The Development of the Security Network
|
|
- Erik Richardson
- 8 years ago
- Views:
Transcription
1 Turvallisuus. Käytettävyys. Yhteistyö. The Development of the Security Network Ministry of Finance Security Network Project 03/2012
2 Contents of the Presentation 1. What is the Goverment Security Network? 2. Why introduce a Government Security Network? 3. Purpose of the Security Network Project 4. Timetable and Funding 5. Output and Benefits 6. Initialization of the Security Network 2
3 Government Security Network High preparedness telecommunications solution for the government and security authorities The security network ensures interaction and communication between the senior government officials, security authorities and other actors Secures the integrity, availability and confidentiality of critical information. Ministries Border Guard Defence Forces Police Emergency Responce Centres Rescue Authorities 3
4 Government telecommunications network Higher level of preparedness Higher costs Lower level of preparedness Lower costs Defence Forces Network Government Network Public networks e.g. Internet Military National Defence Security authorities ( persons) Other government authories ( persons) 4
5 Driving force behind the development Need to ensure telecommunication security and availability for senior government and security authorities growing cyber-threat Changes in the telecom-operator business in Finland traditional high dependency on multinational telecom operators Based on the Security Strategy for Society critical information and communication systems must function in all security situations same information systems must be available in all situations 5
6 Key guidelines of the project Critical information is stored in Finland Critical systems are controlled in Finland Information security is ensured with efficient surveillance and encryption Steering factors: High preparedness of the implemented solutions Integrated ICT services Cost efficiency and energy efficiency 6
7 Tasks of the Security Network Project Planning and implementing a high preparedness security network service for public authorities joint effort between 5 ministries Prime Minister s Office is in charge of the evaluation project Integration of the existing government ICT network solutions Development of the IT-services and the interoperability of the IT-services Out of the project s scope: development and funding of new applications 7
8 Project Organisation GOVERNMENT STEERING GROUP PROJECT GROUP MINISTRY OF FINANCE PROJECT MANAGER SECURITY NETWORK UNIT COORDINATION GROUP MINISTRY OF INTERIOR MINISTRY OF DEFENCE GMDSS PROJ. VIRVE PROJ. INFORMATION NETWORK PROJECT ITC-SOLUTIONS - DEVELOPMENT PROJECT TUVE- LOCAL NET- WORK PROJ. OPNET TUVE- PROJ. PALHA PROJ. HAL- NET- TUVE PROJ. DEVELOPMENT GROUPS PRIME MINISTER S OFFICE, MINISTRY FOR FOREIGN AFFAIRS, MINISTRY OF TRANSPORT AND COMMUNICATIONS Osasto Security Network Project 2011 pp.kk.vvvv 8
9 Time Schedule and Budget The project was established after a government plenary session on 8 April Finishing date of the project is 31 December 2012 Total budget EUR 187 million Investments necessary for improving security demands higher operating costs in different administrative branches of government These costs can be partly offset by gains achieved through more efficient procedures The Government s decision-in-principle on 12 May 2011: State Security Networks Ltd will take over the responsibility for the infrastructure of the Security Network 9
10 Project Output Government Security Network Solution Government Security Network Service Delivery Model Integrating the systems of the security authorities into the Government Security Network Secured integration of the Government Security Network into other ICT networks SecNet Architectures: Overall Architecture Integration Architecture SecNet Policies: Preparedness Policy Information Security Policy Telecommunications Policy 10
11 Security Network Project Benefits Ensuring the continuity of the activities of security authorities in all situations More effective interaction between different authorities Access by all users to a wide range of services provided by different authorities Better control of ICT costs 11
12 Initialization of the Security Network The introduction of Security Network services will begin on 1 January 2013 The Ministry of Finance will be responsible for the strategic steering of the Security Network Suomen Turvallisuusverkko Ltd will be responsible for Security Network operator activity from 1 January 2013 founded on 15 Feb 2012, a subsidiary of State Security Networks Ltd The transfer of Security Network s operational, maintenance and development responsibility means that the tasks of these functions and of the personnel who do them will be discontinued in the current production units during the transition period the Defence Forces C4 Agency is the network operator and HALTIK Internal Security ICT Agency the service operator of the Security Network the transfer of functions will be implemented as transfers of business Osasto Security Network Project 2011 pp.kk.vvvv 12
