CONNECTING CLOUD ENVIRONMENTS TO HSCN
|
|
- Tracy Horn
- 5 years ago
- Views:
Transcription
1 CONNECTING CLOUD ENVIRONMENTS TO HSCN Anton Murphy Business Development Manager, Redcentric 28 th June 2017 NHS Security & Compliance Day, AWS Summit London Slide 1 Redcentric 2017
2 AGENDA Re-cap N3 Connectivity for AWS UK Region HSCN Consumer Obligations News Connecting to HSCN HSCN: What and When Types of Consumer Procurements Types of HSCN Users Redcentric s Heritage Peering Exchange Redcentric and Health & Care CN-SPs and their Obligations Questions Slide 2 Redcentric 2017
3 RESILIENT N3 ACCESS FOR AWS UK REGION Slide 3 Redcentric 2017
4 MANAGED ON-BOARDING AND COMPLIANCE Pre-Assured Agile Implementation for AWS Reference Architecture & Templates Includes Compliance, Ready-for-Use confirmation (formal Authority to Proceed) and ongoing Redcentric Governance Key Steps: Healthcare Information Governance Connectivity Assurance Process (HIGCAP): N3 Access Application Form, confirmation of NHS Sponsor and business justification details Healthcare Logical Connection Architecture (HCLA): design document for the service Technical Threat Assessment: details the success criteria for the HCLA Associated documentation includes: N3 Connectivity Assurance Policy: statement of what is permitted when using the service N3 Acceptable Use Policy: incorporating signed declaration Slide 4 Redcentric 2017
5 NEWS Slide 5 Redcentric 2017
6 WHAT AND WHEN IS HSCN HSCN IS MADE UP OF SIX KEY COMPONENTS. Slide 6 Redcentric 2017
7 HSCN THE KEY STAGES Peering Exchange deployment DONE Transition Network (TN) implementation by N3SP (BT) underway First HSCN-compliant CN-SPs from May, including Redcentric Proof of Concept migrations underway Early Adopter Programme migrations September Full Migration Waves from December Ramp-up to peak volume of NHS migrations January - May 2018 Transition Plan is managed entirely by Redcentric at YOUR pace N3 and TN will turn off no later than March 2019 CN-SP s Consumer Network Service Provider Services Slide 7 Redcentric 2017
8 TYPES OF HSCN USER Peering Exchange Services Provider Consumer Network Service Providers (CN-SPs) NHS Consumer (Blue Badge) Commercial / NHS Providers / Suppliers (ISV) Ultimately - Citizens / Patients Slide 8 Redcentric 2017
9 PEERING EXCHANGE Slide 9 Redcentric 2017
10 CONSUMER NETWORK SERVICE PROVIDERS (CN-SP) Must meet rigorous HSCN compliance model Provides network services to HSCN consumers Validates HSCN connection agreements Provision of overlay services Provision of Internet access Delivers network controls enforced by the HSCN Programme (Next Slide) Slide 10 Redcentric 2017
11 KEY CN-SP OBLIGATIONS Provide IPFix data to the HSCN SOC from Consumer traffic entering the HSCN Work with HSCN SOC / NHS Digital CareCERT to resolve security incidents Check for malware at Internet breakout points Configure firewalls with minimum ruleset set by NHS Digital policy Use HSCN DNS services for traffic routed through the HSCN Connects Consumers CN-SP s Consumer Network Service Provider Services IPFix Internet Protocol Flow Information Export SOC Security Operations Centre DNS Domain Name Servers Slide 11 Redcentric 2017
12 KEY OBLIGATIONS FOR CONSUMERS THE CONNECTION AGREEMENT REPLACES NHS DIGITAL IGSOC (& REDCENTRIC HIGCAP) FOR ACCESS TO THE NETWORK AND IS DESIGNED TO SIMPLIFY HSCN ONBOARD. Incident reporting Cyber and Information security Network monitoring Securing information Access controls HSCN service information Data protection and processing ** Connection Agreement - Additional Information spreadsheet also needs completing Slide 12 Redcentric 2017
