The Development of the Security Network

Size: px
Start display at page:

Download "The Development of the Security Network"

Transcription

1 Turvallisuus. Käytettävyys. Yhteistyö. The Development of the Security Network Ministry of Finance Security Network Project 03/2012

2 Contents of the Presentation 1. What is the Goverment Security Network? 2. Why introduce a Government Security Network? 3. Purpose of the Security Network Project 4. Timetable and Funding 5. Output and Benefits 6. Initialization of the Security Network 2

3 Government Security Network High preparedness telecommunications solution for the government and security authorities The security network ensures interaction and communication between the senior government officials, security authorities and other actors Secures the integrity, availability and confidentiality of critical information. Ministries Border Guard Defence Forces Police Emergency Responce Centres Rescue Authorities 3

4 Government telecommunications network Higher level of preparedness Higher costs Lower level of preparedness Lower costs Defence Forces Network Government Network Public networks e.g. Internet Military National Defence Security authorities ( persons) Other government authories ( persons) 4

5 Driving force behind the development Need to ensure telecommunication security and availability for senior government and security authorities growing cyber-threat Changes in the telecom-operator business in Finland traditional high dependency on multinational telecom operators Based on the Security Strategy for Society critical information and communication systems must function in all security situations same information systems must be available in all situations 5

6 Key guidelines of the project Critical information is stored in Finland Critical systems are controlled in Finland Information security is ensured with efficient surveillance and encryption Steering factors: High preparedness of the implemented solutions Integrated ICT services Cost efficiency and energy efficiency 6

7 Tasks of the Security Network Project Planning and implementing a high preparedness security network service for public authorities joint effort between 5 ministries Prime Minister s Office is in charge of the evaluation project Integration of the existing government ICT network solutions Development of the IT-services and the interoperability of the IT-services Out of the project s scope: development and funding of new applications 7

8 Project Organisation GOVERNMENT STEERING GROUP PROJECT GROUP MINISTRY OF FINANCE PROJECT MANAGER SECURITY NETWORK UNIT COORDINATION GROUP MINISTRY OF INTERIOR MINISTRY OF DEFENCE GMDSS PROJ. VIRVE PROJ. INFORMATION NETWORK PROJECT ITC-SOLUTIONS - DEVELOPMENT PROJECT TUVE- LOCAL NET- WORK PROJ. OPNET TUVE- PROJ. PALHA PROJ. HAL- NET- TUVE PROJ. DEVELOPMENT GROUPS PRIME MINISTER S OFFICE, MINISTRY FOR FOREIGN AFFAIRS, MINISTRY OF TRANSPORT AND COMMUNICATIONS Osasto Security Network Project 2011 pp.kk.vvvv 8

9 Time Schedule and Budget The project was established after a government plenary session on 8 April Finishing date of the project is 31 December 2012 Total budget EUR 187 million Investments necessary for improving security demands higher operating costs in different administrative branches of government These costs can be partly offset by gains achieved through more efficient procedures The Government s decision-in-principle on 12 May 2011: State Security Networks Ltd will take over the responsibility for the infrastructure of the Security Network 9

10 Project Output Government Security Network Solution Government Security Network Service Delivery Model Integrating the systems of the security authorities into the Government Security Network Secured integration of the Government Security Network into other ICT networks SecNet Architectures: Overall Architecture Integration Architecture SecNet Policies: Preparedness Policy Information Security Policy Telecommunications Policy 10

11 Security Network Project Benefits Ensuring the continuity of the activities of security authorities in all situations More effective interaction between different authorities Access by all users to a wide range of services provided by different authorities Better control of ICT costs 11

12 Initialization of the Security Network The introduction of Security Network services will begin on 1 January 2013 The Ministry of Finance will be responsible for the strategic steering of the Security Network Suomen Turvallisuusverkko Ltd will be responsible for Security Network operator activity from 1 January 2013 founded on 15 Feb 2012, a subsidiary of State Security Networks Ltd The transfer of Security Network s operational, maintenance and development responsibility means that the tasks of these functions and of the personnel who do them will be discontinued in the current production units during the transition period the Defence Forces C4 Agency is the network operator and HALTIK Internal Security ICT Agency the service operator of the Security Network the transfer of functions will be implemented as transfers of business Osasto Security Network Project 2011 pp.kk.vvvv 12

