ETIS Information Security in Telecommunications

Size: px
Start display at page:

Download "ETIS Information Security in Telecommunications"

Transcription

1 ETIS Information Security in Telecommunications ENISA workshop on providers resilience 29 October 2009, Paris Fred Werner, Business Development Manager - ETIS

2 Mission & Vision» What is ETIS? ETIS is a membership based organisation which brings together the major telecommunications providers in Europe on key information and communication technology (ICT) issues.» ETIS Mission The mission of ETIS is to enable its members to improve their business performance by personal exchange of information on using ICT effectively.» ETIS Vision The ETIS vision is to be the acknowledged best platform for sharing knowledge on the use of ICT in Telcos.

3 ETIS Pillars of Activity

4 ETIS Members» ETIS represents 25 Telecom providers supplying voice, mobile and data services all over Europe» Total revenue from ETIS Members was estimate at over 270 Billion euro in 2008

5 ETIS Partners & Associates Associate Members contribute technical competence to our working groups and events and gain feedback on user requirements. ETIS Partners are non-profit international bodies with whom we share knowledge on complementary ICT issues

6 Information Security Working Group» What is the ISWG? In January 2004, the Information Security Working group was established as a follow up to a meeting at the Global Security Conference in Sophia Antipolis in November The working group is currently chaired by Andy De Petter from Belgacom and boasts around 30 members from 20 companies. Meets 3-4 times a year, phone conferences, discussion forums, etc» Role of the group The role of the group is to share knowledge and experiences among members concerning Information Security and related matters and when relevant provide requirements to the industry. To help the members protect their information assets and infrastructure The group is the only Information Security group to concentrate on the telecom market.

7 ISWG Topics Some of the main topics addressed Security Benchmarking Resilience, recovery & business continuity management Anti-SPAM, Anti Phising, Data Retention, Data Privacy Security Culture & Information Security Awareness Campaigns Identity Management & TOP Level Policy Document (TLPD) Value & ROI of Information Security Projects Security Governance models ebusiness Security Revenue Assurance & Financial losses due to security breaches Managed Security services The threat of terrorism from a Telco s perspective Sarbanes-Oxley, compliance and Policy IT Network & client Security Architecture Security in the Supply chain & trends in Security Outsourcing

8 ETIS Security Benchmark 2009 Participating Telcos: TDC, Belgacom, KPN, Telecom Italia, Telekom Austria, Turkcell, TeliaSonera and OTE Objective with the Benchmark: Compare Security strategies and approaches among ETIS member companies, thereby enabling these providers to determine which specific aspect of security require attention within their respective organisations. The following themes are covered in depth: In-depth themes 1. Corporate Security Function 2. Security Management 3. Commercial role of security 4. Fraud Management 5. Security in the development process Exploratory themes 1. Business Continuity Management 2. Next generation security readiness 3. Infrastructure security 4. International cooperation

9 CSF size by security area Corporate Breakdown security of fte CSF per size area by (per security billion EUR area revenue) [FTE per billion EUR revenue] 16,00 14,00 12,00 10,00 8,00 6,00 4,00 Differences in CSF set up reflect the choices each operator has made with respect to incorporating specific security areas. 2,00 0,00 A B C D E F G H Information Security Physical Security Fraud Management Personnel Safety Lawful Interception IT & network security Business Continuity Management Internal Investigations Security of products and services Other

10 Business Continuity Plans & NGN Security Only half of the benchmark participants have a specific BCM policy in place, but all have Business Continuity Plans. Maintaining coherence in these Business Continuity Plans is a difficult task and testing and exercising them only occurs sporadically. Whilst telcos are rapidly embracing Next Generation Network (NGN) infrastructure and services, most of their security units still work with traditional security architectures, baselines and methodologies.

