NHS Wales. Dr Carwyn Lloyd-Jones
|
|
- Briana Bailey
- 5 years ago
- Views:
Transcription
1 NHS Wales Dr Carwyn Lloyd-Jones
2 NHS Wales Provision of National Health Services in Wales is devolved to Welsh Government Policy/Strategy in England does not apply in Wales Budget into Wales is calculated according to Barnett formula 10 legal entities 7 x Local Health Board
3 NHS Wales Provision of National Health Services in Wales is devolved to Welsh Government Policy/Strategy in England does not apply in Wales Budget into Wales is calculated according to Barnett formula 10 legal entities 7 x Local Health Board 3 x all-wales Trusts Ambulance, Velindre (Cancer) and Public Health NHS Wales does not exist as an entity Public don t care about organisational boundaries. They just see the NHS
4 NHS Wales 20 x large hospital sites Lots of community hospitals/clinics 440 GP practices, 600 sites 15 IT departments 90,000 users 65,000 computers 5,000 servers 1,000s of IOT 1 network Connections to N3, UAs, Welsh Gov, etc 1 Active Directory Domain (almost)
5 NHS Wales Informatics Service National IT + Information organisation for NHS Wales >600 staff, 5 offices Provide ~100 systems/services to NHS Wales orgs Clinical systems Pathology, Radiology, Cancer, etc Infrastructure services AD, DNS, Internet, , Skype, etc Security services Manage all IT in GP practices across Wales 10,000 PCs, 12,000 users Provide IT services to small NHS organisations 2,000 servers 2 data centres + smaller server rooms Hosted by Velindre NHS Trust
6 WannaCry
7 Cyber Security in NHS Wales - The strategic challenges Dr Carwyn Lloyd-Jones
8 Summary Who is responsible? Coordination across the UK GDPR and NIS-D Staffing Investment All-Wales initiatives under way
9 Who is responsible?
10 Quick recap. 20 x large hospital sites Lots of community hospitals/clinics 440 GP practices, 600 sites 15 IT departments 90,000 users 65,000 computers 5,000 servers 1,000s of IOT 1 network Connections to N3, UAs, Welsh Gov, etc 1 Active Directory Domain (almost)
11 Who is responsible? 10 x legal entities? Chief Execs / SIROs / Associate Director for IT? 15 x IT departments? NWIS? Welsh Government Cabinet Secretary (Minister)? Civil Service? NHS Digital? National Cyber Security Centre?
12 Who is responsible? Technically = 10 x legal entities These would be the people that get the fines from the ICO In practice, we work collaboratively across the various organisations The challenge is not unique to Cyber Security. Same challenges exists for measles outbreaks, major incidents, etc. Not always easy Different orgs have different risk appetites Different people have different views However it is a small community <15 significant IT departments Having capable and trusted leaders is critical
13 Operational Strategic Governance Cyber security is on the agenda at all levels of NHS Wales Welsh Government National Informatics Management Board SIRO peer group Associate Directors of Informatics Infrastructure Management Board Operational Security Services Management Board + others
14 Coordination across the UK Cyber attacks/threats have no boundaries NHS Wales network is connected to N3 network in England, which is connected to Scotland, Northern Ireland, Isle-of-man, etc. NWIS co-ordinate response in Wales, liaising with: CymruWARP Unitary Authorities
15 GDPR and NIS-D General Data Protection Regulations come into force in May 2018 Replaces the Data Protection Act (1998) More responsibilities Bigger fines Tighter timelines for reporting (72 hours) Fine for not reporting - 10 million Euros or 2 per cent of your global turnover Maximum fines of 20m or 4% of global turnover
16 NIS Directive Directive with the aim of increasing the security of Network and Information Systems (NIS) within the European Union (EU) Applies to Operators of Essential Services (OES) Water companies, Energy Companies, Oil/Gas distribution Transport Rail, Air, Maritime, Local Health Boards and NHS Trusts in Wales Comes into UK May 2018 Maximum fines of 20m or 4% of global turnover
17 Staffing General shortage of good IT staff in Wales NHS Salaries cannot compete with private sector But, lots of benefits pension, flexible working, etc Public Sector Bodies keep poaching candidates from each other Even bigger challenge for Cyber Security Very difficult to recruit suitably skilled candidates Looking at various options Working with Universities placements, projects, etc. Training other staff who want to work in Cyber Security Outsourcing certain elements to private sector
