SRA. The price is about 3.000,- euro. ISF only distributes its deliverables among members, which means that the information cannot be shared freely (it s not open source). This business model might be inhibiting cooperation, although also at ISF members are now looking at security architectures and SABSA, so this might bring possibilities in the future COBIT COBIT has a very strong controls library in three layers, but its focus is on IT governance. It plays a useful part of the whole picture O-ISM3 The O-ISM3 model (Open Information Security Management Maturity Model) of The Open Group breaks information security management down into a comprehensive but manageable number of processes, with specifically relevant security control(s) being identified within each process as an essential subset of that process. The section in O- ISM3 that describes the security processes is relevant for this project O-ESA (Open Enterprise Security Architecture) O-ESA defines a policy-driven security architecture with the aim to automate access control and other (network-related) security measures. It covers the governance of the rule sets, the technical design of the controls and the operational processes. O-ESA is a technique-focused security architecture, in SABSA-terms it would be placed on the logical and physical layer. It could be used as a source for some technical controls OSA (Open Security Architecture) OSA, OSA is a library of security controls that are applied to standard situations in security patterns. This is visualized by easy to understand graphs. OSA is open source, driven by a small community and open for comments and support. The library exists of about 170 controls (based on NIST SP800-53) seems to be very usable. A very strong aspect of OSA is the visualization of security patterns. Resources for creating these visualizations are already available and it contains a lot of existing material that can be used as examples. The community is small (with three core members) but willing to support this project.

7 Project Charter for Security Services Library Page A Security Services Catalogue is not a Unified Control Objective Framework A Unified Control Framework is a set of control objectives. Commonly these are mapped to specific control frameworks, such as ISO Examples of sources for controls (or mappings) are: Unified Compliance Framework ( This is a for profit venture, not open source. The Cloud Security Alliance s Cloud Controls Matrix, which seeks to map security controls from different compliance regulations and industry standards The BITS Shared Assessments Program SIG/AUP. The specification of control objectives is not the goal of this project. The security services catalogue does not contain control objectives, but is a set of measures. They are functional (logical) security building blocks that will be implemented different at different environments. They offer protection and their implementation can be given a maturity rating. Ergo, it is a service delivering protection, not a requirement for protection.

8 Project Charter for Security Services Library Page 7 2. Deliverables, Ownership and Success Criteria The working group will deliver a coherent set of documents that together define the security services catalogue and enable the usage of this catalogue from different framework perspectives Deliverables 1. Security Services Catalogue definition A data dictionary, containing definition of service control, measure, security service, security pattern. Maybe there are already some Glossaries around that can be referred to (e.g. SABSA, O-ISM3, OSA). The OSA taxonomy is displayed below as an example SABSA practitioner guidance An architecture model that defines Security Services Catalogue in a SABSA context. This already exists (as Trusted Architecture concept, see further on in this document) and needs only refinement and publication. Guidance on the usage of the Security Services Catalogue 3. TOGAF practitioner guidance An architecture model that defines the Security Services Catalogue in a TOGAF context. Guidance on the usage of the Security Services Catalogue 4. Security Services Catalogue creation Referral to several source libraries Composition of a security landscape. The landscape helps structuring and finding the security services. In fact, we might use multiple landscapes to characterize and group them, e.g. role in in-depth-defense strategy, multi-tier strategy, etc.

9 Project Charter for Security Services Library Page 8 One example of a landscape is given below, and OSA also offers one at Patterns describing the coherence of security services from a security domain perspective (such as Identity & Access Management). This supports strategy: insight in and selection of the services. Patterns describing the application of security services from an ICT-capability perspective (such as how to secure a web application). This supports implementation of the services. Mapping of security services to common control frameworks, in a way that helps the practitioner make his/her own choice. There s more than one way to do it, but this is how your peers do it. 5. A maintenance process for the Security Services Catalogue 6. A flourishing community of Security Architects It will also establish a basis for future development and continuous improvement, under the auspices of the working group Project ownership and intellectual property (IP) The Security Services Catalogue workgroup is established as a joint initiative of The SABSA Institute and The Open Group Security Forum. The deliverables will be a piece of IP jointly owned between The Open Group and The SABSA Institute, with exception of: SABSA Practitioner guidance: This will be IP of The SABSA Institute.

10 Project Charter for Security Services Library Page 9 TOGAF Practitioner guidance: This will be IP of The Open Group. Security Services Catalogue: This will be IP of The SABSA Institute. There are on-going discussions between The Open Group and The SABSA Institute about the nature of a partnership between the two organisations and the possible linking of the certification of Security Architects under the auspices of the training and certification programmes of both governing bodies Critical Success Factors Adoption of the work as practitioner guidance by the TOGAF TNSP project. The participants of this project include TNSP key players, this assures that the product is in line with TNSP concepts and that acceptance will not be an issue. Buy-in from SABSA security practitioners. Communication is key in here. Social media (LinkedIn groups, twitter) will be used to inform a broad community on the project proceedings and ask for participation. At the SABSA World conferences this project will be on the agenda. Permission and/or cooperation of owners of control libraries that are to be used. To avoid issues with IP, the Security Services Catalogue will only refer to existing work and not copy it in. This way, practitioners know where to get more information but also know that that material is licensed in some way.