13 Initialization of the Security Network A Security Network Act is intended to come into force on 1 January 2013 A Government proposal for a Government Security Network Act will be given to Parliament in September 2012 A Security Network Strategy has been ratified by the project s Steering Group on 12 March 2012 the strategy specifies Security Network services and funding as well as the steering of Security Network activity and transition periods The first security authority operating locations were integrated into the Security Network at the beginning of 2011 Osasto Security Network Project 2011 pp.kk.vvvv 13

14 Performance Development Path 201X Development of shared services 5. Shared corporate data 4. Data convergence SecNet X Shared services enable common planning and scenarios. Shared corporate data enables shared data storage and use. Data convergence enables data exchange 3. Shared data transfer - Other network services 2. Enabling data transfer - Infrastructure services 1. Shared network - transmission SecNet Shared secure network enables shared systems and services and secure use of dedicated systems 2009 Benefits 14

15 More Information Ministry of Finance Public Sector ICT Mr Olli Peltonen, Project Manager (switchboard) 15

The TORI project: 19 March 2013 Sari-Anne Hannula, Project Manager VM JulkICT function

The TORI project: 19 March 2013 Sari-Anne Hannula, Project Manager VM JulkICT function The TORI project: bringing together domainindependent government ICT tasks 19 March 2013 Sari-Anne Hannula, Project Manager VM JulkICT function Government Programme Background > all functions of the State

More information

Act on Background Checks

Act on Background Checks NB: Unofficial translation Ministry of Justice, Finland Act on Background Checks (177/2002) Chapter 1 General provisions Section 1 Scope of application (1) This Act applies to background checks, which

More information

coordination structure

coordination structure The national anti-fraud coordination structure By General Giovambattista Urso Florence, 9-10 May 2013 Community principles Article 325, Treaty on the Functioning of the European Union principle of assimilation,

More information

The challenge of corporate safety and security

The challenge of corporate safety and security Safety and Security Engineering 821 The challenge of corporate safety and security M. Lanne & M. Räikkönen VTT Technical Research Centre of Finland Abstract Large organisations need to control several

More information

Requirements for ICT Contingency Planning

Requirements for ICT Contingency Planning MINISTRY OF FINANCE F inland Requirements for ICT Contingency Planning The Government Information Security Management Board 2b/2012 VAHTI Requirements for ICT Contingency Planning Government Information

More information

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

DEFENCE INDUSTRY POLICY 2013-2022

DEFENCE INDUSTRY POLICY 2013-2022 DEFENCE INDUSTRY POLICY 2013-2022 Introduction Pursuant to Subsection 60 (1) of the Government of the Republic Act, the Ministry of Defence is responsible for developing the defence industry. Subsections

More information

YOUTH GUARANTEE IS ON THE YOUNG PERSON'S SIDE! www.nuorisotakuu.fi 1

YOUTH GUARANTEE IS ON THE YOUNG PERSON'S SIDE! www.nuorisotakuu.fi 1 YOUTH GUARANTEE IS ON THE YOUNG PERSON'S SIDE! www.nuorisotakuu.fi 1 Contents What is the youth guarantee? Why the youth guarantee? Goals and messages of the youth guarantee Who implements the youth guarantee?

More information

MEMORANDUM OF UNDERSTANDING

MEMORANDUM OF UNDERSTANDING MEMORANDUM OF UNDERSTANDING BETWEEN THE GOVERNMENT OF THE KINGDOM OF SWEDEN AND THE MINISTRY OF DEFENCE OF THE KINGDOM OF DENMARK ON THE ENHANCED DEFENCE COOPERATION WITHIN THE AIR AND MARITIME DOMAIN

More information

G-MOSAIC. Project introduction Luboš Kučera Gisat. Project managed by Sergio Proietti Telespazio S.p.A.

