The Development of the Security Network

Size: px
Start display at page:

Download "The Development of the Security Network"

Transcription

1 Turvallisuus. Käytettävyys. Yhteistyö. The Development of the Security Network Ministry of Finance Security Network Project 03/2012

2 Contents of the Presentation 1. What is the Goverment Security Network? 2. Why introduce a Government Security Network? 3. Purpose of the Security Network Project 4. Timetable and Funding 5. Output and Benefits 6. Initialization of the Security Network 2

3 Government Security Network High preparedness telecommunications solution for the government and security authorities The security network ensures interaction and communication between the senior government officials, security authorities and other actors Secures the integrity, availability and confidentiality of critical information. Ministries Border Guard Defence Forces Police Emergency Responce Centres Rescue Authorities 3

4 Government telecommunications network Higher level of preparedness Higher costs Lower level of preparedness Lower costs Defence Forces Network Government Network Public networks e.g. Internet Military National Defence Security authorities ( persons) Other government authories ( persons) 4

5 Driving force behind the development Need to ensure telecommunication security and availability for senior government and security authorities growing cyber-threat Changes in the telecom-operator business in Finland traditional high dependency on multinational telecom operators Based on the Security Strategy for Society critical information and communication systems must function in all security situations same information systems must be available in all situations 5

6 Key guidelines of the project Critical information is stored in Finland Critical systems are controlled in Finland Information security is ensured with efficient surveillance and encryption Steering factors: High preparedness of the implemented solutions Integrated ICT services Cost efficiency and energy efficiency 6

7 Tasks of the Security Network Project Planning and implementing a high preparedness security network service for public authorities joint effort between 5 ministries Prime Minister s Office is in charge of the evaluation project Integration of the existing government ICT network solutions Development of the IT-services and the interoperability of the IT-services Out of the project s scope: development and funding of new applications 7

8 Project Organisation GOVERNMENT STEERING GROUP PROJECT GROUP MINISTRY OF FINANCE PROJECT MANAGER SECURITY NETWORK UNIT COORDINATION GROUP MINISTRY OF INTERIOR MINISTRY OF DEFENCE GMDSS PROJ. VIRVE PROJ. INFORMATION NETWORK PROJECT ITC-SOLUTIONS - DEVELOPMENT PROJECT TUVE- LOCAL NET- WORK PROJ. OPNET TUVE- PROJ. PALHA PROJ. HAL- NET- TUVE PROJ. DEVELOPMENT GROUPS PRIME MINISTER S OFFICE, MINISTRY FOR FOREIGN AFFAIRS, MINISTRY OF TRANSPORT AND COMMUNICATIONS Osasto Security Network Project 2011 pp.kk.vvvv 8

9 Time Schedule and Budget The project was established after a government plenary session on 8 April Finishing date of the project is 31 December 2012 Total budget EUR 187 million Investments necessary for improving security demands higher operating costs in different administrative branches of government These costs can be partly offset by gains achieved through more efficient procedures The Government s decision-in-principle on 12 May 2011: State Security Networks Ltd will take over the responsibility for the infrastructure of the Security Network 9

10 Project Output Government Security Network Solution Government Security Network Service Delivery Model Integrating the systems of the security authorities into the Government Security Network Secured integration of the Government Security Network into other ICT networks SecNet Architectures: Overall Architecture Integration Architecture SecNet Policies: Preparedness Policy Information Security Policy Telecommunications Policy 10

11 Security Network Project Benefits Ensuring the continuity of the activities of security authorities in all situations More effective interaction between different authorities Access by all users to a wide range of services provided by different authorities Better control of ICT costs 11

12 Initialization of the Security Network The introduction of Security Network services will begin on 1 January 2013 The Ministry of Finance will be responsible for the strategic steering of the Security Network Suomen Turvallisuusverkko Ltd will be responsible for Security Network operator activity from 1 January 2013 founded on 15 Feb 2012, a subsidiary of State Security Networks Ltd The transfer of Security Network s operational, maintenance and development responsibility means that the tasks of these functions and of the personnel who do them will be discontinued in the current production units during the transition period the Defence Forces C4 Agency is the network operator and HALTIK Internal Security ICT Agency the service operator of the Security Network the transfer of functions will be implemented as transfers of business Osasto Security Network Project 2011 pp.kk.vvvv 12

