How To Write A Book On The Internet Security

Size: px
Start display at page:

Download "How To Write A Book On The Internet Security"

Transcription

1 Datum Bedrijfszekerheid in ketens Risk Towards Trustworthy ICT Service Chains Control Assurance Integrated Assurance framework for ICT enabled service chains Drs Y.W. (Ype) van Wijk RE RA Rijksuniversiteit Groningen Business & ICT IT auditing 24 november 2011

2 Datum Agenda Towards Trustworthy ICT service chains (TTISC project) Bedrijfszekerheid en trends in ketens Content versus Delivery networks Assurance guidelines The atomic approach for controls in service chains Samenvatting en conclusie

3 Datum Towards Trustworthy ICT Service Chains Innovatie samenwerkingsverband ICT services chains Chain Governance, SaaS, SOA, ICT, IT Audit Risk Control - Assurance Bedrijfszekerheid in ketenautomatisering Framework Assurance Leading Indicators Rijksuniversiteit Groningen Bestuurlijke Informatica Drs Y.W. van Wijk RE RA PWC Accountant en IT consulting Nedlloyd operational audit Euronext Amvest BV Cobalus BV Rijksuniversiteit Groningen

4 Datum Bedrijfszekerheid in ICT ketens

5 Bedrijfszekerheid en ICT ketens service Datum service request service request Consument service Enabler (certificaat) Techniek ICT Netwerk - Architectuur Service leverancier Bedrijfszekerheid 44,4 mlrd Inkomstenbelasting Miljoenennota 2010

6 Datum Trends ICT ketens van Applicaties naar ketens van gekoppelde externe service netwerken van applicaties (linkedin, maps) SaaS en Cloud computing als distributeur Toename afhankelijkheid Nieuwe risico s en bedreigingen Applicatie leverancier afhankelijk vertrouwen leveranciers van leveranciers, ad infinitum. Need for assurance (e-government, e-business) Objectieve methode assurance Security, availability, quality of service (QoS) Assurance over totale keten.

7 Datum Service chain Assurance approach Business content risk Risk Control Assurance Delivery technical risk Risico in service ketens content networks - business inhoud network controls delivery networks - technische ICT control Generalisatie en conceptualisatie Integrated Assurance Framework for ICT enabled service chains

8 Datum Standards, Guidelines, Frameworks, Best Practices, Architecture theory s Standards ISO series ENISA Guidelines COBIT IT control objectives for cloud computing ITAF (IT Assurance Framework) Val IT Risk IT IEEE Practitioners research TEXO SAP research Project Master Chain governance Scientific research Organization theory Technical ICT research Architecture Audit theory Operations research Accountancy Architectures SOA SaaS Cloud computing Assurance Conceptualization in service chains?

9 Datum Assurance Back to Basic.

10 Datum Het basis Atoom van de service chain Content network Service Chain service Content Network request A B C Add value service request Risk Control Enactment Enforcement Delivery Network Delivery network Service Chain Risk Control Assurance

11 Datum Service chain propagation in content and delivery networks Content Network Service Chain Propagation Backward Content network Front Chain propagation Risk Delivery network Service Chain Propagation Delivery Network Service Chain Propagation Chain propagation Risk

12 Level business content assurance network Datum Enactment Organisatie Client Skin Organisatie Organisatie 3. Service Chain Assurance inkoop = service + service.. Enforcement Risk Control Assurance 1. INTRA-organisatie risk-control-assurance 2. INTER-organisatie risk-control-assurance

13 Level Technical delivery assurance network Datum Enactment Mobile network Client ISP TNT Enforcement Risk Control Assurance Security Vulnerability, confidentiality, Integrity, Authentication Quality of service (QoS) Bandwidth, Delay, Jitter, Round-trip time Availability Downtime, Mean-time between failure, Self healing properties

14 Datum Consequences for Architecture Service chain architecture Split content and delivery for chains Develop content assurance chain Develop delivery assurance chain Take care of proper enactment in the chain Agree on service chain enforcement Integrate on specific assurance indicators Service Based Auditing Institutionalize audit and dissemination assurance

15 Datum Conclusions Assurance is a primary condition for services business Assurance in service chains must add predictive value For Architecture it is important to integrate a-priori the leading indicators content and delivery network assurance Integrating assurance indicators in the design phase of service oriented architecture can support content and delivery assurance. Assurance by professional independent party opinion can be fundamental for trustworthy services in chains

16 Datum Towards Trustworthy ICT Service Chains Risk Control Dank voor uw aandacht Assurance Drs Y.W. (Ype) van Wijk RE RA Rijksuniversiteit Groningen Business & ICT IT auditing

17 Practitioners References Datum Standards ISO ENISA Guidelines COBIT IT control objectives for cloud computing ITAF (IT Assurance Framework) Val IT Risk IT Practitioners research TEXO Governance framework (SAP research) Project Master

