POSITION DESCRIPTION
|
|
- Jasper Fowler
- 5 years ago
- Views:
Transcription
1 Network Security Consultant POSITION DESCRIPTION Unit/Branch, Directorate: Location: Regulatory Unit Information Assurance and Cyber Security Directorate Auckland Salary range: I $90,366 - $135,548 Purpose of position: This job exists to manage and develop relationships with telecommunications providers and with public and private organisations associated with the launch and operation of high altitude vehicles and their payloads. This job is also to support and contribute to technical assessments of network procurement, design and implementation proposals and national security risk assessments of high altitude launch vehicles and payloads. This role will also assist with the development of regulatory notices, policy, guidance and internal processes. Our mission at the GCSB is to protect and enhance New Zealand s security and wellbeing. Our values are Respect, Commitment, Integrity and Courage Information Assurance and Cyber Security Directorate purpose: The IAC Directorate contributes to the national security of New Zealand by providing technical advice and assistance to Government and organisations with significant national information infrastructures to enable them to protect their information from advanced technology-borne threats. To achieve this, the Directorate provides technical security inspections; high-grade encryption services; information assurance policy and advice; regulation of telecommunications & space activities; and high-end cyber security services to detect and respond to such threats.
2 Key accountabilities Provision of expert advice and knowledge Working with the telecommunications industry to manage expectations and supply formal correspondence Maintain knowledge of potential national security threat vectors through engagement with GCSB Intelligence Directorate and partner intelligence agencies, including equity concerns Manage the organisation of, and the distribution of information to, industry forums to support and enhance security awareness Maintain detailed knowledge of the telecommunications industry, including market pressures, technological developments, security initiatives and upcoming proposals Maintain knowledge of potential national security threat vectors associated with the launch or operation of high altitude vehicles or their payloads Engage with agencies and operators of outer space and high altitude vehicles to understand the nature of threats to national security Research information from both classified and unclassified sources to enhance network security awareness Identifies and supports partner activities in areas likely to be of technological significance to the GCSB Represents the GCSB at conferences, forums and working groups as required. Information assurance and compliance Deliverables/Outcomes National security concerns are identified, evaluated and communicated accurately and within agreed timeframes Decisions, communications and policy positions are escalated in accordance with procedures and within agreed timeframes GCSB and MBIE executive are appraised of potential national security concerns early in the procurement cycle Outer space and high altitude launches are not delayed due to delays caused by regulatory unit Partner agency intelligence equities are protected and compartmentalised General enquiries not related to specific proposals are responded to accurately, concisely and within agreed timeframes All network changes are notified in a timely manner, sufficiently early in the investment cycle to influence the decision making process Industry awareness of network security concerns are enhanced and implementation guidance is understood Rapid decisions made by network operators are anticipated and processed within agreed timeframes Information which adds value and enhances network security understanding is shared with industry Is recognised as a subject matter expert and confidently and competently speaks to any audience on modern telecommunications network security issues Demonstrates strategic foresight with respect to telecommunication technology Provide Information Assurance advice to support technical assessors Assist with identifying methods of detailing national security concerns and mitigation strategies Assists with the preparation and Network security concerns are heeded by network operators and decisions are adjusted where it is necessary to do so Practical Information Assurance advice is provided alongside expert technical advice to assist network operator decisions
3 implementation of regulatory notices, policy, guidance and processes Risk assessments GCSB does not unnecessarily impede the innovation or time to market in the telecommunications industry Policy and associated framework is fit for purpose and in accordance with legislation Receive, catalogue and maintain records of network proposals Provide regular reports and briefings to key internal and external stakeholders, including but not limited to national security risk assessments and internal reports Legal review of proposals occurs at the appropriate juncture and compliance processes are followed All network security proposals are accurately recorded and maintained appropriately Collaboratively work with stakeholders to provide robust and evidence based risk assessments Peer review assessments of national security risk assessments to ensure accuracy and assessments are conducted in accordance with legislation, regulations and procedures Assessment briefings are conducted and/or supported within agreed timeframes and meet stakeholder requirements Network Operator proposals are assessed promptly and within agreed timeframes, delays are communicated and expectations are set Relationship management Emphasis on ensuring that working relationships with key colleagues, partners and stakeholders are initiated, enhanced and maintained Effective relationships with external stakeholders are developed and maintained to support GCSB s purpose at an operational level The reputation of GCSB is positively viewed by key stakeholders Contribute to the execution of the IACD Operational Plan The manager is kept informed of relevant issues that have an impact on team and unit outputs Creating joint outputs with other units across GCSB and the NZ Intelligence Community Involving customers in the design and development of services Organisational stovepipes and obstacles to collective outputs are challenged and reduced or overcome Unit services reflect customer needs and requirements