13 Initialization of the Security Network A Security Network Act is intended to come into force on 1 January 2013 A Government proposal for a Government Security Network Act will be given to Parliament in September 2012 A Security Network Strategy has been ratified by the project s Steering Group on 12 March 2012 the strategy specifies Security Network services and funding as well as the steering of Security Network activity and transition periods The first security authority operating locations were integrated into the Security Network at the beginning of 2011 Osasto Security Network Project 2011 pp.kk.vvvv 13

14 Performance Development Path 201X Development of shared services 5. Shared corporate data 4. Data convergence SecNet X Shared services enable common planning and scenarios. Shared corporate data enables shared data storage and use. Data convergence enables data exchange 3. Shared data transfer - Other network services 2. Enabling data transfer - Infrastructure services 1. Shared network - transmission SecNet Shared secure network enables shared systems and services and secure use of dedicated systems 2009 Benefits 14

15 More Information Ministry of Finance Public Sector ICT Mr Olli Peltonen, Project Manager (switchboard) 15

The TORI project: 19 March 2013 Sari-Anne Hannula, Project Manager VM JulkICT function

The TORI project: 19 March 2013 Sari-Anne Hannula, Project Manager VM JulkICT function The TORI project: bringing together domainindependent government ICT tasks 19 March 2013 Sari-Anne Hannula, Project Manager VM JulkICT function Government Programme Background > all functions of the State

More information

Act on Background Checks

Act on Background Checks NB: Unofficial translation Ministry of Justice, Finland Act on Background Checks (177/2002) Chapter 1 General provisions Section 1 Scope of application (1) This Act applies to background checks, which

More information

coordination structure

coordination structure The national anti-fraud coordination structure By General Giovambattista Urso Florence, 9-10 May 2013 Community principles Article 325, Treaty on the Functioning of the European Union principle of assimilation,

More information

Det talte ord gælder

Det talte ord gælder Thank you for the invitation. I m pleased to be given this opportunity to speak to you about Homeland Security, seen from my point of view. Homeland Security is a concept we ve all grown very familiar

More information

The challenge of corporate safety and security

The challenge of corporate safety and security Safety and Security Engineering 821 The challenge of corporate safety and security M. Lanne & M. Räikkönen VTT Technical Research Centre of Finland Abstract Large organisations need to control several

More information

Requirements for ICT Contingency Planning

Requirements for ICT Contingency Planning MINISTRY OF FINANCE F inland Requirements for ICT Contingency Planning The Government Information Security Management Board 2b/2012 VAHTI Requirements for ICT Contingency Planning Government Information

More information

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

DEFENCE INDUSTRY POLICY 2013-2022

DEFENCE INDUSTRY POLICY 2013-2022 DEFENCE INDUSTRY POLICY 2013-2022 Introduction Pursuant to Subsection 60 (1) of the Government of the Republic Act, the Ministry of Defence is responsible for developing the defence industry. Subsections

More information

Finnish Administration and its modernisation

Finnish Administration and its modernisation 1.2.6 Performance Management and Performance Based Budgeting Day 2 Finnish Administration and its modernisation Mr Heikki Joustie Section I Finnish Administration Parliamentary Government Parliamentary

More information

YOUTH GUARANTEE IS ON THE YOUNG PERSON'S SIDE! www.nuorisotakuu.fi 1

YOUTH GUARANTEE IS ON THE YOUNG PERSON'S SIDE! www.nuorisotakuu.fi 1 YOUTH GUARANTEE IS ON THE YOUNG PERSON'S SIDE! www.nuorisotakuu.fi 1 Contents What is the youth guarantee? Why the youth guarantee? Goals and messages of the youth guarantee Who implements the youth guarantee?

More information

MEMORANDUM OF UNDERSTANDING

MEMORANDUM OF UNDERSTANDING MEMORANDUM OF UNDERSTANDING BETWEEN THE GOVERNMENT OF THE KINGDOM OF SWEDEN AND THE MINISTRY OF DEFENCE OF THE KINGDOM OF DENMARK ON THE ENHANCED DEFENCE COOPERATION WITHIN THE AIR AND MARITIME DOMAIN

More information

DEMOCRATIC REPUBLIC OF TIMOR-LESTE NATIONAL PARLIAMENT

DEMOCRATIC REPUBLIC OF TIMOR-LESTE NATIONAL PARLIAMENT DEMOCRATIC REPUBLIC OF TIMOR-LESTE NATIONAL PARLIAMENT LAW No. /2003 INTERNAL SECURITY Ensuring internal security constitutes a pre-condition for safeguarding the peace and stability of any sovereign country