Architectuur hulpmiddelen TechnoVision & CORA. Maarten Engels Nieuwegein, 9 februari 2012

Architectuur hulpmiddelen TechnoVision & CORA. Maarten Engels Nieuwegein, 9 februari 2012 Architectuur hulpmiddelen TechnoVision & CORA Maarten Engels Nieuwegein, 9 februari 2012 AGENDA Hulpmiddel 1: TechnoVision Hulpmiddel 2: Common Reference Architecture Q&A Hulpmiddel 1: TechnoVision 4

More information

+ Even voorstellen Barry Derksen, Directeur BITTI B.V., Bedrijf met 10 toppers op : benchmark, advies, audit en interim/ project management

+ Even voorstellen Barry Derksen, Directeur BITTI B.V., Bedrijf met 10 toppers op : benchmark, advies, audit en interim/ project management Business & IT alignment ABC...van WORST practices! Barry Derksen + Even voorstellen Barry Derksen, Directeur BITTI B.V., Bedrijf met 10 toppers op : benchmark, advies, audit en interim/ project management

More information

Maintaining Herd Communication - Standards Used In IT And Cyber Security. Laura Kuiper

Maintaining Herd Communication - Standards Used In IT And Cyber Security. Laura Kuiper Maintaining Herd Communication - Standards Used In IT And Cyber Security Laura Kuiper So what is Cyber Security? According to ITU-T X.1205 Cybersecurity is the collection of tools, policies, security concepts,

More information

F5 NETWORKS Good, Better & Best. Patrick Heirwegh Channel Manager p.heirwegh@f5.com +32 468 18 51 19

F5 NETWORKS Good, Better & Best. Patrick Heirwegh Channel Manager p.heirwegh@f5.com +32 468 18 51 19 F5 NETWORKS Good, Better & Best Patrick Heirwegh Channel Manager p.heirwegh@f5.com +32 468 18 51 19 The F5 Advantage Security Enterprise Users $ Customers Attacker ICSA Certified ACL s DoS Mitigation IP

More information

FINANCIAL SHARED SERVICES

FINANCIAL SHARED SERVICES FINANCIAL SHARED SERVICES Arie Geneugelijk, John Vervloet & Djimmy Zeijpveld 9-3-2016 Agenda Waarom bent u hier? Praktijkvoorbeeld Exact: Transitie naar shared service center Demonstratie Vragen? Waarom

More information

Het Secure Datacenter

Het Secure Datacenter Het Secure Datacenter If trust and reliability matters Michiel Steltman CTO Siennax Drivers voor IT Security Financiële aansprakelijkheid Sox, Basel II Persoonlijke aansprakelijkheid van managers Operationele

More information

Van risico analyse naar security plan

Van risico analyse naar security plan Van risico analyse naar security plan. Small step (for man) or Giant leap (for mankind) Aart Bitter 9 september 2009 Aart.Bitter@planet.nl About me Technische Informatica & Computerkunde 1991 ITIL Service

More information

ISO 27001:2005 & ISO 9001:2008

ISO 27001:2005 & ISO 9001:2008 ISO 27001:2005 & ISO 9001:2008 September 2011 1 Main Topics SFA ISO Certificates ISO 27000 Series used in the organization ISO 27001:2005 - Benefits for the organization ISO 9001:2008 - Benefits for the

More information

Cloud. Transformatie. Cases.

Cloud. Transformatie. Cases. Cloud. Transformatie. Cases. Dé cloud bestaat niet. maakt cloud concreet 2 IT Transformatie. Cloud? De vraag is niet of we gaan, maar wanneer en hoe #sogetidoethet Matthias Radder Cloud Consultant 3 In

More information

Platform voor Informatiebeveiliging IB Governance en management dashboards

Platform voor Informatiebeveiliging IB Governance en management dashboards Platform voor Informatiebeveiliging IB Governance en management dashboards Johan Bakker MSc CISSP ISSAP Principal Policy Advisor KPN Corporate Center Information Security Governance Agenda Drivers voor

More information

Introductie Agilos Enterprise Warehouse View The Audit-Data Warehouse: a data refinery Controls Warehouses Solution Warehouses

Introductie Agilos Enterprise Warehouse View The Audit-Data Warehouse: a data refinery Controls Warehouses Solution Warehouses Source: www.olifantenpaadjes.nl/ Agenda 1 2 3 Introductie Agilos Enterprise Warehouse View The Audit-Data Warehouse: a data refinery 4 Controls Warehouses 4 Solution Warehouses -1- -2-1 Introductie Agilos