11 Project Charter for Security Services Library Page Stakeholders The project board consists of the project chairman, The SABSA Institute chief architect, and The Open Group Security Forum director Project chairman Pascal de Koning Co-chair of TOGAF Next Security Project Cyber security consultant at i-to-i The Open Group The Open Group will provide facilities for information sharing and conference calls. We can use their Webex facilities to host the meetings. There is also the possibility to use the Security Forum LinkedIn site and a Twitter account. Moreover, the expectation is that there are numerous members in the Security Forum and Architecture Forum who will have keen interest in this project once initiated. The Open Group Security Forum Director: Jim Hietala j.hietala@opengroup.org 3.3. The SABSA Institute The SABSA Institute will commit to this project and stimulate SABSA practitioners to contribute to and make use of the deliverables. The SABSA group on LinkedIn will also be used for this purpose. Soon as The SABSA Institute becomes fully operational, its web site and social media integration will also be available, and it will be a partner in the governance of the working group. Chief Architect: John Sherwood john.sherwood@sabsa.org 3.4. The Open Security Architecture The Open Security Architecture community, represented by Tobias Christen, is willing to pass on experience in security architecture Working group members Working group members are qualified security architects, such as SABSA practitioners.

12 Project Charter for Security Services Library Page 11 What is the reward for working group members? useful knowledge that can be applied in your own work environment challenging questions network opportunities an increased sense of humor the listing of your name as contributor/reviewer in publications the opportunity to work with an international community of security experts a good feeling about having been part of a project that made a difference in the way the world addresses security Communication plan The communication plan is to ensure that the project wins and maintains support across the boards and the community of security architecture practitioners. The following communications are foreseen: Project proceedings o Quarterly the working group will report proceedings to the TOG Security Forum, the TOGAF Next Security Project (TNSP) steering group and The SABSA Institute Board. o At an incidental basis, the working group will present its proceedings and results at the TOG conference and at the SABSA World conference at COSAC. This way, people that are interested are able to join the discussion and contribute to the project. o Quarterly, the project proceedings are briefly communicated through the SABSA and TOG LinkedIn groups. Operational meetings: o On a regular basis (e.g. monthly) there will be a conference call with the project members Workshops and presentations o Every working group member will receive invitation to SABSA World conference at COSAC. These must be seen as important information exchange sessions. Participants will pay the regular conference fee. o Every working group member will receive invitation to The Open Group conference, including an outline of the agenda regarding the working group activities. Participants will pay the regular conference fee. Deliverables: o Publishing the deliverables on the official Open Group and SABSA websites. If applicable, this is only on member-areas (see section about Intellectual Property). o sending publication notifications to SABSA and TOG list members and the LinkedIn groups o Writing a blog on TOG and TSI websites. o Offering the TOGAF practitioner guidance to TOGAF Next, so it can be included in Next Version of TOGAF.Vision For security architects, the security services catalogue is a register that supports filling in the logical (aka functional) layer of the architecture with security controls. Unlike existing control frameworks that contain requirements, the security services catalogue describes security building blocks that actually deliver protection. This architecture approach enables smooth integration of information security in the enterprise architecture.

13 Project Charter for Security Services Library Page Project Scope Scope in SABSA perspective: The scope is limited to the logical layer of the SABSA architecture framework. See Trusted Architecture concept below. The scope of this project is the Logical Services Catalogue. `

14 Project Charter for Security Services Library Page 13 Scope in TOGAF perspective High-level conceptual building blocks H. Architect ure A. Architect ure B. Business Architect G. Implement ation Requirem ents Managem ent C. Informati on Architecture Building Blocks F. Migrati on E. Opportuni ties D. Technolo gy Solution Building Blocks In TOGAF perspective, the focus is on Architecture Building Blocks. The TOGAF Architecture Content Framework classifies building blocks into two types: Architecture building blocks Solution building blocks. Architecture Building Blocks (ABBs) are defined in phases A, B, C, and D of the Architecture Development Method. ABBs can be viewed in the Architecture Continuum. They can range from generic Foundation Architecture ABB s to Organization Specific ABB s. They help to guide the formation of Solution Building Blocks (SBBs). Architecture Building Blocks: Capture architecture requirements; e.g., business, data, application, and technology requirements Direct and guide the development of SBBs ABB specifications include the following as a minimum: Functional and nonfunctional requirements including security capability and manageability Interfaces needed Interoperability relationship with other building blocks Dependencies with relation to other building blocks Mapping to business/organizational principles, policies, constraints and requirements Note: these TOGAF definitions are not rock-solid and likely to change in the near future.

15 Project Charter for Security Services Library Page 14 Scope in Open Security Architecture perspective The Open Security Architecture delivers a control database as well as a visualization method for patterns. A pattern describes how security should be implemented in a given ICT environment. The pattern approach is a useful extension to the SABSA logical layer and is part of this project. Patterns can be used to: Better understand the components within a security building block Better communicate how to apply security to a given environment Out of Scope: - The physical design, implementation and operation of the services.