G-MOSAIC. Project introduction Luboš Kučera Gisat. Project managed by Sergio Proietti Telespazio S.p.A. GMES services for Management of Operations, Situation Awareness and Intelligence for regional Crises Project introduction Luboš Kučera Gisat Project managed by Sergio Proietti Telespazio S.p.A. G-MOSAIC

More information

Performance Management and Budgeting in Finland

Performance Management and Budgeting in Finland 1.2.6. Performance Management and Performance Based Budgeting Performance Management and Budgeting in Finland Panu Kukkonen Administrative Governance and Development The Content of the Presentation Finnish

More information

How To Improve The Finnish Public Sector Information Resources

How To Improve The Finnish Public Sector Information Resources Memorandum VM040:00/2013 885/00.01.00.01/2013 1 (11) 19.10.2015 Public Sector ICT Ministry of Finance Anne Kauhanen-Simanainen Margit Suurhasko Mikael Vakkari Open Data Policy in the Finnish Government

More information

Danish Emergency Management Agency. Crisis Management in Denmark

Danish Emergency Management Agency. Crisis Management in Denmark Danish Emergency Management Agency Crisis Management in Denmark 1 Crisis Management in Denmark Published by: Danish Emergency Management Agency Datavej 16 3460 Birkerød Phone: +45 45 90 60 00 Fax: +45

More information

CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the

CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the DECISION PROMULGATING THE ACT ON THE SECURITY INTELLIGENCE SYSTEM OF THE REPUBLIC OF CROATIA

More information

Cloud Security Standardisation & Certification. Arjan de Jong Policy Advisor Information Security

Cloud Security Standardisation & Certification. Arjan de Jong Policy Advisor Information Security Cloud Security Standardisation & Certification Arjan de Jong Policy Advisor Information Security Overview Economics of standardization and certification (EU) Legal requirements for (cloud) security International

More information

Statistics on Requests for data under the Data Retention Directive

Statistics on Requests for data under the Data Retention Directive Statistics on Requests for data under the Data Retention Directive Introduction 1. Directive 2006/24/EC on data retention ('the DRD') 1 requires Member States to provide the Commission on a yearly basis

More information

The Security Technologies Industry in Germany

The Security Technologies Industry in Germany Chris Schmidt - istockphoto Industry Forum on Security Technology and Chemicals 14 th December 2011 in Tel Aviv, Israel Jérôme Hull Manager Mechanical & Electronical Technologies Germany Trade & Invest

More information

Internet of Things Development for the Promotion of Information Economy

Internet of Things Development for the Promotion of Information Economy 2015/SOM2/TEL51/DSG/009 Agenda Item: 4.2 Internet of Things Development for the Promotion of Information Economy Purpose: Information Submitted by: China ICT Development Steering Group Meeting Boracay,

More information

New Mobile Network Enhances Public Safety in Finland

New Mobile Network Enhances Public Safety in Finland Case Studies, M. Basso Research Note 8 July 2003 New Mobile Network Enhances Public Safety in Finland A private network based on TETRA technology is revolutionizing public safety in Finland. The Virve

More information

Cyber Security Strategy

Cyber Security Strategy 2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...

More information

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL EUROPEAN COMMISSION Brussels, 8.7.2014 COM(2014) 451 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL Better situational awareness by enhanced cooperation across maritime

More information

Finnish Cyber Security Strategy. Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva

Finnish Cyber Security Strategy. Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva Finnish Cyber Security Strategy Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva 1 Changing threat landscape 2 Annual losses caused by cybercrime over $400 billion

More information

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department CYBER SECURITY Marcin Olender Head of Unit Information Society Department 1 MINISTRY OF ADMINISTRATION AND DIGITIZATION OF POLAND The areas of our activity: The Ministry was established on 18 November

More information

Your. Tax Dollar. Here s a quick overview of where your Tax Dollar went and how it was raised in the Fiscal year ended March 31, 2012

Your. Tax Dollar. Here s a quick overview of where your Tax Dollar went and how it was raised in the Fiscal year ended March 31, 2012 Your Tax Dollar Here s a quick overview of where your Tax Dollar went and how it was raised in the Fiscal year ended March 31, 2012 Table of Contents Transfer payments 3 Transfers to persons 4-6 Transfers

More information

Secure telephony via classic and IP networks. office security solutions

Secure telephony via classic and IP networks. office security solutions Secure telephony via classic and IP networks office security solutions Every kind of telephone technology has its information risks... Telephone conversations are still a core function of daily communications

