Research of Personnel. 9. Interface Manager (Class B - 60 months - Over 15 years experience with degree and professional qualification)

Size: px
Start display at page:

Download "Research of Personnel. 9. Interface Manager (Class B - 60 months - Over 15 years experience with degree and professional qualification)"

Transcription

1 Research of Personnel 9. Interface Manager (Class B - 60 months - Over 15 years experience with degree and professional A manager with experience in the coordination of interfaces in complex large scale technological projects, in the Public Transport domain. The Interface Manager shall coordinate the different stakeholders involved in the ITS Project, managing the relevant programmatic interfaces, and facilitating the implementation of the technical interfaces; the IM shall specifically address situations of overlapping scopes of different contractors, or of the eventual existence of gaps in the overall contractual framework; the IM shall facilitate the analysis all issues deriving from conflicting internal and external Stakeholder needs, the evaluation of their impacts, and the identification of appropriate solutions. at least 1 ITS project for Public Transport in Europe in the last 5 years 10. TCC Supervisor (Class B - 60 months - Over 15 years experience with degree and professional A manager with experience in the implementation of Control Centers, integrating technological, operational and infrastructural components, from the design stage up to final acceptance. The TCC Supervisor shall conduct an assessment of all operational aspects related to the Riyadh Transport Control Center, starting from the operators directly related to the ITS System (Bus, Metro, Customer Contact Center), but also including other operators such as the Traffic Control Manager and the TCC Facility Manager; the TCC Supervisor shall specifically assess the contractual framework of all parties involved with the TCC, and supervise the implementation and integration of all the different systems pertaining to it. at least 1 ITS project as IT Manager/Expert in Europe in the last 5 years

2 11. Network & Data Cyber Security Manager (Class B - 60 months - Over 15 years experience with degree and A manager with experience in the protection of valuable assets from cyber threats, in complex network environments such as state-of-the-art data centers, including public access and financial transactions. The Network & Data Cyber Security Manager shall support the implementation of complex IT architectures, identifying relevant cyber threats for the ITS project, assessing the level of protection offered by the current architectures, and proposing solutions for the mitigation of all cyber related risks. at least 1 ITS project in Europe in the last 5 years high troubleshooting capacity, numerical, analytical, problem solving and organizing skills familiarity with Cisco blueprint schemes familiarity with technologies like ISE (NAC, NAC guest, ACS and NAC Profiler), firewalls (checkpoint, ASA) and IPS 12. AFC System Engineer (Class C months - Over 10 years experience with degree and A System Engineer with experience in the implementation of Fare Management Systems in large public transport projects. The AFC System Engineer shall supervise the implementation of the solution provided by the AFC the fulfillment of performance requirements, and the implementation of all necessary interfaces; the AFC at least 1 ITS (specially AFC systems) project in Europe in the last 5 years

3 13. AVM System Engineer (Class C months - Over 10 years experience with degree and A System Engineer with experience in the implementation of Automated Vehicle Management Systems in large public transport projects. The AVM System Engineer shall supervise the implementation of the solution provided by the AVM the fulfillment of performance requirements, and the implementation of all necessary interfaces; the AVM at least 1 ITS (specially AVM systems) project in Europe in the last 5 years experience with demand responsive traffic policies and technologies 14. RTPI System Engineer (Class C months - Over 10 years experience with degree and A System Engineer with experience in the implementation of Real Time Passenger Information Systems in large public transport projects. The RTPI System Engineer shall supervise the implementation of the solution provided by the AVM/ RTPI the fulfillment of performance requirements, and the implementation of all necessary interfaces; the RTPI at least 1 ITS (specially on RTPI systems) project in Europe in the last 5 years 15. IT Expert (Class C months - Over 10 years experience with degree and professional