16 Project Charter for Security Services Library Page Assumptions and Dependencies The project elaborates on deliverables from the TNSP project at The Open Group. It is assumed that the anchor points as described in TOGAF Next Part One are available. This project delivers Part 2 guidance, so to some degree it has to align to the overall TOGAF timeline. 6. Risks There is a lot of overlap and confusion in the terms control and service. This is why a dictionary needs proper attention. Often, volunteers are only available or committed for a short period of time. Therefore, it is best to divide the work in small chunks that can be accomplished in short time. 7. Resources There is no direct financial funding for this project. 8. Approval of the deliverables The Open Group approval procedures for White Papers is clearly defined, and will be managed by the nominated Open Group staff member from either of the participating Architecture Forum or Security Forum. One white paper will be presented as practitioner guidance as part of the TNSP-project. The procedure to obtain approval from the SABSA Institute will be handed over by John Sherwood. He s also responsible for this procedure being executed. This applies to the SABSA guidance. The content of the Security Services Catalogue will have a true democratic basis. The community guides the individual choices, there is no final editor. This governance process will be set up by The SABSA Institute.

17 Project Charter for Security Services Library Page Planning Q o Finalize project charter Q o Set direction at SABSA World Conference, Naas, Republic of Ireland (September 2014) Kick-off. Presentation TNSP-work, anchor points and positioning of this work as practitioner guidance Presentation Security Services Catalogue concept and Trusted Architecture model. Presentation Open Security Architecture work. Presentation O-ISM3 model Workshop: Decide on a format for the Security Services Catalog o A format for the catalog will be proposed, discussed and improved where necessary. Select suitable existing control sets, based on experience of attendees o We will exchange suggestions for control sets that might be useful. Create a first version of the Security Services Catalog. o We ll use an approach that allows everyone to contribute. All contributions are welcome. There will be structuring of the material based on group wisdom, but not on consensus. This will result in a practical take-away for every participant. Q o Write Security Services Catalogue definition o Create or adopt Security Services Catalogue landscape o Present at The Open Group conference, London, October 20-21, 2014 Q o Write SABSA practitioner guidance Q o Write TOGAF practitioner guidance o Present at The Open Group conference, Madrid, Spain, April 20-23, 2015 Q o Create and publish first version of Security Services Catalogue Q o Set up maintenance process for the Security Services Catalogue

SABSA. Title / definition. Type. Owner. Brief history and description SHERWOOD APPLIED BUSINESS SECURITY ARCHITECTURE (SABSA )

SABSA. Title / definition. Type. Owner. Brief history and description SHERWOOD APPLIED BUSINESS SECURITY ARCHITECTURE (SABSA ) SABSA Title / definition SHERWOOD APPLIED BUSINESS SECURITY ARCHITECTURE (SABSA ) SABSA is a framework for developing risk-driven enterprise information security and information assurance architectures

More information

Module B1 An Introduction to TOGAF 9.1 for those familiar with TOGAF 8

Module B1 An Introduction to TOGAF 9.1 for those familiar with TOGAF 8 Informs the capability Ensures Realization of Business Vision Business needs feed into method Refines Understanding Informs the Business of the current state Sets targets, KPIs, budgets for architecture

More information

IT123: SABSA Foundation Training

IT123: SABSA Foundation Training IT123: SABSA Foundation Training IT123 Rev.002 CMCT COURSE OUTLINE Page 1 of 8 Training Description: SABSA is the world s leading open security architecture framework and methodology. SABSA is a top-tobottom

More information

TOGAF Transforming Business

TOGAF Transforming Business TOGAF 9.2 - Transforming Business The Open Group EA Forum ArchiMate, DirecNet, Making Standards Work, OpenPegasus, Platform 3.0, The Open Group, TOGAF, UNIX, and The Open Brand X logo are registered trademarks

More information

An Overview of TOGAF Version 9.1

An Overview of TOGAF Version 9.1 An Overview of TOGAF Version 9.1 Robert Weisman MSc, PEng, PMP, CD CEO / Chief Enterprise Architect robert.weisman@buildthevision.ca 44 Montgomery Street 1168 Ste Therese Ottawa, Ontario Canada K1C2A6

More information

The Great TOGAF Scavenger Hunt. Enterprise Architecture Using TOGAF 9 Course Preparation Guide

The Great TOGAF Scavenger Hunt. Enterprise Architecture Using TOGAF 9 Course Preparation Guide Enterprise Architecture Using TOGAF 9 Course Preparation Guide 2011 Metaplexity Associates LLC All Rights Reserved Version 2.0 January 2, 2011 The Open Group Certification Mark logo and TOGAF are trademarks,

More information

Business Architecture Implementation Workshop

Business Architecture Implementation Workshop Delivering a Business Architecture Transformation Project using the Business Architecture Guild BIZBOK Hands-on Workshop In this turbulent and competitive global economy, and the rapid pace of change in

More information

COBIT 5 Implementation

COBIT 5 Implementation COBIT 5 Implementation Fifalde Consulting Inc. +1-613-699-3005 2017 Fifalde Consulting Inc. COBIT is a registered Trade Mark of ISACA and the IT Governance Institute. 2 1. Course Description: Get a practical