4 Health and safety (for self) Work safely and take responsibility for keeping self and colleagues free from harm Report all incidents and hazards promptly Know what to do in the event of an emergency Cooperate in implementing return to work plans Be a visible role model at all times Follow GCSB s safety rules and procedures Other duties A safe and healthy workplace for all people using our sites as a place of work All requirements in the NZIC Health and Safety policy and procedures are met Contributes to business planning at section, unit and/or Directorate level Any other duties that fall within the scope of the position Fully participates and contributes to business planning, as required Position delegation Financial delegation: None Key stakeholders Internal: Information Assurance and Cyber Security Directorate staff IT Security staff External: Ministry of Business Innovation and Enterprise National Cyber Police Office Counterparts within the wider New Zealand Intelligence Community and central government agencies, including NZ Police Other partner intelligence agencies Telecommunications network operators, service providers and equipment manufacturers Second-party providers and equipment vendors
5 Person Specification Experience: A minimum of 10 years relevant experience in the New Zealand telecommunications sector. Experience in the security of modern telecommunications networks. Experience in relationship management through consultancy, vendor management or corporate sales. Experience managing stakeholder or client relationships, is desirable. Experience in regulatory processes, policy advice and compliance frameworks, is desirable. Knowledge and Skills: Proven capabilities in the design and implementation of telecommunications networks. A thorough understanding of contemporary telecommunications technology A thorough understanding of contemporary network security issues Strong interpersonal and communication skills, and the ability to relate effectively to both technical and non-technical people at all levels of an organisation Proven leadership qualities in a technical environment, and the ability to deal effectively and sensitively with other people Demonstrable ability to develop and present technical and regulatory presentations to external subject matter experts An eye to detail and a commitment to accuracy and quality in all work activities. Highly effective planning and organisational skills Highly developed oral and written communication skills, including the ability to communicate and build relationships at all levels; and to maintain a courteous, diplomatic and personable approach to customers and community partners The ability to participate in management forums as an effective member of the team, and contribute to the development of a high performance organisation
6 The ability to represent the GCSB professionally and with credibility within national and international communities Knowledge of the methods and techniques used by foreign states to utilise, telecommunications infrastructure to affect espionage, is desirable. Qualifications and Courses: Tertiary level qualification (Bachelor level) or equivalent experience, in Information Technology, Computer Science or equivalent, with an emphasis on information security. Tertiary papers in computer science and information security, is desirable. Current CISSP or CISM or other equivalent professional computing/networking qualification, is desirable. Specific Job Requirements: Ability to obtain and maintain a TSS security clearance NZIC Competencies In addition to the Person Specification above, competency standards which outline the development requirements of the position are set out under the NZ Intelligence Community (NZIC) Career Pathways framework. The Career Pathways framework enables progression within the job. Full descriptions of progression competencies and an overview of the NZIC Career Pathways framework is available on appointment.
7 Changes to Position Description Positions in the GCSB may change over time as the organisation develops. Therefore we are committed to maintaining a flexible organisation structure that best enables us to meet changing market and customer needs. Responsibilities for this position may change over time as the job evolves. This Position Description may be reviewed as part of planning for the annual performance cycle. Date PD reviewed: 6/06/2018 Signatures Managers Name Signature Date: Employee s Name Signature Date:
POSITION DESCRIPTION
POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose
More informationPOSITION DESCRIPTION
UNCLASSIFIED IT Security Certification Assessor POSITION DESCRIPTION Unit, Directorate: Location: IT & Physical Security, Protective Security Wellington Salary range: H $77,711 - $116,567 Purpose of position:
More informationPOSITION DESCRIPTION
Infrastructure Engineer POSITION DESCRIPTION Unit/Branch, Directorate: Location: Reporting to: Direct reports: Infrastructure, Intelligence Directorate Wellington, Auckland Infrastructure Lead Nil Salary
More informationPosition Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.