More information

ISACA Roundtable. Cobit and Grab@Pizza 7 september 2015

ISACA Roundtable. Cobit and Grab@Pizza 7 september 2015 1 ISACA Roundtable 7 september 2015 ISACA Roundtable Cobit and Grab@Pizza 7 september 2015 2015 KPN Corporate Market B.V. ISACA, is a registered trademark of the Information Systems Audit and Control Association

More information

Market Intelligence & Research Services. CRM Trends Overview. MarketCap International BV Januari 2011

Market Intelligence & Research Services. CRM Trends Overview. MarketCap International BV Januari 2011 Market Intelligence & Research Services CRM Trends Overview MarketCap International BV Januari 2011 Index 1. CRM Trends generiek 2. CRM & IT 3. CRM in Nederland 2011 2 Index 1. CRM Trends generiek 2. CRM

More information

Information Security Governance:

Information Security Governance: Information Security Governance: Designing and Implementing Security Effectively 2 nd Athens International Forum on Security 15 16 Jan 2009 Anestis Demopoulos, CISA, CISSP, CIA President of ISACA Athens

More information

E-Commerce met Microsoft

E-Commerce met Microsoft Webplatform & klantmanagement E-Commerce met Microsoft Verander uw Web-site naar een succesvol business platform Nico Copier Enterprise Technology Architect nico.copier@microsoft.com Microsoft Agenda Trends

More information

T h e N e x t G e n e r a t i o n of C o n s u m e r i z a t i o n KIXS. Leading Edge Forum Study Tour 20-25 October 2013

T h e N e x t G e n e r a t i o n of C o n s u m e r i z a t i o n KIXS. Leading Edge Forum Study Tour 20-25 October 2013 T h e N e x t G e n e r a t i o n of C o n s u m e r i z a t i o n Teus ir. van T. der Plaat der Plaat KIXS Leading Edge Forum Study Tour 20-25 October 2013 November 2013 De reis Inleiding S-curve End

More information

PinkRoccade Offshore Facilities Optimizing the Software Development Chain. PROF proposition. neral presentation

PinkRoccade Offshore Facilities Optimizing the Software Development Chain. PROF proposition. neral presentation Optimizing the Software Development Chain PROF proposition neral presentation OF PinkRoccade Offshore: Near Offshore future Facilities Gartner: Offshore is no longer a strategic advantage it is a competitive

More information

De rol van requirements bij global development

De rol van requirements bij global development De rol van requirements bij global development 19 & 25 november 2008 Rini van Solingen Requirements zijn een noodzakelijk kwaad Immers, als wij elkaars gedachten konden lezen hadden we geen requirements

More information

Hoe ontwerp en realiseer je een digitale wasstraat?

Hoe ontwerp en realiseer je een digitale wasstraat? Hoe ontwerp en realiseer je een digitale wasstraat? Introductie Context Basis Browsing Hosting Conclusie & Contact Wie zijn wij Jeroen van der Meer In IT sinds 1984 CTO Systems programming Datacenter design

More information

Information Security Governance

Information Security Governance Information Security Governance Aart Bitter Aart.Bitter@information-security-governance.com Agenda Governance & Compliance Information Security Governance Aanpak om information security governance in organisaties

More information

Cisco Data Center and Virtualisation Strategy. Marc Samsom

Cisco Data Center and Virtualisation Strategy. Marc Samsom Cisco Data Center and Virtualisation Strategy Marc Samsom I'm not after servers. I'm after virtualization, where you don't know where your processors are, your information's stored, the application resides..

More information

Security and privacy standardization for the SME community

Security and privacy standardization for the SME community Security and privacy standardization for the SME community NLO meeting, Athens, March 4th 2015 European Union Agency for Network and Information Security www.enisa.europa.eu PROJECT CONTEXT European Union

More information

Informatiebeveiliging volgens ISO/IEC 27001:2013

Informatiebeveiliging volgens ISO/IEC 27001:2013 Informatiebeveiliging volgens ISO/IEC 27001:2013 Dave Hagenaars, directeur BSI Group Nederland Copyright 2012 BSI. All rights reserved. Inhoud Wie zijn wij? Waarom informatiebeveiliging? Wat is de relevantie

More information

Visie op Hosted Services: Cloud Computing. Michel N guettia Business Lead Server

Visie op Hosted Services: Cloud Computing. Michel N guettia Business Lead Server Visie op Hosted Services: Cloud Computing Michel N guettia Business Lead Server Agenda De Strategie Microsoft Cloud Partner Opportunity Ondertussen, de 5e Generatie Computing Cloud SOA Web Client-Server

More information

#BMIT. Welcome. Seminar Business Continuity

#BMIT. Welcome. Seminar Business Continuity #BMIT Welcome Seminar Business Continuity Smart Business Strategies Business Meets IT - Agenda 9.30: Market Research: William Visterin, Smart Business Strategies 10.00: Chris De Blende, PwC Business

More information

Processes, services and business agility

Processes, services and business agility Processes, services and business agility prof. dr. Wilfried Lemahieu K.U.Leuven Faculty of Business and Economics Department of Decision sciences and Information Management wilfried.lemahieu@econ.kuleuven.be

More information

How To Run A Brainresearch Biobank

How To Run A Brainresearch Biobank In 7 stappennaareentotale biobank oplossing Erik Steinfelder Labautomation 13 april, Hoevelaken In 7 stappen naar een totale biobank oplossing 1. Defineer het huidige proces 2. Vorm een project team 3.