More information

INDUSTRIAL SECURITY MANUAL. Finland

INDUSTRIAL SECURITY MANUAL. Finland National Security Authority INDUSTRIAL SECURITY MANUAL Finland unofficial translation draft 1 December 2011 1 Introduction... 3 2 Duties and organisation of the National Security Authority... 4 2.1 Organisation

More information

OPENING STATEMENT: TIME TAKEN TO PROCESS COMPENSATION CLAIMS

OPENING STATEMENT: TIME TAKEN TO PROCESS COMPENSATION CLAIMS OPENING STATEMENT: TIME TAKEN TO PROCESS COMPENSATION CLAIMS At the last Senate Estimates in November 2013, we acknowledged the urgent work needed to address claims processing times. The Minister for Veterans'

More information

G-MOSAIC. Project introduction Luboš Kučera Gisat. Project managed by Sergio Proietti Telespazio S.p.A.

G-MOSAIC. Project introduction Luboš Kučera Gisat. Project managed by Sergio Proietti Telespazio S.p.A. GMES services for Management of Operations, Situation Awareness and Intelligence for regional Crises Project introduction Luboš Kučera Gisat Project managed by Sergio Proietti Telespazio S.p.A. G-MOSAIC

More information

Danish Emergency Management Agency. Crisis Management in Denmark

Danish Emergency Management Agency. Crisis Management in Denmark Danish Emergency Management Agency Crisis Management in Denmark 1 Crisis Management in Denmark Published by: Danish Emergency Management Agency Datavej 16 3460 Birkerød Phone: +45 45 90 60 00 Fax: +45

More information

EXPENDITURE ESTIMATES

EXPENDITURE ESTIMATES 22: DEFENCE AIM The aim of the Department of Defence is to defend and protect the Republic, its territorial integrity and its people in accordance with the Constitution and the principles of international

More information

Open Data Policy in the Finnish Government

Open Data Policy in the Finnish Government Memorandum VM040:00/2013 885/00.01.00.01/2013 1 (11) 19.10.2015 Public Sector ICT Ministry of Finance Anne Kauhanen-Simanainen Margit Suurhasko Mikael Vakkari Open Data Policy in the Finnish Government

More information

CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the

CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the DECISION PROMULGATING THE ACT ON THE SECURITY INTELLIGENCE SYSTEM OF THE REPUBLIC OF CROATIA

More information

Day 2: Ministry (MEE) and Its Branch as Part of Government

Day 2: Ministry (MEE) and Its Branch as Part of Government Day 2: Ministry (MEE) and Its Branch as Part of Government Tapio Laamanen 11th January 2011 The Decision on the Ministry of Employment and the Economy (MEE) The decision on the establishment of the Ministry

More information

The Security Technologies Industry in Germany

The Security Technologies Industry in Germany Chris Schmidt - istockphoto Industry Forum on Security Technology and Chemicals 14 th December 2011 in Tel Aviv, Israel Jérôme Hull Manager Mechanical & Electronical Technologies Germany Trade & Invest

More information

Cloud Security Standardisation & Certification. Arjan de Jong Policy Advisor Information Security

Cloud Security Standardisation & Certification. Arjan de Jong Policy Advisor Information Security Cloud Security Standardisation & Certification Arjan de Jong Policy Advisor Information Security Overview Economics of standardization and certification (EU) Legal requirements for (cloud) security International

More information

Statistics on Requests for data under the Data Retention Directive

Statistics on Requests for data under the Data Retention Directive Statistics on Requests for data under the Data Retention Directive Introduction 1. Directive 2006/24/EC on data retention ('the DRD') 1 requires Member States to provide the Commission on a yearly basis

More information

Internet of Things Development for the Promotion of Information Economy

Internet of Things Development for the Promotion of Information Economy 2015/SOM2/TEL51/DSG/009 Agenda Item: 4.2 Internet of Things Development for the Promotion of Information Economy Purpose: Information Submitted by: China ICT Development Steering Group Meeting Boracay,

More information

Cyber Security Strategy

Cyber Security Strategy 2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...

More information

New Mobile Network Enhances Public Safety in Finland

New Mobile Network Enhances Public Safety in Finland Case Studies, M. Basso Research Note 8 July 2003 New Mobile Network Enhances Public Safety in Finland A private network based on TETRA technology is revolutionizing public safety in Finland. The Virve

More information

Future cybersecurity threats and research needs.

