Security Training Seminars An integral part of The Open Group Security Programme

Size: px
Start display at page:

Download "Security Training Seminars An integral part of The Open Group Security Programme"

Transcription

1 Security Training Seminars An integral part of The Open Group Security Programme Dean Adams Director, Security & Electronic Commerce

2 Agenda Check! M Brief Overview of Security Program Key Projects Introduction to Security Training Seminars 2

3 Scope of Program For organisations implementing innovation in Security & Electronic Commerce, the security program aims to: reduce business risks reduce business costs improve competitiveness Support for a secure infrastructure at 3 levels: Internet Enterprise-wide network (Intranet) Platforms 3

4 The IT DialTone Management Services Transaction Processing Application Services Service Qualities Security Manageability Interoperability International Operation Scalability Portability Core Information Exchange Location Services Security Services 4

5 Scope of Program Business Business Requirements Requirements identification, identification, definition definition & prioritisation prioritisation Product Product Developments Developments & Industry Industry Trends Trends Generating, Generating, Participating-in Participating-in & Monitoring Monitoring Technical Technical Developments Developments Standards, Standards, Collaborative Collaborative Technology Technology & Pilot Pilot Trials Trials Defining Defining Branding Branding Programs Programs supported supported by by testing testing Support Support in in the the Marketplace Marketplace Launch, Launch, communications, communications, integration, integration, training, training, procurement procurement 5

6 Scope of Program Aim to provide a full service range to our partners Aim to provide a full service range to our partners major system vendors, application & middleware providers, end-user organizations mutually supportive activities, no throw over the wall attitude Standards Development Partnerships Consultancy Training & Education Pilot Pilot Trials Trials Testing Brand Brand (certification) Peer Peer Networking Market Market Requirements 6

7 Conformance & The Brand Enforced by the X/Open Trade Mark Licence Agreement It conforms to the Standard It will continue to conform Any problems, fixed by the supplier within set time Guaranteed by the supplier %UDQGFDQEHWDNHQDZD\ 7

8 Agenda Check! Brief Overview of Security Program M Key Projects Introduction to Security Training Seminars 8

9 Distributed Security Framework - (an application programmer s view) Users of Security Services Applications System Services (e.g. network, file-system, database, etc.) Common Security Services Distributed Authentication Common Security Services (provided through Generic interfaces) Distributed Audit Cryptographic Services Key & Cert Management Specific Mechanism Modules Eg. Kerberos SESAME CryptoKnight ETC. As Appropriate 9

10 Common Architecture for PKI Defines, characterises, integrates, positions, components of a PKI Based on use of X509.v3 (due to overwhelming recommendation from customer community) but does not preclude use of other approaches (e.g. SDSI) Provides for, but does not mandate Key Recovery Drafts available publicly via web server References and integrates specifications from other sources e.g. IETF, PC/SC, OpenCard 10

11 Business decisions and Regulatory Framework establish trust relationships Allow for hierarchical structure, direct relationships, and web-of-trust relationships as deemed appropriate for individual circumstances. Do not Dictate through technology 11

12 Business Decisions and Regulatory Framework establish separation/combination of Role... Registration Authorities can be local to user (e.g. lawyers office, local chamber of commerce. Can offer services from multiple competing services (act as broker), customer choice based on business and regulatory considerations. 12

13 CDSA A search on the Internet reveals Canadian Dam Safety Association Canadian Deaf Sports Association Comprehensive Digestive Stool Analysis But since this is a security presentation Common Data Security Architecture 13

14 Common Data Security Architecture (CDSA) For applications and services in a PKI environment Coherent architecture Comprehensive set of services Originally submitted by Intel Revision and addition from PKI Task Group Intel, IBM, Netscape, Entrust, Trusted Information Systems prepared revised specifications Fast-Track adoption Real commitment by suppliers to build into products 14

15 CDSA Fast Track Formal review & comment period completed Published final standard - on web! Test suites in development Brand (certification scheme) definition and supporting processes being developed development partnerships in the pipeline 15

16 Common Data Security Architecture - CDSA Applications in C Applications in C++ Applications in Java System Security Services Layered Services Tools Method Wrapper Middleware Language Interface Adapter CSSM Security API EM-API Common Security Services Manager CSP Manager SPI Integrity Services TP Module Manager TPI CL Module Manager CLI Security Contexts DL Module Manager DLI Elective Module Mgr EMI Security Add-in Modules Cryptographic Service Provider Trust Model Library Certificate Library Data Storage Library New Category of Service 16 Data store