More information

The Netherlands: ICT R&D and participation to FP7

The Netherlands: ICT R&D and participation to FP7 The Netherlands: ICT R&D and participation to FP7 Research & Development expenditure in ICT In 2011, public support for ICT R&D (ICT GBAORD) in the Netherlands was 6.6% of total public funding for R&D,

More information

What Is KAURI?

What Is KAURI? KAURI Mission (Articles of Association) De vereniging heeft tot doel een platform, kenniscentrum en lerend netwerk te zijn van mensen uit het bedrijfsleven, maatschappelijke organisaties en instellingen,

More information

Executive's Guide to

Executive's Guide to Executive's Guide to IT Governance Improving Systems Processes with Service Management, COBIT, and ITIL ROBERT R. MOELLER WILEY John Wiley & Sons, Inc. Contents Preface xiii PART I: IT GOVERNANCE CONCEPTS

More information

15 JAAR VOOROP IN ICT SECURITY

15 JAAR VOOROP IN ICT SECURITY NEXT GENERATION MOTIV BIEDT WEERBAARHEID EN MONITORING VOOR UW GEBRUIKERSNETWERK OF DATACENTER CHALLENGES CHALLENGES MALWARE FOUND CHALLENGES BOTNETS ATTACK CHALLENGES GEBRUIK VAN DIVERSE APPLICATIES CHALLENGES

More information

A view on governance. SharePoint Kennisdelingsdag. Nick Stuifbergen, consultant Nickstu@microsoft.com. 28 January 2011

A view on governance. SharePoint Kennisdelingsdag. Nick Stuifbergen, consultant Nickstu@microsoft.com. 28 January 2011 A view on governance SharePoint Kennisdelingsdag Nick Stuifbergen, consultant Nickstu@microsoft.com 28 January 2011 Agenda Waar zie je de risico s A view on governance SharePoint landscape SharePoint life

More information

CLOUD SECURITY THROUGH COBIT, ISO 27001 ISMS CONTROLS, ASSURANCE AND COMPLIANCE

CLOUD SECURITY THROUGH COBIT, ISO 27001 ISMS CONTROLS, ASSURANCE AND COMPLIANCE CLOUD SECURITY THROUGH COBIT, ISO 27001 ISMS CONTROLS, ASSURANCE AND COMPLIANCE Indranil Mukherjee Singapore ISC Pte Ltd Session ID: CLD T02 Session Classification: Intermediate Cloud Computing from a

More information

Power to Innovate. Luc Verbist CIO De Persgroep 22/1/2015

Power to Innovate. Luc Verbist CIO De Persgroep 22/1/2015 Power to Innovate Luc Verbist CIO De Persgroep 22/1/2015 Innovatie Business modellen wijzigden gestaag. Nieuwe technologie ligt aan de basis van erg disruptieve wijzigingen. Muziek Foto Media Taxi Banken

More information

IT Audit in the Cloud

IT Audit in the Cloud IT Audit in the Cloud Pavlina Ivanova, CISM ISACA-Sofia Chapter Content: o 1. Introduction o 2. Cloud Computing o 3. IT Audit in the Cloud o 4. Residual Risks o Used Resources o Questions 1. ISACA Trust

More information

Wat is nieuw in JD Edwards?

Wat is nieuw in JD Edwards? Wat is nieuw in JD Edwards? 1 Terug in de tijd Wat gebeurde er in februari 2005? 4 JD Edwards Product Roadmap 2005 5 JD Edwards Product Roadmap 2014 6 7 8 16 Hoe Cloudy is JD Edwards? Is het licentiemodel

More information

Cloud. Regie. Cases.

Cloud. Regie. Cases. Cloud. Regie. Cases. Agile SIAM Dave van Herpen Consultant Cloud Cases Regie 2 Grip op de cloud Hoe word ik een wendbare service broker? Cloud Cases Regie 3 Waarom cloud? innovation maintenance Private?