13 Initialization of the Security Network A Security Network Act is intended to come into force on 1 January 2013 A Government proposal for a Government Security Network Act will be given to Parliament in September 2012 A Security Network Strategy has been ratified by the project s Steering Group on 12 March 2012 the strategy specifies Security Network services and funding as well as the steering of Security Network activity and transition periods The first security authority operating locations were integrated into the Security Network at the beginning of 2011 Osasto Security Network Project 2011 pp.kk.vvvv 13
14 Performance Development Path 201X Development of shared services 5. Shared corporate data 4. Data convergence SecNet X Shared services enable common planning and scenarios. Shared corporate data enables shared data storage and use. Data convergence enables data exchange 3. Shared data transfer - Other network services 2. Enabling data transfer - Infrastructure services 1. Shared network - transmission SecNet Shared secure network enables shared systems and services and secure use of dedicated systems 2009 Benefits 14
15 More Information Ministry of Finance Public Sector ICT Mr Olli Peltonen, Project Manager (switchboard) 15
The TORI project: 19 March 2013 Sari-Anne Hannula, Project Manager VM JulkICT function
The TORI project: bringing together domainindependent government ICT tasks 19 March 2013 Sari-Anne Hannula, Project Manager VM JulkICT function Government Programme Background > all functions of the State
More informationAct on Background Checks
NB: Unofficial translation Ministry of Justice, Finland Act on Background Checks (177/2002) Chapter 1 General provisions Section 1 Scope of application (1) This Act applies to background checks, which
More informationcoordination structure
The national anti-fraud coordination structure By General Giovambattista Urso Florence, 9-10 May 2013 Community principles Article 325, Treaty on the Functioning of the European Union principle of assimilation,
More informationThe challenge of corporate safety and security
Safety and Security Engineering 821 The challenge of corporate safety and security M. Lanne & M. Räikkönen VTT Technical Research Centre of Finland Abstract Large organisations need to control several
More informationDet talte ord gælder
Thank you for the invitation. I m pleased to be given this opportunity to speak to you about Homeland Security, seen from my point of view. Homeland Security is a concept we ve all grown very familiar
More informationRequirements for ICT Contingency Planning
MINISTRY OF FINANCE F inland Requirements for ICT Contingency Planning The Government Information Security Management Board 2b/2012 VAHTI Requirements for ICT Contingency Planning Government Information
More informationOUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
More informationDEFENCE INDUSTRY POLICY 2013-2022
DEFENCE INDUSTRY POLICY 2013-2022 Introduction Pursuant to Subsection 60 (1) of the Government of the Republic Act, the Ministry of Defence is responsible for developing the defence industry. Subsections
More informationDEMOCRATIC REPUBLIC OF TIMOR-LESTE NATIONAL PARLIAMENT
DEMOCRATIC REPUBLIC OF TIMOR-LESTE NATIONAL PARLIAMENT LAW No. /2003 INTERNAL SECURITY Ensuring internal security constitutes a pre-condition for safeguarding the peace and stability of any sovereign country
More informationYOUTH GUARANTEE IS ON THE YOUNG PERSON'S SIDE! www.nuorisotakuu.fi 1
YOUTH GUARANTEE IS ON THE YOUNG PERSON'S SIDE! www.nuorisotakuu.fi 1 Contents What is the youth guarantee? Why the youth guarantee? Goals and messages of the youth guarantee Who implements the youth guarantee?
More informationMEMORANDUM OF UNDERSTANDING
MEMORANDUM OF UNDERSTANDING BETWEEN THE GOVERNMENT OF THE KINGDOM OF SWEDEN AND THE MINISTRY OF DEFENCE OF THE KINGDOM OF DENMARK ON THE ENHANCED DEFENCE COOPERATION WITHIN THE AIR AND MARITIME DOMAIN
More informationOPENING STATEMENT: TIME TAKEN TO PROCESS COMPENSATION CLAIMS
OPENING STATEMENT: TIME TAKEN TO PROCESS COMPENSATION CLAIMS At the last Senate Estimates in November 2013, we acknowledged the urgent work needed to address claims processing times. The Minister for Veterans'
More informationG-MOSAIC. Project introduction Luboš Kučera Gisat. Project managed by Sergio Proietti Telespazio S.p.A.