Position Description Engagement Manager Business unit: Position purpose: Direct reports: Directorate overview: Business Unit Overview Remuneration indicator: Outreach & Engagement Information Assurance
More informationPosition Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED
Position Description Computer Network Defence (CND) Analyst Position purpose: Directorate overview: The CND Analyst seeks to discover, analyse and report on sophisticated computer network exploitation
More informationPosition Description IT Auditor
Position Title IT Auditor Position Number Portfolio Performance and IT Audit Location Victoria Supervisor s Title IT Audit Director Travel Required Yes FOR OAG HR USE ONLY: Approved Classification or Leadership
More informationSecurity Director - VisionFund International
Security Director - VisionFund International Location: [Europe & the Middle East] [United Kingdom] Category: Security Job Type: Open-ended, Full-time *Preferred location: United Kingdom/Eastern Time Zone
More informationCloud solution consultant
Cloud solution consultant Role brief Directorate Jisc technologies Base location Harwell or Bristol Grade B Job level 18 Job family Professional services Date 23/10/2017 Reports to Cloud services group
More informationNSPCC JOB DESCRIPTION
NSPCC JOB DESCRIPTION JOB TITLE: DIVISION: DEPARTMENT: LOCATION: Senior Information Specialist National Services Knowledge and Information London DATE APPROVED: January 2016 Context and Background The
More informationCloud solution consultant
Cloud solution consultant Role brief Directorate Jisc technologies Base location Harwell or Bristol Grade B Level 18 Job family Professional services Date November 2017 Reports to Cloud services group
More informationPERSON SPECIFICATION. Cyber PROTECT Officer. Job Title: Status: Established
PERSON SPECIFICATION Area: Crime and Intelligence Directorate Job Title: Cyber PROTECT Officer Weekly Hours: Section: CAID Scale: Grade 6 Version: 1.2 Post No: GI080 Status: Established Version Date: 37
More informationNew Zealand Certificate in Contact Centres (Level 3)
New Zealand Certificate in Contact Centres (Level 3) This programme teaches learners the core skills needed to work effectively in a contact centre. They ll learn techniques for listening, customer focus,
More informationInformation Technology Branch Organization of Cyber Security Technical Standard
Information Technology Branch Organization of Cyber Security Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 1 November 20, 2014 Approved:
More informationNew Zealand Certificate in Regulatory Compliance (Operational Practice) Level 4
New Zealand Certificate in Regulatory Compliance (Operational Practice) Level 4 This qualification is designed for people who work in frontline roles that deal with the operational aspects of regulatory
More informationSecurity and Privacy Governance Program Guidelines
Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by
More informationSAVANNAH LAKES VILLAGE PROPERTY OWNERS ASSOCIATION, INC. JOB DESCRIPTION
SAVANNAH LAKES VILLAGE PROPERTY OWNERS ASSOCIATION, INC. JOB DESCRIPTION POSITION: CHIEF OPERATING OFFICER FUNCTION: Responsible for all aspects of the SLV POA day-to-day operations. In this capacity,
More informationCanada Life Cyber Security Statement 2018
Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability
More informationTechnical Information Assurance Team Structure. and Role Description
Introduction Technical Information Assurance Team Structure and Role Description The Team is led by the Technical Information Assurance Leads. They are responsible for jointly managing the team, setting
More informationTodmorden High School Job Description
Todmorden High School Job Description Post Title: ICT Manager. Salary: SO2 ( 28,485-30,153) Hours: 37 hours, Full time Annual Leave: 30 days plus standard bank holidays. Holidays must be taken during school
More informationPosition Description For ICT Systems Officer Information, Technology and Communication Department Hobart
Position Description For ICT Systems Officer Information, Technology and Communication Department Hobart Programme: ICT Services Location: Hobart based with travel throughout Tasmania Reports To: ICT Manager
More informationGOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI
GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI CONTENTS Overview Conceptual Definition Implementation of Strategic Risk Governance Success Factors Changing Internal Audit Roles
More informationNew Zealand Certificate in Regulatory Compliance (Core Knowledge) (Level 3)