More information

Security Architecture Principles A Brief Introduction. Mark Battersby 2013-05-22, Oslo

Security Architecture Principles A Brief Introduction. Mark Battersby 2013-05-22, Oslo Security Architecture Principles A Brief Introduction Mark Battersby 2013-05-22, Oslo Agenda About Me Enterprise Architecture Architecture Principles Our Philosophy Security Architecture Principles Security

More information

Architecting Information Security Services for Federate Satellite Systems

Architecting Information Security Services for Federate Satellite Systems Architecting Information Security Services for Federate Satellite Systems Marc Sanchez Net, Iñigo del Portillo, Bruce Cameron, Ed Crawley 3 nd International Federated Satellite Systems Workshop August

More information

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts. Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao Guocui.gao@tufts.edu Mentor:

More information

Anton Wilsens. The LIRIS Academy 2010-2011 Keys to a successful mobile channel in the Financial Services Sector and beyond

Anton Wilsens. The LIRIS Academy 2010-2011 Keys to a successful mobile channel in the Financial Services Sector and beyond LAC - "Architectuur voor nieuwe business modellen in de cloud" The LIRIS Academy 2010-2011 Keys to a successful mobile channel in the Financial Sector and beyond Anton Wilsens Mobile is coming no, wait

More information

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud Computing Governance & Security. Security Risks in the Cloud Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud

More information

Theme 1: IT Governance and Audit Methodologies

Theme 1: IT Governance and Audit Methodologies Theme 1: IT Governance and Audit Methodologies Recent rapid development of new IT technologies was followed up by an instantaneous integration of them at the organizational level. The management of the

More information

Security/Information Assurance Measurements and Metrics

Security/Information Assurance Measurements and Metrics Security/Information Assurance Measurements and Metrics Wai Tsang, Ph.D. TecSec 6 Th Annual International Software Measurement & Analysis Conference Richmond, VA September 13, 2011 Agenda Software estimation

More information

Cloud computing security in the Dutch Government

Cloud computing security in the Dutch Government Cloud computing security in the Dutch Government John van Huijgevoort Senior Security Advisor, NCSC Agenda Introduction History / Process Relation with other ICT-projects Conclusion 1 Introduction: John

More information

Met je hoofd in de wolken. Ard-Jan Glas

Met je hoofd in de wolken. Ard-Jan Glas Met je hoofd in de wolken Ard-Jan Glas Trend Hogere availability 24 uur per dag global customers Van mainframe naar distributed Omzet verlies door downtime Klanten stellen hogere eisen De volgende IT

More information

Data Center Consolidation

Data Center Consolidation Data Center Consolidation DHS Lessons Learned FDCCI Workshop June 11, 2010 1 Agenda Data Center Consolidation and your Organization Hotel, Enterprise, Cloud Lessons Learned IT Security Disaster Recovery

More information

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects Cloud Computing An insight in the Governance & Security aspects AGENDA Introduction Security Governance Risks Compliance Recommendations References 1 Cloud Computing Peter Hinssen, The New Normal, 2010

More information

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is

More information

Launching NVL Next. The future of leasing. 26 november 2015

Launching NVL Next. The future of leasing. 26 november 2015 Launching NVL Next The future of leasing 26 november 2015 Welcomes you Social media Live eventverslag op twitter en morgen op de NVL site Volg ons op @NVLlease of LinkedIn Twitter mee #NVLNext #innovatie

More information

The Netherlands ICT R&D

The Netherlands ICT R&D The Netherlands ICT R&D In 2009, business expenditure on R&D (BERD) in the ICT sectors amounted to 672M, down from 674M the year before, resulting in a slightly increased R&D intensity of 2.7% of sectoral

More information

Risks and Countermeasures in the Public Cloud

Risks and Countermeasures in the Public Cloud Risks and Countermeasures in the Public Cloud Alessandro Vallega fond member of AIEA Security Business Development, Oracle Italy Oracle Community for Security Director Clusit Board of Directors Paragliding

More information

How To Use Risk It

How To Use Risk It Risk IT A set of guiding principles and the first framework to help enterprises identify, govern and effectively manage IT risk. In business today, risk plays a critical role. Almost every business decision

More information

Cloud Security Introduction and Overview

Cloud Security Introduction and Overview Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious

More information

Magic Software Enterprises. Composite Application Development Suite

Magic Software Enterprises. Composite Application Development Suite Magic Software Enterprises Composite Application Development Suite Magic Software Enterprises Founded in 1986 NASDAQ: MGIC (IPO 1991) Revenue ca. 60 M. US$ Ca. 500 Employees Worldwide Global Presents >

More information

ISO 31000 de internationale richtlijn voor risicomanagement

ISO 31000 de internationale richtlijn voor risicomanagement ISO 31000 de internationale richtlijn voor risicomanagement Dick Hortensius NEN-Managementsystemen Agenda Achtergrond en ontwikkeling ISO Guide 73 en ISO 31000 De betekenis voor risicomanagers 1 overheid

More information

Hoe onze wereld aan het veranderen is

Hoe onze wereld aan het veranderen is Hoe onze wereld aan het veranderen is Frans Wittenberg CTO Cisco Sinds 2000 actief binnen Cisco Verantwoordelijk voor 3 systems engineering teams Verantwoordelijk voor partner organisatie,comerciële segment

More information

Information security versus network security in the Internet as critical infrastructure Security of Internet and Critical Infrastructures: European

Information security versus network security in the Internet as critical infrastructure Security of Internet and Critical Infrastructures: European Information security versus network security in the Internet as critical infrastructure Security of Internet and Critical Infrastructures: European Experiences, Rome, 13 June 2011 Objectives Describe information

More information

Copyright 2015 VMdamentals.com. All rights reserved.