18 Investment Public sector purse is not full right now. However, WG and Cabinet Secretary have and are investing in Cyber Most goes on replacing old equipment
19 NHS Wales Cyber Security Initiatives Welsh Cyber Assurance Programme Including an external review of controls and capabilities Development of minimum standards for NHS Wales Strengthening our Cyber Security Incident Response Plans Lessons learnt from WannaCry Developing a cloud policy for NHS Wales Piloting (12,000 users!) with Office365 Security Monitoring SIEM Developing improved Security Awareness materials/processes Enhanced testing of backup/restores/dr processes Strengthening contractual arrangements with 3 rd party suppliers
20 Questions? Thank you for listening
Regulating Cyber: the UK s plans for the NIS Directive
Regulating Cyber: the UK s plans for the NIS Directive September 2017 If you are a digital service provider or operate an essential service then new security and breach notification obligations may soon
More informationThe NIS Directive and Cybersecurity in
The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationDirective on security of network and information systems (NIS): State of Play
Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission
More informationDfT Policy Overview Rod Paterson
Ports Policy - BPA conference, 3 November 2016 1 DfT Policy Overview Rod Paterson BPA CONFERENCE 18 October 2017 October 17 Plan for my session this morning 1. Update on changes in structures 2. Reflections
More informationENISA EU Threat Landscape
ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key
More informationCreating NIS Compliant Country in a Non-Regulated Environment. Jurica Čular
Creating NIS Compliant Country in a Non-Regulated Environment Jurica Čular (jcular@zsis.hr) What NIS actually is? NIS Directive NIS Network Information Security Directive EU Cyber Security Policy Mandatory
More informationCyber Review Sample report
IT Governance Cyber Review Sample report Protect Comply Thrive Cyber Review Report Prepared for Evelyn Murphy, Chief Information Officer, Baratheon PLC HLCR Sample Report Copyright IT Governance Ltd 2017
More informationDirective on Security of Network and Information Systems
European Commission - Fact Sheet Directive on Security of Network and Information Systems Brussels, 6 July 2016 Questions and Answers The European Parliament's plenary adopted today the Directive on Security
More informationMINIMUM SYSTEM SPECIFICATION (MSS)
MINIMUM SYSTEM SPECIFICATION (MSS) PROCESSES AND PROCEDURES FOR NHS WALES COMPLIANT SYSTEMS [Summary Document] MSS Scheme Development Processes and Procedures 1.0 PURPOSE This document describes the NHS
More informationCybersecurity Considerations for GDPR
Cybersecurity Considerations for GDPR What is the GDPR? The General Data Protection Regulation (GDPR) is a brand new legislation containing updated requirements for how personal data of European Union
More informationJUSTICE SUB-COMMITTEE ON POLICING AGENDA. 2nd Meeting, 2014 (Session 4) Thursday 20 February 2014
JSP/S4/14/2/A JUSTICE SUB-COMMITTEE ON POLICING AGENDA 2nd Meeting, 2014 (Session 4) Thursday 20 February 2014 The Sub-Committee will meet at 1.00 pm in Committee Room 6. 1. Decision on taking business
More informationCYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response
CYBER INCIDENT REPORTING GUIDANCE Industry Reporting Arrangements for Incident Response DfT Cyber Security Team CYBER@DFT.GSI.GOV.UK Introduction The Department for Transport (DfT) has produced this cyber
More informationEuropean Union Agency for Network and Information Security
Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency
More informationNHS Scotland Cyber Attack: NSS Evidence to Scottish Parliament Health & Sport Committee (Jun 17)
B/17/74 NSS Formal Board Meeting Thursday, 29 June 2017 NHS Scotland Cyber Attack: NSS Evidence to Scottish Parliament Health & Sport Committee (Jun 17) Purpose The Board is asked to review and consider
More informationENISA Cooperation in the EU / NIS Directive
ENISA Cooperation in the EU / NIS Directive Paulo Empadinhas Head of Administration & Stakeholders Relations IT STAR Milan, Italy 28 th October 2016 European Union Agency for Network and Information Security
More informationProtecting information across government
Report by the Comptroller and Auditor General Cabinet Office Protecting information across government HC 625 SESSION 2016-17 14 SEPTEMBER 2016 4 Key facts Protecting information across government Key facts