Future cybersecurity threats and research needs. www.thalesgroup.com Future cybersecurity threats and research needs. 3 rd Franco-American Workshop on Cybersecurity Lyon Kreshnik Musaraj kreshnik.musaraj@thalesgroup.com December 9. 2014 2 / Challenges

More information

Performance Management and Budgeting in Finland

Performance Management and Budgeting in Finland 1.2.6. Performance Management and Performance Based Budgeting Performance Management and Budgeting in Finland Panu Kukkonen Administrative Governance and Development The Content of the Presentation Finnish

More information

Accident management and infrastructure security

Accident management and infrastructure security Accident management and infrastructure security Dr. Björn Karlsson Director General, Iceland Construction Authority Associate Professor, Dept. of Civil and Environmental Engineering University of Iceland

More information

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL EUROPEAN COMMISSION Brussels, 8.7.2014 COM(2014) 451 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL Better situational awareness by enhanced cooperation across maritime

More information

Finnish Cyber Security Strategy. Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva

Finnish Cyber Security Strategy. Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva Finnish Cyber Security Strategy Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva 1 Changing threat landscape 2 Annual losses caused by cybercrime over $400 billion

More information

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department CYBER SECURITY Marcin Olender Head of Unit Information Society Department 1 MINISTRY OF ADMINISTRATION AND DIGITIZATION OF POLAND The areas of our activity: The Ministry was established on 18 November

More information

NATO Flirting with a More Comprehensive Approach to Alliance Security

NATO Flirting with a More Comprehensive Approach to Alliance Security Analysis, Modeling, Simulation and Experimentation NATO Flirting with a More Comprehensive Approach to Alliance Security 13 th ICCRTS June 17-19 2008 Mark N. Clemente Senior Effects-Based Analyst The Boeing

More information

Secure telephony via classic and IP networks. office security solutions

Secure telephony via classic and IP networks. office security solutions Secure telephony via classic and IP networks office security solutions Every kind of telephone technology has its information risks... Telephone conversations are still a core function of daily communications

More information

Peter Sylvester - EdelWeb

Peter Sylvester - EdelWeb Peter Sylvester - EdelWeb A standard for authorization management for secure interoperability of multi-organisation information systems 6th European Forum on Electronic Signatures June 7-9, 2006, Amber

More information

Your. Tax Dollar. Here s a quick overview of where your Tax Dollar went and how it was raised in the Fiscal year ended March 31, 2012

Your. Tax Dollar. Here s a quick overview of where your Tax Dollar went and how it was raised in the Fiscal year ended March 31, 2012 Your Tax Dollar Here s a quick overview of where your Tax Dollar went and how it was raised in the Fiscal year ended March 31, 2012 Table of Contents Transfer payments 3 Transfers to persons 4-6 Transfers

More information

SAR Co-operation Plan. Parts 3 6

SAR Co-operation Plan. Parts 3 6 SAR Co-operation Plan Parts 3 6 Contents Introduction... 1 Description of a SAR Co-operation Plan... 1 Corrections and Updating... 1 Part 3 Maritime Rescue Co-ordination Centre and Sub-centre... 2 3.1

More information

Freedom, Security, Privacy. European Home Affairs in an open world

Freedom, Security, Privacy. European Home Affairs in an open world Freedom, Security, Privacy European Home Affairs in an open world istockphoto.com/frankydemeyer, sam.7 Report of the Informal High Level Advisory Group on the Future of European Home Affairs Policy ( The

More information

CITIC Telecom CPC, CITIC Networks Successfully Enter High Bandwidth Capacity Market with GDS as its First Strategic Partner

CITIC Telecom CPC, CITIC Networks Successfully Enter High Bandwidth Capacity Market with GDS as its First Strategic Partner For Immediate Release CITIC Telecom CPC, CITIC Networks Successfully Enter High Bandwidth Capacity Market with GDS as its First Strategic Partner Collaborative effort for developing a new service model

More information

Finland s Cyber security Strategy

Finland s Cyber security Strategy Finland s Cyber security Strategy FINLAND S CYBER SECURITY STRATEGY Government Resolution 24.1.2013 1 TABLE OF CONTENTS 1. INTRODUCTION... 1 2. VISION FOR CYBER SECURITY... 3 3. CYBER SECURITY MANAGEMENT

More information

Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018

Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018 Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018 Summary in English of the Icelandic National Cyber Security Strategy approved by the Minister of the Interior in April 2015