New Zealand Certificate in Regulatory Compliance (Core Knowledge) (Level 3) If your staff need to learn the basics about regulatory compliance in New Zealand, then this is the paper for them. This qualification
More informationChartered Membership: Professional Standards Framework
Chartered Membership: Professional Standards Framework Foreword The Chartered Institute of Architectural Technologists (CIAT) is the lead professional body for Architectural Technology and the UK Competent
More informationDigital Health Cyber Security Centre
Digital Health Cyber Security Centre Current challenges Ransomware According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. Distributed Denial of Service (DDoS) Targeting
More informationInformation Security Controls Policy
Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January
More informationBUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW
BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business
More informationPIPELINE SECURITY An Overview of TSA Programs
PIPELINE SECURITY An Overview of TSA Programs Jack Fox Pipeline Industry Engagement Manager Surface Division Office of Security Policy & Industry Engagement May 5, 2014 TSA and Pipeline Security As the
More informationPosition Description For ICT Officer Support Information, Technology and Communication Department Hobart
Position Description For ICT Officer Support Information, Technology and Communication Department Hobart Programme: ICT Services Unit Location: Based in Hobart with travel within Tasmania Reports To: ICT
More informationPrinciples for a National Space Industry Policy
Principles for a National Space Industry Policy Commonwealth of Australia 2011 DIISR 11/144 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationMNsure Privacy Program Strategic Plan FY
MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term
More informationIQ Level 4 Award in Understanding the External Quality Assurance of Assessment Processes and Practice (QCF) Specification
IQ Level 4 Award in Understanding the External Quality Assurance of Assessment Processes and Practice (QCF) Specification Regulation No: 600/5528/5 Page 1 of 15 Contents Page Industry Qualifications...
More informationIT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18
Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are
More informationTHE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK
GAIN RECOGNITION AS AN APPROVED PROVIDER UNDER ISO/IEC 17024 AND JOIN OUR NETWORK OF TRUSTED PROVIDERS THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER
More informationGovernment Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security
Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:
More informationASSISTANT ICT NETWORK MANAGER. JOB DESCRIPTION Support Staff
ASSISTANT ICT NETWORK MANAGER JOB DESCRIPTION Support Staff The school has been designated by the Secretary of State as a school with a religious character. Its Instrument of Government states that it
More informationNew Zealand Customs Service: Managing Trade Assurance capability risks
New Zealand Customs Service: Managing Trade Assurance capability risks Progress in responding to the Auditor-General s recommendations This is an independent assurance report about a performance audit
More informationU.S. Department of Homeland Security Office of Cybersecurity & Communications
U.S. Department of Homeland Security Office of Cybersecurity & Communications Council of State Governments Cybersecurity Session November 3, 2017 Cybersecurity & Communications (CS&C) CS&C s Mission ensure
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationthe steps that IS Services should take to ensure that this document is aligned with the SNH s KIMS and SNH s Change Requirement;
Shaping the Future of IS and ICT in SNH: 2014-2019 SNH s IS/ICT Vision We will develop the ICT infrastructure to support the business needs of our customers. Our ICT infrastructure and IS/GIS solutions
More informationMarine Institute Job Description
Marine Institute Job Description Position Contract Service Group Location Temporary Systems Administrator Team Leader Temporary Specified Purpose contract for a duration of up to 3 years Ocean Science
More informationStrategic Security Analyst
Strategic Security Analyst Location: [North America] [United States] Town/City: Monrovia Category: Security Job Type: Fixed term, Full-time *Preferred location: USA, UK or Australia where WVI is registered*
More informationNational Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.