More informationNIS-Directive and Smart Grids
NIS-Directive and Smart Grids Workshop on European Smart Grid Cybersecurity: Emerging Threats and Countermeasures Marie Holzleitner Table of Content Aims & Objectives Affected Parties Selected Requirements
More informationPackage of initiatives on Cybersecurity
Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating
More informationCyber Diligence. EY Deals Forum Ian McCaw EY Transaction Advisory Services
Cyber Diligence EY Deals Forum 2018 Ian McCaw EY Transaction Advisory Services Finance & Commercial Diligence 2 B COMPANY: Power Life INDUSTRY: ENERGY REVENUE: 192m EBITDA: 875k (35% growth in 5 years)
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationDiscussion on MS contribution to the WP2018
Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several
More informationEuropean Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016
European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016 Présentation Géraud Canet geraud.canet@cea.fr ABOUT THE CYBERSECURITY cppp 3 AIM 1. Foster cooperation between public
More informationEU Data Protection Triple Threat for May of 2018 What Inside Counsel Needs to Know
EU Data Protection Triple Threat for May of 2018 What Inside Counsel Needs to Know The General Data Protection Regulation (GDPR) The eprivacy Regulation (epr) The Network and Information Security Directive
More informationNetwork and Information Security Directive
Network and Information Security Directive Provisions + ENISA s activities Dr Evangelos Ouzounis Head of Secure Infrastructure and Services Unit, ENISA European Union Agency for Network and Information
More informationHow icims Supports. Your Readiness for the European Union General Data Protection Regulation
How icims Supports Your Readiness for the European Union General Data Protection Regulation The GDPR is the EU s next generation of data protection law. Aiming to strengthen the security and protection
More informationCYBER SECURITY AIR TRANSPORT IT SUMMIT
CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER
More informationIn Accountable IoT We Trust
In Accountable IoT We Trust AIOTI WG3 Security & Privacy-in-IoT Taskforces, and H2020 CSA CREATE-IoT & LSPs AG Trust in IoT Arthur van der Wees Managing Director Arthur s Legal, the global tech-by-design
More informationThe Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017
The Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017 European Union Agency for Network and Information Security Positioning ENISA
More informationWhat is the Northern Ireland ehealth and Care strategy?
What is the Northern Ireland ehealth and Care strategy? The regional ehealth and Care strategy provides a framework and plan for regional coordination and collaboration to further develop ehealth in Northern
More informationGB experience with smart meters
Presentation by Energy UK Best practice for a successful smart technology roll-out Lessons learnt and recommendations from first movers GB experience with smart meters Introduction to Energy UK and the
More informationCYBER SECURITY AND THE PENSIONS INDUSTRY Karen Tasker 1 February 2018
CYBER SECURITY AND THE PENSIONS INDUSTRY Karen Tasker 1 February 2018 What s the relevance for pension schemes? What do cyber risks look like? What should Trustees be doing? Cyber risk means any risk of
More informationTo be an active partner, always ready to improve by working with others
Title of Report: Prepared By: Sponsor: Action Required: Statement of Assurance/Readiness Preparedness to Major Incidents Ben Cockerill, Emergency Planning Officer Kevin O Leary, Deputy Director of Operations
More informationSecuring Europe's Information Society
Securing Europe's Information Society Dr. Udo Helmbrecht Executive Director European Network and Information Security Agency 16 June 2010 FIRST AGM Miami 16/6/2010 1 Agenda ENISA overview Challenges EU
More informationBirmingham Community Healthcare NHS Foundation Trust. 2017/17 Data Security and Protection Requirements March 2018
1.0 Executive Summary Birmingham Community Healthcare NHS Foundation Trust 2017/17 Data Security and Protection Requirements March 2018 The Trust has received a request from NHS Improvement (NHSI) to self-assess
More informationBHConsulting. Your trusted cybersecurity partner
Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised
More informationInfrastructures and Service Dimitra Liveri Network and Information Security Expert, ENISA
Security and resilience for ehealth Infrastructures and Service Dimitra Liveri Network and Information Security Expert, ENISA European Union Agency For Network And Information Security Securing Europe
More informationTransforming the utilities industry. How our insight and infrastructure can help you thrive in a changing world
Transforming the utilities industry How our insight and infrastructure can help you thrive in a changing world The utilities industry is changing You need to be leaner, greener and smarter. And we re here
More informationFuture-Proof Security & Privacy in IoT
All rights reserved, Arthur s Legal B.V. Future-Proof Security & Privacy in IoT From State of Play, To State of The Art Arthur van der Wees, LLM Managing Director Arthur s Legal, the global tech-by-design
More informationPoland: Initiative for Polish Industry 4.0 The Future Industry Platform
Digital Transformation Monitor Poland: Initiative for Polish Industry 4.0 The Future Industry Platform February 2018 Internal Market, Industry, Entrepreneurshi p and SMEs Skitterphoto/Pexels.com Country:
More informationInformation backup - diagnostic review Abertawe Bro Morgannwg University Health Board. Issued: September 2013 Document reference: 495A2013
Information backup - diagnostic review Abertawe Bro Morgannwg University Health Board Issued: September 2013 Document reference: 495A2013 Status of report This document has been prepared for the internal
More informationBOARD OF DIRECTORS (OPEN) Meeting Date: 14 th November 2018
BORD OF DIRECTORS (OPEN) Meeting Date: 14 th November 2018 Open BoD 14.11.18 Item 14 TITLE OF PPER TO BE PRESENTED BY CTION REQUIRED Senior Information Risk Owner (SIRO) nnual Report Phillip Easthope,
More informationExecutive Insights. Protecting data, securing systems
Executive Insights Protecting data, securing systems February 2018 Protecting data, securing systems Product and information security is a combination of education, policies and procedures, physical security
More informationAndrew Durant/Ellen Sullivan
AGENDA ITEM: 3.5 INFORMATION MANAGEMENT, TECHNOLOGY AND GOVERNANCE COMMITTEE DATE OF MEETING: 2 OCTOBER 2018 Subject : Approved and Presented by: Prepared by: Other Committees and meetings considered at:
More informationUsing Blockchain for Consent and Access to Private and Sensitive Data in the GDPR Environment
Using Blockchain for Consent and Access to Private and Sensitive Data in the GDPR Environment Gary Leeming, Chief Technology Officer Connected Health Cities, University of Manchester 1 Connected Health
More informationUnclassified. Date Monday 24 September Business Continuity Plan Review - Mission Critical Activities
Meeting Paper title Executive Team Date Monday 24 September Business Continuity Plan Review - Mission Critical Activities Agenda item 5 Discussion time Purpose of paper Decision [If a decision you must
More informationAneurin Bevan Health Board
Aneurin Bevan Health Board Information Governance Committee Minutes of the meeting held on 10 February 2010, 2pm, in the Small Boardroom, Mamhilad House Present: Prof Janet Wademan - Independent Member
More informationConducting a data flow mapping exercise under the GDPR. Presented by: Alan Calder, founder and executive chairman, IT Governance 4 October 2017
Conducting a data flow mapping exercise under the GDPR Presented by: Alan Calder, founder and executive chairman, IT Governance 4 October 2017 TM Introduction Alan Calder Founder of IT Governance The single
More informationAn overview of the ehealth Strategy for NSW Health: & an update on key projects
ehealth NSW An overview of the ehealth Strategy for NSW Health: 2016-2026 & an update on key projects Dr Zoran Bolevich Chief Executive, Chief Information Officer 22 September 2016 1 ehealth NSW Established
More informationSPECIALIST CYBER SECURITY SERVICES & CYBER VULNERABILITY HEALTH CHECK FOR SMALLER COMPANIES
SPECIALIST CYBER SECURITY SERVICES & CYBER VULNERABILITY HEALTH CHECK FOR SMALLER COMPANIES Dear Executive, you requested more information, here are three quick questions Would you know if your company
More informationehealth Ministerial Conference 2013 Dublin May 2013 Irish Presidency Declaration
ehealth Ministerial Conference 2013 Dublin 13 15 May 2013 Irish Presidency Declaration Irish Presidency Declaration Ministers of Health of the Member States of the European Union and delegates met on 13