17 Single Sign-On To support distributed heterogeneous enterprise-wide network Completed so far: Pluggable Authentication Modules (PAM) publicly available on web server In the pipe Account Management built on LDAP based schema Detailed proposals for brand, test 17

18 Agenda Check! Brief Overview of Security Program Key Projects M Introduction to Security Training Seminars 18

19 19 Security Training Seminars New! Started in Amsterdam, January 1998, establish as regular feature Integral part of Security Program supporting standardization and collaborative technology initiatives in the field Aims: practical advice of obvious value to the business short to medium term tactical advice medium to long term strategic advice supported by case examples

20 Security Training Seminars Managing: Dr. Phil Holmes background in education, information management and publishing Security Training Alliance Security Training Alliance proposal for alliance of training partners working under common marketing banner common, shared set of training modules co-operation between partners in satisfying customer organization s training needs 20

21 Security Survival An Indispensable Guide to Securing Your Business Security Survival An indispensable guide to securing your business Essential advice for users and managers Helps prepare you for net security Obtain from: Prentice-Hall Regular & Internet The Open Group Regular & Internet Amazon Internet only Your guide to System Security 21 Covers DCE Security

22 Our Speakers Today Vernon Poole, (Aid to Industry) Security Breaches and their Avoidance Management practice Policies Training & awareness Denise Ecklund & John Wilson, (Intel Corporation) & John Wilson, (Intel Corporation) An introduction to CDSA The business benefits of using CDSA Application areas that can benefit from using CDSA case examples 22

23 Rules of Engagement Not a working group meeting Panel Question & Answer Session Feel free to provide feedback to Phil Holmes either personally or via evaluation forms content, quality, suggestions for future topics interest in The Security Training Alliance 23

CDSA Technology. Intel Corporation Denise Ecklund July 1998

CDSA Technology. Intel Corporation Denise Ecklund July 1998 CDSA Technology Intel Corporation Denise Ecklund July 1998 Agenda Problem of Protecting Applications The CDSA Solution What is CDSA? Intel s Technology Role CDSA Today CDSA Tomorrow 2 Protecting an Application

More information

An Application Developers Guide Proposal and Feedback Session. Phil Holmes. How to with CDSA

An Application Developers Guide Proposal and Feedback Session. Phil Holmes. How to with CDSA 1 "How-to" with CDSA An Application Developers Guide Proposal and Feedback Session Phil Holmes How to with CSDA - Agenda 2 Overall Objectives The conventional approach Collaboration - How to Book & CD-ROM

More information

Intel s Common Data Security Architecture

Intel s Common Data Security Architecture Intel s Common Data Security Architecture Draft Release 2.0 version 1.0 Presented at TOG Members Meeting PKI-TG Session June 26, 1997 Denise Ecklund, Intel Architecture Labs Today s Agenda History of CDSA

More information

IBM KeyWorks Accelerate Development of your Secure e-business Solutions Sekar Chandersekaran IBM

IBM KeyWorks Accelerate Development of your Secure e-business Solutions Sekar Chandersekaran IBM IBM KeyWorks Accelerate Development of your Secure e-business Solutions Sekar Chandersekaran IBM chanders@us.ibm.com IBM KeyWorks Market Needs History KeyWorks KeyWorks KeyWorks KeyWorks KeyWorks Suite

More information

Generic Support for PKIX Certificate Management in CDSA

Generic Support for PKIX Certificate Management in CDSA Generic Support for PKIX Certificate Management in CDSA Shabnam Erfani WatchGuard Technologies serfani@watchguard.com Sekar Chandersekaran Microsoft Corporation sekarcha@microsoft.com Abstract The Common

More information

CDSA Program Update SECURITY. Graham Bird. opengroup.org (650)

CDSA Program Update SECURITY. Graham Bird. opengroup.org (650) CDSA Program Update SECURITY Graham Bird g.bird@opengroup opengroup.org (650) 323 7992 Agenda Product Standards The Open Brand program Diffusion Schedules Q&A Product Standards Product Standards Real World

More information

OpenVMS Security Update 1M01

OpenVMS Security Update 1M01 OpenVMS Update M0 Helmut Ammer TCSC München Agenda Ratings ITSEC E C & E B update on V6. TCSEC C Ramp -> > Common Criteria COE DII Current Projects: Enterprise Features & Projects History Per- Profiles