More information

Rules for the Public Administration

Rules for the Public Administration Cloud Computing & Healthcare Rules for the Public Administration Daniele Tatti tatti@digitpa.gov.it @DanieleTatti In the next 12 minutes What is DigitPA European scenario Cloud related activities ehealth

More information

CBRN National Action Plans

CBRN National Action Plans Chemical Biological Radiological Nuclear Risk Mitigation - Centres of Excellence CBRN National Action Plans Irakli Beridze Senior Strategy and Policy Advisor UNICRI Jointly implemented by the EC JRC and

More information

MINISTRY OF AGRICULTURE OF HUNGARY

MINISTRY OF AGRICULTURE OF HUNGARY MINISTRY OF AGRICULTURE OF HUNGARY Introduction of the institutional framework of the Administration of the Hungarian Agriculture International Development Cooperation of the Ministry of Agriculture of

More information

On the European experience in critical infrastructure protection

On the European experience in critical infrastructure protection DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation

More information

The Information Society Policy Guidelines for the Association of Finnish Local and Regional Authorities 2015

The Information Society Policy Guidelines for the Association of Finnish Local and Regional Authorities 2015 The Information Society Policy Guidelines for the Association of Finnish Local and Regional Authorities 2015 Association of Finnish Local and Regional Authorities 2008 Background and purpose In the year

More information

successstory Security for Diplomacy High Security for Embassy Networks

successstory Security for Diplomacy High Security for Embassy Networks successstory Security for Diplomacy High Security for Embassy Networks Today the consistent deployment of strong cryptography, along with key management that regulates access to data, are the only ways

More information

Council of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union

Council of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union Council of the European Union Brussels, 4 July 2014 (OR. en) 11603/14 ADD 1 COVER NOTE From: date of receipt: 2 July 2014 To: No. Cion doc.: Subject: RECH 323 TELECOM 140 MI 521 DATAPROTECT 100 COMPET

More information

emergency.lu aims to improve the worldwide preparedness and rapid response capacity by filling the communication gap in the first hours and days

emergency.lu aims to improve the worldwide preparedness and rapid response capacity by filling the communication gap in the first hours and days emergency.lu emergency.lu aims to improve the worldwide preparedness and rapid response capacity by filling the communication gap in the first hours and days after a disaster emergency.lu is a multi-layer

More information

Agile Information Security Management in Software R&D

Agile Information Security Management in Software R&D Agile Information Security Management in Software R&D Rational and WebSphere User Group Finland Seminar 29.01.2008 Reijo Savola Network and Information Security Research Coordinator VTT Technical Research

More information

Position Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security

Position Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security Position Paper: Berlin, 31 March 2014 Legislative intentions to increase IT Security eco the Association of the sees itself as lobbyist and supporter of all companies that are involved in the economic

More information

Parliamentary Resolution

Parliamentary Resolution Parliamentary Resolution on a Strategic Regional Plan for the years 2014 2017 The Parliament of Iceland approves a resolution to instruct the Government to implement a Strategic Regional Plan for the years

More information

The Crisis Management System in Germany

The Crisis Management System in Germany The Crisis Management System in Germany www.bmi.bund.de Last update: January 2010 Contents Preliminary remarks... 5 1. Background... 5 2. Legal framework... 8 3. Crisis management at the federal level..

More information

Open Data Policy in the Finnish Government

Open Data Policy in the Finnish Government 1 (8) 29.9.2015 Open Data Programme Public Sector ICT Ministry of Finance Anne Kauhanen-Simanainen Margit Suurhasko vm.fi/opendata Open Data Policy in the Finnish Government In Finland, information resources

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

www.gipfelsoli.org http://euro-police.noblogs.org

www.gipfelsoli.org http://euro-police.noblogs.org www.gipfelsoli.org http://euro-police.noblogs.org Proactive Repression IMF: More public disorder "Economy-related riots and unrest in various global markets if the financial crisis is not addressed and

More information

International Classification of Business Functions

International Classification of Business Functions ESA/STAT/AC.234/27 13 May 2011 UNITED NATIONS DEPARTMENT OF ECONOMIC AND SOCIAL AFFAIRS STATISTICS DIVISION Expert Group meeting on International economic and social classifications New York, 18-20 May