11 ETIS Anti-Spam Co-operation Group The target of the group is to learn and to get feedback on success stories and to develop tangible action plans for reducing outbound SPAM, accepted and shared among best-in-class antispam ISPs reduce the ingress SPAM and so to improve their own QoS by helping others in reducing egress SPAM In this context ETIS Anti-SPAM Co-ordination Group it the glue for trusting each other, for sharing knowledge, for developing a common European ISPs Anti-SPAM strategy Most effective best practice is to block port 25

12 Turk Telekom s success after blocking Port25 17 June 2009 Rank: 1 23 September2009 Rank: 9

13 TI s success after implementing best practices The goal of the TI Anti-spam working group, established in 2008 was to get Turk Telekom and Telecom Italia off the top 10 Autonomous System published on TrendMicro. TOP 10 Spammer TrendMicro TOP 20 Spammer TrendMicro Both the objectives have been reached successfully 13

14 BT s BCM pan EU Network discussion Too costly for any one operator to build separate ductways etc By pooling resources across a number of network operators, and creating additional resilience in the transport and switching Gateways, a smarter, more secure BCM network could be set up, with each country retaining it s own primary routes, therefore not negating any reach advantage of operators. Is anyone else discussing this? Any pilot projects under way?

15 Future plans for the ISWG ETIS Security Benchmark 2010 IMS/VoIP security from a Telco perspective Resilience in European e-communication Networks Partnerships: ENISA, CIIP European Public-Private Partnership for Resilience, Member of EU expert panel on Data Retention Next meetings: - 28/29 January, hosted by Bizanga in Paris - 20/21 May, hosted by KPN in the Hague - 14/15 October, hosted by TeliaSonera in Stockholm

16 To join the Information Security Group or Anti Spam Task Force contact: Fred Werner, ETIS Business Development Manager - Tel

ETIS News Topics - December 2010. e-telit Editorial

ETIS News Topics - December 2010. e-telit Editorial - ETIS Community Gathering 2010 Summary >> - ETIS Anti-Spam Best Practices 2010 >> - ETIS Anti-Spam Feedback Loop Project >> - TOGAF Certification Training >> - TeBIT 2010 Benchmarking >> - Gathering 2010

More information

ICT budget and staffing trends in the UK

ICT budget and staffing trends in the UK ICT budget and staffing trends in the UK Enterprise ICT investment plans to 2013 January 2013 TABLE OF CONTENTS 1 Trends in ICT budgets... 1 1.1 Introduction... 1 1.2 Survey demographics... 1 1.3 IT budget

More information

Innovative means to exchange telecom fraud and network security risks information

Innovative means to exchange telecom fraud and network security risks information Innovative means to exchange telecom fraud and network security risks information Anastasius Gavras Eurescom GmbH Outline Who is Eurescom? Collaboration as an innovation instrument INNO-UTILITIES Sharing

More information

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012 ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 christoffer.karsberg@enisa.europa.eu 1 Who we are ENISA was

More information

. ABOUT AS http://www.italtel.com/aboutus_home.html

. ABOUT AS http://www.italtel.com/aboutus_home.html . ABOUT AS http://www.italtel.com/aboutus_home.html COMPANY PROFILE THE MISSION The mission of the Italtel Group is to be a key partner for telecommunication operators (fixed and mobile), Internet Service

More information

ICT budget and staffing trends in Healthcare

ICT budget and staffing trends in Healthcare ICT budget and staffing trends in Healthcare Enterprise ICT investment plans November 2013 ICT budget and staffing trends in Healthcare P a g e 1 www.kable.co.uk / The id Factor Ltd / + 44 (0) 207 936

More information

ROADMAP. Proposal on a European Strategy for Internet Security

ROADMAP. Proposal on a European Strategy for Internet Security TITLE OF THE INITIATIVE ROADMAP Proposal on a European Strategy for Internet Security TYPE OF INITIATIVE xcwp Non-CWP Implementing act/delegated act LEAD DG RESPONSIBLE UNIT INFSO A3 EXPECTED DATE OF ADOPTION

More information

How To Write An Article On The European Cyberspace Policy And Security Strategy

How To Write An Article On The European Cyberspace Policy And Security Strategy EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA

More information

Cybersecurity for ALL

Cybersecurity for ALL Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund

More information

Anti-Spam Measures Survey 2009. Pascal Manzano ENISA

Anti-Spam Measures Survey 2009. Pascal Manzano ENISA Anti-Spam Measures Survey 2009 Pascal Manzano ENISA Do you remember what happen on June 25 th? Methodology Online questionnaire open from May until July 2009 Questionnaire used providers best practices

More information

NGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka

NGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka Overview of ITU Cybersecurity Activities NGN Migration Strategies and Access Modernization 26 May 2011 Dhaka Sameer Sharma Senior Advisor ITU Regional Office for Asia and the Pacific 1 Agenda Why Cybersecurity?