4 An IT professional with experience in the implementation of Data Centers for large projects in the public transport domain. The IT Expert shall supervise the implementation of complex IT infrastructures in the main ITS sites from a technical point of view, assessing the proposed architecture and technology, ensuring the fulfillment of performance requirements, and the implementation of all necessary interfaces; the IT Expert shall specifically support the definition of the functional and performance requirements for the Data Center servers, and the evaluation of virtualization policies and schemes. at least 1 ITS project as IT expert/manager in Europe in the last 5 years preferably 1 IT project in GCC in the last 5 years 16. Telecom LAN Expert (Class C months - Over 10 years experience with degree and A Telecommunications professional with experience in the implementation of networking solutions for large projects in the public transport domain. The Telecom LAN Expert shall supervise the implementation of the local Telecom infrastructures in the main ITS sites from a technical point of view, assessing the proposed networking architecture and technology, and ensuring the fulfillment of performance requirements; the Telecom LAN Expert shall specifically support the definition of the functional and performance requirements for the switches and routers used in all ITS system sites, and review and comment documentation provided by the Contractors. at least 1 ITS (special focus on Control Centre LAN and Networking) project in Europe in the last 5 years 17. JP System Engineer (Class C months - Over 10 years experience with degree and

5 A System Engineer with experience in the implementation of Journey Planners in large public transport projects. The JP System Engineer shall contribute to the development of the architecture of the JP solution, and develop the concept and technical specification documents; the JP System Engineer shall supervise the implementation of the solution provided by the JP Contractor from a technical point of view, assessing the proposed architecture and technology, ensuring the fulfillment of performance requirements, and the implementation of all necessary interfaces; the JP System Engineer shall review technical documentation provided by the JP Contractor, and provide remarks at least 1 ITS project (focused on JP applications) in Europe in the last 5 years 18. JP Data & Software Expert (Class C months - Over 10 years experience with degree and A software engineer with experience in developing and supporting geo-spatial software applications for the public transport domain. The JP Data and Software Expert shall support the development of the technical specification documents for the Journey Planner solution. at least 1 ITS project (focused on JP) in Europe in the last 5 years

Service Description: Identity Services Engine Implementation-Subscription Service

Service Description: Identity Services Engine Implementation-Subscription Service Page 1 of 6 Service Description: Identity Services Engine Implementation-Subscription Service Services Summary This document describes the Identity Services Engine Implementation. Subscription Service.

More information

Technical Vulnerability and Patch Management Policy Document Number: OIL-IS-POL-TVPM

Technical Vulnerability and Patch Management Policy Document Number: OIL-IS-POL-TVPM Technical Vulnerability and Patch Management Policy Document Number: OIL-IS-POL-TVPM Document Details Title Description Version 1.1 Author Classification Technical Vulnerability and Patch Management Policy

More information

Port Facility Cyber Security

Port Facility Cyber Security International Port Security Program Port Facility Cyber Security Cyber Security Assessment MAR'01 1 Lesson Topics ISPS Code Requirement The Assessment Process ISPS Code Requirements What is the purpose

More information

CompTIA Mobility+ Certification

CompTIA Mobility+ Certification CompTIA Mobility+ Certification Duration: 5 days Price: $4000 Certifications: CompTIA Mobility+ Exams: MB0-001 Course Overview The mobile age is upon us. More and more people are using tablets, smartphones,

More information

Business Continuity Management

Business Continuity Management Business Continuity Management Cyber Security importance by Ashraf Hasanov Business Continuity Expert BCMS BS25999 Lead Auditor Regional Disaster Response Team Member of IFRC What could stop your business?

More information

Critical Infrastructure Protection in the European Union

Critical Infrastructure Protection in the European Union 20 January, 2015 The European GNSS Programmes 1 ICG9, Prague 9-14 November 2014 Critical Infrastructure Protection in the European Union 20 January, 2015 The European GNSS Programmes 2 Each EU Member State

More information

Enhancing the cyber security &

Enhancing the cyber security & Enhancing the cyber security & resilience of transport infrastructure in Europe European Union Agency for Network and Information Security Securing Europe s Information society 2 Positioning ENISA activities

More information

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location: Position: Reports to: Location: Security Monitoring Engineer / (NY or NC) Director, Information Security New York, NY or Winston-Salem, NC Position Summary: The Clearing House (TCH) Information Security

More information

Disaster Recovery and Business Continuity Planning (Mile2)

Disaster Recovery and Business Continuity Planning (Mile2) Disaster Recovery and Business Continuity Planning (Mile2) Course Number: DRBCP Length: 4 Day(s) Certification Exam This course will help you prepare for the following exams: ABCP: Associate Business Continuity

More information

External Supplier Control Obligations. Cyber Security

External Supplier Control Obligations. Cyber Security External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place

More information

Penetration testing.