More information

Introducing Enterprise Architecture. into the Enterprise

Introducing Enterprise Architecture. into the Enterprise Introducing Enterprise Architecture into the Enterprise Washington - 21st October 2003 Chris Greenslade Chris@Architecting-the-Enterprise.com Introducing Enterprise Architecture 1 of 28 TA P16 1 Approach

More information

for TOGAF Practitioners Hands-on training to deliver an Architecture Project using the TOGAF Architecture Development Method

for TOGAF Practitioners Hands-on training to deliver an Architecture Project using the TOGAF Architecture Development Method Course Syllabus for 3 days Expert led Enterprise Architect hands-on training "An Architect, in the subtlest application of the word, describes one able to engage and arrange all elements of an environment

More information

Reference Framework for the FERMA Certification Programme

Reference Framework for the FERMA Certification Programme Brussels, 23/07/2015 Dear Sir/Madam, Subject: Invitation to Tender Reference Framework for the FERMA Certification Programme Background The Federation of European Risk Management Associations (FERMA) brings

More information

Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see

Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see TOGAF 9 Certified Study Guide 4th Edition The Open Group Publications available from Van Haren Publishing The TOGAF Series: The TOGAF Standard, Version 9.2 The TOGAF Standard Version 9.2 A Pocket Guide

More information

OG0-091 Q&As TOGAF 9 Part 1

OG0-091 Q&As TOGAF 9 Part 1 CertBus.com OG0-091 Q&As TOGAF 9 Part 1 Pass The Open Group OG0-091 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back Assurance

More information

Security and Architecture SUZANNE GRAHAM

Security and Architecture SUZANNE GRAHAM Security and Architecture SUZANNE GRAHAM Why What How When Why Information Security Information Assurance has been more involved with assessing the overall risk of an organisation's technology and working

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

Enterprise Architecture Modelling and Analysis with ArchiMate. Enterprise Architecture Practitioners Conference London, April 30, 2009

Enterprise Architecture Modelling and Analysis with ArchiMate. Enterprise Architecture Practitioners Conference London, April 30, 2009 Enterprise Architecture Modelling and Analysis with Enterprise Architecture Practitioners Conference London, April 30, 2009 adds value to TOGAF TM By providing one language with view mechanisms! Program

More information

Data Governance Quick Start

Data Governance Quick Start Service Offering Data Governance Quick Start Congratulations! You ve been named the Data Governance Leader Now What? Benefits Accelerate the initiation of your Data Governance program with an industry

More information

Vendor: The Open Group. Exam Code: OG Exam Name: TOGAF 9 Part 1. Version: Demo

Vendor: The Open Group. Exam Code: OG Exam Name: TOGAF 9 Part 1. Version: Demo Vendor: The Open Group Exam Code: OG0-091 Exam Name: TOGAF 9 Part 1 Version: Demo QUESTION 1 According to TOGAF, Which of the following are the architecture domains that are commonly accepted subsets of

More information

Partnership Information

Partnership Information SECOND INTERNATIONAL CONFERENCE ON ISO 31000 STANDARD USING ISO 31000 RISK MANAGEMENT STANDARD TO ACHIEVE OPTIMAL PERFORMANCE Conference Date: 28-29 May 2013 Master Classes Date: 30-31 May 2013 Location:

More information

Sharing Best Security Practices with your Peers - on an International Level

Sharing Best Security Practices with your Peers - on an International Level Public Sharing Best Security Practices with your Peers - on an International Level Urpo Kaila, Head of Security, csc.fi EUDAT Security Officer WISE Community SC member GÉANT SIG-ISMS

More information

CCSK Research Sponsorship

CCSK Research Sponsorship CCSK Research Sponsorship Overview The industry s first user certification program for secure cloud computing, the Certificate of Cloud Security Knowledge (CCSK) is designed to ensure that a broad range

More information

Digital Service Management (DSM)

Digital Service Management (DSM) Digital Service Management (DSM) A Proactive, Collaborative and Balanced Approach for Managing, Improving and Securing an Enterprise Digital Service Portfolio itsm003 v.3.0 Agenda and Objectives What is

More information

Certification Standing Committee (CSC) Charter. Appendix A Certification Standing Committee (CSC) Charter

Certification Standing Committee (CSC) Charter. Appendix A Certification Standing Committee (CSC) Charter Appendix A A1 Introduction A1.1 CSC Vision and Mission and Objectives Alignment with Boundaryless Information Flow: Our vision is a foundation of a scalable high integrity TOGAF certification programs

More information

Module 3. Overview of TOGAF 9.1 Architecture Development Method (ADM)

Module 3. Overview of TOGAF 9.1 Architecture Development Method (ADM) Module 3 Overview of TOGAF 9.1 Architecture Development Method (ADM) TOGAF 9.1 Structure The Architecture Development Method (ADM) Needs of the business shape non-architectural aspects of business operation

More information

Security as a Service (Implementation Guides) Research Sponsorship

Security as a Service (Implementation Guides) Research Sponsorship Security as a Service (Implementation Guides) Research Sponsorship Overview The purpose of the Security as a Service (SecaaS) Working Group will be to identify consensus definitions of what Security as

More information

ISAO SO Product Outline

ISAO SO Product Outline Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing

More information

Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda

Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda 2016 PARTNERSHIP FORUM Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda 31 March 2016 Dialogue Two (3:00 p.m. 5:45 p.m.) ECOSOC CHAMBER,

More information

Module 1 Management Overview

Module 1 Management Overview Module 1 Management Overview V9.1 Edition Copyright 2009-2011 Slide 1 of 67 All rights reserved Published by The Open Group, 2011 Management Overview Slide 2 of 67 TOGAF is a registered trademark of The

More information

Building UAE s cyber security resilience through effective use of technology, processes and the local people.

