Agile Information Security Management in Software R&D
|
|
|
- Piers Washington
- 10 years ago
- Views:
Transcription
1 Agile Information Security Management in Software R&D Rational and WebSphere User Group Finland Seminar Reijo Savola Network and Information Security Research Coordinator VTT Technical Research Centre of Finland
2 Contents Information Security from the Perspective of Agility Some Information Security Challenges and Trends Security Assurance and Agile Security Development Conclusions 2
3 I Information Security from the Perspective of Agility
4 Business Rationale for Agile Adoption The better quality often increases security too! Source: prof. Pekka Abrahamsson / VTT 4
5 Change is the Only Certainty in Software Research & Development The production of Technical Specifications for a 3rd Generation Mobile System based on the evolved GSM core networks. Change management is very important from security point-of-view Source: prof. Pekka Abrahamsson / VTT 5
6 How Agile Can You Be? Size (# of personnel) Fact corner: Agile is not an absolute Concept. Source: prof. Pekka Abrahamsson / VTT Source: Boehm & Turner (2003) 6
7 Goal: Balanced Information Security SECURITY Desired / adequate level of security USABILITY AND PERFORMANCE COST EFFECTIVENESS 7
8 Proactive Security Solutions Have Most Impact! Maturity of technology Design vulnerabilities Implementation vulnerabilities R &D Products and maintenance THE LEAST IMPACT (only emergency patches ) Research THE MOST IMPACT (development of new architectures, new technologies) Time 8
9 Introduction The Horizontal Nature of Information Security Telecom engineers: security is protocols, cryptography, key exchange techniques Software engineers: security means secure SW architectures Content providers: security is DRM IT department: security means proxies, firewalls and audits and if really needed, security policies Lawyers: security means how you conform to privacy legislation Process addicts: security is a business process Managers: security is OK, but it cannot cost anything Quality people: security is realized as one or more quality attributes, the meaning of which can be described in an ontology Written definition everywhere : security is confidentiality, integrity, availability, non-repudiation, authentication 9
10 Security vs. Agility? Agility: developers are more responsive to business concerns Security: developers are more responsive to business risk concerns Tradeoffs to be managed Two steps that should be taken care of: Increase security awareness among developers and managers Build security in the processes, practices and tools 10
11 Security rating The 12 Agile Principles Good for Security too! 1. Satisfy customer through early and frequent delivery 4. Business people and developers work together daily throughout the project 7. Working software is the primary measure of progress 10. Simplicity is essential 2. Welcome changing requirements even late in the project 5. Build projects around motivated individuals 8. Promote sustainable development pace 11. The best results emerge from selforganizing teams 3. Deliver working software frequently 6. Place emphasis on face-to-face communication 9. Continuous attention to technical excellence and good design 12. Team reflects regularly where and how to improve Source: prof. Pekka Abrahamsson / VTT 11
12 II Some Information Security Challenges and Trends 12
13 Security Threats are Increasing COMPLEXITY AND CONVERGENCE Products, value nets, services and telecommunication networks are getting more and more complex Holistic understanding of security needed Challenge for agility too! TIGHT TIME SCHEDULES Market sets tight time schedules to product development and thequality and security of products is in danger. Security awareness should increased REACTIVE RACE IS BECOMING TOUGHER Security threat picture changes all the time. Security work has been lately a race between the attackers and the protection developers. Emphasis from reactive to proactive solutions Break the passive build-break-fix cycle! Agility helps! 13
14 Security Threats are Increasing DIFFUSION OF ICT SOLUTIONS ICT solutions are being used in other fields Security awareness and careful planning needed Agility cannot be applied much DEPENDENCE OF CRITICAL INFRASTRUCTURES ON ICT In critical infrastructures, such as electricy distribution, ICT solutions are used more and more Understanding of interdependencies needed Agility cannot be applied much Security awareness Understanding interdependencies 14
15 III Security Assurance and Agile Security Development 15