More information

Overview of ITU Cybersecurity Activities

Overview of ITU Cybersecurity Activities Overview of ITU Cybersecurity Activities Workshop on NGN Regulation & Migration Strategies 13 & 15 October 2010 New Delhi, India Sameer Sharma Senior Advisor ITU Regional Office for Asia and the Pacific

More information

UK Networks & Security An Overview. Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008

UK Networks & Security An Overview. Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008 UK Networks & Security An Overview Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008 Objectives The structure of your public communication networks The threat landscape these networks face

More information

EU policy on Network and Information Security and Critical Information Infrastructure Protection

EU policy on Network and Information Security and Critical Information Infrastructure Protection EU policy on Network and Information Security and Critical Information Infrastructure Protection Andrea SERVIDA European Commission Directorate General Information Society and Media - DG INFSO Unit A3

More information

The Partnership between Dolphin & Telecom Italia Sparkle

The Partnership between Dolphin & Telecom Italia Sparkle The Partnership between Dolphin & Telecom Italia Sparkle Rome, 31 October 2014 0 Dolphin and TI Sparkle Partnership in Ghana: the two partners Dolphin group, part of Expresso Telecom group, is a 2nd largest

More information

Critical Information Infrastructure Protection A perspective & Reality from the Commonwealth

Critical Information Infrastructure Protection A perspective & Reality from the Commonwealth Critical Information Infrastructure Protection A perspective & Reality from the Commonwealth Commonwealth Cybersecurity Forum BT Centre, London 22-24 April 2015 Dr Martin Koyabe Head of Research & Consultancy

More information

VOIP CONSUMER RETAIL OFFERS

VOIP CONSUMER RETAIL OFFERS VOIP CONSUMER RETAIL OFFERS VoIP (Voice over Internet Protocol) experienced a first period of hype during the late 1990s but available bandwidth and speech quality were such that faith in VoIP was quickly

More information

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013 EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber

More information

ICANN- INTERNET CORPORATION OF ASSIGNED NAMES & NUMBERS

ICANN- INTERNET CORPORATION OF ASSIGNED NAMES & NUMBERS ICANN- INTERNET CORPORATION OF ASSIGNED NAMES & NUMBERS Prof.Vivekanandan MHRD IP CHAIR PROFESSOR National Academy of Legal Studies Research University (NALSAR) www.nalsarpro.org vivekvc2001@yahoo.co.in

More information

Cyber security in an organization-transcending way

Cyber security in an organization-transcending way Cyber security in an organization-transcending way EASEE-gas meeting March 19, 2015 Paul Bloemen ICT Security Manager Gasunie Chair Dutch Energy ISAC March 19, 2015 2 What to talk about Why is cyber security

More information

Prof. Udo Helmbrecht

Prof. Udo Helmbrecht Prof. Udo Helmbrecht Guiding EU Cybersecurity from Policy to Implementation Udo Helmbrecht Executive Director Information Security for the Public Sector 2015 Stockholm 02/09/15 European Union Agency for

More information

National Contact Management Strategy

National Contact Management Strategy National Contact Management Strategy 2012 NCMS 2012 NOT PROTECTIVELY MARKED 4 National Contact Management Strategy (NCMS) This document has been produced by the Association of Chief Police Officers (ACPO)

More information

What legal aspects are needed to address specific ICT related issues?

What legal aspects are needed to address specific ICT related issues? What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : b.zouari@ansi.tn

More information

Solution & Service Portfolio for the Telco Market.

Solution & Service Portfolio for the Telco Market. Telecommunications IP-Based Communications Solution & Service Portfolio for the Telco Market. IP-Based Communications. Business flexibility!" ==Systems=== Solution & Service Portfolio for the Telco Market.