Penetration testing. Penetration testing Penetration testing is a globally recognized security measure that can help provide assurances that a company s critical business infrastructure is protected from internal or external

More information

Port Facility Cyber Security

Port Facility Cyber Security International Port Security Program Port Facility Cyber Security Cyber Security and Port Facility MAR'01 1 Security Plans (PFSP) Lesson Topics Purpose of the PFSP Developing the PFSP Role of Facility Personnel

More information

NW NATURAL CYBER SECURITY 2016.JUNE.16

NW NATURAL CYBER SECURITY 2016.JUNE.16 NW NATURAL CYBER SECURITY 2016.JUNE.16 ADOPTED CYBER SECURITY FRAMEWORKS CYBER SECURITY TESTING SCADA TRANSPORT SECURITY AID AGREEMENTS CONCLUSION QUESTIONS ADOPTED CYBER SECURITY FRAMEWORKS THE FOLLOWING

More information

When Recognition Matters WHITEPAPER ISO SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS.

When Recognition Matters WHITEPAPER ISO SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS. When Recognition Matters WHITEPAPER ISO 28000 SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS www.pecb.com CONTENT 3 4 4 4 4 5 6 6 7 7 7 8 9 10 11 12 Introduction An overview of ISO 28000:2007 Key clauses of

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

DEFINITIONS AND REFERENCES

DEFINITIONS AND REFERENCES DEFINITIONS AND REFERENCES Definitions: Insider. Cleared contractor personnel with authorized access to any Government or contractor resource, including personnel, facilities, information, equipment, networks,

More information

Compliance with ISPS and The Maritime Transportation Security Act of 2002

Compliance with ISPS and The Maritime Transportation Security Act of 2002 Mr. Melchor Becena Security Administrator Port Everglades SecurePort Conference Miami, Florida 25-27 27 February, 2004 Compliance with ISPS and The Maritime Transportation Security Act of 2002 Overview

More information

Table of Contents. Sample

Table of Contents. Sample TABLE OF CONTENTS... 1 CHAPTER 1 INTRODUCTION... 4 1.1 GOALS AND OBJECTIVES... 5 1.2 REQUIRED REVIEW... 5 1.3 APPLICABILITY... 5 1.4 ROLES AND RESPONSIBILITIES SENIOR MANAGEMENT AND BOARD OF DIRECTORS...

More information

CYBER SECURITY AIR TRANSPORT IT SUMMIT

CYBER SECURITY AIR TRANSPORT IT SUMMIT CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER

More information

CURRENT EMPLOYMENT OPPORTUNITIES QUALIFICATION SHEET

CURRENT EMPLOYMENT OPPORTUNITIES QUALIFICATION SHEET CURRENT EMPLOYMENT OPPORTUNITIES QUALIFICATION SHEET This position is currently vacant within the Tollway. The Human Resources Section will accept applications, with resumes from: Resumes are required

More information

Service Description: Cisco Technical Services Advantage (Releases 1.0 through 2.3)

Service Description: Cisco Technical Services Advantage (Releases 1.0 through 2.3) Page 1 of 8 Service Description: Cisco Technical Services Advantage (Releases 1.0 through 2.3) This document describes Cisco Technical Services Advantage support services. Related Documents: This document

More information

How Boards use the NIST Cybersecurity Framework as a Roadmap to oversee cybersecurity

How Boards use the NIST Cybersecurity Framework as a Roadmap to oversee cybersecurity How Boards use the NIST Cybersecurity Framework as a Roadmap to oversee cybersecurity Why is the NIST framework important? GOH Seow Hiong Executive Director, Global Policy & Government Affairs, Asia Pacific

More information

Heavy Vehicle Cyber Security Bulletin

Heavy Vehicle Cyber Security Bulletin Heavy Vehicle Cyber Security Update National Motor Freight Traffic Association, Inc. 1001 North Fairfax Street, Suite 600 Alexandria, VA 22314 (703) 838-1810 Heavy Vehicle Cyber Security Bulletin Bulletin

More information

भ रत य ररज़र व ब क. Setting up and Operationalising Cyber Security Operation Centre (C-SOC)

भ रत य ररज़र व ब क. Setting up and Operationalising Cyber Security Operation Centre (C-SOC) Annex-2 Setting up and Operationalising Cyber Security Operation Centre (C-SOC) Introduction 1 - Banking Industry in India has evolved technologically over the years and currently delivering innovative