16 Security Assurance: Emerging Novel Techniques and Tools Security assurance activities are needed in agile SW R&D too, and should be integrated into the agile processes! Examples of security assurance techniques: Security Analysis: threat and vulnerability analysis important, its connection to requirement engineering should be improved, forms the basis for assurance! THERE ARE CHALLENGES IN CARRYING OUT SECURITY ANALYSIS IN THE AGILE PROCESSES! (and even in traditional R&D processes!) Security Testing: tools available for network level and some for application level testing Security Auditing: perspectives: information security management; security engineering Security Monitoring: beyond IDS/IPS systems, holistic monitoring, mobile versions (mainly maintenance phase!) 16
17 Information Security Management vs. Security Engineering Information security management (ISM) is targeted at the security processes and practices in the organisation. Security engineering is targeted at the R&D of security solutions in products / services / technical systems. Both of them should be addressed in Agile Software Development. Business-level security practices Cost-benefit analysis on security Trust in business collaboration Business level risk analysis and management Information security management (ISM) Security engineering (products, services, technical systems) 17
18 VTT s Agile Security Development (ASD) Framework FOR WHOM: the client organization, which wants to develop/verify the level of information security of the subcontractors; an SME, which wants to develop information security from it s own baseline WHAT: an agile process model for developing an information security management system, fast and effective improvement of the current information security state and level, ISO compatibility WHY: a clear and feasible model, efficient working model, a) improving and b) maintaining the subcontractor s or SME s information security level HOW: the guidance and consultation of experts, high utilization of the company s own resources, targeted to the right need, integrated with the organization s guidance system ASD = Agile Security Development 18
19 Agile Security Development (ASD) ASD kick-off - goals - timetables - resources Risk Analysis (e-risk) Information Security mapping (on-site) ASD tools Evaluation DB ASD method Best Practices -documents Information Security audit and certification (on-site) Laws Client docs and other guiding docs Maintenance process 19
20 Agile Security Development (ASD) Management meeting - Requirements in terms of overall organizational function - Management s statement of commitment Measurement - Definition of the measures, - Testing and execution Information security policy - Definition and execution - Compatibility with interest groups - Communications Education - Definition, materials - Execution Strategic security - Information security organization, clarification of liabilities - Asset classification and controls - Personnel safety - Physical safety Instructions - Definition and execution - Communications - Scope Operational safety - Access control - Systems usage, development, maintenance, acquisition - Actions in case of information security incidents Continuity planning - Definition and execution - Creation of the scenarios 20
21 Background material of ASD ISO 17799, 2700x Common Criteria Cobit ITIL ISF SSE-CMM BSI PK-RH OCTAVE CISSP etc. Best Practices documents applied 21
22 Conclusions Agility and security have tradeoffs, the biggest difference is the emphasis of risks in security. Security should be built in to the agile process, practices and tools (e.g. security solution patterns, standard solutions, taking security into account proactively). Both information security management (ISM) and security engineering practices are needed in the Agile Software R&D. Security assurance should be an integral part of SW R&D. 22
23 REIJO SAVOLA Network and Information Security Research Coordinator Tel GSM Fax VTT TECHNICAL RESEARCH CENTRE OF FINLAND Network and Information Security Research Kaitoväylä 1, Oulu, FINLAND PL 1100, Oulu, FINLAND VTT CREATES BUSINESS FROM TECHNOLOGY 23
Cyber Security VTT and the Finnish Approach
Cyber Security VTT and the Finnish Approach September 22, 2015 Reijo Savola, Principal Scientist CHALLENGES Explosive increase in number and impact of cyber security attacks Use of Internet technologies
Cyber Security solutions
Cyber Security solutions The scenario IT security has become a highly critical issue for all businesses as a result of the growing pervasiveness and diffusion of ICT technology. Risks can arise both inside
AGILE SOFTWARE DEVELOPMENT: INTRODUCTION, CURRENT STATUS & FUTURE Pekka Abrahamsson 23.11.2005 Jyväskylä
AGILE SOFTWARE DEVELOPMENT: INTRODUCTION, CURRENT STATUS & FUTURE Pekka Abrahamsson 23.11.2005 Jyväskylä Fact corner: SME of 250 developers Mobile & desktop sw Products sold globally EXAMPLE OF AN INNOVATIVE