More information

Ministry of Science and Technology Strategy and Research Division

Ministry of Science and Technology Strategy and Research Division Job Title: Director, Strategy and Research The Job: A three (3) year contract position. Job Summary: The incumbent is responsible, at an Executive level, for the technical, operational and administrative

More information

COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe'

COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe' EUROPEAN COMMISSION Brussels, 2.7.2014 SWD(2014) 214 final COMMISSION STAFF WORKING DOCUMENT Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe' Accompanying

More information

Cyber Security Solutions

Cyber Security Solutions Cyber Security Solutions Defending the Enterprise General Dynamics Information Technology defends mission-critical systems including government, health, finance, defence, large-enterprise and national

More information

National Security Auditing Criteria (KATAKRI) version II, 2011

National Security Auditing Criteria (KATAKRI) version II, 2011 FINNISH NATIONAL SECURITY AUTHORITY National Security Auditing Criteria (KATAKRI) version II, 2011 This translation of the Finnish KATAKRI criteria has been slightly modified from the national version

More information

Day 5: Different Approaches and Tools to Prepare a Strategy

Day 5: Different Approaches and Tools to Prepare a Strategy Day 5: Different Approaches and Tools to Prepare a Strategy Tapio Laamanen 14th January 2011 Government Foresight Network An interministerial forum for cooperation and exchange of information in issues

More information

$1 Items included in these Supplementary Estimates

$1 Items included in these Supplementary Estimates The following table presents authorities requested by organizations in $1 items. The underlined text indicates the authority being sought. Agriculture and Agri-Food Agriculture and Agri-Food Department

More information

Rescue services in Finland

Rescue services in Finland Rescue services in Finland 2 Rescue services in Finland Accident prevention. Rescue operations. Preparedness and civil defence. Ready to deal with all types of incidents from the very minor to major disasters.

More information

OFFSHORE E-COMMERCE STRATEGIES CONFERENCE. TORONTO, CANADA 19th & 20th February 2001

OFFSHORE E-COMMERCE STRATEGIES CONFERENCE. TORONTO, CANADA 19th & 20th February 2001 OFFSHORE E-COMMERCE STRATEGIES CONFERENCE TORONTO, CANADA 19th & 20th February 2001 THE KEY ADVANTAGES OF THE ISLE OF MAN FOR OFFSHORE E-COMMERCE TIM CRAINE Director of e-commerce, Isle of Man Government

More information

FINLAND S CYBER SECURITY STRATEGY. Background dossier

FINLAND S CYBER SECURITY STRATEGY. Background dossier FINLAND S CYBER SECURITY STRATEGY Background dossier TABLE OF CONTENTS 1. INTRODUCTION... 3 2. CYBER DOMAIN AND CYBER THREAT... 3 3. PRINCIPLES OF CYBER SECURITY MANAGEMENT AND... THE MANAGEMENT OF DISTURBANCES...

More information

Ministry of Transport, Public Works and Water Management Bob Oudshoorn

Ministry of Transport, Public Works and Water Management Bob Oudshoorn PREVENTION CRIMINALITY IN ROAD TRANSPORT Ministry of Transport, Public Works and Water Management Bob Oudshoorn 29 april 2009 Covenant Tackling Crime in Road Transport Sector 50% of the enterprises are

More information

Response to the European Commission s consultation on the legal framework for the fundamental right to protection of personal data

Response to the European Commission s consultation on the legal framework for the fundamental right to protection of personal data Stockholm: Göteborg: Malmö: 105 24 Stockholm Box 57 Box 4221 Fax 08 640 94 02 401 20 Göteborg 203 13 Malmö Plusgiro: 12 41-9 Org. Nr: 556134-1248 www.intrum.se Bankgiro: 730-4124 info@se.intrum.com Response

More information

Improving the fire safety of elderly people and reducing fire deaths

Improving the fire safety of elderly people and reducing fire deaths Improving the fire safety of elderly people and reducing fire deaths Olli-Pekka Ojanen Chief Executive Officer Tampere Regional Rescue Department Working group: Seppo Männikkö, Jouni Honkanen, Markku Suominen,

More information

November 2 nd 4 th, 2011. Belgrade Fair, Serbia

November 2 nd 4 th, 2011. Belgrade Fair, Serbia 2 nd INTERNATIONAL SECURITY FAIR High technology in Public and Private Security. Total building solutions-the smart building concept. Corporate and industrial security. Technical and physical security.