Copyright 2015 VMdamentals.com. All rights reserved. Copyright 2015. All rights reserved. Copyright 2015. All rights reserved. The S oftware Erik Zandboer Advisory vspecialist EMC 2 Europe West D efined D ata C enter Copyright 2015. All rights reserved.

More information

... Stichting Empower European Universities at Maastricht ... Report on the annual accounts 14 December 2010 unti 31 December 2011 ... ... ...

... Stichting Empower European Universities at Maastricht ... Report on the annual accounts 14 December 2010 unti 31 December 2011 ... ... ... Stichting Empower European Universities at Maastricht Report on the annual accounts 14 December 2010 unti 31 December 2011 BDO BDO To the Board of directors and the Management of Stichting Empower European

More information

Secure Cloud Identity Wallet

Secure Cloud Identity Wallet 1 CREDENTIAL Secure Cloud Identity Wallet DS-02-2014 Dr. Arne Tauber u 2 CREDENTIAL Research Project Call: H2020-DS-2014-1 Acronym: CREDENTIAL Type of Action: IA Number: 653454 Partners: 12 Duration: 36

More information

http://www.guido.be/intranet/enqueteoverview/tabid/152/ctl/eresults...

http://www.guido.be/intranet/enqueteoverview/tabid/152/ctl/eresults... 1 van 70 20/03/2014 11:55 EnqueteDescription 2 van 70 20/03/2014 11:55 3 van 70 20/03/2014 11:55 4 van 70 20/03/2014 11:55 5 van 70 20/03/2014 11:55 6 van 70 20/03/2014 11:55 7 van 70 20/03/2014 11:55

More information

Understanding Crowd Behaviour Simulating Situated Individuals

Understanding Crowd Behaviour Simulating Situated Individuals Understanding Crowd Behaviour Simulating Situated Individuals Nanda Wijermans The research reported in this thesis was funded by the Netherlands Ministry of Defence ("DO-AIO" fund contract no TM-12). The

More information

PRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH

PRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH PRISMACLOUD Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH FOC2015 Vienna / 17.06.2015 Challenges for Future ICT Systems Cloud computing

More information

ENISA and Cloud Security

ENISA and Cloud Security ENISA and Cloud Security Rossen Naydenov Network Information Security Officer Critical Information Infrastructure Protection Department - ENISA European Union Agency for Network and Information Security

More information

Machineontwerp volgens IEC 62061

Machineontwerp volgens IEC 62061 Machineontwerp volgens IEC 62061 Insert Photo Here Safety solution Architect Safety Local Business Leader Benelux. Stephen Podevyn Safety Solution Seminar Agenda deel 1 1. Richtlijnen en normen 2. Safety

More information

Van SARA naar Vancis ICT voor de Kenniseconomie. Dr. Anwar Osseyran SARA/Vancis Managing Director osseyran@sara.nl

Van SARA naar Vancis ICT voor de Kenniseconomie. Dr. Anwar Osseyran SARA/Vancis Managing Director osseyran@sara.nl Van SARA naar Vancis ICT voor de Kenniseconomie Dr. Anwar Osseyran SARA/Vancis Managing Director osseyran@sara.nl Science Park Amsterdam a world of science in a city of inspiration Faculty of Science of

More information

Web Services Standards: obix in the wider XML Web Services context

Web Services Standards: obix in the wider XML Web Services context www.oasis-open.org Web Services Standards: obix in the wider XML Web Services context Pim van der Eijk OASIS European Representative OASIS Mission OASIS drives the development, convergence and adoption

More information

BUSINESS MANAGEMENT SUPPORT

BUSINESS MANAGEMENT SUPPORT BUSINESS MANAGEMENT SUPPORT Business disadvantages using cloud computing? Author: Maikel Mardjan info@bm-support.org 2010 BM-Support.org Foundation. All rights reserved. EXECUTIVE SUMMARY Cloud computing

More information

Medische hulpmiddelen en geneesmiddelen: Verschuivende grenzen in Brussel?