National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec April 12, 2018 1 Introduction to NICE - The National Initiative for Cybersecurity
More informationNEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES
NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need
More informationNational Diploma in Building Control Surveying (Small Buildings) (Level 5)
National Diploma in Building Control Surveying (Small Buildings) (Level 5) This qualification has been reviewed. The last date to meet the requirements is 31 December 2019. This qualification has been
More informationSALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually
SALARY $49.72 - $72.54 Hourly $3,977.88 - $5,803.27 Biweekly $8,618.75 - $12,573.75 Monthly $103,425.00 - $150,885.00 Annually ISSUE DATE: 03/21/18 THE POSITION DIRECTOR OF CYBER SECURITY OPEN TO THE PUBLIC
More informationQualification details
Qualification details Title New Zealand Certificate in Construction Related Trades (Supervisor) (Level 4) [Ref: 2381] Version 1 Qualification type Certificate Level 4 Credits 58 NZSCED 040399 Architecture
More informationGlobal Statement of Business Continuity
Business Continuity Management Version 1.0-2017 Date January 25, 2017 Status Author Business Continuity Management (BCM) Table of Contents 1. Credit Suisse Business Continuity Statement 3 2. BCM Program
More informationACCREDITATION: A BRIEFING FOR GOVERNMENTS AND REGULATORS
ACCREDITATION: A BRIEFING FOR GOVERNMENTS AND REGULATORS Accreditation is continuously gaining recognition as an important technical tool in the delivery of objectives across an increasing range of policy
More informationIT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)
DESIGNATION Reporting to Division Office Location IT MANAGER PERMANENT SALARY SCALE: P07 (R806 593.00) Ref:AgriS042/2019 Information Technology Manager CEO Information Technology (IT) Head office JOB PURPOSE
More informationNZ Certificate in Credit Management (Level 4)
NZ Certificate in Credit Management (Level 4) The current certificate is designed for people working in, or intending to work in, a credit management role. It is designed to help develop and enhance the
More informationProtecting information across government
Report by the Comptroller and Auditor General Cabinet Office Protecting information across government HC 625 SESSION 2016-17 14 SEPTEMBER 2016 4 Key facts Protecting information across government Key facts
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationEUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE
EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile
More informationMETHODOLOGY AND CRITERIA FOR THE CYBERSECURITY REPORTS
METHODOLOGY AND CRITERIA FOR THE CYBERSECURITY REPORTS The cybersecurity maturity has been assessed against 25 criteria across five themes. Each of the criteria are given a Yes, No, Partial, or Not Applicable
More informationKENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)
KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for
More informationIS Audit and Assurance Guideline 2002 Organisational Independence
IS Audit and Assurance Guideline 2002 Organisational Independence The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards
More informationGlobal Security Advisor
Global Security Advisor Location: [North America] [United States] Category: Security *Preferred location: USA. Other locations will be considered globally where WVI is registered to operate. PURPOSE OF
More informationManager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre
IDENTIFICATION Department Position Title Infrastructure Manager, Infrastructure Services Position Number Community Division/Region 32-11488 Yellowknife Technology Service Centre PURPOSE OF THE POSITION
More informationNew Zealand Government IBM Infrastructure as a Service
New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand
More informationROLE DESCRIPTION IT SPECIALIST
ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head
More informationThe Government IT Profession: Embedding IT Professionalism in Your Organisation
Government IT Profession The Government IT Profession: Embedding IT Professionalism in Your Organisation Anne-Marie Grafton Implementation Manager Government IT Profession Team 020 7276 3462 / 07909 893369
More informationIT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive
IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation
More informationQualification details
Qualification details Title New Zealand Certificate in Business (First Line Management) (Level 4) Version 1 Qualification type Certificate Level 4 Credits 60 NZSCED 080301 Management and Commerce > Business
More informationQualification details
Qualification details Title New Zealand Diploma in Web Development and Design (Level 5) Version 1 Qualification type Diploma Level 5 Credits 120 NZSCED 020115 Information Technology > Computer Science
More informationExternal Supplier Control Obligations. Cyber Security