More information

Broadband Policies in Japan

Broadband Policies in Japan Broadband Policies in Japan January, 2009 FUJINO, Masaru Counselor for Communications Policy Embassy of Japan 1 Topics I Broadband Environment in Japan II Major Policies for Broadband Deployment III Current

More information

EU Cybersecurity: Ensuring Trust in the European Digital Economy

EU Cybersecurity: Ensuring Trust in the European Digital Economy EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'

More information

Cyberspace Situational Awarness in National Security System

Cyberspace Situational Awarness in National Security System Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, r.piotrowski@wil.waw.pl, j.sliwa@wil.waw.pl

More information

Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY

Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY December 2013 Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND

More information

Database to support inter-psap communications in Europe CEPT/ECC Feasibility Study. Freddie McBride, European Communications Office

Database to support inter-psap communications in Europe CEPT/ECC Feasibility Study. Freddie McBride, European Communications Office Database to support inter- communications in Europe CEPT/ECC Feasibility Study Freddie McBride, European Communications Office EENA Members Workshop Brussels, 19-20 October 2015 CEPT/ECC/WG NaN Organisation

More information

The New Dose Rate Monitoring Network in Finland

The New Dose Rate Monitoring Network in Finland The New Dose Rate Monitoring Network in Finland Radiation and Nuclear Safety Authority Environmental surveillance and preparedness Head of Laboratory Kaj Vesterbacka September 20, 2007 RADIATION AND NUCLEAR

More information

FOR ASIAN-PACIFIC SENIOR OFFICERS. General information

FOR ASIAN-PACIFIC SENIOR OFFICERS. General information CESEDEN 2 nd HIGH DEFENCE STUDIES COURSE FOR ASIAN-PACIFIC SENIOR OFFICERS General information MAY 2013 SPANISH HIGHER DEFENCE STUDIES COLLEGE GENERAL INFORMATION 1. BACKGROUND As a result of Spain s interest

More information

THE FORMER YUGOSLAV REPUBLIC OF MACEDONIA

THE FORMER YUGOSLAV REPUBLIC OF MACEDONIA INSTRUMENT FOR PRE-ACCESSION ASSISTANCE (IPA II) 2014-2020 THE FORMER YUGOSLAV REPUBLIC OF MACEDONIA Implementation of business continuity and disaster recovery system phase 2 Action Summary The overall

More information

Mapping of Institutional Architecture for Protection from Oil Spills in the Baltic Sea Region. Survey results and report

Mapping of Institutional Architecture for Protection from Oil Spills in the Baltic Sea Region. Survey results and report Mapping of Institutional Architecture for Protection from Oil Spills in the Baltic Sea Region Survey results and report Mapping of Institutional Architecture for Protection from Oil Spills in the Baltic

More information

Regulatory Framework for Disaster Recovery Planning for the ICT Industry

Regulatory Framework for Disaster Recovery Planning for the ICT Industry Regulatory Framework for Disaster Recovery Planning for the ICT Industry Kingdom of Saudi Arabia Regulatory Framework for Disaster Recovery Planning for the ICT Industry Page 1 of 6 1. INTRODUCTION 1.1

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Cyber Security VTT and the Finnish Approach

Cyber Security VTT and the Finnish Approach Cyber Security VTT and the Finnish Approach September 22, 2015 Reijo Savola, Principal Scientist CHALLENGES Explosive increase in number and impact of cyber security attacks Use of Internet technologies

More information

The German interagency approach to SSA

The German interagency approach to SSA Lieutenant Colonel (GS) Karsten Auras, German Air Force Headquarters, 1 I b Space Concepts Presentation for the 2015 Japan Space Forum SSA Symposium, Tokyo, Japan The German interagency approach to SSA

More information

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 Cyberspace is both an ecosystem consisting of an infrastructure and services, and an environment where and through

More information

Final reports on deepened defence cooperation between Finland and Sweden

Final reports on deepened defence cooperation between Finland and Sweden Final reports on deepened defence cooperation between Finland and Sweden Report by the Finnish Defence Forces and the Swedish Armed Forces 1 Background In this joint final report the Finnish Defence Forces

More information

H2020-EUJ-2016: EU-Japan Joint Call. EUJ-02-2016: IoT/Cloud/Big Data platforms in social application contexts

H2020-EUJ-2016: EU-Japan Joint Call. EUJ-02-2016: IoT/Cloud/Big Data platforms in social application contexts H2020-EUJ-2016: EU-Japan Joint Call EUJ-02-2016: IoT/Cloud/Big Data platforms in social application contexts EUJ-02-2016: IoT/Cloud/Big Data The Challenge The Integration and federation of IoT with Big