More information

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need

More information

Cisco Cyber Range. Paul Qiu Senior Solutions Architect

Cisco Cyber Range. Paul Qiu Senior Solutions Architect Cisco Cyber Range Paul Qiu Senior Solutions Architect Cyber Range Service A platform to experience the intelligent Cyber Security for the real world What I hear, I forget What I see, I remember What I

More information

Terms of Reference for the. IFMS Security review consultancy

Terms of Reference for the. IFMS Security review consultancy Ministry of Finance Planning & Economic Development Terms of Reference for the IFMS Security review consultancy Table of Contents 1 Introduction... 1 1.1 Background... 1 1.2 The IFMS Environment... 1 1.3

More information

Canada Life Cyber Security Statement 2018

Canada Life Cyber Security Statement 2018 Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability

More information

Industry Classification Methodology Guide. ISE Cyber Security Industry Classification

Industry Classification Methodology Guide. ISE Cyber Security Industry Classification Industry Classification Methodology Guide ISE Cyber Security Industry Classification 1 Table of Contents Chapter 1. Introduction... 3 Chapter 2. Industry Classification... 4 2.1. Structure and Changes...

More information

The Solution Requirements and considerations

The Solution Requirements and considerations Annex A TERMS OF REFERENCE Virtual Private Network (VPN) tunnel installation and Very Small Aperture Terminal (VSAT) internet connectivity for Migration Information and Data Analysis Systems (MIDAS) at

More information

PULLING OUR SOCS UP VODAFONE GROUP AT RSAC Emma Smith. Andy Talbot. Group Technology Security Director Vodafone Group Plc

PULLING OUR SOCS UP VODAFONE GROUP AT RSAC Emma Smith. Andy Talbot. Group Technology Security Director Vodafone Group Plc #RSAC SESSION ID: AIR-R04 PULLING OUR SOCS UP VODAFONE GROUP AT RSAC 2018 Emma Smith Group Technology Security Director Vodafone Group Plc Andy Talbot Global Head of Cyber Defence Vodafone Group Plc Pulling

More information

Service Description: Cisco Security Implementation Services. This document describes the Cisco Security Implementation Services.

Service Description: Cisco Security Implementation Services. This document describes the Cisco Security Implementation Services. Page 1 of 12 Service Description: Cisco Security Implementation Services This document describes the Cisco Security Implementation Services. Related Documents: This document should be read in conjunction

More information

DISTRICT OF COLUMBIA WATER AND SEWER AUTHORITY ATTACHMENT A A-1: BACKGROUND AND CONTRACTOR QUALIFICATIONS A-2: SCOPE OF WORK

DISTRICT OF COLUMBIA WATER AND SEWER AUTHORITY ATTACHMENT A A-1: BACKGROUND AND CONTRACTOR QUALIFICATIONS A-2: SCOPE OF WORK DISTRICT OF COLUMBIA WATER AND SEWER AUTHORITY ATTACHMENT A A-1: BACKGROUND AND CONTRACTOR QUALIFICATIONS A-2: SCOPE OF WORK GOODS AND SERVICES CONTRACTS Page 1 of 5 RFP 16-PR-DEM-33 Comprehensive All-Hazards

More information

IC32E - Pre-Instructional Survey

IC32E - Pre-Instructional Survey Name: Date: 1. What is the primary function of a firewall? a. Block all internet traffic b. Detect network intrusions c. Filter network traffic d. Authenticate users 2. A system that monitors traffic into

More information

ADIENT VENDOR SECURITY STANDARD

ADIENT VENDOR SECURITY STANDARD Contents 1. Scope and General Considerations... 1 2. Definitions... 1 3. Governance... 2 3.1 Personnel... 2 3.2 Sub-Contractors... 2 3.3. Development of Applications... 2 4. Technical and Organizational

More information

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT Last Revised: 2/1/2017 1. Private Mobile Connection - Custom APN. Pursuant to the terms and conditions of

More information

Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15

Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15 Unit 46: Network Security Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15 Aim To provide learners with opportunities to manage, support and implement a secure network infrastructure

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

David Fletcher Co-Principal Investigator Western Management & Consulting LLC Albuquerque, NM

David Fletcher Co-Principal Investigator Western Management & Consulting LLC Albuquerque, NM Effective Practices for The Protection of Transportation Infrastructure From Cyber Incidents: Executive Briefing Pilot David Fletcher Co-Principal Investigator Western Management & Consulting LLC Albuquerque,

More information

CEF e-invoicing. Presentation to the European Multi- Stakeholder Forum on e-invoicing. DIGIT Directorate-General for Informatics.