More information

NATO Flirting with a More Comprehensive Approach to Alliance Security

NATO Flirting with a More Comprehensive Approach to Alliance Security Analysis, Modeling, Simulation and Experimentation NATO Flirting with a More Comprehensive Approach to Alliance Security 13 th ICCRTS June 17-19 2008 Mark N. Clemente Senior Effects-Based Analyst The Boeing

More information

SAR Co-operation Plan. Parts 3 6

SAR Co-operation Plan. Parts 3 6 SAR Co-operation Plan Parts 3 6 Contents Introduction... 1 Description of a SAR Co-operation Plan... 1 Corrections and Updating... 1 Part 3 Maritime Rescue Co-ordination Centre and Sub-centre... 2 3.1

More information

Finland s Cyber security Strategy

Finland s Cyber security Strategy Finland s Cyber security Strategy FINLAND S CYBER SECURITY STRATEGY Government Resolution 24.1.2013 1 TABLE OF CONTENTS 1. INTRODUCTION... 1 2. VISION FOR CYBER SECURITY... 3 3. CYBER SECURITY MANAGEMENT

More information

Freedom, Security, Privacy. European Home Affairs in an open world

Freedom, Security, Privacy. European Home Affairs in an open world Freedom, Security, Privacy European Home Affairs in an open world istockphoto.com/frankydemeyer, sam.7 Report of the Informal High Level Advisory Group on the Future of European Home Affairs Policy ( The

More information

Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018

Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018 Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018 Summary in English of the Icelandic National Cyber Security Strategy approved by the Minister of the Interior in April 2015

More information

Rules for the Public Administration

Rules for the Public Administration Cloud Computing & Healthcare Rules for the Public Administration Daniele Tatti [email protected] @DanieleTatti In the next 12 minutes What is DigitPA European scenario Cloud related activities ehealth

More information

On the European experience in critical infrastructure protection

On the European experience in critical infrastructure protection DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV [email protected] @ratchevv DCAF/CSDM 1 This presentation

More information

CBRN National Action Plans

CBRN National Action Plans Chemical Biological Radiological Nuclear Risk Mitigation - Centres of Excellence CBRN National Action Plans Irakli Beridze Senior Strategy and Policy Advisor UNICRI Jointly implemented by the EC JRC and

More information

MINISTRY OF AGRICULTURE OF HUNGARY

MINISTRY OF AGRICULTURE OF HUNGARY MINISTRY OF AGRICULTURE OF HUNGARY Introduction of the institutional framework of the Administration of the Hungarian Agriculture International Development Cooperation of the Ministry of Agriculture of

More information

The Crisis Management System in Germany

The Crisis Management System in Germany The Crisis Management System in Germany www.bmi.bund.de Last update: January 2010 Contents Preliminary remarks... 5 1. Background... 5 2. Legal framework... 8 3. Crisis management at the federal level..

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

www.gipfelsoli.org http://euro-police.noblogs.org

www.gipfelsoli.org http://euro-police.noblogs.org www.gipfelsoli.org http://euro-police.noblogs.org Proactive Repression IMF: More public disorder "Economy-related riots and unrest in various global markets if the financial crisis is not addressed and

More information

International Classification of Business Functions

International Classification of Business Functions ESA/STAT/AC.234/27 13 May 2011 UNITED NATIONS DEPARTMENT OF ECONOMIC AND SOCIAL AFFAIRS STATISTICS DIVISION Expert Group meeting on International economic and social classifications New York, 18-20 May

More information

National Security Auditing Criteria (KATAKRI) version II, 2011

National Security Auditing Criteria (KATAKRI) version II, 2011 FINNISH NATIONAL SECURITY AUTHORITY National Security Auditing Criteria (KATAKRI) version II, 2011 This translation of the Finnish KATAKRI criteria has been slightly modified from the national version

More information

Rescue services in Finland

Rescue services in Finland Rescue services in Finland 2 Rescue services in Finland Accident prevention. Rescue operations. Preparedness and civil defence. Ready to deal with all types of incidents from the very minor to major disasters.