More information

The Role of OSGi Technology in the Home Gateway Initiative (HGI) and End to End Connectivity and Service Provisioning

The Role of OSGi Technology in the Home Gateway Initiative (HGI) and End to End Connectivity and Service Provisioning The Role of OSGi Technology in the Home Gateway Initiative (HGI) and End to End Connectivity and Service Provisioning Paolo PASTORINO Chief Technology and Chief Business Officer Home Gateway Initiative

More information

Business Continuity Planning

Business Continuity Planning Business Continuity Planning Public Entities Risk Management Forum 5 th July 2012 Presented by Mark Penberthy FBCI Overcoming Practical Challenges Business Continuity Management (BCM) AGENDA 1. What is

More information

S E P T E M B E R 2 0 0 6. Welcome to Our World. The Global VoIP Company NASDAQ: IBAS 12/05

S E P T E M B E R 2 0 0 6. Welcome to Our World. The Global VoIP Company NASDAQ: IBAS 12/05 S E P T E M B E R 2 0 0 6 Welcome to Our World The Global VoIP Company NASDAQ: IBAS 12/05 Safe Harbor Statement Except for historical information, all of the expectations, plans and assumptions contained

More information

Osterman Research Executive Summary

Osterman Research Executive Summary Osterman Research Executive Summary Report Focus Any email user, IT manager, CIO or network administrator will attest to the fact that threats introduced into an organization through the email system and,

More information

NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA

NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA ViS!T - Verwaltung integriert sichere Informationstechnologie, Wien, 29.10.2014 European Union Agency

More information

Introductory address by Minister Stefania Giannini at the Informal Meeting of the Research Ministers of the European Union. Milano, July 22, 2014

Introductory address by Minister Stefania Giannini at the Informal Meeting of the Research Ministers of the European Union. Milano, July 22, 2014 Introductory address by Minister Stefania Giannini at the Informal Meeting of the Research Ministers of the European Union Milano, July 22, 2014 Dear Commissioner, Dear Colleagues, Heads and Members of

More information

Dr. Vangelis OUZOUNIS Senior Expert Security Policies ENISA. evangelos.ouzounis@enisa.europa.eu

Dr. Vangelis OUZOUNIS Senior Expert Security Policies ENISA. evangelos.ouzounis@enisa.europa.eu Dr. Vangelis OUZOUNIS Senior Expert Security Policies ENISA evangelos.ouzounis@enisa.europa.eu 5 th German Anti-Spam Summit Koeln, 5 th of Sept. 2007 www.enisa.europa.eu 1 Agenda NIS a Challenge for the

More information

Cyber security initiatives in European Union and Greece The role of the Regulators

Cyber security initiatives in European Union and Greece The role of the Regulators Cyber security initiatives in European Union and Greece The role of the Regulators Constantinos Louropoulos President of Hellemic Telecoms and Post Commission Agenda Cyberspace challenges EU security initiatives

More information

Decisioning for Telecom Customer Intimacy. Experian Telecom Analytics

Decisioning for Telecom Customer Intimacy. Experian Telecom Analytics Decisioning for Telecom Customer Intimacy Experian Telecom Analytics Turning disruption into opportunity The traditional telecom business model is being disrupted by a variety of pressures from heightened

More information

Customer Experience Strategy and Implementation

Customer Experience Strategy and Implementation Customer Experience Strategy and Implementation Enterprise Customer Experience Transformation 2014 Andrew Reise, LLC. All Rights Reserved. Enterprise Customer Experience Transformation Executive Summary

More information

IP Telephony and ENUM

IP Telephony and ENUM NGN IP Telephony and ENUM APEC TEL 30 Next Generation Networks James Seng Assistant Director, Enabler Technologies What is Voice over IP? ) ) ) 1010101000010 1001010101010 1001010101010 0101010001001 TCP/IP

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: E-mail security About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for the

More information

FAQ to ENISA s report on technologies to improve the resilience of communication networks

FAQ to ENISA s report on technologies to improve the resilience of communication networks FAQs to reports on technologies to improve the resilience of communication networks FAQ to ENISA s report on technologies to improve the resilience of communication networks This FAQ covers the latest

More information

Security Management - A Model For Successful Practices

Security Management - A Model For Successful Practices Benchmark observations 2010-2012 Date October 7th 2012 Authors H. Kerkdijk M.Sc. and R. Wolthuis M.Sc. Version: FINAL ETIS 2012 Successful Practices in Telco Security Produced by Authors Project manager

More information

SmartShore Offerings. Your Gateway to Knowledge Process Outsourcing and Remote Infrastructure Mgmt.