13 CONNECTING TO HSCN Maintenance of IGT still required and you agree to: Maintain your HSCN consumer profile Comply with all applicable IG requirements HSCN Advanced Network Monitoring (ANM) Service packet monitoring and inspection HSCN Network Analytics Service (NAS) will monitor you network connection points NAS Network Analytics Service IGT Information Governance Toolkit IG Information Governance Slide 13 Redcentric 2017
14 TYPES OF CONSUMER PROCUREMENTS Slide 14 Redcentric 2017
15 REDCENTRIC S HERITAGE Slide 15 Redcentric 2017
16 REDCENTRIC AND HEALTH & CARE 110m revenue, 82% recurring, 23% EBITDA and 8% organic growth Managed network and Cloud services are part of our DNA Health and Care is our largest sector Largest N3 Commercial Aggregator e.g. Pharmacy, ISVs, Managed Service Providers Hosting/Cloud Services for National Programmes eg. Spine 2 and e-rs Dec 2016: N3 Connectivity for AWS UK Region Launch Jan 2017: awarded Contract for HSCN Peering Exchange Services May 2017: charter HSCN-compliant CN-SP July 2017: HSCN Connectivity Charging Model for AWS UK Region Customers & APN Consulting Partners Slide 16 Redcentric 2017
17 ANY QUESTIONS? MARK HALL (CHIEF ASSURANCE OFFICER & N3/HSCN TECHNICAL AUTHORITY) TEL: VISIT: Slide 17 Redcentric 2017
HSCN Buying Guide. For new and existing customers. Published October 2017
For new and existing customers Published October 2017 NHS Digital is the trading name of the Health and Social Care Information Centre. Contents Document Purpose 3 HSCN Overview 3 Why do we need HSCN?
More informationHSCN Quality of Service (QoS) Policy
HSCN Quality of Service (QoS) Policy Published March 2018 Copyright 2018 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created by statute,
More informationN4 Design Options. Andy McAnaney DHID VDNS (Voice and Data Networks Services) Team
N4 Design Options N3-JANET gateway N3/N4 high level statements N4 Progress N4 - Achievements to date N4 Key Programme Milestones N4 Engagement Design diagrams Andy McAnaney DHID VDNS (Voice and Data Networks
More informationBirmingham Community Healthcare NHS Foundation Trust. 2017/17 Data Security and Protection Requirements March 2018
1.0 Executive Summary Birmingham Community Healthcare NHS Foundation Trust 2017/17 Data Security and Protection Requirements March 2018 The Trust has received a request from NHS Improvement (NHSI) to self-assess
More informationHSCN. Improving health and care through better connections
HSCN Improving health and care through better connections A modern network for a modern health service The Health and Social Care Network (HSCN) is the new data network for healthcare organisations, from
More informationCommissioning Digital Services for General Practice: GP IT Operating Arrangements, including addendum to the 2016/18 Operating Model
Commissioning Digital Services for General Practice: GP IT Operating Arrangements, including addendum to the 2016/18 Operating Model Sue Cooke, Senior DPC (GP IT) Programme Lead, NHS England Nikki Hinchley,
More informationFederal & NASA IPv6 Updates
Federal & NASA IPv6 Updates LinkedIn Headquarters Sunnyvale, CA Kevin L. Jones NASA IPv6 Transition Manager April 26, 2017 December 1, 2016 September 28, 2010 OMB Memo USG IPv6 Implementation Goals 1.
More informationSERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open
SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationBT CNSP - new solutions for health and social care
BT CNSP - new solutions for health and social care The Health and Social Care Network (HSCN) will provide a reliable and efficient way for health and social care organisations to access and exchange information.