More information

Intel s View of Business Requirements and Future Work on the APKI

Intel s View of Business Requirements and Future Work on the APKI Intel s View of Business Requirements and Future Work on the APKI April, 1998 May 6, 1998 Table of Contents 1 BUSINESS REQUIREMENTS...1 1.0 INTRODUCTION...1 1.1 TAXONOMY OF BUSINESS REQUIREMENTS...1 2

More information

ISO27001:2013 The New Standard Revised Edition

ISO27001:2013 The New Standard Revised Edition ECSC UNRESTRICTED ISO27001:2013 The New Standard Revised Edition +44 (0) 1274 736223 consulting@ecsc.co.uk www.ecsc.co.uk A Blue Paper from Page 1 of 14 Version 1_00 Date: 27 January 2014 For more information

More information

Securing Data in the Cloud: Point of View

Securing Data in the Cloud: Point of View Securing Data in the Cloud: Point of View Presentation by Infosys Limited www.infosys.com Agenda Data Security challenges & changing compliance requirements Approach to address Cloud Data Security requirements

More information

Open Group Security Forum Overview

Open Group Security Forum Overview Open Group Security Forum Overview To the I3C, July 23, 2003 Mike Jerbic Chair Security Forum Office: 408.257.1648 m.jerbic@opengroup.org www.opengroup.org The Open Group is... A global consortium committed

More information

MEMBERSHIP. Learn how you can get involved with SNIA

MEMBERSHIP. Learn how you can get involved with SNIA MEMBERSHIP Learn how you can get involved with SNIA SNIA, the Storage Networking Industry Association, is a non-profit global organization dedicated to developing standards and education programs to advance

More information

NIS Standardisation ENISA view

NIS Standardisation ENISA view NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number

More information

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 ISO / IEC 27001:2005 A brief introduction Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 Information Information is an asset which, like other important business assets, has value

More information

Introduction to ISO/IEC 27001:2005

Introduction to ISO/IEC 27001:2005 Introduction to ISO/IEC 27001:2005 For ISACA Melbourne Chapter Technical Session 18 th of July 2006 AD Prepared by Endre P. Bihari JP of Performance Resources What is ISO/IEC 17799? 2/20 Aim: Creating

More information

US Federal PKI Bridge. Ram Banerjee VP Vertical Markets

US Federal PKI Bridge. Ram Banerjee VP Vertical Markets US Federal PKI Bridge Ram Banerjee VP Vertical Markets e-gov and PKI Drivers Government Paperwork Elimination and ESIGN Acts Public Expectations Long-term Cost Savings The Need for Privacy and Security

More information

Building an Assurance Foundation for 21 st Century Information Systems and Networks

Building an Assurance Foundation for 21 st Century Information Systems and Networks Building an Assurance Foundation for 21 st Century Information Systems and Networks The Role of IT Security Standards, Metrics, and Assessment Programs Dr. Ron Ross National Information Assurance Partnership

More information

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA The Experience of Generali Group in Implementing COBIT 5 Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA Generali Group at a glance Let me introduce myself Marco Salvato CISA, CISM, CGEIT,

More information

Securing Europe's Information Society

Securing Europe's Information Society Securing Europe's Information Society Dr. Udo Helmbrecht Executive Director European Network and Information Security Agency 16 June 2010 FIRST AGM Miami 16/6/2010 1 Agenda ENISA overview Challenges EU

More information

Cloud solution consultant

Cloud solution consultant Cloud solution consultant Role brief Directorate Jisc technologies Base location Harwell or Bristol Grade B Level 18 Job family Professional services Date November 2017 Reports to Cloud services group

More information

WHITE PAPER. ENSURING SECURITY WITH OPEN APIs. Scott Biesterveld, Lead Solution Architect Senthil Senthil, Development Manager IBS Open APIs

WHITE PAPER. ENSURING SECURITY WITH OPEN APIs. Scott Biesterveld, Lead Solution Architect Senthil Senthil, Development Manager IBS Open APIs ENSURING SECURITY WITH OPEN APIs Scott Biesterveld, Lead Solution Architect Senthil Senthil, Development Manager IBS Open APIs The security features that banks must build into their financial solutions

More information

Identity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition

Identity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition Identity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition Sept. 8, 2008 Liberty Alliance 1 Welcome! Introduction of speakers Introduction of attendees Your organization