SmartShore Offerings. Your Gateway to Knowledge Process Outsourcing and Remote Infrastructure Mgmt. DISCUSSION DOCUMENT SmartShore Offerings Your Gateway to Knowledge Process Outsourcing and Remote Infrastructure Mgmt. SmartShore Services, Inc. sales@smartshore.us Tel 203-653-7235 Sep 9, 2009 Overview

More information

Online Business / E-Commerce Scrutiny Review Update Report

Online Business / E-Commerce Scrutiny Review Update Report Economic & City Development Overview & Scrutiny Committee 25 March 2014 Report of the Online Business / E-Commerce Task Group Online Business / E-Commerce Scrutiny Review Update Report Summary 1. This

More information

COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe'

COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe' EUROPEAN COMMISSION Brussels, 2.7.2014 SWD(2014) 214 final COMMISSION STAFF WORKING DOCUMENT Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe' Accompanying

More information

Council of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union

Council of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union Council of the European Union Brussels, 4 July 2014 (OR. en) 11603/14 ADD 1 COVER NOTE From: date of receipt: 2 July 2014 To: No. Cion doc.: Subject: RECH 323 TELECOM 140 MI 521 DATAPROTECT 100 COMPET

More information

Press pack. Paris, 20 June 2012. Investing for the future

Press pack. Paris, 20 June 2012. Investing for the future Press pack Paris, 20 June 2012 Investing for the future The "INFINI DRIVE" project for the development of electric vehicle recharging infrastructures has been selected by ADEME (French Environment and

More information

BT Unified Trading communication. The Future Delivered

BT Unified Trading communication. The Future Delivered BT Unified Trading communication The Future Delivered BT Unified Trading With BT Unified Trading, BT has set the benchmark for the next decade by bringing to market a powerful, cost-effective, software-based

More information

Action Plan 2010-2015 for Canada s Cyber Security Strategy

Action Plan 2010-2015 for Canada s Cyber Security Strategy Action Plan -2015 for Canada s Cyber Security Strategy Her Majesty the Queen in Right of Canada, 2013 Cat: PS9-1/2013E-PDF ISBN: 978-1-100-21895-3 ii Introduction Information technology is highly integrated

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

Grid Computing: Telco Perspective

Grid Computing: Telco Perspective International Telecommunication Union ITU-T Grid Computing: Telco Perspective Rick Schlichting Director, Software Systems Research AT&T Labs Research, USA ITU-T/OGF Workshop on Next Generation Networks

More information

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission

More information

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece Network security policy issues Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece 1 Sample Agenda Slide 1 The current threat landscape 2 IT security and policy leadership 3 The EU

More information

Powering Up the Network: A Report on Small Business Use of E-business Solutions in Canada

Powering Up the Network: A Report on Small Business Use of E-business Solutions in Canada Powering Up the Network: A Report on Small Business Use of E-business Solutions in Canada February 2010 Overview Canada is a world leader in many areas: energy, natural resources and the financial services

More information

Digital Entrepreneurship: The EU vision, strategy and actions

Digital Entrepreneurship: The EU vision, strategy and actions The digital economy at the heart of the economic and social transition of EU Regions Digital Entrepreneurship: The EU vision, strategy and actions EITO Task Force Meeting, 14th November 2014 Michael Berz

More information

What Are the Measures Used by European Providers to Reduce the Amount of Spam Received by Their Customers?

What Are the Measures Used by European Providers to Reduce the Amount of Spam Received by Their Customers? ENISA 2009 spam survey December 09 Measures used by providers to reduce spam What Are the Measures Used by European Providers to Reduce the Amount of Spam Received by Their Customers? Third ENISA Anti-Spam

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information

More information

3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security

3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security Communications Regulatory Authority of the Republic of Lithuania European Security Round Table Microsoft Venue: 3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security Agenda

More information

Osterman Research Executive Summary

Osterman Research Executive Summary 1 Osterman Research Executive Summary Messaging is the primary communications medium for many enterprises today and the one that its users can afford least to be without. At the heart of this medium is

More information

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

The rise of the hybrid network model

The rise of the hybrid network model The rise of the hybrid network model Hybrid networks offer the promise of greater flexibility and capacity, improved application performance and cheaper price points than traditional Wide Area Networks