More information

Fujitsu Technology Solutions Cloud Computing Competenze e Strategie Fujitsu Quali opportunità e rischi per L Homeland Security

Fujitsu Technology Solutions Cloud Computing Competenze e Strategie Fujitsu Quali opportunità e rischi per L Homeland Security Fujitsu Technology Solutions Cloud Computing Competenze e Strategie Fujitsu Quali opportunità e rischi per L Homeland Security 17 Maggio 2010, Roma Agenda Top 1 Top 2 Top3 Top 4 Fujitsu Group La view di

More information

Cybersecurity: Taking Stock and Looking Ahead

Cybersecurity: Taking Stock and Looking Ahead Cybersecurity: Taking Stock and Looking Ahead 30 April 2014 Tomas Lamanauskas Head, Corporate Strategy Division International Telecommunication Union 1 Context 2 Different Perspectives of Cybersecurity

More information

European Organization for Security (EOS) - Description and Envisaged Activities for 2012

European Organization for Security (EOS) - Description and Envisaged Activities for 2012 European Organization for Security (EOS) - Description and Envisaged Activities for 2012 EOS Objectives and Activities EOS is a tool for European security stakeholders for the comprehensive implementation

More information

Ensuring operational continuity

Ensuring operational continuity Certification of BCMS (Business Continuity Management Systems) Standard BS 25999-2 Certification of BCMS (Business Continuity Management System Ensuring operational continuity in the event of interruptions,

More information

Consolidated Fund Receipts Detailed Estimates : 2013-14 22 - Ministry of Home Affairs

Consolidated Fund Receipts Detailed Estimates : 2013-14 22 - Ministry of Home Affairs 155 Consolidated Fund Receipts Detailed Estimates : 2013-14 2201 Secretariat 0001 Secretariat Interest 1632 Interest on House Loan 50,00 50,00 50,00 1633 Interest on Computer Loan 2,50 2,50 2,50 1634 Interest

More information

The guidance will be developed over time in the light of practical experience.

The guidance will be developed over time in the light of practical experience. Freedom of Information Act Awareness Guidance No. 14 International Relations The Information Commissioner s Office (ICO) has produced this guidance as part of a series of good practice guidance designed

More information

II. Considerations for the Preparatory Phase of Disaster Response

II. Considerations for the Preparatory Phase of Disaster Response Checklist and Non-Binding Guidelines for the Request, Reception and Provision Of International Assistance in the Event of a CBRN Incident or Natural Disaster I. Introduction 1. Nations are becoming increasingly

More information

Blue Light Air Assets: A Swedish Helicopter Perspective. By Markus Planmo Swedish Association of Local Authorities and Regions

Blue Light Air Assets: A Swedish Helicopter Perspective. By Markus Planmo Swedish Association of Local Authorities and Regions Blue Light Air Assets: A Swedish Helicopter Perspective By Markus Planmo Swedish Association of Local Authorities and Regions About me Former: Political Adviser, Ministry of Defence Primary Secretary,

More information

Targeting and reporting performance - Finnish experiences

Targeting and reporting performance - Finnish experiences 1.2.6 Performance Management and Performance Based Budgeting Day 4 Targeting and reporting performance - Finnish experiences Mr Heikki Joustie 20 January 2011 20 years of result orientation Lump sum budgets

More information

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY

More information

Egyptian Best Practices Securing E-Services

Egyptian Best Practices Securing E-Services Egyptian Best Practices Securing E-Services Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA Agenda Security Measures for E-Services Examples of E- Services Threats

More information

ValueSec use case scenario: Alcohol abuse intervention in Finland

ValueSec use case scenario: Alcohol abuse intervention in Finland ValueSec use case scenario: Alcohol abuse intervention in Finland Director Tarja Mankkinen Ministry of the Interior Finland Brussels, 10 th December 2013 7.1.2014 Government Programme, 22 June 2011: The

More information

ANNEX 15-A SCHEDULE OF SINGAPORE. SECTION A: Central Government Entities

ANNEX 15-A SCHEDULE OF SINGAPORE. SECTION A: Central Government Entities ANNEX 15-A SCHEDULE OF SINGAPORE SECTION A: Central Government Entities Thresholds: Unless otherwise specified, Chapter 15 (Government Procurement) shall cover procurement by entities listed in this Section,

More information