GMES services for Management of Operations, Situation Awareness and Intelligence for regional Crises Project introduction Luboš Kučera Gisat Project managed by Sergio Proietti Telespazio S.p.A. G-MOSAIC
More informationPerformance Management and Budgeting in Finland
1.2.6. Performance Management and Performance Based Budgeting Performance Management and Budgeting in Finland Panu Kukkonen Administrative Governance and Development The Content of the Presentation Finnish
More informationHow To Improve The Finnish Public Sector Information Resources
Memorandum VM040:00/2013 885/00.01.00.01/2013 1 (11) 19.10.2015 Public Sector ICT Ministry of Finance Anne Kauhanen-Simanainen Margit Suurhasko Mikael Vakkari Open Data Policy in the Finnish Government
More informationDanish Emergency Management Agency. Crisis Management in Denmark
Danish Emergency Management Agency Crisis Management in Denmark 1 Crisis Management in Denmark Published by: Danish Emergency Management Agency Datavej 16 3460 Birkerød Phone: +45 45 90 60 00 Fax: +45
More informationCROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the
CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the DECISION PROMULGATING THE ACT ON THE SECURITY INTELLIGENCE SYSTEM OF THE REPUBLIC OF CROATIA
More informationCloud Security Standardisation & Certification. Arjan de Jong Policy Advisor Information Security
Cloud Security Standardisation & Certification Arjan de Jong Policy Advisor Information Security Overview Economics of standardization and certification (EU) Legal requirements for (cloud) security International
More informationStatistics on Requests for data under the Data Retention Directive
Statistics on Requests for data under the Data Retention Directive Introduction 1. Directive 2006/24/EC on data retention ('the DRD') 1 requires Member States to provide the Commission on a yearly basis
More informationDay 2: Ministry (MEE) and Its Branch as Part of Government
Day 2: Ministry (MEE) and Its Branch as Part of Government Tapio Laamanen 11th January 2011 The Decision on the Ministry of Employment and the Economy (MEE) The decision on the establishment of the Ministry
More informationThe Security Technologies Industry in Germany
Chris Schmidt - istockphoto Industry Forum on Security Technology and Chemicals 14 th December 2011 in Tel Aviv, Israel Jérôme Hull Manager Mechanical & Electronical Technologies Germany Trade & Invest
More informationInternet of Things Development for the Promotion of Information Economy
2015/SOM2/TEL51/DSG/009 Agenda Item: 4.2 Internet of Things Development for the Promotion of Information Economy Purpose: Information Submitted by: China ICT Development Steering Group Meeting Boracay,
More informationNew Mobile Network Enhances Public Safety in Finland
Case Studies, M. Basso Research Note 8 July 2003 New Mobile Network Enhances Public Safety in Finland A private network based on TETRA technology is revolutionizing public safety in Finland. The Virve
More informationCyber Security Strategy
2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...
More informationFuture cybersecurity threats and research needs.
www.thalesgroup.com Future cybersecurity threats and research needs. 3 rd Franco-American Workshop on Cybersecurity Lyon Kreshnik Musaraj kreshnik.musaraj@thalesgroup.com December 9. 2014 2 / Challenges
More informationAccident management and infrastructure security
Accident management and infrastructure security Dr. Björn Karlsson Director General, Iceland Construction Authority Associate Professor, Dept. of Civil and Environmental Engineering University of Iceland
More informationFinnish Administration and its modernisation
1.2.6 Performance Management and Performance Based Budgeting Day 2 Finnish Administration and its modernisation Mr Heikki Joustie Section I Finnish Administration Parliamentary Government Parliamentary
More informationCOMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL
EUROPEAN COMMISSION Brussels, 8.7.2014 COM(2014) 451 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL Better situational awareness by enhanced cooperation across maritime
More informationFinnish Cyber Security Strategy. Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva
Finnish Cyber Security Strategy Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva 1 Changing threat landscape 2 Annual losses caused by cybercrime over $400 billion
More informationCYBER SECURITY. Marcin Olender Head of Unit Information Society Department
CYBER SECURITY Marcin Olender Head of Unit Information Society Department 1 MINISTRY OF ADMINISTRATION AND DIGITIZATION OF POLAND The areas of our activity: The Ministry was established on 18 November