Building UAE s cyber security resilience through effective use of technology, processes and the local people. WHITEPAPER Security Requirement WE HAVE THE IN-HOUSE DEPTH AND BREATH OF INFORMATION AND CYBER SECURIT About Us CyberGate Defense (CGD) is a solution provider for the full spectrum of Cyber Security Defenses

More information

to the Enterprise Brussels - Tuesday 20th April 2004 Chris Greenslade Introducing Enterprise Architecture Introducing Enterprise Architecture

to the Enterprise Brussels - Tuesday 20th April 2004 Chris Greenslade Introducing Enterprise Architecture Introducing Enterprise Architecture Introducing Enterprise Architecture to the Enterprise Brussels - Tuesday 20th April 2004 Chris Greenslade Chris@.com 1 of 28 Approach Every situation is different The organization Its history and its current

More information

SOC for cybersecurity

SOC for cybersecurity April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory

More information

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment

More information

MT. SAN ANTONIO COLLEGE 2018 Educational and Facilities Master Plan HMC ARCHITECTS // COLLABORATIVE BRAIN TRUST

MT. SAN ANTONIO COLLEGE 2018 Educational and Facilities Master Plan HMC ARCHITECTS // COLLABORATIVE BRAIN TRUST MT. SAN ANTONIO COLLEGE 2018 Educational and Facilities Master Plan HMC ARCHITECTS // COLLABORATIVE BRAIN TRUST Agenda / INTRODUCTIONS / PURPOSES OF EFMP / MASTER PLAN STEERING TASK FORCE / PROCESS AND

More information

Protecting Sensitive Data in the Cloud. Presented by: Eric Wolff Thales e-security

Protecting Sensitive Data in the Cloud. Presented by: Eric Wolff Thales e-security Protecting Sensitive Data in the Cloud Presented by: Eric Wolff Thales e-security Topics IT Perspectives on Cloud Security Tools for Security in the Cloud XaaS Encryption/Key Management Strategies Tweet

More information

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate. Position Description Engagement Manager Business unit: Position purpose: Direct reports: Directorate overview: Business Unit Overview Remuneration indicator: Outreach & Engagement Information Assurance

More information

Better together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com

Better together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com Better together KPMG LLP s GRC Advisory Services for IBM OpenPages implementations kpmg.com KPMG A leader in GRC services KPMG LLP (KPMG) is the U.S. member firm of the KPMG global network of professional

More information

Digital Service Management (DSM)

Digital Service Management (DSM) Digital Service Management (DSM) A Proactive, Collaborative and Balanced Approach for Securing, Managing and Improving the Online Services that Drive the Digital Enterprise itsm003 v.3.0 Agenda and Objectives

More information

Corporate Membership

Corporate Membership Corporate Membership Introduction Welcome to the Cloud Security Alliance. The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within

More information

TOGAF days. Course description

TOGAF days. Course description TOGAF 9.1 5 days Course description TOGAF stands for The Open Group Architecture Framework It is the industry-standard methodology and framework for performing EA work and is used by thousands of Enterprise

More information

IAF Strategic Plan to Identify and Achieve Expectations

IAF Strategic Plan to Identify and Achieve Expectations Saturday,,, IAF Day IAF Strategic Plan to Identify and Achieve Expectations of the users of certified organisations like organisations, governments, end users, etc. Presentation by man Slide 1 Saturday,,,

More information

ISO/IEC JTC 1 N 13145

ISO/IEC JTC 1 N 13145 ISO/IEC JTC 1 N 13145 ISO/IEC JTC 1 Information technology Secretariat: ANSI (United States) Document type: Title: Status: Business Plan BUSINESS PLAN FOR ISO/IEC JTC 1/SC 40, IT SERVICE MANAGEMENT AND

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Summary of Consultation with Key Stakeholders

Summary of Consultation with Key Stakeholders Summary of Consultation with Key Stakeholders Technology and Communications Sector Electronic Manufacturing Services & Original Design Manufacturing Software & IT Services Hardware Semiconductors Telecommunication

More information

POSITION DESCRIPTION

POSITION DESCRIPTION POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose

More information

Understanding the Open Source Development Model. » The Linux Foundation. November 2011

Understanding the Open Source Development Model. » The Linux Foundation. November 2011 » The Linux Foundation Understanding the Open Source Development Model November 2011 By Ibrahim Haddad (PhD) and Brian Warner, The Linux Foundation A White Paper By The Linux Foundation This paper presents

More information

Zachman Classification, Implementation & Methodology

Zachman Classification, Implementation & Methodology Zachman Classification, Implementation & Methodology Stan Locke B.Com, M.B.A. Zachman Framework Associates StanL@offline.com www.zachmaninternational.com As Managing Director of Metadata Systems Software

More information

HPE Network Transformation Experience Workshop Service

HPE Network Transformation Experience Workshop Service Data sheet HPE Network Transformation Experience Workshop Service HPE Network and Mobility Consulting Led by experienced HPE technology consultants, HPE Network Transformation Experience Workshop Service

More information

WHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework.

WHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework. Learning Objectives and Course Descriptions: FOUNDATION IN IT SERVICE MANAGEMENT This official ITIL Foundation certification course provides you with a general overview of the IT Service Management Lifecycle

More information

European Cyber Security Certification: ECSO Meta-Scheme Approach

European Cyber Security Certification: ECSO Meta-Scheme Approach European Cyber Security Certification: ECSO Meta-Scheme Approach Sergio Lomban ECSO WG1 Chairman Conference on Cybersecurity Act Establishing the link between Standardisation and Certification 13 February

More information

Introduction in the Dragon1 open EA Method

Introduction in the Dragon1 open EA Method Introduction in the Dragon1 open EA Method Dragon1 starts the third wave in Enterprise Architecture: Entering the era of Visual EA Management Overview Revision date: 28 November 2013 Management Overview

More information

Progress Report National Information Assurance Partnership

Progress Report National Information Assurance Partnership Progress Report 2012-2015 National Information Assurance Partnership Executive Summary The National Information Assurance Partnership (NIAP) has made significant progress in three primary mission areas:

More information

ehealth Network ehealth Network Governance model for the ehealth Digital Service Infrastructure during the CEF funding

ehealth Network ehealth Network Governance model for the ehealth Digital Service Infrastructure during the CEF funding ehealth Network Governance model for the ehealth Digital Service Infrastructure during the CEF funding 1 The ehealth Network is a voluntary network, set up under article 14 of Directive 2011/24/EU. It

More information

Security Management Models And Practices Feb 5, 2008

Security Management Models And Practices Feb 5, 2008 TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related

More information

Proposition to participate in the International non-for-profit Industry Association: Energy Efficient Buildings

Proposition to participate in the International non-for-profit Industry Association: Energy Efficient Buildings Proposition to participate in the International non-for-profit Industry Association: Energy Efficient Buildings Working towards the launch of an EU Joint Technology Initiative on Energy Efficient Buildings

More information

The Open Group Professional Certification Program. Accreditation Requirements

The Open Group Professional Certification Program. Accreditation Requirements The Open Group Professional Certification Program Accreditation Requirements Version 1.0 October 2018 Copyright 2018, The Open Group All rights reserved. This publication may be reproduced, stored in a

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Software asset management Part 1: Processes and tiered assessment of conformance

ISO/IEC INTERNATIONAL STANDARD. Information technology Software asset management Part 1: Processes and tiered assessment of conformance INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 19770-1 Second edition 2012-06-15 Information technology Software asset management Part 1: Processes and tiered

More information

Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment

Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment SWG G 3 2016 v0.2 ISAO Standards Organization Standards Working Group 3: Information Sharing Kent Landfield, Chair

More information

ITIL Intermediate Service Transition (ST) Certification Training - Brochure

ITIL Intermediate Service Transition (ST) Certification Training - Brochure ITIL Intermediate Service Transition (ST) Certification Training - Brochure Add Value to your Enterprise as a Service Transition Specialist Course Name : ITIL ST Version : INVL_ITILST_BR_02_31_1.2 Course

More information

Micro Focus Partner Program. For Resellers

Micro Focus Partner Program. For Resellers Micro Focus Partner Program For Resellers Contents Micro Focus Today About Micro Focus Our solutions for digital transformation Products and Solutions Program Membership Tiers Become a Portfolio Expert

More information

Contents. viii. List of figures. List of tables. OGC s foreword. 3 The ITIL Service Management Lifecycle core of practice 17

Contents. viii. List of figures. List of tables. OGC s foreword. 3 The ITIL Service Management Lifecycle core of practice 17 iii Contents List of figures List of tables OGC s foreword Chief Architect s foreword Preface vi viii ix x xi 2.7 ITIL conformance or compliance practice adaptation 13 2.8 Getting started Service Lifecycle

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

TDWI Data Governance Fundamentals: Managing Data as an Asset

TDWI Data Governance Fundamentals: Managing Data as an Asset TDWI Data Governance Fundamentals: Managing Data as an Asset Training Details Training Time : 1 Day Capacity : 10 Prerequisites : There are no prerequisites for this course. About Training About Training

More information

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA The Experience of Generali Group in Implementing COBIT 5 Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA Generali Group at a glance Let me introduce myself Marco Salvato CISA, CISM, CGEIT,

More information

The United Republic of Tanzania. Domestication of Sustainable Development Goals. Progress Report. March, 2017

The United Republic of Tanzania. Domestication of Sustainable Development Goals. Progress Report. March, 2017 The United Republic of Tanzania Domestication of Sustainable Development Goals Progress Report March, 2017 Prepared by the National Bureau of Statistics Table of Contents 1. Background... 1 2. Progress