Medische hulpmiddelen en geneesmiddelen: Verschuivende grenzen in Brussel? Medische hulpmiddelen en geneesmiddelen: Verschuivende grenzen in Brussel? Sabina Hoekstra-van den Bosch Philips HealthTech, Global Regulations & Standards Arnhem, June 19, 2015 Samenvatting Verschil tussen

More information

Software VOC netwerkbijeenkomst De kansen van OEM. Hans Schut OEM Partner Manager Nederland 9 juli 2014

Software VOC netwerkbijeenkomst De kansen van OEM. Hans Schut OEM Partner Manager Nederland 9 juli 2014 Software VOC netwerkbijeenkomst De kansen van OEM Hans Schut OEM Partner Manager Nederland 9 juli 2014 Wat is OEM? Het principe Wanneer een bedrijf zijn producten verkoopt aan andere bedrijven, en dat

More information

The hackers are ready. Are we?

The hackers are ready. Are we? The hackers are ready. Are we? Shopt IT 2015-30 april Kurt Callewaert HOWEST UNIVERSITY of APPLIED SCIENCES Lecturer Applied Computer Science- Computer & Cyber Crime Professional Research manager ISACA

More information

How to manage IT Risks and IT Compliance as a Service

How to manage IT Risks and IT Compliance as a Service How to manage IT Risks and IT Compliance as a Service in complex IS environment The Road Ahead in the Cloud Marek Skalický, CISM, CRISC Regional Account Manager for CAEE For SECURE 2012 Warsaw Agenda IT/Security

More information

Themabijeenkomst 17 april 2003

Themabijeenkomst 17 april 2003 Themabijeenkomst 17 april 2003 Evelyn Gerritsen (evelyn.gerritsen@oracle.com) Jan Poortinga (jan.poortinga@oracle.com) Sales Consultants Oracle Nederland Agenda Waarom integratie Diverse vormen van integratie

More information

Working Group on. First Working Group Meeting 29.5.2012

Working Group on. First Working Group Meeting 29.5.2012 Working Group on Cloud Security and Privacy (WGCSP) First Working Group Meeting 29.5.2012 1 Review of fexisting i Standards d and Best Practices on Cloud Security Security Standards and Status List of

More information

Information Security Management Systems

Information Security Management Systems Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector

More information

Operations and Network Center (CORE)

Operations and Network Center (CORE) Operations and Network Center (CORE) Get to know us The Operations and Network Center (CORE) is the cornerstone in Informatica ECI's strategy for the provision of managed information technology services.

More information

TiSEM Master's Programs admission academic year 2016-2017 (students who intend to start in september 2016 or February 2017)*

TiSEM Master's Programs admission academic year 2016-2017 (students who intend to start in september 2016 or February 2017)* Versie 18-09-15 TiSEM Master's Programs admission academic year 2016-2017 (students who intend to start in september 2016 or February 2017)* Bachelor/Master MSc Accountancy MSc Economics MSc Finance MSc

More information

Business Partners Strategie Nederland

Business Partners Strategie Nederland Business Partners Strategie Nederland Strategie KOEL / Toshiba Stijn Reunis - Sales Director KOEL Benelux Peter Doldersum - Channel Manager Toshiba NL Strategie Toshiba Innovatie! Hardware is belangrijk,

More information

Security Inspection Inc. Solutions to secure your network

Security Inspection Inc. Solutions to secure your network Security Inspection Inc. TM Solutions to secure your network Secure Cloud Utilization Strategies! responsibilities Out of 127 cloud providers surveyed, a recently released study showed that only 25% of

More information

How to deliver Self Service IT Automation

How to deliver Self Service IT Automation How to deliver Self IT Automation Roeland Verhoeven, Manager Cloud Supply Chain Simac ICT Rien du Pre, HP Cloud Solution Architect Datum: 17-06-2014 Hoe te komen tot een Self Customer Centric Portal Er

More information

SDN van start naar finish

SDN van start naar finish SDN van start naar finish Ralph Wanders Datacenter Solutions Manager Rick Mur Senior System Engineer Juniper Networks IT SECURITY IS TOPSPORT! Beperkingen datacenter architecturen! Agility/Netwerk virtualisatie!