More informationYour. Tax Dollar. Here s a quick overview of where your Tax Dollar went and how it was raised in the Fiscal year ended March 31, 2012
Your Tax Dollar Here s a quick overview of where your Tax Dollar went and how it was raised in the Fiscal year ended March 31, 2012 Table of Contents Transfer payments 3 Transfers to persons 4-6 Transfers
More informationPeter Sylvester - EdelWeb
Peter Sylvester - EdelWeb A standard for authorization management for secure interoperability of multi-organisation information systems 6th European Forum on Electronic Signatures June 7-9, 2006, Amber
More informationSecure telephony via classic and IP networks. office security solutions
Secure telephony via classic and IP networks office security solutions Every kind of telephone technology has its information risks... Telephone conversations are still a core function of daily communications
More informationNATO Flirting with a More Comprehensive Approach to Alliance Security
Analysis, Modeling, Simulation and Experimentation NATO Flirting with a More Comprehensive Approach to Alliance Security 13 th ICCRTS June 17-19 2008 Mark N. Clemente Senior Effects-Based Analyst The Boeing
More informationSAR Co-operation Plan. Parts 3 6
SAR Co-operation Plan Parts 3 6 Contents Introduction... 1 Description of a SAR Co-operation Plan... 1 Corrections and Updating... 1 Part 3 Maritime Rescue Co-ordination Centre and Sub-centre... 2 3.1
More informationFinland s Cyber security Strategy
Finland s Cyber security Strategy FINLAND S CYBER SECURITY STRATEGY Government Resolution 24.1.2013 1 TABLE OF CONTENTS 1. INTRODUCTION... 1 2. VISION FOR CYBER SECURITY... 3 3. CYBER SECURITY MANAGEMENT
More informationFreedom, Security, Privacy. European Home Affairs in an open world
Freedom, Security, Privacy European Home Affairs in an open world istockphoto.com/frankydemeyer, sam.7 Report of the Informal High Level Advisory Group on the Future of European Home Affairs Policy ( The
More informationCITIC Telecom CPC, CITIC Networks Successfully Enter High Bandwidth Capacity Market with GDS as its First Strategic Partner
For Immediate Release CITIC Telecom CPC, CITIC Networks Successfully Enter High Bandwidth Capacity Market with GDS as its First Strategic Partner Collaborative effort for developing a new service model
More informationIcelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018
Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018 Summary in English of the Icelandic National Cyber Security Strategy approved by the Minister of the Interior in April 2015
More informationRules for the Public Administration
Cloud Computing & Healthcare Rules for the Public Administration Daniele Tatti tatti@digitpa.gov.it @DanieleTatti In the next 12 minutes What is DigitPA European scenario Cloud related activities ehealth
More informationOn the European experience in critical infrastructure protection
DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation
More informationCBRN National Action Plans
Chemical Biological Radiological Nuclear Risk Mitigation - Centres of Excellence CBRN National Action Plans Irakli Beridze Senior Strategy and Policy Advisor UNICRI Jointly implemented by the EC JRC and
More informationMINISTRY OF AGRICULTURE OF HUNGARY
MINISTRY OF AGRICULTURE OF HUNGARY Introduction of the institutional framework of the Administration of the Hungarian Agriculture International Development Cooperation of the Ministry of Agriculture of
More informationemergency.lu aims to improve the worldwide preparedness and rapid response capacity by filling the communication gap in the first hours and days
emergency.lu emergency.lu aims to improve the worldwide preparedness and rapid response capacity by filling the communication gap in the first hours and days after a disaster emergency.lu is a multi-layer
More informationPosition Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security
Position Paper: Berlin, 31 March 2014 Legislative intentions to increase IT Security eco the Association of the sees itself as lobbyist and supporter of all companies that are involved in the economic
More informationParliamentary Resolution
Parliamentary Resolution on a Strategic Regional Plan for the years 2014 2017 The Parliament of Iceland approves a resolution to instruct the Government to implement a Strategic Regional Plan for the years
More informationThe Crisis Management System in Germany
The Crisis Management System in Germany www.bmi.bund.de Last update: January 2010 Contents Preliminary remarks... 5 1. Background... 5 2. Legal framework... 8 3. Crisis management at the federal level..