More informationPS Mailing Services Ltd Data Protection Policy May 2018
PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect
More informationReturn on Investment and ICT Skills
Return on Investment and ICT Skills Piotr Mrozinski - Regional Manager CEE Baltic IT&T, April 2009 Agenda: ECDL and ECDL Foundation ROI and ICT Skills ECDL Foundation Not for profit global governing body
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationCybersecurity & Digital Privacy in the Energy sector
ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European
More informationCommissioner Ian Dyson SRO, National Enabling Programmes IMORCC
Commissioner Ian Dyson SRO, National Enabling Programmes IMORCC 24 January 2018 National Enabling Programmes Chiefs Council. January 2018 The Sympathy Card What are the major components that the NEP programme
More informationThe Role of the Data Protection Officer
The Role of the Data Protection Officer Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 28 July 2016 www.itgovernance.co.uk Introduction Adrian Ross GRC consultant Infrastructure services
More informationEU General Data Protection Regulation (GDPR) Achieving compliance
EU General Data Protection Regulation (GDPR) Achieving compliance GDPR enhancing data protection and privacy The new EU General Data Protection Regulation (GDPR) will apply across all EU member states,
More informationThe National Fire Chiefs Council. Roy Wilsher Chair National Fire Chiefs Council
The National Fire Chiefs Council Roy Wilsher Chair National Fire Chiefs Council @NFCCChair @NFCC_FireChiefs NFCC Drivers for Change NFCC important contribution to supporting FRAs and the UK Fire Sector;
More informationTransforming the UK police force through digital technology. Switch to a new way of working with BT
Transforming the UK police force through digital technology Switch to a new way of working with BT Digital technology can improve every aspect of 21st century policing In recent years, policing in the
More informationManaged IT Solutions. What we do. Capita Managed IT Solutions. making IT work
Managed IT Solutions What we do Capita Managed IT Solutions making IT work 2 Capita Managed IT Solutions provides cloud based and ICT infrastructure solutions and specialist managed services to the education,
More informationEuropean Cybersecurity cppp and ECSO. org.eu
European Cybersecurity cppp and ECSO www.ecs org.eu ABOUT THE EUROPEAN CYBERSECURITY PPP A EUROPEAN PPP ON CYBERSECURITY The European Commission has signed on July 2016 a PPP with the private sector for
More informationAGENDA ITEM: 3.4 DATE OF MEETING: 3 MAY 2018 INFORMATION MANAGEMENT, TECHNOLOGY & GOVERNANCE COMMITTEE
AGENDA ITEM: 3.4 INFORMATION MANAGEMENT, TECHNOLOGY & GOVERNANCE COMMITTEE DATE OF MEETING: 3 MAY 2018 Subject: Approved and Presented by: Prepared by: Other Committees and meetings considered at: Considered
More informationCybersecurity and Commercial Aviation
Cybersecurity and Commercial Aviation Pascal ANDREI Chief Security Officer Airbus Group Jim Vasatka Director, Aviation Security Boeing Commercial Airplanes Agenda Aviation Cybersecurity External Drivers
More informationManchester Metropolitan University Information Security Strategy
Manchester Metropolitan University Information Security Strategy 2017-2019 Document Information Document owner Tom Stoddart, Information Security Manager Version: 1.0 Release Date: 01/02/2017 Change History
More informationCybersecurity Policy in the EU: Security Directive - Security for the data in the cloud
Cybersecurity Policy in the EU: The Network and Information Security Directive - Security for the data in the cloud Microsoft Commitment to Cybersecurity Security at the heart of our products and services
More informationSecurity in Today s Insecure World for SecureTokyo
Security in Today s Insecure World for SecureTokyo David Shearer (ISC) 2 Chief Executive Officer dshearer@isc2.org www.isc2.org I m Influenced by a Mission Driven Background U.S. Maritime Transportation
More informationManaged IT Solutions. What we do. Capita Managed IT Solutions. making IT work
Managed IT Solutions What we do Capita Managed IT Solutions making IT work 2 3 Locations Capita Managed IT Solutions provides cloud based and ICT infrastructure solutions and specialist managed services
More informationCity, University of London Institutional Repository. This version of the publication may differ from the final published version.