More information

TECHNICAL SPECIFICATION

TECHNICAL SPECIFICATION TECHNICAL SPECIFICATION IEC/TS 62351-8 Edition 1.0 2011-09 colour inside Power systems management and associated information exchange Data and communications security Part 8: Role-based access control

More information

Industry Guidelines for Computerized Systems Validation (GAMP, PDA Technical Reports)

Industry Guidelines for Computerized Systems Validation (GAMP, PDA Technical Reports) Training Course Computerized System Validation in the Pharmaceutical Industry Istanbul, 16-17 January 2003 Industry Guidelines for Computerized Systems Validation (GAMP, PDA Technical Reports) Wolfgang

More information

Single Sign-On Architectures. Jan De Clercq Senior Member of Technical Staff Technology Leadership Group Hewlett-Packard

Single Sign-On Architectures. Jan De Clercq Senior Member of Technical Staff Technology Leadership Group Hewlett-Packard Single Sign-On Architectures Jan De Clercq Senior Member of Technical Staff Technology Leadership Group Hewlett-Packard Agenda Trusted Security Infrastructures SSO: What and Why? SSO Architectures Extending

More information

Client Services Procedure Manual

Client Services Procedure Manual Procedure: 85.00 Subject: Administration and Promotion of the Health and Safety Learning Series The Health and Safety Learning Series is a program designed and delivered by staff at WorkplaceNL to increase

More information

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services Mark Littlejohn June 23, 2016 DON T GO IT ALONE Achieving Cyber Security using Managed Services Speaker: Mark Littlejohn 1 Mark is an industrial technology professional with over 30 years of experience

More information

Introduction to GlobalPlatform Compliance Secretariat

Introduction to GlobalPlatform Compliance Secretariat Introduction to GlobalPlatform Compliance Secretariat Introduction Key to market stability is the adoption of proven standards. Industry acceptance of any standard or specification, however, will only

More information

Cloud solution consultant

Cloud solution consultant Cloud solution consultant Role brief Directorate Jisc technologies Base location Harwell or Bristol Grade B Job level 18 Job family Professional services Date 23/10/2017 Reports to Cloud services group

More information

Partnership Information

Partnership Information SECOND INTERNATIONAL CONFERENCE ON ISO 31000 STANDARD USING ISO 31000 RISK MANAGEMENT STANDARD TO ACHIEVE OPTIMAL PERFORMANCE Conference Date: 28-29 May 2013 Master Classes Date: 30-31 May 2013 Location:

More information

DISTRIBUTED SYSTEMS. Second Edition. Andrew S. Tanenbaum Maarten Van Steen. Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON.

DISTRIBUTED SYSTEMS. Second Edition. Andrew S. Tanenbaum Maarten Van Steen. Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON. DISTRIBUTED SYSTEMS 121r itac itple TAYAdiets Second Edition Andrew S. Tanenbaum Maarten Van Steen Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON Prentice Hall Upper Saddle River, NJ 07458 CONTENTS

More information

Recommendations for Small and Medium Enterprises. Event Date Location

Recommendations for Small and Medium Enterprises. Event Date Location Recommendations for Small and Medium Enterprises Event Date Location B20 Structure B20 Members worldwide B20 Cross-thematic Group Small and Medium Enterprises CTG SMEs: Composition Coordination Group 129

More information

@SNIA. Learn More About SNIA Membership

@SNIA.  Learn More About SNIA Membership Learn More About SNIA Membership SNIA is committed to delivering standards, education, and services that will continue to propel storage networking solutions into the broader information technology market.

More information

Manager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre

Manager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre IDENTIFICATION Department Position Title Infrastructure Manager, Infrastructure Services Position Number Community Division/Region 32-11488 Yellowknife Technology Service Centre PURPOSE OF THE POSITION

More information

ANZPAA National Institute of Forensic Science BUSINESS PLAN

ANZPAA National Institute of Forensic Science BUSINESS PLAN ANZPAA National Institute of Forensic Science BUSINESS PLAN 2018 19 OUR STRATEGIC INTENT PROMOTE AND FACILITATE EXCELLENCE IN FORENSIC SCIENCE The National Institute of Forensic Science is a directorate

More information

Forum. Ningbo, China 25 February

Forum. Ningbo, China 25 February 2014/SOM1/SCE-COW/014 Agenda Item: 4 Telecommunications and Inform ation Working Group Strategic Plan Purpose: Consideration Submitted by: TEL Chair Forum Doc. No.: 2013/SOM3/SCE/017 SOM Steering Committee