More informationOpen Data Policy in the Finnish Government
1 (8) 29.9.2015 Open Data Programme Public Sector ICT Ministry of Finance Anne Kauhanen-Simanainen Margit Suurhasko vm.fi/opendata Open Data Policy in the Finnish Government In Finland, information resources
More informationNATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
More informationwww.gipfelsoli.org http://euro-police.noblogs.org
www.gipfelsoli.org http://euro-police.noblogs.org Proactive Repression IMF: More public disorder "Economy-related riots and unrest in various global markets if the financial crisis is not addressed and
More informationMinistry of Science and Technology Strategy and Research Division
Job Title: Director, Strategy and Research The Job: A three (3) year contract position. Job Summary: The incumbent is responsible, at an Executive level, for the technical, operational and administrative
More informationInternational Classification of Business Functions
ESA/STAT/AC.234/27 13 May 2011 UNITED NATIONS DEPARTMENT OF ECONOMIC AND SOCIAL AFFAIRS STATISTICS DIVISION Expert Group meeting on International economic and social classifications New York, 18-20 May
More informationNational Security Auditing Criteria (KATAKRI) version II, 2011
FINNISH NATIONAL SECURITY AUTHORITY National Security Auditing Criteria (KATAKRI) version II, 2011 This translation of the Finnish KATAKRI criteria has been slightly modified from the national version
More informationCyber Security Solutions
Cyber Security Solutions Defending the Enterprise General Dynamics Information Technology defends mission-critical systems including government, health, finance, defence, large-enterprise and national
More informationDay 5: Different Approaches and Tools to Prepare a Strategy
Day 5: Different Approaches and Tools to Prepare a Strategy Tapio Laamanen 14th January 2011 Government Foresight Network An interministerial forum for cooperation and exchange of information in issues
More informationRescue services in Finland
Rescue services in Finland 2 Rescue services in Finland Accident prevention. Rescue operations. Preparedness and civil defence. Ready to deal with all types of incidents from the very minor to major disasters.
More information$1 Items included in these Supplementary Estimates
The following table presents authorities requested by organizations in $1 items. The underlined text indicates the authority being sought. Agriculture and Agri-Food Agriculture and Agri-Food Department
More informationFINLAND S CYBER SECURITY STRATEGY. Background dossier
FINLAND S CYBER SECURITY STRATEGY Background dossier TABLE OF CONTENTS 1. INTRODUCTION... 3 2. CYBER DOMAIN AND CYBER THREAT... 3 3. PRINCIPLES OF CYBER SECURITY MANAGEMENT AND... THE MANAGEMENT OF DISTURBANCES...
More informationOFFSHORE E-COMMERCE STRATEGIES CONFERENCE. TORONTO, CANADA 19th & 20th February 2001
OFFSHORE E-COMMERCE STRATEGIES CONFERENCE TORONTO, CANADA 19th & 20th February 2001 THE KEY ADVANTAGES OF THE ISLE OF MAN FOR OFFSHORE E-COMMERCE TIM CRAINE Director of e-commerce, Isle of Man Government
More informationFinnish Security Intelligence Service
Finnish Security Intelligence Service CONTENTS 4 Preventive task 7 National Counterterrorism Strategy 10 Operating environment 14 Counterterrorism 20 Countering of illegal intelligence 26 Security work
More informationResponse to the European Commission s consultation on the legal framework for the fundamental right to protection of personal data
Stockholm: Göteborg: Malmö: 105 24 Stockholm Box 57 Box 4221 Fax 08 640 94 02 401 20 Göteborg 203 13 Malmö Plusgiro: 12 41-9 Org. Nr: 556134-1248 www.intrum.se Bankgiro: 730-4124 info@se.intrum.com Response
More informationImproving the fire safety of elderly people and reducing fire deaths
Improving the fire safety of elderly people and reducing fire deaths Olli-Pekka Ojanen Chief Executive Officer Tampere Regional Rescue Department Working group: Seppo Männikkö, Jouni Honkanen, Markku Suominen,
More informationMinistry of Transport, Public Works and Water Management Bob Oudshoorn
PREVENTION CRIMINALITY IN ROAD TRANSPORT Ministry of Transport, Public Works and Water Management Bob Oudshoorn 29 april 2009 Covenant Tackling Crime in Road Transport Sector 50% of the enterprises are
More informationCyberspace Situational Awarness in National Security System
Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, r.piotrowski@wil.waw.pl, j.sliwa@wil.waw.pl
More informationThe New Dose Rate Monitoring Network in Finland
The New Dose Rate Monitoring Network in Finland Radiation and Nuclear Safety Authority Environmental surveillance and preparedness Head of Laboratory Kaj Vesterbacka September 20, 2007 RADIATION AND NUCLEAR
More informationPresidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY
Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY December 2013 Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND
More informationNovember 2 nd 4 th, 2011. Belgrade Fair, Serbia
2 nd INTERNATIONAL SECURITY FAIR High technology in Public and Private Security. Total building solutions-the smart building concept. Corporate and industrial security. Technical and physical security.