External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place
More informationCYBER RESILIENCE & INCIDENT RESPONSE
CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable
More informationDated 3 rd of November 2017 MEMORANDUM OF UNDERSTANDING SIERRA LEONE NATIONAL ehealth COORDINATION HUB
Memorandum of Understanding for Joint Working by Ministry of Health and Sanitation, Ministry of Information and Communication on the Government of Sierra Leone ehealth Coordination Hub Dated 3 rd of November
More informationNational Certificate in Public Sector Services (Client/Customer Service) (Level 3)
NZQF NQ Ref 0660 Version 5 Page 1 of 10 National Certificate in Public Sector Services (Client/Customer Service) (Level 3) Level 3 Credits 80 This qualification has been reviewed. The last date to meet
More informationWorkshop Item 1 - ISO 9001: 2008 migration
Workshop Item 1 - ISO 9001: 2008 migration Joint IAF-ISO Communiqué on migration to ISO 9001: 2008 ISO 9001: 2008 does not contain any new requirements Accredited Certification to ISO 9001:2008 shall not
More informationSTRATEGIC PLAN. USF Emergency Management
2016-2020 STRATEGIC PLAN USF Emergency Management This page intentionally left blank. Organization Overview The Department of Emergency Management (EM) is a USF System-wide function based out of the Tampa
More informationQualification details
Qualification details Title New Zealand Certificate in Blasting (Level 4) with strands in Land Operations, Surface (Quarry or Open-cast), Underground (Tunnelling or Metalliferous), Underground Coal, and
More informationCall for Expressions of Interest
Call for Expressions of Interest ENISA M/CEI/17/T01 Experts for assisting in the implementation of the annual ENISA Work Programme TECHNICAL DESCRIPTION CONTENTS TECHNICAL DESCRIPTION... 3 1. INTRODUCTION...
More informationSECURING THE UK S DIGITAL PROSPERITY. Enabling the joint delivery of the National Cyber Security Strategy's objectives
SECURING THE UK S DIGITAL PROSPERITY Enabling the joint delivery of the National Cyber Security Strategy's objectives 02 November 2016 2 SECURING THE UK S DIGITAL PROSPERITY SECURING THE UK S DIGITAL PROSPERITY
More informationNATIONAL INFRASTRUCTURE COMMISSION CORPORATE PLAN TO
NATIONAL INFRASTRUCTURE COMMISSION CORPORATE PLAN 2017-18 TO 2019-20 CONTENTS Introduction 3 Review of period from October 2015 to end 2016 3 Corporate Governance 4 Objectives and Business Activity Plan
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationNational Diploma in Building Control Surveying (Medium and Large Buildings) (Level 6)
National Diploma in Building Control Surveying (Medium and Large Buildings) (Level 6) This qualification has been reviewed and replaced by the New Zealand Diploma in Building Surveying (Level 6) [Ref:
More informationRecruitment Pack Marketing Officer Battersea Dogs & Cats Home
Recruitment Pack Email Battersea Dogs & Cats Home Dear Applicant, Thank you for requesting further information for our Email vacancy (Ref BDCH878). Please find enclosed the below information which you
More information20 February Accreditation of Assessment Centres
20 February 20 Accreditation of Assessment Centres Policy Name Accreditation of Assessment Centres Document number AAC-001/ Responsible Executive Chief Director: Occupational Qualifications Quality Assurance
More informationBig data privacy in Australia
Five-article series Big data privacy in Australia Three actions you can take towards compliance Article 5 Big data and privacy Three actions you can take towards compliance There are three actions that
More informationChapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS
Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS The Saskatchewan Power Corporation (SaskPower) is the principal supplier of power in Saskatchewan with its mission to deliver power
More informationUnit 3 Cyber security
2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 3 - revised September 2016 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning
More informationehealth Ministerial Conference 2013 Dublin May 2013 Irish Presidency Declaration
ehealth Ministerial Conference 2013 Dublin 13 15 May 2013 Irish Presidency Declaration Irish Presidency Declaration Ministers of Health of the Member States of the European Union and delegates met on 13
More informationBusiness Continuity Management Program Overview
Business Continuity Management Program Overview Improving the lives of our customers by connecting them to the power of the digital world CenturyLink Key Objective CenturyLink may modify or terminate this
More informationGoogle Cloud & the General Data Protection Regulation (GDPR)
Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to
More informationTypical Training Duration 11 months
New Zealand Certificate in Business (Administration and Technology) (Level 3) This programme is ideal for learners who need to gain a good general understanding of business administration and technology.