More information

Cloud Business Case G-Cloud 5 Framework

Cloud Business Case G-Cloud 5 Framework Cloud Business Case G-Cloud 5 Framework Cloud Business Case Service Definition Document April 2014 Warnford Court, 29 Throgmorton Street, London, EC2N 2AT T: +44 20 7947 4176 Table of contents 1 Cloud

More information

Customer analytics case study: T-Mobile Austria

Customer analytics case study: T-Mobile Austria mwd a d v i s o r s Best Practice Insight Customer analytics case study: T-Mobile Austria Helena Schwenk Premium Advisory Report April 2011 This report examines T-Mobile Austria s use of Portrait Customer

More information

Customer Experience Management

Customer Experience Management Customer Experience Management 10 tips for the successful development and execution of Chris Bland Research Director SPA Future Thinking Introduction, sometimes referred to as Customer Feedback Programmes,

More information

Revenue Enhancement and Churn Prevention

Revenue Enhancement and Churn Prevention Revenue Enhancement and Churn Prevention for Telecom Service Providers A Telecom Event Analytics Framework to Enhance Customer Experience and Identify New Revenue Streams www.wipro.com Anindito De Senior

More information

Assuring Telecom (Infrastructure and Services) An Operations Perspective

Assuring Telecom (Infrastructure and Services) An Operations Perspective Industry Canada Assuring Telecom (Infrastructure and Services) An Operations Perspective IC Security Roles and Activities Assure Telecom Infrastructure and Services Enhance Telecom Security Expertise and

More information

Europe s Digital Economy at Risk. Eight trends why the European digital economy is losing ground

Europe s Digital Economy at Risk. Eight trends why the European digital economy is losing ground Europe s Digital Economy at Risk Eight trends why the European digital economy is losing ground key measures to regain a leading position. WHY EUROPE S DIGITAL ECONOMY IS FALLING BEHIND. Trend 1 Trend

More information

VOIP CONSUMER RETAIL OFFERS

VOIP CONSUMER RETAIL OFFERS VOIP CONSUMER RETAIL OFFERS INTRODUCTION Voice over Internet Protocol (VoIP) experienced a period of hype during the late 1990s but along with the dot.com crash the faith in VoIP as a service for residential

More information

Lith Networking and Network Marketing Safety

Lith Networking and Network Marketing Safety DIRECTION TO SUCCESS. PUBLIC AND PRIVATE SECTORS PARTNERSHIP WSIS Action Line Facilitation Meeting: Building confidence and security in the use of ICTs (C5) Partnerships for Global Cybersecurity ITU Geneva,

More information

Nationwide Deployment of Social Alarms in Sweden

Nationwide Deployment of Social Alarms in Sweden Nationwide Deployment of Social Alarms in Sweden ehealth forum May 13 th 2014, Athens Greece The EIP AHA Scale-up Strategy Background problems and uncertainties Background the root of the problem The telecommunication

More information

National Cyber Security Strategies

National Cyber Security Strategies May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is

More information

Webinar: FTTH Market in Europe Status and Analysis. Moderator: Jan Schindler Chair Market Intelligence Committee FTTH Council Europe

Webinar: FTTH Market in Europe Status and Analysis. Moderator: Jan Schindler Chair Market Intelligence Committee FTTH Council Europe Webinar: FTTH Market in Europe Status and Analysis Moderator: Jan Schindler Chair Market Intelligence Committee FTTH Council Europe FTTH Council Europe A sustainable future for Europe enabled by Fibre

More information

Cyber Security for Railway Signalling

Cyber Security for Railway Signalling Cyber Security for Railway Signalling Dr. Cédric LÉVY-BENCHETON Network and Information Security Expert European Union Agency for Network and Information Security How to protect signalling system against

More information

European Distribution System Operators for Smart Grids

European Distribution System Operators for Smart Grids European Distribution System Operators for Smart Grids Network and information security (NIS): Recommendations for information sharing and risk management September 2014 Executive summary Our modern society

More information

SECRETARIAT REPORT 2014 31 TH Annual General Meeting Co-hosted by TELESUR 25 th -29 th January 2015 Paramaribo, Suriname