More informationDatabase to support inter-psap communications in Europe CEPT/ECC Feasibility Study. Freddie McBride, European Communications Office
Database to support inter- communications in Europe CEPT/ECC Feasibility Study Freddie McBride, European Communications Office EENA Members Workshop Brussels, 19-20 October 2015 CEPT/ECC/WG NaN Organisation
More informationEU Cybersecurity: Ensuring Trust in the European Digital Economy
EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'
More informationFOR ASIAN-PACIFIC SENIOR OFFICERS. General information
CESEDEN 2 nd HIGH DEFENCE STUDIES COURSE FOR ASIAN-PACIFIC SENIOR OFFICERS General information MAY 2013 SPANISH HIGHER DEFENCE STUDIES COLLEGE GENERAL INFORMATION 1. BACKGROUND As a result of Spain s interest
More informationConsolidated Fund Receipts Detailed Estimates : 2013-14 22 - Ministry of Home Affairs
155 Consolidated Fund Receipts Detailed Estimates : 2013-14 2201 Secretariat 0001 Secretariat Interest 1632 Interest on House Loan 50,00 50,00 50,00 1633 Interest on Computer Loan 2,50 2,50 2,50 1634 Interest
More informationTHE FORMER YUGOSLAV REPUBLIC OF MACEDONIA
INSTRUMENT FOR PRE-ACCESSION ASSISTANCE (IPA II) 2014-2020 THE FORMER YUGOSLAV REPUBLIC OF MACEDONIA Implementation of business continuity and disaster recovery system phase 2 Action Summary The overall
More informationThe UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
More informationRegulatory Framework for Disaster Recovery Planning for the ICT Industry
Regulatory Framework for Disaster Recovery Planning for the ICT Industry Kingdom of Saudi Arabia Regulatory Framework for Disaster Recovery Planning for the ICT Industry Page 1 of 6 1. INTRODUCTION 1.1
More informationMapping of Institutional Architecture for Protection from Oil Spills in the Baltic Sea Region. Survey results and report
Mapping of Institutional Architecture for Protection from Oil Spills in the Baltic Sea Region Survey results and report Mapping of Institutional Architecture for Protection from Oil Spills in the Baltic
More informationAGENCY: International Trade Administration, Department of Commerce.
This document is scheduled to be published in the Federal Register on 09/30/2014 and available online at http://federalregister.gov/a/2014-23210, and on FDsys.gov DEPARTMENT OF COMMERCE International Trade
More informationCyber Security VTT and the Finnish Approach
Cyber Security VTT and the Finnish Approach September 22, 2015 Reijo Savola, Principal Scientist CHALLENGES Explosive increase in number and impact of cyber security attacks Use of Internet technologies
More informationThe German interagency approach to SSA
Lieutenant Colonel (GS) Karsten Auras, German Air Force Headquarters, 1 I b Space Concepts Presentation for the 2015 Japan Space Forum SSA Symposium, Tokyo, Japan The German interagency approach to SSA
More informationEnsuring operational continuity
Certification of BCMS (Business Continuity Management Systems) Standard BS 25999-2 Certification of BCMS (Business Continuity Management System Ensuring operational continuity in the event of interruptions,
More informationFinal reports on deepened defence cooperation between Finland and Sweden
Final reports on deepened defence cooperation between Finland and Sweden Report by the Finnish Defence Forces and the Swedish Armed Forces 1 Background In this joint final report the Finnish Defence Forces
More informationEuropean Organization for Security (EOS) - Description and Envisaged Activities for 2012
European Organization for Security (EOS) - Description and Envisaged Activities for 2012 EOS Objectives and Activities EOS is a tool for European security stakeholders for the comprehensive implementation
More informationH2020-EUJ-2016: EU-Japan Joint Call. EUJ-02-2016: IoT/Cloud/Big Data platforms in social application contexts
H2020-EUJ-2016: EU-Japan Joint Call EUJ-02-2016: IoT/Cloud/Big Data platforms in social application contexts EUJ-02-2016: IoT/Cloud/Big Data The Challenge The Integration and federation of IoT with Big
More informationsuccessstory Security for Diplomacy High Security for Embassy Networks
successstory Security for Diplomacy High Security for Embassy Networks Today the consistent deployment of strong cryptography, along with key management that regulates access to data, are the only ways
More informationThe Information Society Policy Guidelines for the Association of Finnish Local and Regional Authorities 2015