More informationMINIMUM SYSTEM SPECIFICATION (MSS)
MINIMUM SYSTEM SPECIFICATION (MSS) PROCESSES AND PROCEDURES FOR NHS WALES COMPLIANT SYSTEMS [Summary Document] MSS Scheme Development Processes and Procedures 1.0 PURPOSE This document describes the NHS
More informationData Security Standards
Data Security Standards Overall guide The bigger picture of where the standards fit in 2018 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a
More informationAudit Report. Chartered Management Institute (CMI)
Audit Report Chartered Management Institute (CMI) 10 October 2012 Note Restricted or commercially sensitive information gathered during SQA Accreditation monitoring activities is treated in the strictest
More informationSecuring intelligent networks: a guide for CISO and CIOs
Securing intelligent networks: a guide for CISO and CIOs 2 Securing intelligent networks: a guide for CISO and CIOs 3 93% say security is a must have or should have for customers of SD-WAN technology;
More informationHSCIC Audit of Data Sharing Activities:
Directorate / Programme Data Dissemination Services Project / Work Data Sharing Audits Status Final Acting Director Chris Roebuck Version 1.0 Owner Rob Shaw Version issue date 19-Jan-2015 HSCIC Audit of
More informationGuide to ITK Compliant Output Based Specification
Guide to ITK Compliant Output Based Specification Directorate DHID Document Record ID Key Division DS&P/ITK NPFIT-ELIBR-AREL-DST-0420.03 Chief Technology Officer Paul Jones Status Approved Owner Keith
More informationData Protection and GDPR
Data Protection and GDPR At DPDgroup UK Ltd (DPD & DPD Local) we take data protection seriously and have updated all our relevant policies and documents to ensure we meet the requirements of GDPR. We have
More informationCase Study: myaccount
Case Study: myaccount mygovscot myaccount is the simple and secure sign-in service to access online public services provided by eligible public bodies in Scotland. It is the agreed national approach for
More informationNETWORK AND SD-VPN. Meshing legacy and Cloud Service Providers
NETWORK AND SD-VPN NETWORK AND SD-VPN Reduced network overheads and complexity, and an agile approach to Network Transformation. Cloud Gateway lets you reduce appliance sprawl and network aggregation points
More informationUpdate on the Government of Canada s Information Technology Transformation Plan
Update on the Government of Canada s Information Technology Transformation Plan Presentation to the Information Technology Infrastructure Roundtable June 27, 2016 Peter Bruce, Senior Assistant Deputy Minister,
More information2018/19 Addendum to the GP IT Operating Model, Securing Excellence in GP IT Services, Webinar for GPIT Delivery Partners
2018/19 Addendum to the GP IT Operating Model, Securing Excellence in GP IT Services, 2016-18 Webinar for GPIT Delivery Partners Sue Cooke, Senior DPC (GP IT) Programme Lead, NHS England Nikki Hinchley,
More informationCABINET PLANNING SYSTEM PROCUREMENT
Report No: 163/2017 PUBLIC REPORT CABINET 19 September 2017 PLANNING SYSTEM PROCUREMENT Report of the Director for Places (Development & Economy) Strategic Aim: Sustainable Growth Key Decision: Yes Exempt
More informationDFARS Cyber Rule Considerations For Contractors In 2018
Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com DFARS Cyber Rule Considerations For Contractors
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationArchitecture and Standards Development Lifecycle
Architecture and Standards Development Lifecycle Architecture and Standards Branch Author: Architecture and Standards Branch Date Created: April 2, 2008 Last Update: July 22, 2008 Version: 1.0 ~ This Page
More informationCOMPLIANCE IN THE CLOUD
COMPLIANCE IN THE CLOUD 3:45-4:30PM Scott Edwards, President, Summit 7 Dave Harris Society for International Affairs COMPLIANCE IN THE CLOUD Scott Edwards scott.edwards@summit7systems.com 256-541-9638
More informationNetworks
Networks +617 3222 2555 info@citec.com.au Queensland Government Network (QGN) Our Queensland Government Network (QGN) is central to the ICT services we provide. It is a government owned and managed network,
More informationFedRAMP Digital Identity Requirements. Version 1.0
FedRAMP Digital Identity Requirements Version 1.0 January 31, 2018 DOCUMENT REVISION HISTORY DATE VERSION PAGE(S) DESCRIPTION AUTHOR 1/31/2018 1.0 All Initial document FedRAMP PMO i ABOUT THIS DOCUMENT
More informationIntroduction to AWS GoldBase
Introduction to AWS GoldBase A Solution to Automate Security, Compliance, and Governance in AWS October 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document