City Research Online City, University of London Institutional Repository Citation: Collins, D. A. & Klotz, E. (2018). GDPR and E-Commerce. City, University of London. This is the published version of the
More informationCall for Expressions of Interest
Call for Expressions of Interest ENISA M/CEI/17/T01 Experts for assisting in the implementation of the annual ENISA Work Programme TECHNICAL DESCRIPTION CONTENTS TECHNICAL DESCRIPTION... 3 1. INTRODUCTION...
More informationQualification Specification. Level 2 Award in Cyber Security Awareness For Business
Qualification Specification Level 2 Award in Cyber Security Awareness For Business ProQual 2015 Contents Page Introduction 3 Qualification profile 3 Centre requirements 4 Support for candidates 4 Assessment
More informationWelcome John Harris, Director General
Business Plan 2018 Welcome John Harris, Director General Agenda - speakers Chief Minister, Senator Ian Gorst, Government of Jersey Key highlights of Lord Eatwell, Chairman, JFSC Strategic and major priorities
More informationDigital Health Cyber Security Centre
Digital Health Cyber Security Centre Current challenges Ransomware According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. Distributed Denial of Service (DDoS) Targeting
More informationGDPR: A QUICK OVERVIEW
GDPR: A QUICK OVERVIEW 2018 Get ready now. 29 June 2017 Presenters Charles Barley Director, Risk Advisory Services Charles Barley, Jr. is responsible for the delivery of governance, risk and compliance
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate
More informationHorizon Nuclear Power
Horizon Nuclear Power Experience of Developing and Building ABWRs in the UK Dr Janet Wilson Director of Licensing and Permissions IAEA Technical Meeting, Vienna 4 February 2014 Horizon Nuclear Power Established
More informationIncident Response. Tony Drewitt Head of Consultancy IT Governance Ltd
Incident Response Tony Drewitt Head of Consultancy IT Governance Ltd www.itgovernance.co.uk IT Governance Ltd: GRC One-Stop-Shop Thought Leaders Specialist publisher Implementation toolkits ATO Consultants
More informationHorizon 2020 Security
Horizon 2020 Security Best Practices for Security Proposal Writing Armand Nachef Coordinator of the French Security NCP Consortium, CEA armand.nachef@cea.fr KEY MESSAGES FOR PUTTING TOGETHER A HORIZON
More information5G Testbeds and Trials. Programme Strategy and Structure
5G Testbeds and Trials Programme Strategy and Structure 1 What s driving the DCMS programme? Industry evolving UK Digital opportunity Improving coverage 85% of premises now have mobile data coverage indoors,
More informationHow we do ehealth in NHS Scotland
Implementing strategies & infrastructures for ehealth or How we do ehealth in NHS Scotland Julie Falconer NHS for Scotland s 5.2m people NHS devolved to Scottish parliament Scottish Government Health &
More informationYou can access the AIMS user guide in the Related Links section at the top right of the page.