CEF e-invoicing. Presentation to the European Multi- Stakeholder Forum on e-invoicing. DIGIT Directorate-General for Informatics. CEF e-invoicing Presentation to the European Multi- Stakeholder Forum on e-invoicing 20 October 2014 DIGIT Directorate-General for Informatics Connecting Europe Facility (CEF) Common financing instrument

More information

Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt

Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA The African Internet Governance Forum - AfIGF2017 5 Dec 2017, Egypt Agenda Why? Threats Traditional security? What to secure?

More information

Network Visibility and Segmentation

Network Visibility and Segmentation Network Visibility and Segmentation 2019 Cisco and/ or its affiliates. All rights reserved. Contents Network Segmentation A Services Approach 3 The Process of Segmentation 3 Segmentation Solution Components

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

Office of Human Resources 3/28/13 Page 1 of 7

Office of Human Resources 3/28/13   Page 1 of 7 JOB FAMILY CONCEPT This job family consists of eight levels of Information Systems Technical work distinguished by the complexity of the responsibilities assigned and characterized by the type of equipment,

More information

Manufacturing security: Bridging the gap between IT and OT

Manufacturing security: Bridging the gap between IT and OT Manufacturing security: Bridging the gap between IT and OT For manufacturers, every new connection point is an opportunity. And a risk. The state of IT/OT security in manufacturing On the plant floor,

More information

Job Descriptions and Person Specifications for Information and Communication Technology (ICT) Officers and Communication Officers

Job Descriptions and Person Specifications for Information and Communication Technology (ICT) Officers and Communication Officers Republic of Uganda Ministry of Public Service Job Descriptions and Person Specifications for Information and Communication Technology (ICT) Officers and Communication Officers Prepared by; Directorate

More information

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT Last Revised: 12/20/17 1. Private Mobile Connection - Custom APN. Pursuant to the terms and conditions of

More information

Cisco Intrusion Detection System User Guide Ace

Cisco Intrusion Detection System User Guide Ace Cisco Intrusion Detection System User Guide Ace attack vector, can be exploited locally on the vulnerable device, require user interaction, Effective use of Cisco Intrusion Prevention System (IPS) event

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

RFP Annex A Terms of Reference UNHCR HQ Data Centre Colocation Service

RFP Annex A Terms of Reference UNHCR HQ Data Centre Colocation Service RFP 2017 845 Annex A Terms of Reference UNHCR HQ Data Centre Colocation Service Version 1 Contents Project objectives... 1 Background... 1 Scope... 1 Timeframe and Cost... 4 Stakeholders, roles and responsibilities...

More information

Law Enforcement Commercial Price List ManTech International Corporation August 2017

Law Enforcement Commercial Price List ManTech International Corporation August 2017 Law Enforcement Commercial Price List ManTech International Corporation August 2017 Table of Contents Rates and Description... 3 General Guidelines... 54 Contact Information... 56 Page - 2 Rates and Description

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

Request for Proposal (RFP)

Request for Proposal (RFP) Request for Proposal (RFP) BOK PENETRATION TESTING Date of Issue Closing Date Place Enquiries Table of Contents 1. Project Introduction... 3 1.1 About The Bank of Khyber... 3 1.2 Critical Success Factors...

More information

INFORMATION RESOURCE SECURITY CONFIGURATION AND MANAGEMENT

INFORMATION RESOURCE SECURITY CONFIGURATION AND MANAGEMENT INFORMATION RESOURCE SECURITY CONFIGURATION AND MANAGEMENT Policy UT Health San Antonio shall adopt and document Standards and Procedures to define and manage a secured operating configuration for all

More information

TSA/FTA Security and Emergency Management Action Items for Transit Agencies

TSA/FTA Security and Emergency Management Action Items for Transit Agencies TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:

More information

Physical security advisory services Securing your organisation s future

Physical security advisory services Securing your organisation s future Physical security advisory services Securing your organisation s future August 2018 KPMG.com/in Physical security threats on the rise In a dynamic geo-political, economic and social environment, businesses