More informationCuratrix. How can Curatrix Communications help your business? Communications. Connecting your Business
How can Curatrix help your business? Compliant Telephony Solutions We specialise in consolidation of services so that your supply chain remains clear of unnecessary vendors, we understand that there can
More informationCyber Diligence. EY Deals Forum Ian McCaw EY Transaction Advisory Services
Cyber Diligence EY Deals Forum 2018 Ian McCaw EY Transaction Advisory Services Finance & Commercial Diligence 2 B COMPANY: Power Life INDUSTRY: ENERGY REVENUE: 192m EBITDA: 875k (35% growth in 5 years)
More informationHSCN Internet Protocol (IP) addressing policy
HSCN Internet Protocol (IP) addressing policy Published 24 May 2017 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created
More informationCloud Services. Infrastructure-as-a-Service
Cloud Services Infrastructure-as-a-Service Accelerate your IT and business transformation with our networkcentric, highly secure private and public cloud services - all backed-up by a 99.999% availability
More informationCustomer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach
Customer Breach Support A Deloitte managed service Notifying, supporting and protecting your customers through a data breach Customer Breach Support Client challenges Protecting your customers, your brand
More informationFrom Cloud adoption to Cloud first Enabling effective Cloud usage
www.pwc.de/cloud From Cloud adoption to Cloud first Enabling effective Cloud usage May 2017 1 Digitalization Demand Cloud provides the foundation for the digital change in business Cloud provides adoptable
More informationCyber Security in the time of Austerity. Shannon Simpson, CCO CNS Group
Cyber Security in the time of Austerity Shannon Simpson, CCO CNS Group The Austerity Agenda 1. Budgets are being cut. 2. Budgets are harder to compete for. 3. Cyber Security ROI is often hard to demonstrate
More informationTesting for Reliable and Dependable Health Information Exchange
Testing for Reliable and Dependable Health Information Exchange Presented by Didi Davis, Testing Programs Director 1 Copyright 2016 The Sequoia Project. All rights reserved. Discussion Topics 1. ehealth
More informationHow SD-WAN will Transform the Network. And lead to innovative, profitable business outcomes
How SD-WAN will Transform the Network And lead to innovative, profitable business outcomes By 2020, more than 50 percent of WAN edge infrastructure refresh initiatives will be based on SD-WAN versus traditional
More informationRecommendations for Implementing an Information Security Framework for Life Science Organizations
Recommendations for Implementing an Information Security Framework for Life Science Organizations Introduction Doug Shaw CISA, CRISC Director of CSV & IT Compliance Azzur Consulting Agenda Why is information
More informationBT Compute. BT Private Compute. Dedicated cloud infrastructure hosting your IT. BT Compute
BT Compute BT Private Compute Dedicated cloud infrastructure hosting your IT BT Compute IT needs to help organisations be more agile, flexible and efficient, whilst reducing complexity and cost. However,
More informationPublic Safety Canada. Audit of the Business Continuity Planning Program
Public Safety Canada Audit of the Business Continuity Planning Program October 2016 Her Majesty the Queen in Right of Canada, 2016 Cat: PS4-208/2016E-PDF ISBN: 978-0-660-06766-7 This material may be freely
More informationEHR SECURITY POLICIES & SECURITY SITE ASSESSMENT OVERVIEW WEBINAR. For Viewer Sites
EHR SECURITY POLICIES & SECURITY SITE ASSESSMENT OVERVIEW WEBINAR For Viewer Sites Agenda 1 Introduction and EHR Security Policies Background 2 EHR Security Policy Overview 3 EHR Security Policy Assessment
More informationAll Aboard the HIPAA Omnibus An Auditor s Perspective
All Aboard the HIPAA Omnibus An Auditor s Perspective Rick Dakin CEO & Chief Security Strategist February 20, 2013 1 Agenda Healthcare Security Regulations A Look Back What is the final Omnibus Rule? Changes
More informationSIMPLIFIED PROCUREMENT. Consultancy Services for Government
SIMPLIFIED PROCUREMENT Consultancy Services for Government Giving the public sector direct access to SNC-Lavalin s Atkins business, one of the worlds most respected design, engineering and project management
More informationITMC NACO SUMMIT MARCH 3, 2012 HAROLD TUCK CHIEF INFORMATION OFFICER COUNTY OF SAN DIEGO
ITMC NACO SUMMIT MARCH 3, 2012 HAROLD TUCK CHIEF INFORMATION OFFICER COUNTY OF SAN DIEGO County of San Diego County Overview Population 3.1 M Second largest County in CA Fifth largest County in U.S. Total
More informationCrises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.