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Our Commitment to Information Security
Our Commitment to Information Security What is HIPPA? Health Insurance Portability and Accountability Act 1996 The HIPAA Privacy regulations require health care providers and organizations, as well as
IT Risk Management Era: Research Challenges and Best Practices. Eyal Adar, Founder & CEO [email protected] Chairman of the EU SRMI
IT Risk Management Era: Research Challenges and Best Practices IARA Work Group July 1 st, 2007, Santa Clara - California Eyal Adar, Founder & CEO [email protected] Chairman of the EU SRMI (Security
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European
Information Security Management Systems
Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector
Preparing yourself for ISO/IEC 27001 2013
Preparing yourself for ISO/IEC 27001 2013 2013 a Vintage Year for Security Prof. Edward (Ted) Humphreys ([email protected]) [Chair of the ISO/IEC and UK BSI Group responsible for the family of ISMS standards,
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review The security threat landscape is constantly changing and it is important to periodically review a business
ISO 27000 Information Security Management Systems Foundation
ISO 27000 Information Security Management Systems Foundation Professional Certifications Sample Questions Sample Questions 1. is one of the industry standards/best practices in Service Management and Quality
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
Governance and Management of Information Security
Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information
Security metrics to improve information security management
Security metrics to improve information security management Igli TASHI, Solange GHERNAOUTIHÉLIE HEC Business School University of Lausanne Switzerland Abstract The concept of security metrics is a very
ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters
When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9
COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)
COBIT 5 For Cyber Security Governance and Management Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) Cybersecurity Governance using COBIT5 Cyber Defence Summit Riyadh, KSA
Security Standards. 17.1 BS7799 and ISO17799
17 Security Standards Over the past 10 years security standards have come a long way from the original Rainbow Book series that was created by the US Department of Defense and used to define an information
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
Release: 1. ICA60308 Advanced Diploma of Information Technology (E-Security)
Release: 1 ICA60308 Advanced Diploma of Information Technology (E-Security) ICA60308 Advanced Diploma of Information Technology (E-Security) Modification History Not Applicable Approved Page 2 of 8 Description
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:
IT Governance: The benefits of an Information Security Management System
IT Governance: The benefits of an Information Security Management System Katerina Cai, CISSP Hewlett-Packard 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17
ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17 TSB Briefing to the Regional Offices, 28 Feb 2011 Martin Euchner Advisor of ITU-T Study Group 17 [email protected]
Integrated Information Management Systems
Integrated Information Management Systems Ludk Novák [email protected] ANECT a.s. Brno, Czech Republic Abstract The article tries to find consensus in these tree different types of the systems the
[Selezionare la data] INNOVERY GROUP COMPANY PROFILE. [Digitare il sottotitolo del documento] * *
[Selezionare la data] INNOVERY GROUP COMPANY PROFILE [Digitare il sottotitolo del documento] * * INNOVERY GROUP ITALY - SPAIN MEXICO - ALBANIA Company Profile 1. BUSINESS... 3 2. MANAGEMENT... 3 3. COMPETENCE...
AN OVERVIEW OF INFORMATION SECURITY STANDARDS
AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
Safeguards Frameworks and Controls. Security Functions Parker, D. B. (1984). The Many Faces of Data Vulnerability. IEEE Spectrum, 21(5), 46-49.
Safeguards Frameworks and Controls Theory of Secure Information Systems Features: Safeguards and Controls Richard Baskerville T 1 F 1 O 1 T 2 F 2 O 2 T 3 F 3 O 3 T 4... T n...... F l O m T F O Security
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
CISA TIMETABLE (4 DAYS)
CISA TIMETABLE (4 DAYS) ISACA-CISA Day 1 9.00 9.30 Welcome, Introductions, Coffee 9.30 11.00 About the CISA Exam Domain 1 - The Process of Auditing Information Systems Auditing Types of Audits Audit Methodology
INCO-TRUST. INCO-TRUST: to set up a co-operation framework based on mutual interests & capabilities! Canada US S. Korea Japan.