More information

John Heimann Director, Security Product Management Oracle Corporation

John Heimann Director, Security Product Management Oracle Corporation John Heimann Director, Security Product Management Oracle Corporation Oracle9i Application Server v2 Security What s an Application Server? Development and deployment environment Web(HTML,XML,SOAP) J2EE

More information

Standard Setting and Revision Procedure

Standard Setting and Revision Procedure Better Cotton Initiative Standard Setting and Revision Procedure BCI-PRO-01 (V2-0) EN Title: Document reference code: Standard Setting and Revision Procedure BCI-PRO-01-V2 Approval : BCI Council, January

More information

ASEAN e-authentication Workshop Balwinder Sahota

ASEAN e-authentication Workshop Balwinder Sahota ASEAN e-authentication Workshop Balwinder Sahota Agenda ASEAN Single Window (ASW) What is ATIGA Form D The information flow of ATIGA Form D and related documents Security Requirements Challenges in Implementation

More information

CURRICULUM VITAE. Central European University, Graduate School of Business - Budapest Hungary From To September 2002 December 2003

CURRICULUM VITAE. Central European University, Graduate School of Business - Budapest Hungary From To September 2002 December 2003 1. Surname: Trajkovski 2. First Name: Jasmina 3. Date of Birth: 23.01.1978 4. Nationality: n 5. Civil Status: Single CURRICULUM VITAE 6. Telephone: 02 3123601 ; 075 280609 7. E-mail: jasmina.trajkovski@tpconsulting.com.mk

More information

Bradford J. Willke. 19 September 2007

Bradford J. Willke. 19 September 2007 A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure

More information

Cisco Unified Presence 8.0

Cisco Unified Presence 8.0 Cisco Unified Presence 8.0 Cisco Unified Communications Solutions unify voice, video, data, and mobile applications on fixed and mobile networks, enabling easy collaboration every time from any workspace.

More information

IBM Tivoli Directory Server

IBM Tivoli Directory Server Build a powerful, security-rich data foundation for enterprise identity management IBM Tivoli Directory Server Highlights Support hundreds of millions of entries by leveraging advanced reliability and

More information

Wireless e-business Security. Lothar Vigelandzoon

Wireless e-business Security. Lothar Vigelandzoon Wireless e-business Security Lothar Vigelandzoon E-business evolution Increased business drivers for cost efficiency & market penetration Increased Importance of brand reputation Distance between IT and

More information

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague Brmlab, hackerspace Prague Lightning talks, November 2016 in general in general WTF is an? in general WTF is an? Computer Security in general WTF is an? Computer Security Incident Response in general WTF

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

ICT support for Primary Schools. Helping primary schools to apply a successful ICT strategy for teaching and digital learning.

ICT support for Primary Schools. Helping primary schools to apply a successful ICT strategy for teaching and digital learning. ICT support for Primary Schools. Helping primary schools to apply a successful ICT strategy for teaching and digital learning. Professional ICT support for primary schools. Our ICT is the technology partner

More information

How to avoid storms in the cloud. The Australian experience and global trends

How to avoid storms in the cloud. The Australian experience and global trends How to avoid storms in the cloud The Australian experience and global trends Discussion Topics 1. Understanding Cloud and Benefits 2. KPMG research The Australian Experience and Global Trends 3. Considerations

More information

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The

More information

RD/TBT/104. Quality Infrastructure in the Americas. TBT Committee Thematic Session November 4, 2014 IAAC

RD/TBT/104. Quality Infrastructure in the Americas. TBT Committee Thematic Session November 4, 2014 IAAC Quality Infrastructure in the Americas TBT Committee Thematic Session November 4, 2014 Quality Infrastructure Council of the Americas An initiative launched by the Ministers and High Authorities of Science

More information

Agenda. 1. The LoU between EC-CEF and OpenPEPPOL about transition and migration to AS4 - Niels

Agenda. 1. The LoU between EC-CEF and OpenPEPPOL about transition and migration to AS4 - Niels www.peppol.eu OpenPEPPOL CC F2F meetings Vienna May 9 th and 10 th, 2017. AS4 Transition. Joint TICC/PoCC session Niels Pagh-Rasmussen, Executive architect IBM and member of OpenPEPPOL MC. Sander Fieten,

More information

2017 NACHA Third-Party Sender Initiatives

2017 NACHA Third-Party Sender Initiatives 2017 NACHA Third-Party Sender Initiatives Jordan Bennett Senior Director, Network Risk NACHA 2 MAC is an organization of Bankcard professionals involved in the risk management side of Card Processing.