Crises Control Cloud Security Principles Transputec provides ICT Services and Solutions to leading organisations around the globe. As a provider of these services for over 30 years, we have the credibility
More informationFedRAMP: Understanding Agency and Cloud Provider Responsibilities
May 2013 Walter E. Washington Convention Center Washington, DC FedRAMP: Understanding Agency and Cloud Provider Responsibilities Matthew Goodrich, JD FedRAMP Program Manager US General Services Administration
More informationGlobal Deployment of SD-WAN. Mike Howell October 2017
Global Deployment of SD-WAN Mike Howell October 2017 Rentokil Initial Rentokil Initial is a member of the FTSE100 and is an international pest control and hygiene services company. 35,000+ employees 1800
More informationFUJITSU Cloud Service K5 - API Management Service Description
FUJITSU Cloud Service K5 - API Management Service Description August 8, 2018 1. API Management Service Overview API Management Service is built on Apigee Edge, an integrated API platform product provided
More information14 January 2013 Presented by: Kevin L. Jones Agency IPv6 Transition Manager
NASA IPv6 Implementation Status TIP 2013 Presented by: Kevin L. Jones Agency IPv6 Transition Manager OMB IPv6 Mandate Goals 1. Designate an IPv6 Transition Manager by 10/30/2010 2. Ensure agency procurements
More informationIntroduction to AWS GoldBase. A Solution to Automate Security, Compliance, and Governance in AWS
Introduction to AWS GoldBase A Solution to Automate Security, Compliance, and Governance in AWS September 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document
More informationDigital Health Cyber Security Centre
Digital Health Cyber Security Centre Current challenges Ransomware According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. Distributed Denial of Service (DDoS) Targeting
More informationProvider Monitoring Process
Provider Monitoring Process This statewide provider monitoring process is applicable for all providers including direct vendors, Agency with Choice (AWC) Financial Management Services (FMS) providers and
More informationTransition Network IP Addressing Policy
Transition Network IP Addressing Policy Version 0.5 1 November 2017 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created
More informationArla Foods amba. ISACA Danmark konference William Sharp - CISO
Arla Foods amba ISACA Danmark konference 2014 William Sharp - CISO Information Security Global Risk & Compliance William Sharp, CISO, Arla Foods amba Responsibilities: IS and Cyber Security Strategy, IS
More informationDriving Global Resilience
Driving Global Resilience Steve Mellish FBCI Chairman, The Business Continuity Institute Monday December 2nd, 2013 Business & IT Resilience Summit New Delhi, India Chairman of the Business Continuity Institute
More informationOFFICE OF THE ASSISTANT SECRETARY OF DEFENSE HEALTH AFFAIRS SKYLINE FIVE, SUITE 810, 5111 LEESBURG PIKE FALLS CHURCH, VIRGINIA
OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE HEALTH AFFAIRS SKYLINE FIVE, SUITE 810, 5111 LEESBURG PIKE FALLS CHURCH, VIRGINIA 22041-3206 TRICARE MANAGEMENT ACTIVITY MEMORANDUM FOR: SEE DISTRIBUTION SUBJECT:
More informationRegulating Cyber: the UK s plans for the NIS Directive
Regulating Cyber: the UK s plans for the NIS Directive September 2017 If you are a digital service provider or operate an essential service then new security and breach notification obligations may soon
More informationCyber Resilience: Developing a Shared Culture. Sponsor Guide
Lead : Cyber Resilience: Developing a Shared Culture Guide ISfL Annual Cyber Security Conference This ISfL Conference has been made possible by the exhibitors who kindly sponsored the event. Please show
More informationOregon Fire Service Conference Enterprise Security Office Update. October 26, 2018
Oregon Fire Service Conference Enterprise Security Office Update October 26, 2018 2 State CIO Update Terrence Woods Interim State CIO Slide presented at August OAGTIM 3 Information Security Unify cybersecurity
More informationBT Assure Cloud Identity Annex to the General Service Schedule
1 Defined Terms The following definitions apply, in addition to those in the General Terms and Conditions and the General Service Schedule of the Agreement. Administrator means a Customer-authorised person
More informationBT Compute Protect Schedule to the General Terms
BT Compute Protect Schedule to the General Terms Contents A note on you... 2 Words defined in the General Terms... 2 Part A The BT Compute Protect Service... 2 1 Service Summary... 2 2 Standard Service
More informationAon Service Corporation Law Global Privacy Office. Aon Client Data Privacy Summary
Aon Client Data Privacy Summary Table of Contents Our Commitment to Data Privacy 3 Our Data Privacy Principles 4 Aon Client Data Privacy Summary 2 Our Commitment to Data Privacy Data Privacy Backdrop As
More informationDOD Medical Device Cybersecurity Considerations
Enedina Guerrero, Acting Chief, Incident Mgmt. Section, Cyber Security Ops Branch 2015 Defense Health Information Technology Symposium DOD Medical Device Cybersecurity Considerations 1 DHA Vision A joint,
More informationVersion: V2.0. Integrated Building. Architecture. 19 April dimension data advanced infrastructure
Version: V2.0 Integrated Building 19 April 2013 Architecture dimension data advanced infrastructure Agenda Framework for Implementation Case Studies Copyright Dimension Data 19 April 2013 2 Question Given
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationThe ehealth Annual Report aims to highlight the activities within the teams that make up the ehealth Department.