INCO-TRUST: Intl Co-Operation in Trustworthy, Secure and Dependable ICT Infrastructures Neeraj Suri, TU Darmstadt, Germany James Clarke, Waterford Institute of Technology, Ireland INCO-TRUST Canada US
Managing e-health data: Security management. Marc Nyssen Medical Informatics VUB Master in Health Telematics KIST E-mail: [email protected].
Managing e-health data: Security management Marc Nyssen Medical Informatics VUB Master in Health Telematics KIST E-mail: [email protected] Structure of the presentation Data management: need for a clear
Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy
Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management
Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza
Information Security Management System (ISMS) Overview Arhnel Klyde S. Terroza May 12, 2015 1 Arhnel Klyde S. Terroza CPA, CISA, CISM, CRISC, ISO 27001 Provisional Auditor Internal Auditor at Clarien Bank
Key Considerations for Information Technology Governance. 900 Monroe NW Grand Rapids, MI 49503 (616) 632-8000
Key Considerations for Information Technology Governance What is IT Governance? Big Picture approach to information and data management Sets priorities: Managing performance Delivering value Managing risk
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
By. Mr. Chomnaphas Tangsook Business Director BSI Group ( Thailand) Co., Ltd
BS 25999 Business Continuity Management By. Mr. Chomnaphas Tangsook Business Director BSI Group ( Thailand) Co., Ltd 1 Contents slide BSI British Standards 2006 BS 25999(Business Continuity) 2002 BS 15000
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Cloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
Secure by design: taking a strategic approach to cybersecurity
Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk
Cyber Security - What Would a Breach Really Mean for your Business?
Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber
Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.
Table of Contents PART I. IS Audit Process. CHAPTER 1. Technology and Audit. Technology and Audit. Batch and On-Line Systems. CHAPTER 2. IS Audit Function Knowledge. Information Systems Auditing. What
Document Hierarchy of Information Security. Corporate Security Policy. Information Security Standard. General Directive(s) Specific Directive(s)
Document Hierarchy of Information Security General commitment to Information Security Installation of CorpSec Enabling CSO Installing Information Security Standard Corporate Security Policy Defining Assets,
Enterprise Security Architecture for Cyber Security. M.M.Veeraragaloo 5 th September 2013
Enterprise Security Architecture for Cyber Security M.M.Veeraragaloo 5 th September 2013 Outline Cyber Security Overview TOGAF and Sherwood Applied Business Security Architecture (SABSA) o o Overview of
Information Security Management
Information Security Management M.Reza Sohizadeh A. 7 May 2009 [email protected] Outline Information Information Security Information Security Management Information Security Management System ISMS
Course: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management
Course: Information Security Management in e-governance Day 1 Session 3: Models and Frameworks for Information Security Management Agenda Introduction to Enterprise Security framework Overview of security
CESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
Information Security Awareness Training
Information Security Awareness Training Presenter: William F. Slater, III M.S., MBA, PMP, CISSP, CISA, ISO 27002 1 Agenda Why are we doing this? Objectives What is Information Security? What is Information
Benchmark of controls over IT activities. 2011 Report. ABC Ltd
www.pwc.com/cy Benchmark of controls over IT activities 2011 Report ABC Ltd... 2012 Scope and approach We wish to provide you with our IT Benchmarking report over IT activities at ABC Ltd (the Company)
How small and medium-sized enterprises can formulate an information security management system
How small and medium-sized enterprises can formulate an information security management system Royal Holloway Information Security Thesis Series Information security for SMEs Vadim Gordas, MSc (RHUL) and
ISO 27002:2013 Version Change Summary
Information Shield www.informationshield.com 888.641.0500 [email protected] Information Security Policies Made Easy ISO 27002:2013 Version Change Summary This table highlights the control category
Third Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
ensuring security the way how we do it