More information

$1 Items included in these Supplementary Estimates

$1 Items included in these Supplementary Estimates The following table presents authorities requested by organizations in $1 items. The underlined text indicates the authority being sought. Agriculture and Agri-Food Agriculture and Agri-Food Department

More information

FINLAND S CYBER SECURITY STRATEGY. Background dossier

FINLAND S CYBER SECURITY STRATEGY. Background dossier FINLAND S CYBER SECURITY STRATEGY Background dossier TABLE OF CONTENTS 1. INTRODUCTION... 3 2. CYBER DOMAIN AND CYBER THREAT... 3 3. PRINCIPLES OF CYBER SECURITY MANAGEMENT AND... THE MANAGEMENT OF DISTURBANCES...

More information

Finnish Security Intelligence Service

Finnish Security Intelligence Service Finnish Security Intelligence Service CONTENTS 4 Preventive task 7 National Counterterrorism Strategy 10 Operating environment 14 Counterterrorism 20 Countering of illegal intelligence 26 Security work

More information

Response to the European Commission s consultation on the legal framework for the fundamental right to protection of personal data

Response to the European Commission s consultation on the legal framework for the fundamental right to protection of personal data Stockholm: Göteborg: Malmö: 105 24 Stockholm Box 57 Box 4221 Fax 08 640 94 02 401 20 Göteborg 203 13 Malmö Plusgiro: 12 41-9 Org. Nr: 556134-1248 www.intrum.se Bankgiro: 730-4124 [email protected] Response

More information

Improving the fire safety of elderly people and reducing fire deaths

Improving the fire safety of elderly people and reducing fire deaths Improving the fire safety of elderly people and reducing fire deaths Olli-Pekka Ojanen Chief Executive Officer Tampere Regional Rescue Department Working group: Seppo Männikkö, Jouni Honkanen, Markku Suominen,

More information

Ministry of Transport, Public Works and Water Management Bob Oudshoorn

Ministry of Transport, Public Works and Water Management Bob Oudshoorn PREVENTION CRIMINALITY IN ROAD TRANSPORT Ministry of Transport, Public Works and Water Management Bob Oudshoorn 29 april 2009 Covenant Tackling Crime in Road Transport Sector 50% of the enterprises are

More information

Cyberspace Situational Awarness in National Security System

Cyberspace Situational Awarness in National Security System Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, [email protected], [email protected]

More information

The New Dose Rate Monitoring Network in Finland

The New Dose Rate Monitoring Network in Finland The New Dose Rate Monitoring Network in Finland Radiation and Nuclear Safety Authority Environmental surveillance and preparedness Head of Laboratory Kaj Vesterbacka September 20, 2007 RADIATION AND NUCLEAR

More information

Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY

Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY December 2013 Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND

More information

Database to support inter-psap communications in Europe CEPT/ECC Feasibility Study. Freddie McBride, European Communications Office

Database to support inter-psap communications in Europe CEPT/ECC Feasibility Study. Freddie McBride, European Communications Office Database to support inter- communications in Europe CEPT/ECC Feasibility Study Freddie McBride, European Communications Office EENA Members Workshop Brussels, 19-20 October 2015 CEPT/ECC/WG NaN Organisation

More information

EU Cybersecurity: Ensuring Trust in the European Digital Economy

EU Cybersecurity: Ensuring Trust in the European Digital Economy EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'

More information

THE FORMER YUGOSLAV REPUBLIC OF MACEDONIA

THE FORMER YUGOSLAV REPUBLIC OF MACEDONIA INSTRUMENT FOR PRE-ACCESSION ASSISTANCE (IPA II) 2014-2020 THE FORMER YUGOSLAV REPUBLIC OF MACEDONIA Implementation of business continuity and disaster recovery system phase 2 Action Summary The overall

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Regulatory Framework for Disaster Recovery Planning for the ICT Industry

Regulatory Framework for Disaster Recovery Planning for the ICT Industry Regulatory Framework for Disaster Recovery Planning for the ICT Industry Kingdom of Saudi Arabia Regulatory Framework for Disaster Recovery Planning for the ICT Industry Page 1 of 6 1. INTRODUCTION 1.1