Board paper 18/41 THE STATE HOSPITALS BOARD FOR SCOTLAND Date of Meeting: 28 June 2018 Agenda Reference: Item No: 21 Sponsoring Director: Author(s): Title of Report: Purpose of Report: Finance and Performance
More informationThe NIS Directive and Cybersecurity in
The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security
More informationAUTHORITY FOR ELECTRICITY REGULATION
SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...
More informationNHS HE N3 update. London 9 th November 2006
NHS HE N3 update London 9 th November 2006 N3 The Story So Far N3 Background N3 Goals (the New NHS National broadband network) Broadband network linking 18,000 sites in England, up to 3,000 in Scotland
More informationHow we do ehealth in NHS Scotland
Implementing strategies & infrastructures for ehealth or How we do ehealth in NHS Scotland Julie Falconer NHS for Scotland s 5.2m people NHS devolved to Scottish parliament Scottish Government Health &
More informationWorkday s Robust Privacy Program
Workday s Robust Privacy Program Workday s Robust Privacy Program Introduction Workday is a leading provider of enterprise cloud applications for human resources and finance. Founded in 2005 by Dave Duffield
More informationGeneral Data Protection Regulation
General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced
More informationSecurely Access Services Over AWS PrivateLink. January 2019
Securely Access Services Over AWS PrivateLink January 2019 Notices This document is provided for informational purposes only. It represents AWS s current product offerings and practices as of the date
More informationCyber Security Supply Chain Risk Management
Cyber Security Supply Chain Risk Management JoAnn Murphy, SDT Vice Chair, PJM Interconnection May 31, 2017 FERC Order No. 829 [the Commission directs] that NERC, pursuant to section 215(d)(5) of the FPA,
More informationGovernance for the Public Sector Cloud
Governance for the Public Sector Cloud Managing Cost and Ensuring Compliance Paving the Way to the Cloud Forecasting a potential 30% reduction in data infrastructure spend, the U.S. Government embarked
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationApril Appendix 3. IA System Security. Sida 1 (8)
IA System Security Sida 1 (8) Table of Contents 1 Introduction... 3 2 Regulatory documents... 3 3 Organisation... 3 4 Personnel security... 3 5 Asset management... 4 6 Access control... 4 6.1 Within AFA
More information2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.