More informationAon Service Corporation Law Global Privacy Office. Aon Client Data Privacy Summary
Aon Client Data Privacy Summary Table of Contents Our Commitment to Data Privacy 3 Our Data Privacy Principles 4 Aon Client Data Privacy Summary 2 Our Commitment to Data Privacy Data Privacy Backdrop As
More informationFundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment
Fundamentals of Cybersecurity/CIIP Building Capacity: Using a National Strategy & Self- Presented to: 2009 ITU Regional Cybersecurity Forum for Asia-Pacific Connecting the World Responsibly 23-25 25 September
More informationBuilding resilience. Delivering assurance.
Building resilience. Delivering assurance. Strengthening and improving the way organisations operate, creating robust and resilient cultures. 01 02 RiskLogic Building resilience. Delivering assurance.
More informationM&A Cyber Security Due Diligence
M&A Cyber Security Due Diligence Prepared by: Robert Horton, Ollie Whitehouse & Sherief Hammad Contents Page 1 Introduction 3 2 Technical due diligence goals 3 3 Enabling the business through cyber security
More informationBuilding a BC/DR Control Library and Regulatory Response Program
Building a BC/DR Control Library and Regulatory Response Program David Garland, Senior Director, Disaster Recovery & Regulatory Compliance, Business Continuity Management CME Group Regulatory Compliance
More informationFIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017
FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The
More informationNational Policing Community Security Policy
Document Name File Name National Policing Community Security Policy Community_Security_Policy_FINAL v4_3.doc Authorisation Information Management Business Area Signed version held by National Police Information
More informationEuropean Standards- preparation, approval and role of CEN. Ashok Ganesh Deputy Director - Standards
European Standards- preparation, approval and role of CEN Deputy Director - Standards 1 European Standarization why?, 2010-10-14 CEN-CENELEC 2010 2 What standards do enhance the safety of products allow
More informationSeven Requirements for Successfully Implementing Information Security Policies and Standards
Seven Requirements for Successfully Implementing and Standards A guide for executives Stan Stahl, Ph.D., President, Citadel Information Group Kimberly A. Pease, CISSP, Vice President, Citadel Information
More informationCyber Security Law --- How does it affect the business operations in China? Xun Yang Of Counsel, Commercial IP and Technology
Cyber Security Law --- How does it affect the business operations in China? Xun Yang Of Counsel, Commercial IP and Technology 8 December 2016 The Matrix (1999) 1 / L_LIVE_APAC1:5433168v1 World Internet
More informationPRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology
PRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology 24 October 2017 Content Overview of Cyber Security Law Observations on Implementation of Cyber
More informationICT30610 Certificate III in Broadband and Wireless Networks Qualification Notes
ICT30610 Qualification Notes Certificate III in Broadband and Wireless Networks Descriptor This qualification reflects the role of a tradesperson with a range of telecommunications skills who can: install
More informationPROFILE FRANCIS KAITANO. Francis Kaitano is a strategic, innovative, delivery focused Cyber Security professional.
PROFILE FRANCIS KAITANO Francis Kaitano is a strategic, innovative, delivery focused Cyber Security professional. Originally from Zimbabwe Francis Kaitano came to New Zealand more than 10 years ago for
More informationTECHNICAL NOTE RECOGNITION OF APPLIED CIVIL ENGINEERING SKILLS
TECHNICAL NOTE RECOGNITION OF APPLIED CIVIL ENGINEERING SKILLS Authors: Andrew Taylor Communications Manager InfraTrain New Zealand Limited Tel 04 494 1883 andrew@infratrain.co.nz Alister Harlow Chairman
More information