More information

Workshop IT Star IT Security Professional Positioning and Monitoring: e-cfplus support

Workshop IT Star IT Security Professional Positioning and Monitoring: e-cfplus support Workshop IT Star 2016 IT Security Professional Positioning and Monitoring: e-cfplus support Roberto Bellini AICA-Milan October, 28 th 2016 agenda 1. e-cf standard and the enriched e-cfplus System 2. IT

More information

CHARTER OUR MISSION OUR OBJECTIVES OUR GUIDING PRINCIPLES

CHARTER OUR MISSION OUR OBJECTIVES OUR GUIDING PRINCIPLES OUR MISSION Promote the highest level of safety for the U.S. offshore oil and natural gas industry through effective leadership, communication, teamwork, utilization of disciplined management systems and

More information

ITIL Service Lifecycle Strategy

ITIL Service Lifecycle Strategy ITIL Service Lifecycle Strategy Course Details Course Code: Duration: Notes: ITILSL-Str 5 days This course syllabus should be used to determine whether the course is appropriate for the students, based

More information

Implementation PREVIEW VERSION

Implementation PREVIEW VERSION Implementation These following pages provide a preview of the information contained in COBIT 5 Implementation. The publication provides a good-practice approach for implementation governance of enterprise

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

Training & Certification Guide

Training & Certification Guide Training & Certification Guide Pragmatic EA Ltd December 2010 Version 2.0.5 Part of the Pragmatic Family Cutting Architecture To the Bone Contents INTRODUCTION 3 What is PEAF 3 Aim of this document 3 Non-Commercial

More information

Stakeholder Participation Guidance

Stakeholder Participation Guidance Climate, Community & Biodiversity Alliance, Verra Stakeholder Participation Guidance Guidance to support stakeholder participation in design, implementation and assessment of policies and actions May 2018

More information

Manchester Metropolitan University Information Security Strategy

Manchester Metropolitan University Information Security Strategy Manchester Metropolitan University Information Security Strategy 2017-2019 Document Information Document owner Tom Stoddart, Information Security Manager Version: 1.0 Release Date: 01/02/2017 Change History

More information

Module 7 TOGAF Content Metamodel

Module 7 TOGAF Content Metamodel Module 7 TOGAF Content Metamodel V9 Edition Copyright January 2009 All Slide rights reserved 1 of 45 Published by The Open Group, January 2009 TOGAF Content Metamodel TOGAF is a trademark of The Open Group

More information

The Scottish Credit and Qualifications Framework and Chartered Banker Institute

The Scottish Credit and Qualifications Framework and Chartered Banker Institute The Scottish Credit and Qualifications Framework and Chartered Banker Institute Working together for Life Long Learning: SCQF and Chartered Banker Institute Lydia George, Development Officer, SCQFP Colin

More information

EXIN BCS SIAM TM Foundation Certification Training - Brochure

EXIN BCS SIAM TM Foundation Certification Training - Brochure EXIN BCS SIAM TM Foundation Certification Training - Brochure Understand How to Manage Multiple Service Providers to Achieve Common Goal Course Name : SIAM TM Foundation Training Certification Version

More information

Dell helps you simplify IT

Dell helps you simplify IT Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending

More information

The Global Context of Sustainable Development Data

The Global Context of Sustainable Development Data The Global Context of Sustainable Development Data Linda Hooper, UN Statistics Division UNDA10 - Workshop for ESCWA Sound Institutional, environment, cooperation, dialogue and partnerships for the production

More information

The Global Research Council

The Global Research Council The Global Research Council Preamble The worldwide growth of support for research has presented an opportunity for countries large and small to work in concert across national borders. Cooperation and

More information

The South African EA Forum

The South African EA Forum The South African EA Forum Follow the EA Forum on Twitter Our upcoming events Twitter: @EAforumSA #ogza http://opengroup.co.za/ea-forum Leading the development of open, vendor-neutral IT standards and

More information

Trend Micro Professional Services Partner Program

Trend Micro Professional Services Partner Program Trend Micro Professional Services Partner Program PROGRAM OVERVIEW The Trend Micro Partner Program provides professional services companies with the certification, training, technical support and access

More information

Metadata Framework for Resource Discovery

Metadata Framework for Resource Discovery Submitted by: Metadata Strategy Catalytic Initiative 2006-05-01 Page 1 Section 1 Metadata Framework for Resource Discovery Overview We must find new ways to organize and describe our extraordinary information

More information

IIA EXAM - IIA-CGAP. Certified Government Auditing Professional. Buy Full Product.