More information

Cyber Security of ETCS

Cyber Security of ETCS 1 Addressing the challenges Cyber Security of ETCS Simon Tonks 2 Background The UK rail network is currently being upgraded to use new signalling technology (ERTMS) The ROSCOs are delivering the First

More information

Cyber Security & Homeland Security:

Cyber Security & Homeland Security: Cyber Security & Homeland Security: Cyber Security for CIKR and SLTT Michael Leking 19 March 2014 Cyber Security Advisor Northeast Region Office of Cybersecurity and Communications (CS&C) U.S. Department

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

Service Description: Advanced Services Configurable (AS-C) Assessment Services

Service Description: Advanced Services Configurable (AS-C) Assessment Services Page 1 of 12 Service Description: Advanced Services Configurable (AS-C) Assessment Services This document describes Advanced Services Configurable Services for Assessment Services activities and deliverables.

More information

POWER AND WATER CORPORATION POLICY MANAGEMENT OF EXTERNAL SERVICE PROVIDERS

POWER AND WATER CORPORATION POLICY MANAGEMENT OF EXTERNAL SERVICE PROVIDERS POWER AND WATER CORPORATION POLICY MANAGEMENT OF EXTERNAL SERVICE PROVIDERS Prepared by: Approved by: Chief Procurement Officer John Baskerville Chief Executive File number: D2015/65737 June 2015 MANAGEMENT

More information

Service Description: Advanced Services Fixed Price Cisco WebEx Advise and Implement Service (0-5,000 Users) (ASF- WBXS-UC-PDIBSE)

Service Description: Advanced Services Fixed Price Cisco WebEx Advise and Implement Service (0-5,000 Users) (ASF- WBXS-UC-PDIBSE) Page 1 of 9 Service Description: Advanced Services Fixed Price Cisco WebEx Advise and Implement Service (0-5,000 Users) (ASF- WBXS-UC-PDIBSE) This document describes Advanced Services Fixed Price Cisco

More information

Aboriginal Affairs and Northern Development Canada. Internal Audit Report Summary. Audit of Information Technology Security.

Aboriginal Affairs and Northern Development Canada. Internal Audit Report Summary. Audit of Information Technology Security. Aboriginal Affairs and Northern Development Canada Internal Audit Report Summary Audit of Information Technology Security Prepared by: Audit and Assurance Services Branch April 2015 NCR#7367040 - NCR#7358318

More information

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS NERC CIP VERSION 6 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements

More information

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

Securing the Empowered Branch with Cisco Network Admission Control. September 2007 Securing the Empowered Branch with Cisco Network Admission Control September 2007 Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. 1 Contents 1 The Cisco Empowered Branch 2 Security Considerations

More information

Professional Training Course - Cybercrime Investigation Body of Knowledge -

Professional Training Course - Cybercrime Investigation Body of Knowledge - Overview The expanded use of the Internet has facilitated rapid advances in communications, systems control, and information sharing. Those advances have created enormous opportunities for society, commerce

More information

REPRESENTING PUBLIC TRANSPORT NETWORKS IN NeTEx

REPRESENTING PUBLIC TRANSPORT NETWORKS IN NeTEx PUBLIC TRANSPORT NETWORK TIMETABLE EXCHANGE (NeTEx) REPRESENTING PUBLIC TRANSPORT NETWORKS IN NeTEx / 1 PUBLIC TRANSPORT NETWORK TIMETABLE EXCHANGE (NeTEx) REPRESENTING PUBLIC TRANSPORT NETWORKS IN NeTEx

More information

NYDFS Cybersecurity Regulations

NYDFS Cybersecurity Regulations SPEAKERS NYDFS Cybersecurity Regulations Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 lsotto@hunton.com www.huntonprivacyblog.com March 9, 2017 The Privacy Team at Hunton & Williams Over 30 privacy

More information

Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS

Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS Can You Answer These Questions? 1 What s my company s exposure to the latest industrial cyber threat? Are my plants

More information

DIABLO VALLEY COLLEGE CATALOG

DIABLO VALLEY COLLEGE CATALOG COMPUTER NETWORK TECHNOLOGY CNT Despina Prapavessi, Dean Math and Computer Sciences Division Math Building, Room 267 Possible career opportunities These CNT-courses prepare students for a career path in