ensuring security the way how we do it HUSTEF, 2015.11.18 Attila Tóth 1 Nokia Solutions and Networks 2014 Disclaimer The ideas, processes, tools are presented from a practitioner s point of view working
Beyond ISO 27034 - Intel's Product Security Maturity Model (PSMM)
Beyond ISO 27034 - Intel's Product Security Maturity Model (PSMM) Harold Toomey Sr. Product Security Architect & PSIRT Manager Intel Corp. 2 October 2015 @NTXISSA #NTXISSACSC3 Agenda Application / Product
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics
PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics About Us Matt Halbleib CISSP, QSA, PA-QSA Manager PCI-DSS assessments With SecurityMetrics for 6+ years SecurityMetrics Security
I. Introduction to Privacy: Common Principles and Approaches
I. Introduction to Privacy: Common Principles and Approaches A. A Modern History of Privacy a. Descriptions and definitions b. Historical and social origins c. Information types i. Personal and non-personal
Information Security is not an IT problem! Enterprise Risk & Security Management
Information Security is not an IT problem! Enterprise Risk & Security Management Raymond Slot Security Seminar 20 maart 2015 Some Security Incidents in 2014 Anthem 80 million customer records exposed JPMorgan
Cybersecurity Definitions and Academic Landscape
Cybersecurity Definitions and Academic Landscape Balkrishnan Dasarathy, PhD Program Director, Information Assurance Graduate School University of Maryland University College (UMUC) Email: [email protected]
An ITIL Perspective for Storage Resource Management
An ITIL Perspective for Storage Resource Management BJ Klingenberg, IBM Greg Van Hise, IBM Abstract Providing an ITIL perspective to storage resource management supports the consistent integration of storage
Introduction to Information Assurance. Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems
Introduction to Information Assurance Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA.
Richard Gadsden Information Security Office Office of the CIO Information Services
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO Information Services Sharon Knowles Information Assurance Compliance MUSC Medical Center
Software Development: The Next Security Frontier
James E. Molini, CISSP, CSSLP Microsoft Member, (ISC)² Advisory Board of the Americas [email protected] http://www.codeguard.org/blog Software Development: The Next Security Frontier De-perimiterization
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
Human Factors in Information Security
University of Oslo INF3510 Information Security Spring 2014 Workshop Questions Lecture 2: Security Management, Human Factors in Information Security QUESTION 1 Look at the list of standards in the ISO27000
JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder
JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder WG 1 Information security management systems WG 2 Cryptography and security mechanisms WG 3 Security evaulation criteria WG 4 Security
Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.
Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able
Basic Concepts of Information Security
Basic Concepts of Information Security Timo Kiravuo Helsinki University of Technology Telecommunication Software and Multimedia Laboratory Based on slides by: Prof., Dr. Sci. Teemupekka Virtanen Security,
HP Cyber Security Control Cyber Insight & Defence
HP Cyber Security Control Cyber Insight & Defence Security awareness at board level Security leadership is under immense pressure Cyber threat Extended supply chain Financial loss Reputation damage Cost
HEC Security & Compliance
HEC Security & Compliance SAP Security, Risk & Compliance Office November, 2014 Public Version 2.0 Details Introduction Overview Security Offering Approach Certifications Introduction Dear Customer, Information
Guideline for Roles & Responsibilities in Information Asset Management
ISO 27001 Implementer s Forum Guideline for Roles & Responsibilities in Information Asset Management Document ID ISMS/GL/ 003 Classification Internal Use Only Version Number Initial Owner Issue Date 07-08-2009
Defending against modern cyber threats
Defending against modern cyber threats Protecting Critical Assets October 2011 Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda 1. The seriousness of today s situation
Generic Aspects and Special Issues for High Speed Networks. Carsten Benecke, DFN-FWL, University of Hamburg
Generic Aspects and Special Issues for High Speed Networks Carsten Benecke, DFN-FWL, University of Hamburg DFN security projects in Hamburg What is network security? How do we achieve network security?