IIA EXAM - IIA-CGAP. Certified Government Auditing Professional. Buy Full Product. IIA EXAM - IIA-CGAP Certified Government Auditing Professional Buy Full Product http://www.examskey.com/iia-cgap.html Examskey IIA IIA-CGAP exam demo product is here for you to test the quality of the

More information

ITIL Intermediate: Operational Support and Analysis Lesson Plan

ITIL Intermediate: Operational Support and Analysis Lesson Plan ITIL Intermediate: Operational Support and Analysis Lesson Plan Delivery: e-learning Mock Exam: Included in Course (x2) Certificate: Examination (included) Duration: 30 hours and 30 minutes, self-paced

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

FileMaker Business Alliance. Program Guide

FileMaker Business Alliance. Program Guide FileMaker Business Alliance Program Guide FileMaker Business Alliance Program Guide Get Started... 3 FBA Business Types and Requirements... 4 Partner Levels... 7 FBA Six Pillars of Excellence... 10 Contact

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

Data Security Standards

Data Security Standards Data Security Standards Overall guide The bigger picture of where the standards fit in 2018 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

ITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure

ITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure ITIL Intermediate Service Design (SD) Certification Boot Camp - Brochure Get a Management-level overview of Service Design to advance in your Career Course Name : ITIL SD Version : INVL_ITILSD_BR_02_033_1.2

More information

Business Model for Global Platform for Big Data for Official Statistics in support of the 2030 Agenda for Sustainable Development

Business Model for Global Platform for Big Data for Official Statistics in support of the 2030 Agenda for Sustainable Development Business Model for Global Platform for Big Data for Official Statistics in support of the 2030 Agenda for Sustainable Development Introduction This note sets out a business model for a Global Platform

More information

ISACA MADRID DECEMBER Robert E Stroud CEGIT CRISC International President December 2014

ISACA MADRID DECEMBER Robert E Stroud CEGIT CRISC International President December 2014 ISACA MADRID DECEMBER 2014 Robert E Stroud CEGIT CRISC International President December 2014 CHANGING DYNAMICS OF BUSINESS Source: http://www.securedgenetworks.com/secure-edge-networks-blog/bid/84023/10-ways-mobile-device-management-can-help-your-school

More information

The Need for a Terminology Bridge. May 2009

The Need for a Terminology Bridge. May 2009 May 2009 Principal Author: Michael Peterson Supporting Authors: Bob Rogers Chief Strategy Advocate for the SNIA s Data Management Forum, CEO, Strategic Research Corporation and TechNexxus Chair of the

More information

Cloud Security Alliance Quantum-safe Security Working Group

Cloud Security Alliance Quantum-safe Security Working Group Don Hayford 3rd ETSI/IQC Workshop on Quantum-Safe Cryptography Seoul, Korea October 5, 2015 Session 3: Joint Global Efforts Cloud Security Alliance Quantum-safe Security Working Group 1 Cloud Security

More information

AT FIRST VIEW C U R R I C U L U M V I T A E. Diplom-Betriebswirt (FH) Peter Konrad. Executive Partner Senior Consultant

AT FIRST VIEW C U R R I C U L U M V I T A E. Diplom-Betriebswirt (FH) Peter Konrad. Executive Partner Senior Consultant Our Contact Details IT-SCAN GMBH c/o: DOCK3 Hafenstrasse 25-27 68159 Mannheim E: info@it-scan.de W: www.it-scan.de Nationalität Berufserfahrung C U R R I C U L U M V I T A E Diplom-Betriebswirt (FH) Peter

More information

falanx Cyber ISO 27001: How and why your organisation should get certified

falanx Cyber ISO 27001: How and why your organisation should get certified falanx Cyber ISO 27001: How and why your organisation should get certified Contents What is ISO 27001? 3 What does it cover? 3 Why should your organisation get certified? 4 Cost-effective security management

More information

Request for Proposal To develop and teach a Training Course on RTCA Airworthiness Security Documents (DO-326A, DO-355, and DO-356A)

Request for Proposal To develop and teach a Training Course on RTCA Airworthiness Security Documents (DO-326A, DO-355, and DO-356A) Washington, DC August 28, 2018 Request for Proposal To develop and teach a Training Course on RTCA Airworthiness Security Documents (DO-326A, DO-355, and DO-356A) 1. RTCA Background RTCA is a private,

More information

TOGAF 9 Foundation v9.1 Level 1 Level 1: An Introduction to TOGAF

TOGAF 9 Foundation v9.1 Level 1 Level 1: An Introduction to TOGAF TOGAF 9 Foundation v9.1 Level 1 Level 1: An Introduction to TOGAF full course details This is an accredited online training course, designed by TOGAF experts to prepare you with everything you need to

More information

ISO/ IEC (ITSM) Certification Roadmap

ISO/ IEC (ITSM) Certification Roadmap ISO/ IEC 20000 (ITSM) Certification Roadmap Rasheed Adegoke June 2013 Outline About First Bank Motivations Definitions ITIL, ISO/IEC 20000 & DIFFERENCES ISO/ IEC 20000 Certification Roadmap First Bank

More information

CDISC Operating Procedure COP-001 Standards Development

CDISC Operating Procedure COP-001 Standards Development CDISC Operating Procedure COP-001 Revision History Date Revision Description Author 4 February 2002 1.0 Revisions/approval Shirley Williams/ Board of Directors 1 January 2006 1.1 Revisions required to

More information

WSIS Forum Open Consultation Process

WSIS Forum Open Consultation Process WSIS Forum 2016. Open Consultation Process First Physical Meeting of the Open Consultation Process of the WSIS Forum 2016 20 January 2016 ITU Headquarters, Switzerland Open Consultation Process One Two

More information