SECRETARIAT REPORT 2014 31 TH Annual General Meeting Co-hosted by TELESUR 25 th -29 th January 2015 Paramaribo, Suriname SECRETARIAT REPORT 2014 31 TH Annual General Meeting Co-hosted by TELESUR 25 th -29 th January 2015 Paramaribo, Suriname By Regenie Fräser Secretary General CANTO CANTO CANTO is recognized as the leading

More information

Getting a 360 customer view with SAP Business Communications Management (BCM)

Getting a 360 customer view with SAP Business Communications Management (BCM) SAP Digital Services the way we do it o Getting a 360 customer view with SAP Business Communications Management (BCM) Capgemini can help you deploy BCM to achieve multi-channel integration across all your

More information

Global Mobility Outsourcing

Global Mobility Outsourcing Vodafone Global Enterprise Global Mobility Outsourcing Whitepaper Vodafone Global Enterprise The bottom line: By 2012, the number of mobile workers is expected to reach one billion worldwide (Source IDC,

More information

Impact of architecture on governance: IPv6 and Internet post-ip

Impact of architecture on governance: IPv6 and Internet post-ip Impact of architecture on governance: IPv6 and Internet post-ip Jean-Michel Cornu, Chief scientist Fing Internet Governance: Transparency Trust and Tools (IG3T) Technical Normalcy and Internet Governance:

More information

Cyber Security in EU: ENISA approach

Cyber Security in EU: ENISA approach Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency in Electricity Distribution Grids, Brussels European Union Agency for

More information

THE INFOCROSSING SECURE EMAIL BOUNDARY SERVICE

THE INFOCROSSING SECURE EMAIL BOUNDARY SERVICE THE INFOCROSSING SECURE EMAIL BOUNDARY SERVICE EMAIL BORNE THREATS An Escalating Problem for Every Business More than three out of four emails contain spam, viruses or other malicious content and that

More information

Horizon 2020 Secure Societies

Horizon 2020 Secure Societies Horizon 2020 Secure Societies Angelo MARINO Head of Unit, Security Research European Commission Research Executive Agency NOT LEGALLY BINDING 2013 Where we come from: FP7-Security R&D (2007-2013): EUR

More information

Telzed Limited Courses and publications

Telzed Limited Courses and publications Telzed Limited Courses and publications Information on publications and workshops provided outside of consulting assignments Information to assist with the planning of consulting projects, reports and

More information

Use Logics. The Customer Benefits of Separation. Nick WHITE INTUG

Use Logics. The Customer Benefits of Separation. Nick WHITE INTUG Use Logics The Customer Benefits of Separation Nick WHITE INTUG T he International Telecommunications Users Group (INTUG) was formed in 1974 to ensure that the voice of the user was heard wherever regulatory

More information

Whitepaper - Guide to migrating to SIP

Whitepaper - Guide to migrating to SIP Whitepaper - Guide to migrating to SIP There are both cost savings and productivity benefits to be had by moving from the old circuit switched telephony world to SIP. This short guide describes the steps

More information

ICT MASTER PROGRAMME for Information Security / Mobile Services

ICT MASTER PROGRAMME for Information Security / Mobile Services ICT MASTER PROGRAMME for Information Security / Mobile Services 14.3.2006 Murmansk Development Manager History and Background Founded 1969 as an independent department, joined Faculty of Science in 1987

More information

HybridIT Practice Builder

HybridIT Practice Builder HybridIT Practice Builder Conceptsales Part of IT Channel Company Private equity funded 150 fte s, 50 mio revenue Business Transformation ICT companies Workshops, Training & Portal Academies & training

More information

Network Security Provider Achieves Uninterrupted Voice Services 24x7x365 Worldwide

Network Security Provider Achieves Uninterrupted Voice Services 24x7x365 Worldwide Network Security Provider Achieves Uninterrupted Voice Services 24x7x365 Worldwide A global leader in the network security appliance solutions has revolutionised the security solutions sector Its innovative

More information

Presentation by: Dr. Nathalie Moreno Partner. Cloud Computing and Data Protection: an Update 4 October 2012

Presentation by: Dr. Nathalie Moreno Partner. Cloud Computing and Data Protection: an Update 4 October 2012 Presentation by: Dr. Nathalie Moreno Partner Cloud Computing and Data Protection: an Update 4 October 2012 Our team Speechly Bircham is an ambitious, international mid-size fullservice law firm head-quartered