More information

Erkuden Rios MARCH 2017, EXCEL LONDON

Erkuden Rios MARCH 2017, EXCEL LONDON Erkuden Rios 15 16 MARCH 2017, EXCEL LONDON The Cluster Initiative launched by DG-CNECT in April 2015. Gathers together EU-funded research projects working on: Solutions on: Data Protection Security Privacy

More information

The world's leading Provider of open source Enterprise IT products and services Rainer Liedtke

The world's leading Provider of open source Enterprise IT products and services Rainer Liedtke The world's leading Provider of open source Enterprise IT products and services Regional Director EMEA Sales, Country Manager Germany 1 Status Of Open Source Software Adoption 2 What Do These Numbers Represent?

More information

Cloud Security Alliance Quantum-safe Security Working Group

Cloud Security Alliance Quantum-safe Security Working Group Don Hayford 3rd ETSI/IQC Workshop on Quantum-Safe Cryptography Seoul, Korea October 5, 2015 Session 3: Joint Global Efforts Cloud Security Alliance Quantum-safe Security Working Group 1 Cloud Security

More information

First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh.

First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh. First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh. DRAFT SUBMISSION OF [ORGANIZATION] PROJECTS/ACTIVITIES/STUDIES [Date] Objective: This

More information

Caribbean Private Sector Network meeting 24 August 2017, Ministry of Trade, Port-of-Spain, Trinidad and Tobago

Caribbean Private Sector Network meeting 24 August 2017, Ministry of Trade, Port-of-Spain, Trinidad and Tobago Caribbean Private Sector Network meeting 24 August 2017, Ministry of Trade, Port-of-Spain, Trinidad and Tobago Background The Sendai Framework for Disaster Risk Reduction 2015-2030 1 was adopted by United

More information

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest?

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest? Data Privacy According to statistics provided by the Data Breach Level Index, hackers and thieves are stealing more than 227,000 personal records per hour as of 2017, generally targeting customer information

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: McMaster University Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

KM COLUMN. How to evaluate a content management system. Ask yourself: what are your business goals and needs? JANUARY What this article isn t

KM COLUMN. How to evaluate a content management system. Ask yourself: what are your business goals and needs? JANUARY What this article isn t KM COLUMN JANUARY 2002 How to evaluate a content management system Selecting and implementing a content management system (CMS) will be one of the largest IT projects tackled by many organisations. With

More information

TELECOMMUNICATIONS AND DATA CABLING BUSINESSES

TELECOMMUNICATIONS AND DATA CABLING BUSINESSES DRAFT for RCWS, ADTIA & ICAA INDUSTRY CODE for TELECOMMUNICATIONS AND DATA CABLING BUSINESSES Registered by the ACMA on XX XXXXX 2016 TABLE OF CONTENTS TABLE OF CONTENTS 2 1. SCOPE AND OBJECTIVES 3 1.1

More information

Synthesis of Humanitarian Evaluations UNICEF Management Response

Synthesis of Humanitarian Evaluations UNICEF Management Response 15 January 2018 Synthesis of Humanitarian Evaluations 2010-2016 UNICEF Management Response Informal Briefing of the UNICEF Executive Board UNICEF/UNI197921/Schermbrucker Use of the Synthesis Critical input

More information

International Telecommunication Testing Centre. Moscow, Russia, December 2009

International Telecommunication Testing Centre. Moscow, Russia, December 2009 training seminar CONFORMANCE TESTING Testing Centre (ITTC) Moscow, Russia, 10-11 December 2009 WTSA-08 Resolution 76: Conformance and Interoperability testing Paolo Rosa Head, Workshops and Promotion Division

More information

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe Author Date VdTÜV-WG Cybersecurity October, 3 rd 2015 VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe VdTÜV e.v. welcomes the Communication on a

More information

SOC for cybersecurity

SOC for cybersecurity April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory

More information

The Government IT Profession: Embedding IT Professionalism in Your Organisation

The Government IT Profession: Embedding IT Professionalism in Your Organisation Government IT Profession The Government IT Profession: Embedding IT Professionalism in Your Organisation Anne-Marie Grafton Implementation Manager Government IT Profession Team 020 7276 3462 / 07909 893369