The Information Society Policy Guidelines for the Association of Finnish Local and Regional Authorities 2015 Association of Finnish Local and Regional Authorities 2008 Background and purpose In the year
More informationESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM
Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY
More informationDay 4: Strategy Implementation Case: Law-drafting
Day 4: Strategy Implementation Case: Law-drafting Tapio Laamanen 13th January 2011 Law-drafting Process in MEE Initiative EU/National - Government programme Preliminary preparation -Present situation -Options:
More informationBlue Light Air Assets: A Swedish Helicopter Perspective. By Markus Planmo Swedish Association of Local Authorities and Regions
Blue Light Air Assets: A Swedish Helicopter Perspective By Markus Planmo Swedish Association of Local Authorities and Regions About me Former: Political Adviser, Ministry of Defence Primary Secretary,
More informationThe guidance will be developed over time in the light of practical experience.
Freedom of Information Act Awareness Guidance No. 14 International Relations The Information Commissioner s Office (ICO) has produced this guidance as part of a series of good practice guidance designed
More informationCouncil of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union
Council of the European Union Brussels, 4 July 2014 (OR. en) 11603/14 ADD 1 COVER NOTE From: date of receipt: 2 July 2014 To: No. Cion doc.: Subject: RECH 323 TELECOM 140 MI 521 DATAPROTECT 100 COMPET
More informationTargeting and reporting performance - Finnish experiences
1.2.6 Performance Management and Performance Based Budgeting Day 4 Targeting and reporting performance - Finnish experiences Mr Heikki Joustie 20 January 2011 20 years of result orientation Lump sum budgets
More informationCLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?
CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com lfinch@salesforce.com David T.S. Fraser Partner McInnes Cooper David.fraser@mcinnescooper.com
More informationValueSec use case scenario: Alcohol abuse intervention in Finland
ValueSec use case scenario: Alcohol abuse intervention in Finland Director Tarja Mankkinen Ministry of the Interior Finland Brussels, 10 th December 2013 7.1.2014 Government Programme, 22 June 2011: The
More informationEgyptian Best Practices Securing E-Services
Egyptian Best Practices Securing E-Services Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA Agenda Security Measures for E-Services Examples of E- Services Threats
More informationXXXV. FINLAND 8 4. An accomplice in an international offence shall be always be liable to punishment.
An accomplice in an international offence shall be always be liable to punishment. As regards the criminalization of the provisions and collection of funds for terrorist acts committed outside Ethiopia,
More informationAgile Information Security Management in Software R&D
Agile Information Security Management in Software R&D Rational and WebSphere User Group Finland Seminar 29.01.2008 Reijo Savola Network and Information Security Research Coordinator VTT Technical Research
More informationMain findings and opinions of the National Audit Office
Main findings and opinions of the National Audit Office Promotion of electronic archiving The operating environment of archiving and case management has changed significantly in the past 20 years. Administrative
More informationTECHBOARD COMMUNICATIONS DIVISION
1 TECHBOARD COMMUNICATIONS DIVISION, ALTERNATIVE COMMUNICATION, the newborn TECHBOARD COMMUNICATIONS DIVISION, has been working in the professional telecommunications field for more than 30 years. The
More informationThe internet and digital technologies play an integral part
The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet
More informationDe voorzitter van de Tweede Kamer der Staten-Generaal Binnenhof 4 2513 AA 's-gravenhage
> Retouradres Postbus 20401 2500 EK Den Haag De voorzitter van de Tweede Kamer der Staten-Generaal Binnenhof 4 2513 AA 's-gravenhage Datum Betreft Verwerven van overwegende zeggenschap in een telecommunicatiebedrijf
More informationInternal security and the strategy of the Ministry of the Interior
Internal security and the strategy of the Ministry of the Interior Virve Day 19 March 2013 Director-General Pentti Partanen, Department of Rescue Services 6/26/12 Internal security functions of the Ministry
More information