Tender response form Click on any of the underlined headings to start your form. Once you have completed all mandatory questions within a section and moved to the next, you will see a tick appear on the
More informationResilience, Deterrence and Defence: Building strong cybersecurity for the EU
Resilience, Deterrence and Defence: Building strong cybersecurity for the EU 1 Building strong cybersecurity for the EU: Resilience, Deterrence and Defence From reactive to pro-active and cross-policy
More informationWiebe Ruttenberg & Emran Islam DG Market Infrastructure & Payments. From Cyber Threats via Cyber Security to Cyber Resilience
Wiebe Ruttenberg & Emran Islam DG Market Infrastructure & Payments From Cyber Threats via Cyber Security to Cyber Resilience AMISeCo meeting, 7 March 2017 Rubric Cyber threats landscape Cyber threats are
More informationCOMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document
EUROPEAN COMMISSION Strasbourg, 7.2.2013 SWD(2013) 31 final COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT Accompanying the document Proposal for a Directive of the European
More informationGDPR Partner Marketing Campaign Playbook
GDPR Partner Marketing Campaign Playbook GDPR What is it and why it matters? Organizational Impact: Organizations must appoint a Data Protection Officer, train stakeholders on handling personal and sensitive
More informationSwedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation
Think Cloud Compliance Case Study Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation Customer details : Collector Bank - Sweden 329 employees www.collector.se/en Banking
More informationInternational nuclear business opportunities
1 International nuclear business opportunities Dr Juan Matthews Technology Specialist Nuclear ALL-ENERGY 2013 CONFERENCE 23 May 2013 2 Who are UKTI? UKTI is the Government organisation that helps UK-based
More informationDisaster recovery strategic planning: How achievable will it be?
April 16 18, 2012 Talking Stick Resort Scottsdale, Arizona Disaster recovery strategic planning: How achievable will it be? Prudence Marasigan Ernst & Young Advisory Services, Senior Manager prudence.marasigan@ey.com
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Officer Senior Vice President, General Counsel and Corporate
More informationCloud Computing: A European Perspective. Rolf von Roessing CISA, CGEIT, CISM International Vice President, ISACA
Cloud Computing: A European Perspective Rolf von Roessing CISA, CGEIT, CISM International Vice President, ISACA Overview Cloud Universe Definitions Cloud Risks in Europe Governance, Risk and Compliance
More informationESRIF & Working Group Innovation WG 9. Alois J. Sieber Chairman ESRIF WG # 9
ESRIF & Working Group Innovation WG 9 Alois J. Sieber Chairman ESRIF WG # 9 Content of this presentation Background ESRIF Security a definition WG INNOVATION Structure Findings (examples) Challenges Evolution
More informationNATIONAL INFRASTRUCTURE COMMISSION CORPORATE PLAN TO
NATIONAL INFRASTRUCTURE COMMISSION CORPORATE PLAN 2017-18 TO 2019-20 CONTENTS Introduction 3 Review of period from October 2015 to end 2016 3 Corporate Governance 4 Objectives and Business Activity Plan
More informationThe ehealth Annual Report aims to highlight the activities within the teams that make up the ehealth Department.
Board paper 18/41 THE STATE HOSPITALS BOARD FOR SCOTLAND Date of Meeting: 28 June 2018 Agenda Reference: Item No: 21 Sponsoring Director: Author(s): Title of Report: Purpose of Report: Finance and Performance
More informationA sustainable approach to property rationalisation and cost savings Sustainability---the new dynamic
A sustainable approach to property rationalisation and cost savings Sustainability---the new dynamic NHS Sustainable Development Conference 14 th February 2012 John Pike BSc FRICS CRE Associates Founded
More informationIT risks and controls
Università degli Studi di Roma "Tor Vergata" Master of Science in Business Administration Business Auditing Course IT risks and controls October 2018 Agenda I IT GOVERNANCE IT evolution, objectives, roles
More informationEarth Observation, Climate and Space for Smarter Government
Earth Observation, Climate and Space for Smarter Government Beth Greenaway, Head of Earth Observation 30 March 2015 http://www.bis.gov.uk/ukspaceagency Overview UK Space Agency EO Importance and priorities
More informationSRM Service Guide. Smart Security. Smart Compliance. Service Guide
SRM Service Guide Smart Security. Smart Compliance. Service Guide Copyright Security Risk Management Limited Smart Security. Smart Compliance. Introduction Security Risk Management s (SRM) specialists
More informationRobert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group
Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group Presentation Objectives Introductions Cyber security context Cyber security in the maritime sector Developing cybersecurity
More informationNERC Staff Organization Chart Budget 2018
NERC Staff Organization Chart Budget 2018 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate
More informationEnhancing the security of CIIPs in Europe - ENISA s Approach Dimitra Liveri Network and Information Security Expert
Enhancing the security of CIIPs in Europe - ENISA s Approach Dimitra Liveri Network and Information Security Expert European Union Agency For Network And Information Security Securing Europe s Information
More information