More information

Cyber Security VTT and the Finnish Approach

Cyber Security VTT and the Finnish Approach Cyber Security VTT and the Finnish Approach September 22, 2015 Reijo Savola, Principal Scientist CHALLENGES Explosive increase in number and impact of cyber security attacks Use of Internet technologies

More information

The German interagency approach to SSA

The German interagency approach to SSA Lieutenant Colonel (GS) Karsten Auras, German Air Force Headquarters, 1 I b Space Concepts Presentation for the 2015 Japan Space Forum SSA Symposium, Tokyo, Japan The German interagency approach to SSA

More information

Ensuring operational continuity

Ensuring operational continuity Certification of BCMS (Business Continuity Management Systems) Standard BS 25999-2 Certification of BCMS (Business Continuity Management System Ensuring operational continuity in the event of interruptions,

More information

Final reports on deepened defence cooperation between Finland and Sweden

Final reports on deepened defence cooperation between Finland and Sweden Final reports on deepened defence cooperation between Finland and Sweden Report by the Finnish Defence Forces and the Swedish Armed Forces 1 Background In this joint final report the Finnish Defence Forces

More information

European Organization for Security (EOS) - Description and Envisaged Activities for 2012

European Organization for Security (EOS) - Description and Envisaged Activities for 2012 European Organization for Security (EOS) - Description and Envisaged Activities for 2012 EOS Objectives and Activities EOS is a tool for European security stakeholders for the comprehensive implementation

More information

H2020-EUJ-2016: EU-Japan Joint Call. EUJ-02-2016: IoT/Cloud/Big Data platforms in social application contexts

H2020-EUJ-2016: EU-Japan Joint Call. EUJ-02-2016: IoT/Cloud/Big Data platforms in social application contexts H2020-EUJ-2016: EU-Japan Joint Call EUJ-02-2016: IoT/Cloud/Big Data platforms in social application contexts EUJ-02-2016: IoT/Cloud/Big Data The Challenge The Integration and federation of IoT with Big

More information

successstory Security for Diplomacy High Security for Embassy Networks

successstory Security for Diplomacy High Security for Embassy Networks successstory Security for Diplomacy High Security for Embassy Networks Today the consistent deployment of strong cryptography, along with key management that regulates access to data, are the only ways

More information

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY

More information

The guidance will be developed over time in the light of practical experience.

The guidance will be developed over time in the light of practical experience. Freedom of Information Act Awareness Guidance No. 14 International Relations The Information Commissioner s Office (ICO) has produced this guidance as part of a series of good practice guidance designed

More information

Council of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union

Council of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union Council of the European Union Brussels, 4 July 2014 (OR. en) 11603/14 ADD 1 COVER NOTE From: date of receipt: 2 July 2014 To: No. Cion doc.: Subject: RECH 323 TELECOM 140 MI 521 DATAPROTECT 100 COMPET

More information

Targeting and reporting performance - Finnish experiences

Targeting and reporting performance - Finnish experiences 1.2.6 Performance Management and Performance Based Budgeting Day 4 Targeting and reporting performance - Finnish experiences Mr Heikki Joustie 20 January 2011 20 years of result orientation Lump sum budgets

More information

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING? Lindsey Finch Senior Global Privacy Counsel Salesforce.com [email protected] David T.S. Fraser Partner McInnes Cooper [email protected]

More information

ValueSec use case scenario: Alcohol abuse intervention in Finland

ValueSec use case scenario: Alcohol abuse intervention in Finland ValueSec use case scenario: Alcohol abuse intervention in Finland Director Tarja Mankkinen Ministry of the Interior Finland Brussels, 10 th December 2013 7.1.2014 Government Programme, 22 June 2011: The

More information

Egyptian Best Practices Securing E-Services

Egyptian Best Practices Securing E-Services Egyptian Best Practices Securing E-Services Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA Agenda Security Measures for E-Services Examples of E- Services Threats

More information

Agile Information Security Management in Software R&D

Agile Information Security Management in Software R&D Agile Information Security Management in Software R&D Rational and WebSphere User Group Finland Seminar 29.01.2008 Reijo Savola Network and Information Security Research Coordinator VTT Technical Research

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information