More information

TTP.NL Scheme. for management system certification. of Trust Service Providers issuing. Qualified Certificates for Electronic Signatures,

TTP.NL Scheme. for management system certification. of Trust Service Providers issuing. Qualified Certificates for Electronic Signatures, TTP.NL Scheme for management system certification of Trust Service Providers issuing Qualified Certificates for Electronic Signatures, Public Key Certificates, Website Certificates and / or Time-stamp

More information

IS research relevance from an industrial perspective. Ir. A.F.Baldinger Chairman of NAF

IS research relevance from an industrial perspective. Ir. A.F.Baldinger Chairman of NAF IS research relevance from an industrial perspective Ir. A.F.Baldinger Chairman of NAF A.F.Baldinger Studied Applied Physics TU Delft [66-73] Industry Experience: 35 years experience (Telecom, Software

More information

Cloud Based E-Government: Benefits and Challenges

Cloud Based E-Government: Benefits and Challenges Cloud Based E-Government: Benefits and Challenges Saleh Alshomrani 1 and Shahzad Qamar 2 1 Faculty of Computing and IT, King Abdulaziz University, Jeddah, Saudi Arabia 2 Faculty of Computing and IT, North

More information

Master of Science Advanced Software Services. Courses description

Master of Science Advanced Software Services. Courses description Master of Science Advanced Software Services Courses description Architecture of Service Oriented Information Systems The course explains the concept of the different architectural views (e.g. function

More information

Security for Your Business.

Security for Your Business. Security for Your Business. Knowing what really matters. Information and telecommunications security. More than just an interdisciplinary topic. Outstanding industry solutions are created from long-standing

More information

Recent Researches in Electrical Engineering

Recent Researches in Electrical Engineering The importance of introducing Information Security Management Systems for Service Providers Anel Tanovic*, Asmir Butkovic **, Fahrudin Orucevic***, Nikos Mastorakis**** * Faculty of Electrical Engineering

More information

Waarom u nog niet naar de Cloud moet migreren

Waarom u nog niet naar de Cloud moet migreren DO the CLOUD donderdag 12 mei 2011 Aviodrome - Lelystad DO the CLOUD Waarom u nog niet naar de Cloud moet migreren Ron Moerman Technology Officer Sogeti Waarom u nog niet naar de Cloud moet migreren Is

More information

JOB DESCRIPTION REF: 50039237

JOB DESCRIPTION REF: 50039237 JOB DESCRIPTION REF: 50039237 Note: This job description does not form part of the employee s contract of employment but is provided for guidance. The precise duties and responsibilities of any job may

More information

Resilience in Networks: Elements and Approach for a Trustworthy Infrastructure. Andreas Fischer and Hermann de Meer

Resilience in Networks: Elements and Approach for a Trustworthy Infrastructure. Andreas Fischer and Hermann de Meer Resilience in Networks: Elements and Approach for a Trustworthy Infrastructure Andreas Fischer and Hermann de Meer The ResumeNet project Resilience & Survivability for future networking framework, mechanisms

More information

ITSM Governance In the world of cloud computing

ITSM Governance In the world of cloud computing ITSM Governance In the world of cloud computing Housekeeping Welcome to the Webinar Use the control panel to ask questions Can you see & hear us? enter your name & city to confirm Type Your Questions Here

More information

Lean Maintenance & Asset Management The Best of Both Worlds

Lean Maintenance & Asset Management The Best of Both Worlds Lean Maintenance & Asset Management The Best of Both Worlds Ir. Martin van den Hout CMRP : Asset Management, Maintenance & Reliability Introductie 2 Ir. Martin van den Hout Certified Maintenance & Reliability

More information

IT consulting Advice into action

IT consulting Advice into action www.pwc.lu/it-consulting IT consulting Advice into action Using technology to bring value to your business BEST ICT STRATEGY COMPANY LUXEMBOURG ICT AWARDS 2010 Our services PwC helps private and public

More information

OutSystems on Oracle

OutSystems on Oracle OutSystems on Oracle Spreker(s) : Datum : E-mail : Marieke Gijsberts, Martijn Habraken, Martin Westra 12-05-2015 info@transfer-solutions.com WWW.TRANSFER-SOLUTIONS.COM OUTSYSTEMS ON ORACLE Agenda Intro

More information

Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014

Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014 Cloud Security Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014 Agenda Introduction Security Assessment for Cloud Secure Cloud Infrastructure

More information

Cloud computing and personal data protection. Gwendal LE GRAND Director of technology and innovation CNIL

Cloud computing and personal data protection. Gwendal LE GRAND Director of technology and innovation CNIL Cloud computing and personal data protection Gwendal LE GRAND Director of technology and innovation CNIL 1 Data protection in Europe Directive 95/46/EC Loi 78-17 du 6 janvier 1978 amended in 2004 (France)

More information

Integrated Information Management Systems

Integrated Information Management Systems Integrated Information Management Systems Ludk Novák ludek.novak@anect.com ANECT a.s. Brno, Czech Republic Abstract The article tries to find consensus in these tree different types of the systems the

More information

Leverage energy efficiency potentials with the principals of Industry 4.0 Background and experiences out of the application in a family-owned company

Leverage energy efficiency potentials with the principals of Industry 4.0 Background and experiences out of the application in a family-owned company Leverage energy efficiency potentials with the principals of Industry 4.0 Background and experiences out of the application in a family-owned company Charles Preeker, Weidmüller Amersfoort IE MotorenEvent

More information