More information

Configuring RADIUS Clients

Configuring RADIUS Clients CHAPTER 8 This chapter describes the following: Overview Adding RADIUS Clients Editing RADIUS Clients Deleting RADIUS Clients Overview Remote Authentication Dial In User Service (RADIUS) is an AAA (authentication,

More information

Service Description: CNS Federal High Touch Technical Support

Service Description: CNS Federal High Touch Technical Support Page 1 of 1 Service Description: CNS Federal High Touch Technical Support This service description ( Service Description ) describes Cisco s Federal High Touch Technical support (CNS-HTTS), a tier 2 in

More information

Incident Response Services

Incident Response Services Services Enhanced with Supervised Machine Learning and Human Intelligence Empowering clients to stay one step ahead of the adversary. Secureworks helps clients enable intelligent actions to outsmart and

More information

APEX in Security. AFI SECFAL Plan Steering Committee Montreal, 1 st December 2016

APEX in Security. AFI SECFAL Plan Steering Committee Montreal, 1 st December 2016 APEX in Security AFI SECFAL Plan Steering Committee Montreal, 1 st December 2016 Two different programmes with the common objective of improving security Airport Excellence (APEX) A peer review process

More information

Cisco Advanced Borderless Network Architecture Field Engineer.

Cisco Advanced Borderless Network Architecture Field Engineer. Cisco 700-302 Advanced Borderless Network Architecture Field Engineer http://killexams.com/exam-detail/700-302 Reference: http://www.cisco.com/en/us/prod/switches/ps5718/ps10195/white_paper_c11-514539.html

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

TR TECHNICAL REQUIREMENTS FOR CERTIFICATION BODIES IN THE FIELD OF ROAD TRANSPORT MANAGEMENT SYSTEMS. Approved By:

TR TECHNICAL REQUIREMENTS FOR CERTIFICATION BODIES IN THE FIELD OF ROAD TRANSPORT MANAGEMENT SYSTEMS. Approved By: TECHNICAL REQUIREMENTS FOR CERTIFICATION BODIES IN THE FIELD OF ROAD TRANSPORT MANAGEMENT SYSTEMS Approved By: Chief Executive Officer: Ron Josias Senior Manager: Mpho Phaloane Author: Project Manager:

More information

International Atomic Energy Agency Meeting the Challenge of the Safety- Security Interface

International Atomic Energy Agency Meeting the Challenge of the Safety- Security Interface Meeting the Challenge of the Safety- Security Interface Rhonda Evans Senior Nuclear Security Officer, Division of Nuclear Security Department of Nuclear Safety and Security Outline Introduction Understanding

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

CISCO S SMB STRATEGY & COMMITMENT TO THE SMB CHANNEL

CISCO S SMB STRATEGY & COMMITMENT TO THE SMB CHANNEL CISCO S SMB STRATEGY & COMMITMENT TO THE SMB CHANNEL Dale Bristow, National Manager, Small and Medium Business Cisco Canada Cisco Business Solutions Workshop for Resellers Canada 2004 1 SMB Market expected

More information

IEC A cybersecurity standard approaching the Rail IoT

IEC A cybersecurity standard approaching the Rail IoT IEC 62443 A cybersecurity standard approaching the Rail IoT siemens.com/communications-for-transportation Today s Siemens company structure focusing on several businesses Siemens AG Power and Gas (PG)

More information

emarketeer Information Security Policy

emarketeer Information Security Policy emarketeer Information Security Policy Version Date 1.1 2018-05-03 emarketeer Information Security Policy emarketeer AB hereafter called emarketeer is a leading actor within the development of SaaS-service

More information

Bonnie A. Goins Adjunct Industry Professor Illinois Institute of Technology

Bonnie A. Goins Adjunct Industry Professor Illinois Institute of Technology Bonnie A. Goins Adjunct Industry Professor Illinois Institute of Technology It s a hot topic!! Executives are asking their CISOs a LOT of questions about it Issues are costly, from a financial and a reputational

More information

Cyber Risks in the Boardroom Conference

Cyber Risks in the Boardroom Conference Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks

More information

Managed Network Services. Managing your network to enable your digital business

Managed Network Services. Managing your network to enable your digital business Managed Network Services Managing your network to enable your digital business Your network more efficient today, more effective tomorrow How can you optimise cost and performance today, and help your