More information

European Organization for Security (EOS) - Description and Envisaged Activities for 2012

European Organization for Security (EOS) - Description and Envisaged Activities for 2012 European Organization for Security (EOS) - Description and Envisaged Activities for 2012 EOS Objectives and Activities EOS is a tool for European security stakeholders for the comprehensive implementation

More information

Overview of DG INFSO R&D on Trust & Security

Overview of DG INFSO R&D on Trust & Security Overview of DG INFSO R&D on Trust & Security Mario Scillia European Commission Information Society and Media Directorate General Unit F5 - Trust & Security The views expressed in this presentation are

More information

Harrow Business Consultative Panel. Business Continuity Management. Responsible Officer: Myfanwy Barrett Director of Finance and Business Strategy

Harrow Business Consultative Panel. Business Continuity Management. Responsible Officer: Myfanwy Barrett Director of Finance and Business Strategy Meeting: Harrow Business Consultative Panel Date: 18 th July 2006 Subject: Business Continuity Management Responsible Officer: Myfanwy Barrett Director of Finance and Business Strategy Contact Officer:

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

The New Telco Data Centre - Pricing for the New Telecoms Data Centre 2014 to 2019

The New Telco Data Centre - Pricing for the New Telecoms Data Centre 2014 to 2019 Brochure More information from http://www.researchandmarkets.com/reports/2884649/ The New Telco Data Centre - Pricing for the New Telecoms Data Centre 2014 to 2019 Description: The New Telco Data Centre

More information

How to change your Internet Service Provider

How to change your Internet Service Provider How to change your Internet Service Provider Introduction At some point or other, you may find yourself needing to change your Internet Service Provider (ISP). The reasons may be many and include cost,

More information

2013 European Conferencing Services Customer Value Leadership Award

2013 European Conferencing Services Customer Value Leadership Award 2013 2013 European Conferencing Services Customer Value Leadership Award 2013 Frost & Sullivan 1 We Accelerate Growth Customer Value Leadership Award Conferencing Services Europe, 2013 Frost & Sullivan

More information

Cybersecurity Strategic Consulting

Cybersecurity Strategic Consulting Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with

More information

COMMISSION OF THE EUROPEAN COMMUNITIES

COMMISSION OF THE EUROPEAN COMMUNITIES EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, [ ] COM(2006) 251 COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE

More information

Infocomm Security Masterplan 2

Infocomm Security Masterplan 2 INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE 8 Temasek Boulevard #14-00 Suntec Tower 3 Singapore 038988 Tel : 65-62110888 Fax : 65-62112222 www.ida.gov.sg April 2009 Infocomm Security Masterplan 2 The Infocomm

More information

ITU SEMINAR (SLOVAKIA) EDI International Settlements Presentation by Eddy Patient

ITU SEMINAR (SLOVAKIA) EDI International Settlements Presentation by Eddy Patient ITU SEMINAR (SLOVAKIA) EDI International Settlements Presentation by Eddy Patient September 2001 EDI & ETIS - Defined Contents Facts about the ETIS/EDI International Settlements Group History of the EDI

More information

We ve enjoyed being with you through the days of the Plain Old Telephone System.

We ve enjoyed being with you through the days of the Plain Old Telephone System. BT One Voice BT One We ve enjoyed being with you through the days of the Plain Old Telephone System. Over the years we ve supported your phone lines, your private branch exchanges and your calls. Now we

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

IPTV LANDSCAPE IN THE USA

IPTV LANDSCAPE IN THE USA IPTV LANDSCAPE IN THE USA STUDY OVERVIEW In this report, we illustrate the different solutions and the different business models of the major programmes currently available for the deployment of IPTV in

More information

Internet Research Task Force Anti-Spam Research Group (ASRG) Presentation Created By: Paul Q. Judge, Chair

Internet Research Task Force Anti-Spam Research Group (ASRG) Presentation Created By: Paul Q. Judge, Chair Internet Research Task Force Anti-Spam Research Group (ASRG) Presentation Created By: Paul Q. Judge, Chair 1 ASRG status Formed: March 2003 Chairs: Paul Judge and Yakov Shafranovich Membership: 615 members

More information