Diageo Third Party Hosting Standard 1. Purpose This document is for technical staff involved in the provision of externally hosted solutions for Diageo. This document defines the requirements that third
More information1-TIER AUTHORIZED INFORMATICA RESELLER (AIR)
1-TIER AUTHORIZED INFORMATICA RESELLER (AIR) PROGRAM GUIDE (Revised 1 January 2018) 2018 Informatica. For Authorized Informatica Partners Only -1- The Informatica Partner Program The Informatica Partner
More informationSAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2
APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,
More informationCase Study. Encode helps University of Aberdeen strengthen security and reduce false positives with advanced security intelligence platform
Encode helps University of Aberdeen strengthen security and reduce false positives with advanced security intelligence platform Summary For the University of Aberdeen, protecting IT infrastructure serving
More informationROADMAP TO DFARS COMPLIANCE
ROADMAP TO DFARS COMPLIANCE ARE YOU READY FOR THE 12/31/17 DEADLINE? In our ebook, we have answered the most common questions we receive from companies preparing for DFARS compliance. Don t risk terminated
More informationData Sharing Agreement
1 Parties This Data Sharing Agreement is made between: 1.1 The Health and Social Care Information Centre ("NHS Digital"), a non-departmental public body established pursuant to section 252 of the Health
More informationSocial care: local sponsorship model application process guidance
Social care: local sponsorship model application process guidance Published August 2017 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental
More informationAUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE
AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated
More informationNS2 Cloud Overview The Cloud Built for Federal Security and Export Controlled Environments. Hunter Downey, Cloud Solution Director
NS2 Cloud Overview The Cloud Built for Federal Security and Export Controlled Environments Hunter Downey, Cloud Solution Director Why Organizations are investing in the Cloud Pressure on IT and business
More informationWHITE PAPER. Title. Managed Services for SAS Technology
WHITE PAPER Hosted Title Managed Services for SAS Technology ii Contents Performance... 1 Optimal storage and sizing...1 Secure, no-hassle access...2 Dedicated computing infrastructure...2 Early and pre-emptive
More informationNAVIFY. Cloud Security with the NAVIFY Tumor Board. Compliant. Secure. Dependable.
NAVIFY Cloud Security with the NAVIFY Tumor Board Compliant. Secure. Dependable. Trust that your oncology patients healthcare information stays protected. Security breaches are on the rise HIPAA privacy
More informationSupporting the NHS to Improve Cyber Security. Presented by Chris Flynn Security Operations Lead NHS Digital s Data Security Centre
Supporting the NHS to Improve Cyber Security Presented by Chris Flynn Security Operations Lead NHS Digital s Data Security Centre https://www.youtube.com/watch?v=3bqt7zkkq JA 2 Start with why And why it
More informationFigure 1: Summary Status of Actions Recommended in June 2016 Committee Report. Status of Actions Recommended # of Actions Recommended
Chapter 3 Section 3.05 Metrolinx Regional Transportation Planning Standing Committee on Public Accounts Follow-Up on Section 4.08, 2014 Annual Report In November 2015, the Standing Committee on Public
More informationUnderstanding As-a-service: Teradata IntelliCloud
Understanding As-a-service: Teradata IntelliCloud Brian Wood, Director of Cloud Marketing 1 2 Agenda Key Takeaways Is it real and ready for prime-time? Yes! 50+ customers, growing size & complexity, AWS,
More informationONC Health IT Certification Program
ONC Health IT Certification Program Certification Requirements Update March 17, 2016 ICSA Labs Health IT Program Agenda Introduction Mandatory Product Disclosures and Transparency Requirements Certified
More informationDr. Eng. Antonio Mauro, PhD October 20th 2011
October 20th 2011 NIST Cloud Computing Reference Architecture NIST Cloud Computing Standards Roadmap Special Publication 500-292 September 2011 Document: NIST CCSRWG 092 - First Edition - July 5, 2011
More informationNHS Fife. 2015/16 Audit Computer Service Review Follow Up
NHS Fife 2015/16 Audit Computer Service Review Follow Up Prepared for NHS Fife April 2016 Audit Scotland is a statutory body set up in April 2000 under the Public Finance and Accountability (Scotland)
More informationREPORT 2015/149 INTERNAL AUDIT DIVISION
INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results
More informationFFIEC Cyber Security Assessment Tool. Overview and Key Considerations
FFIEC Cyber Security Assessment Tool Overview and Key Considerations Overview of FFIEC Cybersecurity Assessment Tool Agenda Overview of assessment tool Review inherent risk profile categories Review domain
More informationContinuous auditing certification
State of the Art in cloud service certification Cloud computing has emerged as the de-facto-standard when it comes to IT delivery. It comes with many benefits, such as flexibility, cost-efficiency and
More informationEmpowering Business Adoption of the Cloud through Intelligent Security Solutions and Active Defense Platforms
Empowering Business Adoption of the Cloud through Intelligent Security Solutions and Active Defense Platforms Floris van den Dool, Managing Director, Security Lead EALA, Accenture Christian Franzen, Senior
More informationData Management and Security in the GDPR Era
Data Management and Security in the GDPR Era Franck Hourdin; Vice President, EMEA Security Russ Lowenthal; Director, Database Security Product Management Mike Turner; Chief Operating Officer, Capgemini
More information