More information

DMR Interoperability Process DMR Association

DMR Interoperability Process DMR Association DMR Interoperability Process DMR Association Introduction This white paper gives the background to the development of the DMR Interoperability Process by the DMR Association, explains the value of the

More information

Department of Homeland Security Customs and Border Protection. Centers of Excellence and Expertise

Department of Homeland Security Customs and Border Protection. Centers of Excellence and Expertise Department of Homeland Security Customs and Border Protection Centers of Excellence and Expertise 1 Center Mission Statement The Centers of Excellence and Expertise strengthen America s economic competitiveness

More information

Overview. Business value

Overview. Business value PRODUCT SHEET CA Top Secret for z/vse CA Top Secret for z/vse CA Top Secret for z/vse provides innovative and comprehensive security for business transaction environments which enable your business to

More information

Draft Applicant Guidebook, v3

Draft Applicant Guidebook, v3 Draft Applicant Guidebook, v3 Module 5 Please note that this is a discussion draft only. Potential applicants should not rely on any of the proposed details of the new gtld program as the program remains

More information

NOW IS THE TIME. to secure our future

NOW IS THE TIME. to secure our future NOW IS THE TIME to secure our future A FRAMEWORK FOR UNITING THE CANADIAN ACCOUNTING PROFESSION VISION FOR THE PROFESSION To be the pre-eminent, internationally recognized Canadian accounting designation

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access

More information

Beyond Your Device. Control, Connect, Experience. BT GS Analyst and consultant call 2 July 2013

Beyond Your Device. Control, Connect, Experience. BT GS Analyst and consultant call 2 July 2013 Beyond Your Device Control, Connect, Experience BT GS Analyst and consultant call 2 July 2013 Agenda Welcome & situation in the market Neil Sutton, Vice President Portfolio Our solution Connect Jayne Smith,

More information

Strong Customer Authentication and common and secure communication under PSD2. PSD2 in a nutshell

Strong Customer Authentication and common and secure communication under PSD2. PSD2 in a nutshell Strong Customer Authentication and common and secure communication under PSD2 PSD2 in a nutshell Summary On August 12, the EBA has issued the long-awaited draft of the Regulatory Technical Standards (RTS)

More information

In Accountable IoT We Trust

In Accountable IoT We Trust In Accountable IoT We Trust AIOTI WG3 Security & Privacy-in-IoT Taskforces, and H2020 CSA CREATE-IoT & LSPs AG Trust in IoT Arthur van der Wees Managing Director Arthur s Legal, the global tech-by-design

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: CARLETON UNIVERSITY Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

GREEN DEFENCE FRAMEWORK

GREEN DEFENCE FRAMEWORK GREEN DEFENCE FRAMEWORK Approved by the North Atlantic Council in February 2014 GREEN DEFENCE FRAMEWORK OVERVIEW 1. Green Defence could, at this stage, be defined as a multifaceted endeavour cutting across

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

The GDPR Are you ready?

The GDPR Are you ready? The GDPR Are you ready? kpmg.ie The GDPR - Overview The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) will come into force from 25th May 2018, replacing the existing data protection

More information

Workshop on the IPv6 development in Saudi Arabia 8 February 2009; Riyadh - KSA

Workshop on the IPv6 development in Saudi Arabia 8 February 2009; Riyadh - KSA Transition to IPv6 Drivers and Challenges Dr. Abdelfattah ABUQAYYAS ICT Consultant CITC- KSA 1 MAIN POINTS The ICT sector is developing rapidly - new services, and new modes of service delivery. The Internet

More information

Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model

Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model 1. Description of Services. 1.1 SIP SBC with Field Trial Endpoint Deployment Verizon will assist

More information

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius Presented By Mrs K.Gunesh-Balaghee,, Assistant Solicitor General Mr M.Armmogum,, Ag Senior State Counsel Mrs B.Kissoon-Luckputtya,

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications

More information

Collaborative Working presentation for CIPS. Bob Meakes I C W Associate Director

Collaborative Working presentation for CIPS. Bob Meakes I C W Associate Director Collaborative Working presentation for CIPS Bob Meakes I C W Associate Director Context Journey BS 11000 Adopters Q & A 1990 VISION Lord Joseph (formerly Sir Keith Joseph) ex Minister of the D T I Effective

More information

13543/17 PhL/at 1 DG G 3 B

13543/17 PhL/at 1 DG G 3 B Council of the European Union Brussels, 24 October 2017 (OR. en) 13543/17 UD 239 NOTE From: To: General Secretariat of the Council Permanent Representatives Committee/Council No. prev. doc.: ST 12287/5/17

More information

Building a Resilient Security Posture for Effective Breach Prevention

Building a Resilient Security Posture for Effective Breach Prevention SESSION ID: GPS-F03B Building a Resilient Security Posture for Effective Breach Prevention Avinash Prasad Head Managed Security Services, Tata Communications Agenda for discussion 1. Security Posture 2.