More information

Veirs Mill Road Metrobus Improvements Request to Conduct Public Hearing

Veirs Mill Road Metrobus Improvements Request to Conduct Public Hearing Customer Services, Operations, and Safety Committee Board Information Item III-B September 24, 2009 Veirs Mill Road Metrobus Improvements Request to Conduct Public Hearing Washington Metropolitan Area

More information

Automated Firewall Change Management Securing change management workflow to ensure continuous compliance and reduce risk

Automated Firewall Change Management Securing change management workflow to ensure continuous compliance and reduce risk Automated Firewall Change Management Securing change management workflow to ensure continuous compliance and reduce risk Skybox Security Whitepaper January 2015 Executive Summary Firewall management has

More information

AFRICA AND MIDDLE EAST AVIATION SECURITY ROADMAP

AFRICA AND MIDDLE EAST AVIATION SECURITY ROADMAP AFRICA AND MIDDLE EAST AVIATION SECURITY ROADMAP GASeP: The Roadmap to foster Aviation Security in Africa and the Middle East Sharm El Sheikh, Egypt, 22-24 August 2017 REGIONAL MINISTERIAL CONFERENCE ON

More information

Service Description of Advanced Services: Focused Technical Support and Network Optimization Support

Service Description of Advanced Services: Focused Technical Support and Network Optimization Support Back to Table of Contents Service Description of Advanced Services: Focused Technical Support and Network Optimization Support This document describes Focused Technical Support (FTS) and Network Optimization

More information

PTV VISUM - BASE. Introduction to macroscopic network modelling with PTV Visum. PRICE: ####,- DHS plus VAT SHORT DESCRIPTION TARGET GROUP

PTV VISUM - BASE. Introduction to macroscopic network modelling with PTV Visum. PRICE: ####,- DHS plus VAT SHORT DESCRIPTION TARGET GROUP PTV VISUM BASIC PTV VISUM - BASE Introduction to macroscopic network modelling with PTV Visum You will learn how to handle the objects of both private and public transport network and the processing of

More information

Education Network Security

Education Network Security Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or

More information

COMMON MODULES: Aerospace Electronics, Computer & Mobile Technology, and Microelectronics specialisations and the Minor in Business Management

COMMON MODULES: Aerospace Electronics, Computer & Mobile Technology, and Microelectronics specialisations and the Minor in Business Management COURSE MODULES LEVEL 3.1 & 3.2 6-Month Internship In this module, students will be attached to sponsoring companies for a period of approximately six months. During their internships, students will undertake

More information

PCI Compliance Simplified A Case of Airport Parking System PCI Readiness

PCI Compliance Simplified A Case of Airport Parking System PCI Readiness PCI Compliance Simplified A Case of Airport Parking System PCI Readiness Customer Info: Industry: Travel, Transportation & Logistics Customer: A Group of Major Airports Region: Americas Country: United

More information

Summary of FERC Order No. 791

Summary of FERC Order No. 791 Summary of FERC Order No. 791 On November 22, 2013, the Federal Energy Regulatory Commission ( FERC or Commission ) issued Order No. 791 adopting a rule that approved Version 5 of the Critical Infrastructure

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive

More information

Your Trusted Partner in Europe European Business Reliance Centre

Your Trusted Partner in Europe European Business Reliance Centre Your Trusted Partner in Europe European Business Reliance Centre Fit4Exchange 23 Septembre 2015 ebrc.com 24/09/2015 Public 1 EBRC -European Business Reliance Centre Our vision: To be the Centre of Excellence

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au

More information

Converged Security - Protect your Digital Enterprise May 24, Copyright 2016 Vivit Worldwide

Converged Security - Protect your Digital Enterprise May 24, Copyright 2016 Vivit Worldwide Converged Security - Protect your Digital Enterprise May 24, 2016 Copyright 2016 Vivit Worldwide Brought to you by Copyright 2016 Vivit Worldwide Hosted By Richard Bishop Vivit Board United Kingdom Chapter

More information

IMPACT Global Response Centre. Technical Note GLOBAL RESPONSE CENTRE

IMPACT Global Response Centre. Technical Note GLOBAL RESPONSE CENTRE Technical Note GLOBAL RESPONSE CENTRE INTRODUCTION IMPACT s Global Response (GRC) acts as the foremost cyber threat resource centre for the global. It provides emergency response to facilitate identification

More information