More information

Commonwealth of Pennsylvania - Justice Network

Commonwealth of Pennsylvania - Justice Network Commonwealth of Pennsylvania - Justice Network Published: June 1999 FIORANO CUSTOMER SOLUTION Commonwealth of Pennsylvania uses Fiorano s solution to enhance public safety in the State by enabling Real

More information

THE MADRID PROTOCOL. A single trademark registration supports regional economic integration. A Case Study

THE MADRID PROTOCOL. A single trademark registration supports regional economic integration. A Case Study THE MADRID PROTOCOL A single trademark registration supports regional economic integration A Case Study The Madrid Protocol: Protecting brands globally The Madrid System for the International Registration

More information

NERC Staff Organization Chart Budget 2018

NERC Staff Organization Chart Budget 2018 NERC Staff Organization Chart Budget 2018 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate

More information

New Zealand Government IBM Infrastructure as a Service

New Zealand Government IBM Infrastructure as a Service New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand

More information

Module 4 Business Value of Telecommunication Networks 4.1 Internet Revolution 4.2 Business value of Internet, Intranet and Extranet

Module 4 Business Value of Telecommunication Networks 4.1 Internet Revolution 4.2 Business value of Internet, Intranet and Extranet Module 4 Business Value of Telecommunication Networks 4.1 Internet Revolution 4.2 Business value of Internet, Intranet and Extranet Module 4 Business Value of Telecommunication Networks Information and

More information

POSITION DESCRIPTION

POSITION DESCRIPTION Network Security Consultant POSITION DESCRIPTION Unit/Branch, Directorate: Location: Regulatory Unit Information Assurance and Cyber Security Directorate Auckland Salary range: I $90,366 - $135,548 Purpose

More information

Cloud Security. Copyright Ramesh Nagappan. All rights reserved.

Cloud Security. Copyright Ramesh Nagappan. All rights reserved. Cloud Security 1 Cloud Security Week 1 Lecture 1 Ramesh Nagappan Harvard University Extension School Brandeis University GPS 2 Week 1 Lecture - 1 Course Introduction Evolution of Cloud Computing Introduction

More information

Theory of Operations for TSN-Based Industrial Systems and Applications. Paul Didier Cisco Systems

Theory of Operations for TSN-Based Industrial Systems and Applications. Paul Didier Cisco Systems Theory of Operations for TSN-Based Industrial Systems and Applications Paul Didier Cisco Systems Agenda Why TSN? Value and Benefits TSN Standards a brief Overview How TSN works an Operational Model The

More information

Towards a European Cloud Computing Strategy

Towards a European Cloud Computing Strategy Towards a European Cloud Computing Strategy Jorge Gasós European Commission Information Society and Media Directorate General Trust and Security Unit Security, privacy, and trust in the information society

More information

10 Considerations for a Cloud Procurement. March 2017

10 Considerations for a Cloud Procurement. March 2017 10 Considerations for a Cloud Procurement March 2017 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents

More information

13967/16 MK/mj 1 DG D 2B

13967/16 MK/mj 1 DG D 2B Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:

More information

TABLE OF CONTENTS. 3 Disclaimer. 3 Program Guide Changes. 4 Introduction. 4 Partner Program Overview. 5 Partner Program Structure

TABLE OF CONTENTS. 3 Disclaimer. 3 Program Guide Changes. 4 Introduction. 4 Partner Program Overview. 5 Partner Program Structure TABLE OF CONTENTS 3 Disclaimer 3 Program Guide Changes 4 Introduction 4 Partner Program Overview 5 Partner Program Structure 6 Partner Program Benefits 8 Accreditation 10 Program Requirements 12 Membership

More information

Alliance Key Manager A Solution Brief for Technical Implementers

Alliance Key Manager A Solution Brief for Technical Implementers KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key

More information